diff --git a/i2p2www/__init__.py b/i2p2www/__init__.py
index ee8a5b8b2ea9d5facffd086c262b9b45882aa713..9d2e1583f5641e34defdd0c22de056ec685c719d 100644
--- a/i2p2www/__init__.py
+++ b/i2p2www/__init__.py
@@ -23,8 +23,8 @@ except ImportError:
 # Constants
 
 CURRENT_I2P_VERSION = '1.7.0'
-CURRENT_I2P_FIREFOX_PROFILE_VERSION = '1.07.2'
-CURRENT_I2P_OSX_VERSION = CURRENT_I2P_VERSION
+CURRENT_I2P_FIREFOX_PROFILE_VERSION = '1.7.4'
+CURRENT_I2P_OSX_VERSION = '1.7.1'
 
 CANONICAL_DOMAIN = 'geti2p.net'
 
diff --git a/i2p2www/meetings/helpers.py b/i2p2www/meetings/helpers.py
index 622141f1768d7db70dcc810ba8f89b97e2631325..2dc58582f368627ecc16223d9180235a5b63951f 100644
--- a/i2p2www/meetings/helpers.py
+++ b/i2p2www/meetings/helpers.py
@@ -54,6 +54,7 @@ def get_meetings_ids(num=0):
         # iterate over all files
         for f in v[2]:
             # ignore all non-.rst files
+            print("Meeting file found", f)
             if not f.endswith('.rst'):
                 continue
             try:
diff --git a/i2p2www/meetings/logs/310.log b/i2p2www/meetings/logs/310.log
index 85456183e3c4f269ed50f7bfc3d2f24a4d4e73d3..395cdb4a40a0d52760affffe2593a635c0f58228 100644
--- a/i2p2www/meetings/logs/310.log
+++ b/i2p2www/meetings/logs/310.log
@@ -87,4 +87,4 @@
 (04:38:54 PM) eyedeekay: Anything else on 4?
 (04:39:07 PM) zlatinb: not from me, eot
 (04:40:26 PM) eyedeekay: Anything else for the meeting? timeout 1m
-(04:41:43 PM) eyedeekay: All right thanks everybody for coming, looks like next month meeting will be May 3rd
+(04:41:43 PM) eyedeekay: All right thanks everybody for coming, looks like next month meeting will be May 3rd
\ No newline at end of file
diff --git a/i2p2www/meetings/logs/310.rst b/i2p2www/meetings/logs/310.rst
index e01389cb8fab9d72889d0a0e2531562d1615b45b..31f3ade00f2293ac2caac997c4701acc08ae656b 100644
--- a/i2p2www/meetings/logs/310.rst
+++ b/i2p2www/meetings/logs/310.rst
@@ -8,4 +8,4 @@ Quick recap
 
 eyedeekay,
 zzz,
-zlatinb
+zlatinb
\ No newline at end of file
diff --git a/i2p2www/translations/ar/LC_MESSAGES/about.po b/i2p2www/translations/ar/LC_MESSAGES/about.po
index ed3c25f69f05a4f70eb29e98da676830c864dd8b..64bcb96c60f4a8998c62ace89590a7fef1838cc2 100644
--- a/i2p2www/translations/ar/LC_MESSAGES/about.po
+++ b/i2p2www/translations/ar/LC_MESSAGES/about.po
@@ -1,22 +1,22 @@
-# Arabic translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-09-04 16:25+0000\n"
-"Last-Translator: محيي الدين <tx99h4@hotmail.com>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n"
-"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : "
-"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ar\n"
+"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -26,8 +26,7 @@ msgstr ""
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
 msgstr ""
 
@@ -50,8 +49,7 @@ msgstr ""
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
 msgstr ""
 
 #: i2p2www/pages/site/about/browser-config.html:2
@@ -64,24 +62,158 @@ msgstr "مسرد المصطلحات"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
 
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
+
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -91,15 +223,14 @@ msgstr ""
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -113,12 +244,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -128,13 +255,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -143,15 +270,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -160,28 +287,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -190,36 +316,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -228,13 +353,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -243,15 +368,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -270,9 +391,8 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -329,8 +449,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -349,8 +468,7 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
 msgstr ""
 
@@ -359,8 +477,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:76
@@ -373,8 +490,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
@@ -383,8 +499,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:95
@@ -392,8 +508,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -408,15 +523,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -428,8 +541,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -484,16 +596,14 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
@@ -502,11 +612,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:189
@@ -559,16 +667,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
 msgstr ""
@@ -584,12 +690,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -603,35 +706,29 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -640,16 +737,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -666,11 +761,57 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -679,18 +820,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -701,84 +839,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -789,8 +904,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -798,27 +912,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -826,26 +936,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -856,10 +957,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -867,18 +966,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -889,10 +985,8 @@ msgstr ""
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
 msgstr ""
@@ -1064,7 +1158,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1304,7 +1399,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1354,32 +1450,25 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1397,8 +1486,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1437,10 +1526,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1454,15 +1541,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1471,11 +1554,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1530,8 +1610,7 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1549,15 +1628,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1576,14 +1651,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1594,20 +1665,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1618,24 +1682,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1655,33 +1710,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -1694,32 +1740,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -1729,27 +1767,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -1766,17 +1796,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -1789,8 +1816,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -1801,10 +1827,8 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -1823,30 +1847,23 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -1860,55 +1877,40 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -1919,20 +1921,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -1943,16 +1938,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -1962,17 +1952,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -1983,20 +1970,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2010,26 +1990,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2038,18 +2008,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2057,16 +2021,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2082,52 +2041,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2142,102 +2082,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2250,4 +2149,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/ar/LC_MESSAGES/comparison.po b/i2p2www/translations/ar/LC_MESSAGES/comparison.po
index b7083ab3507b4dd870fc100e9751fdfe4683fff7..25ad49484d279802c8188027979d4bb27aa15fce 100644
--- a/i2p2www/translations/ar/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/ar/LC_MESSAGES/comparison.po
@@ -1,22 +1,22 @@
-# Arabic translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: zzzi2p\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n"
-"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : "
-"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ar\n"
+"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -24,34 +24,23 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
@@ -59,20 +48,13 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
 msgstr ""
 
@@ -82,15 +64,11 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -105,10 +83,8 @@ msgstr ""
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
@@ -126,52 +102,38 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
 msgstr ""
 
@@ -179,19 +141,15 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
@@ -203,32 +161,20 @@ msgstr ""
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
 msgstr ""
 
@@ -237,36 +183,23 @@ msgstr ""
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
 msgstr ""
 
@@ -274,10 +207,8 @@ msgstr ""
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
 msgstr ""
@@ -291,7 +222,7 @@ msgstr ""
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
@@ -497,8 +428,7 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
 msgstr ""
@@ -517,10 +447,8 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:93
@@ -528,7 +456,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:96
@@ -567,8 +496,8 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:121
@@ -705,4 +634,3 @@ msgid ""
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
 msgstr ""
-
diff --git a/i2p2www/translations/ar/LC_MESSAGES/get-involved.po b/i2p2www/translations/ar/LC_MESSAGES/get-involved.po
index fe4500fc54d1c4927f4b2090f034d14bb8bec1ed..4f3dc246604665bf0d0ad35fe056000a1dc26029 100644
--- a/i2p2www/translations/ar/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/ar/LC_MESSAGES/get-involved.po
@@ -1,22 +1,22 @@
-# Arabic translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:56+0000\n"
-"Last-Translator: Emma Peel\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n"
-"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : "
-"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ar\n"
+"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -31,12 +31,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -51,44 +48,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -127,10 +113,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -160,10 +144,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -178,25 +160,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -222,8 +194,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -237,12 +208,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -253,10 +221,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
 msgstr ""
@@ -267,17 +233,12 @@ msgstr "التوثيق"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -288,16 +249,11 @@ msgstr "جاري التجريب"
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -310,14 +266,10 @@ msgstr "الخدمات"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -327,9 +279,9 @@ msgstr "اعادة التوزيع"
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -373,8 +325,7 @@ msgstr "التحليل"
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -382,7 +333,7 @@ msgstr ""
 msgid "Roadmap"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/roadmap.html:309
+#: i2p2www/pages/site/get-involved/roadmap.html:210
 #, python-format
 msgid ""
 "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info "
@@ -443,84 +394,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -529,17 +457,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -547,29 +470,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -577,42 +494,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -656,72 +564,52 @@ msgstr ""
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -731,8 +619,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -745,33 +633,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -792,76 +674,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -871,25 +734,18 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -900,29 +756,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -932,10 +780,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -943,13 +789,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -960,43 +803,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1011,28 +847,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1043,8 +871,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1058,8 +885,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1078,14 +904,10 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1094,17 +916,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1114,8 +933,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1137,32 +955,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1171,47 +982,39 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1223,12 +1026,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1253,8 +1053,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1273,8 +1073,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1303,20 +1102,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1388,8 +1183,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1402,24 +1196,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1429,22 +1214,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1480,21 +1257,16 @@ msgstr ""
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1518,10 +1290,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1532,8 +1302,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1546,10 +1315,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1559,7 +1326,8 @@ msgid "Release Signing Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1580,7 +1348,8 @@ msgid "Download PGP public key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1588,13 +1357,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1602,7 +1372,8 @@ msgid "Security GPG Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1611,8 +1382,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1644,35 +1414,28 @@ msgstr "أخريات"
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1680,29 +1443,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1729,12 +1486,10 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1744,10 +1499,8 @@ msgstr "المجتمع"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1769,8 +1522,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1778,13 +1531,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1793,8 +1547,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1808,34 +1561,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1845,61 +1592,49 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1926,20 +1661,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1948,14 +1682,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1965,12 +1699,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1990,8 +1725,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2018,12 +1752,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2042,22 +1773,22 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2074,8 +1805,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2092,14 +1823,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2178,34 +1909,26 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2215,20 +1938,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2245,22 +1964,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2272,10 +1988,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2285,38 +1999,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2334,23 +2040,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2364,11 +2064,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2379,34 +2076,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2419,18 +2109,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2444,16 +2130,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2473,67 +2157,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2557,8 +2231,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2574,44 +2248,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2619,8 +2283,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2629,64 +2292,59 @@ msgid "New Developer's Guide"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:6
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:32
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:31
 msgid "Basic study"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:7
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:46
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:45
 msgid "Getting the I2P code"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:9
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:52
 msgid "The new way: Git"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:10
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:11
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81
-msgid "The old way: Monotone"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:145
 msgid "Building I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:166
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:102
 msgid "Development ideas"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:174
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:110
 msgid "Making the results available"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:196
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
 msgid "Get to know us!"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:202
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
 msgid "Translations"
 msgstr "الترجمات"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:17
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:208
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
 msgid "Tools"
 msgstr "الأدوات"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:22
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:21
 msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:26
 #, python-format
 msgid ""
 "\n"
@@ -2694,42 +2352,34 @@ msgid ""
 "Try <a href=\"%(volunteer)s\">getting involved</a> first."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:34
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:38
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:37
 #, python-format
 msgid ""
 "Study the <a href=\"%(intro)s\">how intro</a>,\n"
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:47
 msgid ""
 "For development on the I2P router or the embedded applications,\n"
 "there are two ways to get the source code:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
-msgid "The easy way: Git"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:55
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"For the time being, issues are still being manged on <a "
-"href=\"%(trac)s\">trac</a>."
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
+"issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:58
@@ -2742,143 +2392,31 @@ msgstr ""
 msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:84
-msgid ""
-"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n"
-"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to "
-"the source code (and for a lot of complicated things, but 'keeping track "
-"of changes' is the basic idea)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:89
-msgid ""
-"Skim over the <a "
-"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>,"
-" to make sure you understand the concepts."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:93
-msgid ""
-"If you want to remain anonymous, you need to do an additional step, to "
-"set up a connection to a monotone server over I2P:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
-#, python-format
-msgid ""
-"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port "
-"8998 pointing to mtn.i2p-projekt.i2p."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
-msgid ""
-"Pick a directory where you want to put all your I2P files, and create a "
-"monotone database:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
-msgid ""
-"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or"
-" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the "
-"following contents:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> "
-"into a new file (e.g. <code>keys.txt</code>) in the same directory\n"
-"  that <code>i2p.mtn</code> is in. Import the keys into your database "
-"with <br><code><pre>      mtn -d i2p.mtn read < keys.txt</pre></code>"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
-msgid ""
-"Pull the I2P sources to your machine. This may take a long time, "
-"especially if you are doing this over I2P!"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
-msgid "Anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
-msgid "Non-anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
-msgid ""
-"All the sources are now present on your machine, in the database file. To"
-" make them available in a directory, you need to check them out:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:125
-msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the "
-"I2P sources."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
-msgid "Remarks"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
-msgid ""
-"\n"
-"To download the website files instead of the I2P source files, use "
-"'i2p.www' instead of 'i2p.i2p'."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:133
-msgid ""
-"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it"
-" left off.\n"
-"If you are in a hurry, use the non-anonymous access."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
-#, python-format
-msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on <a"
-" href=\"%(viewmtn)s\">viewmtn</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:141
-#, python-format
-msgid ""
-"A long explanation about using monotone is available on the <a "
-"href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:147
-#, python-format
-msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:155
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:91
 msgid ""
 "To build or work on console translations, you need\n"
 "the xgettext, msgfmt, and msgmerge tools from the\n"
 "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:161
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
 #, python-format
 msgid ""
 "For development on new applications,\n"
 "see the <a href=\"%(apps)s\">application development guide</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:167
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
 #, python-format
 msgid ""
 "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n"
@@ -2887,93 +2425,42 @@ msgid ""
 "for ideas."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:176
-#, python-format
-msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:181
-msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:184
-msgid "use an empty passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:185
-msgid "enter a passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:186
-#, python-format
-msgid ""
-"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get "
-"push privileges"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:187
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get "
-"commit privileges - not required for website"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:188
-msgid "check in with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:189
-msgid "push with this key"
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:191
-#, python-format
-msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:197
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:203
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:209
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:217
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -2993,11 +2480,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3012,10 +2497,8 @@ msgstr "التجهيز"
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3035,12 +2518,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3051,27 +2531,23 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
 msgstr ""
 
@@ -3087,10 +2563,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3108,8 +2582,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
 msgstr ""
 
@@ -3122,19 +2595,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3142,15 +2611,13 @@ msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3159,8 +2626,8 @@ msgstr "أسئلة متكررة"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3176,67 +2643,65 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3261,10 +2726,8 @@ msgstr "نظرة عامة"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3273,21 +2736,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3310,8 +2769,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3321,18 +2779,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3342,10 +2795,8 @@ msgstr "سياسة الخصوصية"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3354,17 +2805,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3373,10 +2822,8 @@ msgstr "ابدء"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3387,18 +2834,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr ""
-
diff --git a/i2p2www/translations/az/LC_MESSAGES/docs.po b/i2p2www/translations/az/LC_MESSAGES/docs.po
index 6ca98797a882ce48a963c80a6e6a0671422e5585..1f8f5ee6d77a16f172502fc9cd2477a10c8417a9 100644
--- a/i2p2www/translations/az/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/az/LC_MESSAGES/docs.po
@@ -1,23 +1,23 @@
-# Azerbaijani translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Nikafn <appone6@gmail.com>, 2018
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-09-14 12:48+0000\n"
-"Last-Translator: Nikafn <appone6@gmail.com>\n"
-"Language-Team: Azerbaijani "
-"(http://www.transifex.com/otf/I2P/language/az/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Nikafn <appone6@gmail.com>, 2018\n"
+"Language-Team: Azerbaijani (http://www.transifex.com/otf/I2P/language/az/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: az\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/docs/index.html:2 i2p2www/pages/site/docs/index.html:24
 msgid "Index to Technical Documentation"
@@ -32,16 +32,14 @@ msgid ""
 "This index is ordered from the highest to lowest layers.\n"
 "The higher layers are for \"clients\" or applications;\n"
 "the lower layers are inside the router itself.\n"
-"The interface between applications and the router is the I2CP (I2P "
-"Control\n"
+"The interface between applications and the router is the I2CP (I2P Control\n"
 "Protocol) API."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:18
 #, python-format
 msgid ""
-"The I2P Project is committed to maintaining accurate, current "
-"documentation.\n"
+"The I2P Project is committed to maintaining accurate, current documentation.\n"
 "If you find any inaccuracies in the documents linked below, please\n"
 "<a href=\"%(trac)s\">enter a ticket identifying the problem</a>."
 msgstr ""
@@ -98,11 +96,9 @@ msgstr "Təqdimatlar, məqalələr, dərslər, videolar və müsahibələr"
 #: i2p2www/pages/site/docs/index.html:36
 #, python-format
 msgid ""
-"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a>"
-" August 28, 2003 (pdf)"
-msgstr ""
-"<a href=\"%(pdf)s\"> Invisible Internet Project (I2P) layihəsinin icmalı "
-"</a> 28 Avqust, 2003 (pdf)"
+"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a> "
+"August 28, 2003 (pdf)"
+msgstr "<a href=\"%(pdf)s\"> Invisible Internet Project (I2P) layihəsinin icmalı </a> 28 Avqust, 2003 (pdf)"
 
 #: i2p2www/pages/site/docs/index.html:39
 msgid "Application-Layer Topics"
@@ -130,7 +126,8 @@ msgstr "Qoşma xüsusiyyətləri"
 msgid "Managed Clients"
 msgstr "İdarə olunan müştərilər"
 
-#: i2p2www/pages/site/docs/index.html:47 i2p2www/pages/site/docs/index.html:240
+#: i2p2www/pages/site/docs/index.html:47
+#: i2p2www/pages/site/docs/index.html:240
 msgid "Embedding the router in your application"
 msgstr "Tətbiqinizə istiqamətləndirici daxil edilir"
 
@@ -147,7 +144,8 @@ msgstr "I2PControl Plugin API"
 msgid "hostsdb.blockfile Format"
 msgstr "hostsdb.blockfile Format"
 
-#: i2p2www/pages/site/docs/index.html:51 i2p2www/pages/site/docs/index.html:206
+#: i2p2www/pages/site/docs/index.html:51
+#: i2p2www/pages/site/docs/index.html:206
 msgid "Configuration File Format"
 msgstr "Quraşdırma fayl formatı"
 
@@ -159,9 +157,7 @@ msgstr "APİ Tətbiq layı və  protokollar"
 msgid ""
 "High-level, easy-to-use APIs for applications written in any language to "
 "send and receive data."
-msgstr ""
-"Data göndərmək və qəbul etmək üçün hər hansı bir dildə yazılmış tətbiqlər"
-" üçün yüksək səviyyəli, asan istifadəli API-lər."
+msgstr "Data göndərmək və qəbul etmək üçün hər hansı bir dildə yazılmış tətbiqlər üçün yüksək səviyyəli, asan istifadəli API-lər."
 
 #: i2p2www/pages/site/docs/index.html:57
 msgid "Application Development Overview and Guide"
@@ -196,9 +192,7 @@ msgstr "İkitərəfli Nəqliyyat API və protokollar"
 msgid ""
 "The end-to-end protocols used by clients for reliable and unreliable "
 "communication."
-msgstr ""
-"İkitərəfli protokollar müştərilər tərəfindən etibarlı və etibarsız "
-"əlaqələr üçün istifadə olunur."
+msgstr "İkitərəfli protokollar müştərilər tərəfindən etibarlı və etibarsız əlaqələr üçün istifadə olunur."
 
 #: i2p2www/pages/site/docs/index.html:89
 #: i2p2www/pages/site/docs/api/streaming.html:2
@@ -228,8 +222,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:101
 msgid ""
-"The lowest-level API used for clients (applications) to send and receive "
-"traffic to a router.\n"
+"The lowest-level API used for clients (applications) to send and receive traffic to a router.\n"
 "Traditionally used only by Java applications and higher-level APIs."
 msgstr ""
 
@@ -288,8 +281,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:127
 msgid ""
-"Distributed storage and retrieval of information about routers and "
-"clients."
+"Distributed storage and retrieval of information about routers and clients."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:129
@@ -351,8 +343,8 @@ msgstr "Tunellər"
 
 #: i2p2www/pages/site/docs/index.html:154
 msgid ""
-"Selecting peers, requesting tunnels through those peers, and encrypting "
-"and routing messages through these tunnels."
+"Selecting peers, requesting tunnels through those peers, and encrypting and "
+"routing messages through these tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:156
@@ -407,7 +399,8 @@ msgid "Transport Layer"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:171
-msgid "The protocols for direct (point-to-point) router to router communication."
+msgid ""
+"The protocols for direct (point-to-point) router to router communication."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:173
@@ -545,31 +538,27 @@ msgstr ""
 msgid "Bug tracker"
 msgstr "Xəta indikatoru"
 
-#: i2p2www/pages/site/docs/index.html:257
-msgid "Viewmtn inside I2P"
-msgstr ""
-
-#: i2p2www/pages/site/docs/index.html:260
+#: i2p2www/pages/site/docs/index.html:256
 msgid "I2P Source exported to GitHub"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:262
+#: i2p2www/pages/site/docs/index.html:258
 msgid "I2P Source Git Repo inside I2P"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:264
+#: i2p2www/pages/site/docs/index.html:260
 msgid "Source translation at Transifex"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:266
+#: i2p2www/pages/site/docs/index.html:262
 msgid "Roadmap"
 msgstr "Yol xəritəsi"
 
-#: i2p2www/pages/site/docs/index.html:268
+#: i2p2www/pages/site/docs/index.html:264
 msgid "To Do List"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:268
+#: i2p2www/pages/site/docs/index.html:264
 msgid "not current"
 msgstr ""
 
@@ -577,43 +566,30 @@ msgstr ""
 msgid ""
 "I2P ships with a generic naming library and a base implementation \n"
 "designed to work off a local name to destination mapping, as well as an\n"
-"add-on application called the <a href=\"#addressbook\">address book</a>."
-" \n"
-"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to "
-"Tor's .onion addresses."
+"add-on application called the <a href=\"#addressbook\">address book</a>. \n"
+"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to Tor's .onion addresses."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:15
 msgid ""
 "The address book is a web-of-trust\n"
-"driven secure, distributed, and human readable naming system, sacrificing"
-" only\n"
-"the call for all human readable names to be globally unique by mandating "
-"only\n"
-"local uniqueness.  While all messages in I2P are cryptographically "
-"addressed\n"
-"by their destination, different people can have local address book "
-"entries for\n"
-"\"Alice\" which refer to different destinations.  People can still "
-"discover new\n"
-"names by importing published address books of peers specified in their "
-"web of trust,\n"
-"by adding in the entries provided through a third party, or (if some "
-"people organize\n"
-"a series of published address books using a first come first serve "
-"registration\n"
-"system) people can choose to treat these address books as name servers, "
-"emulating\n"
+"driven secure, distributed, and human readable naming system, sacrificing only\n"
+"the call for all human readable names to be globally unique by mandating only\n"
+"local uniqueness.  While all messages in I2P are cryptographically addressed\n"
+"by their destination, different people can have local address book entries for\n"
+"\"Alice\" which refer to different destinations.  People can still discover new\n"
+"names by importing published address books of peers specified in their web of trust,\n"
+"by adding in the entries provided through a third party, or (if some people organize\n"
+"a series of published address books using a first come first serve registration\n"
+"system) people can choose to treat these address books as name servers, emulating\n"
 "traditional DNS."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:29
 #, python-format
 msgid ""
-"NOTE: For the reasoning behind the I2P naming system, common arguments "
-"against it\n"
-"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming"
-" discussion</a>\n"
+"NOTE: For the reasoning behind the I2P naming system, common arguments against it\n"
+"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming discussion</a>\n"
 "page."
 msgstr ""
 
@@ -643,34 +619,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:55
 msgid ""
-"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for "
-"lookups and points\n"
+"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for lookups and points\n"
 "the user to remote jump services to assist with failed lookups."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:59
 msgid ""
-"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to "
-"add hosts to their local hosts.txt"
+"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to add "
+"hosts to their local hosts.txt"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:62
 msgid ""
-"HTTP <a href=\"#jump-services\">jump services</a> which provide their own"
-" lookups and redirection."
+"HTTP <a href=\"#jump-services\">jump services</a> which provide their own "
+"lookups and redirection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:65
 msgid ""
-"The <a href=\"#addressbook\">address book</a> application which merges "
-"external\n"
+"The <a href=\"#addressbook\">address book</a> application which merges external\n"
 "host lists, retrieved via HTTP, with the local list."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:69
 msgid ""
-"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web "
-"front-end\n"
+"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web front-end\n"
 "for address book configuration and viewing of the local host lists."
 msgstr ""
 
@@ -682,15 +655,11 @@ msgstr ""
 #, python-format
 msgid ""
 "All destinations in I2P are 516-byte (or longer) keys.\n"
-"(To be more precise, it is a 256-byte public key plus a 128-byte signing "
-"key\n"
-"plus a 3-or-more byte certificate, which in Base64 representation is 516 "
-"or more bytes.\n"
-"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> "
-"are in use now\n"
+"(To be more precise, it is a 256-byte public key plus a 128-byte signing key\n"
+"plus a 3-or-more byte certificate, which in Base64 representation is 516 or more bytes.\n"
+"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> are in use now\n"
 "for signature type indication.\n"
-"Therefore, certificates in recently-generated destinations are more than "
-"3 bytes."
+"Therefore, certificates in recently-generated destinations are more than 3 bytes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:87
@@ -709,8 +678,7 @@ msgid ""
 "The hosts.txt Naming Service does a simple linear search through\n"
 "text files. This naming service was the default until\n"
 "release 0.8.8 when it was replaced by the Blockfile Naming Service.\n"
-"The hosts.txt format had become too slow after the file grew to thousands"
-" of entries."
+"The hosts.txt format had become too slow after the file grew to thousands of entries."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:102
@@ -718,8 +686,7 @@ msgstr ""
 msgid ""
 "It does a linear search through three local files, in order, to\n"
 "look up host names and convert them to a 516-byte destination key.\n"
-"Each file is in a simple <a href=\"%(configuration)s\">configuration file"
-" format</a>, with hostname=base64, one per line.\n"
+"Each file is in a simple <a href=\"%(configuration)s\">configuration file format</a>, with hostname=base64, one per line.\n"
 "The files are:"
 msgstr ""
 
@@ -729,8 +696,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:116
 msgid ""
-"The Blockfile Naming Service stores multiple \"address books\" in a "
-"single\n"
+"The Blockfile Naming Service stores multiple \"address books\" in a single\n"
 "database file named hostsdb.blockfile.\n"
 "This Naming Service is the default since release 0.8.8."
 msgstr ""
@@ -738,32 +704,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:122
 #, python-format
 msgid ""
-"A blockfile is simply on-disk storage of multiple sorted maps (key-value "
-"pairs),\n"
+"A blockfile is simply on-disk storage of multiple sorted maps (key-value pairs),\n"
 "implemented as skiplists.\n"
-"The blockfile format is specified on the <a "
-"href=\"%(blockfile)s\">Blockfile page</a>.\n"
-"It provides fast Destination lookup in a compact format. While the "
-"blockfile overhead is substantial,\n"
-"the destinations are stored in binary rather than in Base 64 as in the "
-"hosts.txt format.\n"
-"In addition, the blockfile provides the capability of arbitrary metadata "
-"storage\n"
-"(such as added date, source, and comments) for each entry to implement "
-"advanced address book features.\n"
-"The blockfile storage requirement is a modest increase over the hosts.txt"
-" format, and the blockfile provides\n"
+"The blockfile format is specified on the <a href=\"%(blockfile)s\">Blockfile page</a>.\n"
+"It provides fast Destination lookup in a compact format. While the blockfile overhead is substantial,\n"
+"the destinations are stored in binary rather than in Base 64 as in the hosts.txt format.\n"
+"In addition, the blockfile provides the capability of arbitrary metadata storage\n"
+"(such as added date, source, and comments) for each entry to implement advanced address book features.\n"
+"The blockfile storage requirement is a modest increase over the hosts.txt format, and the blockfile provides\n"
 "approximately 10x reduction in lookup times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:134
 msgid ""
-"On creation, the naming service imports entries from the three files used"
-" by the hosts.txt Naming Service.\n"
-"The blockfile mimics the previous implementation by maintaining three "
-"maps that\n"
-"are searched in-order, named privatehosts.txt, userhosts.txt, and "
-"hosts.txt.\n"
+"On creation, the naming service imports entries from the three files used by the hosts.txt Naming Service.\n"
+"The blockfile mimics the previous implementation by maintaining three maps that\n"
+"are searched in-order, named privatehosts.txt, userhosts.txt, and hosts.txt.\n"
 "It also maintains a reverse-lookup map to implement rapid reverse lookups."
 msgstr ""
 
@@ -793,31 +749,24 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:158
 #, python-format
 msgid ""
-"The naming service is specified with the configuration property "
-"<tt>i2p.naming.impl=class</tt>.\n"
+"The naming service is specified with the configuration property <tt>i2p.naming.impl=class</tt>.\n"
 "Other implementations are possible. For example,\n"
-"there is an experimental facility for real-time lookups (a la DNS) over "
-"the network within the router.\n"
-"For more information see the <a "
-"href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion"
-" page</a>."
+"there is an experimental facility for real-time lookups (a la DNS) over the network within the router.\n"
+"For more information see the <a href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:165
 msgid ""
-"The HTTP proxy does a lookup via the router for all hostnames ending in "
-"'.i2p'.\n"
+"The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'.\n"
 "Otherwise, it forwards the request to a configured HTTP outproxy.\n"
-"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-"
-"Top Level Domain '.i2p'."
+"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:171
 #, python-format
 msgid ""
 "We have <a href=\"%(i2ptld)s\">applied to reserve the .i2p TLD</a>\n"
-"following the procedures specified in <a href=\"%(rfc6761)s\">RFC "
-"6761</a>."
+"following the procedures specified in <a href=\"%(rfc6761)s\">RFC 6761</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:177
@@ -856,14 +805,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:202
 msgid ""
 "For this reason, the only subscription configured by\n"
-"default is <code>http://i2p-projekt.i2p/hosts.txt "
-"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>,"
-" \n"
+"default is <code>http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>, \n"
 "which contains a copy of the hosts.txt included\n"
 "in the I2P release.\n"
 "Users must configure additional subscriptions in their\n"
-"local address book application (via subscriptions.txt or <a "
-"href=\"#susidns\">SusiDNS</a>)."
+"local address book application (via subscriptions.txt or <a href=\"#susidns\">SusiDNS</a>)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:211
@@ -872,8 +818,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:218
 msgid ""
-"The operators of these services may have various policies for listing "
-"hosts.\n"
+"The operators of these services may have various policies for listing hosts.\n"
 "Presence on this list does not imply endorsement."
 msgstr ""
 
@@ -884,12 +829,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:224
 msgid ""
-"While there are hopefully not any technical limitations within I2P on "
-"host names,\n"
+"While there are hopefully not any technical limitations within I2P on host names,\n"
 "the address book enforces several restrictions on host names\n"
 "imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with "
-"browsers,\n"
+"It does this for basic typographical sanity and compatibility with browsers,\n"
 "and for security.\n"
 "The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
 "Any hostnames violating these rules may not be propagated\n"
@@ -902,13 +845,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:243
 msgid ""
-"Names are checked for conflict with existing names in the existing "
-"userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
 "(but not privatehosts.txt) after conversion to lower case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:248
-msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgid ""
+"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:252
@@ -944,8 +887,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:280
 msgid ""
 "Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
-"*.console.i2p, and others)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:285
@@ -968,8 +910,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:302
 msgid ""
-"Any name received via subscription that passes all the checks is added "
-"via the local naming service."
+"Any name received via subscription that passes all the checks is added via "
+"the local naming service."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:306
@@ -986,19 +928,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:317
 msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
-"form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location "
-"bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
 "add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:323
 msgid ""
-"As the address book application does not use privatehosts.txt at all, in "
-"practice\n"
-"this file is the only place where it is appropriate to place private "
-"aliases or\n"
+"As the address book application does not use privatehosts.txt at all, in practice\n"
+"this file is the only place where it is appropriate to place private aliases or\n"
 "\"pet names\" for sites already in hosts.txt."
 msgstr ""
 
@@ -1013,16 +951,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:338
 msgid ""
 "Address Book will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local I2P Site's home directory) to be "
-"accessed by others\n"
+"(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others\n"
 "for their subscriptions.\n"
 "This step is optional and is disabled by default."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:346
 msgid ""
-"The address book application, together with eepget, saves the Etag and/or"
-" Last-Modified\n"
+"The address book application, together with eepget, saves the Etag and/or Last-Modified\n"
 "information returned by the web server of the subscription.\n"
 "This greatly reduces the bandwidth required, as the web server will\n"
 "return a '304 Not Modified' on the next fetch if nothing has changed."
@@ -1039,8 +975,7 @@ msgid ""
 "Hosts serving a static hosts.txt or an equivalent CGI application\n"
 "are strongly encouraged to deliver\n"
 "a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when "
-"appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
 "This will dramatically reduce the network bandwidth, and\n"
 "reduce chances of corruption."
 msgstr ""
@@ -1051,8 +986,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:368
 msgid ""
-"A host add service is a simple CGI application that takes a hostname and "
-"a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
 "and adds that to its local hosts.txt.\n"
 "If other routers subscribe to that hosts.txt, the new hostname/key\n"
 "will be propagated through the network."
@@ -1060,10 +994,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:375
 msgid ""
-"It is recommended that host add services impose, at a minimum, the "
-"restrictions imposed by the address book application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and "
-"keys, for example:"
+"It is recommended that host add services impose, at a minimum, the restrictions imposed by the address book application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and keys, for example:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:380
@@ -1116,10 +1048,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:426
 msgid ""
-"A jump service is a simple CGI application that takes a hostname as a "
-"parameter\n"
-"and returns a 301 redirect to the proper URL with a "
-"<code>?i2paddresshelper=key</code>\n"
+"A jump service is a simple CGI application that takes a hostname as a parameter\n"
+"and returns a 301 redirect to the proper URL with a <code>?i2paddresshelper=key</code>\n"
 "string appended.\n"
 "The HTTP proxy will interpret the appended string and\n"
 "use that key as the actual destination.\n"
@@ -1142,16 +1072,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:448
 msgid ""
-"SusiDNS is simply a web interface front-end to configuring address book "
-"subscriptions\n"
+"SusiDNS is simply a web interface front-end to configuring address book subscriptions\n"
 "and accessing the four address book files.\n"
 "All the real work is done by the 'address book' application."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:454
 msgid ""
-"Currently, there is little enforcement of address book naming rules "
-"within SusiDNS,\n"
+"Currently, there is little enforcement of address book naming rules within SusiDNS,\n"
 "so a user may enter hostnames locally that would be rejected by\n"
 "the address book subscription rules."
 msgstr ""
@@ -1165,36 +1093,29 @@ msgid ""
 "I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
 "Base32 addresses are much shorter and easier to handle than the\n"
 "full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: "
-"<code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>"
+"Example: <code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:468
 #, python-format
 msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
-"hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
 "I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
 "The form is {52 chars}.b32.i2p.\n"
 "Tor has a\n"
-"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94"
-"-december-4th-2013\">proposal</a>\n"
-"to convert to an identical format of {52 chars}.onion for their hidden "
-"services.\n"
+"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-december-4th-2013\">proposal</a>\n"
+"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
 "Base32 is implemented in the naming service, which queries the\n"
 "router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and "
-"publishing\n"
+"Base32 lookups will only be successful when the Destination is up and publishing\n"
 "a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take "
-"significantly\n"
+"Because resolution may require a network database lookup, it may take significantly\n"
 "longer than a local address book lookup."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:483
 msgid ""
-"Base32 addresses can be used in most places where hostnames or full "
-"destinations\n"
+"Base32 addresses can be used in most places where hostnames or full destinations\n"
 "are used, however there are some exceptions where they may fail if the\n"
 "name does not immediately resolve. I2PTunnel will fail, for example, if\n"
 "the name does not resolve to a destination."
@@ -1220,8 +1141,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:12
 msgid ""
-"There are now plugins available that support distributed email, blogs, "
-"IRC\n"
+"There are now plugins available that support distributed email, blogs, IRC\n"
 "clients, distributed file storage, wikis, and more."
 msgstr ""
 
@@ -1241,8 +1161,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:31
 msgid ""
-"Support large or special-purpose applications that would never be bundled"
-"\n"
+"Support large or special-purpose applications that would never be bundled\n"
 "with the I2P installation"
 msgstr ""
 
@@ -1256,8 +1175,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:44
 msgid ""
-"Separate initial install and update packages, if desired, for smaller "
-"update downloads"
+"Separate initial install and update packages, if desired, for smaller update"
+" downloads"
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:48
@@ -1287,7 +1206,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:70
-msgid "Automatic integration and startup of webapps into console Jetty instance"
+msgid ""
+"Automatic integration and startup of webapps into console Jetty instance"
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:74
@@ -1327,32 +1247,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:101
 msgid ""
-"To install and start a plugin, copy the <code>.xpi2p</code> install link "
-"to\n"
+"To install and start a plugin, copy the <code>.xpi2p</code> install link to\n"
 "the form at the bottom of\n"
-"<a "
-"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp"
-" in\n"
-"your router console</a> and click the \"install plugin\" button.  After a"
-"\n"
-"plugin is installed and started, a link to the plugin will usually appear"
-" at\n"
+"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp in\n"
+"your router console</a> and click the \"install plugin\" button.  After a\n"
+"plugin is installed and started, a link to the plugin will usually appear at\n"
 "the top of your summary bar."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:110
 msgid ""
-"To update a plugin to the latest version, just click the update button on"
-"\n"
-"<a "
-"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>."
-"\n"
-"There is also a button to check if the plugin has a more recent version, "
-"as\n"
-"well as a button to check for updates for all plugins.  Plugins will be "
-"checked\n"
-"for updates automatically when updating to a new I2P release (not "
-"including dev\n"
+"To update a plugin to the latest version, just click the update button on\n"
+"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>.\n"
+"There is also a button to check if the plugin has a more recent version, as\n"
+"well as a button to check for updates for all plugins.  Plugins will be checked\n"
+"for updates automatically when updating to a new I2P release (not including dev\n"
 "builds)."
 msgstr ""
 
@@ -1363,25 +1272,21 @@ msgstr ""
 #: i2p2www/pages/site/docs/plugins.html:121
 #, python-format
 msgid ""
-"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and "
-"the\n"
+"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and the\n"
 "<a href=\"http://%(zzz)s/forums/16\">plugin forum</a> on %(zzz)s."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:126
 #, python-format
 msgid ""
-"See also the sources for plugins developed by various people.  Some "
-"plugins, such\n"
-"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were "
-"developed\n"
+"See also the sources for plugins developed by various people.  Some plugins, such\n"
+"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were developed\n"
 "specifically as examples."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:132
 msgid ""
-"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P"
-"\n"
+"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P\n"
 "or easily add some feature."
 msgstr ""
 
@@ -1393,8 +1298,7 @@ msgstr ""
 #, python-format
 msgid ""
 "To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in "
-"monotone</a>."
+"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in monotone</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:144
@@ -1410,8 +1314,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/plugins.html:151
 msgid ""
 "Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush"
-" the\n"
+"the plugin was already run, as it requires class loader trickery to flush the\n"
 "class cache; a full router restart is required."
 msgstr ""
 
@@ -1421,32 +1324,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:161
 msgid ""
-"Plugins running in a separate JVM create a <code>logs/</code> directory "
-"in\n"
+"Plugins running in a separate JVM create a <code>logs/</code> directory in\n"
 "<code>$CWD</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:166
 msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using "
-"the\n"
+"No initial keys are present, except for those of jrandom and zzz (using the\n"
 "same keys as for router update), so the first key seen for a signer is\n"
 "automatically accepted&mdash;there is no signing key authority."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:172
 msgid ""
-"When deleting a plugin, the directory is not always deleted, especially "
-"on\n"
+"When deleting a plugin, the directory is not always deleted, especially on\n"
 "Windows."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:177
 msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
-"in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file "
-"is used."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:182
@@ -1463,8 +1361,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/ports.html:7
 msgid ""
-"These are the ports used or reserved by I2P, including those for known "
-"plugins,\n"
+"These are the ports used or reserved by I2P, including those for known plugins,\n"
 "common alternates,\n"
 "and some typical related applications."
 msgstr ""
@@ -1489,8 +1386,8 @@ msgid "Reseed Hosts"
 msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:3
-msgid "January 2016"
-msgstr "Yanvar 2016"
+msgid "September 2021"
+msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:8
 msgid "About Reseed hosts"
@@ -1498,49 +1395,57 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:10
 msgid ""
-"Reseed hosts are needed to for bootstrapping, that is, providing the "
-"initial set of I2P nodes for your I2P node to talk to. Depending on the "
-"status of your node it may need to bootstrap every now and then if many "
-"of the nodes it knows of aren't contactable."
+"Reseed hosts are needed to for bootstrapping, that is, providing the initial set\n"
+"of I2P nodes for your I2P node to talk to. Depending on the status of your node\n"
+"it may need to bootstrap every now and then if many of the nodes it knows of\n"
+"aren't contactable."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:14
+#: i2p2www/pages/site/docs/reseed.html:17
 msgid ""
-"Reseeding is done over an encrypted connection and all of the bootstrap "
-"information is signed by the reseed host you connect to, making it "
-"impossible for an unauthenticated source to provide you with false "
-"information."
+"Reseeding is done over an encrypted connection and all of the bootstrap\n"
+"information is signed by the reseed host you connect to, making it impossible\n"
+"for an unauthenticated source to provide you with false information."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:19
+#: i2p2www/pages/site/docs/reseed.html:24
 msgid "Running a Reseed host"
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:21
+#: i2p2www/pages/site/docs/reseed.html:26
 msgid ""
-"The more reseed hosts that are run, the more resilient the I2P network "
-"becomes, and the harder it is to prevent users of I2P from connecting to "
-"the network."
+"Operating a reseed server can be accessible to any sysadmin familiar\n"
+"with I2P, and we encourage new reseed operators to get in contact with us at\n"
+"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed hosts that\n"
+"are run, the more resilient the I2P network becomes, and the harder it is to\n"
+"prevent users of I2P from connecting to the network."
+msgstr ""
+
+#: i2p2www/pages/site/docs/reseed.html:39
+msgid "Other ways of Reseeding"
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:25
+#: i2p2www/pages/site/docs/reseed.html:42
 msgid ""
-"There have also been cases where the reseed hosts we had, have been under"
-" heavy load due to botnet activities."
+"In order to make I2P more reslient, other kinds of reseeding are possible. One\n"
+"important way of carrying out a reseed is the file-based reseed, where a user\n"
+"with a running I2P router generates a reseed file for a friend and transfers it\n"
+"to them as a .zip file. Others use cloud-based infrastructure to resist\n"
+"censorship. These reseed methods provide functionality which aids people in\n"
+"situations where reseeds are restricted."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:33
-msgid "Thank you"
+#: i2p2www/pages/site/docs/reseed.html:58
+msgid "Thank you Reseed Operators"
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:35
+#: i2p2www/pages/site/docs/reseed.html:60
 msgid ""
-"If you are running a reseed server, We would like to thank you for "
-"helping to\n"
+"If you are running a reseed server, We would like to thank you for helping to\n"
 "make the I2P network stronger and more resilient than ever."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:41
+#: i2p2www/pages/site/docs/reseed.html:66
 msgid "Thank you."
 msgstr "SaÄŸ olun."
 
@@ -1550,12 +1455,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:12
 msgid ""
-"At this point, most of the good ideas from BOB have been incorporated "
-"into\n"
-"SAMv3, which has more features and more real-world use. BOB still works, "
-"but it\n"
-"is not gaining the advanced features available to SAMv3 and is "
-"essentially\n"
+"At this point, most of the good ideas from BOB have been incorporated into\n"
+"SAMv3, which has more features and more real-world use. BOB still works, but it\n"
+"is not gaining the advanced features available to SAMv3 and is essentially\n"
 "unsupported at this time."
 msgstr ""
 
@@ -1570,27 +1472,25 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/bob.html:35
 msgid ""
 "<code>ERROR</code> as is implied returns the message <code>\"ERROR "
-"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what"
-" went wrong."
+"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what "
+"went wrong."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:38
 msgid ""
-"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be "
-"returned, it is on the same line. <code>OK</code> means the command is "
-"finished."
+"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be returned, "
+"it is on the same line. <code>OK</code> means the command is finished."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:41
 msgid ""
-"<code>DATA</code> lines contain information that you requested. There may"
-" be multiple <code>DATA</code> lines per request."
+"<code>DATA</code> lines contain information that you requested. There may be"
+" multiple <code>DATA</code> lines per request."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:45
 msgid ""
-"<b>NOTE:</b> The help command is the ONLY command that has an exception "
-"to\n"
+"<b>NOTE:</b> The help command is the ONLY command that has an exception to\n"
 "the rules... it can actually return nothing! This is intentional, since\n"
 "help is a HUMAN and not an APPLICATION command."
 msgstr ""
@@ -1601,8 +1501,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:53
 msgid ""
-"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated,"
-" depending on the system.\n"
+"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated, depending on the system.\n"
 "On connection, BOB outputs two lines:"
 msgstr ""
 
@@ -1612,8 +1511,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:67
 msgid ""
-"Note that previous versions used upper-case hex digits and did not "
-"conform to I2P versioning standards.\n"
+"Note that previous versions used upper-case hex digits and did not conform to I2P versioning standards.\n"
 "It is recommended that subsequent versions use digits 0-9 only."
 msgstr ""
 
@@ -1649,16 +1547,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/bob.html:91
 msgid ""
 "<b>PLEASE NOTE:</b>\n"
-"For CURRENT details on the commands PLEASE use the built-in help command."
-"\n"
-"Just telnet to localhost 2827 and type help and you can get full "
-"documentation on each command."
+"For CURRENT details on the commands PLEASE use the built-in help command.\n"
+"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:97
 msgid ""
-"Commands never get obsoleted or changed, however new commands do get "
-"added from time to time."
+"Commands never get obsoleted or changed, however new commands do get added "
+"from time to time."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:102
@@ -1675,36 +1571,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:130
 msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is "
-"no need for any\n"
-"additional messages to/from the command channel. This allows the router "
-"to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on "
-"attempting to shove\n"
-"many streams in or out one socket -- that can't scale when you have alot "
-"of connections!"
+"Once set up, all TCP sockets can and will block as needed, and there is no need for any\n"
+"additional messages to/from the command channel. This allows the router to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on attempting to shove\n"
+"many streams in or out one socket -- that can't scale when you have alot of connections!"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:137
 msgid ""
-"What is also nice about this particular interface is that writing "
-"anything to interface\n"
-"to it, is much much easier than SAM. There is no other processing to do "
-"after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc "
-"(netcat) can be used\n"
-"to point to some application. The value there is that one could schedule "
-"up and down times\n"
-"for an application, and not have to change the application to do that, or"
-" to even have\n"
-"to stop that application. Instead, you can literally \"unplug\" the "
-"destination, and\n"
-"\"plug it in\" again. As long as the same IP/port addresses and "
-"destination keys are used\n"
-"when bringing the bridge up, the normal TCP application won't care, and "
-"won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that "
-"nothing is coming in."
+"What is also nice about this particular interface is that writing anything to interface\n"
+"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used\n"
+"to point to some application. The value there is that one could schedule up and down times\n"
+"for an application, and not have to change the application to do that, or to even have\n"
+"to stop that application. Instead, you can literally \"unplug\" the destination, and\n"
+"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used\n"
+"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:149
@@ -1713,12 +1596,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:151
 msgid ""
-"For the following example, we'll setup a very simple local loopback "
-"connection,\n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service "
-"from\n"
-"the INET superserver daemon. Destination \"ear\" will be a local port "
-"that you\n"
+"For the following example, we'll setup a very simple local loopback connection,\n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service from\n"
+"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
 "can telnet into, and watch the pretty ASCII test puke forth."
 msgstr ""
 
@@ -1767,30 +1647,28 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:186
 msgid ""
-"At this point, there was no error, a destination with a nickname of "
-"\"mouth\"\n"
-"is set up. When you contact the destination provided, you actually "
-"connect\n"
+"At this point, there was no error, a destination with a nickname of \"mouth\"\n"
+"is set up. When you contact the destination provided, you actually connect\n"
 "to the <code>CHARGEN</code> service on <code>19/TCP</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:192
-msgid "Now for the other half, so that we can actually contact this destination."
+msgid ""
+"Now for the other half, so that we can actually contact this destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:214
 msgid ""
 "Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from address book we want to "
-"contact.\n"
+"send the destination key or host address from address book we want to contact.\n"
 "In this case, we want to contact \"mouth\", all we do is paste in the\n"
 "key and it goes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:221
 msgid ""
-"<b>NOTE:</b> The \"quit\" command in the command channel does NOT "
-"disconnect the tunnels like SAM."
+"<b>NOTE:</b> The \"quit\" command in the command channel does NOT disconnect"
+" the tunnels like SAM."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:238
@@ -1807,14 +1685,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:291
 msgid ""
-"Pretty cool isn't it? Try some other well known I2P SITES if you like, "
-"nonexistent ones,\n"
-"etc, to get a feel for what kind of output to expect in different "
-"situations.\n"
-"For the most part, it is suggested that you ignore any of the error "
-"messages.\n"
-"They would be meaningless to the application, and are only presented for "
-"human debugging."
+"Pretty cool isn't it? Try some other well known I2P SITES if you like, nonexistent ones,\n"
+"etc, to get a feel for what kind of output to expect in different situations.\n"
+"For the most part, it is suggested that you ignore any of the error messages.\n"
+"They would be meaningless to the application, and are only presented for human debugging."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:298
@@ -1831,8 +1705,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:328
 msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too "
-"fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
 "and shows you what typical ERROR messages looks like."
 msgstr ""
 
@@ -1887,16 +1760,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/datagrams.html:7
 #, python-format
 msgid ""
-"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide "
-"authenticated\n"
-"and repliable messages in a standard format.  This lets applications "
-"reliably read\n"
-"the \"from\" address out of a datagram and know that the address really "
-"sent the\n"
-"message.  This is necessary for some applications since the base I2P "
-"message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets).  In "
-"addition, the\n"
+"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide authenticated\n"
+"and repliable messages in a standard format.  This lets applications reliably read\n"
+"the \"from\" address out of a datagram and know that the address really sent the\n"
+"message.  This is necessary for some applications since the base I2P message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets).  In addition, the\n"
 "message and sender are authenticated by signing the payload."
 msgstr ""
 
@@ -1905,8 +1773,7 @@ msgstr ""
 msgid ""
 "Datagrams, like <a href=\"%(streaming)s\">streaming library packets</a>,\n"
 "are an application-level construct.\n"
-"These protocols are independent of the low-level <a "
-"href=\"%(transports)s\">transports</a>;\n"
+"These protocols are independent of the low-level <a href=\"%(transports)s\">transports</a>;\n"
 "the protocols are converted to I2NP messages by the router, and\n"
 "either protocol may be carried by either transport."
 msgstr ""
@@ -1922,8 +1789,7 @@ msgid ""
 "<a href=\"%(url)s\">datagram API</a>,\n"
 "while applications in other languages \n"
 "can use <a href=\"%(sam)s\">SAM</a>'s datagram support.\n"
-"There is also limited support in i2ptunnel in the <a "
-"href=\"%(socks)s\">SOCKS proxy</a>,\n"
+"There is also limited support in i2ptunnel in the <a href=\"%(socks)s\">SOCKS proxy</a>,\n"
 "the 'streamr' tunnel types, and udpTunnel classes."
 msgstr ""
 
@@ -1933,34 +1799,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:38
 msgid ""
-"The application designer should carefully consider the tradeoff of "
-"repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel"
-" fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of "
-"them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not "
-"recommended.\n"
+"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
 "Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
-"chances even more."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:47
 #, python-format
 msgid ""
-"Also note that the various overheads added by lower layers, in particular"
-" asymmetric\n"
-"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on "
-"intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are "
-"currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number"
-"\n"
-"of session tags delivered, and a short session tag lifetime, for example."
-"\n"
-"There are currently no configuration parameters available within I2CP to "
-"tune\n"
+"Also note that the various overheads added by lower layers, in particular asymmetric\n"
+"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number\n"
+"of session tags delivered, and a short session tag lifetime, for example.\n"
+"There are currently no configuration parameters available within I2CP to tune\n"
 "the ElGamal Session Tag parameters."
 msgstr ""
 
@@ -1973,38 +1828,30 @@ msgid ""
 "The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
 "Applications may or may not choose to set the\n"
 "protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on "
-"the same Destination."
+"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:65
 #, python-format
 msgid ""
 "As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or "
-"communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or communications sessions,\n"
 "as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
-"described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
 "the <a href=\"%(i2cp)s#format\">I2CP page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:73
 #, python-format
 msgid ""
-"There is no method within the datagram API to specify whether it is non-"
-"repliable (raw)\n"
-"or repliable. The application should be designed to expect the "
-"appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
+"or repliable. The application should be designed to expect the appropriate type.\n"
 "The I2CP protocol number or port should be used by the application to\n"
 "indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
-"are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
 "<a href=\"%(i2psession)s\">I2PSession API</a>\n"
-"for this purpose. A common design pattern in client/server datagram "
-"applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw "
-"datagram\n"
+"for this purpose. A common design pattern in client/server datagram applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
 "for the reply, returning the nonce from the request."
 msgstr ""
 
@@ -2038,19 +1885,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/datagrams.html:107
 #, python-format
 msgid ""
-"Each datagram is sent through I2P as a single message (or as an "
-"individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
 "<a href=\"%(garlicrouting)s\">Garlic Message</a>).\n"
 "Message encapsulation is implemented in the underlying\n"
 "<a href=\"%(i2cp)s\">I2CP</a>,\n"
 "<a href=\"%(i2np)s\">I2NP</a>, and\n"
 "<a href=\"%(tunnelmessage)s\">tunnel message</a> layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram "
-"protocol."
+"There is no packet delimiter mechanism or length field in the datagram protocol."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:120
-#: i2p2www/pages/site/docs/transport/ssu.html:675
+#: i2p2www/pages/site/docs/transport/ssu.html:680
 msgid "Specification"
 msgstr ""
 
@@ -2065,17 +1910,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:5
 #, python-format
 msgid ""
-"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-"
-"RPC\">JSONRPC2</a> interface via the plugin <a "
-"href=\"%(itoopie)s\">I2PControl</a>.\n"
-"The aim of the interface is to provide simple way to interface with a "
-"running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is "
-"provided by the java libraries <a href=\"http://software.dzhuvinov.com"
-"/json-rpc-2.0.html\">JSON-RPC 2.0</a>.  \n"
-"A list of implementations of JSON-RPC for various languages can be found "
-"at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC "
-"wiki</a>."
+"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-RPC\">JSONRPC2</a> interface via the plugin <a href=\"%(itoopie)s\">I2PControl</a>.\n"
+"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries <a href=\"http://software.dzhuvinov.com/json-rpc-2.0.html\">JSON-RPC 2.0</a>.  \n"
+"A list of implementations of JSON-RPC for various languages can be found at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC wiki</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:12
@@ -2130,8 +1968,8 @@ msgstr "Açıqlama"
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:48
 msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate'"
-" RPC method)"
+"Token used for authenticating every request (excluding the 'Authenticate' "
+"RPC method)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:56
@@ -2140,8 +1978,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:57
 msgid ""
-"Creates and returns an authentication token used for further "
-"communication."
+"Creates and returns an authentication token used for further communication."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:59
@@ -2174,8 +2011,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:117
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:163
 msgid ""
-"Token used for authenticating the client. Is provided by the server via "
-"the 'Authenticate' RPC method."
+"Token used for authenticating the client. Is provided by the server via the "
+"'Authenticate' RPC method."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:73
@@ -2237,7 +2074,8 @@ msgid "Returns true if any changes were made."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:98
-msgid "Returns true if any changes requiring a restart to take effect were made."
+msgid ""
+"Returns true if any changes requiring a restart to take effect were made."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:101
@@ -2310,8 +2148,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:157
 msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote "
-"host."
+"Initiates a router reseed, fetching peers into our NetDB from a remote host."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:158
@@ -2320,8 +2157,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:159
 msgid ""
-"Restarts the router gracefully (waits for participating tunnels to "
-"expire)."
+"Restarts the router gracefully (waits for participating tunnels to expire)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:160
@@ -2367,7 +2203,8 @@ msgid "<b>Blocking</b>. If requested, returns the status of the the update"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:175
-msgid "Fetches or sets various network related settings. Ports, addresses etc."
+msgid ""
+"Fetches or sets various network related settings. Ports, addresses etc."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:177
@@ -2378,8 +2215,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:178
 msgid ""
-"What hostname is used for the TCP transport. If null is submitted, "
-"current setting will be returned."
+"What hostname is used for the TCP transport. If null is submitted, current "
+"setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:179
@@ -2396,8 +2233,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:181
 msgid ""
-"What hostname is used for the UDP transport. If null is submitted, "
-"current setting will be returned."
+"What hostname is used for the UDP transport. If null is submitted, current "
+"setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:182
@@ -2411,19 +2248,20 @@ msgid "What ip has been detected by the UDP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:184
-msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
+msgid ""
+"Is UPnP enabled. If null is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:185
 msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If "
-"null is submitted, current setting will be returned."
+"How many percent of bandwidth is usable for participating tunnels. If null "
+"is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:186
 msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
-"current setting will be returned."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
+" setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:187
@@ -2434,15 +2272,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:188
 msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP "
-"changes ). If null is submitted, current setting will be returned."
+"Is laptop mode enabled (change router identity and UDP port when IP changes "
+"). If null is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:189
 msgid ""
-"Token used for authenticating the client. Is provided by the server via "
-"the 'Authenticate' RPC method. If null is submitted, current setting will"
-" be returned."
+"Token used for authenticating the client. Is provided by the server via the "
+"'Authenticate' RPC method. If null is submitted, current setting will be "
+"returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:192
@@ -2455,8 +2293,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:194
 msgid ""
-"If requested, returns the method used for automatically detecting ip for "
-"the TCP transport."
+"If requested, returns the method used for automatically detecting ip for the"
+" TCP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:195
@@ -2469,8 +2307,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:197
 msgid ""
-"If requested, returns methods used for detecting the ip address of the "
-"UDP transport."
+"If requested, returns methods used for detecting the ip address of the UDP "
+"transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:198
@@ -2601,34 +2439,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:237
 msgid ""
-"The version of the I2PControl API used wasn't specified, but is required "
-"to be specified."
+"The version of the I2PControl API used wasn't specified, but is required to "
+"be specified."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:238
 msgid ""
-"The version of the I2PControl API specified is not supported by "
-"I2PControl."
+"The version of the I2PControl API specified is not supported by I2PControl."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:8
 #, python-format
 msgid ""
 "I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a <a "
-"href=\"%(naming)s\">hostname</a>,\n"
-"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination "
-"key.\n"
-"An established I2PTunnel will be available on your client machine as "
-"localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create "
-"I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key "
-"will be generated\n"
+"Destination of an I2PTunnel can be defined using a <a href=\"%(naming)s\">hostname</a>,\n"
+"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination key.\n"
+"An established I2PTunnel will be available on your client machine as localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
 "for the service and it will become avaliable throughout I2P.\n"
 "A web interface for I2PTunnel management is avaliable on\n"
-"<a "
-"href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>."
+"<a href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:20
@@ -2642,8 +2473,7 @@ msgstr "Server tunelləri"
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:23
 msgid ""
 "<b>I2P Webserver</b> - A tunnel pointed to a Jetty webserver run\n"
-"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient "
-"and quick hosting on I2P.\n"
+"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient and quick hosting on I2P.\n"
 "<br>The document root is:"
 msgstr ""
 
@@ -2653,10 +2483,8 @@ msgstr "Müştəri tunelləri"
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:33
 msgid ""
-"A HTTP proxy used for browsing I2P and the regular internet anonymously "
-"through I2P. \n"
-"Browsing internet through I2P uses a random proxy specified by the "
-"\"Outproxies:\" option."
+"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n"
+"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:37
@@ -2699,31 +2527,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:56
 msgid ""
-"Opens a local TCP port that connects to a service (like HTTP, FTP or "
-"SMTP) on a destination inside of I2P.\n"
-"The tunnel is directed to a random host from the comma seperated (\", \")"
-" list of destinations."
+"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n"
+"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:62
 msgid ""
-"A HTTP-client tunnel. The tunnel connects to the destination specified by"
-" the URL\n"
-"in a HTTP request. Supports proxying onto internet if an outproxy is "
-"provided. Strips HTTP connections of the following headers:"
+"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n"
+"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:67
 msgid ""
 "<b>Accept, Accept-Charset, Accept-Language\n"
-" and Accept-Ranges</b> as they vary greatly between browsers and can be "
-"used as an identifier."
+" and Accept-Ranges</b> as they vary greatly between browsers and can be used as an identifier."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:90
 msgid ""
-"Depending on if the tunnel is using an outproxy or not it will append the"
-" following User-Agent:"
+"Depending on if the tunnel is using an outproxy or not it will append the "
+"following User-Agent:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:94
@@ -2736,10 +2559,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:100
 msgid ""
-"Creates a connection to a random IRC server specified by the comma "
-"seprated (\", \") \n"
-"list of destinations. Only a whitelisted subset of IRC commands are "
-"allowed due to anonymity concerns."
+"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n"
+"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:105
@@ -2752,8 +2573,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:144
 msgid ""
-"Enables using the I2P router as a SOCKS proxy with the command whitelist "
-"specified by\n"
+"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n"
 "<a href=\"#client-mode-irc\">IRC</a> client mode."
 msgstr ""
 
@@ -2765,8 +2585,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:156
 msgid ""
-"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr "
-"client tunnel will \n"
+"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n"
 "subscribe to a streamr server tunnel."
 msgstr ""
 
@@ -2780,32 +2599,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:171
 msgid ""
-"Creates a destination to a local HTTP server ip:port. Supports gzip for "
-"requests with \n"
-"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in"
-" such a request."
+"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n"
+"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:177
 msgid ""
-"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client "
-"with no outproxying\n"
-"capabilities. An example application would be a web application that does"
-" client-type\n"
+"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n"
+"capabilities. An example application would be a web application that does client-type\n"
 "requests, or loopback-testing an I2P Site as a diagnostic tool."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:184
 msgid ""
-"Creates a destination that filters the reqistration sequence of a client "
-"and passes \n"
+"Creates a destination that filters the reqistration sequence of a client and passes \n"
 "the clients destination key as a hostname to the IRC-server."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:190
 msgid ""
-"A UDP-client that connects to a media server is created. The UDP-Client "
-"is coupled with a Streamr server I2PTunnel."
+"A UDP-client that connects to a media server is created. The UDP-Client is "
+"coupled with a Streamr server I2PTunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:2
@@ -2822,14 +2636,11 @@ msgstr ""
 msgid ""
 "The ministreaming library has been enhanced and extended by the\n"
 "\"full\" <a href=\"%(streaming)s\">streaming library</a>.\n"
-"Ministreaming is deprecated and is incompatible with today's "
-"applications.\n"
+"Ministreaming is deprecated and is incompatible with today's applications.\n"
 "The following documentation is old.\n"
-"Also note that streaming extends ministreaming in the same Java package "
-"(net.i2p.client.streaming),\n"
+"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n"
 "so the current <a href=\"%(api)s\">API documentation</a> contains both.\n"
-"Obsolete ministreaming classes and methods are clearly marked as "
-"deprecated in the Javadocs."
+"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:19
@@ -2837,17 +2648,12 @@ msgstr ""
 msgid ""
 "\n"
 "The ministreaming library is a layer on top of the core \n"
-"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and "
-"authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and "
-"unauthenticated \n"
+"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and unauthenticated \n"
 "message layer.  Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations "
-"available, but\n"
-"rather than embed that functionality into the base I2P code, it has been "
-"factored\n"
-"off into its own library both to keep the TCP-esque complexities separate"
-" and to\n"
+"functionality has a whole series of tradeoffs and optimizations available, but\n"
+"rather than embed that functionality into the base I2P code, it has been factored\n"
+"off into its own library both to keep the TCP-esque complexities separate and to\n"
 "allow alternative optimized implementations."
 msgstr ""
 
@@ -2855,42 +2661,29 @@ msgstr ""
 #, python-format
 msgid ""
 "The ministreaming library was written by mihi as a part of his \n"
-"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out"
-" and released\n"
-"under the BSD license.  It is called the \"mini\"streaming library "
-"because it makes\n"
-"some simplifications in the implementation, while a more robust streaming"
-" library\n"
-"could be further optimized for operation over I2P.  The two main issues "
-"with \n"
+"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out and released\n"
+"under the BSD license.  It is called the \"mini\"streaming library because it makes\n"
+"some simplifications in the implementation, while a more robust streaming library\n"
+"could be further optimized for operation over I2P.  The two main issues with \n"
 "the ministreaming library are its use of the traditional TCP two phase \n"
-"establishment protocol and the current fixed window size of 1.  The "
-"establishment\n"
-"issue is minor for long lived streams, but for short ones, such as quick "
-"HTTP\n"
-"requests, the impact can be <a href=\"%(minwww)s\">significant</a>.  As "
-"for the window\n"
-"size, the ministreaming library doesn't maintain any ID or ordering "
-"within the \n"
-"messages sent (or include any application level ACK or SACK), so it must "
-"wait \n"
-"on average twice the time it takes to send a message before sending "
-"another."
+"establishment protocol and the current fixed window size of 1.  The establishment\n"
+"issue is minor for long lived streams, but for short ones, such as quick HTTP\n"
+"requests, the impact can be <a href=\"%(minwww)s\">significant</a>.  As for the window\n"
+"size, the ministreaming library doesn't maintain any ID or ordering within the \n"
+"messages sent (or include any application level ACK or SACK), so it must wait \n"
+"on average twice the time it takes to send a message before sending another."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:45
 #, python-format
 msgid ""
-"Even with those issues, the ministreaming library performs quite well in "
-"many\n"
+"Even with those issues, the ministreaming library performs quite well in many\n"
 "situations, and its <a href=\"%(api)s\">API</a>\n"
-"is both quite simple and capable of remaining unchanged as different "
-"streaming\n"
+"is both quite simple and capable of remaining unchanged as different streaming\n"
 "implementations are introduced.  The library is deployed in its own \n"
 "ministreaming.jar.\n"
 "Developers in Java who would like to use it can\n"
-"access the API directly, while developers in other languages can use it "
-"through\n"
+"access the API directly, while developers in other languages can use it through\n"
 "<a href=\"%(samv3)s\">SAM</a>'s streaming support."
 msgstr ""
 
@@ -2929,8 +2722,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/socks.html:5
 msgid ""
 "\n"
-"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are "
-"supported.\n"
+"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n"
 "Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n"
 "Both shared-clients and non-shared are supported.\n"
 "There is no SOCKS outproxy so it is of limited use."
@@ -2951,8 +2743,7 @@ msgid ""
 "information as content, I2P has no way to protect your anonymity.  For\n"
 "example, some mail applications will send the IP address of the machine\n"
 "they are running on to a mail server. There is no way for I2P to filter\n"
-"this, thus using I2P to 'socksify' existing applications is possible, but"
-"\n"
+"this, thus using I2P to 'socksify' existing applications is possible, but\n"
 "extremely dangerous."
 msgstr ""
 
@@ -3031,47 +2822,34 @@ msgstr ""
 #, python-format
 msgid ""
 "The streaming library is a layer on top of the core \n"
-"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and "
-"authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and "
-"unauthenticated \n"
+"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and unauthenticated \n"
 "message layer.  Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations "
-"available, but\n"
-"rather than embed that functionality into the base I2P code, it has been "
-"factored\n"
-"off into its own library both to keep the TCP-esque complexities separate"
-" and to\n"
+"functionality has a whole series of tradeoffs and optimizations available, but\n"
+"rather than embed that functionality into the base I2P code, it has been factored\n"
+"off into its own library both to keep the TCP-esque complexities separate and to\n"
 "allow alternative optimized implementations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:29
 msgid ""
 "In consideration of the relatively high cost of messages, \n"
-"the streaming library's protocol for scheduling and delivering those "
-"messages has been optimized to\n"
-"allow individual messages passed to contain as much information as is "
-"available.\n"
-"For instance, a small HTTP transaction proxied through the streaming "
-"library can\n"
-"be completed in a single round trip - the first messages bundle a SYN, "
-"FIN, and\n"
+"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n"
+"allow individual messages passed to contain as much information as is available.\n"
+"For instance, a small HTTP transaction proxied through the streaming library can\n"
+"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n"
 "the small HTTP request payload, and the reply bundles the SYN,\n"
 "FIN, ACK, and the HTTP response payload.  While an additional\n"
-"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has "
-"been\n"
-"received, the local HTTP proxy can often deliver the full response to the"
-" browser \n"
+"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n"
+"received, the local HTTP proxy can often deliver the full response to the browser \n"
 "immediately."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:42
 msgid ""
 "The streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control "
-"algorithms\n"
-"(both slow start and congestion avoidance), and general packet behavior "
-"(ACK,\n"
+"abstraction of TCP, with its sliding windows, congestion control algorithms\n"
+"(both slow start and congestion avoidance), and general packet behavior (ACK,\n"
 "SYN, FIN, RST, rto calculation, etc)."
 msgstr ""
 
@@ -3091,29 +2869,21 @@ msgstr "APÄ°"
 #: i2p2www/pages/site/docs/api/streaming.html:60
 #, python-format
 msgid ""
-"The streaming library API provides a standard socket paradigm to Java "
-"applications.\n"
-"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, "
-"except that\n"
-"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> "
-"through the\n"
+"The streaming library API provides a standard socket paradigm to Java applications.\n"
+"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, except that\n"
+"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> through the\n"
 "streaming library, to be interpreted by I2CP."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:67
 #, python-format
 msgid ""
-"The standard interface to the streaming lib is for the application to use"
-" the\n"
+"The standard interface to the streaming lib is for the application to use the\n"
 "<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a> to create an\n"
-"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks "
-"the\n"
-"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will "
-"cause\n"
-"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The "
-"application\n"
-"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> "
-"or\n"
+"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks the\n"
+"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will cause\n"
+"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The application\n"
+"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> or\n"
 "receive connections with an <a href=\"%(i2psskt)s\">I2PServerSocket</a>."
 msgstr ""
 
@@ -3134,17 +2904,12 @@ msgstr ""
 #, python-format
 msgid ""
 "The options and current default values are listed below.\n"
-"Options are case-sensitive and may be set for the whole router, for a "
-"particular client, or for an individual socket on a\n"
+"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n"
 "per-connection basis.\n"
-"Many values are tuned for HTTP performance over typical I2P conditions. "
-"Other applications such\n"
+"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n"
 "as peer-to-peer services are strongly encouraged to\n"
-"modify as necessary, by setting the options and passing them via the call"
-" to\n"
-"<a "
-"href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost,"
-" _i2cpPort, opts).\n"
+"modify as necessary, by setting the options and passing them via the call to\n"
+"<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost, _i2cpPort, opts).\n"
 "Time values are in ms."
 msgstr ""
 
@@ -3152,17 +2917,14 @@ msgstr ""
 #, python-format
 msgid ""
 "Note that higher-layer APIs, such as <a href=\"%(samv3)s\">SAM</a>,\n"
-"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,"
-"\n"
+"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
 "may override these defaults with their own defaults.\n"
-"Also note that many options only apply to servers listening for incoming "
-"connections."
+"Also note that many options only apply to servers listening for incoming connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:110
 msgid ""
-"As of release 0.9.1, most, but not all, options may be changed on an "
-"active socket manager or session.\n"
+"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n"
 "See the javadocs for details."
 msgstr ""
 
@@ -3186,8 +2948,8 @@ msgstr "Qeydlər"
 
 #: i2p2www/pages/site/docs/api/streaming.html:119
 msgid ""
-"Comma- or space-separated list of Base64 peer Hashes used for either "
-"access list or blacklist."
+"Comma- or space-separated list of Base64 peer Hashes used for either access "
+"list or blacklist."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:121
@@ -3237,24 +2999,21 @@ msgstr ""
 msgid ""
 "Comma- or space-separated list of Base64 peer Hashes to be\n"
 "blacklisted for incoming connections to ALL destinations in the context.\n"
-"This option must be set in the context properties, NOT in the "
-"createManager() options argument.\n"
-"Note that setting this in the router context will not affect clients "
-"outside the\n"
+"This option must be set in the context properties, NOT in the createManager() options argument.\n"
+"Note that setting this in the router context will not affect clients outside the\n"
 "router in a separate JVM and context."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:175
 msgid ""
-"How much transmit data (in bytes) will be accepted that hasn't been "
-"written out yet."
+"How much transmit data (in bytes) will be accepted that hasn't been written "
+"out yet."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:179
 msgid ""
 "When we're in congestion avoidance, we grow the window size at the rate\n"
-"of <code>1/(windowSize*factor)</code>.  In standard TCP, window sizes are"
-" in bytes,\n"
+"of <code>1/(windowSize*factor)</code>.  In standard TCP, window sizes are in bytes,\n"
 "while in I2P, window sizes are in messages.\n"
 "A higher number means slower growth."
 msgstr ""
@@ -3263,16 +3022,15 @@ msgstr ""
 msgid ""
 "How long to wait after instantiating a new con \n"
 "before actually attempting to connect.  If this is\n"
-"&lt;= 0, connect immediately with no initial data.  If greater than 0, "
-"wait\n"
+"&lt;= 0, connect immediately with no initial data.  If greater than 0, wait\n"
 "until the output stream is flushed, the buffer fills, \n"
 "or that many milliseconds pass, and include any initial data with the SYN."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:194
 msgid ""
-"How long to block on connect, in milliseconds. Negative means "
-"indefinitely. Default is 5 minutes."
+"How long to block on connect, in milliseconds. Negative means indefinitely. "
+"Default is 5 minutes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:198
@@ -3285,30 +3043,24 @@ msgstr ""
 msgid ""
 "Comma- or space-separated list of Base64 peer Hashes or host names to be\n"
 "contacted using an alternate DSA destination.\n"
-"Only applies if multisession is enabled and the primary session is non-"
-"DSA\n"
+"Only applies if multisession is enabled and the primary session is non-DSA\n"
 "(generally for shared clients only).\n"
-"This option must be set in the context properties, NOT in the "
-"createManager() options argument.\n"
-"Note that setting this in the router context will not affect clients "
-"outside the\n"
+"This option must be set in the context properties, NOT in the createManager() options argument.\n"
+"Note that setting this in the router context will not affect clients outside the\n"
 "router in a separate JVM and context."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:216
 msgid ""
 "Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier "
-"than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this "
-"Destination."
+"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this Destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:226
 msgid ""
 "(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a "
-"duplicate ack."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:232
@@ -3321,8 +3073,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:237
 msgid ""
-"The initial value of the resend delay field in the packet header, times "
-"1000.\n"
+"The initial value of the resend delay field in the packet header, times 1000.\n"
 "Not fully implemented; see below."
 msgstr ""
 
@@ -3345,8 +3096,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:255
 msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
-"are in messages."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
+"in messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:279
@@ -3388,12 +3139,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:333
 msgid ""
 "(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than "
-"1 will cause an error."
+"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:338
-msgid "How long to block on read, in milliseconds. Negative means indefinitely."
+msgid ""
+"How long to block on read, in milliseconds. Negative means indefinitely."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:342
@@ -3436,19 +3187,15 @@ msgstr "Quraşdırma"
 
 #: i2p2www/pages/site/docs/api/streaming.html:387
 msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
-"may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
-" may contain the initial response data as well."
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:392
 msgid ""
-"The initiator may send additional data packets, up to the initial window "
-"size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
 "These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short "
-"period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
 "arrive out of order, in advance of the SYNCHRONIZE packet."
 msgstr ""
 
@@ -3458,33 +3205,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:400
 msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the"
-" lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
-" will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
 "a large amount of overhead.\n"
 "The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K "
-"I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
 "including overhead for the typical case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:417
 msgid ""
-"The first message in a connection includes a 387 byte (typical) "
-"Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
-"the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
-"was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
-"I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation "
-"of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important "
-"factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived "
-"connections."
+"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:428
@@ -3498,14 +3235,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:436
 #, python-format
 msgid ""
-"Each packet is sent through I2P as a single message (or as an individual "
-"clove in a\n"
-"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation "
-"is implemented\n"
-"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a "
-"href=\"%(i2np)s\">I2NP</a>, and\n"
-"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no "
-"packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
+"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation is implemented\n"
+"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a href=\"%(i2np)s\">I2NP</a>, and\n"
+"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no packet delimiter\n"
 "mechanism or payload length field in the streaming protocol."
 msgstr ""
 
@@ -3515,17 +3248,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:447
 msgid ""
-"Data packets may include an optional delay field specifying the requested"
-" delay,\n"
+"Data packets may include an optional delay field specifying the requested delay,\n"
 "in ms, before the receiver should ack the packet.\n"
 "Valid values are 0 to 60000 inclusive.\n"
 "A value of 0 requests an immediate ack.\n"
 "This is advisory only, and receivers should delay slightly so that\n"
 "additional packets may be acknowledged with a single ack.\n"
-"Some implementations may include an advisory value of (measured RTT / 2) "
-"in this field.\n"
-"For nonzero optional delay values, receivers should limit the maximum "
-"delay\n"
+"Some implementations may include an advisory value of (measured RTT / 2) in this field.\n"
+"For nonzero optional delay values, receivers should limit the maximum delay\n"
 "before sending an ack to a few seconds at most.\n"
 "Optional delay values greater than 60000 indicate choking, see below."
 msgstr ""
@@ -3537,46 +3267,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:462
 msgid ""
 "TCP headers include the receive window in bytes.\n"
-"The streaming protocol does not contain a receive window, it uses only a "
-"simple choke/unchoke indication.\n"
-"Each endpoint must maintain its own estimate of the far-end receive "
-"window, in either bytes or packets.\n"
-"The recommended minimum buffer size for receiver implementations is 128 "
-"packets or 217 KB (approximately 128x1730).\n"
-"Because of I2P netowrk latency, packet drops, and the resulting "
-"congestion control,\n"
+"The streaming protocol does not contain a receive window, it uses only a simple choke/unchoke indication.\n"
+"Each endpoint must maintain its own estimate of the far-end receive window, in either bytes or packets.\n"
+"The recommended minimum buffer size for receiver implementations is 128 packets or 217 KB (approximately 128x1730).\n"
+"Because of I2P netowrk latency, packet drops, and the resulting congestion control,\n"
 "a buffer of this size is rarely filled.\n"
-"Overflow is, however, likely to occur on high-bandwidth \"local "
-"loopback\" (same-router) connections."
+"Overflow is, however, likely to occur on high-bandwidth \"local loopback\" (same-router) connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:471
 msgid ""
 "To quickly indicate and smoothly recover from overflow conditions,\n"
 "there is a simple mechanism for pushback in the streaming protocol.\n"
-"If a packet is received with an optional delay field of value of 60001 or"
-" higher,\n"
+"If a packet is received with an optional delay field of value of 60001 or higher,\n"
 "that indicates \"choking\" or a receive window of zero.\n"
-"A packet with an optional delay field of value of 60000 or less indicates"
-" \"unchoking\".\n"
-"Packets without an optional delay field do not affect the choke/unchoke "
-"state."
+"A packet with an optional delay field of value of 60000 or less indicates \"unchoking\".\n"
+"Packets without an optional delay field do not affect the choke/unchoke state."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:479
 msgid ""
-"After being choked, no more packets with data should be sent until the "
-"transmitter is unchoked,\n"
-"except for occasional \"probe\" data packets to compensate for possible "
-"lost unchoke packets.\n"
-"The choked endpoint should start a \"persist timer\" to control the "
-"probing, as in TCP.\n"
+"After being choked, no more packets with data should be sent until the transmitter is unchoked,\n"
+"except for occasional \"probe\" data packets to compensate for possible lost unchoke packets.\n"
+"The choked endpoint should start a \"persist timer\" to control the probing, as in TCP.\n"
 "The unchoking endpoint should send several packets with this field set,\n"
-"or continue sending them periodically until data packets are received "
-"again.\n"
+"or continue sending them periodically until data packets are received again.\n"
 "Maximum time to wait for unchoking is implementation-dependent.\n"
-"Transmitter window size and congestion control strategy after being "
-"unchoked is implementation-dependent."
+"Transmitter window size and congestion control strategy after being unchoked is implementation-dependent."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:490
@@ -3585,8 +3302,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:491
 msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) "
-"and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
 "phases, with exponential backoff.\n"
 "Windowing and acknowledgments use packet count, not byte count."
 msgstr ""
@@ -3597,53 +3313,44 @@ msgstr "BaÄŸla"
 
 #: i2p2www/pages/site/docs/api/streaming.html:499
 msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the "
-"CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag."
-"\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag.\n"
 "CLOSE packets may contain data as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:507
 msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
-"in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
 "This function is provided in streaming.\n"
 "Pings and pongs may not be combined with a standard streaming packet;\n"
 "if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are "
-"ignored."
+"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are ignored."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:515
 msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
-"flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is "
-"ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
 "The sendStreamId may or may not correspond to an existing connection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:521
 msgid ""
 "A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the "
-"sendStreamId from the ping.\n"
-"Prior to release 0.9.18, the pong packet does not include any payload "
-"that was contained in the ping."
+"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
+"Prior to release 0.9.18, the pong packet does not include any payload that was contained in the ping."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:527
 msgid ""
 "As of release 0.9.18, pings and pongs may contain a payload.\n"
-"The payload in the ping, up to a maximum of 32 bytes, is returned in the "
-"pong."
+"The payload in the ping, up to a maximum of 32 bytes, is returned in the pong."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:532
 msgid ""
-"Streaming may be configured to disable sending pongs with the "
-"configuration i2p.streaming.answerPings=false."
+"Streaming may be configured to disable sending pongs with the configuration "
+"i2p.streaming.answerPings=false."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:537
@@ -3659,8 +3366,7 @@ msgid ""
 "This is used for \"temporal\" sharing at connection open/close time,\n"
 "not \"ensemble\" sharing during a connection (See\n"
 "<a href=\"http://www.ietf.org/rfc/rfc2140.txt\">RFC 2140</a>).\n"
-"There is a separate share per ConnectionManager (i.e. per local "
-"Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
 "so that there is no information leakage to other Destinations on the\n"
 "same router.\n"
 "The share data for a given peer expires after a few minutes.\n"
@@ -3673,8 +3379,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:560
 msgid ""
-"The following parameters are hardcoded, but may be of interest for "
-"analysis:"
+"The following parameters are hardcoded, but may be of interest for analysis:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:579
@@ -3684,25 +3389,16 @@ msgstr "Tarixçə"
 
 #: i2p2www/pages/site/docs/api/streaming.html:580
 msgid ""
-"The streaming library has grown organically for I2P - first mihi "
-"implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
-"window\n"
-"size of 1 message (requiring an ACK before sending the next one), and "
-"then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets)"
-" and the\n"
-"full streaming implementation was deployed with a sliding window protocol"
-" and \n"
-"optimizations to take into account the high bandwidth x delay product.  "
-"Individual\n"
-"streams may adjust the maximum packet size and other options. The default"
-"\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
-"\n"
+"The streaming library has grown organically for I2P - first mihi implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
+"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
+"full streaming implementation was deployed with a sliding window protocol and \n"
+"optimizations to take into account the high bandwidth x delay product.  Individual\n"
+"streams may adjust the maximum packet size and other options. The default\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
 "and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple "
-"messages."
+"retransmitting lost messages, and the latency and overhead of multiple messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:594
@@ -3714,7 +3410,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:975
 #: i2p2www/pages/site/docs/protocol/i2np.html:233
 #: i2p2www/pages/site/docs/transport/ntcp.html:544
-#: i2p2www/pages/site/docs/transport/ssu.html:610
+#: i2p2www/pages/site/docs/transport/ssu.html:615
 #: i2p2www/pages/site/docs/tunnels/implementation.html:506
 msgid "Future Work"
 msgstr ""
@@ -3733,20 +3429,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:604
 #, python-format
 msgid ""
-"Another area for research is the interaction of the streaming lib with "
-"the\n"
+"Another area for research is the interaction of the streaming lib with the\n"
 "NTCP and SSU transport layers.\n"
 "See <a href=\"%(ntcpdisc)s\">the NTCP discussion page</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:609
 msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly"
-" affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a "
-"pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller "
-"window\n"
+"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller window\n"
 "sizes than would otherwise be the case. The router currently routes \n"
 "messages for a single from/to destination pair through a consistent set \n"
 "of tunnels, until tunnel expiration or delivery failure. The router's \n"
@@ -3781,11 +3473,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:636
 msgid ""
-"zzz has added debug code to the streaming library to log packets in a "
-"wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
 "(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters "
-"to TCP fields."
+"The format may require enhancement to map more streaming lib parameters to TCP fields."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:641
@@ -3804,18 +3494,15 @@ msgstr "Yanvar 2017"
 msgid ""
 "There are several bittorrent clients and trackers on I2P.\n"
 "As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P."
-"\n"
+"changes are required to tracker and client software for operation on I2P.\n"
 "These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients "
-"and trackers."
+"Note carefully the guidelines for compatibility with older I2P clients and trackers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:15
 msgid ""
 "This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or "
-"protocols."
+"Specific clients and trackers may implement other unique features or protocols."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:20
@@ -3828,8 +3515,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:27
 msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for"
-" compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
 "Trackers may ignore the port parameter, and should not require it."
 msgstr ""
 
@@ -3841,8 +3527,7 @@ msgid ""
 "using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for "
-"compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
 "Trackers should not require an appended \".i2p\"."
 msgstr ""
 
@@ -3852,18 +3537,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:46
 msgid ""
-"Current Destinations for clients are 387 or more bytes (516 or more in "
-"Base 64 encoding).\n"
+"Current Destinations for clients are 387 or more bytes (516 or more in Base 64 encoding).\n"
 "A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see "
-"below),\n"
+"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
 "the tracker should probably decode and reject bad Base64 when announced."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:53
 msgid ""
-"The default response type is non-compact. Clients may request a compact "
-"response with\n"
+"The default response type is non-compact. Clients may request a compact response with\n"
 "the parameter compact=1. A tracker may, but is not required to, return\n"
 "a compact response when requested."
 msgstr ""
@@ -3871,10 +3553,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:59
 msgid ""
 "Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel "
-"rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and "
-"it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
 "destination enforcement by the tracker (see below)."
 msgstr ""
 
@@ -3896,8 +3576,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:76
 msgid ""
-"Trackers generally include a fake port key, or use the port from the "
-"announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
 "Clients must ignore the port parameter, and should not require it."
 msgstr ""
 
@@ -3905,10 +3584,8 @@ msgstr ""
 #, python-format
 msgid ""
 "The value of the ip key is the base 64 of the client's\n"
-"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as "
-"described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it "
-"wasn't in the announce ip, for compatibility with older clients.\n"
+"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
 "Clients should not require an appended \".i2p\" in the responses."
 msgstr ""
 
@@ -3923,26 +3600,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:95
 #, python-format
 msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a "
-"single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
 "whose length is a multiple of 32 bytes.\n"
 "This string contains the concatenated\n"
 "<a href=\"%(commonstructures)s#type_Hash\">32-byte SHA-256 Hashes</a>\n"
 "of the binary\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement"
-"\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-"
-"DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
 "or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
 "The peers key may be absent, or the peers value may be zero-length."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:109
 msgid ""
-"While compact response support is optional for both clients and trackers,"
-" it is highly\n"
+"While compact response support is optional for both clients and trackers, it is highly\n"
 "recommended as it reduces the nominal response size by over 90&#37;."
 msgstr ""
 
@@ -3953,34 +3626,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:117
 #, python-format
 msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own "
-"tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying "
-"the\n"
+"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
 "client's\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n"
 "using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
-"are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
 "different formats for the same information.\n"
 "These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce "
-"parameter at all."
+"A tracker enforcing destinations need not require the ip announce parameter at all."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:129
 msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for "
-"announces,\n"
-"destination enforcement will prevent usage by those clients unless or "
-"until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
+"destination enforcement will prevent usage by those clients unless or until\n"
 "those clients are converted to announcing over their own tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:135
 msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,"
-"\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
 "so we expect that all trackers will eventually enforce destinations.\n"
 "Both tracker and client developers should anticipate it."
 msgstr ""
@@ -3994,12 +3660,9 @@ msgstr ""
 msgid ""
 "Announce URL host names in torrent files generally follow the\n"
 "<a href=\"%(naming)s\">I2P naming standards</a>.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 "
-"hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
-"should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these "
-"formats."
+"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these formats."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:152
@@ -4021,27 +3684,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:165
 #, python-format
 msgid ""
-"I2P uses 387+ byte <a "
-"href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
+"I2P uses 387+ byte <a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "for addresses, as explained above."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:170
 msgid ""
-"If the client has only the hash of the destination (such as from a "
-"compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
-"Naming Service,\n"
+"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
 "which will return the full Destination if available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:176
 msgid ""
-"If the client has a peer's full Destination it received in a non-compact "
-"response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
 "directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is "
-"quite inefficient."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:183
@@ -4051,40 +3709,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:184
 msgid ""
 "To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer"
-" connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
 "I2P HTTP outproxies often block announces.\n"
 "There are no known SOCKS outproxies supporting bittorrent traffic."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:191
 msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
-"often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
 "block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
-"and not deliver them in responses."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:200
 #, python-format
 msgid ""
 "I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex "
-"available,\n"
+"As there does not appear to be a formal specification of ut_pex available,\n"
 "it may be necessary to review the libtorrent source for assistance.\n"
 "It is an extension message, identified as \"i2p_pex\" in\n"
-"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension "
-"handshake</a>.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", "
-"\"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length "
-"is a multiple of 32 bytes.\n"
+"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
 "These byte strings are the concatenated SHA-256 Hashes of the binary\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact "
-"response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
 "The added.f value, if present, is the same as in ut_pex."
 msgstr ""
 
@@ -4099,13 +3749,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:226
 msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
-" or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
 "It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension "
-"handshake</a>.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
-"both integers."
+"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:235
@@ -4139,14 +3786,12 @@ msgstr ""
 msgid ""
 "Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
 "instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a"
-" single compact peer info."
+"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:264
 msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
-"2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
 "instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
 "In a response, the \"nodes\" key is a\n"
 "single byte string with concatenated compact node info."
@@ -4155,10 +3800,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:271
 msgid ""
 "Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the "
-"destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of "
-"the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of the\n"
 "destination hash exclusive-ORed with the port."
 msgstr ""
 
@@ -4183,51 +3826,38 @@ msgid ""
 "Preliminary differences from\n"
 "<a href=\"http://www.bittorrent.org/beps/bep_0015.html\">BEP 15</a>\n"
 "are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker "
-"supporting datagram announces."
+"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:299
 msgid ""
 "A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive "
-"repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
-" the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
 "The response port is arbitrary.\n"
 "A client sends and receives on a single port only.\n"
 "It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they "
-"contain tokens sent in the query, and need not be signed."
+"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:309
 msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
-" the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
 "although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
-" 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source "
-"port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, "
-"and error response are the same as in BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:317
 msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a "
-"simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
 "with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to "
-"the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
 "and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an "
-"existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
-"prefix.\n"
-"The URL for a modified 2-packet-mode tracker would require a different "
-"prefix if both modes are supported in I2P."
+"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix.\n"
+"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:330
@@ -4267,19 +3897,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:8
 msgid ""
-"This page is about bundling the entire I2P router binary with your "
-"application.\n"
-"It is not about writing an application to work with I2P (either bundled "
-"or external)."
+"This page is about bundling the entire I2P router binary with your application.\n"
+"It is not about writing an application to work with I2P (either bundled or external)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:13
 msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's "
-"great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
 "If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the "
-"complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
 "This page discusses some general guidelines."
 msgstr ""
 
@@ -4289,10 +3915,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:24
 msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the "
-"most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for "
-"everyone."
+"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for everyone."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:30
@@ -4301,11 +3925,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:31
 msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the "
-"Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
 "If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
-"the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
 "Some of the following only applies to the Java router."
 msgstr ""
 
@@ -4314,7 +3936,8 @@ msgid "Licensing"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid "Ensure you meet the license requirements of the software you are bundling."
+msgid ""
+"Ensure you meet the license requirements of the software you are bundling."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:45
@@ -4323,29 +3946,22 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:46
 msgid ""
-"A correct default configuration is crucial. Most users will not change "
-"the defaults.\n"
-"The defaults for your application may need to be different than the "
-"defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change the defaults.\n"
+"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
 "Override the router defaults if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:51
 msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and "
-"length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of "
-"your app."
+"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of your app."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:55
 msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute "
-"to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it "
-"would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for "
-"example."
+"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:62
@@ -4355,32 +3971,25 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:63
 msgid ""
 "It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, "
-"setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful "
-"shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful shutdown,\n"
 "your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating "
-"tunnels."
+"However, there's lots of reasons why you should allow participating tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:70
 msgid ""
-"First of all, the router doesn't work that well if it doesn't have a "
-"chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
 "which is helped tremendously by others building tunnels through you."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:74
 msgid ""
-"Secondly, over 90&#37; of the routers in the current network allow "
-"participating traffic.\n"
+"Secondly, over 90&#37; of the routers in the current network allow participating traffic.\n"
 "It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, "
-"then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
 "and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for"
-" people to enable relaying."
+"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:81
@@ -4391,10 +4000,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:84
 msgid ""
-"We strongly discourage you from disabling participating traffic by "
-"default.\n"
-"If you do this and your application gets hugely popular, it could break "
-"the network."
+"We strongly discourage you from disabling participating traffic by default.\n"
+"If you do this and your application gets hugely popular, it could break the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:90
@@ -4403,12 +4010,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:91
 msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs"
-" of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge"
-" load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best "
-"performance."
+"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:99
@@ -4417,12 +4021,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:100
 msgid ""
-"Give your users a way to change the configuration of the important "
-"settings.\n"
-"We understand that you will probably want to hide most of I2P's "
-"complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, "
-"IP/port may be helpful."
+"Give your users a way to change the configuration of the important settings.\n"
+"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:108
@@ -4431,12 +4032,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:109
 msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, "
-"your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at "
-"least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your "
-"fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
 "It also depends on the typical uptime for your application."
 msgstr ""
 
@@ -4447,8 +4045,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:120
 msgid ""
 "Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your "
-"source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
 "Be aware of possible blocking by hostile governments."
 msgstr ""
 
@@ -4458,12 +4055,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:130
 msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle "
-"and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement "
-"some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the "
-"tunnel, even in the presence of some background DHT activity."
+"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:138
@@ -4472,16 +4066,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:139
 msgid ""
-"Have an auto-update feature if at all possible, or at least auto-"
-"notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be "
-"updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical "
-"to the health of the network that the users keep up.\n"
-"We usually have over 80&#37; of the network on the latest release within "
-"6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update"
-" function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
+"We usually have over 80&#37; of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
 "which you presumably are not bundling."
 msgstr ""
 
@@ -4492,17 +4081,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:151
 msgid ""
 "Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques "
-"per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much "
-"issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth "
-"distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is "
-"significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
 "we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this "
-"checklist is."
+"The bigger your growth plans, the more important everthing else in this checklist is."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:163
@@ -4512,10 +4096,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:164
 msgid ""
 "Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even "
-"more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong "
-"solution."
+"It may be several minutes after startup before it works well, and even more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong solution."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:172
@@ -4524,8 +4106,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:173
 msgid ""
-"Provide some indication to the user that the application tunnels are "
-"ready. Encourage patience."
+"Provide some indication to the user that the application tunnels are ready. "
+"Encourage patience."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:178
@@ -4535,8 +4117,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:179
 msgid ""
 "If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to "
-"confirm."
+"Don't let your users break tunnels easily, or at least ask them to confirm."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:185
@@ -4545,8 +4126,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:186
 msgid ""
-"It would be nice if you give your users links to learn more about I2P and"
-" to donate."
+"It would be nice if you give your users links to learn more about I2P and to"
+" donate."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:192
@@ -4556,8 +4137,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:193
 msgid ""
 "Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an "
-"external router."
+"it may be helpful to provide an option or a separate package to use an external router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:200
@@ -4566,8 +4146,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:201
 msgid ""
-"If you plan to use or link to other common I2P services (news feeds, "
-"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
 "make sure you aren't overloading them,\n"
 "and talk to the people who are running them to make sure it's ok."
 msgstr ""
@@ -4579,10 +4158,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:210
 msgid ""
 "I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. "
-"You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system "
-"clock is correct."
+"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system clock is correct."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:218
@@ -4591,41 +4168,30 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:219
 msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
-"mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
 "You may omit the two streaming jars for a datagram-only app.\n"
 "Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
-"to make the crypto much faster.\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
 "Java 7 or higher is required to build.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P "
-"package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, "
-"and i2psnark, for example."
+"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:228
 msgid ""
-"The following files should be included in the I2P installation directory,"
-" specified with the \"i2p.dir.base\" property.\n"
-"Don't forget the certificates/ directory, which is required for "
-"reseeding, and blocklist.txt for IP validation.\n"
-"The geoip directory is optional, but recommended so the router can make "
-"decisions based on location.\n"
-"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that"
-" directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz)."
-"\n"
-"The hosts.txt file may be necessary, you may modify it to include any "
-"hosts your application uses.\n"
-"You may add a router.config file to the base directory to override "
-"initial defaults.\n"
+"The following files should be included in the I2P installation directory, specified with the \"i2p.dir.base\" property.\n"
+"Don't forget the certificates/ directory, which is required for reseeding, and blocklist.txt for IP validation.\n"
+"The geoip directory is optional, but recommended so the router can make decisions based on location.\n"
+"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz).\n"
+"The hosts.txt file may be necessary, you may modify it to include any hosts your application uses.\n"
+"You may add a router.config file to the base directory to override initial defaults.\n"
 "Review and edit or remove the clients.config and i2ptunnel.config files."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:237
 msgid ""
-"License requirements may require you to include the LICENSES.txt file and"
-" the licenses directory."
+"License requirements may require you to include the LICENSES.txt file and "
+"the licenses directory."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:243
@@ -4643,17 +4209,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:255
 msgid ""
 "Our Android router app may be shared by multiple clients.\n"
-"If it is not installed, the user will be prompted when he starts a client"
-" app."
+"If it is not installed, the user will be prompted when he starts a client app."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:259
 msgid ""
-"Some developers have expressed concern that this is a poor user "
-"experience,\n"
+"Some developers have expressed concern that this is a poor user experience,\n"
 "and they wish to embed the router in their app.\n"
-"We do have an Android router service library on our roadmap, which could "
-"make embedding easier.\n"
+"We do have an Android router service library on our roadmap, which could make embedding easier.\n"
 "More information needed."
 msgstr ""
 
@@ -4668,11 +4231,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:272
 msgid ""
-"We have a limited number of our jars on <a "
-"href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven"
-" Central</a>.\n"
-"There are numerous trac tickets for us to address that will improve and "
-"expand the released jars on Maven Central."
+"We have a limited number of our jars on <a href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven Central</a>.\n"
+"There are numerous trac tickets for us to address that will improve and expand the released jars on Maven Central."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:282
@@ -4682,17 +4242,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:283
 msgid ""
 "If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and "
-"increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and increase reliability.\n"
 "This may take some time and experimentation to get working well.\n"
 "Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the "
-"same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
 "Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs "
-"(iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you "
-"have several."
+"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:296
@@ -4702,8 +4258,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:297
 msgid ""
 "Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return "
-"the favor."
+"Give us your Twitter handle and start tweeting about it, we will return the favor."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:303
@@ -4722,8 +4277,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:311
 msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an I2P "
-"Site about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project.\n"
 "Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
 "We can help get you users, testers, translators, or even coders."
 msgstr ""
@@ -4734,12 +4288,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:320
 msgid ""
-"You may wish to install and play with the I2P Android app, and look at "
-"its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
 "See what we expose to the user and what we hide.\n"
 "Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
-" and Monero."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:328
@@ -4754,10 +4306,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:359
 msgid ""
-"This code is for the case where your application starts the router, as in"
-" our Android app.\n"
-"You could also have the router start the application via the "
-"clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in our Android app.\n"
+"You could also have the router start the application via the clients.config and i2ptunnel.config files,\n"
 "together with Jetty webapps,\n"
 "as is done in our Java packages.\n"
 "As always, state management is the difficult part."
@@ -4775,13 +4325,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:7
 msgid ""
-"Cloning large software repositories over I2P can be difficult, and using "
-"git can sometimes make this harder. Fortunately, it can also sometimes "
-"make it easier. Git has a <code>git bundle</code> command which can be "
-"used to turn a git repository into a file which git can then clone, "
-"fetch, or import from a location on your local disk. By combining this "
-"capability with bittorrent downloads, we can solve our remaining problems"
-" with <code>git clone</code>."
+"Cloning large software repositories over I2P can be difficult, and using git"
+" can sometimes make this harder. Fortunately, it can also sometimes make it "
+"easier. Git has a <code>git bundle</code> command which can be used to turn "
+"a git repository into a file which git can then clone, fetch, or import from"
+" a location on your local disk. By combining this capability with bittorrent"
+" downloads, we can solve our remaining problems with <code>git clone</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:8
@@ -4790,13 +4339,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:9
 msgid ""
-"If you intend to generate a git bundle, you <strong>must</strong> already"
-" possess a full copy of the <strong>git</strong> repository, not the mtn "
-"repository. You can get it from github or from git.idk.i2p, but a shallow"
-" clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will"
-" fail silently, creating what looks like a bundle, but when you try to "
-"clone it it will fail. If you are just retrieving a pre-generated git "
-"bundle, then this section does not apply to you."
+"If you intend to generate a git bundle, you <strong>must</strong> already "
+"possess a full copy of the <strong>git</strong> repository, not the mtn "
+"repository. You can get it from github or from git.idk.i2p, but a shallow "
+"clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will "
+"fail silently, creating what looks like a bundle, but when you try to clone "
+"it it will fail. If you are just retrieving a pre-generated git bundle, then"
+" this section does not apply to you."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:10
@@ -4806,23 +4355,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git-bundle.html:11
 msgid ""
 "Someone will need to supply you with a torrent file or a magnet link "
-"corresponding to an existing <code>git bundle</code> that they have "
-"already generated for you. A recent, correctly-generated bundle of the "
-"mainline i2p.i2p source code as-of Wednesday, March 18, 2020, can be "
-"found inside of I2P at my pastebin <a "
+"corresponding to an existing <code>git bundle</code> that they have already "
+"generated for you. A recent, correctly-generated bundle of the mainline "
+"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside of "
+"I2P at my pastebin <a "
 "href=\"http://paste.idk.i2p/f/4h137i\">paste.idk.i2p/f/4hq37i</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:12
 msgid ""
 "Once you have a bundle, you will need to use git to create a working "
-"repository from it. If you’re using GNU/Linux and i2psnark, the git "
-"bundle should be located in $HOME/.i2p/i2psnark or, as a service on "
-"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on "
-"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/” instead. The "
-"examples here assume I2PSnark on GNU/Linux, if you use something else, "
-"replace the path to the bundle with the download directory preferred by "
-"your client and platform."
+"repository from it. If you’re using GNU/Linux and i2psnark, the git bundle "
+"should be located in $HOME/.i2p/i2psnark or, as a service on Debian, "
+"/var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on GNU/Linux, it "
+"is probably at “$HOME/BiglyBT Downloads/” instead. The examples here assume "
+"I2PSnark on GNU/Linux, if you use something else, replace the path to the "
+"bundle with the download directory preferred by your client and platform."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:13
@@ -4835,8 +4383,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:16
 msgid ""
-"If you get the following error, try using git init and git fetch manually"
-" instead."
+"If you get the following error, try using git init and git fetch manually "
+"instead."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:18
@@ -4871,10 +4419,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:29
 msgid ""
-"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you "
-"have a successfully <code>--unshallow</code>ed clone of clone of the "
-"i2p.i2p repository. If you already have a clone, make sure you run "
-"<code>git fetch --unshallow</code> before you generate a torrent bundle."
+"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you have "
+"a successfully <code>--unshallow</code>ed clone of clone of the i2p.i2p "
+"repository. If you already have a clone, make sure you run <code>git fetch "
+"--unshallow</code> before you generate a torrent bundle."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:30
@@ -4883,8 +4431,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:32
 msgid ""
-"and copy the resulting bundle into your I2PSnark downloads directory. For"
-" instance:"
+"and copy the resulting bundle into your I2PSnark downloads directory. For "
+"instance:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:34
@@ -4895,14 +4443,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:7
 msgid ""
-"Tutorial for setting up git access through an I2P Tunnel. This tunnel "
-"will act as your access point to a single git service on I2P."
+"Tutorial for setting up git access through an I2P Tunnel. This tunnel will "
+"act as your access point to a single git service on I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:8
 msgid ""
-"If you intend to use the service at i2pgit.org/git.idk.i2p, then you "
-"probably already have a tunnel configured and much of this\n"
+"If you intend to use the service at i2pgit.org/git.idk.i2p, then you probably already have a tunnel configured and much of this\n"
 "tutorial will not apply to you."
 msgstr ""
 
@@ -4913,22 +4460,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git.html:11
 msgid ""
 "To create your repositories on a remote git service, sign up for a user "
-"account at that service. Of course it’s also possible to create "
-"repositories locally and push them to a remote git service, but most will"
-" require an account and for you to create a space for the repository on "
-"the server. Gitlab has a very simple sign-up form:"
+"account at that service. Of course it’s also possible to create repositories"
+" locally and push them to a remote git service, but most will require an "
+"account and for you to create a space for the repository on the server. "
+"Gitlab has a very simple sign-up form:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:12
 msgid ""
-"These are generic instructions for any in-i2p Git instance with HTTP and "
-"SSH gateways.\n"
-"If you intend to contribute to I2P, you should create an account at the "
-"I2P gitlab, which is open to the\n"
-"community. Account registration may take a few days to complete, as the "
-"admin needs to sort through a large\n"
-"number of spam registrations. You can help this by getting in touch with "
-"the admin to confirm you are human\n"
+"These are generic instructions for any in-i2p Git instance with HTTP and SSH gateways.\n"
+"If you intend to contribute to I2P, you should create an account at the I2P gitlab, which is open to the\n"
+"community. Account registration may take a few days to complete, as the admin needs to sort through a large\n"
+"number of spam registrations. You can help this by getting in touch with the admin to confirm you are human\n"
 "using the instructions on the home page."
 msgstr ""
 
@@ -4942,10 +4485,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:27
 msgid ""
-"To make sure the setup process works, it helps to make a repository to "
-"test with from the server, and for the sake of this tutorial, we’re going"
-" to use a fork of the I2P router. First, browse to the i2p-"
-"hackers/i2p.i2p repository:"
+"To make sure the setup process works, it helps to make a repository to test "
+"with from the server, and for the sake of this tutorial, we’re going to use "
+"a fork of the I2P router. First, browse to the i2p-hackers/i2p.i2p "
+"repository:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:34
@@ -4954,20 +4497,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:42
 msgid ""
-"To have read-write access to my server, you’ll need to set up a tunnel "
-"for your SSH client. As an example, we’re going to use the HTTP tunnel "
-"instead, but if all you need is read-only, HTTP/S cloning, then you can "
-"skip all this and just use the http_proxy environment variable to "
-"configure git to use the pre-configured I2P HTTP Proxy. For example:"
+"To have read-write access to my server, you’ll need to set up a tunnel for "
+"your SSH client. As an example, we’re going to use the HTTP tunnel instead, "
+"but if all you need is read-only, HTTP/S cloning, then you can skip all this"
+" and just use the http_proxy environment variable to configure git to use "
+"the pre-configured I2P HTTP Proxy. For example:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:50
 msgid ""
-"Then, add the address you will be pushing and pulling from. Note that "
-"this example address is for Read-Only HTTP-over-I2P clones, if your admin"
-" does not allow the git HTTP(Smart HTTP) protocol, then you will need to "
-"get the SSH clone base32 from them. If you have an SSH clone base32, "
-"substitute it for the base32 in this step, which will fail."
+"Then, add the address you will be pushing and pulling from. Note that this "
+"example address is for Read-Only HTTP-over-I2P clones, if your admin does "
+"not allow the git HTTP(Smart HTTP) protocol, then you will need to get the "
+"SSH clone base32 from them. If you have an SSH clone base32, substitute it "
+"for the base32 in this step, which will fail."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:54
@@ -4995,8 +4538,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git.html:68
 msgid ""
 "Git Privacy: Committing to git adds a timestamp to git commit messages, "
-"which may be configured to reflect your local time zone. To enforce the "
-"use of UTC for all commits, you are advised to use a git alias, such as:"
+"which may be configured to reflect your local time zone. To enforce the use "
+"of UTC for all commits, you are advised to use a git alias, such as:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:70
@@ -5014,33 +4557,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git.html:78
 msgid ""
 "You might get an error where the remote end hangs up unexpectedly. "
-"Unfortunately git still doesn’t support resumable cloning. Until it does,"
-" there are a couple fairly easy ways to handle this. The first and "
-"easiest is to try and clone to a shallow depth:"
+"Unfortunately git still doesn’t support resumable cloning. Until it does, "
+"there are a couple fairly easy ways to handle this. The first and easiest is"
+" to try and clone to a shallow depth:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:81
 msgid ""
-"Once you’ve performed a shallow clone, you can fetch the rest resumably "
-"by changing to the repo directory and running:"
+"Once you’ve performed a shallow clone, you can fetch the rest resumably by "
+"changing to the repo directory and running:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:83
 msgid ""
-"At this point, you still don’t have all your branches yet. You can get "
-"them by running the following commands:"
+"At this point, you still don’t have all your branches yet. You can get them "
+"by running the following commands:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:86
 msgid ""
-"Which tells git to alter the repository configuration so that fetching "
-"from origin fetches all branches."
+"Which tells git to alter the repository configuration so that fetching from "
+"origin fetches all branches."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:87
 msgid ""
-"If that doesn’t work, you can try opening the tunnel configuration menu "
-"and adding some backup tunnels."
+"If that doesn’t work, you can try opening the tunnel configuration menu and "
+"adding some backup tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:91
@@ -5058,26 +4601,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:96
 msgid ""
-"Revision control can make your life easier, but it works best if you use "
-"it well! In light of this, we strongly suggest a fork-first, feature-"
-"branch workflow as many are familiar with from Github. In such a "
-"workflow, the master branch is used as a sort of “Trunk” for updates and "
-"is never touched by the programmmer, instead, all changes to the master "
-"are merged from branches. In order to do set up your workspace for this, "
-"take the following steps:"
+"Revision control can make your life easier, but it works best if you use it "
+"well! In light of this, we strongly suggest a fork-first, feature-branch "
+"workflow as many are familiar with from Github. In such a workflow, the "
+"master branch is used as a sort of “Trunk” for updates and is never touched "
+"by the programmmer, instead, all changes to the master are merged from "
+"branches. In order to do set up your workspace for this, take the following "
+"steps:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:98
 msgid ""
-"<strong>Never make changes to the Master Branch</strong>. You will be "
-"using the master branch to periodially obtain updates to the official "
-"source code. All changes should be made in feature branches."
+"<strong>Never make changes to the Master Branch</strong>. You will be using "
+"the master branch to periodially obtain updates to the official source code."
+" All changes should be made in feature branches."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:101
 msgid ""
-"Set up a second remote in your local repository using the upstream source"
-" code."
+"Set up a second remote in your local repository using the upstream source "
+"code."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:103
@@ -5086,33 +4629,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:105
 msgid ""
-"Before making any changes to the source code, check out a new feature "
-"branch to develop on:"
+"Before making any changes to the source code, check out a new feature branch"
+" to develop on:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:107
 msgid ""
-"When you’re done with your changes, commit them and push them to your "
-"branch"
+"When you’re done with your changes, commit them and push them to your branch"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:110
 msgid ""
-"Submit a merge request. When the merge request is approved and brought "
-"into the upstream master, check out the master locally and pull in the "
-"changes:"
+"Submit a merge request. When the merge request is approved and brought into "
+"the upstream master, check out the master locally and pull in the changes:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:113
 msgid ""
-"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, "
-"you can update your master code using this procedure as well."
+"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, you "
+"can update your master code using this procedure as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:117
 msgid ""
-"The git utccommit alias solution to git timestamp issue was arrived at "
-"from the information first published here"
+"The git utccommit alias solution to git timestamp issue was arrived at from "
+"the information first published here"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:6
@@ -5121,22 +4662,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:7
 msgid ""
-"Mirror I2P Git repositories and Bridge Non-private internet.repositories "
-"for others."
+"Mirror I2P Git repositories and Bridge Non-private internet.repositories for"
+" others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:10
 msgid ""
-"This is the setup process I use for configuring Gitlab and I2P, with "
-"Docker in place to manage the service itself. Gitlab is very easy to host"
-" on I2P in this fashion, it can be administered by one person without "
-"much difficulty. In my configuration, I use a Debian VM to host docker "
-"containers and an I2P router, on a Debian Host system, however, this may "
-"be more than necessary for some people. These instructions should work on"
-" any Debian-based system, regardless of whether it is in a VM or not, and"
-" should easily translate to any system where Docker and an I2P router are"
-" available. This guide starts at Docker and does not assume any VM "
-"underneath."
+"This is the setup process I use for configuring Gitlab and I2P, with Docker "
+"in place to manage the service itself. Gitlab is very easy to host on I2P in"
+" this fashion, it can be administered by one person without much difficulty."
+" In my configuration, I use a Debian VM to host docker containers and an I2P"
+" router, on a Debian Host system, however, this may be more than necessary "
+"for some people. These instructions should work on any Debian-based system, "
+"regardless of whether it is in a VM or not, and should easily translate to "
+"any system where Docker and an I2P router are available. This guide starts "
+"at Docker and does not assume any VM underneath."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:11
@@ -5145,15 +4685,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:12
 msgid ""
-"Because Gitlab runs in a container, we only need to install the "
-"dependencies required for the container on our main system. Conveniently,"
-" you can install everything you need with:"
+"Because Gitlab runs in a container, we only need to install the dependencies"
+" required for the container on our main system. Conveniently, you can "
+"install everything you need with:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:14
 msgid ""
-"on an otherwise unmodified Debian system, or if you have added Docker’s "
-"own “Community” Debian repository, you may use:"
+"on an otherwise unmodified Debian system, or if you have added Docker’s own "
+"“Community” Debian repository, you may use:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:16
@@ -5166,62 +4706,61 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:18
 msgid ""
-"Once you have docker installed, you can fetch the docker containers "
-"required for gitlab. <em>Don’t run them yet.</em>"
+"Once you have docker installed, you can fetch the docker containers required"
+" for gitlab. <em>Don’t run them yet.</em>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:20
 msgid ""
-"For those who are concerned, the gitlab-ce Docker image is built using "
-"only Ubuntu Docker images as a parent, which are built from scratch "
-"images. Since there are no third-party images involved here, updates "
-"should come as soon as they are available in the host images. To review "
-"the Dockerfile for yourself, visit the <a href=\"https://gitlab.com"
-"/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile\">Gitlab "
-"source code</a>."
+"For those who are concerned, the gitlab-ce Docker image is built using only "
+"Ubuntu Docker images as a parent, which are built from scratch images. Since"
+" there are no third-party images involved here, updates should come as soon "
+"as they are available in the host images. To review the Dockerfile for "
+"yourself, visit the <a href=\"https://gitlab.com/gitlab-org/omnibus-"
+"gitlab/-/blob/master/docker/Dockerfile\">Gitlab source code</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:21
 msgid ""
-"Set up an I2P HTTP Proxy for Gitlab to use(Important information, "
-"optional steps)"
+"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional "
+"steps)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:22
 msgid ""
 "Gitlab servers inside of I2P can be run with or without the ability to "
-"interact with servers on the internet outside of I2P. In the case where "
-"the Gitlab server is <em>not allowed</em> to interact with servers "
-"outside of I2P, they cannot be de-anonymized by cloning a git repository "
-"from a git server on the internet outside of I2P. They can, however, "
-"export and mirror repositories from other git services inside of I2P."
+"interact with servers on the internet outside of I2P. In the case where the "
+"Gitlab server is <em>not allowed</em> to interact with servers outside of "
+"I2P, they cannot be de-anonymized by cloning a git repository from a git "
+"server on the internet outside of I2P. They can, however, export and mirror "
+"repositories from other git services inside of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:23
 msgid ""
 "In the case where the Gitlab server is <em>allowed</em> to interact with "
-"servers outside of I2P, it can act as a “Bridge” for the users, who can "
-"use it to mirror content outside I2P to an I2P-accessible source, however"
-" it <em>is not anonymous</em> in this case. Git services on the non-"
-"anonymous internet will be connected to directly."
+"servers outside of I2P, it can act as a “Bridge” for the users, who can use "
+"it to mirror content outside I2P to an I2P-accessible source, however it "
+"<em>is not anonymous</em> in this case. Git services on the non-anonymous "
+"internet will be connected to directly."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:24
 msgid ""
-"<strong>If you want to have a bridged, non-anonymous Gitlab instance with"
-" access to</strong> <strong>web repositories,</strong> no further "
+"<strong>If you want to have a bridged, non-anonymous Gitlab instance with "
+"access to</strong> <strong>web repositories,</strong> no further "
 "modification is necessary."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:25
 msgid ""
-"<strong>If you want to have an I2P-Only Gitlab instance with no access to"
-" Web-Only</strong> <strong>Repositories</strong>, you will need to "
-"configure Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP "
-"proxy only listens on <code>127.0.0.1</code>, you will need to set up a "
-"new one for Docker that listens on the Host/Gateway address of the Docker"
-" network, which is usually <code>172.17.0.1</code>. I configure mine on "
-"port <code>4446</code>."
+"<strong>If you want to have an I2P-Only Gitlab instance with no access to "
+"Web-Only</strong> <strong>Repositories</strong>, you will need to configure "
+"Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP proxy only "
+"listens on <code>127.0.0.1</code>, you will need to set up a new one for "
+"Docker that listens on the Host/Gateway address of the Docker network, which"
+" is usually <code>172.17.0.1</code>. I configure mine on port "
+"<code>4446</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:26
@@ -5237,8 +4776,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/gitlab.html:37
 msgid ""
 "Visit your Local Gitlab instance and set up your admin account. Choose a "
-"strong password, and configure user account limits to match your "
-"resources."
+"strong password, and configure user account limits to match your resources."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:38
@@ -5249,21 +4787,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:39
 msgid ""
-"It’s also possible to apply your HTTP Proxy settings in a more granular "
-"way, so that you can only allow users to mirror repositories from the "
-"domains that you choose. Since the domain is presumably operated by an "
-"organization, you can use this to ensure that repositories that are "
-"mirrorable follow a reasonable set of policies. After all, there is far "
-"more abusive content on the non-anonymous internet than there is on I2P, "
-"we wouldn’t want to make it too easy to introduce abusive content from "
-"such a nefarious place."
+"It’s also possible to apply your HTTP Proxy settings in a more granular way,"
+" so that you can only allow users to mirror repositories from the domains "
+"that you choose. Since the domain is presumably operated by an organization,"
+" you can use this to ensure that repositories that are mirrorable follow a "
+"reasonable set of policies. After all, there is far more abusive content on "
+"the non-anonymous internet than there is on I2P, we wouldn’t want to make it"
+" too easy to introduce abusive content from such a nefarious place."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:40
 msgid ""
-"Add the following lines to your gitlab.rb file inside the "
-"/src/gitlab/config container. These settings will take effect when you "
-"restart in a moment."
+"Add the following lines to your gitlab.rb file inside the /src/gitlab/config"
+" container. These settings will take effect when you restart in a moment."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:56
@@ -5272,10 +4808,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:57
 msgid ""
-"Once you have Gitlab set up locally, go to the I2P Router console. You "
-"will need to set up two server tunnels, one leading to the Gitlab "
-"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH interface"
-" on TCP Port 8022."
+"Once you have Gitlab set up locally, go to the I2P Router console. You will "
+"need to set up two server tunnels, one leading to the Gitlab web(HTTP) "
+"interface on TCP port 8080, and one to the Gitlab SSH interface on TCP Port "
+"8022."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:58
@@ -5286,8 +4822,7 @@ msgstr ""
 msgid ""
 "For the Web interface, use an “HTTP” server tunnel. From <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" launch the “New Tunnel Wizard” and enter the following values at each "
-"step:"
+" launch the “New Tunnel Wizard” and enter the following values at each step:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:61
@@ -5305,8 +4840,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:64
 msgid ""
-"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the"
-" port."
+"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the "
+"port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:65
@@ -5325,19 +4860,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:69
 msgid ""
-"Web services on I2P can register hostnames for themselves by providing an"
-" authentication string to a jump service provider like <a "
+"Web services on I2P can register hostnames for themselves by providing an "
+"authentication string to a jump service provider like <a "
 "href=\"http://stats.i2p\">stats.i2p</a>. To do this, open the <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" again and click on the “Gitlab Web Service” item you just set up. Scroll"
-" to the bottom of the “Edit Server Settings” section and click "
-"Registration Authentication. Copy the field that says “Authentication for"
-" adding Hostname” and visit <a "
+" again and click on the “Gitlab Web Service” item you just set up. Scroll to"
+" the bottom of the “Edit Server Settings” section and click Registration "
+"Authentication. Copy the field that says “Authentication for adding "
+"Hostname” and visit <a "
 "href=\"http://stats.i2p/i2p/addkey.html\">stats.i2p</a> to add your "
-"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then"
-" you will have to use the correct authentication string for your "
-"subdomain, which is a little bit more complicated and merits it’s own "
-"instructions."
+"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then "
+"you will have to use the correct authentication string for your subdomain, "
+"which is a little bit more complicated and merits it’s own instructions."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:70
@@ -5348,8 +4882,7 @@ msgstr ""
 msgid ""
 "For the SSH interface, use a “Standard” server tunnel. From <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" launch the “New Tunnel Wizard” and enter the following values at each "
-"step:"
+" launch the “New Tunnel Wizard” and enter the following values at each step:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:74
@@ -5362,8 +4895,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:76
 msgid ""
-"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the"
-" port."
+"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the "
+"port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:80
@@ -5372,9 +4905,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:81
 msgid ""
-"Finally, if you either modified <code>gitlab.rb</code> or you registered "
-"a hostname, you will need to re-start the gitlab service for the settings"
-" to take effect."
+"Finally, if you either modified <code>gitlab.rb</code> or you registered a "
+"hostname, you will need to re-start the gitlab service for the settings to "
+"take effect."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:2
@@ -5392,20 +4925,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:15
 msgid ""
 " There are many IRC clients that can be used with I2P. In\n"
-"fact, all IRC clients can be connected to the Irc2P Service by connecting"
-"\n"
+"fact, all IRC clients can be connected to the Irc2P Service by connecting\n"
 "them to the IRC Tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:28
 msgid ""
 "To configure any IRC client to chat on Irc2P, first, make sure that\n"
-"your IRC tunnel is available. Visit the <a "
-"href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n"
-"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" "
-"indicator on\n"
-"the right-hand side is yellow or green, your Irc2P tunnel is ready and "
-"you should \n"
+"your IRC tunnel is available. Visit the <a href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n"
+"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" indicator on\n"
+"the right-hand side is yellow or green, your Irc2P tunnel is ready and you should \n"
 "proceed to the next step."
 msgstr ""
 
@@ -5422,12 +4951,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:42
 msgid ""
 "Pidgin is a very popular Instant Messaging client with built-in IRC\n"
-"support. It is also possible to use it with many other kinds of chat "
-"service, and\n"
-"it supports using multiple accounts at once and has a variety of plugin-"
-"ins. There\n"
-"is a similar application for OSX called \"Adium.\" The instructions for "
-"Pidgin are\n"
+"support. It is also possible to use it with many other kinds of chat service, and\n"
+"it supports using multiple accounts at once and has a variety of plugin-ins. There\n"
+"is a similar application for OSX called \"Adium.\" The instructions for Pidgin are\n"
 "similar in Adium.\n"
 msgstr ""
 
@@ -5443,8 +4969,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:52
 msgid ""
 "After launching Pidgin, you should see a \"Buddy List\" window. From\n"
-"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage"
-" Accounts\" to\n"
+"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage Accounts\" to\n"
 "begin configuring your I2P account."
 msgstr ""
 
@@ -5459,10 +4984,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:59
 msgid ""
 "Click the \"Add\" button. In the window that opens, select \"IRC\" under\n"
-"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and"
-" password. IRC\n"
-"does not require you to register a nickname to join, but you may if you "
-"wish, after\n"
+"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and password. IRC\n"
+"does not require you to register a nickname to join, but you may if you wish, after\n"
 "you connect to Irc2P."
 msgstr ""
 
@@ -5477,8 +5000,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:67
 msgid ""
 "Navigate to the \"Advanced\" tab and set the \"Port\" field to 6668 and\n"
-"make sure that SSL is <em>disabled</em>, since your tunnel has encryption"
-" provided\n"
+"make sure that SSL is <em>disabled</em>, since your tunnel has encryption provided\n"
 "by I2P."
 msgstr ""
 
@@ -5522,8 +5044,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:87
 msgid ""
 "Change the value in \"Servers\" from the default to `localhost/6669`,\n"
-"and configure the default channels you want to join. I suggest #i2p and "
-"#i2p-dev\n"
+"and configure the default channels you want to join. I suggest #i2p and #i2p-dev\n"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:92
@@ -5623,8 +5144,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:143
 msgid ""
 "Revolution IRC is an easy to use IRC client for Android. It's able to\n"
-"handle multiple accounts on multiple services, so you can use it for "
-"Irc2P and for\n"
+"handle multiple accounts on multiple services, so you can use it for Irc2P and for\n"
 "your non-I2P IRC networks as well."
 msgstr ""
 
@@ -5685,15 +5205,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:196
 msgid ""
 "Eris is an easy-to-configure IRC server with self-configuring support\n"
-"for I2P. If you want to run a private IRC server it's one of the easiest "
-"ways."
+"for I2P. If you want to run a private IRC server it's one of the easiest ways."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:199
 msgid ""
 " This is a valid configuration of the Eris IRC server, but it uses a\n"
-"default password for the admin account(admin). You should change the "
-"operator.admin.password\n"
+"default password for the admin account(admin). You should change the operator.admin.password\n"
 "and account.admin.password before deploying to a real service."
 msgstr ""
 
@@ -5718,24 +5236,18 @@ msgstr ""
 msgid ""
 "As of release 0.9.4, the router supports managed clients.\n"
 "Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives "
-"updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state "
-"tracking\n"
-"and to start and stop a client. It also is much easier to avoid static "
-"references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state tracking\n"
+"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
 "which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router "
-"console,\n"
+"Managed clients may be started and stopped by the user in the router console,\n"
 "and are stopped at router shutdown."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:31
 msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or "
-"net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following "
-"constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following constructor:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:38
@@ -5754,12 +5266,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:49
 msgid ""
-"If the main class specified in the clients.config file does not implement"
-" a managed interface,\n"
+"If the main class specified in the clients.config file does not implement a managed interface,\n"
 "it will be started with main() with the arguments specified,\n"
 "and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via "
-"the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via the static main() method.\n"
 "The console cannot provide accurate state information to the user."
 msgstr ""
 
@@ -5769,8 +5279,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:58
 msgid ""
-"Clients, whether managed or unmanaged, may register with the "
-"ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
 "so that other clients may retrieve a reference to them.\n"
 "Registration is by name.\n"
 "Known registered clients are:"
@@ -5782,12 +5291,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:69
 msgid ""
-"The router also provides a simple mechanism for clients to find an "
-"internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an internal socket service,\n"
 "such as the HTTP proxy. This is provided by the Port Mapper.\n"
 "Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on "
-"that port."
+"Clients that register generally provide an internal emulated socket on that port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:2
@@ -5797,8 +5304,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:4
 #, python-format
 msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming "
-"system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
 "common arguments and possible alternatives.\n"
 "See <a href=\"%(naming)s\">the naming page</a> for current documentation."
 msgstr ""
@@ -5809,72 +5315,49 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:12
 msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning "
-"with\n"
-"advocates across the spectrum of possibilities.  However, given I2P's "
-"inherent\n"
-"demand for secure communication and decentralized operation, the "
-"traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting "
-"systems."
+"Naming within I2P has been an oft-debated topic since the very beginning with\n"
+"advocates across the spectrum of possibilities.  However, given I2P's inherent\n"
+"demand for secure communication and decentralized operation, the traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:19
 msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage "
-"done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no"
-"\n"
-"value.  DNSsec itself still falls back on registrars and certificate "
-"authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or "
-"the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a "
-"destination\n"
-"itself is just a pair of public keys and a certificate.  DNS-style "
-"systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount "
-"simple denial\n"
-"of service and spoofing attacks.  Adding on a certificate authenticating "
-"the\n"
-"responses as signed by some centralized certificate authority would "
-"address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well"
-" as \n"
+"I2P does not promote the use of DNS-like services though, as the damage done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no\n"
+"value.  DNSsec itself still falls back on registrars and certificate authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
+"itself is just a pair of public keys and a certificate.  DNS-style systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount simple denial\n"
+"of service and spoofing attacks.  Adding on a certificate authenticating the\n"
+"responses as signed by some centralized certificate authority would address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well as \n"
 "hostile certificate authority attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:33
 msgid ""
-"Voting style naming is dangerous as well, especially given the "
-"effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an "
-"arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name.  "
-"Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows "
-"the load\n"
-"required to contact everyone to conduct online voting is implausible, or "
-"if the\n"
+"Voting style naming is dangerous as well, especially given the effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name.  Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows the load\n"
+"required to contact everyone to conduct online voting is implausible, or if the\n"
 "full network is not queried, different sets of answers may be reachable."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:42
 msgid ""
-"As with the Internet however, I2P is keeping the design and operation of "
-"a \n"
-"naming system out of the (IP-like) communication layer.  The bundled "
-"naming library\n"
-"includes a simple service provider interface which <a "
-"href=\"#alternatives\">alternate naming systems</a> can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they"
-" prefer."
+"As with the Internet however, I2P is keeping the design and operation of a \n"
+"naming system out of the (IP-like) communication layer.  The bundled naming library\n"
+"includes a simple service provider interface which <a href=\"#alternatives\">alternate naming systems</a> can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:50
 msgid ""
-"See also <a href=\"https://zooko.com/distnames.html\">Names: "
-"Decentralized, Secure, Human-Meaningful: Choose Two</a>."
+"See also <a href=\"https://zooko.com/distnames.html\">Names: Decentralized, "
+"Secure, Human-Meaningful: Choose Two</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:55
@@ -5885,36 +5368,26 @@ msgstr ""
 msgid ""
 "Q:\n"
 "What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are"
-" not? \n"
+"do not agree on one address and if some addresses are working, others are not? \n"
 "Who is the right source of a name?"
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:64
 msgid ""
 "A:\n"
-"You don't. This is actually a critical difference between names on I2P "
-"and how \n"
-"DNS works - names in I2P are human readable, secure, but <b>not globally"
-" \n"
-"unique</b>.  This is by design, and an inherent part of our need for "
-"security."
+"You don't. This is actually a critical difference between names on I2P and how \n"
+"DNS works - names in I2P are human readable, secure, but <b>not globally \n"
+"unique</b>.  This is by design, and an inherent part of our need for security."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:70
 msgid ""
-"If I could somehow convince you to change the destination associated with"
-" some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances"
-" is that \n"
-"acceptable.  Instead, what we do is make names <b>locally unique</b>: "
-"they are \n"
-"what <i>you</i> use to call a site, just as how you can call things "
-"whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM "
-"client's \n"
-"buddy list.  Who you call \"Boss\" may be who someone else calls "
-"\"Sally\"."
+"If I could somehow convince you to change the destination associated with some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
+"acceptable.  Instead, what we do is make names <b>locally unique</b>: they are \n"
+"what <i>you</i> use to call a site, just as how you can call things whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM client's \n"
+"buddy list.  Who you call \"Boss\" may be who someone else calls \"Sally\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:78
@@ -5930,44 +5403,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:89
 msgid ""
 "<b>Inefficiency:</b>\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
-"the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
 "It's about 400K right now for almost 800 hosts."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:94
 msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is "
-"itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic "
-"routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it "
-"averages out to about 10 bytes/sec."
+"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:99
 msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here "
-"between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous"
-" because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
 "last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump"
-" services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
 "in a more automated fashion), possibly at a further cost in anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:106
 #, python-format
 msgid ""
-"Possible improvements would be a replacement or supplement to address "
-"book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n"
-"or something simple like subscribing to http://example.i2p/cgi-"
-"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
-"hours, for example,\n"
-"that could be both more efficient and more anonymous than the current "
-"hosts.txt with last-modified and etag."
+"Possible improvements would be a replacement or supplement to address book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n"
+"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
+"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:112
@@ -5977,17 +5439,14 @@ msgid ""
 "<a href=\"%(url)s\">%(url)s</a>.\n"
 "This script returns an Etag with a timestamp.\n"
 "When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not "
-"Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber"
-"\n"
+"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber\n"
 "does not know about, in an address book-compatible manner."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:121
 msgid ""
-"So the inefficiency is not a big issue and there are several ways to "
-"improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to improve things without\n"
 "radical change."
 msgstr ""
 
@@ -6001,38 +5460,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:132
 msgid ""
 "As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for"
-"\n"
-"a key, you need to have the whole set of keys stored locally, at a cost "
-"of about 500 bytes per key."
+"But unless you're going to do a slow real-time query over the network for\n"
+"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:139
 msgid ""
 "<b>Requires configuration and \"trust\":</b>\n"
-"Out-of-the-box address book is only subscribed to "
-"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box address book is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
 "leading to poor new-user experience."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:144
 msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a "
-"hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
 "provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of "
-"trust in an anonymous network."
+"The configuration step attempts to force users to think about issues of trust in an anonymous network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:149
 msgid ""
-"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy"
-"\n"
-"lists some jump services, but doesn't \"recommend\" any one in "
-"particular,\n"
+"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy\n"
+"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
 "and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but "
-"not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but not enough to\n"
 "automatically go fetch the key from them."
 msgstr ""
 
@@ -6049,14 +5500,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:166
 msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down "
-"web browsing."
+"Unfortunately real-time lookups over i2p would significantly slow down web "
+"browsing."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:169
 msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, "
-"while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
 "keys are permanent."
 msgstr ""
 
@@ -6075,26 +5525,21 @@ msgid ""
 "Yes it depends on a few servers that you have configured.\n"
 "Within i2p, servers and services come and go.\n"
 "Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is "
-"authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" "
-"solution, or by\n"
-"something even simpler, like a script that adds everybody in your "
-"hosts.txt to your address book."
+"have the same problem. A completely decentralized system (everybody is authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
+"something even simpler, like a script that adds everybody in your hosts.txt to your address book."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:190
 msgid ""
-"People advocating all-authoritative solutions generally haven't thought "
-"through\n"
+"People advocating all-authoritative solutions generally haven't thought through\n"
 "the issues of conflicts and hijacking, however."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:196
 msgid ""
 "<b>Awkward, not real-time:</b>\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
-" service providers,\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
 "I2P Site status reporters.\n"
 "Jump servers and subscriptions are a pain, it should just work like DNS."
 msgstr ""
@@ -6105,8 +5550,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:207
 msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, "
-"or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
 "and proposals to \"just use DNS\" aren't well thought-through."
 msgstr ""
 
@@ -6116,8 +5560,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:213
 msgid ""
-"The I2P source contains several pluggable naming systems and supports "
-"configuration options\n"
+"The I2P source contains several pluggable naming systems and supports configuration options\n"
 "to enable experimentation with naming systems."
 msgstr ""
 
@@ -6139,8 +5582,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:234
 msgid ""
-"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/"
-" directory."
+"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/ "
+"directory."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:237
@@ -6165,8 +5608,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:253
 msgid ""
-"The current naming system can be changed with the advanced config option "
-"'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
 "(restart required).\n"
 "See core/java/src/net/i2p/client/naming for details."
 msgstr ""
@@ -6174,8 +5616,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:258
 msgid ""
 "Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the address book subscription functions, "
-"since address book\n"
+"implement local storage and/or the address book subscription functions, since address book\n"
 "only knows about the hosts.txt files and format."
 msgstr ""
 
@@ -6185,50 +5626,40 @@ msgstr "Certificates"
 
 #: i2p2www/pages/site/docs/discussions/naming.html:265
 msgid ""
-"I2P destinations contain a certificate, however at the moment that "
-"certificate\n"
+"I2P destinations contain a certificate, however at the moment that certificate\n"
 "is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending "
-"in \"AAAA\",\n"
-"and this is checked in the address book merge mechanism, and possibly "
-"other places.\n"
-"Also, there is no method available to generate a certificate or add it to"
-" a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
+"and this is checked in the address book merge mechanism, and possibly other places.\n"
+"Also, there is no method available to generate a certificate or add it to a\n"
 "destination. So these will have to be updated to implement certificates."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:273
 #, python-format
 msgid ""
-"One possible use of certificates is for <a "
-"href=\"%(todo)s#hashcash\">proof of work</a>."
+"One possible use of certificates is for <a href=\"%(todo)s#hashcash\">proof "
+"of work</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:276
 msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such "
-"thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's "
-"keys."
+"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:280
 msgid ""
-"With any certificate implementation must come the method for verifying "
-"the\n"
+"With any certificate implementation must come the method for verifying the\n"
 "certificates.\n"
 "Presumably this would happen in the address book merge code.\n"
-"Is there a method for multiple types of certificates, or multiple "
-"certificates?"
+"Is there a method for multiple types of certificates, or multiple certificates?"
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:286
 msgid ""
 "Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would "
-"address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well"
-" as \n"
+"responses as signed by some centralized certificate authority would address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well as \n"
 "hostile certificate authority attacks."
 msgstr ""
 
@@ -6247,91 +5678,58 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:11
 msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple "
-"combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data "
-"confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred"
-" \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
-"describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
 "the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:19
 #: i2p2www/pages/site/docs/how/tech-intro.html:508
 msgid ""
-"The first time a router wants to encrypt a garlic message to another "
-"router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal "
-"and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal "
-"block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains "
-"the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a "
-"number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender "
-"wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal "
-"encrypt \n"
-"a new session key they simply pick one of the previously delivered "
-"session \n"
-"tags and AES encrypt the payload like before, using the session key used "
-"with \n"
-"that session tag, prepended with the session tag itself. When a router "
-"receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it "
-"matches \n"
-"an available session tag - if it does, they simply AES decrypt the "
-"message, \n"
+"The first time a router wants to encrypt a garlic message to another router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
+"a new session key they simply pick one of the previously delivered session \n"
+"tags and AES encrypt the payload like before, using the session key used with \n"
+"that session tag, prepended with the session tag itself. When a router receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
+"an available session tag - if it does, they simply AES decrypt the message, \n"
 "but if it does not, they ElGamal decrypt the first block."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:35
 #: i2p2www/pages/site/docs/how/tech-intro.html:524
 msgid ""
-"Each session tag can be used only once so as to prevent internal "
-"adversaries \n"
-"from unnecessarily correlating different messages as being between the "
-"same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
-"chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough "
-"tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful "
-"tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery "
-"status \n"
-"message\") - when the garlic message arrives at the intended recipient "
-"and \n"
-"is decrypted successfully, this small delivery status message is one of "
-"the \n"
-"cloves exposed and has instructions for the recipient to send the clove "
-"back \n"
-"to the original sender (through an inbound tunnel, of course). When the "
-"original \n"
-"sender receives this delivery status message, they know that the session "
-"tags \n"
+"Each session tag can be used only once so as to prevent internal adversaries \n"
+"from unnecessarily correlating different messages as being between the same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery status \n"
+"message\") - when the garlic message arrives at the intended recipient and \n"
+"is decrypted successfully, this small delivery status message is one of the \n"
+"cloves exposed and has instructions for the recipient to send the clove back \n"
+"to the original sender (through an inbound tunnel, of course). When the original \n"
+"sender receives this delivery status message, they know that the session tags \n"
 "bundled in the garlic message were successfully delivered."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:50
 msgid ""
 "Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is "
-"limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or "
-"old \n"
-"messages may be dropped. The sender keeps track whether messages using "
-"session \n"
-"tags are getting through, and if there isn't sufficient communication it "
-"may \n"
-"drop the ones previously assumed to be properly delivered, reverting back"
-" \n"
+"discarded if not used. In addition, the quantity stored for each key is limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or old \n"
+"messages may be dropped. The sender keeps track whether messages using session \n"
+"tags are getting through, and if there isn't sufficient communication it may \n"
+"drop the ones previously assumed to be properly delivered, reverting back \n"
 "to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or "
-"expire."
+"A session will continue to exist until all its tags are exhausted or expire."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:61
@@ -6346,8 +5744,7 @@ msgid ""
 "between a Router and a Destination.\n"
 "Each Router and Destination maintains its own Session Key Manager to\n"
 "keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple "
-"Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple Destinations\n"
 "to each other or a Router by adversaries."
 msgstr ""
 
@@ -6368,14 +5765,14 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgid ""
+"It is for a new session and contains both ElGamal and AES encrypted blocks"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:88
 msgid ""
 "When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt "
-"the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
 "If that fails, it will assume it is for a new session and attempt to\n"
 "decrypt it using ElGamal."
 msgstr ""
@@ -6386,8 +5783,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:98
 msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
-"block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
 "and an encrypted AES block."
 msgstr ""
 
@@ -6413,8 +5809,7 @@ msgid ""
 "The 32-byte\n"
 "<a href=\"%(commonstructures)s#type_SessionKey\">Session Key</a>\n"
 "is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
-" follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
 "the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
 msgstr ""
 
@@ -6443,18 +5838,16 @@ msgstr ""
 #, python-format
 msgid ""
 "The data is then <a href=\"%(cryptography)s\">AES Encrypted</a>,\n"
-"using the session key and IV (calculated from the pre-IV) from the "
-"ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16"
-" bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
 "</p>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:266
 #, python-format
 msgid ""
-"Actual max payload length, and max block length, is less than 64 KB; see "
-"the <a href=\"%(i2np)s\">I2NP Overview</a>."
+"Actual max payload length, and max block length, is less than 64 KB; see the"
+" <a href=\"%(i2np)s\">I2NP Overview</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:269
@@ -6483,18 +5876,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:318
 msgid ""
 "The session tag also serves as\n"
-"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the "
-"sessionTag."
+"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:323
 msgid ""
-"To decode a message from an existing session, a router looks up the "
-"Session Tag to find an\n"
-"associated Session Key. If the Session Tag is found, the AES block is "
-"decrypted using the associated Session Key.\n"
-"If the tag is not found, the message is assumed to be a <a "
-"href=\"#new\">New Session Message</a>."
+"To decode a message from an existing session, a router looks up the Session Tag to find an\n"
+"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n"
+"If the tag is not found, the message is assumed to be a <a href=\"#new\">New Session Message</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:331
@@ -6504,38 +5893,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:332
 #, python-format
 msgid ""
-"As of release 0.9.2, the client may configure the default number of "
-"Session Tags to send\n"
+"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
 "and the low tag threshold for the current session.\n"
-"For brief streaming connections or datagrams, these options may be used "
-"to significantly reduce bandwidth.\n"
-"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for "
-"details.\n"
+"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n"
+"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n"
 "The session settings may also be overridden on a per-message basis.\n"
-"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message"
-" Expires specification</a> for details."
+"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:353
 msgid ""
-"There are many possible areas to tune the Session Key Manager's "
-"algorithms;\n"
-"some may interact with the streaming library behavior, or have "
-"significant\n"
+"There are many possible areas to tune the Session Key Manager's algorithms;\n"
+"some may interact with the streaming library behavior, or have significant\n"
 "impact on overall performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:360
 msgid ""
-"The number of tags delivered could depend on message size, keeping in "
-"mind\n"
+"The number of tags delivered could depend on message size, keeping in mind\n"
 "the eventual padding to 1KB at the tunnel message layer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:365
 msgid ""
-"Clients could send an estimate of session lifetime to the router, as an "
-"advisory\n"
+"Clients could send an estimate of session lifetime to the router, as an advisory\n"
 "on the number of tags required."
 msgstr ""
 
@@ -6547,15 +5928,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:374
 msgid ""
-"The router may assume delivery of Session Tags, or await acknowledgement "
-"before using them;\n"
+"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n"
 "there are tradeoffs for each strategy."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:379
 msgid ""
-"For very brief messages, almost the full 222 bytes of the pre-IV and "
-"padding fields in the ElGamal block\n"
+"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n"
 "could be used for the entire message, instead of establishing a session."
 msgstr ""
 
@@ -6567,10 +5946,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:389
 msgid ""
-"Perhaps things could be more efficient if the Session Tag system was "
-"bidirectional,\n"
-"so tags delivered in the 'forward' path could be used in the 'reverse' "
-"path,\n"
+"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n"
+"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n"
 "thus avoiding ElGamal in the initial response.\n"
 "The router currently plays some tricks like this when sending\n"
 "tunnel test messages to itself."
@@ -6588,12 +5965,9 @@ msgstr ""
 msgid ""
 "Several of these ideas may require a new I2NP message type, or\n"
 "set a flag in the\n"
-"<a "
-"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery"
-" Instructions</a>,\n"
+"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery Instructions</a>,\n"
 "or set a magic number in the first few bytes of the Session Key field\n"
-"and accept a small risk of the random Session Key matching the magic "
-"number."
+"and accept a small risk of the random Session Key matching the magic number."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:2
@@ -6610,8 +5984,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:7
 msgid ""
-"The terms \"garlic routing\" and \"garlic encryption\" are often used "
-"rather loosely when referring to I2P's technology.\n"
+"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n"
 "Here, we explain the history of the terms, the various meanings, and\n"
 "the usage of \"garlic\" methods in I2P."
 msgstr ""
@@ -6621,20 +5994,16 @@ msgid ""
 "\"Garlic routing\" was first coined by\n"
 "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>\n"
 "in Roger Dingledine's Free Haven \n"
-"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> "
-"Section 8.1.1 (June 2000), as derived from \n"
+"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> Section 8.1.1 (June 2000), as derived from \n"
 "<a href=\"http://www.onion-router.net/\">Onion Routing</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:21
 msgid ""
-"\"Garlic\" may have been used originally by I2P developers because I2P "
-"implements a form of\n"
-"bundling as Freedman describes, or simply to emphasize general "
-"differences from Tor.\n"
+"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n"
+"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n"
 "The specific reasoning may be lost to history.\n"
-"Generally, when referring to I2P, the term \"garlic\" may mean one of "
-"three things:"
+"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:28
@@ -6653,54 +6022,39 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:33
 msgid ""
-"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven "
-"years has not always been precise; therefore the reader is\n"
+"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n"
 "cautioned when encountering the term.\n"
 "Hopefully, the explanation below will make things clear."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:40
 msgid ""
-"Onion routing is a technique for building paths, or tunnels, through a "
-"series of peers,\n"
+"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n"
 "and then using that tunnel.\n"
-"Messages are repeatedly encrypted by the originator, and then decrypted "
-"by each hop.\n"
-"During the building phase, only the routing instructions for the next hop"
-" are exposed to each peer.\n"
-"During the operating phase, messages are passed through the tunnel, and "
-"the\n"
-"message and its routing instructions are only exposed to the endpoint of "
-"the tunnel."
+"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n"
+"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n"
+"During the operating phase, messages are passed through the tunnel, and the\n"
+"message and its routing instructions are only exposed to the endpoint of the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:49
 #, python-format
 msgid ""
 "This is similar to the way Mixmaster\n"
-"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages "
-"- taking a message, encrypting it\n"
-"to the recipient's public key, taking that encrypted message and "
-"encrypting\n"
-"it (along with instructions specifying the next hop), and then taking "
-"that\n"
-"resulting encrypted message and so on, until it has one layer of "
-"encryption\n"
+"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages - taking a message, encrypting it\n"
+"to the recipient's public key, taking that encrypted message and encrypting\n"
+"it (along with instructions specifying the next hop), and then taking that\n"
+"resulting encrypted message and so on, until it has one layer of encryption\n"
 "per hop along the path."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:58
 msgid ""
-"In this sense, \"garlic routing\" as a general concept is identical to "
-"\"onion routing\".\n"
-"As implemented in I2P, of course, there are several differences from the "
-"implementation in Tor; see below.\n"
-"Even so, there are substantial similarities such that I2P benefits from a"
-"\n"
-"<a href=\"http://www.onion-router.net/Publications.html\">large amount of"
-" academic research on onion routing</a>,\n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar "
-"mixnets</a>."
+"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n"
+"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n"
+"Even so, there are substantial similarities such that I2P benefits from a\n"
+"<a href=\"http://www.onion-router.net/Publications.html\">large amount of academic research on onion routing</a>,\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar mixnets</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:67
@@ -6709,15 +6063,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:68
 msgid ""
-"Michael Freedman defined \"garlic routing\" as an extension to onion "
-"routing,\n"
+"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n"
 "in which multiple messages are bundled together.\n"
 "He called each message a \"bulb\".\n"
-"All the messages, each with its own delivery instructions, are exposed at"
-" the\n"
+"All the messages, each with its own delivery instructions, are exposed at the\n"
 "endpoint.\n"
-"This allows the efficient bundling of an onion routing \"reply block\" "
-"with the original message."
+"This allows the efficient bundling of an onion routing \"reply block\" with the original message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:77
@@ -6726,10 +6077,8 @@ msgid ""
 "Our term for garlic \"bulbs\" is \"cloves\".\n"
 "Any number of messages can be\n"
 "contained, instead of just a single message.\n"
-"This is a significant distinction from the onion routing implemented in "
-"Tor.\n"
-"However, it is only one of many major architectural differences between "
-"I2P and Tor;\n"
+"This is a significant distinction from the onion routing implemented in Tor.\n"
+"However, it is only one of many major architectural differences between I2P and Tor;\n"
 "perhaps it is not, by itself, enough to justify a change in terminology."
 msgstr ""
 
@@ -6737,10 +6086,8 @@ msgstr ""
 msgid ""
 "Another difference\n"
 "from the method described by Freedman\n"
-"is that the path is unidirectional - there is no \"turning point\" as "
-"seen in onion routing\n"
-"or mixmaster reply blocks, which greatly simplifies the algorithm and "
-"allows for more flexible\n"
+"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n"
+"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n"
 "and reliable delivery."
 msgstr ""
 
@@ -6774,16 +6121,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:113
 msgid ""
-"For publishing some network database entries (dampening the probability "
-"of a successful traffic analysis attack) (ElGamal/AES)"
+"For publishing some network database entries (dampening the probability of a"
+" successful traffic analysis attack) (ElGamal/AES)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:116
 msgid ""
-"There are also significant ways that this technique can be used to "
-"improve the performance of the network, \n"
-"exploiting transport latency/throughput tradeoffs, and branching data "
-"through redundant paths to increase reliability."
+"There are also significant ways that this technique can be used to improve the performance of the network, \n"
+"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:122
@@ -6794,8 +6139,7 @@ msgstr ""
 msgid ""
 "In I2P, tunnels are unidirectional. Each party builds two tunnels,\n"
 "one for outbound and one for inbound traffic.\n"
-"Therefore, four tunnels are required for a single round-trip message and "
-"reply."
+"Therefore, four tunnels are required for a single round-trip message and reply."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:129
@@ -6815,12 +6159,10 @@ msgstr ""
 msgid ""
 "Tunnels are a general-purpose mechanism to transport all\n"
 "<a href=\"%(i2np)s\">I2NP messages</a>, and\n"
-"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to "
-"build tunnels.\n"
+"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to build tunnels.\n"
 "We do not bundle multiple\n"
 "<a href=\"%(i2np)s\">I2NP messages</a> into a single\n"
-"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at "
-"the outbound tunnel endpoint;\n"
+"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at the outbound tunnel endpoint;\n"
 "the tunnel encryption is sufficient."
 msgstr ""
 
@@ -6834,14 +6176,12 @@ msgid ""
 "At the layer above tunnels, I2P delivers end-to-end messages between\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>.\n"
 "Just as within a single tunnel, we use\n"
-"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption."
-"\n"
+"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption.\n"
 "Each client message as delivered to the router through the\n"
 "<a href=\"%(i2cp)s\">I2CP interface</a> becomes a single\n"
 "<a href=\"%(i2npspec)s#struct_GarlicClove\">Garlic Clove</a>\n"
 "with its own\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>,\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>,\n"
 "inside a\n"
 "<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a>.\n"
 "Delivery Instructions may specify a Destination, Router, or Tunnel."
@@ -6864,18 +6204,13 @@ msgid ""
 "A\n"
 "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">Delivery Status Message</a>,\n"
 "with\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>\n"
-"specifying that it be sent back to the originating router as an "
-"acknowledgment.\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n"
+"specifying that it be sent back to the originating router as an acknowledgment.\n"
 "This is similar to the \"reply block\" or \"reply onion\"\n"
 "described in the references.\n"
-"It is used for determining the success or failure of end to end message "
-"delivery.\n"
-"The originating router may, upon failure to receive the Delivery Status "
-"Message\n"
-"within the expected time period, modify the routing to the far-end "
-"Destination,\n"
+"It is used for determining the success or failure of end to end message delivery.\n"
+"The originating router may, upon failure to receive the Delivery Status Message\n"
+"within the expected time period, modify the routing to the far-end Destination,\n"
 "or take other actions."
 msgstr ""
 
@@ -6887,16 +6222,12 @@ msgid ""
 "containing a\n"
 "<a href=\"%(commonstructures)s#struct_LeaseSet\">LeaseSet</a>\n"
 "for the originating Destination, with\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n"
 "specifying the far-end destination's router.\n"
-"By periodically bundling a LeaseSet, the router ensures that the far-end "
-"will be able\n"
+"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n"
 "to maintain communications.\n"
-"Otherwise the far-end would have to query a floodfill router for the "
-"network database entry,\n"
-"and all LeaseSets would have to be published to the network database, as "
-"explained on the\n"
+"Otherwise the far-end would have to query a floodfill router for the network database entry,\n"
+"and all LeaseSets would have to be published to the network database, as explained on the\n"
 "<a href=\"%(netdb)s\">network database page</a>."
 msgstr ""
 
@@ -6906,31 +6237,24 @@ msgid ""
 "By default, the Delivery Status and Database Store Messages\n"
 "are bundled when the local LeaseSet changes, when additional\n"
 "<a href=\"%(commonstructures)s#type_SessionTag\">Session Tags</a>\n"
-"are delivered, or if the messages have not been bundled in the previous "
-"minute.\n"
-"As of release 0.9.2, the client may configure the default number of "
-"Session Tags to send\n"
+"are delivered, or if the messages have not been bundled in the previous minute.\n"
+"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
 "and the low tag threshold for the current session.\n"
-"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for "
-"details.\n"
+"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n"
 "The session settings may also be overridden on a per-message basis.\n"
-"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message"
-" Expires specification</a> for details."
+"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:224
 msgid ""
-"Obviously, the additional messages are currently bundled for specific "
-"purposes,\n"
+"Obviously, the additional messages are currently bundled for specific purposes,\n"
 "and not part of a general-purpose routing scheme."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:229
 msgid ""
-"As of release 0.9.12, the Delivery Status Message is wrapped in another "
-"Garlic Message\n"
-"by the originator so that the contents are encrypted and not visible to "
-"routers on the return path."
+"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n"
+"by the originator so that the contents are encrypted and not visible to routers on the return path."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:235
@@ -6954,35 +6278,26 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/garlic-routing.html:252
 #, python-format
 msgid ""
-"The Garlic Message mechanism is very flexible and provides a structure "
-"for\n"
+"The Garlic Message mechanism is very flexible and provides a structure for\n"
 "implementing many types of mixnet delivery methods.\n"
 "Together with the unused delay option in the\n"
-"<a "
-"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel"
-" message Delivery Instructions</a>,\n"
-"a wide spectrum of batching, delay, mixing, and routing strategies are "
-"possible."
+"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel message Delivery Instructions</a>,\n"
+"a wide spectrum of batching, delay, mixing, and routing strategies are possible."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:260
 msgid ""
-"In particular, there is potential for much more flexibility at the "
-"outbound tunnel endpoint.\n"
+"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n"
 "Messages could possibly be routed from there to one of several tunnels\n"
-"(thus minimizing point-to-point connections), or multicast to several "
-"tunnels\n"
+"(thus minimizing point-to-point connections), or multicast to several tunnels\n"
 "for redundancy, or streaming audio and video."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:267
 msgid ""
-"Such experiments may conflict with the need to ensure security and "
-"anonymity, such\n"
-"as limiting certain routing paths, restricting the types of I2NP messages"
-" that may\n"
-"be forwarded along various paths, and enforcing certain message "
-"expiration times."
+"Such experiments may conflict with the need to ensure security and anonymity, such\n"
+"as limiting certain routing paths, restricting the types of I2NP messages that may\n"
+"be forwarded along various paths, and enforcing certain message expiration times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:273
@@ -6991,11 +6306,9 @@ msgid ""
 "As a part of\n"
 "<a href=\"%(elgamalaes)s\">ElGamal/AES encryption</a>,\n"
 "a garlic message contains a sender\n"
-"specified amount of padding data, allowing the sender to take active "
-"countermeasures \n"
+"specified amount of padding data, allowing the sender to take active countermeasures \n"
 "against traffic analysis.\n"
-"This is not currently used, beyond the requirement to pad to a multiple "
-"of 16 bytes."
+"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:282
@@ -7012,10 +6325,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:292
 msgid ""
-"The term garlic routing was first coined in Roger Dingledine's Free Haven"
-" \n"
-"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> "
-"(June 2000),\n"
+"The term garlic routing was first coined in Roger Dingledine's Free Haven \n"
+"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> (June 2000),\n"
 "see Section 8.1.1 authored by\n"
 "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>."
 msgstr ""
@@ -7045,8 +6356,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:313
 msgid ""
-"Onion routing was first described in <a href=\"http://www.onion-"
-"router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n"
+"Onion routing was first described in <a href=\"http://www.onion-router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n"
 "by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996."
 msgstr ""
 
@@ -7056,79 +6366,51 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:4
 msgid ""
-"I2P is a project to build, deploy, and maintain a network supporting "
-"secure and anonymous\n"
-"communication. People using I2P are in control of the tradeoffs between "
-"anonymity, reliability,\n"
-"bandwidth usage, and latency. There is no central point in the network on"
-" which pressure can be\n"
-"exerted to compromise the integrity, security, or anonymity of the "
-"system. The network supports\n"
-"dynamic reconfiguration in response to various attacks, and has been "
-"designed to make use of\n"
-"additional resources as they become available. Of course, all aspects of "
-"the network are open and\n"
+"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n"
+"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n"
+"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n"
+"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n"
+"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n"
+"additional resources as they become available. Of course, all aspects of the network are open and\n"
 "freely available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:14
 msgid ""
-"Unlike many other anonymizing networks, I2P doesn't try to provide "
-"anonymity by hiding the\n"
-"originator of some communication and not the recipient, or the other way "
-"around. I2P is designed to\n"
-"allow peers using I2P to communicate with each other anonymously &mdash; "
-"both sender and recipient\n"
-"are unidentifiable to each other as well as to third parties. For "
-"example, today there are both\n"
-"in-I2P web sites (allowing anonymous publishing / hosting) as well as "
-"HTTP proxies to the normal web\n"
-"(allowing anonymous web browsing). Having the ability to run servers "
-"within I2P is essential, as it\n"
-"is quite likely that any outbound proxies to the normal Internet will be "
-"monitored, disabled, or\n"
+"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n"
+"originator of some communication and not the recipient, or the other way around. I2P is designed to\n"
+"allow peers using I2P to communicate with each other anonymously &mdash; both sender and recipient\n"
+"are unidentifiable to each other as well as to third parties. For example, today there are both\n"
+"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n"
+"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n"
+"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n"
 "even taken over to attempt more malicious attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:25
 #, python-format
 msgid ""
-"The network itself is message oriented - it is essentially a secure and "
-"anonymous IP layer, where\n"
-"messages are addressed to cryptographic keys (Destinations) and can be "
-"significantly larger than IP\n"
-"packets. Some example uses of the network include \"I2P Sites\" "
-"(webservers hosting normal web\n"
-"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a "
-"distributed data store. With the\n"
-"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are "
-"able to stream traditional\n"
-"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even "
-"streaming audio. Most people\n"
-"will not use I2P directly, or even need to know they're using it. Instead"
-" their view will be of one\n"
-"of the I2P enabled applications, or perhaps as a little controller app to"
-" turn on and off various\n"
+"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n"
+"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n"
+"packets. Some example uses of the network include \"I2P Sites\" (webservers hosting normal web\n"
+"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n"
+"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are able to stream traditional\n"
+"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n"
+"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n"
+"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n"
 "proxies to enable the anonymizing functionality."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:37
 #, python-format
 msgid ""
-"An essential part of designing, developing, and testing an anonymizing "
-"network is to define the <a\n"
-"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing "
-"as \"true\" anonymity, just\n"
-"increasingly expensive costs to identify someone. Briefly, I2P's intent "
-"is to allow people to\n"
-"communicate in arbitrarily hostile environments by providing good "
-"anonymity, mixed in with\n"
-"sufficient cover traffic provided by the activity of people who require "
-"less anonymity. This way,\n"
-"some users can avoid detection by a very powerful adversary, while others"
-" will try to evade a weaker\n"
-"entity, <i>all on the same network</i>, where each one's messages are "
-"essentially indistinguishable\n"
+"An essential part of designing, developing, and testing an anonymizing network is to define the <a\n"
+"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing as \"true\" anonymity, just\n"
+"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n"
+"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n"
+"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n"
+"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n"
+"entity, <i>all on the same network</i>, where each one's messages are essentially indistinguishable\n"
 "from the others."
 msgstr ""
 
@@ -7139,12 +6421,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/intro.html:49
 #, python-format
 msgid ""
-"There are a multitude of reasons why we need a system to support "
-"anonymous communication, and\n"
-"everyone has their own personal rationale. There are many <a "
-"href=\"%(comparisons)s\">other\n"
-"efforts</a> working on finding ways to provide varying degrees of "
-"anonymity to people through the\n"
+"There are a multitude of reasons why we need a system to support anonymous communication, and\n"
+"everyone has their own personal rationale. There are many <a href=\"%(comparisons)s\">other\n"
+"efforts</a> working on finding ways to provide varying degrees of anonymity to people through the\n"
 "Internet, but we could not find any that met our needs or threat model."
 msgstr ""
 
@@ -7155,23 +6434,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/intro.html:58
 #, python-format
 msgid ""
-"The network at a glance is made up of a set of nodes (\"routers\") with a"
-" number of unidirectional\n"
-"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a "
-"href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is "
-"identified by a cryptographic RouterIdentity which is\n"
-"typically long lived. These routers communicate with each other through "
-"existing transport\n"
-"mechanisms (TCP, UDP, etc), passing various messages. Client applications"
-" have their own\n"
-"cryptographic identifier (\"Destination\") which enables it to send and "
-"receive messages. These\n"
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels\n"
-"that will be used for sending and receiving messages through the network."
-" I2P has its own internal\n"
-"<a href=\"%(netdb)s\">network database</a> (using a modification of the "
-"Kademlia algorithm) for\n"
+"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n"
+"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is identified by a cryptographic RouterIdentity which is\n"
+"typically long lived. These routers communicate with each other through existing transport\n"
+"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n"
+"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n"
+"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n"
+"that will be used for sending and receiving messages through the network. I2P has its own internal\n"
+"<a href=\"%(netdb)s\">network database</a> (using a modification of the Kademlia algorithm) for\n"
 "distributing routing and contact information securely."
 msgstr ""
 
@@ -7181,91 +6451,62 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:73
 msgid ""
-"In the above, Alice, Bob, Charlie, and Dave are all running routers with "
-"a single Destination on\n"
-"their local router. They each have a pair of 2-hop inbound tunnels per "
-"destination (labeled 1, 2, 3,\n"
-"4, 5 and 6), and a small subset of each of those router's outbound tunnel"
-" pool is shown with 2-hop\n"
-"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's "
-"outbound tunnels are not\n"
-"shown, nor are the rest of each router's outbound tunnel pool (typically "
-"stocked with a few tunnels\n"
-"at a time). When Alice and Bob talk to each other, Alice sends a message "
-"out one of her (pink)\n"
-"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3"
-" or 4). She knows to send\n"
-"to those tunnels on the correct router by querying the network database, "
-"which is constantly updated\n"
+"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n"
+"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n"
+"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n"
+"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n"
+"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n"
+"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n"
+"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n"
+"to those tunnels on the correct router by querying the network database, which is constantly updated\n"
 "as new leases are authorized and old ones expire."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:85
 #, python-format
 msgid ""
-"If Bob wants to reply to Alice, he simply goes through the same process -"
-" send a message out one of\n"
-"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 "
-"or 2). To make things\n"
-"easier, most messages sent between Alice and Bob are <a "
-"href=\"%(garlicrouting)s\">garlic</a>\n"
-"wrapped, bundling the sender's own current lease information so that the "
-"recipient can reply\n"
-"immediately without having to look in the network database for the "
-"current data."
+"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n"
+"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n"
+"easier, most messages sent between Alice and Bob are <a href=\"%(garlicrouting)s\">garlic</a>\n"
+"wrapped, bundling the sender's own current lease information so that the recipient can reply\n"
+"immediately without having to look in the network database for the current data."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:93
 #, python-format
 msgid ""
-"To deal with a wide range of attacks, I2P is fully distributed with no "
-"centralized resources - and\n"
-"hence there are no directory servers keeping statistics regarding the "
-"performance and reliability of\n"
-"routers within the network. As such, each router must keep and maintain "
-"profiles of various routers\n"
-"and is responsible for selecting appropriate peers to meet the anonymity,"
-" performance, and\n"
-"reliability needs of the users, as described in the <a "
-"href=\"%(peerselection)s\">peer selection</a>\n"
+"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n"
+"hence there are no directory servers keeping statistics regarding the performance and reliability of\n"
+"routers within the network. As such, each router must keep and maintain profiles of various routers\n"
+"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n"
+"reliability needs of the users, as described in the <a href=\"%(peerselection)s\">peer selection</a>\n"
 "page."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:102
 #, python-format
 msgid ""
-"The network itself makes use of a significant number of <a "
-"href=\"%(cryptography)s\">cryptographic\n"
-"techniques and algorithms</a> - a full laundry list includes 2048bit "
-"ElGamal encryption, 256bit AES\n"
-"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, "
-"2048bit Diffie-Hellman\n"
-"negotiated connections with station to station authentication, and <a "
-"href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>."
+"The network itself makes use of a significant number of <a href=\"%(cryptography)s\">cryptographic\n"
+"techniques and algorithms</a> - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n"
+"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n"
+"negotiated connections with station to station authentication, and <a href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:110
 msgid ""
-"Content sent over I2P is encrypted through three layers garlic encryption"
-" (used to verify the\n"
-"delivery of the message to the recipient), tunnel encryption (all "
-"messages passing through a tunnel\n"
-"is encrypted by the tunnel gateway to the tunnel endpoint), and inter "
-"router transport layer\n"
+"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n"
+"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n"
+"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n"
 "encryption (e.g. the TCP transport uses AES256 with ephemeral keys)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:117
 msgid ""
 "End-to-end (I2CP) encryption (client application to\n"
-"server application) was disabled in I2P release 0.6; end-to-end (garlic) "
-"encryption (I2P client router\n"
-"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" "
-"remains. Notice the different use of\n"
-"terms! All data from a to h is end-to-end encrypted, but the I2CP "
-"connection between the I2P router and\n"
-"the applications is not end-to-end encrypted! A and h are the routers of "
-"Alice and Bob, while Alice and\n"
+"server application) was disabled in I2P release 0.6; end-to-end (garlic) encryption (I2P client router\n"
+"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" remains. Notice the different use of\n"
+"terms! All data from a to h is end-to-end encrypted, but the I2CP connection between the I2P router and\n"
+"the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and\n"
 "Bob in following chart are the applications running atop of I2P."
 msgstr ""
 
@@ -7282,32 +6523,22 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:132
 msgid ""
-"The two main mechanisms for allowing people who need strong anonymity to "
-"use the network are\n"
-"explicitly delayed garlic routed messages and more comprehensive tunnels "
-"to include support for\n"
-"pooling and mixing messages. These are currently planned for release 3.0,"
-" but garlic routed messages\n"
-"with no delays and FIFO tunnels are currently in place. Additionally, the"
-" 2.0 release will allow\n"
-"people to set up and operate behind restricted routes (perhaps with "
-"trusted peers), as well as the\n"
+"The two main mechanisms for allowing people who need strong anonymity to use the network are\n"
+"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n"
+"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n"
+"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n"
+"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n"
 "deployment of more flexible and anonymous transports."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:141
 #, python-format
 msgid ""
-"Some questions have been raised with regards to the scalability of I2P, "
-"and reasonably so. There\n"
-"will certainly be more analysis over time, but peer lookup and "
-"integration should be bounded by\n"
-"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network "
-"database</a>'s algorithm, while end\n"
-"to end messages should be <code>O(1)</code> (scale free), since messages "
-"go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no "
-"longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n"
+"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network database</a>'s algorithm, while end\n"
+"to end messages should be <code>O(1)</code> (scale free), since messages go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
 "the network (N) bears no impact."
 msgstr ""
 
@@ -7319,13 +6550,10 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P initially began in Feb 2003 as a proposed modification to <a\n"
-"href=\"http://freenetproject.org\">Freenet</a> to allow it to use "
-"alternate transports, such as <a\n"
+"href=\"http://freenetproject.org\">Freenet</a> to allow it to use alternate transports, such as <a\n"
 "href=\"%(jms)s\">JMS</a>, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code "
-"being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the"
-" <a href=\"%(roadmap)s\">roadmap</a>."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the <a href=\"%(roadmap)s\">roadmap</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:161
@@ -7335,22 +6563,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/intro.html:162
 #, python-format
 msgid ""
-"We have a small <a href=\"%(team)s\">team</a> spread around several "
-"continents, working to advance\n"
-"different aspects of the project. We are very open to other developers "
-"who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as "
-"critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is "
-"open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix "
-"licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
-"written in Java (1.5+),\n"
-"though some third party applications are being written in Python and "
-"other languages. The code works\n"
-"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual"
-" Machines."
+"We have a small <a href=\"%(team)s\">team</a> spread around several continents, working to advance\n"
+"different aspects of the project. We are very open to other developers who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
+"though some third party applications are being written in Python and other languages. The code works\n"
+"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual Machines."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:173
@@ -7360,12 +6580,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/intro.html:174
 #, python-format
 msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
-"concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
-" currently no\n"
-"scheduled development meetings, however <a href=\"%(meetings)s\">archives"
-" are available</a>."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
+"scheduled development meetings, however <a href=\"%(meetings)s\">archives are available</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:180
@@ -7389,39 +6606,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:8
 msgid ""
 "I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (<b>RouterInfos</b>) "
-"and destination contact\n"
-"information (<b>LeaseSets</b>). Each piece of data is signed by the "
-"appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness "
-"information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to "
-"replace\n"
+"just two types of data - router contact information (<b>RouterInfos</b>) and destination contact\n"
+"information (<b>LeaseSets</b>). Each piece of data is signed by the appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
 "older ones, and protection against certain classes of attack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:17
 msgid ""
 "The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains "
-"the distributed database."
+"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:25
 msgid ""
-"When an I2P router wants to contact another router, they need to know "
-"some \n"
-"key pieces of data - all of which are bundled up and signed by the router"
-" into\n"
-"a structure called the \"RouterInfo\", which is distributed with the "
-"SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know some \n"
+"key pieces of data - all of which are bundled up and signed by the router into\n"
+"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
 "as the key. The structure itself contains:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:32
 msgid ""
-"The router's identity (an encryption key, a signing key, and a "
-"certificate)"
+"The router's identity (an encryption key, a signing key, and a certificate)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:33
@@ -7452,8 +6660,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:47
 msgid ""
-"Capabilities flags - used to indicate floodfill participation, "
-"approximate bandwidth, and perceived reachability"
+"Capabilities flags - used to indicate floodfill participation, approximate "
+"bandwidth, and perceived reachability"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:49
@@ -7512,23 +6720,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:76
 msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers "
-"published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
 "and only sent tunnel requests to peers whose uptime was more than 60m"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:82
 msgid ""
 "These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel "
-"through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine "
-"whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine whether\n"
 "the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or "
-"trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging"
-" and network analysis."
+"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging and network analysis."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:102
@@ -7539,13 +6742,11 @@ msgstr ""
 #, python-format
 msgid ""
 "Additional text options include\n"
-"a small number of statistics about the router's health, which are "
-"aggregated by\n"
+"a small number of statistics about the router's health, which are aggregated by\n"
 "sites such as <a href=\"http://%(stats)s/\">%(stats)s</a>\n"
 "for network performance analysis and debugging.\n"
 "These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such "
-"data\n"
+"such as tunnel build success rates, while balancing the need for such data\n"
 "with the side-effects that could result from revealing this data.\n"
 "Current statistics are limited to:"
 msgstr ""
@@ -7560,18 +6761,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:119
 msgid ""
-"Floodfill routers publish additional data on the number of entries in "
-"their network database."
+"Floodfill routers publish additional data on the number of entries in their "
+"network database."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:123
 msgid ""
 "The data published can be seen in the router's user interface,\n"
 "but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the "
-"published\n"
-"statistics to improve anonymity, and we plan to remove more in future "
-"releases."
+"As the network has matured, we have gradually removed most of the published\n"
+"statistics to improve anonymity, and we plan to remove more in future releases."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:130
@@ -7580,8 +6779,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:132
 msgid ""
-"As of release 0.9.24, routers may declare that they are part of a "
-"\"family\", operated by the same entity.\n"
+"As of release 0.9.24, routers may declare that they are part of a \"family\", operated by the same entity.\n"
 "Multiple routers in the same family will not be used in a single tunnel."
 msgstr ""
 
@@ -7600,16 +6798,15 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:159
 msgid ""
 "RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the "
-"frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
 "with memory or disk usage.\n"
 "In the current implementation, there are the following general policies:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:166
 msgid ""
-"There is no expiration during the first hour of uptime, as the persistent"
-" stored data may be old."
+"There is no expiration during the first hour of uptime, as the persistent "
+"stored data may be old."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:169
@@ -7618,25 +6815,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:172
 msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in"
-" an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 "
-"routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
 "while expiration time with 300 routers is around 30 hours."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:177
 #, python-format
 msgid ""
-"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in "
-"about an hour, as\n"
+"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in about an hour, as\n"
 "the introducer list expires in about that time."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:181
 msgid ""
-"Floodfills use a short expiration time (1 hour) for all local "
-"RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
 "be frequently republished to them."
 msgstr ""
 
@@ -7652,8 +6845,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:192
 msgid ""
-"It may be desirable to persistently store Meta LeaseSets with long "
-"expirations.\n"
+"It may be desirable to persistently store Meta LeaseSets with long expirations.\n"
 "This is implementation-dependent."
 msgstr ""
 
@@ -7667,10 +6859,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:212
 msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
-"documenting\n"
-"a group of <b>tunnel entry points (leases)</b> for a particular client "
-"destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
+"a group of <b>tunnel entry points (leases)</b> for a particular client destination.\n"
 "Each of these leases specify the following information:"
 msgstr ""
 
@@ -7696,8 +6886,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:454
 msgid ""
 "One exception is for Encrypted LeaseSets (LS2), as of release 0.9.38.\n"
-"The SHA256 of the type byte (3) followed by the blinded public key is "
-"used for the DHT key,\n"
+"The SHA256 of the type byte (3) followed by the blinded public key is used for the DHT key,\n"
 "and then rotated as usual."
 msgstr ""
 
@@ -7711,14 +6900,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:239
 msgid ""
-"The destination itself (an encryption key, a signing key and a "
-"certificate)"
+"The destination itself (an encryption key, a signing key and a certificate)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:240
 msgid ""
-"Additional encryption public key: used for end-to-end encryption of "
-"garlic messages"
+"Additional encryption public key: used for end-to-end encryption of garlic "
+"messages"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:241
@@ -7729,8 +6917,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:242
 msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination "
-"published the LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination published "
+"the LeaseSet."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:246
@@ -7761,13 +6949,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:263
 msgid ""
-"A LeaseSet for a destination used only for outgoing connections is "
-"<i>unpublished</i>.\n"
+"A LeaseSet for a destination used only for outgoing connections is <i>unpublished</i>.\n"
 "It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
-"unpublished.\n"
-"Servers will still be able to send messages back to those unpublished "
-"destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
+"Servers will still be able to send messages back to those unpublished destinations,\n"
 "because of <a href=\"#lsp\">I2NP storage messages</a>."
 msgstr ""
 
@@ -7777,24 +6962,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:274
 msgid ""
-"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero "
-"leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet."
-"\n"
-"Revocations are not fully implemented, and it is unclear if they have any"
-" practical use.\n"
-"This is the only planned use for that signing key, so it is currently "
-"unused."
+"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet.\n"
+"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
+"This is the only planned use for that signing key, so it is currently unused."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:283
 msgid ""
 "As of release 0.9.38, floodfills support a new LeaseSet2 structure.\n"
-"This structure is very similar to the old LeaseSet structure, and serves "
-"the same purpose.\n"
+"This structure is very similar to the old LeaseSet structure, and serves the same purpose.\n"
 "The new structure provides the flexibility required to support new\n"
-"encryption types, multiple encryption types, options, offline signing "
-"keys,\n"
+"encryption types, multiple encryption types, options, offline signing keys,\n"
 "and other features.\n"
 "See proposal 123 for details."
 msgstr ""
@@ -7803,15 +6982,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:715
 msgid ""
 "As of release 0.9.38, floodfills support a new Meta LeaseSet structure.\n"
-"This structure provides a tree-like structure in the DHT, to refer to "
-"other LeaseSets.\n"
-"Using Meta LeaseSets, a site may implement large multihomed services, "
-"where several\n"
+"This structure provides a tree-like structure in the DHT, to refer to other LeaseSets.\n"
+"Using Meta LeaseSets, a site may implement large multihomed services, where several\n"
 "different Destinations are used to provide a common service.\n"
 "The entries in a Meta LeaseSet are Destinations or other Meta LeaseSets,\n"
 "and may have long expirations, up to 18.2 hours.\n"
-"Using this facility, it should be possible to run hundreds or thousands "
-"of Destinations hosting a common service.\n"
+"Using this facility, it should be possible to run hundreds or thousands of Destinations hosting a common service.\n"
 "See proposal 123 for details."
 msgstr ""
 
@@ -7829,29 +7005,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:313
 msgid ""
-"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate"
-" key.\n"
-"The leases may only be decoded, and thus the destination may only be "
-"contacted,\n"
+"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate key.\n"
+"The leases may only be decoded, and thus the destination may only be contacted,\n"
 "by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is "
-"encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future "
-"work to\n"
-"research whether the user interface and implementation of encrypted "
-"LeaseSets could be improved."
+"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
+"research whether the user interface and implementation of encrypted LeaseSets could be improved."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:324
 msgid ""
-"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet "
-"structure.\n"
-"The Destination is hidden, and only a blinded public key and an "
-"expiration\n"
+"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet structure.\n"
+"The Destination is hidden, and only a blinded public key and an expiration\n"
 "are visible to the floodfill.\n"
 "Only those that have the full Destination may decrypt the structure.\n"
-"The structure is stored at a DHT location based on the hash of the "
-"blinded public key,\n"
+"The structure is stored at a DHT location based on the hash of the blinded public key,\n"
 "not the hash of the Destination.\n"
 "See proposal 123 for details."
 msgstr ""
@@ -7862,12 +7030,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:336
 msgid ""
-"For regular LeaseSets, the expiration is the time of the latest "
-"expiration of its leases.\n"
-"For the new LeaseSet2 data structures, the expiration is specified in the"
-" header.\n"
-"For LeaseSet2, the expiration should match the latest expiration of its "
-"leases.\n"
+"For regular LeaseSets, the expiration is the time of the latest expiration of its leases.\n"
+"For the new LeaseSet2 data structures, the expiration is specified in the header.\n"
+"For LeaseSet2, the expiration should match the latest expiration of its leases.\n"
 "For EncryptedLeaseSet and MetaLeaseSet, the expiration may vary,\n"
 "and maximum expiration may be enforced, to be determined."
 msgstr ""
@@ -7878,8 +7043,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:346
 msgid ""
-"No persistent storage of LeaseSet data is required, since they expire so "
-"quickly.\n"
+"No persistent storage of LeaseSet data is required, since they expire so quickly.\n"
 "Howewver, persistent storage of EncryptedLeaseSet and MetaLeaseSet data\n"
 "with long expirations may be advisable."
 msgstr ""
@@ -7905,42 +7069,30 @@ msgstr ""
 msgid ""
 "The netDb is decentralized, however you do need at\n"
 "least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the "
-"RouterInfo\n"
-"of an active peer - specifically, by retrieving their "
-"<code>routerInfo-$hash.dat</code>\n"
-"file and storing it in your <code>netDb/</code> directory. Anyone can "
-"provide\n"
-"you with those files - you can even provide them to others by exposing "
-"your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
+"of an active peer - specifically, by retrieving their <code>routerInfo-$hash.dat</code>\n"
+"file and storing it in your <code>netDb/</code> directory. Anyone can provide\n"
+"you with those files - you can even provide them to others by exposing your own\n"
 "netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular "
-"(non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
 "and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches "
-"from\n"
+"When the router starts up for the first time, it automatically fetches from\n"
 "one of these URLs, selected at random."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:379
 msgid ""
-"The floodfill netDb is a simple distributed storage mechanism.  The "
-"storage\n"
-"algorithm is simple: send the data to the closest peer that has "
-"advertised\n"
-"itself as a floodfill router. When the peer in the floodfill netDb "
-"receives a\n"
-"netDb store from a peer not in the floodfill netDb, they send it to a "
-"subset of\n"
-"the floodfill netDb-peers. The peers selected are the ones closest "
-"(according\n"
+"The floodfill netDb is a simple distributed storage mechanism.  The storage\n"
+"algorithm is simple: send the data to the closest peer that has advertised\n"
+"itself as a floodfill router. When the peer in the floodfill netDb receives a\n"
+"netDb store from a peer not in the floodfill netDb, they send it to a subset of\n"
+"the floodfill netDb-peers. The peers selected are the ones closest (according\n"
 "to the <a href=\"#kad\">XOR-metric</a>) to a specific key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:388
 msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed"
-" in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
 "router's published routerInfo as a capability."
 msgstr ""
 
@@ -7970,15 +7122,13 @@ msgid ""
 "Routers with high bandwidth limits (which must be manually configured,\n"
 "as the default is much lower) are presumed to be on lower-latency\n"
 "connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 "
-"KBytes/sec."
+"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:419
 msgid ""
 "In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation "
-"is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
 "automatically enabled."
 msgstr ""
 
@@ -8005,13 +7155,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:441
 msgid ""
-"A floodfill router's only services that are in addition to those of non-"
-"floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
 "are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to "
-"participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to "
-"their distributed database services."
+"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:449
@@ -8020,33 +7167,24 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:450
 msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
-"\n"
-"To create a Kademlia key, the SHA256 hash of the RouterIdentity or "
-"Destination is computed."
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"To create a Kademlia key, the SHA256 hash of the RouterIdentity or Destination is computed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:459
 msgid ""
-"A modification to this algorithm is done to increase the costs of <a href"
-"=\"#sybil-partial\">Sybil attacks</a>.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the "
-"SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented "
-"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight "
-"UTC.\n"
-"Only the search key is modified in this way, not the floodfill router "
-"hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace "
-"rotation\",\n"
+"A modification to this algorithm is done to increase the costs of <a href=\"#sybil-partial\">Sybil attacks</a>.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
+"Only the search key is modified in this way, not the floodfill router hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
 "although it isn't strictly a rotation."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:469
 msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are "
-"only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
 "determination of distance."
 msgstr ""
 
@@ -8061,8 +7199,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:479
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local "
-"RouterInfo are exchanged with peers\n"
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
 "as a part of the initialization of a <a href=\"%(ntcp)s\">NTCP</a>\n"
 "or <a href=\"%(ssu)s\">SSU</a> transport connection."
 msgstr ""
@@ -8074,46 +7211,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:487
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local "
-"LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the "
-"related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an "
-"appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating "
-"Destinations to have published LeaseSets at all."
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:495
 msgid ""
 "The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
 "to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local "
-"database.\n"
-"Even if that floodfill is not actually closest, it will flood it "
-"\"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local database.\n"
+"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
 "sending it to multiple other floodfills.\n"
 "This provides a high degree of fault-tolerance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:504
 msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before"
-" inserting\n"
-"an item in the DHT to the closest target. As the verify operation will "
-"tend to\n"
-"discover closer floodfills if they are present, a router will quickly "
-"improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
-"LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes "
-"necessary,\n"
-"a router may simply do an iterative search for a key with the least "
-"significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the "
-"DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-"
-"distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
+"an item in the DHT to the closest target. As the verify operation will tend to\n"
+"discover closer floodfills if they are present, a router will quickly improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
+"a router may simply do an iterative search for a key with the least significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-distant peer had\n"
 "the netdb item."
 msgstr ""
 
@@ -8124,11 +7247,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:518
 #, python-format
 msgid ""
-"A router publishes its own RouterInfo by directly connecting to a "
-"floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
 "and sending it a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic "
-"encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
 "as this is a direct connection, so there are no intervening routers\n"
 "(and no need to hide this data anyway).\n"
 "The floodfill router replies with a\n"
@@ -8142,8 +7263,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:533
 msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
-"router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
 "must take care that the LeaseSet cannot be associated with the router."
 msgstr ""
 
@@ -8152,10 +7272,8 @@ msgstr ""
 msgid ""
 "A router publishes a local LeaseSet by\n"
 "sending a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that "
-"Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's "
-"Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
 "to hide the message from the tunnel's outbound endpoint.\n"
 "The floodfill router replies with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DeliveryStatusMessage,\n"
@@ -8171,17 +7289,12 @@ msgstr ""
 #, python-format
 msgid ""
 "After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored "
-"in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
 "local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
-"floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the "
-"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the "
-"floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good "
-"knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good knowledge of the\n"
 "DHT \"neighborhood\" for the routing key."
 msgstr ""
 
@@ -8203,17 +7316,15 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:574
 #, python-format
 msgid ""
-"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to "
-"request a netdb entry from a floodfill router.\n"
+"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
 "Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound "
-"exploratory tunnels."
+"The replies are specified to return via one of the router's inbound exploratory tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:580
 msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't "
-"fail) floodfill routers closest to the requested key, in parallel."
+"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
+" floodfill routers closest to the requested key, in parallel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:584
@@ -8221,8 +7332,7 @@ msgstr ""
 msgid ""
 "If the key is found locally by the floodfill router, it responds with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with"
-" a\n"
+"If the key is not found locally by the floodfill router, it responds with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n"
 "containing a list of other floodfill routers close to the key."
 msgstr ""
@@ -8230,22 +7340,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:592
 msgid ""
 "LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
-"by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
-"encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
 "RouterInfo lookup encryption may be enabled in a future release."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:599
 msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
-" or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
 "will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
-"\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
-" encryption."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:606
@@ -8259,41 +7364,31 @@ msgstr ""
 msgid ""
 "Due to the relatively small size of the network and flooding redundancy,\n"
 "lookups are usually O(1) rather than O(log n).\n"
-"A router is highly likely to know a floodfill router close enough to the "
-"key to get the answer on the first try.\n"
+"A router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
 "In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and"
-"\n"
-"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was "
-"implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and\n"
+"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was implemented.\n"
 "Queries were sent through <i>multiple routes simultaneously</i>\n"
 "to <i>reduce the chance of query failure</i>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:621
 msgid ""
-"As of release 0.8.9, <i>iterative lookups</i> are implemented with no "
-"lookup redundancy.\n"
+"As of release 0.8.9, <i>iterative lookups</i> are implemented with no lookup redundancy.\n"
 "This is a more efficient and reliable lookup that will work much better\n"
 "when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows "
-"only a small\n"
+"limitation to network growth. As the network grows and each router knows only a small\n"
 "subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup"
-" continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious "
-"floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total "
-"lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
 "or the maximum number of peers is queried."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:633
 msgid ""
-"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash "
-"directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally "
-"ignored.\n"
+"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally ignored.\n"
 "Given the current size of the network, a router has\n"
 "<i>detailed knowledge of the neighborhood of the destination ID space</i>."
 msgstr ""
@@ -8305,8 +7400,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:643
 #, python-format
 msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
-"prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
 "the attack described in the paper\n"
 "<a href=\"%(egger2013)s\">Practical Attacks Against the I2P Network</a>.\n"
 "It is not clear if verification can be redesigned to be done safely."
@@ -8314,13 +7408,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:650
 msgid ""
-"To verify a storage was successful, a router simply waits about 10 "
-"seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 seconds,\n"
 "then sends a lookup to another floodfill router close to the key\n"
 "(but not the one the store was sent to).\n"
 "Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the "
-"outbound endpoint(OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:658
@@ -8329,22 +7421,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:659
 msgid ""
-"To verify a storage was successful, a router simply waits about 10 "
-"seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 seconds,\n"
 "then sends a lookup to another floodfill router close to the key\n"
 "(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination "
-"of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
 "To prevent snooping by the OBEP of the outbound tunnel,\n"
 "lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound "
-"tunnels."
+"The replies are specified to return via one of the client's inbound tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:669
 msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
-"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
 "will be encrypted,\n"
 "to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
 msgstr ""
@@ -8356,23 +7444,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:678
 #, python-format
 msgid ""
-"<i>Exploration</i> is a special form of netdb lookup, where a router "
-"attempts to learn about\n"
+"<i>Exploration</i> is a special form of netdb lookup, where a router attempts to learn about\n"
 "new routers.\n"
-"It does this by sending a floodfill router a <a "
-"href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random "
-"key.\n"
+"It does this by sending a floodfill router a <a href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random key.\n"
 "As this lookup will fail, the floodfill would normally respond with a\n"
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing "
-"hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already "
-"knows those floodfills,\n"
-"and it would be impractical to add all floodfill routers to the \"don't "
-"include\" field of the DatabaseLookup Message.\n"
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
+"and it would be impractical to add all floodfill routers to the \"don't include\" field of the DatabaseLookup Message.\n"
 "For an exploration query, the requesting router sets a special flag in\n"
 "the DatabaseLookup Message.\n"
-"The floodfill will then respond only with non-floodfill routers close to "
-"the requested key."
+"The floodfill will then respond only with non-floodfill routers close to the requested key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:692
@@ -8381,14 +7462,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:693
 msgid ""
-"The response to a lookup request is either a Database Store Message (on "
-"success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' "
-"router hash field\n"
+"The response to a lookup request is either a Database Store Message (on success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
 "to indicate the source of the reply; the DSM does not.\n"
 "The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple "
-"requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
 "difficult to monitor the performance of the various floodfill routers."
 msgstr ""
 
@@ -8398,19 +7476,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:705
 msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using "
-"the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
 "private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the"
-" floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer "
-"requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
-"instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that."
-"\n"
-"The multihoming function has been verified and is in use by several "
-"services on the network."
+"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that.\n"
+"The multihoming function has been verified and is in use by several services on the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:727
@@ -8440,8 +7512,7 @@ msgstr ""
 #, python-format
 msgid ""
 "There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less "
-"impact,\n"
+"Most of the following attacks will become more difficult, or have less impact,\n"
 "as the network size and number of floodfill routers increase."
 msgstr ""
 
@@ -8452,8 +7523,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:748
 #, python-format
 msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
-" routers closest to the key."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
+"routers closest to the key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:753
@@ -8474,8 +7545,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Each router maintains an expanded set of statistics in the\n"
-"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,"
-"\n"
+"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,\n"
 "covering various quality metrics for that peer.\n"
 "The set includes:"
 msgstr ""
@@ -8506,14 +7576,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:775
 msgid ""
-"Each time a router needs to make a determination on which floodfill "
-"router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
 "it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are "
-"relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
 "are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and "
-"avoided,\n"
+"While a completely unresponsive router will quickly be identified and avoided,\n"
 "routers that are only sometimes malicious may be much harder to deal with."
 msgstr ""
 
@@ -8525,8 +7592,7 @@ msgstr ""
 #, python-format
 msgid ""
 "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n"
-"by creating a large number of floodfill routers spread throughout the "
-"keyspace."
+"by creating a large number of floodfill routers spread throughout the keyspace."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:791
@@ -8534,35 +7600,29 @@ msgstr ""
 msgid ""
 "(In a related example, a researcher recently created a\n"
 "<a href=\"%(url)s\">large number of Tor relays</a>.)\n"
-"If successful, this could be an effective DOS attack on the entire "
-"network."
+"If successful, this could be an effective DOS attack on the entire network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:797
 msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as "
-"\"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
 "metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the "
-"suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
 "can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however "
-"none of them is completely satisfactory:"
+"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:805
 msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through"
-" various means\n"
-"(console news, website, forum, etc.); users would have to manually "
-"download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
+"(console news, website, forum, etc.); users would have to manually download the list and\n"
 "add it to their local \"blacklist\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:810
 msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil "
-"with more Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil with "
+"more Sybil)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:811
@@ -8571,8 +7631,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:812
 msgid ""
-"Release a new software version that improves the peer profile metrics and"
-" thresholds,\n"
+"Release a new software version that improves the peer profile metrics and thresholds,\n"
 "in an attempt to automatically identify the \"bad\" peers."
 msgstr ""
 
@@ -8584,12 +7643,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:817
 msgid ""
-"Implement an automatic subscription-based blacklist controlled by a "
-"single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" "
-"model.\n"
-"Unfortunately it would also give a single individual or group the power "
-"to\n"
+"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" model.\n"
+"Unfortunately it would also give a single individual or group the power to\n"
 "block participation of any particular router or IP in the network,\n"
 "or even to completely shutdown or destroy the entire network."
 msgstr ""
@@ -8606,25 +7662,19 @@ msgstr ""
 #, python-format
 msgid ""
 "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n"
-"by creating a small number (8-15) of floodfill routers clustered closely "
-"in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
 "and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed"
-"\n"
+"Then, all lookups and stores for a key in that keyspace would be directed\n"
 "to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular I2P "
-"Site, for example."
+"If successful, this could be an effective DOS attack on a particular I2P Site, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:842
 msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
-"\n"
-"an attacker must use a brute-force method to repeatedly generate router "
-"hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
+"an attacker must use a brute-force method to repeatedly generate router hashes\n"
 "until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent "
-"on network\n"
+"The amount of computational power required for this, which is dependent on network\n"
 "size, is unknown."
 msgstr ""
 
@@ -8632,14 +7682,10 @@ msgstr ""
 msgid ""
 "As a partial defense against this attack,\n"
 "the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
-"\n"
-"we use the Hash of the key appended with the current date string, i.e. "
-"H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which "
-"transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
-"midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
+"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
 "Any partial-keyspace attack would have to be regenerated every day, for\n"
 "after the rotation, the attacking routers would no longer be close\n"
 "to the target key, or to each other."
@@ -8648,8 +7694,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:862
 msgid ""
 "This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not "
-"particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
 "An attacker can precompute numerous router hashes in advance,\n"
 "and only a few routers are sufficient to \"eclipse\" a portion\n"
 "of the keyspace within a half hour after rotation."
@@ -8657,11 +7702,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:870
 msgid ""
-"One consequence of daily keyspace rotation is that the distributed "
-"network database\n"
+"One consequence of daily keyspace rotation is that the distributed network database\n"
 "may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a "
-"store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a store yet.\n"
 "The extent of the issue, and methods for mitigation\n"
 "(for example netdb \"handoffs\" at midnight)\n"
 "are a topic for further study."
@@ -8724,24 +7767,19 @@ msgstr ""
 #, python-format
 msgid ""
 "See also <a href=\"#lookup\">lookup</a>\n"
-"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections "
-"2.2-2.3 for terms below in italics)"
+"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections 2.2-2.3 for terms below in italics)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:926
 msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could"
-" attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their "
-"references."
+"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their references."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:931
 msgid ""
-"This is unlikely to work via exploration, because exploration is a low-"
-"frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel"
-" building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
 "Exploration results are generally limited to a few router hashes,\n"
 "and each exploration query is directed to a random floodfill router."
 msgstr ""
@@ -8753,18 +7791,13 @@ msgid ""
 "For floodfill router references returned in a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n"
 "response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to"
-" the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to the lookup key.\n"
 "The requesting router does not trust that the references are\n"
 "closer to the key (i.e. they are <i>verifiably correct</i>.\n"
-"The lookup also does not stop when no closer key is found, but continues "
-"by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is "
-"reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key "
-"space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a "
-"router info\n"
+"The lookup also does not stop when no closer key is found, but continues by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
 "within the desired key space region.\n"
 "This design ensures that the query capture attack described in\n"
 "<a href=\"%(pdf)s\">Hashing it out in Public</a>\n"
@@ -8802,43 +7835,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:973
 #, python-format
 msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
-"by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of "
-"DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network "
-"database lookups are only\n"
-"loosely correlated to the <a href=\"%(peerselection)s\">peer "
-"selection</a> and\n"
-"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only "
-"previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
+"loosely correlated to the <a href=\"%(peerselection)s\">peer selection</a> and\n"
+"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only previously-known peers\n"
 "are used for tunnels.\n"
 "Also, peer selection is unrelated to any notion of DHT key-closeness."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:984
 msgid ""
-"Some of this may actually be more interesting when the I2P network gets "
-"much larger.\n"
-"Right now, each router knows a large proportion of the network, so "
-"looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a "
-"future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, "
-"the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that "
-"much harder."
+"Some of this may actually be more interesting when the I2P network gets much larger.\n"
+"Right now, each router knows a large proportion of the network, so looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that much harder."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:992
 #, python-format
 msgid ""
-"However, the general issue of DHT information leakage in I2P needs "
-"further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather "
-"information.\n"
-"Certainly, at a level of <i>f</i> = 0.2 (20&#37; malicious nodes, as "
-"specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather information.\n"
+"Certainly, at a level of <i>f</i> = 0.2 (20&#37; malicious nodes, as specifed in the paper)\n"
 "we expect that many of the Sybil threats we describe\n"
 "(<a href=\"%(threatmodel)s#sybil\">here</a>,\n"
 "<a href=\"#sybil\">here</a> and\n"
@@ -8873,11 +7893,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:10
 #, python-format
 msgid ""
-"<b>Peer profiling</b> is the process of collecting data based on the "
-"<b>observed</b> performance\n"
+"<b>Peer profiling</b> is the process of collecting data based on the <b>observed</b> performance\n"
 "of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does <b>not</b> use any claimed performance data published by "
-"the peer itself\n"
+"Profiling does <b>not</b> use any claimed performance data published by the peer itself\n"
 "in the <a href=\"%(netdb)s\">network database</a>."
 msgstr ""
 
@@ -8892,8 +7910,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:20
 #, python-format
 msgid ""
-"Choosing peers from the set of floodfill routers to use for network "
-"database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
 "which is discussed on the <a href=\"%(netdb)s\">network database</a> page"
 msgstr ""
 
@@ -8906,11 +7923,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:28
 msgid ""
 "<b>Peer selection</b> is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers "
-"will we \n"
+"on the network we want to relay our messages to go through (which peers will we \n"
 "ask to join our tunnels).  To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how"
-" \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how \n"
 "fast they are, how often they will be able to accept our requests, and \n"
 "whether they seem to be overloaded or otherwise unable to perform what\n"
 "they agree to reliably."
@@ -8920,8 +7935,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is <b>only</b> used to avoid those "
-"peers\n"
+"claimed bandwidth is untrusted and is <b>only</b> used to avoid those peers\n"
 "advertising very low bandwidth insufficient for routing tunnels.\n"
 "All peer selection is done through profiling.\n"
 "This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -8933,10 +7947,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:50
 msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large"
-" number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
-"minutes."
+"Peer selection is done quite frequently, as a router may maintain a large number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:56
@@ -8947,11 +7959,9 @@ msgstr ""
 #, python-format
 msgid ""
 "For more information see the paper\n"
-"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous "
-"Network</a>\n"
+"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>\n"
 "presented at <a href=\"%(url)s\">PET-CON 2009.1</a>.\n"
-"See <a href=\"#notes\">below</a> for notes on minor changes since the "
-"paper was published."
+"See <a href=\"#notes\">below</a> for notes on minor changes since the paper was published."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:65
@@ -8961,30 +7971,21 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:66
 #, python-format
 msgid ""
-"Each peer has a set of data points collected about them, including "
-"statistics \n"
-"about how long it takes for them to reply to a network database query, "
-"how \n"
-"often their tunnels fail, and how many new peers they are able to "
-"introduce \n"
-"us to, as well as simple data points such as when we last heard from them"
-" or\n"
-"when the last communication error occurred.  The specific data points "
-"gathered\n"
+"Each peer has a set of data points collected about them, including statistics \n"
+"about how long it takes for them to reply to a network database query, how \n"
+"often their tunnels fail, and how many new peers they are able to introduce \n"
+"us to, as well as simple data points such as when we last heard from them or\n"
+"when the last communication error occurred.  The specific data points gathered\n"
 "can be found in the <a href=\"%(url)s\">code</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:75
 msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile"
-" expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
 "lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written "
-"to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all"
-" profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after "
-"startup."
+"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after startup."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:85
@@ -8994,10 +7995,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:86
 msgid ""
 "While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary "
-"down \n"
-"into four simple values, representing the peer's speed, its capacity, how"
-" well \n"
+"performance, to allow for effective peer selection we break each summary down \n"
+"into four simple values, representing the peer's speed, its capacity, how well \n"
 "integrated into the network it is, and whether it is failing."
 msgstr ""
 
@@ -9009,8 +8008,7 @@ msgstr "Speed"
 msgid ""
 "The speed calculation\n"
 "simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute.  For "
-"this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute.  For this estimate it just looks at\n"
 "performance in the previous minute."
 msgstr ""
 
@@ -9022,13 +8020,11 @@ msgstr ""
 msgid ""
 "The capacity calculation\n"
 "simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period.  For this "
-"estimate it looks at \n"
+"would agree to participate in over a given time period.  For this estimate it looks at \n"
 "how many tunnel build requests\n"
 "the peer has accepted, rejected, and dropped, and how many\n"
 "of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts "
-"more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
 "statistics up to 48 hours old may be included."
 msgstr ""
 
@@ -9036,10 +8032,8 @@ msgstr ""
 msgid ""
 "Recognizing and avoiding unreliable and unreachable\n"
 "peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the "
-"participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build "
-"request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
 "The router assigns a probability of failure to each of the\n"
 "peers, and uses that probability in the capacity calculation.\n"
 "Drops and test failures are weighted much higher than rejections."
@@ -9051,10 +8045,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:124
 msgid ""
-"As mentioned above, we drill through each peer's profile to come up with "
-"a \n"
-"few key calculations, and based upon those, we organize each peer into "
-"three\n"
+"As mentioned above, we drill through each peer's profile to come up with a \n"
+"few key calculations, and based upon those, we organize each peer into three\n"
 "groups - fast, high capacity, and standard."
 msgstr ""
 
@@ -9064,15 +8056,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:134
 msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets "
-"or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
 "exceeds the median of all peers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:138
 msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and "
-"their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
 "speed calculation meets or exceeds the median of all peers."
 msgstr ""
 
@@ -9098,25 +8088,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:156
 msgid ""
 "The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are "
-"placed in the group."
+"If there would be more, only the ones with the highest speed rating are placed in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:160
 msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)"
-"\n"
-"If there would be more, only the ones with the highest capacity rating "
-"are placed in the group."
+"The high capacity group is limited to 75 peers (including the fast group)\n"
+"If there would be more, only the ones with the highest capacity rating are placed in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:164
 msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the "
-"number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
 "stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 "
-"RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
 "(including those in the fast and high capacity groups)"
 msgstr ""
 
@@ -9132,16 +8117,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:177
 msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\""
-" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
 "at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through"
-" them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
 "which reinforces their presence in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid "The router selects peers from the above groups to build tunnels through."
+msgid ""
+"The router selects peers from the above groups to build tunnels through."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:193
@@ -9150,19 +8134,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:194
 msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies"
-" and web servers."
+"Client tunnels are used for application traffic, such as for HTTP proxies "
+"and web servers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:198
 msgid ""
-"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog"
-"/one-cell-enough\">some attacks</a>,\n"
+"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog/one-cell-enough\">some attacks</a>,\n"
 "and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest "
-"group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants"
-" in a tunnel for the same client."
+"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:206
@@ -9171,35 +8152,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:207
 msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as "
-"network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
 "and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected "
-"routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
 "they are called \"exploratory\".\n"
 "These tunnels are usually low-bandwidth."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:215
 msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from"
-" the standard group.\n"
-"If the success rate of these build attempts is low compared to the client"
-" tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high"
-" capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network "
-"performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants"
-" in an exploratory tunnel."
+"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
+"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:223
 msgid ""
-"As the standard group includes a very large subset of all peers the "
-"router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of "
-"all peers,\n"
+"As the standard group includes a very large subset of all peers the router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of all peers,\n"
 "until the build success rate becomes too low."
 msgstr ""
 
@@ -9209,8 +8181,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:232
 msgid ""
-"To prevent some simple attacks, and for performance, there are the "
-"following restrictions:"
+"To prevent some simple attacks, and for performance, there are the following"
+" restrictions:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:236
@@ -9219,8 +8191,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:239
 msgid ""
-"A peer may participate in a maximum of 33&#37; of all tunnels created by "
-"the router."
+"A peer may participate in a maximum of 33&#37; of all tunnels created by the"
+" router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:242
@@ -9241,18 +8213,18 @@ msgid ""
 "Peers are ordered within tunnels to\n"
 "to deal with the <a href=\"%(pdf)s\">predecessor attack</a>\n"
 "<a href=\"%(pdf2008)s\">(2008 update)</a>.\n"
-"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel "
-"page</a>."
+"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid "Continue to analyze an tune speed and capacity calculations as necessary"
+msgid ""
+"Continue to analyze an tune speed and capacity calculations as necessary"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:271
 msgid ""
-"Implement a more aggressive ejection strategy if necessary to control "
-"memory usage as the network grows"
+"Implement a more aggressive ejection strategy if necessary to control memory"
+" usage as the network grows"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:274
@@ -9267,10 +8239,8 @@ msgstr ""
 #, python-format
 msgid ""
 "For those reading the paper\n"
-"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous "
-"Network</a>,\n"
-"please keep in mind the following minor changes in I2P since the paper's "
-"publication:"
+"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>,\n"
+"please keep in mind the following minor changes in I2P since the paper's publication:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:289
@@ -9336,24 +8306,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:21
 msgid ""
 "I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security "
-"conscious \n"
-"applications can operate. Each of these applications may make their own "
-"anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper "
-"implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the "
-"larger \n"
+"network layer, upon which any number of different anonymity or security conscious \n"
+"applications can operate. Each of these applications may make their own anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the larger \n"
 "anonymity set of users already running on top of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:30
 msgid ""
-"Applications available already provide the full range of typical Internet"
-" activities -\n"
+"Applications available already provide the full range of typical Internet activities -\n"
 "<b>anonymous</b> web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other "
-"applications under development."
+"blogging and content syndication, newsgroups, as well as several other applications under development."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:36
@@ -9366,29 +8330,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:38
 msgid ""
-"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a "
-"href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n"
-"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a "
-"href=\"#app.i2pbt\">I2P-bt</a>\n"
+"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n"
+"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a href=\"#app.i2pbt\">I2P-bt</a>\n"
 "and others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:43
 msgid ""
-"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a href=\"#app.i2pbote"
-"\">I2P-Bote</a>."
+"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a "
+"href=\"#app.i2pbote\">I2P-Bote</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:44
 msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software "
-"<a href=\"#app.syndie\">Syndie</a>."
+"Blog: using e.g. the pebble plugin or the distributed blogging software <a "
+"href=\"#app.syndie\">Syndie</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:45
 msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
-"cloud over I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
+"over I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:46
@@ -9397,77 +8359,47 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:49
 msgid ""
-"Unlike web sites hosted within content distribution networks like <a "
-"href=\"#similar.freenet\">Freenet</a> \n"
-"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services "
-"hosted on \n"
-"I2P are fully interactive - there are traditional web-style search "
-"engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and "
-"bridges \n"
-"to query static systems like Freenet without needing to install it "
-"locally."
+"Unlike web sites hosted within content distribution networks like <a href=\"#similar.freenet\">Freenet</a> \n"
+"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services hosted on \n"
+"I2P are fully interactive - there are traditional web-style search engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
+"to query static systems like Freenet without needing to install it locally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:57
 msgid ""
 "With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to "
-"send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes"
-" care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a"
-" \n"
-"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's "
-"anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, "
-"transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high "
-"bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS "
-"proxies \n"
-"available to tie existing applications into the network, their value has "
-"been \n"
-"limited as nearly every application routinely exposes what, in an "
-"anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully "
-"audit \n"
-"an application to ensure proper operation and to assist in that we "
-"provide \n"
-"a series of APIs in various languages which can be used to make the most "
-"out \n"
+"of the message oriented middleware - applications say that they want to send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a \n"
+"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS proxies \n"
+"available to tie existing applications into the network, their value has been \n"
+"limited as nearly every application routinely exposes what, in an anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully audit \n"
+"an application to ensure proper operation and to assist in that we provide \n"
+"a series of APIs in various languages which can be used to make the most out \n"
 "of the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:74
 #, python-format
 msgid ""
-"I2P is not a research project - academic, commercial, or governmental, "
-"but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to "
-"provide \n"
-"a sufficient level of anonymity to those who need it. It has been in "
-"active \n"
-"development since early 2003 with one full time developer and a dedicated"
-" \n"
-"group of part time contributors from all over the world. All of the work "
-"done \n"
-"on I2P is open source and freely available on the <a "
-"href=\"%(site)s\">website</a>, \n"
-"with the majority of the code released outright into the public domain, "
-"though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The "
-"people \n"
-"working on I2P do not control what people release client applications "
-"under, \n"
-"and there are several GPL'ed applications available (<a "
-"href=\"#app.i2ptunnel\">I2PTunnel</a>, \n"
-"<a href=\"#app.i2pmail\">susimail</a>, <a "
-"href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-"
-"Bote</a>, \n"
+"I2P is not a research project - academic, commercial, or governmental, but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
+"a sufficient level of anonymity to those who need it. It has been in active \n"
+"development since early 2003 with one full time developer and a dedicated \n"
+"group of part time contributors from all over the world. All of the work done \n"
+"on I2P is open source and freely available on the <a href=\"%(site)s\">website</a>, \n"
+"with the majority of the code released outright into the public domain, though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The people \n"
+"working on I2P do not control what people release client applications under, \n"
+"and there are several GPL'ed applications available (<a href=\"#app.i2ptunnel\">I2PTunnel</a>, \n"
+"<a href=\"#app.i2pmail\">susimail</a>, <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-Bote</a>, \n"
 "<a href=\"#app.i2phex\">I2Phex</a> and others.).\n"
-"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from "
-"donations,\n"
+"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from donations,\n"
 "and does not receive any tax breaks in any jurisdiction at this time,\n"
 "as many of the developers are themselves anonymous."
 msgstr ""
@@ -9478,40 +8410,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:94
 msgid ""
-"To understand I2P's operation, it is essential to understand a few key "
-"concepts. \n"
-"First, I2P makes a strict separation between the software participating "
-"in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
-" associated \n"
-"with individual applications. The fact that someone is running I2P is not"
-" \n"
-"usually a secret. What is hidden is information on what the user is "
-"doing, \n"
-"if anything at all, as well as what router a particular destination is "
-"connected \n"
-"to. End users will typically have several local destinations on their "
-"router \n"
-"- for instance, one proxying in to IRC servers, another supporting the "
-"user's \n"
-"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, "
-"another for \n"
+"To understand I2P's operation, it is essential to understand a few key concepts. \n"
+"First, I2P makes a strict separation between the software participating in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
+"with individual applications. The fact that someone is running I2P is not \n"
+"usually a secret. What is hidden is information on what the user is doing, \n"
+"if anything at all, as well as what router a particular destination is connected \n"
+"to. End users will typically have several local destinations on their router \n"
+"- for instance, one proxying in to IRC servers, another supporting the user's \n"
+"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, another for \n"
 "torrents, etc."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:107
 msgid ""
 "Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of "
-"routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a "
-"single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
 "The decrypted information contains the IP of the next router, along with\n"
 "the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as "
-"\"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages "
-"back,\n"
+"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages back,\n"
 "another tunnel is required."
 msgstr ""
 
@@ -9531,15 +8450,12 @@ msgid ""
 "while <b>\"inbound\" tunnels</b> bring messages to the tunnel creator.\n"
 "Combining these two tunnels allows users to send messages to each other.\n"
 "The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound "
-"tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user"
-"\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user\n"
 "and will send them on until the endpoint (\"Bob\").\n"
 "The endpoint of the outbound tunnel will need to send the message\n"
 "on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted "
-"message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
 "Once the endpoint of the outbound tunnel decrypts the message,\n"
 "it will have instructions to forward the message to the correct\n"
 "inbound gateway (the gateway to \"Bob\")."
@@ -9547,25 +8463,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:140
 msgid ""
-"A third critical concept to understand is I2P's <b>\"network "
-"database\"</b> (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of "
-"metadata \n"
-"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the "
-"routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, "
-"transport \n"
-"addresses, etc), while the leaseSet gives routers the information "
-"necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of "
-"\"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a "
-"specific destination.\n"
+"A third critical concept to understand is I2P's <b>\"network database\"</b> (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of metadata \n"
+"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, transport \n"
+"addresses, etc), while the leaseSet gives routers the information necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
 "The full information contained in a lease:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:151
-msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
+msgid ""
+"Inbound gateway for a tunnel that allows reaching a specific destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:152
@@ -9580,10 +8490,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:155
 msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while "
-"leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router "
-"with his leaseSets)."
+"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:160
@@ -9594,13 +8502,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:164
 msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in "
-"the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
 "This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the "
-"construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has"
-" been constructed."
+"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has been constructed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:171
@@ -9617,30 +8522,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:178
 msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the"
-" \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
-"gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it "
-"with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on"
-" \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
-"endpoint \n"
-"receives those instructions, it forwards the message as requested, and "
-"when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
-" \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, "
-"she \n"
-"needs to transmit her own destination explicitly as part of the message "
-"itself.\n"
-"This can be done by introducing a higher-level layer, which is done in "
-"the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
+"receives those instructions, it forwards the message as requested, and when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
+"needs to transmit her own destination explicitly as part of the message itself.\n"
+"This can be done by introducing a higher-level layer, which is done in the\n"
 "<a href=\"#app.streaming\">streaming</a> library.\n"
 "Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
-"lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
 "for it when he wants to reply, but this is optional."
 msgstr ""
 
@@ -9658,208 +8552,126 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:200
 msgid ""
-"While the tunnels themselves have layered encryption to prevent "
-"unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself "
-"does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is "
-"necessary \n"
-"to add an additional end to end layer of encryption to hide the message "
-"from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a "
-"href=\"#op.garlic\">garlic \n"
-"encryption</a>\" lets Alice's router wrap up multiple messages into a "
-"single \n"
-"\"garlic message\", encrypted to a particular public key so that "
-"intermediary \n"
-"peers cannot determine either how many messages are within the garlic, "
-"what \n"
-"those messages say, or where those individual cloves are destined. For "
-"typical \n"
-"end to end communication between Alice and Bob, the garlic will be "
-"encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be"
-" \n"
+"While the tunnels themselves have layered encryption to prevent unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
+"to add an additional end to end layer of encryption to hide the message from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a href=\"#op.garlic\">garlic \n"
+"encryption</a>\" lets Alice's router wrap up multiple messages into a single \n"
+"\"garlic message\", encrypted to a particular public key so that intermediary \n"
+"peers cannot determine either how many messages are within the garlic, what \n"
+"those messages say, or where those individual cloves are destined. For typical \n"
+"end to end communication between Alice and Bob, the garlic will be encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be \n"
 "encrypted without giving out the public key to Bob's own router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:215
 msgid ""
-"Another important fact to keep in mind is that I2P is entirely message "
-"based \n"
-"and that some messages may be lost along the way. Applications using I2P "
-"can \n"
-"use the message oriented interfaces and take care of their own congestion"
-" \n"
-"control and reliability needs, but most would be best served by reusing "
-"the \n"
-"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as "
-"a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message based \n"
+"and that some messages may be lost along the way. Applications using I2P can \n"
+"use the message oriented interfaces and take care of their own congestion \n"
+"control and reliability needs, but most would be best served by reusing the \n"
+"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n"
 "based network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:225
 msgid ""
 "Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually "
-"preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that "
-"preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel "
-"participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate "
-"before \n"
-"forward it on to the next peer. Eventually, the message arrives at the "
-"endpoint \n"
-"where the messages are split out again and forwarded on as requested. The"
-" \n"
-"difference arises in what the tunnel's creator does - for inbound "
-"tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers "
-"added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-"
-"decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption "
-"are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate before \n"
+"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
+"where the messages are split out again and forwarded on as requested. The \n"
+"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption are \n"
 "added, the message arrives in the clear at the tunnel endpoint."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:240
 msgid ""
-"The choice of specific peers to pass on messages as well as their "
-"particular \n"
-"ordering is important to understanding both I2P's anonymity and "
-"performance \n"
-"characteristics. While the network database (below) has its own criteria "
-"for \n"
-"picking what peers to query and store entries on, tunnel creators may use"
-" any peers \n"
-"in the network in any order (and even any number of times) in a single "
-"tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and "
-"ordering \n"
-"would be driven by the particular needs of the client in tandem with "
-"their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to "
-"gather \n"
-"anonymously, and depending upon untrusted peers to provide this "
-"information \n"
+"The choice of specific peers to pass on messages as well as their particular \n"
+"ordering is important to understanding both I2P's anonymity and performance \n"
+"characteristics. While the network database (below) has its own criteria for \n"
+"picking what peers to query and store entries on, tunnel creators may use any peers \n"
+"in the network in any order (and even any number of times) in a single tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and ordering \n"
+"would be driven by the particular needs of the client in tandem with their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
+"anonymously, and depending upon untrusted peers to provide this information \n"
 "has its own serious anonymity implications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:253
 msgid ""
-"From an anonymity perspective, the simplest technique would be to pick "
-"peers \n"
-"randomly from the entire network, order them randomly and use those peers"
-" \n"
-"in that order for all eternity. From a performance perspective, the "
-"simplest \n"
-"technique would be to pick the fastest peers with the necessary spare "
-"capacity, \n"
-"spreading the load across different peers to handle transparent failover,"
-" \n"
-"and to rebuild the tunnel whenever capacity information changes. While "
-"the \n"
-"former is both brittle and inefficient, the later requires inaccessible "
-"information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a "
-"range \n"
-"of peer selection strategies, coupled with anonymity aware measurement "
-"code \n"
+"From an anonymity perspective, the simplest technique would be to pick peers \n"
+"randomly from the entire network, order them randomly and use those peers \n"
+"in that order for all eternity. From a performance perspective, the simplest \n"
+"technique would be to pick the fastest peers with the necessary spare capacity, \n"
+"spreading the load across different peers to handle transparent failover, \n"
+"and to rebuild the tunnel whenever capacity information changes. While the \n"
+"former is both brittle and inefficient, the later requires inaccessible information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a range \n"
+"of peer selection strategies, coupled with anonymity aware measurement code \n"
 "to organize the peers by their profiles."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:266
 msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts"
-" \n"
-"with by measuring their indirect behavior - for instance, when a peer "
-"responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
-"the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and "
-"outbound) \n"
-"through which the request and response passed, as well as the queried "
-"peer's \n"
-"profile. Direct measurement, such as transport layer latency or "
-"congestion, \n"
-"is not used as part of the profile, as it can be manipulated and "
-"associated \n"
-"with the measuring router, exposing them to trivial attacks. While "
-"gathering \n"
-"these profiles, a series of calculations are run on each to summarize its"
-" \n"
-"performance - its latency, capacity to handle lots of activity, whether "
-"they \n"
-"are currently overloaded, and how well integrated into the network they "
-"seem \n"
-"to be. These calculations are then compared for active peers to organize "
-"the \n"
-"routers into four tiers - fast and high capacity, high capacity, not "
-"failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, "
-"and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts \n"
+"with by measuring their indirect behavior - for instance, when a peer responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
+"through which the request and response passed, as well as the queried peer's \n"
+"profile. Direct measurement, such as transport layer latency or congestion, \n"
+"is not used as part of the profile, as it can be manipulated and associated \n"
+"with the measuring router, exposing them to trivial attacks. While gathering \n"
+"these profiles, a series of calculations are run on each to summarize its \n"
+"performance - its latency, capacity to handle lots of activity, whether they \n"
+"are currently overloaded, and how well integrated into the network they seem \n"
+"to be. These calculations are then compared for active peers to organize the \n"
+"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, and \n"
 "while they currently use fairly simple algorithms, alternatives exist."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:284
 msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy "
-"is to\n"
-"pick peers randomly from the top tier (fast and high capacity), and this "
-"is\n"
-"currently deployed for client tunnels. Exploratory tunnels (used for "
-"netDb and\n"
-"tunnel management) pick peers randomly from the \"not failing\" tier "
-"(which\n"
+"Using this profile data, the simplest reasonable peer selection strategy is to\n"
+"pick peers randomly from the top tier (fast and high capacity), and this is\n"
+"currently deployed for client tunnels. Exploratory tunnels (used for netDb and\n"
+"tunnel management) pick peers randomly from the \"not failing\" tier (which\n"
 "includes routers in 'better' tiers as well), allowing the peer to sample\n"
-"routers more widely, in effect optimizing the peer selection through "
-"randomized\n"
-"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill "
-"climbing</a>. These\n"
+"routers more widely, in effect optimizing the peer selection through randomized\n"
+"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill climbing</a>. These\n"
 "strategies alone do however leak information regarding the peers in the\n"
-"router's top tier through predecessor and netDb harvesting attacks. In "
-"turn,\n"
-"several alternatives exist which, while not balancing the load as evenly,"
-" will\n"
+"router's top tier through predecessor and netDb harvesting attacks. In turn,\n"
+"several alternatives exist which, while not balancing the load as evenly, will\n"
 "address the attacks mounted by particular classes of adversaries."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:298
 msgid ""
-"By picking a random key and ordering the peers according to their XOR "
-"distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting "
-"attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple"
-" \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the "
-"inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
-"deal \n"
-"with predecessor attacks for adversaries which the client contacts, the "
-"outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to "
-"fix \n"
-"on the most exposed point would of course need to have a limit to the "
-"duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted "
-"or \n"
-"proactively avoided to mimic a measured mean time between failures of "
-"other \n"
-"routers. These two strategies can in turn be combined, using a fixed "
-"exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more "
-"rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, "
-"only \n"
-"using individual peers if all of them agree to participate in the same "
-"way \n"
-"each time. This varies from the XOR based ordering in that the "
-"predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes "
-"sure \n"
+"By picking a random key and ordering the peers according to their XOR distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
+"with predecessor attacks for adversaries which the client contacts, the outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
+"on the most exposed point would of course need to have a limit to the duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted or \n"
+"proactively avoided to mimic a measured mean time between failures of other \n"
+"routers. These two strategies can in turn be combined, using a fixed exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
+"using individual peers if all of them agree to participate in the same way \n"
+"each time. This varies from the XOR based ordering in that the predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes sure \n"
 "their order doesn't change."
 msgstr ""
 
@@ -9868,10 +8680,8 @@ msgstr ""
 msgid ""
 "As mentioned before, I2P currently (release 0.8) includes the tiered \n"
 "random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, "
-"management, \n"
-"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel "
-"spec</a>."
+"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
+"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:326
@@ -9885,27 +8695,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:332
 msgid ""
 "A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast "
-"enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing "
-"floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
 "drops too low."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:339
 #, python-format
 msgid ""
-"Other I2P routers will store their data and lookup data by sending simple"
-" 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the "
-"information to other floodfill routers\n"
-"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia "
-"algorithm</a>.\n"
-"The 'lookup' queries currently function differently, to avoid an "
-"important\n"
+"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
+"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algorithm</a>.\n"
+"The 'lookup' queries currently function differently, to avoid an important\n"
 "<a href=\"%(netdb)s#lookup\">security issue</a>.\n"
-"When a lookup is done, the floodfill router will not forward the lookup "
-"to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
 "but will always answer by itself (if it has the requested data)."
 msgstr ""
 
@@ -9915,8 +8718,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:353
 msgid ""
-"A <b>RouterInfo</b> stores information on a specific I2P router and how "
-"to contact it"
+"A <b>RouterInfo</b> stores information on a specific I2P router and how to "
+"contact it"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:354
@@ -9927,14 +8730,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:356
 msgid ""
-"All of this information is signed by the publishing party and verified by"
-" any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of "
-"old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the "
-"correct time, occasionally querying some SNTP servers \n"
-"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by"
-" default)\n"
+"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
+"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n"
 "and detecting skew between routers at the transport layer."
 msgstr ""
 
@@ -9949,10 +8748,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:370
 msgid ""
 "One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will"
-" however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
-" decoded by people with access to the decryption key."
+"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:377
@@ -9961,13 +8758,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:378
 msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive"
-" a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
 "it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to "
-"make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo "
-"files and bootstrap."
+"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:386
@@ -9977,26 +8771,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:387
 msgid ""
 "Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very "
-"large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will"
-" be present\n"
-"on each netDb router. This will cause a deterioration of the percentage "
-"of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next "
-"releases."
+"Currently, this is not a major problem, since the network is not very large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
+"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next releases."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:398
 msgid ""
-"Communication between routers needs to provide confidentiality and "
-"integrity \n"
-"against external adversaries while authenticating that the router "
-"contacted \n"
-"is the one who should receive a given message. The particulars of how "
-"routers \n"
-"communicate with other routers aren't critical - three separate protocols"
-" \n"
+"Communication between routers needs to provide confidentiality and integrity \n"
+"against external adversaries while authenticating that the router contacted \n"
+"is the one who should receive a given message. The particulars of how routers \n"
+"communicate with other routers aren't critical - three separate protocols \n"
 "have been used at different points to provide those bare necessities."
 msgstr ""
 
@@ -10004,12 +8790,9 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree "
-"communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved"
-" \n"
-"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - "
-"\"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved \n"
+"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n"
 "Semireliable UDP\", or \"SSU\"."
 msgstr ""
 
@@ -10021,46 +8804,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:418
 msgid ""
 "The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal "
-"amount \n"
-"of data easily discernible to third parties. It should support high "
-"degree \n"
-"communication as well as TCP-friendly congestion control and may include"
-" \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at "
-"rates \n"
-"sufficient for home users. In addition, it should support techniques for "
-"addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal amount \n"
+"of data easily discernible to third parties. It should support high degree \n"
+"communication as well as TCP-friendly congestion control and may include \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
+"sufficient for home users. In addition, it should support techniques for addressing \n"
 "network obstacles, like most NATs or firewalls."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:428
 #, python-format
 msgid ""
-"Following the introduction of SSU, after issues with congestion collapse"
-" \n"
-"appeared, a new NIO-based TCP transport called <a "
-"href=\"%(ntcp)s\">NTCP</a> \n"
-"was implemented. It is enabled by default for outbound connections only. "
-"Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify"
-" \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
-"inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
-" \n"
+"Following the introduction of SSU, after issues with congestion collapse \n"
+"appeared, a new NIO-based TCP transport called <a href=\"%(ntcp)s\">NTCP</a> \n"
+"was implemented. It is enabled by default for outbound connections only. Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
 "per connection issues of the old TCP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:438
 msgid ""
 "I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids"
-" for \n"
-"the connection and the relative value of these bids assigns the priority."
-" \n"
-"Transports may reply with different bids, depending on whether there is "
-"already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids for \n"
+"the connection and the relative value of these bids assigns the priority. \n"
+"Transports may reply with different bids, depending on whether there is already \n"
 "an established connection to the peer."
 msgstr ""
 
@@ -10068,38 +8837,25 @@ msgstr ""
 #, python-format
 msgid ""
 "The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both "
-"outbound \n"
-"and inbound connections. Your firewall and your I2P router must be "
-"configured \n"
-"to allow inbound NTCP connections. For further information see the <a "
-"href=\"%(ntcp)s\">NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both outbound \n"
+"and inbound connections. Your firewall and your I2P router must be configured \n"
+"to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n"
 "page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:455
 msgid ""
 "A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the "
-"lowest \n"
-"level, inter router communication is protected by the transport layer "
-"security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
-"MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
-"2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other"
-" \n"
-"router's DSA key, plus each network message has their own hash for local "
-"integrity \n"
-"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the "
-"transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and "
-"verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other "
-"messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with "
-"ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
+"level, inter router communication is protected by the transport layer security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other \n"
+"router's DSA key, plus each network message has their own hash for local integrity \n"
+"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
 "(explained below)."
 msgstr ""
 
@@ -10109,51 +8865,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:471
 msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, "
-"allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully "
-"formed \n"
-"messages alongside their own instructions for delivery. Messages are "
-"wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in "
-"cleartext \n"
-"through a peer who should not have access to the information - for "
-"instance, \n"
-"when a router wants to ask another router to participate in a tunnel, "
-"they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving "
-"router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another "
-"example \n"
-"is when a client wants to send a message to a destination - the sender's "
-"router \n"
-"will wrap up that data message (alongside some other messages) into a "
-"garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the "
-"recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
+"messages alongside their own instructions for delivery. Messages are wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in cleartext \n"
+"through a peer who should not have access to the information - for instance, \n"
+"when a router wants to ask another router to participate in a tunnel, they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
+"is when a client wants to send a message to a destination - the sender's router \n"
+"will wrap up that data message (alongside some other messages) into a garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
 "leaseSet, and forward it through the appropriate tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:486
 msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer "
-"includes \n"
-"the ability to request that the clove be forwarded locally, to a remote "
-"router, \n"
-"or to a remote tunnel on a remote router. There are fields in those "
-"instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain "
-"time \n"
-"or condition has been met, though they won't be honored until the <a "
-"href=\"#future.variablelatency\">nontrivial \n"
-"delays</a> are deployed. It is possible to explicitly route garlic "
-"messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel "
-"messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops "
-"prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques "
-"are \n"
+"The \"instructions\" attached to each clove inside the encryption layer includes \n"
+"the ability to request that the clove be forwarded locally, to a remote router, \n"
+"or to a remote tunnel on a remote router. There are fields in those instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain time \n"
+"or condition has been met, though they won't be honored until the <a href=\"#future.variablelatency\">nontrivial \n"
+"delays</a> are deployed. It is possible to explicitly route garlic messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques are \n"
 "not currently used in the existing implementation."
 msgstr ""
 
@@ -10163,54 +8899,35 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:500
 msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple "
-"combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data "
-"confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred"
-" \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
-"describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
 "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:539
 msgid ""
-"Session tags themselves have a very short lifetime, after which they are"
-" \n"
-"discarded if not used. In addition, the quantity stored for each key is "
-"limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or "
-"old \n"
-"messages may be dropped. The sender keeps track whether messages using "
-"session \n"
-"tags are getting through, and if there isn't sufficient communication it "
-"may \n"
-"drop the ones previously assumed to be properly delivered, reverting back"
-" \n"
+"Session tags themselves have a very short lifetime, after which they are \n"
+"discarded if not used. In addition, the quantity stored for each key is limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or old \n"
+"messages may be dropped. The sender keeps track whether messages using session \n"
+"tags are getting through, and if there isn't sufficient communication it may \n"
+"drop the ones previously assumed to be properly delivered, reverting back \n"
 "to the full expensive ElGamal encryption."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:549
 msgid ""
-"One alternative is to transmit only a single session tag, and from that,"
-" \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By "
-"keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the "
-"recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of "
-"periodically \n"
-"bundling a large number of tags is removed, allowing more options in the "
-"space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions "
-"necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the "
-"necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount"
-" \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the "
-"moment, \n"
+"One alternative is to transmit only a single session tag, and from that, \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
+"bundling a large number of tags is removed, allowing more options in the space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
 "there are no immediate plans to move towards these synchronized PRNGs."
 msgstr ""
 
@@ -10220,12 +8937,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:563
 msgid ""
-"While I2P is currently functional and sufficient for many scenarios, "
-"there \n"
-"are several areas which require further improvement to meet the needs of "
-"those \n"
-"facing more powerful adversaries as well as substantial user experience "
-"optimization."
+"While I2P is currently functional and sufficient for many scenarios, there \n"
+"are several areas which require further improvement to meet the needs of those \n"
+"facing more powerful adversaries as well as substantial user experience optimization."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:569
@@ -10234,106 +8948,64 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:570
 msgid ""
-"I2P is an overlay network designed to be run on top of a functional "
-"packet \n"
-"switched network, exploiting the end to end principle to offer anonymity "
-"and \n"
-"security. While the Internet no longer fully embraces the end to end "
-"principle\n"
+"I2P is an overlay network designed to be run on top of a functional packet \n"
+"switched network, exploiting the end to end principle to offer anonymity and \n"
+"security. While the Internet no longer fully embraces the end to end principle\n"
 "(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - "
-"there \n"
-"may be a number of peers along the edges running using restricted routes,"
-" \n"
-"but I2P does not include an appropriate routing algorithm for the "
-"degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a"
-" \n"
+"I2P does require a substantial portion of the network to be reachable - there \n"
+"may be a number of peers along the edges running using restricted routes, \n"
+"but I2P does not include an appropriate routing algorithm for the degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a \n"
 "network employing such an algorithm."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:582
 msgid ""
-"Restricted route operation, where there are limits to what peers are "
-"reachable \n"
-"directly, has several different functional and anonymity implications, "
-"dependent \n"
-"upon how the restricted routes are handled. At the most basic level, "
-"restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow"
-" \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
-"integrating \n"
-"distributed hole punching into the transport layer, allowing people "
-"behind \n"
-"most NATs and firewalls to receive unsolicited connections without any "
-"configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to "
-"routers \n"
-"inside the network, as they can simply get introduced to the peer through"
-" \n"
+"Restricted route operation, where there are limits to what peers are reachable \n"
+"directly, has several different functional and anonymity implications, dependent \n"
+"upon how the restricted routes are handled. At the most basic level, restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
+"distributed hole punching into the transport layer, allowing people behind \n"
+"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to routers \n"
+"inside the network, as they can simply get introduced to the peer through \n"
 "the published introducer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:595
 msgid ""
-"Beyond the functional handling of restricted routes, there are two levels"
-" \n"
-"of restricted operation that can be used to limit the exposure of one's "
-"IP \n"
-"address - using router-specific tunnels for communication, and offering "
-"'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels "
-"or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of "
-"them \n"
-"as part of their routerInfo in place of their transport addresses. When a"
-" \n"
-"peer wants to get in touch with them, they see those tunnel gateways in "
-"the \n"
-"netDb and simply send the relevant message to them through one of the "
-"published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may "
-"do \n"
-"so either directly (if they are willing to expose their IP to the peer) "
-"or \n"
-"indirectly through their outbound tunnels. When the routers that the peer"
-" \n"
-"has direct connections to want to reach it (to forward tunnel messages, "
-"for \n"
-"instance), they simply prioritize their direct connection over the "
-"published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the "
-"restricted \n"
-"route by not publishing any router addresses. Such a router would not "
-"even \n"
-"need to publish their routerInfo in the netDb, merely providing their "
-"self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the "
-"router's \n"
-"public keys). Both levels of restricted route operation are planned for "
-"I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels \n"
+"of restricted operation that can be used to limit the exposure of one's IP \n"
+"address - using router-specific tunnels for communication, and offering 'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
+"as part of their routerInfo in place of their transport addresses. When a \n"
+"peer wants to get in touch with them, they see those tunnel gateways in the \n"
+"netDb and simply send the relevant message to them through one of the published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
+"so either directly (if they are willing to expose their IP to the peer) or \n"
+"indirectly through their outbound tunnels. When the routers that the peer \n"
+"has direct connections to want to reach it (to forward tunnel messages, for \n"
+"instance), they simply prioritize their direct connection over the published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
+"route by not publishing any router addresses. Such a router would not even \n"
+"need to publish their routerInfo in the netDb, merely providing their self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
+"public keys). Both levels of restricted route operation are planned for I2P \n"
 "2.0."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:617
 msgid ""
-"There are tradeoffs for those behind restricted routes, as they would "
-"likely \n"
-"participate in other people's tunnels less frequently, and the routers "
-"which \n"
-"they are connected to would be able to infer traffic patterns that would "
-"not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is "
-"less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, "
-"of \n"
-"course, assumes that the peers that the router behind a restricted route "
-"contacts \n"
-"are not hostile - either the network is large enough that the probability"
-" \n"
-"of using a hostile peer to get connected is small enough, or trusted (and"
-" \n"
+"There are tradeoffs for those behind restricted routes, as they would likely \n"
+"participate in other people's tunnels less frequently, and the routers which \n"
+"they are connected to would be able to infer traffic patterns that would not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, of \n"
+"course, assumes that the peers that the router behind a restricted route contacts \n"
+"are not hostile - either the network is large enough that the probability \n"
+"of using a hostile peer to get connected is small enough, or trusted (and \n"
 "perhaps temporary) peers are used instead."
 msgstr ""
 
@@ -10343,45 +9015,28 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:630
 msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency "
-"communication, \n"
-"it was designed with variable latency services in mind from the "
-"beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the"
-" \n"
-"anonymity of medium and high latency communication while still blending "
-"their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can "
-"offer \n"
-"its own medium and high latency communication through the garlic "
-"encryption \n"
-"- specifying that the message should be sent after a certain delay, at a "
-"certain \n"
-"time, after a certain number of messages have passed, or another mix "
-"strategy. \n"
-"With the layered encryption, only the router that the clove exposed the "
-"delay \n"
-"request would know that the message requires high latency, allowing the "
-"traffic \n"
-"to blend in further with the low latency traffic. Once the transmission "
-"precondition \n"
-"is met, the router holding on to the clove (which itself would likely be "
-"a \n"
-"garlic message) simply forwards it as requested - to a router, to a "
-"tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
+"it was designed with variable latency services in mind from the beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the \n"
+"anonymity of medium and high latency communication while still blending their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
+"its own medium and high latency communication through the garlic encryption \n"
+"- specifying that the message should be sent after a certain delay, at a certain \n"
+"time, after a certain number of messages have passed, or another mix strategy. \n"
+"With the layered encryption, only the router that the clove exposed the delay \n"
+"request would know that the message requires high latency, allowing the traffic \n"
+"to blend in further with the low latency traffic. Once the transmission precondition \n"
+"is met, the router holding on to the clove (which itself would likely be a \n"
+"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
 "or, most likely, to a remote client destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:647
 msgid ""
-"There are a substantial number of ways to exploit this capacity for high"
-" \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for "
-"the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
-" \n"
-"latency comm can offer should look towards the application layer to "
-"provide \n"
+"There are a substantial number of ways to exploit this capacity for high \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
+"latency comm can offer should look towards the application layer to provide \n"
 "it."
 msgstr ""
 
@@ -10415,18 +9070,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:665
 msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware,"
-" \n"
-"the topology of DHTs, the anonymity and cryptography of free route "
-"mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not "
-"from \n"
-"novel concepts of algorithms though, but from careful engineering "
-"combining \n"
-"the research results of existing systems and papers. While there are a "
-"few \n"
-"similar efforts worth reviewing, both for technical and functional "
-"comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware, \n"
+"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not from \n"
+"novel concepts of algorithms though, but from careful engineering combining \n"
+"the research results of existing systems and papers. While there are a few \n"
+"similar efforts worth reviewing, both for technical and functional comparisons, \n"
 "two in particular are pulled out here - Tor and Freenet."
 msgstr ""
 
@@ -10443,209 +9092,127 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:682
 msgid ""
 "At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the "
-"early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing "
-"and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an "
-"essentially \n"
-"trusted, centralized system with directory servers, I2P has a self "
-"organizing \n"
-"network database with each peer taking on the responsibility of profiling"
-" \n"
-"other routers to determine how best to exploit available resources. "
-"Another \n"
-"key difference is that while both I2P and Tor use layered and ordered "
-"paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
-"network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to "
-"transparently \n"
-"route around congestion or other network failures, operate redundant "
-"pathways, \n"
-"and load balance the data across available resources. While Tor offers "
-"the \n"
-"useful outproxy functionality by offering integrated outproxy discovery "
-"and \n"
-"selection, I2P leaves such application layer decisions up to applications"
-" \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like "
-"streaming \n"
-"library itself to the application layer, allowing developers to "
-"experiment \n"
-"with different strategies, exploiting their domain specific knowledge to "
-"offer \n"
+"similarities. While I2P's development began before we were aware of the early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
+"trusted, centralized system with directory servers, I2P has a self organizing \n"
+"network database with each peer taking on the responsibility of profiling \n"
+"other routers to determine how best to exploit available resources. Another \n"
+"key difference is that while both I2P and Tor use layered and ordered paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
+"route around congestion or other network failures, operate redundant pathways, \n"
+"and load balance the data across available resources. While Tor offers the \n"
+"useful outproxy functionality by offering integrated outproxy discovery and \n"
+"selection, I2P leaves such application layer decisions up to applications \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
+"library itself to the application layer, allowing developers to experiment \n"
+"with different strategies, exploiting their domain specific knowledge to offer \n"
 "better performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:703
 msgid ""
-"From an anonymity perspective, there is much similarity when the core "
-"networks \n"
-"are compared. However, there are a few key differences. When dealing with"
-" \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels"
-" \n"
-"expose half as much traffic data than would be exposed with Tor's duplex "
-"circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response "
-"would \n"
-"follow the same path in Tor, while in I2P the packets making up the "
-"request \n"
-"would go out through one or more outbound tunnels and the packets making "
-"up \n"
-"the response would come back through one or more different inbound "
-"tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently "
-"address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be "
-"necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same "
-"routers."
+"From an anonymity perspective, there is much similarity when the core networks \n"
+"are compared. However, there are a few key differences. When dealing with \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
+"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response would \n"
+"follow the same path in Tor, while in I2P the packets making up the request \n"
+"would go out through one or more outbound tunnels and the packets making up \n"
+"the response would come back through one or more different inbound tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same routers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:717
 msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel "
-"creation, \n"
-"as simple packet counting and timing measurements as the cells in a "
-"circuit \n"
-"pass through an adversary's node exposes statistical information "
-"regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel "
-"creation \n"
-"with a single message so that this data is not exposed. Protecting the "
-"position \n"
-"in a tunnel is important, as an adversary would otherwise be able to "
-"mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation "
-"attacks."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
+"as simple packet counting and timing measurements as the cells in a circuit \n"
+"pass through an adversary's node exposes statistical information regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
+"with a single message so that this data is not exposed. Protecting the position \n"
+"in a tunnel is important, as an adversary would otherwise be able to mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:727
 msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-"
-"trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will "
-"not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
 "offer this topology until <a href=\"#future.restricted\">2.0</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:733
 msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor "
-"works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P "
-"works \n"
-"towards offering a decentralized resilient network in itself. In theory, "
-"both \n"
-"can be used to achieve both purposes, but given limited development "
-"resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have "
-"considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but "
-"concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet "
-"switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P works \n"
+"towards offering a decentralized resilient network in itself. In theory, both \n"
+"can be used to achieve both purposes, but given limited development resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
 "architecture will be able to exploit scarce resources more effectively."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:747
 msgid ""
-"Freenet played a large part in the initial stages of I2P's design - "
-"giving \n"
-"proof to the viability of a vibrant pseudonymous community completely "
-"contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies"
-" \n"
-"could be avoided. The first seed of I2P began as a replacement "
-"communication \n"
-"layer for Freenet, attempting to factor out the complexities of a "
-"scalable, \n"
-"anonymous and secure point to point communication from the complexities "
-"of \n"
-"a censorship resistant distributed data store. Over time however, some of"
-" \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms "
-"made \n"
-"it clear that I2P's focus should stay strictly on providing a generic "
-"anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the "
-"years, \n"
-"the Freenet developers have come to see the weaknesses in the older "
-"design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to "
-"offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a "
-"mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
-"through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data "
-"according \n"
+"Freenet played a large part in the initial stages of I2P's design - giving \n"
+"proof to the viability of a vibrant pseudonymous community completely contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies \n"
+"could be avoided. The first seed of I2P began as a replacement communication \n"
+"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
+"anonymous and secure point to point communication from the complexities of \n"
+"a censorship resistant distributed data store. Over time however, some of \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
+"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the years, \n"
+"the Freenet developers have come to see the weaknesses in the older design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
 "to Freenet's heuristic distributed data storage algorithms."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:766
 msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet "
-"natively \n"
-"provides many of the tools for operating medium and high latency systems,"
-" \n"
-"while I2P natively provides the low latency mix network suitable for "
-"offering \n"
-"adequate anonymity. The logic of separating the mixnet from the "
-"censorship-\n"
-"resistant distributed data store still seems self-evident from an "
-"engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully "
-"the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing"
-" \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
+"provides many of the tools for operating medium and high latency systems, \n"
+"while I2P natively provides the low latency mix network suitable for offering \n"
+"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
+"resistant distributed data store still seems self-evident from an engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing \n"
 "(or helping to improve, as necessary) existing mixnets like I2P or Tor."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:777
 msgid ""
 "It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using "
-"restricted \n"
-"routes between peers of various trust. While insufficient information has"
-" \n"
-"been made publicly available regarding how such a system would operate "
-"for \n"
-"a full review, from what has been said the anonymity and scalability "
-"claims \n"
-"seem highly dubious. In particular, the appropriateness for use in "
-"hostile \n"
-"regimes against state level adversaries has been tremendously overstated,"
-" \n"
-"and any analysis on the implications of resource scarcity upon the "
-"scalability \n"
-"of the network has seemingly been avoided. Further questions regarding "
-"susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth"
-" \n"
-"review of this \"globally scalable darknet\" will have to wait until the "
-"Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
+"routes between peers of various trust. While insufficient information has \n"
+"been made publicly available regarding how such a system would operate for \n"
+"a full review, from what has been said the anonymity and scalability claims \n"
+"seem highly dubious. In particular, the appropriateness for use in hostile \n"
+"regimes against state level adversaries has been tremendously overstated, \n"
+"and any analysis on the implications of resource scarcity upon the scalability \n"
+"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
+"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
 "team makes more information available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:793
 msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote "
-"destinations \n"
-"and receives messages targeting local destinations - most of the "
-"interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an "
-"anonymous \n"
-"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming"
-" library</a> \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. "
-"Beyond \n"
-"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP "
-"proxying \n"
-"system for either getting into or out of the I2P network, plus a variety "
-"of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
+"and receives messages targeting local destinations - most of the interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
+"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming library</a> \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
+"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP proxying \n"
+"system for either getting into or out of the I2P network, plus a variety of \n"
 "network applications provide further functionality for end users."
 msgstr ""
 
@@ -10655,51 +9222,34 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:805
 msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface "
-"(mirroring TCP sockets),\n"
-"and the implementation supports a <a "
-"href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding "
-"window protocol</a>\n"
-"with several optimizations, to take into account the high delay over I2P."
-"\n"
+"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
+"and the implementation supports a <a href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding window protocol</a>\n"
+"with several optimizations, to take into account the high delay over I2P.\n"
 "Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable "
-"tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the "
-"latency \n"
+"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the latency \n"
 "of multiple messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:815
 msgid ""
 "In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering "
-"messages \n"
-"has been optimized to allow individual messages passed to contain as much"
-" \n"
-"information as is available. For instance, a small HTTP transaction "
-"proxied \n"
-"through the streaming library can be completed in a single round trip - "
-"the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request "
-"typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
-" \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell "
-"the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
-"can \n"
+"messages, the streaming library's protocol for scheduling and delivering messages \n"
+"has been optimized to allow individual messages passed to contain as much \n"
+"information as is available. For instance, a small HTTP transaction proxied \n"
+"through the streaming library can be completed in a single round trip - the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
 "deliver the full response to the browser immediately."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:828
 msgid ""
-"On the whole, however, the streaming library bears much resemblance to an"
-" \n"
-"abstraction of TCP, with its sliding windows, congestion control "
-"algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior "
-"(ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an \n"
+"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
 "SYN, FIN, RST, etc)."
 msgstr ""
 
@@ -10729,227 +9279,142 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:842
 msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning"
-" \n"
-"with advocates across the spectrum of possibilities. However, given I2P's"
-" \n"
-"inherent demand for secure communication and decentralized operation, the"
-" \n"
-"traditional DNS-style naming system is clearly out, as are \"majority "
-"rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a "
-"base \n"
-"implementation designed to work off a local name to destination mapping, "
-"as \n"
-"well as an optional add-on application called the \"Address Book\". The "
-"address book \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming "
-"system, \n"
-"sacrificing only the call for all human readable names to be globally "
-"unique \n"
-"by mandating only local uniqueness. While all messages in I2P are "
-"cryptographically \n"
-"addressed by their destination, different people can have local address "
-"book \n"
-"entries for \"Alice\" which refer to different destinations. People can "
-"still \n"
-"discover new names by importing published address books of peers "
-"specified \n"
-"in their web of trust, by adding in the entries provided through a third "
-"party, \n"
-"or (if some people organize a series of published address books using a "
-"first \n"
-"come first serve registration system) people can choose to treat these "
-"address books \n"
+"Naming within I2P has been an oft-debated topic since the very beginning \n"
+"with advocates across the spectrum of possibilities. However, given I2P's \n"
+"inherent demand for secure communication and decentralized operation, the \n"
+"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a base \n"
+"implementation designed to work off a local name to destination mapping, as \n"
+"well as an optional add-on application called the \"Address Book\". The address book \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
+"sacrificing only the call for all human readable names to be globally unique \n"
+"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
+"addressed by their destination, different people can have local address book \n"
+"entries for \"Alice\" which refer to different destinations. People can still \n"
+"discover new names by importing published address books of peers specified \n"
+"in their web of trust, by adding in the entries provided through a third party, \n"
+"or (if some people organize a series of published address books using a first \n"
+"come first serve registration system) people can choose to treat these address books \n"
 "as name servers, emulating traditional DNS."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:862
 msgid ""
 "I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations "
-"have \n"
-"no value. DNSsec itself still falls back on registrars and certificate "
-"authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or "
-"the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, "
-"and \n"
-"a destination itself is just a pair of public keys and a certificate. "
-"DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup "
-"path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a "
-"certificate \n"
-"authenticating the responses as signed by some centralized certificate "
-"authority \n"
-"would address many of the hostile nameserver issues but would leave open "
-"replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations have \n"
+"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, and \n"
+"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
+"authenticating the responses as signed by some centralized certificate authority \n"
+"would address many of the hostile nameserver issues but would leave open replay \n"
 "attacks as well as hostile certificate authority attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:876
 msgid ""
-"Voting style naming is dangerous as well, especially given the "
-"effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an"
-" \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a "
-"given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as"
-" \n"
-"the network grows the load required to contact everyone to conduct online"
-" \n"
-"voting is implausible, or if the full network is not queried, different "
-"sets \n"
+"Voting style naming is dangerous as well, especially given the effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as \n"
+"the network grows the load required to contact everyone to conduct online \n"
+"voting is implausible, or if the full network is not queried, different sets \n"
 "of answers may be reachable."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:886
 msgid ""
-"As with the Internet however, I2P is keeping the design and operation of"
-" \n"
-"a naming system out of the (IP-like) communication layer. The bundled "
-"naming \n"
-"library includes a simple service provider interface which alternate "
-"naming \n"
-"systems can plug into, allowing end users to drive what sort of naming "
-"tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of \n"
+"a naming system out of the (IP-like) communication layer. The bundled naming \n"
+"library includes a simple service provider interface which alternate naming \n"
+"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
 "they prefer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:895
 msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which"
-"\n"
-"is distributed separately. For more information see the <a "
-"href=\"http://syndie.i2p2.de/\">Syndie</a>\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
+"is distributed separately. For more information see the <a href=\"http://syndie.i2p2.de/\">Syndie</a>\n"
 "pages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:901
 msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content "
-"aggregation \n"
-"system. It lets you create information, share it with others, and read "
-"posts \n"
-"from those you're interested in, all while taking into consideration your"
-" \n"
-"needs for security and anonymity. Rather than building its own content "
-"distribution \n"
-"network, Syndie is designed to run on top of existing networks, "
-"syndicating \n"
-"content through I2P Sites, Tor hidden services, Freenet freesites, normal"
-" websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
-"Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or "
-"archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
+"system. It lets you create information, share it with others, and read posts \n"
+"from those you're interested in, all while taking into consideration your \n"
+"needs for security and anonymity. Rather than building its own content distribution \n"
+"network, Syndie is designed to run on top of existing networks, syndicating \n"
+"content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
 "it."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:916
 msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client "
-"application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel"
-" \n"
-"can be viewed as four separate proxying applications - a \"client\" which"
-" receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an "
-"\"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
-"requests to \n"
-"the appropriate I2P destination (after querying the naming service if "
-"necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a "
-"destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which "
-"extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer "
-"operation. \n"
-"There is an additional \"socksclient\" application, but its use is not "
-"encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
+"can be viewed as four separate proxying applications - a \"client\" which receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
+"the appropriate I2P destination (after querying the naming service if necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
+"There is an additional \"socksclient\" application, but its use is not encouraged \n"
 "for reasons previously mentioned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:930
 msgid ""
-"I2P itself is not an outproxy network - the anonymity and security "
-"concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have "
-"kept \n"
-"I2P's design focused on providing an anonymous network which capable of "
-"meeting \n"
-"the user's needs without requiring external resources. However, the "
-"I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the "
-"hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-"
-"provided \n"
-"set of outproxies and forwards the request to them. These destinations "
-"are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have "
-"explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running "
-"an \n"
-"outproxy doesn't automatically tell other people to proxy through you. "
-"While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of "
-"concept \n"
-"for using I2P and provide some functionality under a threat model which "
-"may \n"
+"I2P itself is not an outproxy network - the anonymity and security concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have kept \n"
+"I2P's design focused on providing an anonymous network which capable of meeting \n"
+"the user's needs without requiring external resources. However, the I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
+"set of outproxies and forwards the request to them. These destinations are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running an \n"
+"outproxy doesn't automatically tell other people to proxy through you. While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
+"for using I2P and provide some functionality under a threat model which may \n"
 "be sufficient for some users."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:946
 msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" "
-"pointing \n"
-"at a webserver lets anyone run their own anonymous website (or \"I2P "
-"Site\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can"
-" \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously "
-"hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their "
-"local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. "
-"End \n"
-"users also have \"client\" tunnels pointing at <a "
-"href=\"#app.i2pmail\">I2Pmail's</a> \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
-" pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
-"I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run "
-"\"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
+"at a webserver lets anyone run their own anonymous website (or \"I2P Site\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
+"users also have \"client\" tunnels pointing at <a href=\"#app.i2pmail\">I2Pmail's</a> \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run \"client\" \n"
 "proxies to access the \"server\" instances pointing at an NNTP server."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:963
 msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the"
-" \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded "
-"through \n"
-"the eepproxy to I2P Sites specified in the torrent file while tracker "
-"responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open "
-"up \n"
-"a <a href=\"#app.streaming\">streaming lib</a> connection to query them "
-"for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
+"the eepproxy to I2P Sites specified in the torrent file while tracker responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
+"a <a href=\"#app.streaming\">streaming lib</a> connection to query them for \n"
 "blocks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:972
 msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
-" \n"
-"a few modifications as necessary to strip any anonymity-compromising "
-"information \n"
-"from the application and to take into consideration the fact that IPs "
-"cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
+"a few modifications as necessary to strip any anonymity-compromising information \n"
+"from the application and to take into consideration the fact that IPs cannot \n"
 "be used for identifying peers."
 msgstr ""
 
@@ -10962,10 +9427,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:986
 msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous "
-"BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality "
-"through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality through \n"
 "a plain HTML web interface."
 msgstr ""
 
@@ -10973,9 +9436,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Robert is a Bittorrent client written in Python.\n"
-"It is hosted on <a "
-"href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- "
-"TODO: expand -->"
+"It is hosted on <a href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- TODO: expand -->"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1003
@@ -10987,12 +9448,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1011
 msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
-" \n"
-"run entirely on top of I2P. While it has disabled some of Phex's "
-"functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and "
-"chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
+"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
 "system is fully functional."
 msgstr ""
 
@@ -11005,62 +9463,39 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:1029
 #, python-format
 msgid ""
-"I2Pmail is more a service than an application - postman offers both "
-"internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances"
-" \n"
-"accessing a series of components developed with mastiejaner, allowing "
-"people \n"
-"to use their preferred mail clients to send and receive mail "
-"pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information,"
-" \n"
-"I2P bundles susi23's web based susimail client which has been built "
-"specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
-"transparent \n"
-"virus filtering as well as denial of service prevention with hashcash "
-"augmented \n"
-"quotas. In addition, each user has control of their batching strategy "
-"prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the "
-"mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate "
-"with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
-"those \n"
-"non-anonymous locations does not give access to the mail accounts or "
-"activity \n"
-"patterns of the user. At the moment the developers work on a "
-"decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the I2P "
-"Site \n"
+"I2Pmail is more a service than an application - postman offers both internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances \n"
+"accessing a series of components developed with mastiejaner, allowing people \n"
+"to use their preferred mail clients to send and receive mail pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information, \n"
+"I2P bundles susi23's web based susimail client which has been built specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
+"virus filtering as well as denial of service prevention with hashcash augmented \n"
+"quotas. In addition, each user has control of their batching strategy prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
+"non-anonymous locations does not give access to the mail accounts or activity \n"
+"patterns of the user. At the moment the developers work on a decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the I2P Site \n"
 "<a href=\"http://%(postman)s/\">%(postman)s</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1051
 msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the "
-"traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a "
-"server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
 "Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the "
-"e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically "
-"encrypted end-to-end. <br>\n"
-"Furthermore, I2P-Bote offers a remailer function on top of I2P, for "
-"increased high-latency anonymity."
+"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
+"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. <br>\n"
+"Furthermore, I2P-Bote offers a remailer function on top of I2P, for increased high-latency anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1061
 msgid ""
-"I2P-Messenger is an end-to-end encrypted serverless communication "
-"application.\n"
-"For communication between two users, they need to give each other their "
-"destination keys, to allow the other to connect.\n"
-"It supports file transfer and has a search for other users, based on "
-"Seedless."
+"I2P-Messenger is an end-to-end encrypted serverless communication application.\n"
+"For communication between two users, they need to give each other their destination keys, to allow the other to connect.\n"
+"It supports file transfer and has a search for other users, based on Seedless."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:2
@@ -11210,18 +9645,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:71
 msgid ""
 "Your level of anonymity can be described as \"how hard it is for someone\n"
-"to find out information you don't want them to know?\" - who you are, "
-"where\n"
-"you are located, who you communicate with, or even when you communicate."
-"  \n"
-"\"Perfect\" anonymity is not a useful concept here - software will not "
-"make \n"
-"you indistinguishable from people that don't use computers or who are not"
-" on\n"
-"the Internet.  Instead, we are working to provide sufficient anonymity to"
-" meet the\n"
-"real needs of whomever we can - from those simply browsing websites, to "
-"those exchanging\n"
+"to find out information you don't want them to know?\" - who you are, where\n"
+"you are located, who you communicate with, or even when you communicate.  \n"
+"\"Perfect\" anonymity is not a useful concept here - software will not make \n"
+"you indistinguishable from people that don't use computers or who are not on\n"
+"the Internet.  Instead, we are working to provide sufficient anonymity to meet the\n"
+"real needs of whomever we can - from those simply browsing websites, to those exchanging\n"
 "data, to those fearful of discovery by powerful organizations or states."
 msgstr ""
 
@@ -11229,17 +9658,14 @@ msgstr ""
 msgid ""
 "The question of whether I2P provides sufficient anonymity for your \n"
 "particular needs is a hard one, but this page will hopefully assist in \n"
-"answering that question by exploring how I2P operates under various "
-"attacks\n"
+"answering that question by exploring how I2P operates under various attacks\n"
 "so that you may decide whether it meets your needs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:89
 msgid ""
-"We welcome further research and analysis on I2P's resistance to the "
-"threats described below.\n"
-"More review of existing literature (much of it focused on Tor) and "
-"original\n"
+"We welcome further research and analysis on I2P's resistance to the threats described below.\n"
+"More review of existing literature (much of it focused on Tor) and original\n"
 "work focused on I2P is needed."
 msgstr ""
 
@@ -11251,69 +9677,52 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n"
-"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in"
-" mind when \n"
+"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in mind when \n"
 "reviewing related literature:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:102
 msgid ""
-"<b>I2P is a free route mixnet</b> - the message creator explicitly "
-"defines the\n"
-"path that messages will be sent out (the outbound tunnel), and the "
-"message \n"
-"recipient explicitly defines the path that messages will be received on "
-"(the\n"
+"<b>I2P is a free route mixnet</b> - the message creator explicitly defines the\n"
+"path that messages will be sent out (the outbound tunnel), and the message \n"
+"recipient explicitly defines the path that messages will be received on (the\n"
 "inbound tunnel)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:108
 msgid ""
-"<b>I2P has no official entry and exit points</b> - all peers fully "
-"participate in the \n"
+"<b>I2P has no official entry and exit points</b> - all peers fully participate in the \n"
 "mix, and there are no network layer in- or out-proxies (however, at the \n"
 "application layer, a few proxies do exist)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:113
 msgid ""
-"<b>I2P is fully distributed</b> - there are no central controls or "
-"authorities.\n"
-"One could modify some routers to operate mix cascades (building tunnels "
-"and giving\n"
-"out the keys necessary to control the forwarding at the tunnel endpoint) "
-"or directory \n"
-"based profiling and selection, all without breaking compatibility with "
-"the rest of \n"
-"the network, but doing so is of course not necessary (and may even harm "
-"one's\n"
+"<b>I2P is fully distributed</b> - there are no central controls or authorities.\n"
+"One could modify some routers to operate mix cascades (building tunnels and giving\n"
+"out the keys necessary to control the forwarding at the tunnel endpoint) or directory \n"
+"based profiling and selection, all without breaking compatibility with the rest of \n"
+"the network, but doing so is of course not necessary (and may even harm one's\n"
 "anonymity)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:123
 #, python-format
 msgid ""
-"We have documented plans to implement <a "
-"href=\"%(todo)s#stop\">nontrivial delays</a>\n"
+"We have documented plans to implement <a href=\"%(todo)s#stop\">nontrivial delays</a>\n"
 "and <a href=\"%(todo)s#batching\">batching strategies</a> \n"
-"whose existence is only known to the particular hop or tunnel gateway "
-"that \n"
-"receives the message, allowing a mostly low latency mixnet to provide "
-"cover \n"
+"whose existence is only known to the particular hop or tunnel gateway that \n"
+"receives the message, allowing a mostly low latency mixnet to provide cover \n"
 "traffic for higher latency communication (e.g. email).\n"
-"However we are aware that significant delays are required to provide "
-"meaningful\n"
-"protection, and that implementation of such delays will be a significant "
-"challenge.\n"
-"It is not clear at this time whether we will actually implement these "
-"delay features."
+"However we are aware that significant delays are required to provide meaningful\n"
+"protection, and that implementation of such delays will be a significant challenge.\n"
+"It is not clear at this time whether we will actually implement these delay features."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:134
 msgid ""
 "In theory, routers along the message path may inject an \n"
-"arbitrary number of hops before forwarding the message to the next peer, "
-"though\n"
+"arbitrary number of hops before forwarding the message to the next peer, though\n"
 "the current implementation does not."
 msgstr ""
 
@@ -11327,8 +9736,7 @@ msgid ""
 "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n"
 "<a href=\"http://freenetproject.org/\">[Freenet]</a>, and\n"
 "<a href=\"https://www.torproject.org/\">[Tor]</a>.\n"
-"Our design benefits substantially from the research published around that"
-" time.\n"
+"Our design benefits substantially from the research published around that time.\n"
 "I2P uses several onion routing techniques, so we continue to benefit\n"
 "from the significant academic interest in Tor."
 msgstr ""
@@ -11336,12 +9744,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:152
 msgid ""
 "Taking from the attacks and analysis put forth in the \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity "
-"literature</a> (largely \n"
-"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: "
-"Protocols, Attacks, Design \n"
-"Issues and Open Problems</a>), the following briefly describes a wide "
-"variety \n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity literature</a> (largely \n"
+"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: Protocols, Attacks, Design \n"
+"Issues and Open Problems</a>), the following briefly describes a wide variety \n"
 "of attacks as well as many of I2Ps defenses.  We update\n"
 "this list to include new attacks as they are identified."
 msgstr ""
@@ -11369,66 +9774,46 @@ msgstr ""
 msgid ""
 "The\n"
 "<a href=\"%(comparisons)s\">network comparisons</a> and\n"
-"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also "
-"be helpful\n"
+"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also be helpful\n"
 "to review."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:210
 msgid ""
-"A brute force attack can be mounted by a global passive or active "
-"adversary, \n"
-"watching all the messages pass between all of the nodes and attempting to"
-" correlate\n"
-"which message follows which path.  Mounting this attack against I2P "
-"should be \n"
-"nontrivial, as all peers in the network are frequently sending messages "
-"(both\n"
-"end to end and network maintenance messages), plus an end to end message "
-"changes\n"
-"size and data along its path.  In addition, the external adversary does "
-"not have\n"
-"access to the messages either, as inter-router communication is both "
-"encrypted\n"
-"and streamed (making two 1024 byte messages indistinguishable from one "
-"2048 byte\n"
+"A brute force attack can be mounted by a global passive or active adversary, \n"
+"watching all the messages pass between all of the nodes and attempting to correlate\n"
+"which message follows which path.  Mounting this attack against I2P should be \n"
+"nontrivial, as all peers in the network are frequently sending messages (both\n"
+"end to end and network maintenance messages), plus an end to end message changes\n"
+"size and data along its path.  In addition, the external adversary does not have\n"
+"access to the messages either, as inter-router communication is both encrypted\n"
+"and streamed (making two 1024 byte messages indistinguishable from one 2048 byte\n"
 "message)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:222
 msgid ""
-"However, a powerful attacker can use brute force to detect trends - if "
-"they \n"
-"can send 5GB to an I2P destination and monitor everyone's network "
-"connection,\n"
-"they can eliminate all peers who did not receive 5GB of data.  Techniques"
-" to \n"
+"However, a powerful attacker can use brute force to detect trends - if they \n"
+"can send 5GB to an I2P destination and monitor everyone's network connection,\n"
+"they can eliminate all peers who did not receive 5GB of data.  Techniques to \n"
 "defeat this attack exist, but may be prohibitively expensive (see: \n"
-"<a "
-"href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s "
-"mimics\n"
-"or constant rate traffic).  Most users are not concerned with this "
-"attack, as \n"
-"the cost of mounting it are extreme (and often require illegal activity)."
-"  \n"
+"<a href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s mimics\n"
+"or constant rate traffic).  Most users are not concerned with this attack, as \n"
+"the cost of mounting it are extreme (and often require illegal activity).  \n"
 "However, the attack is still possible, for example by an observer at\n"
 "a large ISP or an Internet exchange point.\n"
 "Those who want to defend against it \n"
 "would want to take appropriate countermeasures, such as\n"
-"setting low bandwidth limits, and using unpublished or encrypted "
-"leasesets for I2P Sites.\n"
-"Other countermeasures, such as nontrivial delays and restricted routes, "
-"are\n"
+"setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites.\n"
+"Other countermeasures, such as nontrivial delays and restricted routes, are\n"
 "not currently implemented."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:239
 #, python-format
 msgid ""
-"As a partial defense against a single router or group of routers trying "
-"to route all the network's traffic,\n"
-"routers contain limits as to how many tunnels can be routed through a "
-"single peer.\n"
+"As a partial defense against a single router or group of routers trying to route all the network's traffic,\n"
+"routers contain limits as to how many tunnels can be routed through a single peer.\n"
 "As the network grows, these limits are subject to further adjustment.\n"
 "Other mechanisms for peer rating, selection and avoidance\n"
 "are discussed on the\n"
@@ -11437,51 +9822,34 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:254
 msgid ""
-"I2P's messages are unidirectional and do not necessarily imply that a "
-"reply\n"
+"I2P's messages are unidirectional and do not necessarily imply that a reply\n"
 "will be sent.  However, applications on top of I2P will most likely have\n"
-"recognizable patterns within the frequency of their messages - for "
-"instance, an \n"
-"HTTP request will be a small message with a large sequence of reply "
-"messages \n"
-"containing the HTTP response.  Using this data as well as a broad view of"
-" the \n"
-"network topology, an attacker may be able to disqualify some links as "
-"being too \n"
+"recognizable patterns within the frequency of their messages - for instance, an \n"
+"HTTP request will be a small message with a large sequence of reply messages \n"
+"containing the HTTP response.  Using this data as well as a broad view of the \n"
+"network topology, an attacker may be able to disqualify some links as being too \n"
 "slow to have passed the message along."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:264
 msgid ""
-"This sort of attack is powerful, but its applicability to I2P is non "
-"obvious,\n"
-"as the variation on message delays due to queuing, message processing, "
-"and \n"
-"throttling will often meet or exceed the time of passing a message along "
-"a \n"
-"single link - even when the attacker knows that a reply will be sent as "
-"soon as\n"
-"the message is received.  There are some scenarios which will expose "
-"fairly \n"
-"automatic replies though - the streaming library does (with the SYN+ACK) "
-"as does the \n"
-"message mode of guaranteed delivery (with the "
-"DataMessage+DeliveryStatusMessage)."
+"This sort of attack is powerful, but its applicability to I2P is non obvious,\n"
+"as the variation on message delays due to queuing, message processing, and \n"
+"throttling will often meet or exceed the time of passing a message along a \n"
+"single link - even when the attacker knows that a reply will be sent as soon as\n"
+"the message is received.  There are some scenarios which will expose fairly \n"
+"automatic replies though - the streaming library does (with the SYN+ACK) as does the \n"
+"message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:274
 #, python-format
 msgid ""
-"Without protocol scrubbing or higher latency, global active adversaries "
-"can \n"
-"gain substantial information.  As such, people concerned with these "
-"attacks could\n"
-"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial "
-"delays</a> or \n"
-"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol "
-"scrubbing, or\n"
-"other advanced tunnel routing <a "
-"href=\"%(todo)s#batching\">techniques</a>,\n"
+"Without protocol scrubbing or higher latency, global active adversaries can \n"
+"gain substantial information.  As such, people concerned with these attacks could\n"
+"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial delays</a> or \n"
+"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol scrubbing, or\n"
+"other advanced tunnel routing <a href=\"%(todo)s#batching\">techniques</a>,\n"
 "but these are unimplemented in I2P."
 msgstr ""
 
@@ -11494,25 +9862,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:291
 msgid ""
-"Intersection attacks against low latency systems are extremely powerful -"
-"\n"
-"periodically make contact with the target and keep track of what peers "
-"are on\n"
+"Intersection attacks against low latency systems are extremely powerful -\n"
+"periodically make contact with the target and keep track of what peers are on\n"
 "the network.  Over time, as node churn occurs the attacker will gain \n"
-"significant information about the target by simply intersecting the sets "
-"of\n"
-"peers that are online when a message successfully goes through.  The cost"
-" of \n"
-"this attack is significant as the network grows, but may be feasible in "
-"some\n"
+"significant information about the target by simply intersecting the sets of\n"
+"peers that are online when a message successfully goes through.  The cost of \n"
+"this attack is significant as the network grows, but may be feasible in some\n"
 "scenarios."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:301
 #, python-format
 msgid ""
-"In summary, if an attacker is at both ends of your tunnel at the same "
-"time,\n"
+"In summary, if an attacker is at both ends of your tunnel at the same time,\n"
 "he may be successful.\n"
 "I2P does not have a full defense to this for low latency communication.\n"
 "This is an inherent weakness of low-latency onion routing.\n"
@@ -11531,8 +9893,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:316
 #, python-format
 msgid ""
-"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a "
-"small group that changes slowly"
+"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a small "
+"group that changes slowly"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:319
@@ -11555,8 +9917,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:332
 msgid ""
 "Even in total, these defenses are not a complete solution.\n"
-"Also, we have made some design choices that may significantly increase "
-"our vulnerability:"
+"Also, we have made some design choices that may significantly increase our vulnerability:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:337
@@ -11565,8 +9926,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:340
 msgid ""
-"We use tunnel pools comprised of several tunnels, and traffic can shift "
-"from tunnel to tunnel."
+"We use tunnel pools comprised of several tunnels, and traffic can shift from"
+" tunnel to tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:343
@@ -11576,8 +9937,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:346
 msgid ""
 "Tunnel lengths are configurable.\n"
-"While 3-hop tunnels are recommended for full protection, several "
-"applications and\n"
+"While 3-hop tunnels are recommended for full protection, several applications and\n"
 "services use 2-hop tunnels by default."
 msgstr ""
 
@@ -11585,14 +9945,10 @@ msgstr ""
 #, python-format
 msgid ""
 "In the future, it could\n"
-"for peers who can afford significant delays (per <a "
-"href=\"%(todo)s#stop\">nontrivial\n"
-"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>).  "
-"In addition,\n"
-"this is only relevant for destinations that other people know about - a "
-"private\n"
-"group whose destination is only known to trusted peers does not have to "
-"worry,\n"
+"for peers who can afford significant delays (per <a href=\"%(todo)s#stop\">nontrivial\n"
+"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>).  In addition,\n"
+"this is only relevant for destinations that other people know about - a private\n"
+"group whose destination is only known to trusted peers does not have to worry,\n"
 "as an adversary can't \"ping\" them to mount the attack.</p>"
 msgstr ""
 
@@ -11603,8 +9959,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:369
 msgid ""
-"There are a whole slew of denial of service attacks available against "
-"I2P,\n"
+"There are a whole slew of denial of service attacks available against I2P,\n"
 "each with different costs and consequences:"
 msgstr ""
 
@@ -11627,10 +9982,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:387
 msgid ""
 "Provide easy configuration options so that users may increase their\n"
-"contribution (share percentage) to the network. Display easy-to-"
-"understand\n"
-"metrics such as \"share ratio\" so that users may see what they are "
-"contributing."
+"contribution (share percentage) to the network. Display easy-to-understand\n"
+"metrics such as \"share ratio\" so that users may see what they are contributing."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:392
@@ -11642,29 +9995,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:399
 #, python-format
 msgid ""
-"<b>Starvation attack:</b> A hostile user may attempt to harm the network "
-"by\n"
-"creating a significant number of peers in the network who are not "
-"identified as\n"
-"being under control of the same entity (as with Sybil). These nodes then"
-" \n"
-"decide not to provide any resources to the network, causing existing "
-"peers \n"
-"to search through a larger network database or request more tunnels than"
-" \n"
+"<b>Starvation attack:</b> A hostile user may attempt to harm the network by\n"
+"creating a significant number of peers in the network who are not identified as\n"
+"being under control of the same entity (as with Sybil). These nodes then \n"
+"decide not to provide any resources to the network, causing existing peers \n"
+"to search through a larger network database or request more tunnels than \n"
 "should be necessary. \n"
-"Alternatively, the nodes may provide intermittent service by periodically"
-"\n"
+"Alternatively, the nodes may provide intermittent service by periodically\n"
 "dropping selected traffic, or refusing connections to certain peers.\n"
-"This behavior may be indistinguishable from that of a heavily-loaded or "
-"failing node.\n"
-"I2P addresses these issues by maintaining <a "
-"href=\"%(peerselection)s\">profiles</a> on the \n"
+"This behavior may be indistinguishable from that of a heavily-loaded or failing node.\n"
+"I2P addresses these issues by maintaining <a href=\"%(peerselection)s\">profiles</a> on the \n"
 "peers, attempting to identify underperforming ones and simply ignoring \n"
 "them, or using them rarely.\n"
 "We have significantly enhanced the\n"
-"ability to recognize and avoid troublesome peers; however there are still"
-"\n"
+"ability to recognize and avoid troublesome peers; however there are still\n"
 "significant efforts required in this area."
 msgstr ""
 
@@ -11672,30 +10016,18 @@ msgstr ""
 #, python-format
 msgid ""
 "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n"
-"a peer, a destination, or a tunnel.  Network and peer flooding is "
-"possible,\n"
-"and I2P does nothing to prevent standard IP layer flooding.  The flooding"
-" of\n"
-"a destination with messages by sending a large number to the target's "
-"various\n"
-"inbound tunnel gateways is possible, but the destination will know this "
-"both\n"
-"by the contents of the message and because the tunnel's tests will fail."
-"  The\n"
-"same goes for flooding just a single tunnel.  I2P has no defenses for a "
-"network\n"
-"flooding attack.  For a destination and tunnel flooding attack, the "
-"target\n"
-"identifies which tunnels are unresponsive and builds new ones.  New code "
-"could\n"
-"also be written to add even more tunnels if the client wishes to handle "
-"the\n"
-"larger load.  If, on the other hand, the load is more than the client can"
-"\n"
-"deal with, they can instruct the tunnels to throttle the number of "
-"messages or\n"
-"bytes they should pass on (once the <a "
-"href=\"%(todo)s#batching\">advanced tunnel\n"
+"a peer, a destination, or a tunnel.  Network and peer flooding is possible,\n"
+"and I2P does nothing to prevent standard IP layer flooding.  The flooding of\n"
+"a destination with messages by sending a large number to the target's various\n"
+"inbound tunnel gateways is possible, but the destination will know this both\n"
+"by the contents of the message and because the tunnel's tests will fail.  The\n"
+"same goes for flooding just a single tunnel.  I2P has no defenses for a network\n"
+"flooding attack.  For a destination and tunnel flooding attack, the target\n"
+"identifies which tunnels are unresponsive and builds new ones.  New code could\n"
+"also be written to add even more tunnels if the client wishes to handle the\n"
+"larger load.  If, on the other hand, the load is more than the client can\n"
+"deal with, they can instruct the tunnels to throttle the number of messages or\n"
+"bytes they should pass on (once the <a href=\"%(todo)s#batching\">advanced tunnel\n"
 "operation</a> is implemented)."
 msgstr ""
 
@@ -11703,13 +10035,10 @@ msgstr ""
 msgid ""
 "<b>CPU load attack:</b> There are currently some methods for people to \n"
 "remotely request that a peer perform some cryptographically expensive \n"
-"operation, and a hostile attacker could use these to flood that peer with"
-"\n"
-"a large number of them in an attempt to overload the CPU.  Both using "
-"good \n"
+"operation, and a hostile attacker could use these to flood that peer with\n"
+"a large number of them in an attempt to overload the CPU.  Both using good \n"
 "engineering practices and potentially requiring nontrivial certificates \n"
-"(e.g. HashCash) to be attached to these expensive requests should "
-"mitigate\n"
+"(e.g. HashCash) to be attached to these expensive requests should mitigate\n"
 "the issue, though there may be room for an attacker to exploit various\n"
 "bugs in the implementation."
 msgstr ""
@@ -11717,8 +10046,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:451
 #, python-format
 msgid ""
-"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the "
-"network by\n"
+"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by\n"
 "becoming a floodfill router. The current defenses against unreliable,\n"
 "intermittent, or malicious floodfill routers are poor.\n"
 "A floodfill router may provide bad or no response to lookups, and\n"
@@ -11733,134 +10061,86 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:470
 #, python-format
 msgid ""
-"Tagging attacks - modifying a message so that it can later be identified"
-" \n"
-"further along the path - are by themselves impossible in I2P, as messages"
-" \n"
-"passed through tunnels are signed.  However, if an attacker is the "
-"inbound \n"
-"tunnel gateway as well as a participant further along in that tunnel, "
-"with\n"
-"collusion they can identify the fact that they are in the same tunnel "
-"(and \n"
-"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and "
-"other updates,\n"
-"colluding peers within the same tunnel can recognize that fact without "
-"any \n"
-"effort).  An attacker in an outbound tunnel and any part of an inbound "
-"tunnel cannot \n"
-"collude however, as the tunnel encryption pads and modifies the data "
-"separately\n"
-"for the inbound and outbound tunnels.  External attackers cannot do "
-"anything,\n"
+"Tagging attacks - modifying a message so that it can later be identified \n"
+"further along the path - are by themselves impossible in I2P, as messages \n"
+"passed through tunnels are signed.  However, if an attacker is the inbound \n"
+"tunnel gateway as well as a participant further along in that tunnel, with\n"
+"collusion they can identify the fact that they are in the same tunnel (and \n"
+"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and other updates,\n"
+"colluding peers within the same tunnel can recognize that fact without any \n"
+"effort).  An attacker in an outbound tunnel and any part of an inbound tunnel cannot \n"
+"collude however, as the tunnel encryption pads and modifies the data separately\n"
+"for the inbound and outbound tunnels.  External attackers cannot do anything,\n"
 "as the links are encrypted and messages signed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:488
 msgid ""
-"Partitioning attacks - finding ways to segregate (technically or "
-"analytically)\n"
-"the peers in a network - are important to keep in mind when dealing with "
-"a \n"
-"powerful adversary, since the size of the network plays a key role in "
-"determining\n"
-"your anonymity.  Technical partitioning by cutting links between peers to"
-" create\n"
-"fragmented networks is addressed by I2P's built in network database, "
-"which \n"
-"maintains statistics about various peers so as to allow any existing "
-"connections\n"
-"to other fragmented sections to be exploited so as to heal the network.  "
-"However,\n"
-"if the attacker does disconnect all links to uncontrolled peers, "
-"essentially\n"
-"isolating the target, no amount of network database healing will fix it."
-"  At\n"
-"that point, the only thing the router can hope to do is notice that a "
-"significant\n"
-"number of previously reliable peers have become unavailable and alert the"
-" client\n"
-"that it is temporarily disconnected (this detection code is not "
-"implemented at\n"
+"Partitioning attacks - finding ways to segregate (technically or analytically)\n"
+"the peers in a network - are important to keep in mind when dealing with a \n"
+"powerful adversary, since the size of the network plays a key role in determining\n"
+"your anonymity.  Technical partitioning by cutting links between peers to create\n"
+"fragmented networks is addressed by I2P's built in network database, which \n"
+"maintains statistics about various peers so as to allow any existing connections\n"
+"to other fragmented sections to be exploited so as to heal the network.  However,\n"
+"if the attacker does disconnect all links to uncontrolled peers, essentially\n"
+"isolating the target, no amount of network database healing will fix it.  At\n"
+"that point, the only thing the router can hope to do is notice that a significant\n"
+"number of previously reliable peers have become unavailable and alert the client\n"
+"that it is temporarily disconnected (this detection code is not implemented at\n"
 "the moment)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:504
 #, python-format
 msgid ""
-"Partitioning the network analytically by looking for differences in how "
-"routers \n"
-"and destinations behave and grouping them accordingly is also a very "
-"powerful\n"
-"attack.  For instance, an attacker <a href=\"#harvesting\">harvesting</a>"
-" the network\n"
-"database will know when a particular destination has 5 inbound tunnels in"
-" their\n"
-"LeaseSet while others have only 2 or 3, allowing the adversary to "
-"potentially \n"
-"partition clients by the number of tunnels selected.  Another partition "
-"is \n"
-"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial "
-"delays</a> and \n"
-"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel "
-"gateways and the\n"
-"particular hops with non-zero delays will likely stand out.  However, "
-"this data\n"
-"is only exposed to those specific hops, so to partition effectively on "
-"that \n"
-"matter, the attacker would need to control a significant portion of the "
-"network\n"
-"(and still that would only be a probabilistic partition, as they wouldn't"
-" know\n"
+"Partitioning the network analytically by looking for differences in how routers \n"
+"and destinations behave and grouping them accordingly is also a very powerful\n"
+"attack.  For instance, an attacker <a href=\"#harvesting\">harvesting</a> the network\n"
+"database will know when a particular destination has 5 inbound tunnels in their\n"
+"LeaseSet while others have only 2 or 3, allowing the adversary to potentially \n"
+"partition clients by the number of tunnels selected.  Another partition is \n"
+"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial delays</a> and \n"
+"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel gateways and the\n"
+"particular hops with non-zero delays will likely stand out.  However, this data\n"
+"is only exposed to those specific hops, so to partition effectively on that \n"
+"matter, the attacker would need to control a significant portion of the network\n"
+"(and still that would only be a probabilistic partition, as they wouldn't know\n"
 "which other tunnels or messages have those delays)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:520
 #, python-format
 msgid ""
-"Also discussed on the <a href=\"%(netdb)s#threat\">network database "
-"page</a> (bootstrap attack)."
+"Also discussed on the <a href=\"%(netdb)s#threat\">network database page</a>"
+" (bootstrap attack)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:528
 msgid ""
-"The predecessor attack is passively gathering statistics in an attempt to"
-" see\n"
-"what peers are 'close' to the destination by participating in their "
-"tunnels and\n"
-"keeping track of the previous or next hop (for outbound or inbound "
-"tunnels, \n"
-"respectively).  Over time, using a perfectly random sample of peers and "
-"random\n"
-"ordering, an attacker would be able to see which peer shows up as "
-"'closer' \n"
-"statistically more than the rest, and that peer would in turn be where "
-"the\n"
+"The predecessor attack is passively gathering statistics in an attempt to see\n"
+"what peers are 'close' to the destination by participating in their tunnels and\n"
+"keeping track of the previous or next hop (for outbound or inbound tunnels, \n"
+"respectively).  Over time, using a perfectly random sample of peers and random\n"
+"ordering, an attacker would be able to see which peer shows up as 'closer' \n"
+"statistically more than the rest, and that peer would in turn be where the\n"
 "target is located."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:538
 #, python-format
 msgid ""
-"I2P avoids this in four ways: first, the peers selected to participate in"
-"\n"
-"tunnels are not randomly sampled throughout the network - they are "
-"derived from\n"
-"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which "
-"breaks them\n"
-"into tiers.  Second, with <a href=\"%(tunnelimpl)s#ordering\">strict "
-"ordering</a> of peers\n"
-"in a tunnel, the fact that a peer shows up more frequently does not mean "
-"they're\n"
-"the source.  Third, with <a href=\"%(tunnelimpl)s#length\">permuted "
-"tunnel length</a>\n"
+"I2P avoids this in four ways: first, the peers selected to participate in\n"
+"tunnels are not randomly sampled throughout the network - they are derived from\n"
+"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which breaks them\n"
+"into tiers.  Second, with <a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers\n"
+"in a tunnel, the fact that a peer shows up more frequently does not mean they're\n"
+"the source.  Third, with <a href=\"%(tunnelimpl)s#length\">permuted tunnel length</a>\n"
 "(not enabled by default)\n"
 "even 0 hop tunnels can provide plausible deniability as the occasional \n"
 "variation of the gateway will look like normal tunnels.  Fourth, with \n"
-"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> "
-"(unimplemented), only the peer with\n"
-"a restricted connection to the target will ever contact the target, while"
-" \n"
+"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> (unimplemented), only the peer with\n"
+"a restricted connection to the target will ever contact the target, while \n"
 "attackers will merely run into that gateway."
 msgstr ""
 
@@ -11898,8 +10178,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:587
 msgid ""
-"Network growth will make it more difficult to obtain a given proportion "
-"of the network"
+"Network growth will make it more difficult to obtain a given proportion of "
+"the network"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:590
@@ -11908,10 +10188,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:593
 msgid ""
-"\"Hidden mode\", which prevents a router from publishing its information "
-"to the netDb,\n"
-"(but also prevents it from relaying data) is not widely used now but "
-"could be."
+"\"Hidden mode\", which prevents a router from publishing its information to the netDb,\n"
+"(but also prevents it from relaying data) is not widely used now but could be."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:599
@@ -11919,19 +10197,15 @@ msgstr ""
 msgid ""
 "In future implementations,\n"
 "<a href=\"%(todo)s#nat\">basic</a> and \n"
-"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted "
-"routes,\n"
-"this attack loses much of its power, as the \"hidden\" peers do not "
-"publish their\n"
-"contact addresses in the network database - only the tunnels through "
-"which \n"
+"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted routes,\n"
+"this attack loses much of its power, as the \"hidden\" peers do not publish their\n"
+"contact addresses in the network database - only the tunnels through which \n"
 "they can be reached (as well as their public keys, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:608
 msgid ""
-"In the future, routers could use GeoIP to identify if they are in a "
-"particular\n"
+"In the future, routers could use GeoIP to identify if they are in a particular\n"
 "country where identification as an I2P node would be risky.\n"
 "In that case, the router could automatically enable hidden mode, or\n"
 "enact other restricted route methods."
@@ -11942,10 +10216,8 @@ msgstr ""
 msgid ""
 "By inspecting the traffic into and out of a router, a malicious ISP\n"
 "or state-level firewall could identify that a computer is running I2P.\n"
-"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically "
-"designed\n"
-"to hide that a computer is running I2P. However, several design decisions"
-" made\n"
+"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically designed\n"
+"to hide that a computer is running I2P. However, several design decisions made\n"
 "in the design of the\n"
 "<a href=\"%(transport)s\">transport layer and protocols</a>\n"
 "make it somewhat difficult to identify I2P traffic:"
@@ -11961,8 +10233,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:636
 msgid ""
-"DH key exchange with no protocol bytes or other unencrypted constant "
-"fields"
+"DH key exchange with no protocol bytes or other unencrypted constant fields"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:639
@@ -11971,14 +10242,13 @@ msgid ""
 "Simultaneous use of both\n"
 "<a href=\"%(ntcp)s\">TCP</a> and\n"
 "<a href=\"%(ssu)s\">UDP</a> transports.\n"
-"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to"
-" track."
+"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:647
 msgid ""
-"In the near future, we plan to directly address traffic analysis issues "
-"by further obfuscation of I2P transport protocols, possibly including:"
+"In the near future, we plan to directly address traffic analysis issues by "
+"further obfuscation of I2P transport protocols, possibly including:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:651
@@ -11995,20 +10265,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:657
 msgid ""
-"Development of additional transport methods that mimic SSL or other "
-"common protocols"
+"Development of additional transport methods that mimic SSL or other common "
+"protocols"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:660
 msgid ""
-"Review of padding strategies at higher layers to see how they affect "
-"packet sizes at the transport layer"
+"Review of padding strategies at higher layers to see how they affect packet "
+"sizes at the transport layer"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:663
 msgid ""
-"Review of methods implemented by various state-level firewalls to block "
-"Tor"
+"Review of methods implemented by various state-level firewalls to block Tor"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:666
@@ -12024,36 +10293,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:680
 msgid ""
-"Sybil describes a category of attacks where the adversary creates "
-"arbitrarily\n"
+"Sybil describes a category of attacks where the adversary creates arbitrarily\n"
 "large numbers of colluding nodes and uses the increased numbers to help \n"
-"mounting other attacks.  For instance, if an attacker is in a network "
-"where peers\n"
-"are selected randomly and they want an 80&#37; chance to be one of those "
-"peers, they\n"
-"simply create five times the number of nodes that are in the network and "
-"roll \n"
-"the dice.  When identity is free, Sybil can be a very potent technique "
-"for a \n"
-"powerful adversary.  The primary technique to address this is simply to "
-"make \n"
-"identity 'non free' - <a "
-"href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n"
+"mounting other attacks.  For instance, if an attacker is in a network where peers\n"
+"are selected randomly and they want an 80&#37; chance to be one of those peers, they\n"
+"simply create five times the number of nodes that are in the network and roll \n"
+"the dice.  When identity is free, Sybil can be a very potent technique for a \n"
+"powerful adversary.  The primary technique to address this is simply to make \n"
+"identity 'non free' - <a href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n"
 "(among others) uses the fact that IP addresses are limited, while \n"
 "IIP used \n"
-"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for "
-"creating a new\n"
-"identity.  We currently have not implemented any particular technique to "
-"address\n"
+"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for creating a new\n"
+"identity.  We currently have not implemented any particular technique to address\n"
 "Sybil, but do include placeholder certificates in the router's and \n"
-"destination's data structures which can contain a HashCash certificate of"
-" \n"
-"appropriate value when necessary (or some other certificate proving "
-"scarcity)."
+"destination's data structures which can contain a HashCash certificate of \n"
+"appropriate value when necessary (or some other certificate proving scarcity)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:698
-msgid "Requiring HashCash Certificates in various places has two major problems:"
+msgid ""
+"Requiring HashCash Certificates in various places has two major problems:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:702
@@ -12063,17 +10322,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:705
 msgid ""
 "The classic HashCash problem -\n"
-"selecting HashCash values that are meaningful proofs of work on high-end "
-"machines,\n"
+"selecting HashCash values that are meaningful proofs of work on high-end machines,\n"
 "while still being feasible on low-end machines such as mobile devices."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:712
 msgid ""
-"Various limitations on the number of routers in a given IP range restrict"
-"\n"
-"the vulnerability to attackers that don't have the ability to put "
-"machines\n"
+"Various limitations on the number of routers in a given IP range restrict\n"
+"the vulnerability to attackers that don't have the ability to put machines\n"
 "in several IP blocks.\n"
 "However, this is not a meaningful defense against a powerful adversary."
 msgstr ""
@@ -12095,22 +10351,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:733
 #, python-format
 msgid ""
-"By refusing to accept or forward tunnel build requests, except to a "
-"colluding peer, a router could ensure\n"
+"By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure\n"
 "that a tunnel is formed wholly from its set of colluding routers.\n"
-"The chances of success are enhanced if there is a large number of "
-"colluding routers,\n"
+"The chances of success are enhanced if there is a large number of colluding routers,\n"
 "i.e. a <a href=\"#sybil\">Sybil attack</a>.\n"
 "This is somewhat mitigated by our\n"
-"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor "
-"the performance\n"
+"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor the performance\n"
 "of peers.\n"
 "However, this is a powerful attack as the number of routers approaches\n"
 "<i>f</i> = 0.2, or 20&#37; malicious nodes, as specifed in the paper.\n"
-"The malicous routers could also maintain connections to the target router"
-" and provide\n"
-"excellent forwarding bandwidth for traffic over those connections, in an "
-"attempt\n"
+"The malicous routers could also maintain connections to the target router and provide\n"
+"excellent forwarding bandwidth for traffic over those connections, in an attempt\n"
 "to manipulate the profiles managed by the target and appear attractive.\n"
 "Further research and defenses may be necessary."
 msgstr ""
@@ -12119,38 +10370,29 @@ msgstr ""
 #, python-format
 msgid ""
 "We use strong cryptography with long keys, and\n"
-"we assume the security of the industry-standard cryptographic primitives "
-"used in I2P, as documented\n"
+"we assume the security of the industry-standard cryptographic primitives used in I2P, as documented\n"
 "<a href=\"%(cryptography)s\">on the low-level cryptography page</a>. \n"
 "Security features include the immediate detection of \n"
-"altered messages along the path, the inability to decrypt messages not "
-"addressed to you,\n"
+"altered messages along the path, the inability to decrypt messages not addressed to you,\n"
 "and defense against man-in-the-middle attacks.\n"
-"The key sizes chosen in 2003 were quite conservative at the time, and are"
-" still longer than\n"
-"those used in <a href=\"https://torproject.org/\">other anonymity "
-"networks</a>.\n"
+"The key sizes chosen in 2003 were quite conservative at the time, and are still longer than\n"
+"those used in <a href=\"https://torproject.org/\">other anonymity networks</a>.\n"
 "We don't think the current key lengths are our biggest weakness,\n"
 "especially for traditional, non-state-level adversaries;\n"
 "bugs and the small size of the network are much more worrisome.\n"
-"Of course, all cryptographic algorithms eventually become obsolete due to"
-"\n"
-"the advent of faster processors, cryptographic research, and advancements"
-" in\n"
+"Of course, all cryptographic algorithms eventually become obsolete due to\n"
+"the advent of faster processors, cryptographic research, and advancements in\n"
 "methods such as rainbow tables, clusters of video game hardware, etc.\n"
-"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys"
-" or change\n"
+"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change\n"
 "shared secret values while maintaining backward compatibility."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:773
 #, python-format
 msgid ""
-"Upgrading the various data structures and protocols to support longer "
-"keys\n"
+"Upgrading the various data structures and protocols to support longer keys\n"
 "will have to be tackled eventually, and this will be a\n"
-"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be "
-"for \n"
+"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be for \n"
 "<a href=\"https://torproject.org/\">others</a>.\n"
 "Hopefully, through careful planning, we can minimize the disruption, and\n"
 "implement mechanisms to make it easier for future transitions."
@@ -12159,12 +10401,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:782
 msgid ""
 "In the future, several I2P protocols and data structures\n"
-"support securely padding messages to arbitrary sizes, so messages could "
-"be made constant\n"
-"size or garlic messages could be modified randomly so that some cloves "
-"appear to contain\n"
-"more subcloves than they actually do.  At the moment, however, garlic, "
-"tunnel, and \n"
+"support securely padding messages to arbitrary sizes, so messages could be made constant\n"
+"size or garlic messages could be modified randomly so that some cloves appear to contain\n"
+"more subcloves than they actually do.  At the moment, however, garlic, tunnel, and \n"
 "end to end messages include simple random padding."
 msgstr ""
 
@@ -12178,18 +10417,14 @@ msgid ""
 "In addition to the floodfill DOS attacks described\n"
 "<a href=\"#ffdos\">above</a>, floodfill routers are uniquely positioned\n"
 "to learn about network participants, due to their role\n"
-"in the netDb, and the high frequency of communication with those "
-"participants.\n"
-"This is somewhat mitigated because floodfill routers only manage a "
-"portion\n"
+"in the netDb, and the high frequency of communication with those participants.\n"
+"This is somewhat mitigated because floodfill routers only manage a portion\n"
 "of the total keyspace, and the keyspace rotates daily, as explained \n"
 "on the <a href=\"%(netdb)s#threat\">network database page</a>.\n"
-"The specific mechanisms by which routers communicate with floodfills have"
-" been\n"
+"The specific mechanisms by which routers communicate with floodfills have been\n"
 "<a href=\"%(netdb)s#delivery\">carefully designed</a>.\n"
 "However, these threats should be studied further.\n"
-"The specific potential threats and corresponding defenses are a topic for"
-" future research."
+"The specific potential threats and corresponding defenses are a topic for future research."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:812
@@ -12208,33 +10443,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:826
 msgid ""
-"There are a few centralized or limited resources (some inside I2P, some "
-"not)\n"
+"There are a few centralized or limited resources (some inside I2P, some not)\n"
 "that could be attacked or used as a vector for attacks.\n"
-"The absence of jrandom starting November 2007, followed by the loss of "
-"the i2p.net hosting service in January 2008,\n"
-"highlighted numerous centralized resources in the development and "
-"operation of the I2P network,\n"
+"The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,\n"
+"highlighted numerous centralized resources in the development and operation of the I2P network,\n"
 "most of which are now distributed.\n"
-"Attacks on externally-reachable resources mainly affect the ability of "
-"new users to find us,\n"
+"Attacks on externally-reachable resources mainly affect the ability of new users to find us,\n"
 "not the operation of the network itself."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:836
 #, python-format
 msgid ""
-"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin"
-" for external public access."
+"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin "
+"for external public access."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:839
 #, python-format
 msgid ""
-"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed "
-"locations</a>,\n"
-"however more reseed hosts may be needed, and the handling of unreliable "
-"or malicious\n"
+"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed locations</a>,\n"
+"however more reseed hosts may be needed, and the handling of unreliable or malicious\n"
 "reseed hosts may need improvement."
 msgstr ""
 
@@ -12250,10 +10479,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:851
 msgid ""
-"Routers now better handle <a href=\"#ffdos\">multiple unreliable "
-"floodfill peers</a>.\n"
-"Malicious floodfills <a href=\"#ffdos\">needs</a> <a "
-"href=\"#floodfill\">more</a> study."
+"Routers now better handle <a href=\"#ffdos\">multiple unreliable floodfill peers</a>.\n"
+"Malicious floodfills <a href=\"#ffdos\">needs</a> <a href=\"#floodfill\">more</a> study."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:855
@@ -12265,47 +10492,35 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:858
 msgid ""
-"Routers rely on a single news host, but there is a hardcoded backup URL "
-"pointing to a different host.\n"
+"Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.\n"
 "A malicious news host could feed a huge file, need to limit the size."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:862
 #, python-format
 msgid ""
-"<a href=\"%(naming)s\">Naming system services</a>, including address book"
-" subscription providers, add-host services,\n"
-"and jump services, could be malicious. Substantial protections for "
-"subscriptions were implemented\n"
-"in release 0.6.1.31, with additional enhancements in subsequent releases."
-"\n"
+"<a href=\"%(naming)s\">Naming system services</a>, including address book subscription providers, add-host services,\n"
+"and jump services, could be malicious. Substantial protections for subscriptions were implemented\n"
+"in release 0.6.1.31, with additional enhancements in subsequent releases.\n"
 "However, all naming services require some measure of trust, see\n"
 "<a href=\"%(naming)s\">the naming page</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:869
 msgid ""
-"We remain reliant on the DNS service for i2p2.de, losing this would cause"
-" substantial\n"
+"We remain reliant on the DNS service for i2p2.de, losing this would cause substantial\n"
 "disruption in our ability to attract new users,\n"
-"and would shrink the network (in the short-to-medium term), just as the "
-"loss of i2p.net did."
+"and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:881
 msgid ""
-"These attacks aren't directly on the network, but instead go after its "
-"development team \n"
-"by either introducing legal hurdles on anyone contributing to the "
-"development\n"
-"of the software, or by using whatever means are available to get the "
-"developers to \n"
-"subvert the software.  Traditional technical measures cannot defeat these"
-" attacks, and\n"
-"if someone threatened the life or livelihood of a developer (or even just"
-" issuing a \n"
-"court order along with a gag order, under threat of prison), we would "
-"have a big problem."
+"These attacks aren't directly on the network, but instead go after its development team \n"
+"by either introducing legal hurdles on anyone contributing to the development\n"
+"of the software, or by using whatever means are available to get the developers to \n"
+"subvert the software.  Traditional technical measures cannot defeat these attacks, and\n"
+"if someone threatened the life or livelihood of a developer (or even just issuing a \n"
+"court order along with a gag order, under threat of prison), we would have a big problem."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:890
@@ -12315,26 +10530,19 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:894
 #, python-format
 msgid ""
-"All components of the network must be open source to enable inspection, "
-"verification, \n"
-"modification, and improvement.  If a developer is compromised, once it is"
-" noticed \n"
-"the community should demand explanation and cease to accept that "
-"developer's work.\n"
-"All checkins to our <a href=\"%(monotone)s\">distributed source control "
-"system</a>\n"
-"are cryptographically signed, and the release packagers use a trust-list "
-"system\n"
+"All components of the network must be open source to enable inspection, verification, \n"
+"modification, and improvement.  If a developer is compromised, once it is noticed \n"
+"the community should demand explanation and cease to accept that developer's work.\n"
+"All checkins to our <a href=\"%(monotone)s\">distributed source control system</a>\n"
+"are cryptographically signed, and the release packagers use a trust-list system\n"
 "to restrict modifications to those previously approved."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:902
 #, python-format
 msgid ""
-"Development over the network itself, allowing developers to stay "
-"anonymous but still \n"
-"secure the development process.  All I2P development can occur through "
-"I2P - using\n"
+"Development over the network itself, allowing developers to stay anonymous but still \n"
+"secure the development process.  All I2P development can occur through I2P - using\n"
 "a <a href=\"%(monotone)s\">distributed source control system</a>,\n"
 "a distributed source control system, IRC chat,\n"
 "public web servers,\n"
@@ -12344,8 +10552,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:913
 msgid ""
-"We also maintain relationships with various organizations that offer "
-"legal advice,\n"
+"We also maintain relationships with various organizations that offer legal advice,\n"
 "should any defense be necessary."
 msgstr ""
 
@@ -12355,52 +10562,38 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:922
 msgid ""
-"Try as we might, most nontrivial applications include errors in the "
-"design or \n"
-"implementation, and I2P is no exception.  There may be bugs that could be"
-" exploited to \n"
-"attack the anonymity or security of the communication running over I2P in"
-" unexpected \n"
-"ways.  To help withstand attacks against the design or protocols in use, "
-"we publish \n"
+"Try as we might, most nontrivial applications include errors in the design or \n"
+"implementation, and I2P is no exception.  There may be bugs that could be exploited to \n"
+"attack the anonymity or security of the communication running over I2P in unexpected \n"
+"ways.  To help withstand attacks against the design or protocols in use, we publish \n"
 "all designs and documentation and solicit review and criticism with \n"
 "the hope that many eyes will improve the system.\n"
 "We do not believe in\n"
-"<a href=\"http://www.haystacknetwork.com/\">security through "
-"obscurity</a>."
+"<a href=\"http://www.haystacknetwork.com/\">security through obscurity</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:933
 msgid ""
 "In addition, the code is being \n"
-"treated the same way, with little aversion towards reworking or throwing "
-"out \n"
-"something that isn't meeting the needs of the software system (including "
-"ease of \n"
-"modification).  Documentation for the design and implementation of the "
-"network and \n"
-"the software components are an essential part of security, as without "
-"them it is \n"
-"unlikely that developers would be willing to spend the time to learn the "
-"software \n"
+"treated the same way, with little aversion towards reworking or throwing out \n"
+"something that isn't meeting the needs of the software system (including ease of \n"
+"modification).  Documentation for the design and implementation of the network and \n"
+"the software components are an essential part of security, as without them it is \n"
+"unlikely that developers would be willing to spend the time to learn the software \n"
 "enough to identify shortcomings and bugs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:943
 msgid ""
-"Our software is likely, in particular, to contain bugs related to denial "
-"of service\n"
-"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues  "
-"in the router console,\n"
-"and other vulnerabilities to non-standard inputs via the various "
-"protocols."
+"Our software is likely, in particular, to contain bugs related to denial of service\n"
+"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues  in the router console,\n"
+"and other vulnerabilities to non-standard inputs via the various protocols."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:949
 #, python-format
 msgid ""
-"I2P is still a small network with a small development community and "
-"almost no\n"
+"I2P is still a small network with a small development community and almost no\n"
 "interest from academic or research groups.\n"
 "Therefore we lack the analysis that\n"
 "<a href=\"https://torproject.org/\">other anonymity networks</a>\n"
@@ -12414,18 +10607,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:963
 msgid ""
-"To some extent, I2P could be enhanced to avoid peers operating at IP "
-"addresses\n"
-"listed in a blocklist. Several blocklists are commonly available in "
-"standard formats,\n"
-"listing anti-P2P organizations, potential state-level adversaries, and "
-"others."
+"To some extent, I2P could be enhanced to avoid peers operating at IP addresses\n"
+"listed in a blocklist. Several blocklists are commonly available in standard formats,\n"
+"listing anti-P2P organizations, potential state-level adversaries, and others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:969
 msgid ""
-"To the extent that active peers actually do show up in the actual "
-"blocklist,\n"
+"To the extent that active peers actually do show up in the actual blocklist,\n"
 "blocking by only a subset of peers would tend to segment the network,\n"
 "exacerbate reachability problems, and decrease overall reliability.\n"
 "Therefore we would want to agree on a particular blocklist and\n"
@@ -12434,8 +10623,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:977
 msgid ""
-"Blocklists are only a part (perhaps a small part) of an array of defenses"
-"\n"
+"Blocklists are only a part (perhaps a small part) of an array of defenses\n"
 "against maliciousness.\n"
 "In large part the profiling system does a good job of measuring\n"
 "router behavior so that we don't need to trust anything in netDb.\n"
@@ -12448,8 +10636,7 @@ msgid ""
 "If a blocklist is hosted at a central location with automatic updates\n"
 "the network is vulnerable to a\n"
 "<a href=\"#central\">central resource attack</a>.\n"
-"Automatic subscription to a list gives the list provider the power to "
-"shut\n"
+"Automatic subscription to a list gives the list provider the power to shut\n"
 "the i2p network down. Completely."
 msgstr ""
 
@@ -12458,8 +10645,7 @@ msgid ""
 "Currently, a default blocklist is distributed with our software,\n"
 "listing only the IPs of past DOS sources.\n"
 "There is no automatic update mechanism.\n"
-"Should a particular IP range implement serious attacks on the I2P "
-"network,\n"
+"Should a particular IP range implement serious attacks on the I2P network,\n"
 "we would have to ask people to update their blocklist manually through\n"
 "out-of-band mechanisms such as forums, blogs, etc."
 msgstr ""
@@ -12474,30 +10660,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:7
 msgid ""
-"This page contains an overview of I2P tunnel terminology and operation, "
-"with\n"
+"This page contains an overview of I2P tunnel terminology and operation, with\n"
 "links to more technical pages, details, and specifications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:12
 #, python-format
 msgid ""
-"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P "
-"builds virtual \"tunnels\" -\n"
-"temporary and unidirectional paths through a sequence of routers.  These"
-" \n"
+"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P builds virtual \"tunnels\" -\n"
+"temporary and unidirectional paths through a sequence of routers.  These \n"
 "tunnels are classified as either inbound tunnels (where everything \n"
 "given to it goes towards the creator of the tunnel) or outbound tunnels\n"
 "(where the tunnel creator shoves messages away from them).  When Alice\n"
 "wants to send a message to Bob, she will (typically) send it out one of\n"
-"her existing outbound tunnels with instructions for that tunnel's "
-"endpoint\n"
+"her existing outbound tunnels with instructions for that tunnel's endpoint\n"
 "to forward it to the gateway router for one of Bob's current inbound \n"
 "tunnels, which in turn passes it to Bob."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:25
-msgid "Alice connecting through her outbound tunnel to Bob via his inbound tunnel"
+msgid ""
+"Alice connecting through her outbound tunnel to Bob via his inbound tunnel"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:27
@@ -12533,8 +10716,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:38
 #, python-format
 msgid ""
-"<b>Tunnel gateway</b> - the first router in a tunnel.  For inbound "
-"tunnels,\n"
+"<b>Tunnel gateway</b> - the first router in a tunnel.  For inbound tunnels,\n"
 "this is the one mentioned in the LeaseSet published in the\n"
 "<a href=\"%(netdb)s\">network database</a>.  For outbound tunnels, the\n"
 "gateway is the originating router.  (e.g. both A and D above)"
@@ -12542,21 +10724,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:44
 msgid ""
-"<b>Tunnel endpoint</b> - the last router in a tunnel.  (e.g. both C and F"
-" above)"
+"<b>Tunnel endpoint</b> - the last router in a tunnel.  (e.g. both C and F "
+"above)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:45
 msgid ""
-"<b>Tunnel participant</b> - all routers in a tunnel except for the "
-"gateway or\n"
+"<b>Tunnel participant</b> - all routers in a tunnel except for the gateway or\n"
 "endpoint (e.g. both B and E above)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:49
 msgid ""
-"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router "
-"jumps, e.g.:"
+"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router jumps,"
+" e.g.:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:51
@@ -12571,8 +10752,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:53
 msgid ""
-"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one "
-"intermediate\n"
+"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one intermediate\n"
 "tunnel participant. (the above diagram includes two 2-hop tunnels - one\n"
 "outbound from Alice, one inbound to Bob)"
 msgstr ""
@@ -12580,10 +10760,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:60
 #, python-format
 msgid ""
-"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 "
-"byte integer</a>\n"
-"different for each hop in a tunnel, and unique among all tunnels on a "
-"router.\n"
+"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 byte integer</a>\n"
+"different for each hop in a tunnel, and unique among all tunnels on a router.\n"
 "Chosen randomly by the tunnel creator."
 msgstr ""
 
@@ -12594,8 +10772,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:68
 #, python-format
 msgid ""
-"Routers performing the three roles (gateway, participant, endpoint) are "
-"given\n"
+"Routers performing the three roles (gateway, participant, endpoint) are given\n"
 "different pieces of data in the initial\n"
 "<a href=\"%(tunnelcreation)s\">Tunnel Build Message</a>\n"
 "to accomplish their tasks:"
@@ -12609,9 +10786,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:97
 #, python-format
 msgid ""
-"<b>tunnel encryption key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"encrypting\n"
+"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n"
 "messages and instructions to the next hop"
 msgstr ""
 
@@ -12619,9 +10794,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:101
 #, python-format
 msgid ""
-"<b>tunnel IV key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"double-encrypting\n"
+"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n"
 "the IV to the next hop"
 msgstr ""
 
@@ -12629,9 +10802,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:105
 #, python-format
 msgid ""
-"<b>reply key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for "
-"encrypting\n"
+"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n"
 "the reply to the tunnel build request"
 msgstr ""
 
@@ -12648,8 +10819,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:91
 msgid ""
-"<b>next hop</b> - what router is the next one in the path (unless this is"
-" a 0-hop tunnel, and the gateway is also the endpoint)"
+"<b>next hop</b> - what router is the next one in the path (unless this is a "
+"0-hop tunnel, and the gateway is also the endpoint)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:92
@@ -12676,27 +10847,21 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:117
 #, python-format
 msgid ""
-"<b>tunnel encryption key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"encrypting\n"
+"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n"
 "messages and instructions to the the endpoint (itself)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:121
 #, python-format
 msgid ""
-"<b>tunnel IV key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"double-encrypting\n"
+"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n"
 "the IV to the endpoint (itself)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:125
 #, python-format
 msgid ""
-"<b>reply key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for "
-"encrypting\n"
+"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n"
 "the reply to the tunnel build request (outbound endpoints only)"
 msgstr ""
 
@@ -12712,8 +10877,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:131
 msgid ""
-"<b>reply router</b> - the inbound gateway of the tunnel to send the reply"
-" through (outbound endpoints only)"
+"<b>reply router</b> - the inbound gateway of the tunnel to send the reply "
+"through (outbound endpoints only)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:132
@@ -12736,8 +10901,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:143
 #, python-format
 msgid ""
-"Several tunnels for a particular purpose may be grouped into a \"tunnel "
-"pool\",\n"
+"Several tunnels for a particular purpose may be grouped into a \"tunnel pool\",\n"
 "as described in the\n"
 "<a href=\"%(tunnelimpl)s#tunnel.pooling\">tunnel specification</a>.\n"
 "This provides redundancy and additional bandwidth.\n"
@@ -12752,20 +10916,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:155
 #, python-format
 msgid ""
-"As mentioned above, each client requests that their router provide "
-"tunnels to\n"
+"As mentioned above, each client requests that their router provide tunnels to\n"
 "include at least a certain number of hops.\n"
 "The decision as to how many routers\n"
-"to have in one's outbound and inbound tunnels has an important effect "
-"upon the\n"
-"latency, throughput, reliability, and anonymity provided by I2P - the "
-"more peers\n"
-"that messages have to go through, the longer it takes to get there and "
-"the more\n"
-"likely that one of those routers will fail prematurely.  The less routers"
-" in a\n"
-"tunnel, the easier it is for an adversary to mount traffic analysis "
-"attacks and\n"
+"to have in one's outbound and inbound tunnels has an important effect upon the\n"
+"latency, throughput, reliability, and anonymity provided by I2P - the more peers\n"
+"that messages have to go through, the longer it takes to get there and the more\n"
+"likely that one of those routers will fail prematurely.  The less routers in a\n"
+"tunnel, the easier it is for an adversary to mount traffic analysis attacks and\n"
 "pierce someone's anonymity.\n"
 "Tunnel lengths are specified by clients via\n"
 "<a href=\"%(i2cp)s#options\">I2CP options</a>.\n"
@@ -12779,18 +10937,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:172
 msgid ""
 "With no remote routers in a tunnel, the user has very basic plausible\n"
-"deniability (since no one knows for sure that the peer that sent them the"
-"\n"
-"message wasn't simply just forwarding it on as part of the tunnel). "
-"However, it\n"
-"would be fairly easy to mount a statistical analysis attack and notice "
-"that\n"
-"messages targeting a specific destination are always sent through a "
-"single\n"
-"gateway.  Statistical analysis against outbound 0-hop tunnels are more "
-"complex,\n"
-"but could show similar information (though would be slightly harder to "
-"mount)."
+"deniability (since no one knows for sure that the peer that sent them the\n"
+"message wasn't simply just forwarding it on as part of the tunnel). However, it\n"
+"would be fairly easy to mount a statistical analysis attack and notice that\n"
+"messages targeting a specific destination are always sent through a single\n"
+"gateway.  Statistical analysis against outbound 0-hop tunnels are more complex,\n"
+"but could show similar information (though would be slightly harder to mount)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:182
@@ -12801,14 +10953,10 @@ msgstr ""
 #, python-format
 msgid ""
 "With only one remote router in a tunnel, the user has both plausible\n"
-"deniability and basic anonymity, as long as they are not up against an "
-"internal\n"
-"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>)."
-" However,\n"
-"if the adversary ran a sufficient number of routers such that the single "
-"remote\n"
-"router in the tunnel is often one of those compromised ones, they would "
-"be able\n"
+"deniability and basic anonymity, as long as they are not up against an internal\n"
+"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>). However,\n"
+"if the adversary ran a sufficient number of routers such that the single remote\n"
+"router in the tunnel is often one of those compromised ones, they would be able\n"
 "to mount the above statistical traffic analysis attack."
 msgstr ""
 
@@ -12818,10 +10966,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:193
 msgid ""
-"With two or more remote routers in a tunnel, the costs of mounting the "
-"traffic\n"
-"analysis attack increases, since many remote routers would have to be "
-"compromised\n"
+"With two or more remote routers in a tunnel, the costs of mounting the traffic\n"
+"analysis attack increases, since many remote routers would have to be compromised\n"
 "to mount it."
 msgstr ""
 
@@ -12835,8 +10981,7 @@ msgid ""
 "To reduce the susceptibility to <a href=\"%(url)s\">some attacks</a>,\n"
 "3 or more hops are recommended for the highest level of protection.\n"
 "<a href=\"%(url)s\">Recent studies</a>\n"
-"also conclude that more than 3 hops does not provide additional "
-"protection."
+"also conclude that more than 3 hops does not provide additional protection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:208
@@ -12860,15 +11005,12 @@ msgstr ""
 #, python-format
 msgid ""
 "All tunnels are periodically tested by their creator by sending a\n"
-"DeliveryStatusMessage out an outbound tunnel and bound for another "
-"inbound tunnel\n"
-"(testing both tunnels at once).  If either fails a number of consecutive "
-"tests, it is marked as no longer\n"
+"DeliveryStatusMessage out an outbound tunnel and bound for another inbound tunnel\n"
+"(testing both tunnels at once).  If either fails a number of consecutive tests, it is marked as no longer\n"
 "functional. If it was used for a client's inbound tunnel, a new leaseSet\n"
 "is created.\n"
 "Tunnel test failures are also reflected in the\n"
-"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer "
-"profile</a>."
+"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer profile</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:230
@@ -12878,14 +11020,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:231
 #, python-format
 msgid ""
-"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic "
-"routing</a>\n"
-"a Tunnel Build Message to a router, requesting that they participate in "
-"the\n"
-"tunnel (providing them with all of the appropriate information, as above,"
-" along\n"
-"with a certificate, which right now is a 'null' cert, but will support "
-"hashcash\n"
+"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic routing</a>\n"
+"a Tunnel Build Message to a router, requesting that they participate in the\n"
+"tunnel (providing them with all of the appropriate information, as above, along\n"
+"with a certificate, which right now is a 'null' cert, but will support hashcash\n"
 "or other non-free certificates when necessary).\n"
 "That router forwards the message to the next hop in the tunnel.\n"
 "Details are in the\n"
@@ -12895,8 +11033,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:245
 #, python-format
 msgid ""
-"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic"
-" encryption</a>\n"
+"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic encryption</a>\n"
 "of tunnel messages.\n"
 "Details are in the\n"
 "<a href=\"%(tunnelimpl)s\">tunnel specification</a>.\n"
@@ -12917,8 +11054,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:267
 msgid ""
 "In a distant future release,\n"
-"options specifying the pooling, mixing, and chaff generation settings may"
-" be implemented."
+"options specifying the pooling, mixing, and chaff generation settings may be implemented."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:272
@@ -12961,20 +11097,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:6
 msgid ""
-"The I2P Client Protocol (I2CP) exposes a strong separation of concerns "
-"between\n"
-"the router and any client that wishes to communicate over the network.  "
-"It enables\n"
-"secure and asynchronous messaging by sending and receiving messages over "
-"a \n"
+"The I2P Client Protocol (I2CP) exposes a strong separation of concerns between\n"
+"the router and any client that wishes to communicate over the network.  It enables\n"
+"secure and asynchronous messaging by sending and receiving messages over a \n"
 "single TCP socket.\n"
 "With I2CP, a client application tells the\n"
-"router who they are (their \"destination\"), what anonymity, reliability,"
-" and \n"
-"latency tradeoffs to make, and where to send messages.  In turn the "
-"router uses\n"
-"I2CP to tell the client when any messages have arrived, and to request "
-"authorization\n"
+"router who they are (their \"destination\"), what anonymity, reliability, and \n"
+"latency tradeoffs to make, and where to send messages.  In turn the router uses\n"
+"I2CP to tell the client when any messages have arrived, and to request authorization\n"
 "for some tunnels to be used."
 msgstr ""
 
@@ -12983,10 +11113,8 @@ msgstr ""
 msgid ""
 "The protocol itself is implemented in Java, to provide the\n"
 "<a href=\"%(url)s\">Client SDK</a>.\n"
-"This SDK is exposed in the i2p.jar package, which implements the client-"
-"side of I2CP.\n"
-"Clients should never need to access the router.jar package, which "
-"contains the\n"
+"This SDK is exposed in the i2p.jar package, which implements the client-side of I2CP.\n"
+"Clients should never need to access the router.jar package, which contains the\n"
 "router itself and the router-side of I2CP.\n"
 "There is also a <a href=\"%(libi2cp)s\">C library implementation</a>.\n"
 "A non-Java client would also have to implement the\n"
@@ -12997,45 +11125,35 @@ msgstr ""
 #, python-format
 msgid ""
 "Applications can take advantage of the base I2CP plus the \n"
-"<a href=\"%(streaming)s\">streaming</a> and <a "
-"href=\"%(datagrams)s\">datagram</a> libraries\n"
-"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a "
-"href=\"%(bob)s\">BOB</a> protocols,\n"
+"<a href=\"%(streaming)s\">streaming</a> and <a href=\"%(datagrams)s\">datagram</a> libraries\n"
+"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a href=\"%(bob)s\">BOB</a> protocols,\n"
 "which do not require clients to deal with any sort of cryptography.\n"
 "Also, clients may access the network by one of several proxies -\n"
 "HTTP, CONNECT, and SOCKS 4/4a/5.\n"
-"Alternatively, Java clients may access those libraries in "
-"ministreaming.jar and streaming.jar.\n"
+"Alternatively, Java clients may access those libraries in ministreaming.jar and streaming.jar.\n"
 "So there are several options for both Java and non-Java applications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:43
 #, python-format
 msgid ""
-"Client-side end-to-end encryption (encrypting the data over the I2CP "
-"connection)\n"
+"Client-side end-to-end encryption (encrypting the data over the I2CP connection)\n"
 "was disabled in I2P release 0.6,\n"
-"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end "
-"encryption</a>\n"
+"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end encryption</a>\n"
 "which is implemented in the router.\n"
 "The only cryptography that client libraries must still implement is\n"
 "<a href=\"%(cryptography)s#DSA\">DSA public/private key signing</a>\n"
 "for <a href=\"%(i2cp)s#msg_CreateLeaseSet\">LeaseSets</a> and\n"
-"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and"
-" management of those keys."
+"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and management of those keys."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:56
 msgid ""
-"In a standard I2P installation, port 7654 is used by external java "
-"clients to communicate\n"
+"In a standard I2P installation, port 7654 is used by external java clients to communicate\n"
 "with the local router via I2CP.\n"
-"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, "
-"set the\n"
-"router advanced configuration option "
-"<tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n"
-"Clients in the same JVM as the router pass messages directly to the "
-"router\n"
+"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n"
+"router advanced configuration option <tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n"
+"Clients in the same JVM as the router pass messages directly to the router\n"
 "through an internal JVM interface."
 msgstr ""
 
@@ -13043,13 +11161,10 @@ msgstr ""
 #, python-format
 msgid ""
 "The router also supports external connections over SSL.\n"
-"While SSL is not the default, it is strongly recommended for any traffic "
-"that may\n"
-"be exposed to the open Internet. The authorization user/password (if "
-"any), the\n"
+"While SSL is not the default, it is strongly recommended for any traffic that may\n"
+"be exposed to the open Internet. The authorization user/password (if any), the\n"
 "<a href=\"%(commonstructures)s#type_PrivateKey\">Private Key</a> and\n"
-"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private "
-"Key</a> for the\n"
+"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private Key</a> for the\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n"
 "are all transmitted in-the-clear unless SSL is enabled."
 msgstr ""
@@ -13070,19 +11185,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:82
 #, python-format
 msgid ""
-"When a client connects to the router, it first sends a single protocol "
-"version byte (0x2A).\n"
-"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and "
-"waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> "
-"response.\n"
-"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession "
-"Message</a> containing the session configuration.\n"
-"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet"
-" Message</a> from the router, indicating that inbound tunnels\n"
-"have been built, and responds with a CreateLeaseSetMessage containing the"
-" signed LeaseSet.\n"
-"The client may now initiate or receive connections from other I2P "
-"destinations."
+"When a client connects to the router, it first sends a single protocol version byte (0x2A).\n"
+"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> response.\n"
+"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> containing the session configuration.\n"
+"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet Message</a> from the router, indicating that inbound tunnels\n"
+"have been built, and responds with a CreateLeaseSetMessage containing the signed LeaseSet.\n"
+"The client may now initiate or receive connections from other I2P destinations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:91
@@ -13098,10 +11206,7 @@ msgstr ""
 #, python-format
 msgid ""
 "The following options are traditionally passed to the router via\n"
-"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained "
-"in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or "
-"a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession "
-"Message</a>."
+"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession Message</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:104
@@ -13134,14 +11239,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:167
 msgid ""
 "Number of ElGamal/AES Session Tags to send at a time.\n"
-"For clients with relatively low bandwidth per-client-pair (IRC, some UDP "
-"apps), this may be set lower."
+"For clients with relatively low bandwidth per-client-pair (IRC, some UDP apps), this may be set lower."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:179
 msgid ""
-"Comma-separated list of Base 64 Hashes of peers to build tunnels through;"
-" for debugging only"
+"Comma-separated list of Base 64 Hashes of peers to build tunnels through; "
+"for debugging only"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:188
@@ -13158,17 +11262,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:322
 msgid ""
 "Guaranteed is disabled;\n"
-"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1,"
-" the client side default is None as of 0.9.4"
+"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1, the client side default is None as of 0.9.4"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:334
 msgid ""
 "For authorization, if required by the router.\n"
-"If the client is running in the same JVM as a router, this option is not "
-"required.\n"
-"Warning - username and password are sent in the clear to the router, "
-"unless using SSL (i2cp.SSL=true).\n"
+"If the client is running in the same JVM as a router, this option is not required.\n"
+"Warning - username and password are sent in the clear to the router, unless using SSL (i2cp.SSL=true).\n"
 "Authorization is only recommended when using SSL."
 msgstr ""
 
@@ -13242,8 +11343,7 @@ msgid ""
 "Random amount to add or subtract to the length of tunnels in.\n"
 "A positive number x means add a random amount from 0 to x inclusive.\n"
 "A negative number -x means add a random amount from -x to x inclusive.\n"
-"The router will limit the total length of the tunnel to 0 to 7 inclusive."
-"\n"
+"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n"
 "The default variance was 1 prior to release 0.7.6."
 msgstr ""
 
@@ -13252,16 +11352,14 @@ msgid ""
 "Random amount to add or subtract to the length of tunnels out.\n"
 "A positive number x means add a random amount from 0 to x inclusive.\n"
 "A negative number -x means add a random amount from -x to x inclusive.\n"
-"The router will limit the total length of the tunnel to 0 to 7 inclusive."
-"\n"
+"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n"
 "The default variance was 1 prior to release 0.7.6."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:464
 msgid ""
 "Name of tunnel - generally used in routerconsole, which will\n"
-"use the first few characters of the Base64 hash of the destination by "
-"default."
+"use the first few characters of the Base64 hash of the destination by default."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:476
@@ -13277,8 +11375,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:497
 msgid ""
 "Number of tunnels in.\n"
-"Limit was increased from 6 to 16 in release 0.9; however, numbers higher "
-"than 6 are\n"
+"Limit was increased from 6 to 16 in release 0.9; however, numbers higher than 6 are\n"
 "incompatible with older releases."
 msgstr ""
 
@@ -13293,32 +11390,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:538
 msgid ""
 "Any other options prefixed with \"inbound.\" are stored\n"
-"in the \"unknown options\" properties of the inbound tunnel pool's "
-"settings."
+"in the \"unknown options\" properties of the inbound tunnel pool's settings."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:550
 msgid ""
 "Any other options prefixed with \"outbound.\" are stored\n"
-"in the \"unknown options\" properties of the outbound tunnel pool's "
-"settings."
+"in the \"unknown options\" properties of the outbound tunnel pool's settings."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:562
 msgid ""
 "Set to false to disable ever bundling a reply LeaseSet.\n"
 "For clients that do not publish their LeaseSet, this option must be true\n"
-"for any reply to be possible. \"true\" is also recommended for multihomed"
-" servers\n"
+"for any reply to be possible. \"true\" is also recommended for multihomed servers\n"
 "with long connection times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:569
 msgid ""
-"Setting to \"false\" may save significant outbound bandwidth, especially "
-"if\n"
-"the client is configured with a large number of inbound tunnels (Leases)."
-"\n"
+"Setting to \"false\" may save significant outbound bandwidth, especially if\n"
+"the client is configured with a large number of inbound tunnels (Leases).\n"
 "If replies are still required, this may shift the bandwidth burden to\n"
 "the far-end client and the floodfill.\n"
 "There are several cases where \"false\" may be appropriate:"
@@ -13334,14 +11426,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:579
 msgid ""
-"LeaseSet is published, client is a \"server\", all connections are "
-"inbound\n"
-"so the connecting far-end destination obviously has the leaseset already."
-"\n"
-"Connections are either short, or it is acceptable for latency on a long-"
-"lived\n"
-"connection to temporarily increase while the other end re-fetches the "
-"LeaseSet\n"
+"LeaseSet is published, client is a \"server\", all connections are inbound\n"
+"so the connecting far-end destination obviously has the leaseset already.\n"
+"Connections are either short, or it is acceptable for latency on a long-lived\n"
+"connection to temporarily increase while the other end re-fetches the LeaseSet\n"
 "after expiration.\n"
 "HTTP servers may fit these requirements."
 msgstr ""
@@ -13355,15 +11443,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:596
 #, python-format
 msgid ""
-"Note: As of release 0.7.7, option names and values must use UTF-8 "
-"encoding.\n"
+"Note: As of release 0.7.7, option names and values must use UTF-8 encoding.\n"
 "This is primarily useful for nicknames.\n"
-"Prior to that release, options with multi-byte characters were corrupted."
-"\n"
-"Since options are encoded in a <a "
-"href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n"
-"all option names and values are limited to 255 bytes (not characters) "
-"maximum."
+"Prior to that release, options with multi-byte characters were corrupted.\n"
+"Since options are encoded in a <a href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n"
+"all option names and values are limited to 255 bytes (not characters) maximum."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:610
@@ -13374,8 +11458,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:611
 msgid ""
 "The following options are interpreted on the client side,\n"
-"and will be interpreted if passed to the I2PSession via the "
-"I2PClient.createSession() call.\n"
+"and will be interpreted if passed to the I2PSession via the I2PClient.createSession() call.\n"
 "The streaming lib should also pass these options through to I2CP.\n"
 "Other implementations may have different defaults."
 msgstr ""
@@ -13451,28 +11534,24 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:871
 msgid ""
 "Connect to the router using SSL.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:883
 msgid ""
 "Router hostname.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:895
 msgid ""
 "Router I2CP port.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:902
 msgid ""
-"Note: All arguments, including numbers, are strings. True/false values "
-"are case-insensitive strings.\n"
+"Note: All arguments, including numbers, are strings. True/false values are case-insensitive strings.\n"
 "Anything other than case-insensitive \"true\" is interpreted as false.\n"
 "All option names are case-sensitive."
 msgstr ""
@@ -13484,28 +11563,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:909
 #, python-format
 msgid ""
-"The end-to-end messages handled by I2CP (i.e. the data sent by the client"
-" in a\n"
+"The end-to-end messages handled by I2CP (i.e. the data sent by the client in a\n"
 "<a href=\"%(i2cp)s#msg_SendMessage\">SendMessageMessage</a>\n"
 "and received by the client in a\n"
 "<a href=\"%(i2cp)s#msg_MessagePayload\">MessagePayloadMessage</a>)\n"
 "are gzipped with a standard 10-byte gzip\n"
 "header beginning with 0x1F 0x8B 0x08 as\n"
-"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC "
-"1952</a>.\n"
-"As of release 0.7.1, I2P uses ignored portions of the gzip header to "
-"include\n"
-"protocol, from-port, and to-port information, thus supporting streaming "
-"and\n"
-"datagrams on the same destination, and allowing query/response using "
-"datagrams\n"
+"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC 1952</a>.\n"
+"As of release 0.7.1, I2P uses ignored portions of the gzip header to include\n"
+"protocol, from-port, and to-port information, thus supporting streaming and\n"
+"datagrams on the same destination, and allowing query/response using datagrams\n"
 "to work reliably in the presence of multiple channels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:923
 msgid ""
-"The gzip function cannot be completely turned off, however setting "
-"i2cp.gzip=false\n"
+"The gzip function cannot be completely turned off, however setting i2cp.gzip=false\n"
 "turns the gzip effort setting to 0, which may save a little CPU."
 msgstr ""
 
@@ -13539,7 +11612,8 @@ msgid "Gzip xflags"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:960
-msgid "I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)"
+msgid ""
+"I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:969
@@ -13564,8 +11638,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:987
 #, python-format
 msgid ""
-"Some improvements may be able to use messages previously defined but not "
-"implemented.\n"
+"Some improvements may be able to use messages previously defined but not implemented.\n"
 "For reference, here is the\n"
 "<a href=\"%(pdf1)s\">I2CP Protocol Specification Version 0.9</a>\n"
 "(PDF) dated August 28, 2003.\n"
@@ -13584,12 +11657,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2np.html:6
 msgid ""
 "The I2P Network Protocol (I2NP),\n"
-"which is sandwiched between I2CP and the various I2P transport protocols,"
-" manages the\n"
-"routing and mixing of messages between routers, as well as the selection "
-"of what\n"
-"transports to use when communicating with a peer for which there are "
-"multiple\n"
+"which is sandwiched between I2CP and the various I2P transport protocols, manages the\n"
+"routing and mixing of messages between routers, as well as the selection of what\n"
+"transports to use when communicating with a peer for which there are multiple\n"
 "common transports supported."
 msgstr ""
 
@@ -13599,20 +11669,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:15
 msgid ""
-"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-"
-"router, point-to-point messages.\n"
-"By encrypting and wrapping messages in other messages, they can be sent "
-"in a secure way\n"
+"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-router, point-to-point messages.\n"
+"By encrypting and wrapping messages in other messages, they can be sent in a secure way\n"
 "through multiple hops to the ultimate destination.\n"
-"Priority is only used locally at the origin, i.e. when queuing for "
-"outbound delivery."
+"Priority is only used locally at the origin, i.e. when queuing for outbound delivery."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:22
 #, python-format
 msgid ""
-"The priorities listed below may not be current and are subject to change."
-"\n"
+"The priorities listed below may not be current and are subject to change.\n"
 "See the <a href=\"%(outnetmessage)s\">OutNetMessage Javadocs</a>\n"
 "for the current priority settings.\n"
 "Priority queueing implementation may vary."
@@ -13624,8 +11690,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:31
 msgid ""
-"The following table specifies the traditional 16-byte header used in "
-"NTCP.\n"
+"The following table specifies the traditional 16-byte header used in NTCP.\n"
 "The SSU and NTCP2 transports use modified headers."
 msgstr ""
 
@@ -13662,23 +11727,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2np.html:46
 #, python-format
 msgid ""
-"While the maximum payload size is nominally 64KB, the size is further "
-"constrained by the\n"
-"method of fragmenting I2NP messages into multiple 1KB tunnel messages as "
-"described on\n"
+"While the maximum payload size is nominally 64KB, the size is further constrained by the\n"
+"method of fragmenting I2NP messages into multiple 1KB tunnel messages as described on\n"
 "<a href=\"%(tunnelimpl)s\">the tunnel implementation page</a>.\n"
-"The maximum number of fragments is 64, and the message may not be "
-"perfectly aligned,\n"
+"The maximum number of fragments is 64, and the message may not be perfectly aligned,\n"
 "So the message must nominally fit in 63 fragments."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:54
 msgid ""
-"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL "
-"delivery mode);\n"
+"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL delivery mode);\n"
 "the maximum size of a follow-on fragment is 996 bytes.\n"
-"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 "
-"bytes, or 61.2 KB."
+"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 bytes, or 61.2 KB."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:60
@@ -13686,16 +11746,13 @@ msgid ""
 "In addition, the transports may have additional restrictions.\n"
 "The NTCP limit is 16KB - 6 = 16378 bytes.\n"
 "The SSU limit is approximately 32 KB.\n"
-"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher"
-" than what a tunnel can support."
+"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher than what a tunnel can support."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:67
 msgid ""
-"Note that these are not the limits for datagrams that the client sees, as"
-" the\n"
-"router may bundle a reply leaseset and/or session tags together with the "
-"client message\n"
+"Note that these are not the limits for datagrams that the client sees, as the\n"
+"router may bundle a reply leaseset and/or session tags together with the client message\n"
 "in a garlic message. The leaseset and tags together may add about 5.5KB.\n"
 "Therefore the current datagram limit is about 10KB. This limit will be\n"
 "increased in a future release."
@@ -13752,8 +11809,7 @@ msgid ""
 "Priority may vary.\n"
 "Size is 898 bytes for a typical 2-lease leaseSet.\n"
 "RouterInfo structures are compressed, and size varies; however\n"
-"there is a continuing effort to reduce the amount of data published in a "
-"RouterInfo\n"
+"there is a continuing effort to reduce the amount of data published in a RouterInfo\n"
 "as we approach release 1.0."
 msgstr ""
 
@@ -13763,8 +11819,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:150
 msgid ""
-"Used for message replies, and for testing tunnels - generally wrapped in "
-"a GarlicMessage"
+"Used for message replies, and for testing tunnels - generally wrapped in a "
+"GarlicMessage"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:158
@@ -13775,8 +11831,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:185
 msgid ""
-"The most common message. Priority for tunnel participants, outbound "
-"endpoints, and inbound gateways was\n"
+"The most common message. Priority for tunnel participants, outbound endpoints, and inbound gateways was\n"
 "reduced to 200 as of release 0.6.1.33.\n"
 "Outbound gateway messages (i.e. those originated locally) remains at 400."
 msgstr ""
@@ -13807,16 +11862,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(i2npspec)s\">On the I2NP Specification page</a>.\n"
 "See also the\n"
-"<a href=\"%(commonstructures)s\">Common Data Structure Specification "
-"page</a>."
+"<a href=\"%(commonstructures)s\">Common Data Structure Specification page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:234
 msgid ""
-"It isn't clear whether the current priority scheme is generally "
-"effective,\n"
-"and whether the priorities for various messages should be adjusted "
-"further.\n"
+"It isn't clear whether the current priority scheme is generally effective,\n"
+"and whether the priorities for various messages should be adjusted further.\n"
 "This is a topic for further research, analysis and testing."
 msgstr ""
 
@@ -13838,8 +11890,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:12
 msgid ""
 "Each of the layers in the stack provides extra capabilities.\n"
-"The capabilities are listed below, starting at the bottom of the protocol"
-" stack."
+"The capabilities are listed below, starting at the bottom of the protocol stack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:18
@@ -13848,8 +11899,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:20
 msgid ""
-"IP: Internet Protocol, allow addressing hosts on the regular internet and"
-" routing packets across the internet using best-effort delivery."
+"IP: Internet Protocol, allow addressing hosts on the regular internet and "
+"routing packets across the internet using best-effort delivery."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:23
@@ -13870,11 +11921,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:30
 msgid ""
-"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P "
-"routers. These are not anonymous yet, this is strictly a hop-to-hop "
-"connection.\n"
-"Two protocols are implemented to provide these capabilities. NTCP builds "
-"on top of TCP, while SSU uses UDP."
+"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P routers. These are not anonymous yet, this is strictly a hop-to-hop connection.\n"
+"Two protocols are implemented to provide these capabilities. NTCP builds on top of TCP, while SSU uses UDP."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:35
@@ -13892,20 +11940,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:42
 #, python-format
 msgid ""
-"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are "
-"large messages containing encrypted I2NP (see below) messages and "
-"encrypted instructions for their delivery.\n"
-"The encryption is layered. The first hop will decrypt the tunnel message "
-"and read a part. Another part can still be encrypted (with another key),"
-"\n"
+"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are large messages containing encrypted I2NP (see below) messages and encrypted instructions for their delivery.\n"
+"The encryption is layered. The first hop will decrypt the tunnel message and read a part. Another part can still be encrypted (with another key),\n"
 "so it will be forwarded."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:48
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are"
-" used to pass messages through multiple routers. These I2NP messages are "
+"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are "
+"used to pass messages through multiple routers. These I2NP messages are "
 "combined in tunnel messages."
 msgstr ""
 
@@ -13918,54 +11962,51 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:55
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are"
-" wrapped in each other and used to ensure encryption between two tunnels "
-"and are passed along from source to destination, keeping both anonymous."
+"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are "
+"wrapped in each other and used to ensure encryption between two tunnels and "
+"are passed along from source to destination, keeping both anonymous."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:61
 msgid ""
-"The following layers are strictly speaking no longer part of the I2P "
-"Protocol stack, they are not part of the core 'I2P router' functionality."
-"\n"
-"However, each of these layers adds additional functionality, to allow "
-"applications simple and convenient I2P usage."
+"The following layers are strictly speaking no longer part of the I2P Protocol stack, they are not part of the core 'I2P router' functionality.\n"
+"However, each of these layers adds additional functionality, to allow applications simple and convenient I2P usage."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:67
 msgid ""
-"<b>I2P Client Layer:</b> allow any client to use I2P functionality, "
-"without requiring the direct use of the router API."
+"<b>I2P Client Layer:</b> allow any client to use I2P functionality, without "
+"requiring the direct use of the router API."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:69
 #, python-format
 msgid ""
 "<a href=\"%(i2cp)s\">I2CP</a>: I2P Client Protocol, allows secure and "
-"asynchronous messaging over I2P by communicating messages over the I2CP "
-"TCP socket."
+"asynchronous messaging over I2P by communicating messages over the I2CP TCP "
+"socket."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:74
 msgid ""
-"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like "
-"functionality on top of I2P."
+"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like functionality "
+"on top of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:76
 #, python-format
 msgid ""
-"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of "
-"TCP-like streams over I2P. This allows easier porting of existing "
-"applications to I2P."
+"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of TCP-"
+"like streams over I2P. This allows easier porting of existing applications "
+"to I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:80
 #, python-format
 msgid ""
 "<a href=\"%(datagrams)s\">Datagram Library</a>: an implementation of UDP-"
-"like messages over I2P. This allows easier porting of existing "
-"applications to I2P."
+"like messages over I2P. This allows easier porting of existing applications "
+"to I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:85
@@ -13985,8 +12026,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:99
 msgid ""
-"Finally, what could be considered the <b>'I2P application layer'</b>, is "
-"a large number of applications on top of I2P.\n"
+"Finally, what could be considered the <b>'I2P application layer'</b>, is a large number of applications on top of I2P.\n"
 "We can order this based on the I2P stack layer they use."
 msgstr ""
 
@@ -14038,12 +12078,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:8
 msgid ""
-"A \"transport\" in I2P is a method for direct, point-to-point "
-"communication\n"
+"A \"transport\" in I2P is a method for direct, point-to-point communication\n"
 "between two routers.\n"
 "Transports must provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router "
-"contacted \n"
+"against external adversaries while authenticating that the router contacted \n"
 "is the one who should receive a given message."
 msgstr ""
 
@@ -14097,8 +12135,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:44
 msgid ""
 "Maintain a set of router addresses, one or more for each transport,\n"
-"that the router publishes as its global contact information (the "
-"RouterInfo).\n"
+"that the router publishes as its global contact information (the RouterInfo).\n"
 "Each transport may connect using one of these addresses, which may be\n"
 "IPv4 or (as of version 0.9.8) IPv6."
 msgstr ""
@@ -14127,10 +12164,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:55
 msgid ""
-"Maintenance of connection limits for each transport, implementation of "
-"various thresholds for these limits,\n"
-"and communication of threshold status to the router so it may make "
-"operational changes based on the status"
+"Maintenance of connection limits for each transport, implementation of various thresholds for these limits,\n"
+"and communication of threshold status to the router so it may make operational changes based on the status"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:59
@@ -14149,27 +12184,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:62
 msgid ""
-"Coordination of firewall status and local IP, and changes to either, "
-"among the transports"
+"Coordination of firewall status and local IP, and changes to either, among "
+"the transports"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:63
 #: i2p2www/pages/site/docs/transport/ssu.html:35
 msgid ""
-"Communication of firewall status and local IP, and changes to either, to "
-"the router and the user interface"
+"Communication of firewall status and local IP, and changes to either, to the"
+" router and the user interface"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:64
 msgid ""
-"Determination of a consensus clock, which is used to periodically update "
-"the router's clock, as a backup for NTP"
+"Determination of a consensus clock, which is used to periodically update the"
+" router's clock, as a backup for NTP"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:65
 msgid ""
-"Maintenance of status for each peer, including whether it is connected, "
-"whether it was recently connected,\n"
+"Maintenance of status for each peer, including whether it is connected, whether it was recently connected,\n"
 "and whether it was reachable in the last attempt"
 msgstr ""
 
@@ -14179,8 +12213,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:70
 msgid ""
-"Honoring the automated and manual lists of banned peers maintained by the"
-" router,\n"
+"Honoring the automated and manual lists of banned peers maintained by the router,\n"
 "and refusing outbound and inbound connections to those peers"
 msgstr ""
 
@@ -14190,10 +12223,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:79
 msgid ""
-"The transport subsystem maintains a set of router addresses, each of "
-"which lists a transport method, IP, and port.\n"
-"These addresses constitute the advertised contact points, and are "
-"published by the router to the network database.\n"
+"The transport subsystem maintains a set of router addresses, each of which lists a transport method, IP, and port.\n"
+"These addresses constitute the advertised contact points, and are published by the router to the network database.\n"
 "Addresses may also contain an arbitrary set of additional options."
 msgstr ""
 
@@ -14214,16 +12245,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:92
 #, python-format
 msgid ""
-"A router is firewalled, and therefore publishes an SSU address which "
-"contains a list of cooperating\n"
-"peers or \"introducers\" who will assist in NAT traversal (see <a "
-"href=\"%(ssu)s\">the SSU spec</a> for details)"
+"A router is firewalled, and therefore publishes an SSU address which contains a list of cooperating\n"
+"peers or \"introducers\" who will assist in NAT traversal (see <a href=\"%(ssu)s\">the SSU spec</a> for details)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:96
 msgid ""
-"A router is not firewalled or its NAT ports  are open; it publishes both "
-"NTCP and SSU addresses containing\n"
+"A router is not firewalled or its NAT ports  are open; it publishes both NTCP and SSU addresses containing\n"
 "directly-accessible IP and ports."
 msgstr ""
 
@@ -14234,10 +12262,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:104
 #, python-format
 msgid ""
-"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> "
-"only. The transport selected for any message is\n"
-"independent of the upper-layer protocols and contents (router or client "
-"messages, whether an external application was using\n"
+"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> only. The transport selected for any message is\n"
+"independent of the upper-layer protocols and contents (router or client messages, whether an external application was using\n"
 "TCP or UDP to connect to I2P, whether the upper layer was using\n"
 "<a href=\"%(streaming)s\">the streaming library</a>\n"
 "streaming\n"
@@ -14249,15 +12275,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:118
 msgid ""
-"For each outgoing message, the transport system solicits \"bids\" from "
-"each transport.\n"
-"The transport bidding the lowest (best) value wins the bid and receives "
-"the message for delivery.\n"
+"For each outgoing message, the transport system solicits \"bids\" from each transport.\n"
+"The transport bidding the lowest (best) value wins the bid and receives the message for delivery.\n"
 "A transport may refuse to bid."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:124
-msgid "Whether a transport bids, and with what value, depend on numerous factors:"
+msgid ""
+"Whether a transport bids, and with what value, depend on numerous factors:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:128
@@ -14280,8 +12305,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:132
 msgid ""
-"The size of the message, as different transports have different size "
-"limits"
+"The size of the message, as different transports have different size limits"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:133
@@ -14291,7 +12315,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:134
-msgid "Whether the connection would be indirect (requiring introducers) or direct"
+msgid ""
+"Whether the connection would be indirect (requiring introducers) or direct"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:135
@@ -14300,8 +12325,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:138
 msgid ""
-"In general, the bid values are selected so that two routers are only "
-"connected by a single transport\n"
+"In general, the bid values are selected so that two routers are only connected by a single transport\n"
 "at any one time. However, this is not a requirement."
 msgstr ""
 
@@ -14319,8 +12343,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:153
 msgid ""
-"An \"indirect\" transport for routers that are not reachable by all other"
-" routers (one form of \"restricted routes\")"
+"An \"indirect\" transport for routers that are not reachable by all other "
+"routers (one form of \"restricted routes\")"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:154
@@ -14329,31 +12353,24 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:157
 msgid ""
-"Work continues on adjusting default connection limits for each transport."
-"\n"
-"I2P is designed as a \"mesh network\", where it is assumed that any "
-"router can connect to any other router.\n"
-"This assumption may be broken by routers that have exceeded their "
-"connection limits, and by\n"
+"Work continues on adjusting default connection limits for each transport.\n"
+"I2P is designed as a \"mesh network\", where it is assumed that any router can connect to any other router.\n"
+"This assumption may be broken by routers that have exceeded their connection limits, and by\n"
 "routers that are behind restrictive state firewalls (restricted routes)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:164
 msgid ""
-"The current connection limits are higher for SSU than for NTCP, based on "
-"the assumption that\n"
-"the memory requirements for an NTCP connection are higher than that for "
-"SSU.\n"
-"However, as NTCP buffers are partially in the kernel and SSU buffers are "
-"on the Java heap,\n"
+"The current connection limits are higher for SSU than for NTCP, based on the assumption that\n"
+"the memory requirements for an NTCP connection are higher than that for SSU.\n"
+"However, as NTCP buffers are partially in the kernel and SSU buffers are on the Java heap,\n"
 "that assumption is difficult to verify."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:171
 #, python-format
 msgid ""
-"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol "
-"Obfuscation</a>\n"
+"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol Obfuscation</a>\n"
 "and see how transport-layer padding may improve things."
 msgstr ""
 
@@ -14364,11 +12381,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:6
 #, python-format
 msgid ""
-"The others are <a href=\"%(ssu)s\">SSU</a> and <a "
-"href=\"%(ntcp2)s\">NTCP2</a>.\n"
+"The others are <a href=\"%(ssu)s\">SSU</a> and <a href=\"%(ntcp2)s\">NTCP2</a>.\n"
 "NTCP is a Java NIO-based transport introduced in I2P release 0.6.1.22.\n"
-"Java NIO (new I/O) does not suffer from the 1 thread per connection "
-"issues of the old TCP transport.\n"
+"Java NIO (new I/O) does not suffer from the 1 thread per connection issues of the old TCP transport.\n"
 "NTCP-over-IPv6 is supported as of version 0.9.8."
 msgstr ""
 
@@ -14383,8 +12398,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:21
 msgid ""
-"The NTCP code within I2P is relatively lightweight (1/4 the size of the "
-"SSU code)\n"
+"The NTCP code within I2P is relatively lightweight (1/4 the size of the SSU code)\n"
 "because it uses the underlying Java TCP transport for reliable delivery."
 msgstr ""
 
@@ -14409,21 +12423,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:47
 msgid ""
 "After establishment,\n"
-"the NTCP transport sends individual I2NP messages, with a simple "
-"checksum.\n"
+"the NTCP transport sends individual I2NP messages, with a simple checksum.\n"
 "The unencrypted message is encoded as follows:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:65
 msgid ""
-"The data is then AES/256/CBC encrypted. The session key for the "
-"encryption\n"
+"The data is then AES/256/CBC encrypted. The session key for the encryption\n"
 "is negotiated during establishment (using Diffie-Hellman 2048 bit).\n"
-"The establishment between two routers is implemented in the "
-"EstablishState class\n"
+"The establishment between two routers is implemented in the EstablishState class\n"
 "and detailed below.\n"
-"The IV for AES/256/CBC encryption is the last 16 bytes of the previous "
-"encrypted message."
+"The IV for AES/256/CBC encryption is the last 16 bytes of the previous encrypted message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:73
@@ -14447,8 +12457,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:93
 msgid ""
-"Total length: 16 bytes. The time sync message is sent at approximately 15"
-" minute intervals.\n"
+"Total length: 16 bytes. The time sync message is sent at approximately 15 minute intervals.\n"
 "The message is encrypted just as standard messages are."
 msgstr ""
 
@@ -14471,14 +12480,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:107
 #: i2p2www/pages/site/docs/transport/ssu.html:188
 msgid ""
-"Idle timeout and connection close is at the discretion of each endpoint "
-"and may vary.\n"
-"The current implementation lowers the timeout as the number of "
-"connections approaches the\n"
-"configured maximum, and raises the timeout when the connection count is "
-"low.\n"
-"The recommended minimum timeout is two minutes or more, and the "
-"recommended\n"
+"Idle timeout and connection close is at the discretion of each endpoint and may vary.\n"
+"The current implementation lowers the timeout as the number of connections approaches the\n"
+"configured maximum, and raises the timeout when the connection count is low.\n"
+"The recommended minimum timeout is two minutes or more, and the recommended\n"
 "maximum timeout is ten minutes or more."
 msgstr ""
 
@@ -14489,12 +12494,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:117
 msgid ""
 "After establishment, and every 30-60 minutes thereafter,\n"
-"the two routers should generally exchange RouterInfos using a "
-"DatabaseStoreMessage.\n"
-"However, Alice should check if the first queued message is a "
-"DatabaseStoreMessage\n"
-"so as not to send a duplicate message; this is often the case when "
-"connecting to a floodfill router."
+"the two routers should generally exchange RouterInfos using a DatabaseStoreMessage.\n"
+"However, Alice should check if the first queued message is a DatabaseStoreMessage\n"
+"so as not to send a duplicate message; this is often the case when connecting to a floodfill router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:125
@@ -14503,11 +12505,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:126
 msgid ""
-"In the establish state, there is a 4-phase message sequence to exchange "
-"DH keys and signatures.\n"
+"In the establish state, there is a 4-phase message sequence to exchange DH keys and signatures.\n"
 "In the first two messages there is a 2048-bit Diffie Hellman exchange.\n"
-"Then, signatures of the critical data are exchanged to confirm the "
-"connection."
+"Then, signatures of the critical data are exchanged to confirm the connection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:142
@@ -14545,15 +12545,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:159
 msgid ""
 "The DH key exchange consists of a number of steps, displayed below.\n"
-"The mapping between these steps and the messages sent between I2P "
-"routers,\n"
+"The mapping between these steps and the messages sent between I2P routers,\n"
 "is marked in bold."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:165
 msgid ""
-"Alice generates a secret integer x. She then calculates <code>X = g^x mod"
-" p</code>."
+"Alice generates a secret integer x. She then calculates <code>X = g^x mod "
+"p</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:166
@@ -14587,8 +12586,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:173
 #, python-format
 msgid ""
-"The sessionKey is then used to exchange identities in <b>Message 3</b> "
-"and <b>Message 4</b>.\n"
+"The sessionKey is then used to exchange identities in <b>Message 3</b> and <b>Message 4</b>.\n"
 "The exponent (x and y) length for the DH exchange is documented on the\n"
 "<a href=\"%(crypto)s#exponent\">cryptography page</a>."
 msgstr ""
@@ -14601,8 +12599,7 @@ msgstr ""
 #, python-format
 msgid ""
 "This is the DH request. Alice already has Bob's\n"
-"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router "
-"Identity</a>,\n"
+"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router Identity</a>,\n"
 "IP address, and port, as contained in his\n"
 "<a href=\"%(commonstructures)s#struct_RouterInfo\">Router Info</a>,\n"
 "which was published to the\n"
@@ -14682,8 +12679,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:312
 #, python-format
 msgid ""
-"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH "
-"session key and\n"
+"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
 "                  the last 16 bytes of Y as the IV"
 msgstr ""
 
@@ -14699,8 +12695,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:326
 msgid ""
-"This contains Alice's router identity, and a signature of the critical "
-"data. Alice sends Bob:"
+"This contains Alice's router identity, and a signature of the critical data."
+" Alice sends Bob:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:360
@@ -14720,17 +12716,14 @@ msgstr ""
 msgid ""
 "the `Signature` of the following concatenated data:\n"
 "             X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-"             Alice signs it with the `SigningPrivateKey` associated with "
-"the `SigningPublicKey` in her `RouterIdentity`"
+"             Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:389
 #, python-format
 msgid ""
-"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH"
-" session key and\n"
-"                  the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
-"of message #1) as the IV"
+"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
+"                  the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:400
@@ -14745,8 +12738,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:406
 msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this "
-"message as the IV for the next message."
+"Alice will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:430
@@ -14761,19 +12754,15 @@ msgstr ""
 msgid ""
 "the `Signature` of the following concatenated data:\n"
 "             X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-"             Bob signs it with the `SigningPrivateKey` associated with "
-"the `SigningPublicKey` in his `RouterIdentity`"
+"             Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:479
 #, python-format
 msgid ""
-"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH "
-"session key and\n"
-"                  the last 16 bytes of the encrypted contents of message "
-"#2 as the IV\n"
-"                  48 bytes for a DSA signature, may vary for other "
-"signature types"
+"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
+"                  the last 16 bytes of the encrypted contents of message #2 as the IV\n"
+"                  48 bytes for a DSA signature, may vary for other signature types"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:488
@@ -14782,8 +12771,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:491
 msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
+"Bob will use the last 16 bytes of the encrypted contents of this message as "
+"the IV for the next message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:506
@@ -14792,14 +12781,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:507
 msgid ""
-"The connection is established, and standard or time sync messages may be "
-"exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session"
-" key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 "
-"as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
-" the next IV."
+"The connection is established, and standard or time sync messages may be exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:516
@@ -14826,8 +12811,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:528
 msgid ""
-"that many bytes making up the local router's IP address (as reached by "
-"the remote side)"
+"that many bytes making up the local router's IP address (as reached by the "
+"remote side)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:529
@@ -14846,8 +12831,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:532
 msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 "
-"through bytes 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 through "
+"bytes 223"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:535
@@ -14870,11 +12855,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:550
 msgid ""
 "A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to"
-" \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
 "end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next "
-"16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
 "to create a limited number of message sizes."
 msgstr ""
 
@@ -14897,28 +12880,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:7
 #, python-format
 msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user "
-"interfaces)\n"
-"is one of three <a href=\"%(transports)s\">transports</a> currently "
-"implemented in I2P.\n"
-"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a "
-"href=\"%(ntcp2)s\">NTCP2</a>."
+"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
+"is one of three <a href=\"%(transports)s\">transports</a> currently implemented in I2P.\n"
+"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a href=\"%(ntcp2)s\">NTCP2</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:13
 msgid ""
 "SSU was introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for "
-"outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
 "SSU-over-IPv6 is supported as of version 0.9.8."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:19
 msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit "
-"unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is "
-"dropped."
+"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is dropped."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:24
@@ -14927,10 +12904,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:26
 msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
-"oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, "
-"including:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:32
@@ -14947,8 +12922,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:34
 msgid ""
-"Communication of firewall status and local IP, and changes to either to "
-"NTCP"
+"Communication of firewall status and local IP, and changes to either to NTCP"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:46
@@ -14983,26 +12957,20 @@ msgid ""
 "Packets are scheduled according to the router's policy, taking care\n"
 "not to exceed the router's outbound capacity or to exceed the measured \n"
 "capacity of the remote peer.  The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive "
-"increases\n"
-"to the sending capacity and multiplicative decreases in face of "
-"congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive increases\n"
+"to the sending capacity and multiplicative decreases in face of congestion.\n"
 "Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit"
-" \n"
+"a given period or number of retransmissions while continuing to transmit \n"
 "other messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:106
 msgid ""
 "The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message"
-"\n"
-"has a limited size - at most, 32KB.  To efficiently transmit this "
-"feedback\n"
+"message has its own unique and nonsequential identifier, and each message\n"
+"has a limited size - at most, 32KB.  To efficiently transmit this feedback\n"
 "to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received"
-"\n"
+"message identifiers and may also include bitfields for partially received\n"
 "messages, where each bit represents the reception of a fragment.  If \n"
 "duplicate fragments arrive, the message should be ACKed again, or if the\n"
 "message has still not been fully received, the bitfield should be \n"
@@ -15012,8 +12980,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:118
 msgid ""
 "The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment "
-"into\n"
+"any particular size, but instead just places a single message fragment into\n"
 "a packet and sends it off (careful not to exceed the MTU)."
 msgstr ""
 
@@ -15021,8 +12988,7 @@ msgstr ""
 msgid ""
 "As of router version 0.8.12,\n"
 "two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are "
-"retransmitted."
+"The MTU value is adjusted based on the percentage of packets that are retransmitted."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:131
@@ -15041,10 +13007,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:143
 msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP "
-"messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
-"to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
 "into a live network MTU anyway)."
 msgstr ""
 
@@ -15064,8 +13028,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:161
 msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than "
-"1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
 "it will publish that in the network database, and other routers should\n"
 "honor that when a connection is established."
 msgstr ""
@@ -15085,13 +13048,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:175
 msgid ""
 "While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or "
-"128.\n"
-"The current implementation, however, limits each message to a maximum of "
-"64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
+"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
 "which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical "
-"limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
 "at the application level is about 6KB lower, or about 26KB.\n"
 "Further work is necessary to raise the UDP transport limit above 32KB.\n"
 "For connections using the larger MTU, larger messages are possible."
@@ -15105,8 +13065,7 @@ msgstr ""
 msgid ""
 "All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
 "When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and "
-"are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
 "for the HMAC and encryption, respectively.  During the DH exchange, \n"
 "Bob's publicly knowable introKey is used for the MAC and encryption."
 msgstr ""
@@ -15123,8 +13082,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:216
 msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and"
-" port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
 "with all established sessions - if there are matches,\n"
 "that session's MAC keys are tested in the HMAC.  If none\n"
 "of those verify or if there are no matching IP addresses, the \n"
@@ -15214,8 +13172,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:296
 msgid ""
-"Direct session establishment is used when no third party is required for "
-"NAT traversal.\n"
+"Direct session establishment is used when no third party is required for NAT traversal.\n"
 "The message sequence is as follows:"
 msgstr ""
 
@@ -15235,10 +13192,8 @@ msgid ""
 "After the SessionConfirmed message is received, Bob sends a small\n"
 "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">DeliveryStatus message</a>\n"
 "as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the"
-"\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
-"\n"
+"In this message, the 4-byte message ID is set to a random number, and the\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
 "(i.e. 0x0000000000000002)."
 msgstr ""
 
@@ -15254,8 +13209,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:335
 msgid ""
-"It does not appear that the type of the status message or its contents "
-"matters.\n"
+"It does not appear that the type of the status message or its contents matters.\n"
 "It was originally added becasue the DatabaseStore message was delayed\n"
 "several seconds; since the store is now sent immediately, perhaps\n"
 "the status message can be eliminated."
@@ -15265,8 +13219,7 @@ msgstr ""
 msgid ""
 "Introduction keys are delivered through an external channel \n"
 "(the network database),\n"
-"where they have traditionally been identical to the router Hash through "
-"release 0.9.47,\n"
+"where they have traditionally been identical to the router Hash through release 0.9.47,\n"
 "but may be random as of release 0.9.48.\n"
 "They must be used when establishing a session key.  For the indirect\n"
 "address, the peer must first contact the relayhost and ask them for\n"
@@ -15285,24 +13238,16 @@ msgid ""
 "is necessary for efficient NAT traversal.  Charlie, a router behind a\n"
 "NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
 "first contacts a few peers, choosing some to serve as introducers.  Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
-"introduction\n"
-"tag - a 4 byte random number - which he then makes available to the "
-"public\n"
-"as methods of contacting him.  Alice, a router who has Charlie's "
-"published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the"
-" \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
+"tag - a 4 byte random number - which he then makes available to the public\n"
+"as methods of contacting him.  Alice, a router who has Charlie's published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the \n"
 "introducers, asking each to introduce her to Charlie (offering the \n"
 "introduction tag to identify Charlie).  Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends"
-"\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port"
-"\n"
-"number.  When Charlie receives the RelayIntro packet, he sends off a "
-"small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
-"\n"
+"packet to Charlie including Alice's public IP and port number, then sends\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
+"number.  When Charlie receives the RelayIntro packet, he sends off a small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
 "and when Alice receives Bob's RelayResponse packet, she begins a new \n"
 "full direction session establishment with the specified IP and port."
 msgstr ""
@@ -15312,20 +13257,21 @@ msgid "Connection establishment (indirect using an introducer)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:389
-msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
+msgid ""
+"Alice first connects to introducer Bob, who relays the request to Charlie."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:407
 msgid ""
-"After the hole punch, the session is established between Alice and "
-"Charlie as in a direct establishment."
+"After the hole punch, the session is established between Alice and Charlie "
+"as in a direct establishment."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:422
+#: i2p2www/pages/site/docs/transport/ssu.html:427
 msgid "Peer testing"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:424
+#: i2p2www/pages/site/docs/transport/ssu.html:429
 msgid ""
 "The automation of collaborative reachability testing for peers is\n"
 "enabled by a sequence of PeerTest messages.  With its proper \n"
@@ -15334,7 +13280,7 @@ msgid ""
 "quite simple:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:443
+#: i2p2www/pages/site/docs/transport/ssu.html:448
 msgid ""
 "Each of the PeerTest messages carry a nonce identifying the\n"
 "test series itself, as initialized by Alice.  If Alice doesn't \n"
@@ -15344,7 +13290,7 @@ msgid ""
 "that may be reached are as follows:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:453
+#: i2p2www/pages/site/docs/transport/ssu.html:458
 msgid ""
 "If she doesn't receive a response from Bob, she will retransmit\n"
 "up to a certain number of times, but if no response ever arrives,\n"
@@ -15354,7 +13300,7 @@ msgid ""
 "Charlie to reply."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:462
+#: i2p2www/pages/site/docs/transport/ssu.html:467
 msgid ""
 "If Alice doesn't receive a PeerTest message with the \n"
 "expected nonce from a third party (Charlie), she will retransmit\n"
@@ -15366,7 +13312,7 @@ msgid ""
 "IP and port that Bob offered up should be forwarded)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:473
+#: i2p2www/pages/site/docs/transport/ssu.html:478
 msgid ""
 "If Alice receives Bob's PeerTest message and both of Charlie's\n"
 "PeerTest messages but the enclosed IP and port numbers in Bob's \n"
@@ -15377,7 +13323,7 @@ msgid ""
 "remote connectivity, ignoring further port discovery."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:483
+#: i2p2www/pages/site/docs/transport/ssu.html:488
 msgid ""
 "If Alice receives Charlie's first message but not his second,\n"
 "she will retransmit her PeerTest message to Charlie up to a \n"
@@ -15385,7 +13331,7 @@ msgid ""
 "that Charlie is either confused or no longer online."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:491
+#: i2p2www/pages/site/docs/transport/ssu.html:496
 msgid ""
 "Alice should choose Bob arbitrarily from known peers who seem\n"
 "to be capable of participating in peer tests.  Bob in turn should\n"
@@ -15396,7 +13342,7 @@ msgid ""
 "to designate a new peer as Bob and try again with a different nonce."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:501
+#: i2p2www/pages/site/docs/transport/ssu.html:506
 msgid ""
 "Alice's introduction key is included in all of the PeerTest \n"
 "messages so that she doesn't need to already have an established\n"
@@ -15405,11 +13351,11 @@ msgid ""
 "with either Bob or Charlie, but it is not required."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:529
+#: i2p2www/pages/site/docs/transport/ssu.html:534
 msgid "Transmission window, ACKs and Retransmissions"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:530
+#: i2p2www/pages/site/docs/transport/ssu.html:535
 #, python-format
 msgid ""
 "The DATA message may contain ACKs of full messages and\n"
@@ -15419,26 +13365,24 @@ msgid ""
 "for details."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:538
+#: i2p2www/pages/site/docs/transport/ssu.html:543
 #, python-format
 msgid ""
-"The details of windowing, ACK, and retransmission strategies are not "
-"specified\n"
+"The details of windowing, ACK, and retransmission strategies are not specified\n"
 "here. See the Java code for the current implementation.\n"
 "During the establishment phase, and for peer testing, routers\n"
 "should implement exponential backoff for retransmission.\n"
 "For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to "
-"TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
 "or <a href=\"%(streaming)s\">streaming</a>.\n"
 "See the code for initial, min and max parameters."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:550
+#: i2p2www/pages/site/docs/transport/ssu.html:555
 msgid "Security"
 msgstr "Təhlükəsizlik"
 
-#: i2p2www/pages/site/docs/transport/ssu.html:551
+#: i2p2www/pages/site/docs/transport/ssu.html:556
 msgid ""
 "UDP source addresses may, of course, be spoofed.\n"
 "Additionally, the IPs and ports contained inside specific\n"
@@ -15447,108 +13391,98 @@ msgid ""
 "Also, certain actions and responses may need to be rate-limited."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:559
+#: i2p2www/pages/site/docs/transport/ssu.html:564
 msgid ""
 "The details of validation are not specified\n"
 "here. Implementers should add defenses where appropriate."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:565
+#: i2p2www/pages/site/docs/transport/ssu.html:570
 msgid "Peer capabilities"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:575
+#: i2p2www/pages/site/docs/transport/ssu.html:580
 msgid ""
 "If the peer address contains the 'B' capability, that means \n"
 "they are willing and able to participate in peer tests as\n"
 "a 'Bob' or 'Charlie'."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:612
+#: i2p2www/pages/site/docs/transport/ssu.html:617
 msgid ""
-"Analysis of current SSU performance, including assessment of window size "
-"adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to "
-"improve\n"
+"Analysis of current SSU performance, including assessment of window size adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to improve\n"
 "performance, is a topic for future work."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:618
+#: i2p2www/pages/site/docs/transport/ssu.html:623
 msgid ""
-"The current implementation repeatedly sends acknowledgments for the same "
-"packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same packets,\n"
 "which unnecessarily increases overhead."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:623
+#: i2p2www/pages/site/docs/transport/ssu.html:628
 msgid ""
-"The default small MTU value of 620 should be analyzed and possibly "
-"increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly increased.\n"
 "The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
-"Probably not."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:629
+#: i2p2www/pages/site/docs/transport/ssu.html:634
 msgid "The protocol should be extended to exchange MTUs during the setup."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:633
+#: i2p2www/pages/site/docs/transport/ssu.html:638
 msgid "Rekeying is currently unimplemented and may never be."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:637
+#: i2p2www/pages/site/docs/transport/ssu.html:642
 msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and "
-"RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is "
-"undocumented."
+"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:642
+#: i2p2www/pages/site/docs/transport/ssu.html:647
 msgid ""
 "Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same "
-"packet,\n"
+"strategy may be to bundle multiple message fragments into the same packet,\n"
 "so long as it doesn't exceed the MTU."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:648
+#: i2p2www/pages/site/docs/transport/ssu.html:653
 msgid ""
 "A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to"
-" \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
 "end padding should be sufficient for most needs until then."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:654
+#: i2p2www/pages/site/docs/transport/ssu.html:659
 msgid ""
-"Why are introduction keys the same as the router hash, should it be "
-"changed, would there be any benefit?"
+"Why are introduction keys the same as the router hash, should it be changed,"
+" would there be any benefit?"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:658
+#: i2p2www/pages/site/docs/transport/ssu.html:663
 msgid "Capacities appear to be unused."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:662
+#: i2p2www/pages/site/docs/transport/ssu.html:667
 msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be "
-"unused or unverified."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
+"or unverified."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:667
+#: i2p2www/pages/site/docs/transport/ssu.html:672
 msgid "Implementation Diagram"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:668
+#: i2p2www/pages/site/docs/transport/ssu.html:673
 msgid ""
 "This diagram\n"
-"should accurately reflect the current implementation, however there may "
-"be small differences."
+"should accurately reflect the current implementation, however there may be small differences."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:676
+#: i2p2www/pages/site/docs/transport/ssu.html:681
 msgid "Now on the SSU specification page"
 msgstr ""
 
@@ -15569,12 +13503,9 @@ msgid ""
 "Within I2P, messages are passed in one direction through a virtual\n"
 "tunnel of peers, using whatever means are available to pass the \n"
 "message on to the next hop.  Messages arrive at the tunnel's \n"
-"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel "
-"messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and "
-"verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, "
-"until\n"
+"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, until\n"
 "it reaches the tunnel endpoint.  That <i>endpoint</i> takes the messages\n"
 "bundled up by the gateway and forwards them as instructed - either\n"
 "to another router, to another tunnel on another router, or locally."
@@ -15596,12 +13527,9 @@ msgid ""
 "in the tunnel, and provides each with the necessary configuration\n"
 "data.  They may have any number of hops.\n"
 "It is the intent to make\n"
-"it hard for either participants or third parties to determine the length "
-"of \n"
-"a tunnel, or even for colluding participants to determine whether they "
-"are a\n"
-"part of the same tunnel at all (barring the situation where colluding "
-"peers are\n"
+"it hard for either participants or third parties to determine the length of \n"
+"a tunnel, or even for colluding participants to determine whether they are a\n"
+"part of the same tunnel at all (barring the situation where colluding peers are\n"
 "next to each other in the tunnel)."
 msgstr ""
 
@@ -15639,8 +13567,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:69
 #, python-format
 msgid ""
-"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are "
-"processed and passed through it.\n"
+"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are processed and passed through it.\n"
 "Tunnel operation has four distinct processes, taken on by various \n"
 "peers in the tunnel."
 msgstr ""
@@ -15667,8 +13594,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:89
 msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
-"messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
 "originally bundled by the gateway are reassembled and forwarded on as \n"
 "requested."
 msgstr ""
@@ -15728,11 +13654,13 @@ msgid "Decrypt (using an encryption operation)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgid ""
+"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgid ""
+"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:142
@@ -15793,10 +13721,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:181
 msgid ""
 "Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be "
-"forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they "
-"receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
 "on.  Tunnels themselves are short-lived (10 minutes).\n"
 "Even if subsequent tunnels are built using the same sequence of \n"
 "peers, each hop's tunnel ID will change."
@@ -15804,16 +13730,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:190
 msgid ""
-"To prevent adversaries from tagging the messages along the path by "
-"adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size.  To"
-" accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently,"
-" the\n"
-"gateway splits up the larger I2NP messages into fragments contained "
-"within each\n"
-"tunnel message.  The endpoint will attempt to rebuild the I2NP message "
-"from the\n"
+"To prevent adversaries from tagging the messages along the path by adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size.  To accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
+"gateway splits up the larger I2NP messages into fragments contained within each\n"
+"tunnel message.  The endpoint will attempt to rebuild the I2NP message from the\n"
 "fragments for a short period of time, but will discard them as necessary."
 msgstr ""
 
@@ -15830,30 +13751,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:207
 msgid ""
-"After the preprocessing of messages into a padded payload, the gateway "
-"builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel "
-"message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
-"message} to the next hop."
+"After the preprocessing of messages into a padded payload, the gateway builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:213
 msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an"
-"\n"
-"inbound or an outbound tunnel.  For inbound tunnels, they simply select a"
-" random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and"
-" using \n"
-"that IV along side their own layer key to encrypt the preprocessed data."
-"  For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and "
-"preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel.  The result "
-"of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will "
-"recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an\n"
+"inbound or an outbound tunnel.  For inbound tunnels, they simply select a random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
+"that IV along side their own layer key to encrypt the preprocessed data.  For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel.  The result of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
 "the initial preprocessed data."
 msgstr ""
 
@@ -15863,46 +13774,29 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:227
 msgid ""
-"When a peer receives a tunnel message, it checks that the message came "
-"from\n"
-"the same previous hop as before (initialized when the first message comes"
-" through\n"
-"the tunnel).  If the previous peer is a different router, or if the "
-"message has\n"
-"already been seen, the message is dropped.  The participant then encrypts"
-" the \n"
-"received IV with AES256/ECB using their IV key to determine the current "
-"IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts "
-"the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the "
-"tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop.  This double "
-"encryption\n"
+"When a peer receives a tunnel message, it checks that the message came from\n"
+"the same previous hop as before (initialized when the first message comes through\n"
+"the tunnel).  If the previous peer is a different router, or if the message has\n"
+"already been seen, the message is dropped.  The participant then encrypts the \n"
+"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop.  This double encryption\n"
 "of the IV (both before and after use) help address a certain class of\n"
 "confirmation attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:243
 msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on "
-"message\n"
-"IVs.  Each router maintains a single Bloom filter to contain the XOR of "
-"the IV and\n"
-"the first block of the message received for all of the tunnels it is "
-"participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
-"will have\n"
-"expired).  The size of the bloom filter and the parameters used are "
-"sufficient to\n"
-"more than saturate the router's network connection with a negligible "
-"chance of \n"
-"false positive.  The unique value fed into the Bloom filter is the XOR of"
-" the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the"
-" tunnel \n"
-"from tagging a message by resending it with the IV and first block "
-"switched."
+"Duplicate message detection is handled by a decaying Bloom filter on message\n"
+"IVs.  Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
+"the first block of the message received for all of the tunnels it is participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
+"expired).  The size of the bloom filter and the parameters used are sufficient to\n"
+"more than saturate the router's network connection with a negligible chance of \n"
+"false positive.  The unique value fed into the Bloom filter is the XOR of the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
+"from tagging a message by resending it with the IV and first block switched."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:256
@@ -15911,27 +13805,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:258
 msgid ""
-"After receiving and validating a tunnel message at the last hop in the "
-"tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon "
-"whether \n"
-"the tunnel is an inbound or an outbound tunnel.  For outbound tunnels, "
-"the \n"
-"endpoint encrypts the message with its layer key just like any other "
-"participant, \n"
-"exposing the preprocessed data.  For inbound tunnels, the endpoint is "
-"also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message,"
-" using the \n"
+"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
+"the tunnel is an inbound or an outbound tunnel.  For outbound tunnels, the \n"
+"endpoint encrypts the message with its layer key just like any other participant, \n"
+"exposing the preprocessed data.  For inbound tunnels, the endpoint is also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
 "layer and IV keys of each step in reverse order."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:268
 msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the "
-"gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards "
-"them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards them as\n"
 "requested in their delivery instructions."
 msgstr ""
 
@@ -15941,30 +13827,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:277
 msgid ""
-"When building a tunnel, the creator must send a request with the "
-"necessary\n"
-"configuration data to each of the hops and wait for all of them to agree "
-"before\n"
-"enabling the tunnel.  The requests are encrypted so that only the peers "
-"who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has "
-"that\n"
-"data.  In addition, only the tunnel creator will have access to the "
-"peer's\n"
-"reply.  There are three important dimensions to keep in mind when "
-"producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent "
-"(and \n"
+"When building a tunnel, the creator must send a request with the necessary\n"
+"configuration data to each of the hops and wait for all of them to agree before\n"
+"enabling the tunnel.  The requests are encrypted so that only the peers who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has that\n"
+"data.  In addition, only the tunnel creator will have access to the peer's\n"
+"reply.  There are three important dimensions to keep in mind when producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent (and \n"
 "replies received), and how they are maintained."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:291
 msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two "
-"styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
 "of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and "
-"tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and tunnel\n"
 "maintenance, while client tunnels are used for end to end client messages."
 msgstr ""
 
@@ -15974,18 +13851,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:301
 msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a "
-"subset\n"
-"of the network.  The particular subset varies on the local router and on "
-"what their\n"
-"tunnel routing needs are.  In general, the exploratory tunnels are built "
-"out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" "
-"profile\n"
-"category.  The secondary purpose of the tunnels, beyond merely tunnel "
-"routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted"
-" for\n"
+"Exploratory tunnels are built out of a random selection of peers from a subset\n"
+"of the network.  The particular subset varies on the local router and on what their\n"
+"tunnel routing needs are.  In general, the exploratory tunnels are built out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
+"category.  The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted for\n"
 "use in client tunnels."
 msgstr ""
 
@@ -16002,14 +13873,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:319
 msgid ""
-"Client tunnels are built with a more stringent set of requirements - the "
-"local\n"
-"router will select peers out of its \"fast and high capacity\" profile "
-"category so\n"
-"that performance and reliability will meet the needs of the client "
-"application.\n"
-"However, there are several important details beyond that basic selection "
-"that \n"
+"Client tunnels are built with a more stringent set of requirements - the local\n"
+"router will select peers out of its \"fast and high capacity\" profile category so\n"
+"that performance and reliability will meet the needs of the client application.\n"
+"However, there are several important details beyond that basic selection that \n"
 "should be adhered to, depending upon the client's anonymity needs."
 msgstr ""
 
@@ -16035,10 +13902,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:341
 msgid ""
 "To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -"
-"\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
-"after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
 "B is always C."
 msgstr ""
 
@@ -16047,18 +13912,15 @@ msgid ""
 "Ordering is implemented by generating a random 32-byte key for each\n"
 "tunnel pool at startup.\n"
 "Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both"
-"\n"
+"craft two router hashes far apart to maximize the chance of being at both\n"
 "ends of a tunnel.\n"
 "Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from "
-"the random key"
+"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:363
 msgid ""
-"Because each tunnel pool uses a different random key, ordering is "
-"consistent\n"
+"Because each tunnel pool uses a different random key, ordering is consistent\n"
 "within a single pool but not between different pools.\n"
 "New keys are generated at each router restart."
 msgstr ""
@@ -16070,8 +13932,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:372
 #, python-format
 msgid ""
-"A multi-hop tunnel is built using a single build message which is "
-"repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is repeatedly\n"
 "decrypted and forwarded. In the terminology of\n"
 "<a href=\"%(pdf)s\">Hashing it out in Public</a>,\n"
 "this is \"non-interactive\" telescopic tunnel building."
@@ -16082,38 +13943,28 @@ msgstr ""
 msgid ""
 "This tunnel request preparation, delivery, and response method is\n"
 "<a href=\"%(tunnelcreation)s\">designed</a> to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies "
-"proper\n"
-"connectivity, and avoids the message counting attack of traditional "
-"telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
+"connectivity, and avoids the message counting attack of traditional telescopic\n"
 "tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the "
-"already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
-"in\n"
+"(This method, which sends messages to extend a tunnel through the already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
 "the \"Hashing it out\" paper.)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:390
 #, python-format
 msgid ""
-"The details of tunnel request and response messages, and their "
-"encryption,\n"
+"The details of tunnel request and response messages, and their encryption,\n"
 "<a href=\"%(tunnelcreation)s\">are specified here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:395
 msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, "
-"though\n"
-"a series of four increasingly severe rejections are known: probabilistic "
-"rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of "
-"requests), \n"
-"transient overload, bandwidth overload, and critical failure.  When "
-"received, \n"
-"those four are interpreted by the tunnel creator to help adjust their "
-"profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, though\n"
+"a series of four increasingly severe rejections are known: probabilistic rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of requests), \n"
+"transient overload, bandwidth overload, and critical failure.  When received, \n"
+"those four are interpreted by the tunnel creator to help adjust their profile of\n"
 "the router in question."
 msgstr ""
 
@@ -16131,37 +13982,26 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:412
 #, python-format
 msgid ""
-"To allow efficient operation, the router maintains a series of tunnel "
-"pools,\n"
-"each managing a group of tunnels used for a specific purpose with their "
-"own\n"
-"configuration.  When a tunnel is needed for that purpose, the router "
-"selects one\n"
-"out of the appropriate pool at random.  Overall, there are two "
-"exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default "
-"configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel pools,\n"
+"each managing a group of tunnels used for a specific purpose with their own\n"
+"configuration.  When a tunnel is needed for that purpose, the router selects one\n"
+"out of the appropriate pool at random.  Overall, there are two exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default configuration.\n"
 "In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool.  Those pools use the "
-"configuration specified\n"
-"when the local destination connects to the router via <a "
-"href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool.  Those pools use the configuration specified\n"
+"when the local destination connects to the router via <a href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n"
 "not specified."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:424
 #, python-format
 msgid ""
-"Each pool has within its configuration a few key settings, defining how "
-"many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of "
-"failure,\n"
+"Each pool has within its configuration a few key settings, defining how many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
 "how long the tunnels should be, whether those\n"
 "lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual "
-"tunnels.\n"
-"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP "
-"page</a>."
+"well as any of the other settings allowed when configuring individual tunnels.\n"
+"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:434
@@ -16178,20 +14018,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:440
 msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they "
-"are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is "
-"essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local "
-"and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local and global\n"
 "network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build "
-"strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,"
-"\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,\n"
 "without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted"
-" build messages."
+"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:451
@@ -16199,8 +14033,7 @@ msgid ""
 "For each tuple {exploratory/client, in/out, length, length variance}\n"
 "the router maintains statistics on the time required for a successful\n"
 "tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's "
-"expiration\n"
+"Using these statistics, it calculates how long before a tunnel's expiration\n"
 "it should start attempting to build a replacement.\n"
 "As the expiration time approaches without a successful replacement,\n"
 "it starts multiple build attempts in parallel, and then\n"
@@ -16222,30 +14055,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:473
 msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit "
-"switched\n"
-"network, everything within I2P is strictly message based - tunnels are "
-"merely\n"
-"accounting tricks to help organize the delivery of messages.  No "
-"assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions "
-"are left\n"
-"to higher levels (e.g. I2P's client layer streaming library).  This "
-"allows I2P\n"
-"to take advantage of throttling techniques available to both packet "
-"switched and\n"
-"circuit switched networks.  For instance, each router may keep track of "
-"the \n"
-"moving average of how much data each tunnel is using, combine that with "
-"all of \n"
-"the averages used by other tunnels the router is participating in, and be"
-" able\n"
-"to accept or reject additional tunnel participation requests based on its"
-" \n"
-"capacity and utilization.  On the other hand, each router can simply drop"
-" \n"
-"messages that are beyond its capacity, exploiting the research used on "
-"the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
+"network, everything within I2P is strictly message based - tunnels are merely\n"
+"accounting tricks to help organize the delivery of messages.  No assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions are left\n"
+"to higher levels (e.g. I2P's client layer streaming library).  This allows I2P\n"
+"to take advantage of throttling techniques available to both packet switched and\n"
+"circuit switched networks.  For instance, each router may keep track of the \n"
+"moving average of how much data each tunnel is using, combine that with all of \n"
+"the averages used by other tunnels the router is participating in, and be able\n"
+"to accept or reject additional tunnel participation requests based on its \n"
+"capacity and utilization.  On the other hand, each router can simply drop \n"
+"messages that are beyond its capacity, exploiting the research used on the \n"
 "normal Internet."
 msgstr ""
 
@@ -16253,23 +14074,16 @@ msgstr ""
 msgid ""
 "In the current implementation, routers implement a\n"
 "weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and"
-" outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
 "the router will start randomly dropping a portion of messages as the\n"
 "bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are "
-"dropped.\n"
-"For an internal participant, all messages are fragmented and padded and "
-"therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping "
-"decision is made\n"
-"on the full (coalesced) message, and the message size is taken into "
-"account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
+"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
+"on the full (coalesced) message, and the message size is taken into account.\n"
 "Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint "
-"than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the "
-"network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
 "dropping those messages is lower."
 msgstr ""
 
@@ -16279,16 +14093,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:509
 msgid ""
-"What strategies could be used at the gateway and at each hop for "
-"delaying,\n"
-"reordering, rerouting, or padding messages?  To what extent should this "
-"be done\n"
-"automatically, how much should be configured as a per tunnel or per hop "
-"setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this "
-"operation?\n"
-"All of this is left as unknown, to be worked out for a distant future "
-"release."
+"What strategies could be used at the gateway and at each hop for delaying,\n"
+"reordering, rerouting, or padding messages?  To what extent should this be done\n"
+"automatically, how much should be configured as a per tunnel or per hop setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this operation?\n"
+"All of this is left as unknown, to be worked out for a distant future release."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:518
@@ -16297,13 +14106,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:519
 msgid ""
-"The padding strategies can be used on a variety of levels, addressing the"
-"\n"
+"The padding strategies can be used on a variety of levels, addressing the\n"
 "exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes.  Within this "
-"however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end "
-"to end \n"
+"The current fixed tunnel message size is 1024 bytes.  Within this however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end to end \n"
 "messages, they may be padded as part of the garlic wrapping."
 msgstr ""
 
@@ -16331,8 +14137,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
 msgid ""
-"This page describes the origins and design of I2P's unidirectional "
-"tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional tunnels.\n"
 "For further information see:"
 msgstr ""
 
@@ -16366,8 +14171,7 @@ msgid ""
 "Several apps and protocols, notably HTTP,\n"
 "do transfer data in such manner. Having the traffic follow the same \n"
 "route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a"
-" \n"
+"attacker who has only timing and traffic volume data to infer the path a \n"
 "tunnel is taking.\n"
 "Having the response come back along a different path arguably \n"
 "makes it harder."
@@ -16376,42 +14180,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
 msgid ""
 "When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional "
-"tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional"
-" circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response "
-"would \n"
-"follow the same path in Tor, while in I2P the packets making up the "
-"request \n"
-"would go out through one or more outbound tunnels and the packets making "
-"up \n"
-"the response would come back through one or more different inbound "
-"tunnels."
+"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response would \n"
+"follow the same path in Tor, while in I2P the packets making up the request \n"
+"would go out through one or more outbound tunnels and the packets making up \n"
+"the response would come back through one or more different inbound tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
 msgid ""
 "The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have "
-"anonymity\n"
-"implications.  On the positive side, by using separate tunnels it lessens"
-" the\n"
-"traffic data exposed for analysis to participants in a tunnel - for "
-"instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic"
-" of\n"
+"communication is not the only technique available, and it does have anonymity\n"
+"implications.  On the positive side, by using separate tunnels it lessens the\n"
+"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic of\n"
 "an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel.  With bidirectional tunnels, all participants"
-" would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then "
-"100KB\n"
-"in the other.  On the negative side, using unidirectional tunnels means "
-"that\n"
-"there are two sets of peers which need to be profiled and accounted for, "
-"and\n"
-"additional care must be taken to address the increased speed of "
-"predecessor\n"
+"delivered along the tunnel.  With bidirectional tunnels, all participants would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
+"in the other.  On the negative side, using unidirectional tunnels means that\n"
+"there are two sets of peers which need to be profiled and accounted for, and\n"
+"additional care must be taken to address the increased speed of predecessor\n"
 "attacks.  The tunnel pooling and building process\n"
 "(peer selection and ordering strategies)\n"
 "should minimize the worries of the predecessor attack."
@@ -16425,28 +14214,22 @@ msgstr ""
 #, python-format
 msgid ""
 "A recent <a href=\"%(pdf)s\">paper by Hermann and Grothoff</a>\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design "
-"decision\"."
+"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
 msgid ""
 "The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is "
-"an \n"
-"advantage, but that an attacker can be more certain in the unidirectional"
-" case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a "
-"disadvantage, at least\n"
+"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
+"advantage, but that an attacker can be more certain in the unidirectional case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
 "with long-living I2P Sites."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
 msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional "
-"tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of "
-"the \n"
+"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of the \n"
 "attack in the paper\n"
 "with attacks on a bidirectional tunnel architecture."
 msgstr ""
@@ -16455,63 +14238,45 @@ msgstr ""
 msgid ""
 "This conclusion is based on an arbitrary certainty vs. time weighting \n"
 "(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas "
-"to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas to \n"
 "each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the I2P Site goes down or is slowed down. So "
-"close \n"
+"intersection attack see if the I2P Site goes down or is slowed down. So close \n"
 "may be good enough, or time may be more important."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
 msgid ""
-"The conclusion is based on a specific weighting of the importance of "
-"certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable,"
-" \n"
-"especially in a real world with subpoenas, search warrants, and other "
-"methods \n"
+"The conclusion is based on a specific weighting of the importance of certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
+"especially in a real world with subpoenas, search warrants, and other methods \n"
 "available for final confirmation."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
 msgid ""
 "A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done"
-" \n"
-"elsewhere. For example, how does this attack compare to the numerous "
-"possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors"
-" have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done \n"
+"elsewhere. For example, how does this attack compare to the numerous possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors have not\n"
 "done that analysis, if it's even possible to do it\n"
 "effectively."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
 msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
-" \n"
-"uses unidirectional tunnels and has had very little review. Does the lack"
-" of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor "
-"design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
+"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor design \n"
 "choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. "
-"The \n"
-"design intent (see references above) was that unidirectional tunnels are "
-"more \n"
-"resistant to timing attacks. However, the paper presents a somewhat "
-"different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
+"design intent (see references above) was that unidirectional tunnels are more \n"
+"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
 "attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
 "tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative "
-"that \n"
-"clearly needs further investigation and analysis? There are several other"
-" reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small "
-"network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels "
-"really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative that \n"
+"clearly needs further investigation and analysis? There are several other reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
 "reason?"
 msgstr ""
 
@@ -16522,4 +14287,3 @@ msgid ""
 "tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
 "conclusion is not supported by the paper."
 msgstr ""
-
diff --git a/i2p2www/translations/de/LC_MESSAGES/about.po b/i2p2www/translations/de/LC_MESSAGES/about.po
index 624aa08ee16755a8107e5c5c6e28cf829b4373d0..0ac16011877931d342fada099544a89a0df1fb8e 100644
--- a/i2p2www/translations/de/LC_MESSAGES/about.po
+++ b/i2p2www/translations/de/LC_MESSAGES/about.po
@@ -1,7 +1,7 @@
-# German translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # a b <ahx7@posteo.net>, 2015,2017,2019
 # amiga4000 <amiga4000@mail.i2p>, 2008
@@ -17,17 +17,18 @@
 # zeroflag <zeroflag@i2pmail.org>, 2013
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-06-15 20:37+0000\n"
-"Last-Translator: Niemand Jedermann\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Niemand Jedermann, 2021\n"
 "Language-Team: German (http://www.transifex.com/otf/I2P/language/de/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: de\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -37,14 +38,9 @@ msgstr "Alternative I2P-Clients"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
-msgstr ""
-"Die Haupt-I2P Implementierung verwendet Java. Falls Sie, aus welchen "
-"Gründen auch immer, Java nicht auf Ihrem Gerät betreiben können, dann "
-"können Sie auf alternative Implementierungen der Entwicklergemeinde "
-"zurückgreifen.    "
+msgstr "Die Haupt-I2P Implementierung verwendet Java. Falls Sie, aus welchen Gründen auch immer, Java nicht auf Ihrem Gerät betreiben können, dann können Sie auf alternative Implementierungen der Entwicklergemeinde zurückgreifen.    "
 
 #: i2p2www/pages/site/about/alternative-clients.html:12
 #, python-format
@@ -52,32 +48,21 @@ msgid ""
 "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n"
 "As of early 2016, i2pd is became stable enough to be used in \n"
 "production, and since summer 2016 it fully implements all I2P APIs."
-msgstr ""
-"<a href=\"%(i2pd)s\">i2pd</a> ist eine I2P Client-Implementierung in C++."
-"\n"
-"Seit Anfang 2016, wurde i2pd stabil genug für den Produktiveinsatz \n"
-"und seit Sommer 2016 sind alle I2P APIs integriert."
+msgstr "<a href=\"%(i2pd)s\">i2pd</a> ist eine I2P Client-Implementierung in C++.\nSeit Anfang 2016, wurde i2pd stabil genug für den Produktiveinsatz \nund seit Sommer 2016 sind alle I2P APIs integriert."
 
 #: i2p2www/pages/site/about/alternative-clients.html:19
 #, python-format
 msgid ""
 "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero "
 "cryptocurrency."
-msgstr ""
-"<a href=\"%(kovri)s\">Kovri</a> ist ein aktiv entwickelter Fork von i2pd "
-"für die Kryptowährung Monero."
+msgstr "<a href=\"%(kovri)s\">Kovri</a> ist ein aktiv entwickelter Fork von i2pd für die Kryptowährung Monero."
 
 #: i2p2www/pages/site/about/alternative-clients.html:24
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
-msgstr ""
-"<a href=\"%(go_i2p)s\">Go-I2P</a> ist ein I2P-Client in der "
-"Programmiersprache\n"
-"<a href=\"%(golang)s\">Go</a>, der sich in einem frühen "
-"Entwicklungsstadium befindet."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
+msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> ist ein I2P-Client in der Programmiersprache\n<a href=\"%(golang)s\">Go</a>, der sich in einem frühen Entwicklungsstadium befindet."
 
 #: i2p2www/pages/site/about/browser-config.html:2
 msgid "Web Browser Configuration"
@@ -89,11 +74,147 @@ msgstr "Glossar"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
+msgstr "Diese Tabelle listet häufig verwendete Begriffe im Zusammenhang mit I2P und Kryptografie auf."
+
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr "I2P: Invisible Internet Project: Ein Projekt um\n        eine Anonymitätsschicht bereitzustellen, damit Nutzer unter Verwendung verschiedener Anwendungen\n        anonym kommunizieren können."
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
 msgstr ""
-"Diese Seite listet häufig verwendete Terminologie beim diskutieren von "
-"I2P und Kryptographie auf."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
@@ -101,24 +222,11 @@ msgstr "Ruhmeshalle"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
-msgstr ""
-"Das I2P-Projekt wird vollständig von Freiwilligen getragen. Aber ein "
-"großes Projekt wie\n"
-"dieses besteht nicht nur aus der Software, sondern auch aus mehreren "
-"Servern, Domain-Registrierungen und der nötigen Dosis Kaffee,\n"
-"die alle finanziert sein wollen, um etwas auf die Beine zu stellen. "
-"Menschen aus der ganzen Welt haben für I2P gespendet, damit es zu dem "
-"werden konnte was es\n"
-"heute ist. Hier haben wir diejenigen Namen zu stehen, deren Spender in "
-"der I2P-Ruhmeshalle veröffentlicht werden wollten."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
+msgstr "Das I2P-Projekt wird vollständig von Freiwilligen getragen. Aber ein großes Projekt wie\ndieses besteht nicht nur aus der Software, sondern auch aus mehreren Servern, Domain-Registrierungen und der nötigen Dosis Kaffee,\ndie alle finanziert sein wollen, um etwas auf die Beine zu stellen. Menschen aus der ganzen Welt haben für I2P gespendet, damit es zu dem werden konnte was es\nheute ist. Hier haben wir diejenigen Namen zu stehen, deren Spender in der I2P-Ruhmeshalle veröffentlicht werden wollten."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
 msgid "Big thanks go to the following people who have donated to I2P!"
@@ -127,22 +235,15 @@ msgstr "Ein großes Dankeschön an die folgenden Leute, die für I2P gespendet h
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
-msgstr ""
-"Wenn Sie etwas gespendet haben, senden Sie bitte ein E-Mail an <a "
-"href=\"mailto:%(echelon)s\">echelon</a> mit Ihrem Namen oder "
-"Benutzernamen (und optional Homepage), damit wir Sie hier auflisten "
-"können."
+msgstr "Wenn Sie etwas gespendet haben, senden Sie bitte ein E-Mail an <a href=\"mailto:%(echelon)s\">echelon</a> mit Ihrem Namen oder Benutzernamen (und optional Homepage), damit wir Sie hier auflisten können."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
-msgstr ""
-"Eine unsortierte Liste von Spendern für I2P in 15 Jahren der I2P "
-"Historie, beginnend im März 2004 bis März 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
+msgstr "Eine unsortierte Liste von Spendern für I2P in 15 Jahren der I2P Historie, beginnend im März 2004 bis März 2019."
 
 #: i2p2www/pages/site/about/intro.html:2
 #: i2p2www/pages/site/about/software.html:2
@@ -155,19 +256,9 @@ msgstr "Das Invisible Internet Projekt"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
-msgstr ""
-"Das Invisible Internet Project (I2P) ist eine vollständig verschlüsselte,"
-" private Netzwerkschicht die mit den Schwerpunkten Datenschutz und "
-"Sicherheit entworfen wurde Ihre Identität, Aktivitäten und Ihren "
-"Aufenthaltsort zu schützen. Das Programm wird mit einem Router "
-"ausgeliefert, der Sie mit einem Netzwerk und Anwendungen zum Teilen, "
-"Kommunizieren und Erstellen verbindet."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
+msgstr "Das Invisible Internet Project (I2P) ist eine vollständig verschlüsselte, private Netzwerkschicht die mit den Schwerpunkten Datenschutz und Sicherheit entworfen wurde Ihre Identität, Aktivitäten und Ihren Aufenthaltsort zu schützen. Das Programm wird mit einem Router ausgeliefert, der Sie mit einem Netzwerk und Anwendungen zum Teilen, Kommunizieren und Erstellen verbindet."
 
 #: i2p2www/pages/site/about/intro.html:9
 msgid "I2P Cares About Privacy"
@@ -176,22 +267,14 @@ msgstr "I2P ist Ihre Privatsphäre wichtig"
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
-msgstr ""
-"I2P versteckt die Server vor den Nutzern und die Nutzer vor den Servern. "
-"Der gesamte I2P-Datenverkehr läuft innerhalb des I2P-Netzwerks. Er tritt "
-"nicht mit dem Internet direkt in Verbindung. Es ist eine Schicht die auf "
-"dem Internet liegt. Sie verwendet verschlüsselte einseitige Tunnel "
-"zwischen Ihnen und den anderen Knoten. Niemand kann sehen woher der "
-"Datenverkehr kommt und wohin er geht oder welche Inhalte sich darin "
-"befinden. Zusätzlich bietet I2P Abwehrfunktionen gegen Mustererkennung "
-"und die Blockierung durch Zensur."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
+msgstr "I2P versteckt die Server vor den Nutzern und die Nutzer vor den Servern. Der gesamte I2P-Datenverkehr läuft innerhalb des I2P-Netzwerks. Er tritt nicht mit dem Internet direkt in Verbindung. Es ist eine Schicht die auf dem Internet liegt. Sie verwendet verschlüsselte einseitige Tunnel zwischen Ihnen und den anderen Knoten. Niemand kann sehen woher der Datenverkehr kommt und wohin er geht oder welche Inhalte sich darin befinden. Zusätzlich bietet I2P Abwehrfunktionen gegen Mustererkennung und die Blockierung durch Zensur."
 
 #: i2p2www/pages/site/about/intro.html:14
 msgid "How to Connect to the I2P Network"
@@ -199,27 +282,16 @@ msgstr "Verbindung mit dem I2P-Netzwerk"
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
-msgstr ""
-"Das Invisible Internet Project bietet Programme zum Herunterladen an, die"
-" Sie mit dem Netzwerk verbinden. Zusätzlich zu den Vorteilen des Netzwerk"
-" im Datenschutz bietet I2P eine Anwendungsschicht, die es Menschen "
-"ermöglicht ähnliche Anwendungen für den täglichen Gebrauch zu erstellen "
-"und zu nutzen. I2P stellt seinen eigenen DNS bereit, so dass Sie selbst "
-"Inhalte im Netzwerk spiegeln oder anbieten können. Sie können Ihre eigene"
-" Plattform erstellen und verwalten, die Sie zum I2P-Verzeichnis "
-"hinzufügen können oder zu der Sie nur Ihre Freunde einladen. Das I2P-"
-"Netzwerk arbeitet wie das Internet. Wenn Sie das I2P-Programm "
-"herunterladen ist darin alles enthalten was Sie zum privaten Verbinden, "
-"Teilen und Erstellen benötigen."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
+msgstr "Das Invisible Internet Project bietet Programme zum Herunterladen an, die Sie mit dem Netzwerk verbinden. Zusätzlich zu den Vorteilen des Netzwerk im Datenschutz bietet I2P eine Anwendungsschicht, die es Menschen ermöglicht ähnliche Anwendungen für den täglichen Gebrauch zu erstellen und zu nutzen. I2P stellt seinen eigenen DNS bereit, so dass Sie selbst Inhalte im Netzwerk spiegeln oder anbieten können. Sie können Ihre eigene Plattform erstellen und verwalten, die Sie zum I2P-Verzeichnis hinzufügen können oder zu der Sie nur Ihre Freunde einladen. Das I2P-Netzwerk arbeitet wie das Internet. Wenn Sie das I2P-Programm herunterladen ist darin alles enthalten was Sie zum privaten Verbinden, Teilen und Erstellen benötigen."
 
 #: i2p2www/pages/site/about/intro.html:18
 msgid "An Overview of the Network"
@@ -227,51 +299,28 @@ msgstr "Ein Überblick über das Netzwerk"
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
-msgstr ""
-"I2P verwendet Kryptografie um eine Vielzahl an Eigenschaften für die vom "
-"ihm aufgebauten Tunnel und die darüber laufende Kommunikation zu "
-"erreichen. I2P-Tunnel verwenden Transporte, NTCP2 und SSU, um die Art des"
-" darüber transportierten Datenverkehrs zu verbergen. Verbindungen sind "
-"von Router-zu-Router und von Client-zu-Client (Ende-zu-Ende) "
-"verschlüsselt. Vorwärts gerichtete Sicherheit wird für alle Verbindungen "
-"sichergestellt. Da I2P kryptografisch adressiert ist, sind I2P-Adressen "
-"selbst-authentifizierend und gehören nur dem Benutzer der sie erzeugt "
-"hat."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
+msgstr "I2P verwendet Kryptografie um eine Vielzahl an Eigenschaften für die vom ihm aufgebauten Tunnel und die darüber laufende Kommunikation zu erreichen. I2P-Tunnel verwenden Transporte, NTCP2 und SSU, um die Art des darüber transportierten Datenverkehrs zu verbergen. Verbindungen sind von Router-zu-Router und von Client-zu-Client (Ende-zu-Ende) verschlüsselt. Vorwärts gerichtete Sicherheit wird für alle Verbindungen sichergestellt. Da I2P kryptografisch adressiert ist, sind I2P-Adressen selbst-authentifizierend und gehören nur dem Benutzer der sie erzeugt hat."
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
-msgstr ""
-"I2P ist eine sichere und den Datenverkehr schützende Internet-artige "
-"Schicht. Das Netzwerk besteht aus gleichrangigen Knoten (\"Routern\") und"
-" einseitig gerichteten ein- und ausgehenden virtuellen Tunneln. Router "
-"kommunizieren untereinander mit Protokollen, die auf bestehenden "
-"Transportmechanismen aufsetzen (TCP, UDP, usw) und leiten Nachrichten "
-"weiter. Client-Anwendungen haben ihre eigenen kryptografischen Kennungen "
-"(\"Destinationen\"), die es ihnen ermöglichen Nachrichten zu senden und "
-"zu empfangen. Diese Clients können sich mit jedem Router verbinden und "
-"die temporäre Zuweisung (\"Lease\") einiger Tunnel autorisieren, die für "
-"das Senden und Empfangen von Nachrichten durch das Netzwerk verwendet "
-"werden. I2P hat seine eigene interne Netzwerkdatenbank (eine Abwandlung "
-"der Kademlia DHT) für das sichere Verteilen von Vermittlungs- und "
-"Kontaktinformationen."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
+msgstr "I2P ist eine sichere und den Datenverkehr schützende Internet-artige Schicht. Das Netzwerk besteht aus gleichrangigen Knoten (\"Routern\") und einseitig gerichteten ein- und ausgehenden virtuellen Tunneln. Router kommunizieren untereinander mit Protokollen, die auf bestehenden Transportmechanismen aufsetzen (TCP, UDP, usw) und leiten Nachrichten weiter. Client-Anwendungen haben ihre eigenen kryptografischen Kennungen (\"Destinationen\"), die es ihnen ermöglichen Nachrichten zu senden und zu empfangen. Diese Clients können sich mit jedem Router verbinden und die temporäre Zuweisung (\"Lease\") einiger Tunnel autorisieren, die für das Senden und Empfangen von Nachrichten durch das Netzwerk verwendet werden. I2P hat seine eigene interne Netzwerkdatenbank (eine Abwandlung der Kademlia DHT) für das sichere Verteilen von Vermittlungs- und Kontaktinformationen."
 
 #: i2p2www/pages/site/about/intro.html:26
 msgid "About Decentralization and I2P"
@@ -279,65 +328,36 @@ msgstr "Ãœber Dezentralisierung und I2P"
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
-msgstr ""
-"Das I2P-Netzwerk ist fast vollständig dezentralisiert. Mit der Ausnahme "
-"von sogenannten \"Reseed Servern\" über die man erstmalig dem Netzwerk "
-"beitritt. Dies dient dazu das DHT-Initialisierungsproblem zu umgehen "
-"(Distributed Hash Table). Im Grunde gibt es keine gute und zuverlässige "
-"Möglichkeit es zu vermeiden mindestens einen permanenten "
-"Initialisierungsknoten zu betreiben den Nicht-Netzwerknutzer finden "
-"können um loszulegen. Sobald die einmal mit dem Netzwerk verbunden sind, "
-"entdecken Sie andere Knoten nur noch duch das Aufbauen von "
-"\"Erkundungstunneln\", aber um Ihre initiale Verbindung herstellen zu "
-"können benötigen sie einen Knoten-Anfangssatz von irgendwoher. Die "
-"Reseed-Server, die Sie unter http://127.0.0.1:7657/configreseed im Java-"
-"I2P-Router aufgelistet sehen, versorgen Sie mit dieser Liste. Sie können "
-"dann bei diesen mittels I2P-Router Verbindungen anfragen, bis sie einen "
-"finden, den Sie erreichen und über den Sie Erkundungstunnel aufbauen "
-"können. Reseed-Server wissen zwar, dass Sie sie anfänglich für das "
-"Starten verwendet haben, aber sonst nichts über Ihren Datenverkehr im "
-"I2P-Netzwerk."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
+msgstr "Das I2P-Netzwerk ist fast vollständig dezentralisiert. Mit der Ausnahme von sogenannten \"Reseed Servern\" über die man erstmalig dem Netzwerk beitritt. Dies dient dazu das DHT-Initialisierungsproblem zu umgehen (Distributed Hash Table). Im Grunde gibt es keine gute und zuverlässige Möglichkeit es zu vermeiden mindestens einen permanenten Initialisierungsknoten zu betreiben den Nicht-Netzwerknutzer finden können um loszulegen. Sobald die einmal mit dem Netzwerk verbunden sind, entdecken Sie andere Knoten nur noch duch das Aufbauen von \"Erkundungstunneln\", aber um Ihre initiale Verbindung herstellen zu können benötigen sie einen Knoten-Anfangssatz von irgendwoher. Die Reseed-Server, die Sie unter http://127.0.0.1:7657/configreseed im Java-I2P-Router aufgelistet sehen, versorgen Sie mit dieser Liste. Sie können dann bei diesen mittels I2P-Router Verbindungen anfragen, bis sie einen finden, den Sie erreichen und über den Sie Erkundungstunnel aufbauen können. Reseed-Server wissen zwar, dass Sie sie anfänglich für das Starten verwendet haben, aber sonst nichts über Ihren Datenverkehr im I2P-Netzwerk."
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
-msgstr ""
-"Ich sehe die I2P Adressen aller anderen I2P Knoten in der Router Konsole."
-" Bedeuted dieses, dass meine IP von anderen gesehen werden kann?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
+msgstr "Ich sehe die I2P Adressen aller anderen I2P Knoten in der Router Konsole. Bedeuted dieses, dass meine IP von anderen gesehen werden kann?"
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
-msgstr ""
-"Ja, auf diese Art funktioniert ein vollständig verteiltes Netzwerk "
-"zwische gleichrangigen Knoten. Jeder Knoten beteiligt sich an der "
-"Weiterleitung von Paketen anderer. Ihre IP-Adresse muss bekannt sein um "
-"Verbindungen herstellen zu können. Während die Tatsache, dass auf Ihrem "
-"Rechner I2P läuft, bekannt ist, kann hingegen niemand die darüber "
-"laufenden Aktivitäten einsehen. Man kann nicht ermitteln, ob der Nutzer "
-"hinter einer IP-Adresse Dateien teilt, ein Web-Portal bereitstellt, "
-"Forschung betreibt oder einfach nur einen Knoten laufen lässt, um das "
-"Projekt mit Bandbreite zu versorgen."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
+msgstr "Ja, auf diese Art funktioniert ein vollständig verteiltes Netzwerk zwische gleichrangigen Knoten. Jeder Knoten beteiligt sich an der Weiterleitung von Paketen anderer. Ihre IP-Adresse muss bekannt sein um Verbindungen herstellen zu können. Während die Tatsache, dass auf Ihrem Rechner I2P läuft, bekannt ist, kann hingegen niemand die darüber laufenden Aktivitäten einsehen. Man kann nicht ermitteln, ob der Nutzer hinter einer IP-Adresse Dateien teilt, ein Web-Portal bereitstellt, Forschung betreibt oder einfach nur einen Knoten laufen lässt, um das Projekt mit Bandbreite zu versorgen."
 
 #: i2p2www/pages/site/about/intro.html:34
 msgid "What I2P Does Not Do"
@@ -345,23 +365,14 @@ msgstr "Was I2P nicht macht"
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
-msgstr ""
-"Das I2P Netzwerk selbst leitet offiziell keinen Datenverkehr aus. Es "
-"verfügt über ausleitende Proxies ins Internet die von Freiwilligen als "
-"zentralisierte Dienste betrieben werden. I2P ist primär ein Netzwerk "
-"versteckter Dienste und ausleitende Proxies sind keine offizielle "
-"Funktion, noch wird dazu geraten. Die Datenschutzvorteile die Sie von der"
-" Teilnahme am I2P-Netzwerk haben, begründen sich durch das Verbleiben "
-"innerhalb des Netzwerks und den Nichtzugriff auf das Internet. I2O "
-"empfiehlt die Nutzung des Tor-Browsers oder einen vertrauenswürdigen VPN-"
-"Anbieter wenn Sie das Internet ohne Nachverfolgung nutzen möchten."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
+msgstr "Das I2P Netzwerk selbst leitet offiziell keinen Datenverkehr aus. Es verfügt über ausleitende Proxies ins Internet die von Freiwilligen als zentralisierte Dienste betrieben werden. I2P ist primär ein Netzwerk versteckter Dienste und ausleitende Proxies sind keine offizielle Funktion, noch wird dazu geraten. Die Datenschutzvorteile die Sie von der Teilnahme am I2P-Netzwerk haben, begründen sich durch das Verbleiben innerhalb des Netzwerks und den Nichtzugriff auf das Internet. I2O empfiehlt die Nutzung des Tor-Browsers oder einen vertrauenswürdigen VPN-Anbieter wenn Sie das Internet ohne Nachverfolgung nutzen möchten."
 
 #: i2p2www/pages/site/about/intro.html:38
 msgid "Comparisons"
@@ -369,38 +380,21 @@ msgstr "Vergleiche"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Es gibt sehr viele andere Anwendungen und Projekte die an anonymer "
-"Kommunikation arbeiten und I2P wurde von vielen dieser Anstrengungen "
-"inspiriert. Dies ist keine umfassende Liste anonymer Ressourcen. Sowohl "
-"freehavens\n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"als auch auf GNUnet <a href=\"https://www.gnunet.org/links/\">bezogene "
-"Projekte</a>\n"
-"sind hierfür sehr gut geeignet. Einige wenige Systeme eigenen sich für\n"
-"einen weitergehenden Vergleich. Für folgende Projekte gibt eigene "
-"Vergleichsseiten:"
+msgstr "Es gibt sehr viele andere Anwendungen und Projekte die an anonymer Kommunikation arbeiten und I2P wurde von vielen dieser Anstrengungen inspiriert. Dies ist keine umfassende Liste anonymer Ressourcen. Sowohl freehavens\n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\nals auch auf GNUnet <a href=\"https://www.gnunet.org/links/\">bezogene Projekte</a>\nsind hierfür sehr gut geeignet. Einige wenige Systeme eigenen sich für\neinen weitergehenden Vergleich. Für folgende Projekte gibt eigene Vergleichsseiten:"
 
 #: i2p2www/pages/site/about/intro.html:56
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere "
-"Netzwerke</a> erörtert:"
+msgstr "Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere Netzwerke</a> erörtert:"
 
 #: i2p2www/pages/site/about/media.html:2
 msgid "Presentations on I2P"
@@ -409,28 +403,20 @@ msgstr "Präsentationen über I2P"
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
-msgstr ""
-"Im Folgenden stehen Links zu Präsentationen, Videos, und Tutorials über "
-"I2P. Links zu wissenschaftlichen Arbeiten über I2P sind <a "
-"href=\"%(papers)s\">hier</a> verfügbar."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
+msgstr "Im Folgenden stehen Links zu Präsentationen, Videos, und Tutorials über I2P. Links zu wissenschaftlichen Arbeiten über I2P sind <a href=\"%(papers)s\">hier</a> verfügbar."
 
 #: i2p2www/pages/site/about/media.html:8
 #, python-format
 msgid "To request an addition to this page, please send to %(email)s."
-msgstr ""
-"Um eine Ergänzung zu dieser Seite zu beantragen, senden Sie uns bitte "
-"eine Email an %(email)s."
+msgstr "Um eine Ergänzung zu dieser Seite zu beantragen, senden Sie uns bitte eine Email an %(email)s."
 
 #: i2p2www/pages/site/about/media.html:11
 msgid ""
 "\n"
 "Newest links are at the bottom of each section."
-msgstr ""
-"\n"
-"Neueste Links befinden am Ende von jedem Abschnitt"
+msgstr "\nNeueste Links befinden am Ende von jedem Abschnitt"
 
 #: i2p2www/pages/site/about/media.html:16
 msgid "Presentations"
@@ -443,11 +429,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(transcript)s\">transcript</a>\n"
 "Lance James (0x90), February 2002."
-msgstr ""
-"IIP-Presentation auf der CodeCon\n"
-"<a href=\"%(mp3)s\">MP3</a>\n"
-"<a href=\"%(transcript)s\">Transkription</a>\n"
-"Lance James (0x90), Februar 2002."
+msgstr "IIP-Presentation auf der CodeCon\n<a href=\"%(mp3)s\">MP3</a>\n<a href=\"%(transcript)s\">Transkription</a>\nLance James (0x90), Februar 2002."
 
 #: i2p2www/pages/site/about/media.html:27
 #, python-format
@@ -456,11 +438,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(slides)s\">slides</a>\n"
 "Lance James (0x90), September 2002."
-msgstr ""
-"I2P-Präsentation bei der ToorCon\n"
-"<a href=\"%(mp3)s\">MP3-Audio</a>\n"
-"<a href=\"%(slides)s\">Folien</a>\n"
-"Lance James (0x90), September 2002."
+msgstr "I2P-Präsentation bei der ToorCon\n<a href=\"%(mp3)s\">MP3-Audio</a>\n<a href=\"%(slides)s\">Folien</a>\nLance James (0x90), September 2002."
 
 #: i2p2www/pages/site/about/media.html:35
 #, python-format
@@ -470,12 +448,7 @@ msgid ""
 "An introduction into anonymous communication with I2P.\n"
 "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n"
 "Jens Kubieziel, 24C3 Berlin, December 28, 2007."
-msgstr ""
-"<a href=\"%(video)s\">To Be or I2P</a>\n"
-"(Youtube-Video)\n"
-"Eine Einführung in anonyme Kommunikation mit I2P.\n"
-"<a href=\"%(pdf)s\">To Be or I2P (PDF-Präsentation)</a>,\n"
-"Jens Kubieziel, 24C3 Berlin, 28. Dezember 2007."
+msgstr "<a href=\"%(video)s\">To Be or I2P</a>\n(Youtube-Video)\nEine Einführung in anonyme Kommunikation mit I2P.\n<a href=\"%(pdf)s\">To Be or I2P (PDF-Präsentation)</a>,\nJens Kubieziel, 24C3 Berlin, 28. Dezember 2007."
 
 #: i2p2www/pages/site/about/media.html:44
 #, python-format
@@ -483,17 +456,12 @@ msgid ""
 "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n"
 "Lars Schimmer,\n"
 "March 14-15, 2009"
-msgstr ""
-"<a href=\"%(video)s\">Video vom I2P-Vortrag beim Chemnitzer Linux "
-"Tag</a>,\n"
-"Lars Schimmer,\n"
-"14.-15. Mai 2009"
+msgstr "<a href=\"%(video)s\">Video vom I2P-Vortrag beim Chemnitzer Linux Tag</a>,\nLars Schimmer,\n14.-15. Mai 2009"
 
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -504,9 +472,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n"
 "Adrian Crenshaw. Schmoocon Firetalk, January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Das I2P-Darknet: Wilkommen im Cipherspace</a>\n"
-"Adrian Crenshaw. Schmoocon Firetalk, Januar 2011"
+msgstr "<a href=\"%(link)s\">Das I2P-Darknet: Wilkommen im Cipherspace</a>\nAdrian Crenshaw. Schmoocon Firetalk, Januar 2011"
 
 #: i2p2www/pages/site/about/media.html:62
 #, python-format
@@ -514,115 +480,72 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
-msgstr ""
-"<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
-"(Youtube-Video)\n"
-"Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27. März"
-"  2011.\n"
-"I2P wird in diesem Video von etwa 10:00 bis 20:00 thematisiert."
+msgstr "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n(Youtube-Video)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27. März  2011.\nI2P wird in diesem Video von etwa 10:00 bis 20:00 thematisiert."
 
 #: i2p2www/pages/site/about/media.html:70
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
-"(Youtube-Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11.-15. "
-"Juli 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
+msgstr "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n(Youtube-Video)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11.-15. Juli 2011."
 
 #: i2p2www/pages/site/about/media.html:76
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011."
-msgstr ""
-"<a href=\"%(link)s\">I2P / Tor Workshop Notizen</a>\n"
-"Adrian Crenshaw. DEFCON 19, Las Vegas, 6. August 2011."
+msgstr "<a href=\"%(link)s\">I2P / Tor Workshop Notizen</a>\nAdrian Crenshaw. DEFCON 19, Las Vegas, 6. August 2011."
 
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011."
-msgstr ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
-"DEFCON Live-Version (Youtube-Video)</a>,\n"
-"<a href=\"%(studio)s\">\"Studio\"-Version (Youtube-Video)</a>,\n"
-"<a href=\"%(slides)s\">Folien (ppt)</a>\n"
-"Adrian Crenshaw. DEFCON 19, Las Vegas, 7. August 2011."
+msgstr "<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\nDEFCON Live-Version (Youtube-Video)</a>,\n<a href=\"%(studio)s\">\"Studio\"-Version (Youtube-Video)</a>,\n<a href=\"%(slides)s\">Folien (ppt)</a>\nAdrian Crenshaw. DEFCON 19, Las Vegas, 7. August 2011."
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
-msgstr ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), 4. November 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
+msgstr "<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4. November 2011."
 
 #: i2p2www/pages/site/about/media.html:95
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
-msgstr ""
-"<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
-"(Youtube-Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, 25. "
-"Januar 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
+msgstr "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n(Youtube-Video)\nBlair Dick, University of Abertay, Dundee Ethical Hacking Society, 25. Januar 2012."
 
 #: i2p2www/pages/site/about/media.html:101
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2PCon 2015</a>\n"
 "Toronto, August 15-16, 2015"
-msgstr ""
-"<a href=\"%(link)s\">I2PCon 2015</a>\n"
-"Toronto, 15.-16. August 2015"
+msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15.-16. August 2015"
 
 #: i2p2www/pages/site/about/media.html:106
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
-msgstr ""
-"<a href=\"%(link)s\">I2P - Lebt noch! (pdf)</a>\n"
-"<a href=\"%(link2)s\">(Video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28. Dezember "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
+msgstr "<a href=\"%(link)s\">I2P - Lebt noch! (pdf)</a>\n<a href=\"%(link2)s\">(Video)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28. Dezember 2015"
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
-msgstr ""
-"Ersetzung der nicht mehr zeitgemäßen Kryoto: Upgraden des I2P Netzwerkes "
-"auf solidere Grundlagen\n"
-"\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"\n"
-"str4d, Real World Crypto, Stanford, 8. Januar 2016"
+msgstr "Ersetzung der nicht mehr zeitgemäßen Kryoto: Upgraden des I2P Netzwerkes auf solidere Grundlagen\n\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\n\nstr4d, Real World Crypto, Stanford, 8. Januar 2016"
 
 #: i2p2www/pages/site/about/media.html:121
 #, python-format
@@ -630,14 +553,8 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
-msgstr ""
-"Zwiebel und Knoblauch: die Protokolle von I2P\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, 17. Februar 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
+msgstr "Zwiebel und Knoblauch: die Protokolle von I2P\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17. Februar 2016"
 
 #: i2p2www/pages/site/about/media.html:129
 #, python-format
@@ -646,21 +563,14 @@ msgid ""
 "<a href=\"%(link)s\">(mp4)</a>\n"
 "<a href=\"%(link2)s\">(webm)</a>\n"
 "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018"
-msgstr ""
-"The Invisible Internet Project - Eine Ãœbersicht und Ratgeber zur "
-"Technologie\n"
-"<a href=\"%(link)s\">(mp4)</a>\n"
-"<a href=\"%(link2)s\">(webm)</a>\n"
-"Andrew Savchenko (bircoph), FOSDEM, Brüssel, 4. February 2018"
+msgstr "The Invisible Internet Project - Eine Übersicht und Ratgeber zur Technologie\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Brüssel, 4. February 2018"
 
 #: i2p2www/pages/site/about/media.html:137
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">Intro to I2P for App Developers (mp4)</a>\n"
 "idk"
-msgstr ""
-"<a href=\"%(link)s\">Einleitung zu I2P für App-Entwickler (mp4)</a>\n"
-"idk"
+msgstr "<a href=\"%(link)s\">Einleitung zu I2P für App-Entwickler (mp4)</a>\nidk"
 
 #: i2p2www/pages/site/about/media.html:145
 msgid "Tutorials"
@@ -673,11 +583,7 @@ msgid ""
 "(Youtube Video)\n"
 "This guide will show you how to install I2P in Windows XP.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2P Windows-Tutorium</a>\n"
-"(Youtube-Video)\n"
-"Dieses Tutorium zeigt die Installation von I2P unter Windows XP.\n"
-"Von <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2P Windows-Tutorium</a>\n(Youtube-Video)\nDieses Tutorium zeigt die Installation von I2P unter Windows XP.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:155
 #, python-format
@@ -686,11 +592,7 @@ msgid ""
 "(Youtube Video)\n"
 "This will guide you through how to install I2P on a Debian Linux System.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2P Debian-Tutorium</a>\n"
-"(Youtube-Video)\n"
-"Dieses Tutorium zeigt die Installation von I2P unter Debian GNU/Linux.\n"
-"Von <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2P Debian-Tutorium</a>\n(Youtube-Video)\nDieses Tutorium zeigt die Installation von I2P unter Debian GNU/Linux.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:162
 #, python-format
@@ -699,56 +601,33 @@ msgid ""
 "(Youtube Video)\n"
 "How to set up an anonymous web site in I2P.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Wie man eine anonyme Webseite in I2P aufsetzt</a>\n"
-"(Youtube-Video)\n"
-"Wie man eine anonyme Webseite in I2P aufsetzt.\n"
-"Von <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Wie man eine anonyme Webseite in I2P aufsetzt</a>\n(Youtube-Video)\nWie man eine anonyme Webseite in I2P aufsetzt.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:169
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2P Tutorium für Mac OS X</a>\n"
-"(Youtube-Video)\n"
-"Ein Tutorium zum Betrieb von I2P unte Mac OS X und wie man sich mit "
-"irc.telecomix.i2p verbindet.\n"
-"Von <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2P Tutorium für Mac OS X</a>\n(Youtube-Video)\nEin Tutorium zum Betrieb von I2P unte Mac OS X und wie man sich mit irc.telecomix.i2p verbindet.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Felix Atari erklärt  die grundsätzlichen Prinzipien "
-"von I2P</a>\n"
-"(Youtube Video)\n"
-"Agent Felix Atari vom Telecomix Crypto Munitions Bureau.\n"
-"Von <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Felix Atari erklärt  die grundsätzlichen Prinzipien von I2P</a>\n(Youtube Video)\nAgent Felix Atari vom Telecomix Crypto Munitions Bureau.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
-"(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
-msgstr ""
-"<a href=\"%(link)s\">Wie man I2P, das anonymous P2P Darknet zum Laufen "
-"bringt (Windows Installation)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"Dieses Tutorial zeigt, wie man I2P, und Software für Zugriff darauf, "
-"installiert und konfiguriert."
+"This tutorial shows how to install and configure software needed to access I2P."
+msgstr "<a href=\"%(link)s\">Wie man I2P, das anonymous P2P Darknet zum Laufen bringt (Windows Installation)</a>\n(Youtube Video)\nDieses Tutorial zeigt, wie man I2P, und Software für Zugriff darauf, installiert und konfiguriert."
 
 #: i2p2www/pages/site/about/media.html:189
 #, python-format
@@ -756,10 +635,7 @@ msgid ""
 "<a href=\"%(link)s\">How to connect to I2P</a>\n"
 "(Youtube Video)\n"
 "How to install I2P on Ubuntu."
-msgstr ""
-"<a href=\"%(link)s\">How to connect to i2p</a>\n"
-"(Youtube-Video, englisch)\n"
-"Wie man I2P auf Ubuntu installiert."
+msgstr "<a href=\"%(link)s\">How to connect to i2p</a>\n(Youtube-Video, englisch)\nWie man I2P auf Ubuntu installiert."
 
 #: i2p2www/pages/site/about/media.html:195
 #, python-format
@@ -768,11 +644,7 @@ msgid ""
 "(Video)\n"
 "Adrian Crenshaw.\n"
 "January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Installation der I2P-Darknet-Software auf Linux</a>\n"
-"(Video)\n"
-"Adrian Crenshaw.\n"
-"Januar 2011"
+msgstr "<a href=\"%(link)s\">Installation der I2P-Darknet-Software auf Linux</a>\n(Video)\nAdrian Crenshaw.\nJanuar 2011"
 
 #: i2p2www/pages/site/about/media.html:202
 #, python-format
@@ -780,10 +652,7 @@ msgid ""
 "<a href=\"%(link)s\">Short garlic routing animation</a>\n"
 "(Youtube Video)\n"
 "Adrian Crenshaw.\n"
-msgstr ""
-"<a href=\"%(link)s\">Kurze Darstellung des 'Garlic Routing'</a>\n"
-"(Youtube Video)\n"
-"Adrian Crenshaw.\n"
+msgstr "<a href=\"%(link)s\">Kurze Darstellung des 'Garlic Routing'</a>\n(Youtube Video)\nAdrian Crenshaw.\n"
 
 #: i2p2www/pages/site/about/media.html:210
 msgid "Articles and Interviews"
@@ -796,11 +665,7 @@ msgid ""
 "<a href=\"%(link1)s\">Part 1</a>\n"
 "<a href=\"%(link2)s\">Part 2</a>\n"
 "July 26, 2002."
-msgstr ""
-"Lance James (0x90) im Interview mit DistributedCity\n"
-"<a href=\"%(link1)s\">Teil 1</a>\n"
-"<a href=\"%(link2)s\">Teil 2</a>\n"
-"26. Juli 2002."
+msgstr "Lance James (0x90) im Interview mit DistributedCity\n<a href=\"%(link1)s\">Teil 1</a>\n<a href=\"%(link2)s\">Teil 2</a>\n26. Juli 2002."
 
 #: i2p2www/pages/site/about/media.html:221
 #, python-format
@@ -809,35 +674,22 @@ msgid ""
 "(original in Spanish)\n"
 "<a href=\"%(link)s\">English translation</a>\n"
 "October 31, 2002."
-msgstr ""
-"Lance James (0x90) im Interview mit El País\n"
-"(Original in Spanisch)\n"
-"<a href=\"%(link)s\">Englische Ãœbersetzung</a>\n"
-"31. Oktober 2002."
+msgstr "Lance James (0x90) im Interview mit El País\n(Original in Spanisch)\n<a href=\"%(link)s\">Englische Übersetzung</a>\n31. Oktober 2002."
 
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
-msgstr ""
-"<a href=\"%(link)s\">2003 Business Week Artikel mit Bezug auf "
-"Invisiblenet</a>\n"
-"14. September 2003."
+msgstr "<a href=\"%(link)s\">2003 Business Week Artikel mit Bezug auf Invisiblenet</a>\n14. September 2003."
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
-msgstr ""
-"<a href=\"%(link)s\">Netzwelt.de-Artikel über anonym sein im Internet</a>"
-"\n"
-"(Deutsch)\n"
-"November 2007."
+msgstr "<a href=\"%(link)s\">Netzwelt.de-Artikel über anonym sein im Internet</a>\n(Deutsch)\nNovember 2007."
 
 #: i2p2www/pages/site/about/media.html:239
 #, python-format
@@ -845,27 +697,15 @@ msgid ""
 "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n"
 "March 2009\n"
 "<a href=\"%(german)s\">German translation</a>"
-msgstr ""
-"<a href=\"%(link)s\">zzz im Interview mit gulli.com</a>\n"
-"März 2009\n"
-"<a href=\"%(german)s\">Deutsche Ãœbersetzung</a>"
+msgstr "<a href=\"%(link)s\">zzz im Interview mit gulli.com</a>\nMärz 2009\n<a href=\"%(german)s\">Deutsche Übersetzung</a>"
 
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz interviewte auf InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
-"18. August 2011\n"
-"(toter Link, geseeded innerhalb I2P in <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">Postman's"
-" Tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz interviewte auf InfoSec Daily Podcast Ep. 454 (mp3)</a>\n18. August 2011\n(toter Link, geseeded innerhalb I2P in <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">Postman's Tracker</a>)"
 
 #: i2p2www/pages/site/about/media.html:252
 #, python-format
@@ -873,85 +713,52 @@ msgid ""
 "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n"
 "Jonathan Cox,\n"
 "November 11, 2011."
-msgstr ""
-"<a href=\"%(link)s\">I2P - Anonymität für die Massen</a>,\n"
-"Jonathan Cox,\n"
-"11. November 2011."
+msgstr "<a href=\"%(link)s\">I2P - Anonymität für die Massen</a>,\nJonathan Cox,\n11. November 2011."
 
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz und Lance James interviewd im InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>16. February 2012\n"
-"(toter Link, verteilt innerhalb I2P in <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">Postman's"
-" Tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz und Lance James interviewd im InfoSec Daily Podcast Ep. 596 (mp3)</a>16. February 2012\n(toter Link, verteilt innerhalb I2P in <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">Postman's Tracker</a>)"
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff und Str4d Inverview auf dem Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
-"Teil 1, 28. Februar 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff und Str4d Inverview auf dem Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\nTeil 1, 28. Februar 2015"
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff und Str4d interviewd im Brakeing Down Security "
-"Podcast Ep. 2015-011 (mp3)</a>\n"
-"Part 2, 6. März 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff und Str4d interviewd im Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\nPart 2, 6. März 2015"
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
-msgstr ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Erfolg,"
-" Fehler, Verzagen und Buddhismus.</a>\n"
-"<a href=\"%(archive)s\">(archive.org)</a>\n"
-"<a href=\"%(mp3)s\">(mp3)</a>\n"
-"Robert Lei, 31. Dezember 2018"
+msgstr "<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Erfolg, Fehler, Verzagen und Buddhismus.</a>\n<a href=\"%(archive)s\">(archive.org)</a>\n<a href=\"%(mp3)s\">(mp3)</a>\nRobert Lei, 31. Dezember 2018"
 
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
-"2019\n"
-msgstr ""
-"<a href=\"%(mhatta)s\">Artikel von I2P Unterstützer Masayuki Hatta auf "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
+msgstr "<a href=\"%(mhatta)s\">Artikel von I2P Unterstützer Masayuki Hatta auf Medium.com</a>\n2019\n"
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
-msgstr ""
-"<a href=\"%(ctrl)s\">Die Ermöglichung beides, .onion und .i2p Routing mit"
-" Proxy Auto-Konfiguration</a>\n"
-"Daniel Aleksandersen, 7. Februar 2019"
+msgstr "<a href=\"%(ctrl)s\">Die Ermöglichung beides, .onion und .i2p Routing mit Proxy Auto-Konfiguration</a>\nDaniel Aleksandersen, 7. Februar 2019"
 
 #: i2p2www/pages/site/about/media.html:295
 msgid "Other"
@@ -961,21 +768,61 @@ msgstr "Weitere"
 msgid ""
 "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n"
 "February 14, 2014"
-msgstr ""
-"I2P wird erwähnt in Netflix' \"House of Cards\" Staffel 2 Folge 2,\n"
-"14. Februar 2014"
+msgstr "I2P wird erwähnt in Netflix' \"House of Cards\" Staffel 2 Folge 2,\n14. Februar 2014"
 
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
+msgstr "<a href=\"%(meeh)s\">Eine überarbeitete Liste des I2P Unterstützers meeh von I2P Implementierungen, Bibliotheken, Resourcen, Projekten and glänzenden Sachen</a>\n2019"
+
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
 msgstr ""
-"<a href=\"%(meeh)s\">Eine überarbeitete Liste des I2P Unterstützers meeh "
-"von I2P Implementierungen, Bibliotheken, Resourcen, Projekten and "
-"glänzenden Sachen</a>\n"
-"2019"
 
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
@@ -985,18 +832,15 @@ msgstr "Die I2P-Software"
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -1007,84 +851,61 @@ msgstr "Was enthalten ist:"
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -1095,8 +916,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -1104,27 +924,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -1132,26 +948,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -1162,10 +969,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -1173,18 +978,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -1195,17 +997,11 @@ msgstr "I2P-Projektmitglieder"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
-msgstr ""
-"Wir sind eine kleine Gruppe von Leuten, verteilt über mehrere Kontinente,"
-" die daran arbeiten, verschiedene Aspekte des Projekts voranzubringen und"
-" das Design des Netzwerks zu diskutieren. <a href=\"%(volunteer)s\">Mach "
-"mit!</a>"
+msgstr "Wir sind eine kleine Gruppe von Leuten, verteilt über mehrere Kontinente, die daran arbeiten, verschiedene Aspekte des Projekts voranzubringen und das Design des Netzwerks zu diskutieren. <a href=\"%(volunteer)s\">Mach mit!</a>"
 
 #: i2p2www/pages/site/about/team.html:14
 msgid "Admin"
@@ -1374,7 +1170,8 @@ msgid "Product Development"
 msgstr "Produktentwicklung"
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1456,9 +1253,7 @@ msgstr "I2P-Bote-Plugin"
 #: i2p2www/pages/site/about/team.html:182
 #, python-format
 msgid "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a> lead"
-msgstr ""
-"<a "
-"href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>-Leitentwickler"
+msgstr "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>-Leitentwickler"
 
 #: i2p2www/pages/site/about/team.html:184
 msgid "Maintains the integrated Bittorrent client"
@@ -1535,9 +1330,7 @@ msgstr "Debian/Ubuntu Paketersteller und PPA Verwalter"
 
 #: i2p2www/pages/site/about/team.html:232
 msgid "Routerconsole backend and UI work, website revamp, unit tests work"
-msgstr ""
-"Arbeiten am Routerkonsolen-Backend und der Benutzerschnittstelle, "
-"Umgestaltung der Website, Erstellung von Unit-Tests"
+msgstr "Arbeiten am Routerkonsolen-Backend und der Benutzerschnittstelle, Umgestaltung der Website, Erstellung von Unit-Tests"
 
 #: i2p2www/pages/site/about/team.html:237
 msgid "Help needed on many fronts!"
@@ -1618,7 +1411,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "jbigi-Entwicklung, Wiki-Migration, Doku aufräumen"
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr "Java-Debugging und Client-Entwicklung bei I2PTunnel und der Routerkonsole"
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1668,53 +1462,27 @@ msgstr "&hellip; und viele andere"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
-msgstr ""
-"I2PCon 2015 war das erste Ereignis dieser Art. Sie hatte zwei "
-"kurzfristige Ziele.\n"
-"Erstens, der allgemeinen Öffentlichkeit einen Event zu bieten, bei dem "
-"Wissen ber Privatheit erlangt werden kann.\n"
-"Zweitens, um das I2P Projekt und seine Community mit technischen Aspekten"
-" über Kryptografie, Anonymität und Themen rund um I2P fortzuführen."
+msgstr "I2PCon 2015 war das erste Ereignis dieser Art. Sie hatte zwei kurzfristige Ziele.\nErstens, der allgemeinen Öffentlichkeit einen Event zu bieten, bei dem Wissen ber Privatheit erlangt werden kann.\nZweitens, um das I2P Projekt und seine Community mit technischen Aspekten über Kryptografie, Anonymität und Themen rund um I2P fortzuführen."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
-msgstr ""
-"Ein größeres und längerfristiges Ziel dieser Veranstaltung war es, eine "
-"Gemeinschaft von Individuen mit hohem Bewußtsein für Privatsphäre "
-"aufzubauen. Indem wir Menschen zusammenbringen, die um die Wichtigkeit "
-"von Privatsphäre wissen, wollten wir ein Forum liefern, in dem die "
-"Community wachsen kann. "
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
+msgstr "Ein größeres und längerfristiges Ziel dieser Veranstaltung war es, eine Gemeinschaft von Individuen mit hohem Bewußtsein für Privatsphäre aufzubauen. Indem wir Menschen zusammenbringen, die um die Wichtigkeit von Privatsphäre wissen, wollten wir ein Forum liefern, in dem die Community wachsen kann. "
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
-msgstr ""
-"Die Idee für dieses Event wurde erstmalig aufgegriffen von unsern guten "
-"Freunden bei \n"
-"<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"Die Unterkunft wurde von  <a href=\"https://hacklab.to/\">Hacklab.to</a> "
-"gestellt.\n"
-"Speerspitze für Marketing war <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> und Siew.\n"
-"Ohne Sie wäre das Event nicht möglich gewesen. "
+msgstr "Die Idee für dieses Event wurde erstmalig aufgegriffen von unsern guten Freunden bei \n<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nDie Unterkunft wurde von  <a href=\"https://hacklab.to/\">Hacklab.to</a> gestellt.\nSpeerspitze für Marketing war <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> und Siew.\nOhne Sie wäre das Event nicht möglich gewesen. "
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:32
 msgid "Slides and Video"
@@ -1730,8 +1498,8 @@ msgstr "Hinweis: Links zu Videos werden ergänzt sobald verfügbar."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1766,22 +1534,13 @@ msgstr "Referenten"
 msgid ""
 "Colin Mahns has a strong interest in the use of anonymity and encryption "
 "technology to help preserve human rights in the digital age."
-msgstr ""
-"Colin Mahns hat ein starkes Interesse daran, durch den Einsatz von "
-"Technologie für Anonymität und Verschlüsselung Menschenrechte im "
-"digitalen Zeitalter bewahren zu helfen. "
+msgstr "Colin Mahns hat ein starkes Interesse daran, durch den Einsatz von Technologie für Anonymität und Verschlüsselung Menschenrechte im digitalen Zeitalter bewahren zu helfen. "
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
-msgstr ""
-"David Dagon ist nach seiner Promotion ein Researcher bei Georgia Tech mit"
-" Focus auf Botnets, Malware, Netzwerksicherheit and DNS.\n"
-"Sein Interesse an I2P bewegt sich um den Erhalt der Privatsphäre von "
-"Usern, autonome Filtersysteme und Abwehr von Misbrauch."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
+msgstr "David Dagon ist nach seiner Promotion ein Researcher bei Georgia Tech mit Focus auf Botnets, Malware, Netzwerksicherheit and DNS.\nSein Interesse an I2P bewegt sich um den Erhalt der Privatsphäre von Usern, autonome Filtersysteme und Abwehr von Misbrauch."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
 #: i2p2www/pages/site/about/i2pcon/2015.html:105
@@ -1794,25 +1553,12 @@ msgstr "J ist der Leiter der Toronto Crypto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
-msgstr ""
-"Lance James ist der Gründer des Invisible IRC Projektes, der Vorgänger "
-"von I2P, zurück in 2002.\n"
-"Er gründete seine eigene Cyber Threat Intelligence Firma in 2003.\n"
-"Er war seitdem focusiert auf Netzwerksicherheit, Untersuchung von Malware"
-" und Informationssicherheit.\n"
-"Wärend 2011 - 2014 war er Direktor für Bedrohungsscenarien für Firma The "
-"Vigliant, welche von übernommen wurde Deloitte in 2013.\n"
-"Kürzlich verlies er Deloitte und machte Controlling über seine eigene "
-"Firma The James Group.  "
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
+msgstr "Lance James ist der Gründer des Invisible IRC Projektes, der Vorgänger von I2P, zurück in 2002.\nEr gründete seine eigene Cyber Threat Intelligence Firma in 2003.\nEr war seitdem focusiert auf Netzwerksicherheit, Untersuchung von Malware und Informationssicherheit.\nWärend 2011 - 2014 war er Direktor für Bedrohungsscenarien für Firma The Vigliant, welche von übernommen wurde Deloitte in 2013.\nKürzlich verlies er Deloitte und machte Controlling über seine eigene Firma The James Group.  "
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
 msgid "Nicholas D. is a member of Hacklab Toronto."
@@ -1820,22 +1566,11 @@ msgstr "Nicholas D. ist ein Mitglied des Hacklab Toronto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
-msgstr ""
-"Nicholas Johnston ist Professor für Informationssicherheit an der Schule "
-"für angewandte Datenverarbeitung des Sheridan College und Teil des "
-"InfoSec-Programms zum Bachelor.\n"
-"In seiner bisherigen Karriere beschäftigte er sich mit digitaler Forensik"
-" und Ermittlung.\n"
-"Als Auftragnehmer hat er sich auf Vorfallsreaktion spezialisiert.\n"
-"Seine Forschungsgebiete beinhalten sichere Softwareentwicklung und "
-"Datenanalyse."
+msgstr "Nicholas Johnston ist Professor für Informationssicherheit an der Schule für angewandte Datenverarbeitung des Sheridan College und Teil des InfoSec-Programms zum Bachelor.\nIn seiner bisherigen Karriere beschäftigte er sich mit digitaler Forensik und Ermittlung.\nAls Auftragnehmer hat er sich auf Vorfallsreaktion spezialisiert.\nSeine Forschungsgebiete beinhalten sichere Softwareentwicklung und Datenanalyse."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:124
 msgid "Psi is an I2P developer."
@@ -1887,14 +1622,9 @@ msgstr "Tag 2"
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
-msgstr ""
-"Die erste I2P gewidmete Konferenz fand 15.-16. August 2015 in Toronto "
-"statt.\n"
-"Siehe Link unten für mehr Informationen sowie für Links zu Vortragsfolien"
-" und Videos."
+msgstr "Die erste I2P gewidmete Konferenz fand 15.-16. August 2015 in Toronto statt.\nSiehe Link unten für mehr Informationen sowie für Links zu Vortragsfolien und Videos."
 
 #: i2p2www/pages/site/about/i2pcon/index.html:9
 msgid "Past years"
@@ -1910,27 +1640,13 @@ msgstr "August 2010"
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
-msgstr ""
-"Man kann mehrere Ansätze verfolgen, mit denen die gefühlte Performanz\n"
-"von I2P verbessert werden kann - manche der folgenden beziehen sich auf "
-"die Nutzung\n"
-"der CPU, andere auf die der Bandbreite, und wiederum andere auf das "
-"Protokoll. Jedoch\n"
-"wirken sich alle diese Faktoren auf Latenz, Durchsatz und gefühlte "
-"Netzwerkperformanz\n"
-"aus, da sie die Konkurrenz um knappe Ressourcen verringern. Diese Liste "
-"ist natürlich \n"
-"nicht umfassend, aber sie deckt die wichtigsten ab, die auftreten."
+msgstr "Man kann mehrere Ansätze verfolgen, mit denen die gefühlte Performanz\nvon I2P verbessert werden kann - manche der folgenden beziehen sich auf die Nutzung\nder CPU, andere auf die der Bandbreite, und wiederum andere auf das Protokoll. Jedoch\nwirken sich alle diese Faktoren auf Latenz, Durchsatz und gefühlte Netzwerkperformanz\naus, da sie die Konkurrenz um knappe Ressourcen verringern. Diese Liste ist natürlich \nnicht umfassend, aber sie deckt die wichtigsten ab, die auftreten."
 
 #: i2p2www/pages/site/about/performance/future.html:15
 #: i2p2www/pages/site/about/performance/index.html:106
@@ -1938,10 +1654,7 @@ msgstr ""
 msgid ""
 "For past performance improvements see the <a href=\"%(history)s\">\n"
 "Performance History</a>."
-msgstr ""
-"Für bisherige Leistungsverbesserungen, schauen Sie in der <a "
-"href=\"%(history)s\">\n"
-"Performance Historie</a> nach."
+msgstr "Für bisherige Leistungsverbesserungen, schauen Sie in der <a href=\"%(history)s\">\nPerformance Historie</a> nach."
 
 #: i2p2www/pages/site/about/performance/future.html:20
 msgid "Better peer profiling and selection"
@@ -1950,26 +1663,13 @@ msgstr "Besseres Profiling und Auswahl der Knoten "
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
-msgstr ""
-"Vielleicht das Wichtigste, dass getan werden kann, um eine schnellere "
-"Performance zu erzielen,\n"
-"ist zu verbessern, wie Router die Peers auswählen, durch die sie ihre "
-"Tunnel bauen.\n"
-"- sicherzustellen, dass sie keine Peers mit langsamer Verbindung benutzen"
-" oder solche mit schneller Verbindung, die\n"
-"aber überlastet sind, etc. Zusätzlich müssen wir sicherstellen, dass wir "
-"uns keiner <a href=\"%(sybilpdf)s\">Sybil</a> Attacke\n"
-"eines mächtigen Gegners mit vielen schnellen Maschinen aussetzen."
+msgstr "Vielleicht das Wichtigste, dass getan werden kann, um eine schnellere Performance zu erzielen,\nist zu verbessern, wie Router die Peers auswählen, durch die sie ihre Tunnel bauen.\n- sicherzustellen, dass sie keine Peers mit langsamer Verbindung benutzen oder solche mit schneller Verbindung, die\naber überlastet sind, etc. Zusätzlich müssen wir sicherstellen, dass wir uns keiner <a href=\"%(sybilpdf)s\">Sybil</a> Attacke\neines mächtigen Gegners mit vielen schnellen Maschinen aussetzen."
 
 #: i2p2www/pages/site/about/performance/future.html:30
 msgid "Network database tuning"
@@ -1977,34 +1677,15 @@ msgstr "Netzwerkdatenbankabstimmung"
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
-msgstr ""
-"Wir sind auf dem Weg, bei der Selbstheilung der Datenbank und bei "
-"Wartungsalgorhytmen effizienter werden zu wollen, anstatt permanent die "
-"Übersicht der Schlüssel nach neuen Peers zu überwachen - was zu einer "
-"erheblichen Zahl an Netzwerknachrichten und Belastung des Routers führt."
-" \n"
-"Wir können diese reduzieren oder die Suche komplett stoppen, bis wir "
-"erkennen, dass es etwas Neues von Relevanz gibt (z.B. die Erkundungsrate "
-"in Abhängigkeit davon zu verringern, wann uns jemand zuletzt eine uns "
-"zuvor nicht bekannte Referenz übermittelte).\n"
-"Wir können auch einstellen, was wir tatsächlich senden - wie viele Peers "
-"wir zurückspielen oder sogar ob wir überhaupt eine Antwort übermitteln, "
-"so wie die Anzahl, wie viele parallele Erkundungen durchführt werden. "
+msgstr "Wir sind auf dem Weg, bei der Selbstheilung der Datenbank und bei Wartungsalgorhytmen effizienter werden zu wollen, anstatt permanent die Übersicht der Schlüssel nach neuen Peers zu überwachen - was zu einer erheblichen Zahl an Netzwerknachrichten und Belastung des Routers führt. \nWir können diese reduzieren oder die Suche komplett stoppen, bis wir erkennen, dass es etwas Neues von Relevanz gibt (z.B. die Erkundungsrate in Abhängigkeit davon zu verringern, wann uns jemand zuletzt eine uns zuvor nicht bekannte Referenz übermittelte).\nWir können auch einstellen, was wir tatsächlich senden - wie viele Peers wir zurückspielen oder sogar ob wir überhaupt eine Antwort übermitteln, so wie die Anzahl, wie viele parallele Erkundungen durchführt werden. "
 
 #: i2p2www/pages/site/about/performance/future.html:42
 msgid "Session Tag Tuning and Improvements"
@@ -2013,52 +1694,24 @@ msgstr "Session-Tag Optimierungen Verbesserungen "
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
-msgstr ""
-"Die Art wie der <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"Algorithmus arbeitet, ist durch Management eines Satzes von zufälligen "
-"Einmal-32-Byte-Arrays und deren Verfall, wenn sie nicht schnell genug "
-"abgerufen werden. \n"
-"\n"
-"Wenn wir diese zu schnell verwerfen, dann sind wir gezwungen, auf eine "
-"vollständige (teure) ElGamal Verschlüsselung zurückzugreifen, aber wenn "
-"wir sie nicht schnell genug auslaufen lassen, dann müssen wir deren Menge"
-" reduzieren, damit uns der Speicher nicht ausgeht (und wenn der Empfänger"
-" fehlerhafte Pakete erhält, damit einige verliert, könnten sogar noch "
-"mehr Verschlüsselungsfehler entstehen, bevor dies erkannt wird).    \n"
-"\n"
-"Mit einem etwas aktiverem Algorithmus mit Ausrichtung auf Erkennung und "
-"Feedback, können wir sicherer und effektiver die Laufzeit der Tags "
-"bestimmen und dabei die ElGamal-Verschlüsselung mit einer trivialeren AES"
-" Operationi ersetzen. "
+msgstr "Die Art wie der <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> Algorithmus arbeitet, ist durch Management eines Satzes von zufälligen Einmal-32-Byte-Arrays und deren Verfall, wenn sie nicht schnell genug abgerufen werden. \n\nWenn wir diese zu schnell verwerfen, dann sind wir gezwungen, auf eine vollständige (teure) ElGamal Verschlüsselung zurückzugreifen, aber wenn wir sie nicht schnell genug auslaufen lassen, dann müssen wir deren Menge reduzieren, damit uns der Speicher nicht ausgeht (und wenn der Empfänger fehlerhafte Pakete erhält, damit einige verliert, könnten sogar noch mehr Verschlüsselungsfehler entstehen, bevor dies erkannt wird).    \n\nMit einem etwas aktiverem Algorithmus mit Ausrichtung auf Erkennung und Feedback, können wir sicherer und effektiver die Laufzeit der Tags bestimmen und dabei die ElGamal-Verschlüsselung mit einer trivialeren AES Operationi ersetzen. "
 
 #: i2p2www/pages/site/about/performance/future.html:55
 #, python-format
 msgid ""
 "Additional ideas for improving Session Tag delivery are described on the\n"
 "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>."
-msgstr ""
-"Zusätzliche Ideen zur Verbesserung des Session Tags, Bereitstellung und "
-"Beschreibung auf der <a "
-"href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag Seite</a>."
+msgstr "Zusätzliche Ideen zur Verbesserung des Session Tags, Bereitstellung und Beschreibung auf der <a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag Seite</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:61
 msgid "Migrate sessionTag to synchronized PRNG"
@@ -2069,33 +1722,24 @@ msgstr "sessionTag nach synchoronized PRNG migrieren"
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -2108,55 +1752,26 @@ msgstr "Tunnel von längerer Dauer"
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
-msgstr ""
-"Die derzeitige Voreinstellung von 10 Minuten für die Dauer von "
-"Tunnelverbindungen ist ziemlich willkürlich gewählt, aber\n"
-"\"dem Gefühl nach\" in Ordnung. Sobald wir Tunnel wiederherstellen und "
-"effektiver Probleme erkennen\n"
-"können, werden wir es leichter haben, diese Dauer zu variieren, was zur "
-"Entlastung\n"
-"der Netzwerkverbindung und der CPU (aufgrund des sonst aufwändigen "
-"Tunnelneuaufbaus) führt."
+msgstr "Die derzeitige Voreinstellung von 10 Minuten für die Dauer von Tunnelverbindungen ist ziemlich willkürlich gewählt, aber\n\"dem Gefühl nach\" in Ordnung. Sobald wir Tunnel wiederherstellen und effektiver Probleme erkennen\nkönnen, werden wir es leichter haben, diese Dauer zu variieren, was zur Entlastung\nder Netzwerkverbindung und der CPU (aufgrund des sonst aufwändigen Tunnelneuaufbaus) führt."
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
-msgstr ""
-"Dies scheint eine einfache Lösung für hohe Belastung auf Routern mit "
-"großer Bandbreite zu sein, aber wir sollten nicht darauf bauen, bevor wir"
-" nicht den Algorithmus der Tunnelerzeugung weiter ausgefeilt haben.\n"
-"Zu beachten ist, dass eine Tunnel-Lebenszeit von 10 Minuten an vielen "
-"Stellen fest programmiert ist und die Änderung der Laufzeit ist mit nicht"
-" unerheblichem Aufwand verbunden. Darüber hinaus wäre es bei einer "
-"solchen Änderung schwierig, die Rückwärtskompatibilität zu warhen.  "
+"Also, it would be difficult to maintain backward compatibility with such a change."
+msgstr "Dies scheint eine einfache Lösung für hohe Belastung auf Routern mit großer Bandbreite zu sein, aber wir sollten nicht darauf bauen, bevor wir nicht den Algorithmus der Tunnelerzeugung weiter ausgefeilt haben.\nZu beachten ist, dass eine Tunnel-Lebenszeit von 10 Minuten an vielen Stellen fest programmiert ist und die Änderung der Laufzeit ist mit nicht unerheblichem Aufwand verbunden. Darüber hinaus wäre es bei einer solchen Änderung schwierig, die Rückwärtskompatibilität zu warhen.  "
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
-msgstr ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
-"there are no current plans to extend tunnel lifetime.\n"
-"\n"
-"Da die Erfolgsrate des durchschnittlichen Tunnelaufbaus relativ hoch ist,"
-" gibt es momentan keine Pläne, die Laufzeit von Tunneln zu verlängern. "
+msgstr "Currently, since the network average tunnel build success rate is fairly high,\nthere are no current plans to extend tunnel lifetime.\n\nDa die Erfolgsrate des durchschnittlichen Tunnelaufbaus relativ hoch ist, gibt es momentan keine Pläne, die Laufzeit von Tunneln zu verlängern. "
 
 #: i2p2www/pages/site/about/performance/future.html:108
 msgid "Adjust the timeouts"
@@ -2164,34 +1779,22 @@ msgstr "Die Zeitüberschreitungen anpassen"
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
-msgstr ""
-"Jeder von diesen Unwägbarkeiten kann mit adaptiverem Programmcode "
-"begegnet werden, sowie\n"
-"mit Abstimmung von Parametern, um einen angemessenen Kompromiss zwischen\n"
-"Bandbreite, Latenz und CPU-Auslastung zu finden."
+msgstr "Jeder von diesen Unwägbarkeiten kann mit adaptiverem Programmcode begegnet werden, sowie\nmit Abstimmung von Parametern, um einen angemessenen Kompromiss zwischen\nBandbreite, Latenz und CPU-Auslastung zu finden."
 
 #: i2p2www/pages/site/about/performance/future.html:125
 msgid "Full streaming protocol improvements"
@@ -2201,50 +1804,33 @@ msgstr "Vollständige Streaming Protokoll Verbesserungen "
 msgid ""
 "Perhaps re-enable the interactive stream profile (the \n"
 "current implementation only uses the bulk stream profile)."
-msgstr ""
-"Vielleicht die Wiederermöglichung des Interactive-Stream-Profils (die \n"
-"momentane Implementierung nutzt nur das Block-Stream-Profil)."
+msgstr "Vielleicht die Wiederermöglichung des Interactive-Stream-Profils (die \nmomentane Implementierung nutzt nur das Block-Stream-Profil)."
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
-msgstr ""
-"Limitierung der Bandbreite auf Cient-Ebene (in entweder eine oder beide "
-"Richtungen eines Steams, oder möglicherweise verteilt über multiple "
-"Streams). Dies wäre natürlich zusätzlich zu der gesamten Limitierung der "
-"Routerbandbreite  "
+msgstr "Limitierung der Bandbreite auf Cient-Ebene (in entweder eine oder beide Richtungen eines Steams, oder möglicherweise verteilt über multiple Streams). Dies wäre natürlich zusätzlich zu der gesamten Limitierung der Routerbandbreite  "
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
-msgstr ""
-"Zugriffs-Kontroll-Listen (nur Streams zu oder von bestimmten Zieladressen"
-" Zugriff gewähren)"
+msgstr "Zugriffs-Kontroll-Listen (nur Streams zu oder von bestimmten Zieladressen Zugriff gewähren)"
 
 #: i2p2www/pages/site/about/performance/future.html:147
 msgid ""
 "Web controls and monitoring the health of the various streams, as well \n"
 "as the ability to explicitly close or throttle them."
-msgstr ""
-"Web Kontrolle und Monitoring der Gesundheit der vielfachen Streams, so "
-"wie die Möglichkeit diese explizit zu schliessen bzw. zu drosseln."
+msgstr "Web Kontrolle und Monitoring der Gesundheit der vielfachen Streams, so wie die Möglichkeit diese explizit zu schliessen bzw. zu drosseln."
 
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
-msgstr ""
-"Zusätzliche Ideen zur Verbesserung der Streaming Bibliothek sind "
-"beschrieben auf der\n"
-"<a href=\"%(streaming)s#future\">Streaming Bibliothek Seite</a>."
+msgstr "Zusätzliche Ideen zur Verbesserung der Streaming Bibliothek sind beschrieben auf der\n<a href=\"%(streaming)s#future\">Streaming Bibliothek Seite</a>."
 
 #: i2p2www/pages/site/about/performance/history.html:2
 msgid "Performance History"
@@ -2253,16 +1839,10 @@ msgstr "Leistungschronik"
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
-msgstr ""
-"Merkliche Verbesserung der Leistung wurden durch die untenstehenden "
-"Verbesserungen erreicht. Es gibt mehr zu tun, siehe die  <a "
-"href=\"%(performance)s\">Performance</a> Seite\n"
-"für aktuelle Problematik und Gedanken.."
+msgstr "Merkliche Verbesserung der Leistung wurden durch die untenstehenden Verbesserungen erreicht. Es gibt mehr zu tun, siehe die  <a href=\"%(performance)s\">Performance</a> Seite\nfür aktuelle Problematik und Gedanken.."
 
 #: i2p2www/pages/site/about/performance/history.html:10
 msgid "Native math"
@@ -2279,30 +1859,23 @@ msgstr "implementiert"
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -2316,68 +1889,42 @@ msgstr "Implentiert, benötigt weitere Optimierungen"
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
-msgstr ""
-"Diese Algorithmusänderung wird nur für Anwendungen, die eine Antwort vom "
-"Klienten benötigen, relevant sein (dieses betrifft dann doch alles, "
-"welches I2PTunnel oder mihis MiniStreamin Bibliothek nutzt):"
+msgstr "Diese Algorithmusänderung wird nur für Anwendungen, die eine Antwort vom Klienten benötigen, relevant sein (dieses betrifft dann doch alles, welches I2PTunnel oder mihis MiniStreamin Bibliothek nutzt):"
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
-msgstr ""
-"Für unveröffentlichte LeaseSets wie \"geteilte Dienste\", ist dies der "
-"einzige Weg, das LeaseSet an Bob zu übertragen. Diese Bündelung addiert "
-"leider fast 100&#37 Overhead zu einer Breitbandverbindung und weit mehr "
-"zu einer Verbindung mit kleineren Nachrichten. "
+msgstr "Für unveröffentlichte LeaseSets wie \"geteilte Dienste\", ist dies der einzige Weg, das LeaseSet an Bob zu übertragen. Diese Bündelung addiert leider fast 100&#37 Overhead zu einer Breitbandverbindung und weit mehr zu einer Verbindung mit kleineren Nachrichten. "
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
-msgstr ""
-"Änderungen sind vorgesehen für Version 0.6.2; Sie bündeln das LeaseSet am"
-" Anfang der Verbindung nur, wenn erforderlich oder wenn es sich "
-"verändert. Dies wird die zusätzliche Last an I2P-Nachrichten erheblich "
-"reduzieren."
+msgstr "Änderungen sind vorgesehen für Version 0.6.2; Sie bündeln das LeaseSet am Anfang der Verbindung nur, wenn erforderlich oder wenn es sich verändert. Dies wird die zusätzliche Last an I2P-Nachrichten erheblich reduzieren."
 
 #: i2p2www/pages/site/about/performance/history.html:66
 msgid "More efficient TCP rejection"
@@ -2386,20 +1933,13 @@ msgstr "Effizientere TCP Ablehnungen"
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -2410,16 +1950,11 @@ msgstr "Anpassen des Tunneltests"
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -2429,28 +1964,17 @@ msgstr "Beständige Tunnel / Auswahl Lease"
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
-msgstr ""
-"Auswahl der nach aussen gebundene Tunnel implementiert in 0.6.1.30, "
-"Auswahl der nach innen gebundndenen Leases implementiert in Release "
-"0.6.2."
+msgstr "Auswahl der nach aussen gebundene Tunnel implementiert in 0.6.1.30, Auswahl der nach innen gebundndenen Leases implementiert in Release 0.6.2."
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
-msgstr ""
-"Wenn Tunnel und Leases für jede Nachricht zufällig gewählt werden, dann "
-"führt dies zu einer hohen Tendenz für fehlerhafte Übertragung, was die "
-"Streaming Bibliothek daran hindert, seine Fenstergröße zu maximieren. "
-"Wenn gleiche Einstellungen für gegebene Verbindungen  bestehen bleiben, "
-"ist die Transferrate viel höher.  "
+msgstr "Wenn Tunnel und Leases für jede Nachricht zufällig gewählt werden, dann führt dies zu einer hohen Tendenz für fehlerhafte Übertragung, was die Streaming Bibliothek daran hindert, seine Fenstergröße zu maximieren. Wenn gleiche Einstellungen für gegebene Verbindungen  bestehen bleiben, ist die Transferrate viel höher.  "
 
 #: i2p2www/pages/site/about/performance/history.html:104
 msgid "Compress some data structures"
@@ -2458,20 +1982,13 @@ msgstr "Unterdrückung einiger Datenstrukturen"
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2485,26 +2002,16 @@ msgstr "ersetzt durch vollständiges Streaming Protocol"
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2513,18 +2020,12 @@ msgstr "Implementierung eines kompletten Streaming Protokolls"
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2532,16 +2033,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2553,84 +2049,44 @@ msgstr "Leistung"
 msgid ""
 "How does I2P work, why is it slow, and why does it not use my full "
 "bandwidth?"
-msgstr ""
-"Wie funktioniert I2P, warum ist es langsam und warum nutzt es nicht meine"
-" gesamte Bandbreite?"
+msgstr "Wie funktioniert I2P, warum ist es langsam und warum nutzt es nicht meine gesamte Bandbreite?"
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
-msgstr ""
-"Wahrscheinlich eine der meist gestellten Fragen ist \"wie schnell ist "
-"I2P?\" und niemand scheint die Antwort zu mögen - \"es hängt davon ab\". "
-"Nachdem sie I2P ausbrobiert haben, ist das nächste, was sie fragen, "
-"\"wird es schneller?\" und die Antwort darauf ist ein höchst empathisches"
-"  <b>Ja</b>."
+msgstr "Wahrscheinlich eine der meist gestellten Fragen ist \"wie schnell ist I2P?\" und niemand scheint die Antwort zu mögen - \"es hängt davon ab\". Nachdem sie I2P ausbrobiert haben, ist das nächste, was sie fragen, \"wird es schneller?\" und die Antwort darauf ist ein höchst empathisches  <b>Ja</b>."
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
-msgstr ""
-"Obiges beschreibt, warum jeder I2P Node zu voneinander abweichenden Nodes"
-" referenziert, um Tunnel aufzubauen. \n"
-"Weil jeder I2P Node eine andere Latenz und Bandbreite hat, haben Tunnel "
-"(die von diesen Nodes erzeugt wurden) unterschiedliche Latenz und "
-"Bandbreitenwerte. \n"
-"Und weil jeder I2P Node unterschiedliche Tunnel erzeugt, haben keine zwei"
-" I2P Nodes die gleichen Tunneleinstellungen. "
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
+msgstr "Obiges beschreibt, warum jeder I2P Node zu voneinander abweichenden Nodes referenziert, um Tunnel aufzubauen. \nWeil jeder I2P Node eine andere Latenz und Bandbreite hat, haben Tunnel (die von diesen Nodes erzeugt wurden) unterschiedliche Latenz und Bandbreitenwerte. \nUnd weil jeder I2P Node unterschiedliche Tunnel erzeugt, haben keine zwei I2P Nodes die gleichen Tunneleinstellungen. "
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
-msgstr ""
-"Ein Server / Client ist bekannt als \"Zieladresse\" und jede Zieladresse "
-"hat mindestens einen eingehenden und einen ausgehenden Tunnel. Der "
-"Standard ist 3 Hops per Tunnel. Dies addiert sich auf zu 12 Hops (12 "
-"unterschiedliche I2P Nodes) für einen vollen Rundtrip Client-Server-"
-"Client. "
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
+msgstr "Ein Server / Client ist bekannt als \"Zieladresse\" und jede Zieladresse hat mindestens einen eingehenden und einen ausgehenden Tunnel. Der Standard ist 3 Hops per Tunnel. Dies addiert sich auf zu 12 Hops (12 unterschiedliche I2P Nodes) für einen vollen Rundtrip Client-Server-Client. "
 
 #: i2p2www/pages/site/about/performance/index.html:34
 msgid ""
 "Each data package is sent through 6 other I2P nodes until it reaches the "
 "server:"
-msgstr ""
-"Jedes Datenpaket wird durch 6 andere I2P Knoten gesendet bevor es den "
-"Server erreicht:"
+msgstr "Jedes Datenpaket wird durch 6 andere I2P Knoten gesendet bevor es den Server erreicht:"
 
 #: i2p2www/pages/site/about/performance/index.html:40
 msgid "and on way back 6 different I2P nodes:"
@@ -2638,134 +2094,62 @@ msgstr "und auf dem Weg zurück durch 6 andere I2P Knoten:"
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
-msgstr ""
-"Um die Anonymität zu wahren, sollte kein einzelner Router zur Erstellung "
-"von Tunneln für das gesamte Netz eingesetzt werden. \n"
-"Wenn ein einzelner Router als Tunnelrouter für ALLE I2P-Nodes operiert, "
-"wird dieser zu einem ernsthaften Ansatzpunkt für Fehler so wie zur "
-"Preisgabe von IP's und Daten der Clients. Das ist nicht gut. I2P versucht"
-" aus diesem Grund, die Last über eine Vielzahl von I2P Nodes zu streuen."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
+msgstr "Um die Anonymität zu wahren, sollte kein einzelner Router zur Erstellung von Tunneln für das gesamte Netz eingesetzt werden. \nWenn ein einzelner Router als Tunnelrouter für ALLE I2P-Nodes operiert, wird dieser zu einem ernsthaften Ansatzpunkt für Fehler so wie zur Preisgabe von IP's und Daten der Clients. Das ist nicht gut. I2P versucht aus diesem Grund, die Last über eine Vielzahl von I2P Nodes zu streuen."
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
-msgstr ""
-"Ein anderer Punkt ist das vollständige Mesh-Netzwerk. Jede Verbindung von"
-" Hop zu Hop erstellt eine TCP oder UDP Verbindung zwischen den I2P Nodes."
-" Bei 1000 Verbindungen sieht man 1000 TCP Verbindungen. Dies ist eine "
-"ganze Menge und einige Büro- und Heimrouter  (DSL, Kabel, ...) erlauben "
-"nur eine kleine Anzahl an Verbindungen (oder frieren bei Anforderung von "
-"X Tunneln einfach ein). I2P versucht, diese Verbindungen auf unter 1500 "
-"je UDP und TCP einzuschränken. Dies limitiert den Umfang an Datenverkehr,"
-" der über deinen I2P Node geroutet wird, ebenfalls."
+msgstr "Ein anderer Punkt ist das vollständige Mesh-Netzwerk. Jede Verbindung von Hop zu Hop erstellt eine TCP oder UDP Verbindung zwischen den I2P Nodes. Bei 1000 Verbindungen sieht man 1000 TCP Verbindungen. Dies ist eine ganze Menge und einige Büro- und Heimrouter  (DSL, Kabel, ...) erlauben nur eine kleine Anzahl an Verbindungen (oder frieren bei Anforderung von X Tunneln einfach ein). I2P versucht, diese Verbindungen auf unter 1500 je UDP und TCP einzuschränken. Dies limitiert den Umfang an Datenverkehr, der über deinen I2P Node geroutet wird, ebenfalls."
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
-msgstr ""
-"Zusammenfassend gesagt, ist I2P sehr komplex und es gibt keinen einfachen"
-" Weg festzustellen, warum ihr Knotenpunkt nicht verwendet wird.\n"
-"Wenn Ihr Knotenpunkt erreichbar ist und eine Bandbreite von >128 "
-"kbyte/sec verfügbar ist und 24/7 errichbar ist, sollte er nach einer Zeit"
-" am Traffic beteiligt werden.\n"
-"Falls er zwischendurch offline geht, wird ein Test ihres I2P Knotens "
-"durch andere Knoten denen sagen: sie sind nicht erreichbar. Dies "
-"blockiert Ihren Knoten für mindestens 24 Std für andere Knoten. Daher "
-"werden die anderen Knoten, die Ihren als down gestestet haben, ihren "
-"Knoten für 24 Std nicht mehr zum bauen von Tunneln verwenden. Deshalb "
-"wird Ihr Traffic nach dem Neustart/Herunterfahren\n"
-"für mindestens 24 Std niedriger sein als normal."
+msgstr "Zusammenfassend gesagt, ist I2P sehr komplex und es gibt keinen einfachen Weg festzustellen, warum ihr Knotenpunkt nicht verwendet wird.\nWenn Ihr Knotenpunkt erreichbar ist und eine Bandbreite von >128 kbyte/sec verfügbar ist und 24/7 errichbar ist, sollte er nach einer Zeit am Traffic beteiligt werden.\nFalls er zwischendurch offline geht, wird ein Test ihres I2P Knotens durch andere Knoten denen sagen: sie sind nicht erreichbar. Dies blockiert Ihren Knoten für mindestens 24 Std für andere Knoten. Daher werden die anderen Knoten, die Ihren als down gestestet haben, ihren Knoten für 24 Std nicht mehr zum bauen von Tunneln verwenden. Deshalb wird Ihr Traffic nach dem Neustart/Herunterfahren\nfür mindestens 24 Std niedriger sein als normal."
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
-msgstr ""
-"Auch: andere I2P Knoten müssen deinen I2P Router für Erreichbarkeit und "
-"Kapazität testen. Es braucht Zeit, bis diese Nodes deinen Node kennen.\n"
-"Es wird schneller geschehen, wenn du I2P für einige Zeit so einsetzt, "
-"dass mehr Tunnel gebildet werden, konkret, durch den Einsatz von Torrents"
-" oder Aufrufe des WWW. "
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
+msgstr "Auch: andere I2P Knoten müssen deinen I2P Router für Erreichbarkeit und Kapazität testen. Es braucht Zeit, bis diese Nodes deinen Node kennen.\nEs wird schneller geschehen, wenn du I2P für einige Zeit so einsetzt, dass mehr Tunnel gebildet werden, konkret, durch den Einsatz von Torrents oder Aufrufe des WWW. "
 
 #: i2p2www/pages/site/about/performance/index.html:99
 msgid "Performance Improvements"
@@ -2776,8 +2160,4 @@ msgstr "Leistungsverbesserungen"
 msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
-msgstr ""
-"Für mögliche zukünftige Verbesserungen in der Performance, schauen sie "
-"unter <a href=\"%(future)s\">Zukünftige Performance Verbesserungen</a> "
-"nach."
-
+msgstr "Für mögliche zukünftige Verbesserungen in der Performance, schauen sie unter <a href=\"%(future)s\">Zukünftige Performance Verbesserungen</a> nach."
diff --git a/i2p2www/translations/de/LC_MESSAGES/comparison.po b/i2p2www/translations/de/LC_MESSAGES/comparison.po
index 6b5b2a3976e6c98781e161d8a3f07a3a0514bf18..36edfa2b863abeff342b3e7956510c616b21baa1 100644
--- a/i2p2www/translations/de/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/de/LC_MESSAGES/comparison.po
@@ -1,7 +1,7 @@
-# German translations for I2P.
-# Copyright (C) 2020 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # a b <ahx7@posteo.net>, 2017
 # Ettore Atalan <atalanttore@googlemail.com>, 2014-2017,2021
@@ -10,17 +10,18 @@
 # tk2015, 2014
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2020-11-16 17:04+0000\n"
-"PO-Revision-Date: 2021-02-07 12:13+0000\n"
-"Last-Translator: Ettore Atalan <atalanttore@googlemail.com>\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Ettore Atalan <atalanttore@googlemail.com>, 2014-2017,2021\n"
 "Language-Team: German (http://www.transifex.com/otf/I2P/language/de/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: de\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -28,74 +29,37 @@ msgstr "I2P im Vergleich zu Freenet"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
-msgstr ""
-"Freenet ist ein vollständig verteiltes anonymes Peer-to-Peer Netzwerk für"
-" Veröffentlichungen, welches sichere Methoden bereitstellt, Daten sicher "
-"zu speichern, so wie einige Ansätze den Lasten eines 'Flash Flood' "
-"gerecht zu werden. Während Freenet als verteilter Datenspeicher "
-"konzipiert wurde, hat die Comunity darüber hinaus Anwendungen "
-"programmiert, die mehr ursprüngliche anonyme Kommunikation zur Verfügung "
-"stellt wie statische Webseiten und Nachrichtenboards. "
+msgstr "Freenet ist ein vollständig verteiltes anonymes Peer-to-Peer Netzwerk für Veröffentlichungen, welches sichere Methoden bereitstellt, Daten sicher zu speichern, so wie einige Ansätze den Lasten eines 'Flash Flood' gerecht zu werden. Während Freenet als verteilter Datenspeicher konzipiert wurde, hat die Comunity darüber hinaus Anwendungen programmiert, die mehr ursprüngliche anonyme Kommunikation zur Verfügung stellt wie statische Webseiten und Nachrichtenboards. "
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
-msgstr ""
-"Verglichen mit I2P hat Freenet einige wesentliche Vorteile zu bieten.\n"
-"Freenet ist ein verteilter Datenspeicher, der es den Nutzern erlaubt, "
-"auch wenn die Quelle offline ist dessen Daten zu empfangen.Hinzu kommt, "
-"dass beliebte und viel verwendete Daten sehr effektiv verteilt werden "
-"können. I2P selbst bietet keine derartige Funktionalität und wird diese "
-"auch in Zukunft nicht tun.\n"
-"Auf der anderen Seite gibt es jedoch auch Nutzer, die einfach nur anonym "
-"kommunizieren wollen durch Websites, Message Boards, File Sharing "
-"Programme etc. Es wurden Versuche unternommen einen verteilten "
-"Datenspeicher zu entwickeln, der über I2P läuft, (zuletzt eine Portierung"
-" von <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) jedoch ist derzeit nichts "
-"davon in breiterer Verwendung."
+msgstr "Verglichen mit I2P hat Freenet einige wesentliche Vorteile zu bieten.\nFreenet ist ein verteilter Datenspeicher, der es den Nutzern erlaubt, auch wenn die Quelle offline ist dessen Daten zu empfangen.Hinzu kommt, dass beliebte und viel verwendete Daten sehr effektiv verteilt werden können. I2P selbst bietet keine derartige Funktionalität und wird diese auch in Zukunft nicht tun.\nAuf der anderen Seite gibt es jedoch auch Nutzer, die einfach nur anonym kommunizieren wollen durch Websites, Message Boards, File Sharing Programme etc. Es wurden Versuche unternommen einen verteilten Datenspeicher zu entwickeln, der über I2P läuft, (zuletzt eine Portierung von <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) jedoch ist derzeit nichts davon in breiterer Verwendung."
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
 msgstr ""
 
@@ -105,40 +69,28 @@ msgstr "I2P im Vergleich zu anderen Projekten"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
+msgstr "Es gibt sehr viele andere Anwendungen und Projekte die an anonymer Kommunikation arbeiten und I2P wurde von vielen dieser Anstrengungen inspiriert. Dies ist keine umfassende Liste anonymer Ressourcen. Sowohl freehavens\n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\nals auch auf GNUnet <a href=\"https://www.gnunet.org/links/\">bezogene Projekte</a>\nsind hierfür sehr gut geeignet. Einige wenige Systeme eigenen sich für\neinen weitergehenden Vergleich. Für folgende Projekte gibt eigene Vergleichsseiten:"
 
 #: i2p2www/pages/site/comparison/index.html:20
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere "
-"Netzwerke</a> erörtert:"
+msgstr "Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere Netzwerke</a> erörtert:"
 
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Der Inhalt dieser Seite wird fortwährend aktualisiert und diskutiert, und"
-" wir begrüßen Kommentare und Ergänzungen.\n"
-"Ein eigener Vergleich kann beigesteuert werden, indem man ein <a "
-"href=\"%(trac)s\">neues Ticket auf Trac</a> anlegt."
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
 msgid "I2P Compared to Other Anonymous Networks"
@@ -155,58 +107,38 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Die meisten der nachfolgenden Abschnitte sind eher alt und vielleicht "
-"nicht mehr zutreffend.\n"
-"Für eine Übersicht bestehender Vergleiche siehe die\n"
-"<a href=\"%(comparison)s\">Hauptseite für Netzwerkvergleiche</a>.\n"
-"Ein eigener Vergleich kann beigesteuert werden, indem man ein\n"
-"<a href=\"%(trac)s\">neues Ticket auf Trac</a> anlegt."
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
 msgstr ""
 
@@ -214,19 +146,15 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
@@ -238,32 +166,20 @@ msgstr ""
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
 msgstr ""
 
@@ -272,36 +188,23 @@ msgstr ""
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
 msgstr ""
 
@@ -309,10 +212,8 @@ msgstr ""
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
 msgstr ""
@@ -326,7 +227,7 @@ msgstr "Bezahlte VPN-Dienste"
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
@@ -388,9 +289,7 @@ msgstr "Vergleich der Tor- und I2P-Terminologie"
 msgid ""
 "While Tor and I2P are similar in many ways, much of the terminology is "
 "different."
-msgstr ""
-"Obwohl Tor und I2P in vielerlei Hinsicht ähnlich sind, ist ihre "
-"Terminologie weitgehend anders."
+msgstr "Obwohl Tor und I2P in vielerlei Hinsicht ähnlich sind, ist ihre Terminologie weitgehend anders."
 
 #: i2p2www/pages/site/comparison/tor.html:55
 msgid "Cell"
@@ -463,7 +362,7 @@ msgstr "Versteckter Dienst"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
+msgid "I2P Site or Destination"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
@@ -534,15 +433,10 @@ msgstr "Vorteile von Tor gegenüber I2P"
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
-msgstr ""
-"Viel größere Nutzerbasis; kommt im akademischen Bereich und bei Hacker-"
-"Communities viel häufiger vor; profitiert von\n"
-"wissenschaftlichen Studien über Anonymität, Resistenz und Performanz;\n"
-"hat einen nicht-anonymen, bekannten Projektleiter an einer Universität"
+msgstr "Viel größere Nutzerbasis; kommt im akademischen Bereich und bei Hacker-Communities viel häufiger vor; profitiert von\nwissenschaftlichen Studien über Anonymität, Resistenz und Performanz;\nhat einen nicht-anonymen, bekannten Projektleiter an einer Universität"
 
 #: i2p2www/pages/site/comparison/tor.html:84
 msgid "Has already solved some scaling issues I2P has yet to address"
@@ -558,34 +452,24 @@ msgstr "Hat mehr Entwickler, davon mehrere mit finanzieller Unterstützung"
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
-msgstr ""
-"Resistenter gegenüber staatlichem Sperren wegen der TLS Transportschicht "
-"und Bridges\n"
-"(bei I2P gibt es Vorschläge für \"full restricted routes\", aber diese "
-"sind noch nicht umgesetzt)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
+msgstr "Resistenter gegenüber staatlichem Sperren wegen der TLS Transportschicht und Bridges\n(bei I2P gibt es Vorschläge für \"full restricted routes\", aber diese sind noch nicht umgesetzt)"
 
 #: i2p2www/pages/site/comparison/tor.html:93
 msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr "Groß genug, dass es sich auf Blocking und DOS-Attacken einstellen musste"
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
-msgstr ""
-"Ausgerichtet und optimiert auf Exit-Traffic mit einer großen Anzahl von "
-"Exit-Knoten"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
+msgstr "Ausgerichtet und optimiert auf Exit-Traffic mit einer großen Anzahl von Exit-Knoten"
 
 #: i2p2www/pages/site/comparison/tor.html:96
 msgid ""
 "Better documentation, has formal papers and specifications,\n"
 "better website, many more translations"
-msgstr ""
-"Bessere Dokumentation, hat wissenschaftliche Arbeiten und "
-"Spezifikationen,\n"
-"bessere Website, viel mehr Ãœbersetzungen"
+msgstr "Bessere Dokumentation, hat wissenschaftliche Arbeiten und Spezifikationen,\nbessere Website, viel mehr Ãœbersetzungen"
 
 #: i2p2www/pages/site/comparison/tor.html:101
 msgid "More efficient with memory usage"
@@ -605,9 +489,7 @@ msgstr ""
 msgid ""
 "A core of high capacity nodes provides higher\n"
 "throughput and lower latency"
-msgstr ""
-"Ein Kern von Knoten mit hoher Kapazität\n"
-"sorgt für höheren Durchsatz und niedrigere Latenz"
+msgstr "Ein Kern von Knoten mit hoher Kapazität\nsorgt für höheren Durchsatz und niedrigere Latenz"
 
 #: i2p2www/pages/site/comparison/tor.html:115
 msgid "C, not Java (ewww)"
@@ -619,8 +501,8 @@ msgstr "Vorteile von I2P gegenüber Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:121
@@ -631,11 +513,7 @@ msgstr "Vollkommen verteilt und selbst-organisierend"
 msgid ""
 "Peers are selected by continuously profiling and ranking performance,\n"
 "rather than trusting claimed capacity"
-msgstr ""
-"Peers werden mittels fortlaufender Profilbildung und Performanzeinstufung"
-"\n"
-"ausgewählt, anstatt der von ihnen selbst angegebenen Kapazität zu "
-"vertrauen"
+msgstr "Peers werden mittels fortlaufender Profilbildung und Performanzeinstufung\nausgewählt, anstatt der von ihnen selbst angegebenen Kapazität zu vertrauen"
 
 #: i2p2www/pages/site/comparison/tor.html:129
 msgid ""
@@ -645,9 +523,7 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:134
 msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
-msgstr ""
-"Klein genug, dass es bisher kaum oder gar keine Blockierungen bzw. DOS-"
-"Attacken gab"
+msgstr "Klein genug, dass es bisher kaum oder gar keine Blockierungen bzw. DOS-Attacken gab"
 
 #: i2p2www/pages/site/comparison/tor.html:135
 msgid "Peer-to-peer friendly"
@@ -682,10 +558,7 @@ msgid ""
 "Unidirectional tunnels instead of bidirectional\n"
 "circuits, doubling the number of nodes a peer has to\n"
 "compromise to get the same information."
-msgstr ""
-"Unidirektionale Tunnel statt bidirektionaler\n"
-"Schaltungen, was die Zahl der zu kompromittierenden Stellen\n"
-"verdoppelt um an dieselbe Information zu gelangen."
+msgstr "Unidirektionale Tunnel statt bidirektionaler\nSchaltungen, was die Zahl der zu kompromittierenden Stellen\nverdoppelt um an dieselbe Information zu gelangen."
 
 #: i2p2www/pages/site/comparison/tor.html:166
 #, python-format
@@ -744,9 +617,7 @@ msgstr "Weitere potentielle Vorteile von I2P, aber noch nicht implementiert"
 
 #: i2p2www/pages/site/comparison/tor.html:207
 msgid "...and may never be implemented, so don't count on them!"
-msgstr ""
-"...und die vielleicht niemals implementiert werden, also nicht darauf "
-"verlassen!"
+msgstr "...und die vielleicht niemals implementiert werden, also nicht darauf verlassen!"
 
 #: i2p2www/pages/site/comparison/tor.html:210
 msgid ""
@@ -768,4 +639,3 @@ msgid ""
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
 msgstr ""
-
diff --git a/i2p2www/translations/de/LC_MESSAGES/docs.po b/i2p2www/translations/de/LC_MESSAGES/docs.po
index 3d161c61b604e2337d45a3cc0859af77757ea83a..5232c3b902b181eafef91a17b4f12381138eec5b 100644
--- a/i2p2www/translations/de/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/de/LC_MESSAGES/docs.po
@@ -4561,7 +4561,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:72
 msgid "for"
-msgstr ""
+msgstr "nach"
 
 #: i2p2www/pages/site/docs/applications/git.html:74
 msgid "in order to obscure your local time zone."
diff --git a/i2p2www/translations/de/LC_MESSAGES/misc.po b/i2p2www/translations/de/LC_MESSAGES/misc.po
index 956eda9209ef0def120ef041e51e16633c60b9ba..3c6232835555f547ea38c76e6ad70b75059adc37 100644
--- a/i2p2www/translations/de/LC_MESSAGES/misc.po
+++ b/i2p2www/translations/de/LC_MESSAGES/misc.po
@@ -1,7 +1,7 @@
-# German translations for I2P.
-# Copyright (C) 2019 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # a b <ahx7@posteo.net>, 2017
 # Ettore Atalan <atalanttore@googlemail.com>, 2014,2016
@@ -10,17 +10,18 @@
 # tk2015, 2014
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-02-12 00:06+0000\n"
-"PO-Revision-Date: 2019-08-20 18:44+0000\n"
-"Last-Translator: Forecast <taisto@web.de>\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Forecast <taisto@web.de>, 2018-2019\n"
 "Language-Team: German (http://www.transifex.com/otf/I2P/language/de/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: de\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/misc/clt.html:2
 msgid "I2P at CLT and PetCon 2009.1"
@@ -29,80 +30,39 @@ msgstr "I2P auf der CLT und PetCon 2009.1"
 #: i2p2www/pages/site/misc/clt.html:4
 msgid ""
 "Members of I2P will held a talk at CLT and PetCon 2009.1\n"
-"Two members of the I2P team will be at two forthcoming Linux day and "
-"security convention."
-msgstr ""
-"Mitglieder des I2P-Teams werden bei der CLT und der PetCon 2009 Vorträge "
-"halten.\n"
-"Zwei Mitglieder des I2P-Teams werden beim Linux Tag und einer "
-"Sicherheitskonferenz anwesend sein."
+"Two members of the I2P team will be at two forthcoming Linux day and security convention."
+msgstr "Mitglieder des I2P-Teams werden bei der CLT und der PetCon 2009 Vorträge halten.\nZwei Mitglieder des I2P-Teams werden beim Linux Tag und einer Sicherheitskonferenz anwesend sein."
 
 #: i2p2www/pages/site/misc/clt.html:9
 #, python-format
 msgid ""
-"On 14th march of 2009 there will be a short talk about general "
-"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> hold by echelon.\n"
-"Echelon and some other members of the I2P family will attend to the Linux"
-" meeting the whole two days (Saturday and Sunday) and will be "
-"recognizable as I2P family members. Meet them, ask them your questions, "
-"show them your props! Show your support!"
-msgstr ""
-"Am 14. März 2009 wird es einen kurzen Vortrag von Echelon mit einer "
-"allgemeinen Einführung zu I2P beim <a href=\"%(chemnitzer)s\">Chemnitzer "
-"Linux Tag 2009</a> geben.\n"
-"Echelon und weitere Mitglieder der I2P-Familie werden das Linuxtreffen an"
-" beiden Tagen (Sa. und So.) besuchen und auch als Mitglieder der I2P-"
-"Familie erkennbar sein. Trefft sie, fragt sie und unterstützt sie!"
+"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n"
+"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!"
+msgstr "Am 14. März 2009 wird es einen kurzen Vortrag von Echelon mit einer allgemeinen Einführung zu I2P beim <a href=\"%(chemnitzer)s\">Chemnitzer Linux Tag 2009</a> geben.\nEchelon und weitere Mitglieder der I2P-Familie werden das Linuxtreffen an beiden Tagen (Sa. und So.) besuchen und auch als Mitglieder der I2P-Familie erkennbar sein. Trefft sie, fragt sie und unterstützt sie!"
 
 #: i2p2www/pages/site/misc/clt.html:14
 #, python-format
 msgid ""
-"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security "
-"convention</a> in Dresden will take place.\n"
-"Again, echelon will attend this event and hold a short talk about general"
-" introduction to I2P. Another talk about the profiling by the I2P clients"
-" will be held."
-msgstr ""
-"Nur 10 Tage später findet die <a href=\"%(petcon)s\">Privacy and Data "
-"Security convention</a> in Dresden statt.\n"
-"echelon wird an dieser Veranstaltung wieder teilnehmen und eine "
-"allgemeine Einführung in I2P geben, so wie einen weiteren Talk über die "
-"Einstellung der I2P Clients."
+"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n"
+"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held."
+msgstr "Nur 10 Tage später findet die <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden statt.\nechelon wird an dieser Veranstaltung wieder teilnehmen und eine allgemeine Einführung in I2P geben, so wie einen weiteren Talk über die Einstellung der I2P Clients."
 
 #: i2p2www/pages/site/misc/cvs.html:4
 #, python-format
 msgid ""
-"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a"
-" <a href=\"%(monotone)s\">Monotone</a> repository.\n"
+"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n"
 "For those who aren't very familiar with CVS, there is a\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> "
-"on the\n"
-"subject (developers only need to deal with the first chapter - \"An "
-"Overview of\n"
-"CVS\", as subsequent chapters go into some nasty details very few ever "
-"need to\n"
+"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n"
+"subject (developers only need to deal with the first chapter - \"An Overview of\n"
+"CVS\", as subsequent chapters go into some nasty details very few ever need to\n"
 "touch)."
-msgstr ""
-"Der I2P-Quelltext wurde in einem CVS-Repositorium bereitgestellt. "
-"Mittlerweile dient dazu ein <a href=\"%(monotone)s\">Monotone</a> "
-"-Repositorium.\n"
-"Für die, die sich mit CVS noch nicht so gut auskennen, gibt es hier ein\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">tolles Buch</a> zum "
-"Thema (Entwickler müssen sich eigentlich nut mir dem ersten Kapitel "
-"befassen - \"An Overview of\n"
-"CVS\", da die weiteren Kapitel doch sehr weit in Details gehen, dei hier "
-"im Grunde nicht gebraucht werden)."
+msgstr "Der I2P-Quelltext wurde in einem CVS-Repositorium bereitgestellt. Mittlerweile dient dazu ein <a href=\"%(monotone)s\">Monotone</a> -Repositorium.\nFür die, die sich mit CVS noch nicht so gut auskennen, gibt es hier ein\n<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">tolles Buch</a> zum Thema (Entwickler müssen sich eigentlich nut mir dem ersten Kapitel befassen - \"An Overview of\nCVS\", da die weiteren Kapitel doch sehr weit in Details gehen, dei hier im Grunde nicht gebraucht werden)."
 
 #: i2p2www/pages/site/misc/cvs.html:31
 msgid ""
-"Humorous quote from WinCVS: \"Did you know...  Never experiment with new "
-"CVS\n"
-"commands on your working repository.  Create a sample module instead.\""
-msgstr ""
-"Ein nettes Zitat von WinCVS: \"Did you know...  Never experiment with new"
-" CVS\n"
+"Humorous quote from WinCVS: \"Did you know...  Never experiment with new CVS\n"
 "commands on your working repository.  Create a sample module instead.\""
+msgstr "Ein nettes Zitat von WinCVS: \"Did you know...  Never experiment with new CVS\ncommands on your working repository.  Create a sample module instead.\""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4
@@ -113,20 +73,13 @@ msgstr "I2PTunnel-Migration"
 msgid ""
 "After upgrading to the new architecture, you'll have to do a \n"
 "little work to get your old I2PTunnel-driven servers running.  \n"
-"Lets walk through a simple example.  For an eepsite with the \n"
+"Lets walk through a simple example.  For an I2P Site with the \n"
 "old clientApp configuration, you had:"
 msgstr ""
-"Nach dem Upgrade auf die neue Architektur, ist ein wenig Nachbessern "
-"angesagt, um die alten I2PTunnel-getriebenen Server zum Laufen zu "
-"bekommen.\n"
-"Schauen wir uns dazu ein kleines Beispiel an. Für eine alte clientApp-"
-"Konfiguration hatttest du:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16
 msgid "To provide that same functionality on the new web architecture:"
-msgstr ""
-"Um die gleiche Funktionalität auf der neuen Netzarchitektur "
-"bereitzustellen:"
+msgstr "Um die gleiche Funktionalität auf der neuen Netzarchitektur bereitzustellen:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:18
 #, python-format
@@ -138,12 +91,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\""
 msgstr "Klicke auf Add new: [Server tunnel] \"Go\""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21
-msgid "For the name: <code>\"eepsite\"</code>"
-msgstr "Für den Namen: <code>\"eepsite\"</code>"
+msgid "For the name: <code>\"I2P Site\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22
-msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>"
-msgstr "Für die Beschreibung: <code>\"Meine eepsite, ist sie nicht toll?\"</code>"
+msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23
 msgid ">For the target host:"
@@ -157,11 +110,7 @@ msgstr "Für den Ziel-Port:"
 msgid ""
 "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n"
 "(it is recommended to copy that .dat to your new install dir)"
-msgstr ""
-"Für meine private Schlüsseldatei: <code>Pfad nach "
-"\"myWebPriv.dat\"</code><br /> \n"
-"(es wird empfohlen diese .dat ins neue Installationsverzeichnis zu "
-"kopieren)"
+msgstr "Für meine private Schlüsseldatei: <code>Pfad nach \"myWebPriv.dat\"</code><br /> \n(es wird empfohlen diese .dat ins neue Installationsverzeichnis zu kopieren)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29
 msgid "Check the \"Start automatically?\" checkbox"
@@ -177,22 +126,12 @@ msgstr "Dann wird die Meldung kommen:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39
 msgid ""
-"That's it!  Creating a new I2PTunnel server works the same way too, "
-"except you\n"
-"don't need to \"copy the old file\", obviously.  Behind the scenes, it is"
-" all driven\n"
-"by the <code>i2ptunnel.config</code> file, which you may modify "
-"externally (if you do,\n"
-"hit \"Reload config\" on the I2PTunnel web page, which will tear down all"
-" of your \n"
+"That's it!  Creating a new I2PTunnel server works the same way too, except you\n"
+"don't need to \"copy the old file\", obviously.  Behind the scenes, it is all driven\n"
+"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n"
+"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n"
 "existing tunnels and rebuild new ones)"
-msgstr ""
-"Das war's!  Einen neuen I2PTunnel-Server zu erstellen funktioniert genau "
-"so, abgesehen davon, dass man sich das Kopieren von alten Dateien sparen "
-"kann.  Im Hintergrung wird alles durch die <code>i2ptunnel.config</code> "
-"gesteuert, die separat modifiziert werden kann (wenn ja, wähle auf der "
-"I2PTunnel-Webseite \"Konfiguration neu laden\" woraufhin alle deine "
-"existierenden Tunnel beendet und neu erstellt werden)"
+msgstr "Das war's!  Einen neuen I2PTunnel-Server zu erstellen funktioniert genau so, abgesehen davon, dass man sich das Kopieren von alten Dateien sparen kann.  Im Hintergrung wird alles durch die <code>i2ptunnel.config</code> gesteuert, die separat modifiziert werden kann (wenn ja, wähle auf der I2PTunnel-Webseite \"Konfiguration neu laden\" woraufhin alle deine existierenden Tunnel beendet und neu erstellt werden)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47
 msgid ""
@@ -208,7 +147,7 @@ msgid "I2PTunnel services"
 msgstr "I2PTunnel-Dienste"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:4
-msgid "Below is quick copy of aum's eepsite deployment guide."
+msgid "Below is quick copy of aum's I2P Site deployment guide."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:8
@@ -224,51 +163,44 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:13
 msgid ""
-"I recommend the Tiny Httpd web server, thttpd, (windows version available"
-" on site) although you can use anything that you feel comfortable with."
-msgstr ""
-"Empfehlenswert ist der Tiny Httpd Webserver alias thttpd (Windows-Version"
-" verfügbar), es kann aber auch jeder gewünschte andere eingesetzt werden."
+"I recommend the Tiny Httpd web server, thttpd, (windows version available on"
+" site) although you can use anything that you feel comfortable with."
+msgstr "Empfehlenswert ist der Tiny Httpd Webserver alias thttpd (Windows-Version verfügbar), es kann aber auch jeder gewünschte andere eingesetzt werden."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:16
 msgid ""
 "Another more robust option would be to use EasyPHP, which is also open "
 "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For "
-"newbies who have no experience setting up and hosting content over "
-"servers, see the hosting page for help."
+"newbies who have no experience setting up and hosting content over servers, "
+"see the hosting page for help."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:19
 msgid ""
-"With the web server you've chosen, configure it to listen on a port of "
-"your choice, and serve its documents from a directory of your choice. For"
-" this example, we'll assume port 10880."
+"With the web server you've chosen, configure it to listen on a port of your "
+"choice, and serve its documents from a directory of your choice. For this "
+"example, we'll assume port 10880."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:22
 msgid ""
 "Make sure your firewall is set up so that you cannot receive incoming "
 "connections on this port (which would breach your anonymity)."
-msgstr ""
-"Stelle sicher, dass deine firewall eingerichtet ist, so dass du keine "
-"eingehenden Verbindungen auf diesem Port empfangen kannst (was deine "
-"Anonymität brechen würde)."
+msgstr "Stelle sicher, dass deine firewall eingerichtet ist, so dass du keine eingehenden Verbindungen auf diesem Port empfangen kannst (was deine Anonymität brechen würde)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:25
 msgid ""
 "Test the webserver, by pointing your normal browser (the one with the "
 "\"direct connection\") at <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the "
-"port number you have chosen)."
+"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port"
+" number you have chosen)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:28
 msgid ""
 "Once your webserver is working, and you can access it locally with your "
 "browser, continue to the next step."
-msgstr ""
-"Sobald dein webserver arbeitet und du lokal mit deinem browser auf ihn "
-"zugreifen kannst, fahre mit dem nächsten Schritt fort."
+msgstr "Sobald dein webserver arbeitet und du lokal mit deinem browser auf ihn zugreifen kannst, fahre mit dem nächsten Schritt fort."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:33
 msgid "2 - Generate an I2P Destination Keypair"
@@ -276,102 +208,85 @@ msgstr "2 - Erzeuge ein I2P Ziel Schlüsselpaar"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:35
 msgid ""
-"I2P does not deal in IP addresses. To protect your anonymity, it deals in"
-" unique addresses called destination keys."
-msgstr ""
-"I2P verwendet keine IP-Adressen. Um die Anonymität zu schützen, verwendet"
-" es eigene eindeutige Adressen, sog. \"destination keys\" "
-"(Zielschlüssel)."
+"I2P does not deal in IP addresses. To protect your anonymity, it deals in "
+"unique addresses called destination keys."
+msgstr "I2P verwendet keine IP-Adressen. Um die Anonymität zu schützen, verwendet es eigene eindeutige Adressen, sog. \"destination keys\" (Zielschlüssel)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:38
 msgid ""
 "A destination key works a lot like a regular IP address, except that it "
-"can't be traced to your IP address or physical location. When users place"
-" a request to speak with you, your gateways are the ones that answer for "
-"you. So the requesting user can only know the IP address of your "
-"gateways. However, gateways don't know your IP address, because gateways "
-"are the last nodes on your tunnels, and you anonymously create tunnels by"
-" way of garlic routing. (So gateways are like puppets that can't see "
-"their masters, and everyone communicates through these puppets)"
+"can't be traced to your IP address or physical location. When users place a "
+"request to speak with you, your gateways are the ones that answer for you. "
+"So the requesting user can only know the IP address of your gateways. "
+"However, gateways don't know your IP address, because gateways are the last "
+"nodes on your tunnels, and you anonymously create tunnels by way of garlic "
+"routing. (So gateways are like puppets that can't see their masters, and "
+"everyone communicates through these puppets)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:41
 msgid ""
 "To deploy a server on I2P, you create a destination keypair. You use the "
-"private key to authenticate your server when connecting it to I2P, and "
-"you make the public key (aka destination key) known publicly, so others "
-"can connect to your server. (indirectly, through your gateways)"
+"private key to authenticate your server when connecting it to I2P, and you "
+"make the public key (aka destination key) known publicly, so others can "
+"connect to your server. (indirectly, through your gateways)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:44
 msgid "Each service you run on I2P requires a different keypair."
-msgstr ""
-"Jeder Dienst, den Sie auf I2P betreiben, benötigt ein anderes "
-"Schlüsselpaar."
+msgstr "Jeder Dienst, den Sie auf I2P betreiben, benötigt ein anderes Schlüsselpaar."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:47
 msgid ""
 "To generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code> (all on one line)"
-msgstr ""
-"Um ein Schlüsselpaar zu generieren, lautet das Kommando: <code>java -jar "
-"lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
-"myWebPubKey.dat\"</code> (alles in einer Zeile)"
+msgstr "Um ein Schlüsselpaar zu generieren, lautet das Kommando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code> (alles in einer Zeile)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:50
 msgid ""
 "In windows, to generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code>"
-msgstr ""
-"Um in Windows ein Schlüsselpaar zu generieren, lautet das Kommando: "
-"<code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
-"myWebPubKey.dat\"</code>"
+msgstr "Um in Windows ein Schlüsselpaar zu generieren, lautet das Kommando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:53
 msgid ""
-"The filenames <code>myWebPrivKey.dat</code> and "
-"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want "
-"here, as long as you understand your own choices."
+"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>"
+" are arbitrary - choose whatever you want here, as long as you understand "
+"your own choices."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:56
 msgid ""
 "We now need to export your public key into base64 format, which you will "
 "share with others."
-msgstr ""
-"Wir müssen jetzt deinen öffentlichen Schlüssel in base64 Format "
-"exportieren, das du dann mit anderen teilen wirst."
+msgstr "Wir müssen jetzt deinen öffentlichen Schlüssel in base64 Format exportieren, das du dann mit anderen teilen wirst."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:59
 msgid ""
-"To convert your myWebPubKey.dat file into shareable base64, type the "
-"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (all on one line)."
+"To convert your myWebPubKey.dat file into shareable base64, type the command"
+" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; "
+"myWebPubKey.txt</code> (all on one line)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:62
 msgid ""
-"This file you have just generated, <code>myWebPubKey.txt</code>, contains"
-" a long base64 string (516 chars at last count), which we call a "
-"destination key. All you need to know about this string for now is that "
-"it allows remote clients to uniquely pinpoint and connect to your server,"
-" just the same way as an IP address allows remote machines to pinpoint "
-"and connect to your machine."
+"This file you have just generated, <code>myWebPubKey.txt</code>, contains a "
+"long base64 string (516 chars at last count), which we call a destination "
+"key. All you need to know about this string for now is that it allows remote"
+" clients to uniquely pinpoint and connect to your server, just the same way "
+"as an IP address allows remote machines to pinpoint and connect to your "
+"machine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:65
 msgid ""
 "However, in contrast to an IP address, there is no way to trace your "
-"machine's physical location - even though your server can be addressed "
-"via I2P, your IP address cannot be traced or associated with this "
-"destination key."
-msgstr ""
-"Allerdings, im Gegensatz zu einer IP Adresse, gibt es keinen Weg, den "
-"physischen Standort deines Rechners nachzuverfolgen - obwohl dein Server "
-"durch I2P angesprochen werden kann, kann deine IP Adresse nicht mit "
-"diesem Zielschlüssel in Verbindung gebracht oder verfolgt werden."
+"machine's physical location - even though your server can be addressed via "
+"I2P, your IP address cannot be traced or associated with this destination "
+"key."
+msgstr "Allerdings, im Gegensatz zu einer IP Adresse, gibt es keinen Weg, den physischen Standort deines Rechners nachzuverfolgen - obwohl dein Server durch I2P angesprochen werden kann, kann deine IP Adresse nicht mit diesem Zielschlüssel in Verbindung gebracht oder verfolgt werden."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:70
 msgid "3 - Open a 'Tunnel' from I2P To Your Server"
@@ -379,9 +294,9 @@ msgstr "3 - Öffne einen \"Tunnel\" von I2P zu deinem Server"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:72
 msgid ""
-"For clients elsewhere in I2P to be able to access your server, you must "
-"run a 'bridge' or 'tunnel', which takes connections from these clients "
-"and forwards them to your local server."
+"For clients elsewhere in I2P to be able to access your server, you must run "
+"a 'bridge' or 'tunnel', which takes connections from these clients and "
+"forwards them to your local server."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:75
@@ -389,39 +304,27 @@ msgid ""
 "To activate such a tunnel, type the command <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code> (all one line)."
-msgstr ""
-"Um so einen Tunnel zu aktivieren, tippen sie <code>java -jar "
-"lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
-"myWebPrivKey.dat\"</code> (alles eine Zeile)"
+msgstr "Um so einen Tunnel zu aktivieren, tippen sie <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code> (alles eine Zeile)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:78
 msgid ""
 "If you used different filenames or port number earlier on, change these "
 "accordingly"
-msgstr ""
-"Wenn du vorher verschiedene Dateinamen oder Portnummern verwendet hast, "
-"ändere diese entsprechend"
+msgstr "Wenn du vorher verschiedene Dateinamen oder Portnummern verwendet hast, ändere diese entsprechend"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:81
 msgid ""
 "Windows users, remember to replace apostrophes with double quotes. Thus: "
 "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code>"
-msgstr ""
-"Windowsnutzer müssen Apostrophe mit doppelten Anführungszeichen ersetzen."
-" Also: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost "
-"10880 myWebPrivKey.dat\"</code>"
+msgstr "Windowsnutzer müssen Apostrophe mit doppelten Anführungszeichen ersetzen. Also: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:84
 msgid ""
-"Within a few seconds, the 'tunnel' should now be active, and remote "
-"clients should be able to reach your server anonymously. Remember to let "
-"your router \"warm up\" before opening clients to it."
-msgstr ""
-"Innerhalb weniger Sekunden sollte der \"Tunnel\" nun aktiv sein und "
-"entfernte Clients sollten sich anonym zum Server verbinden können. Nicht "
-"vergessen, den Router \"warmlaufen\" zu lassen, bevor man Clients daruf "
-"aufmacht."
+"Within a few seconds, the 'tunnel' should now be active, and remote clients "
+"should be able to reach your server anonymously. Remember to let your router"
+" \"warm up\" before opening clients to it."
+msgstr "Innerhalb weniger Sekunden sollte der \"Tunnel\" nun aktiv sein und entfernte Clients sollten sich anonym zum Server verbinden können. Nicht vergessen, den Router \"warmlaufen\" zu lassen, bevor man Clients daruf aufmacht."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:89
 msgid "4 - Update Your hosts.txt File "
@@ -438,9 +341,9 @@ msgstr ""
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:94
 msgid ""
 "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where "
-"myserver.i2p is an I2P 'domain' you want to associate with your site, and"
-" the blahblahblah is the text of the base64 public key you created "
-"earlier in the file myWebPubKey.txt"
+"myserver.i2p is an I2P 'domain' you want to associate with your site, and "
+"the blahblahblah is the text of the base64 public key you created earlier in"
+" the file myWebPubKey.txt"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:97
@@ -474,50 +377,43 @@ msgstr "Wir müssen jetzt weiter als nur an Webserver denken."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:117
 msgid ""
-"As you grow into I2P and get more of a 'feel' for it, you will want to "
-"use all manner of servers and clients."
+"As you grow into I2P and get more of a 'feel' for it, you will want to use "
+"all manner of servers and clients."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:120
 msgid ""
-"The beauty of I2P is that it allows standard Internet clients and servers"
-" for most protocols to be transparently 'tunneled' through the anonymous "
+"The beauty of I2P is that it allows standard Internet clients and servers "
+"for most protocols to be transparently 'tunneled' through the anonymous "
 "network."
-msgstr ""
-"Das schöne an I2P ist, dass man die normalen Clients und Server der "
-"meisten Protokolle durch das anonyme Netzwerk transparent tunneln kann."
+msgstr "Das schöne an I2P ist, dass man die normalen Clients und Server der meisten Protokolle durch das anonyme Netzwerk transparent tunneln kann."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:123
 msgid ""
-"You can run mailservers/clients, nameservers/clients, newsservers/clients"
-" - almost anything at all - perhaps even FTP in passive mode."
+"You can run mailservers/clients, nameservers/clients, newsservers/clients - "
+"almost anything at all - perhaps even FTP in passive mode."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:126
 msgid ""
-"Now, we'll create a client tunnel. This is like the server tunnel we "
-"created earlier, but works in reverse. It listens to a port on your local"
-" machine; your local client connects to this port; the connection gets "
-"forwarded through I2P to the service on the other end."
+"Now, we'll create a client tunnel. This is like the server tunnel we created"
+" earlier, but works in reverse. It listens to a port on your local machine; "
+"your local client connects to this port; the connection gets forwarded "
+"through I2P to the service on the other end."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:129
 msgid ""
-"To open your client tunnel for your server, type the command <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (all one line)."
-msgstr ""
-"Einen Client-Tunnel für den eigenen Server startet man mit dem Kommando: "
-"<code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e "
-"\"client 10888 textofbase64key\"</code> (alles in einer Zeile)."
+"To open your client tunnel for your server, type the command <code>java -jar"
+" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 "
+"textofbase64key\"</code> (all one line)."
+msgstr "Einen Client-Tunnel für den eigenen Server startet man mit dem Kommando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 textofbase64key\"</code> (alles in einer Zeile)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:132
 msgid ""
-"The port 10888 is arbitrary - it just needs to be something other than "
-"the physical port your server is listening on."
-msgstr ""
-"Der Port 10888 ist willkürlich gewählt - es muss nur ein anderer sein als"
-" der physische Port auf dem der eigene Server lauscht."
+"The port 10888 is arbitrary - it just needs to be something other than the "
+"physical port your server is listening on."
+msgstr "Der Port 10888 ist willkürlich gewählt - es muss nur ein anderer sein als der physische Port auf dem der eigene Server lauscht."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:135
 msgid ""
@@ -531,10 +427,7 @@ msgstr ""
 msgid ""
 "Within a minute or two of launching this command, the client tunnel from "
 "your local machine into I2P will be open and ready for use."
-msgstr ""
-"Etwa ein bis zwei Minuten nach dem Ausführen des Befehls sollte der "
-"Client-Tunnel vom lokalen Rechner ins I2P-Netz offen sein und kann dann "
-"genutzt werden."
+msgstr "Etwa ein bis zwei Minuten nach dem Ausführen des Befehls sollte der Client-Tunnel vom lokalen Rechner ins I2P-Netz offen sein und kann dann genutzt werden."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:141
 msgid ""
@@ -547,17 +440,14 @@ msgstr ""
 msgid ""
 "Verify that the main page of your server eventually comes up in your "
 "browser."
-msgstr ""
-"Man sollte dann prüfen, dass die Eingangsseite des eigenen Servers im "
-"Browser erscheint."
+msgstr "Man sollte dann prüfen, dass die Eingangsseite des eigenen Servers im Browser erscheint."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:147
 msgid ""
-"You use the same procedure for using any local client program to access a"
-" remote I2P server - just get the base64 public key (called destination "
-"key) of the remote server, choose a local port to connect to the remote "
-"server, open the tunnel, and just connect with your client to your "
-"heart's content."
+"You use the same procedure for using any local client program to access a "
+"remote I2P server - just get the base64 public key (called destination key) "
+"of the remote server, choose a local port to connect to the remote server, "
+"open the tunnel, and just connect with your client to your heart's content."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:152
@@ -568,25 +458,25 @@ msgstr "7 - Teile deine Serverdetails mit anderen"
 msgid ""
 "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's "
 "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. "
-"Others will then be able to reach your server remotely, without either of"
-" you jeopardizing your anonymity."
+"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others"
+" will then be able to reach your server remotely, without either of you "
+"jeopardizing your anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:157
 msgid ""
-"Remember, you can go to What's on I2P and find the latest public keys "
-"linked to their URL. You should also post your own public key and URL "
-"their. However, you will want to do this anonymously, of course. "
-"Drupal.i2p.net is currently, as of this writing, only accessible from the"
-" net. So, to access the outside WWW anonymously from inside of I2P, you "
-"will need to start up your script called startSquid. Do it the same way "
-"you have been doing these other scripts. Reconfigure your browser to "
-"proxy on localhost:5555, as defined in the script, and when the script "
-"has generated it's keys, you can access the squid proxy. Put any WWW URL "
-"(such as Google or this i2p site) into your browser's address bar and you"
-" will be surfing the World Wide Web anonymously. Now you can safely post "
-"your public key, and no one can detect your IP address."
+"Remember, you can go to What's on I2P and find the latest public keys linked"
+" to their URL. You should also post your own public key and URL their. "
+"However, you will want to do this anonymously, of course. Drupal.i2p.net is "
+"currently, as of this writing, only accessible from the net. So, to access "
+"the outside WWW anonymously from inside of I2P, you will need to start up "
+"your script called startSquid. Do it the same way you have been doing these "
+"other scripts. Reconfigure your browser to proxy on localhost:5555, as "
+"defined in the script, and when the script has generated it's keys, you can "
+"access the squid proxy. Put any WWW URL (such as Google or this i2p site) "
+"into your browser's address bar and you will be surfing the World Wide Web "
+"anonymously. Now you can safely post your public key, and no one can detect "
+"your IP address."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:162
@@ -595,11 +485,9 @@ msgstr "8. Skripte schreiben, um sich lästige Tipparbeit zu sparen"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:164
 msgid ""
-"It would drive most people crazy, going through all these steps every "
-"time one sets up an I2P server, and/or deploys a client."
-msgstr ""
-"Es wäre ziemlich lästig, zum Aufsetzen eines I2P-Servers oder -Clients "
-"jedesmal alle Befehle erneut einzugeben."
+"It would drive most people crazy, going through all these steps every time "
+"one sets up an I2P server, and/or deploys a client."
+msgstr "Es wäre ziemlich lästig, zum Aufsetzen eines I2P-Servers oder -Clients jedesmal alle Befehle erneut einzugeben."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:167
 msgid ""
@@ -607,8 +495,8 @@ msgid ""
 "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called "
 "setupServer.py which automates all this nonsense into one simple command "
 "line . But I respect that people's tastes in user interfaces differ, and "
-"trying to write something which satisfies everyone's needs usually "
-"results in something so complex that it turns into newbie-repellent."
+"trying to write something which satisfies everyone's needs usually results "
+"in something so complex that it turns into newbie-repellent."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:170
@@ -619,19 +507,17 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:173
 msgid ""
-"Also, you may want to write a script which handles the startup of the I2P"
-" Router, the eepProxy, plus any and all tunnels you are using. I've got "
-"such a script called startEverything.sh, which gets launched at system "
-"startup. (Be sure to search this site for template scripts to automate "
-"your I2P commands. If I create a page for one, I'll try to remember to "
-"link it here."
+"Also, you may want to write a script which handles the startup of the I2P "
+"Router, the eepProxy, plus any and all tunnels you are using. I've got such "
+"a script called startEverything.sh, which gets launched at system startup. "
+"(Be sure to search this site for template scripts to automate your I2P "
+"commands. If I create a page for one, I'll try to remember to link it here."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:176
-msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
-msgstr ""
-"Übung für Windows-Nutzer - setupServer.py in eine MS-DOS .BAT-Datei "
-"portieren."
+msgid ""
+"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
+msgstr "Übung für Windows-Nutzer - setupServer.py in eine MS-DOS .BAT-Datei portieren."
 
 #: i2p2www/pages/site/misc/invisiblenet.html:2
 msgid "Old Documents"
@@ -639,13 +525,11 @@ msgstr "Alte Dokumente"
 
 #: i2p2www/pages/site/misc/invisiblenet.html:5
 msgid ""
-"Following is a list of documents originally on www.invisiblenet.net/i2p/ "
-"and\n"
+"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n"
 "rescued via the\n"
 "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
 "They are quite dated and may or may not be accurate.\n"
-"However, the I2CP and I2NP documents in particular have some good "
-"information."
+"However, the I2CP and I2NP documents in particular have some good information."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:3
@@ -658,8 +542,7 @@ msgstr "Ãœbersicht"
 
 #: i2p2www/pages/site/misc/jbigi.html:7
 msgid ""
-"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a "
-"little\n"
+"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n"
 "manual work and a piece of chewing gum we have made several\n"
 "cryptography operations quite a bit faster."
 msgstr ""
@@ -673,18 +556,15 @@ msgid ""
 "<a href=\"%(func)s\">mpz_powm()</a>\n"
 "as a replacement for the\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n"
-"As modPow() is a significant computational portion of many crypto "
-"operations, this is of significant benefit."
+"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:25
 #, python-format
 msgid ""
-"The standard I2P installation includes about 20 versions of the library "
-"for different platforms,\n"
+"The standard I2P installation includes about 20 versions of the library for different platforms,\n"
 "each about 50KB, inside the jbigi.jar file.\n"
-"The initialization of the JBigI library, including CPU identification, "
-"selection, and extraction\n"
+"The initialization of the JBigI library, including CPU identification, selection, and extraction\n"
 "of the correct loadable module, is handled by the\n"
 "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n"
 "If no module is available for the current platform, the standard\n"
@@ -698,12 +578,9 @@ msgstr "JBigI kompilieren und testen"
 
 #: i2p2www/pages/site/misc/jbigi.html:39
 msgid ""
-"Following are the instructions to build a new jbigi library for your own "
-"platform\n"
+"Following are the instructions to build a new jbigi library for your own platform\n"
 "and testing its performance."
-msgstr ""
-"Nachfolgend eine Anleitung zum Kompilieren einer neuen jbigi-Bibliothek "
-"für die eigene Plattorm und zum Testen der Performance."
+msgstr "Nachfolgend eine Anleitung zum Kompilieren einer neuen jbigi-Bibliothek für die eigene Plattorm und zum Testen der Performance."
 
 #: i2p2www/pages/site/misc/jbigi.html:42
 msgid "Requirements"
@@ -712,33 +589,25 @@ msgstr "Voraussetzungen"
 #: i2p2www/pages/site/misc/jbigi.html:43
 msgid ""
 "This works on Linux, and with a few changes in build.sh probably also on\n"
-"other platforms. FreeBSD has also been reported to work too. On Kaffee "
-"the\n"
-"speedup is very small, because it already uses native BitInteger "
-"internally.\n"
+"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n"
+"speedup is very small, because it already uses native BitInteger internally.\n"
 "Blackdown seems to cause strange errors. Because you are going to do\n"
 "compilation, you need JDK; JRE won't work."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:50
 msgid ""
-"The required code is available in monotone database and the latest source"
-" tarball. "
-msgstr ""
-"Der benötigte Sourcecode ist als Monotone-Datenbank und als aktueller "
-"Tarball verfügbar."
+"The required code is available in monotone database and the latest source "
+"tarball. "
+msgstr "Der benötigte Sourcecode ist als Monotone-Datenbank und als aktueller Tarball verfügbar."
 
 #: i2p2www/pages/site/misc/jbigi.html:51
 msgid ""
 "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n"
-"included in your OS / distribution or installed already, it can be "
-"received from\n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Even if you\n"
-"have already installed it as binary, it might still be worth a try to "
-"compile\n"
-"GMP yourself, since then it will be able to use the specific instructions"
-" of\n"
+"included in your OS / distribution or installed already, it can be received from\n"
+"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n"
+"have already installed it as binary, it might still be worth a try to compile\n"
+"GMP yourself, since then it will be able to use the specific instructions of\n"
 "your processor. The latest GMP may also\n"
 "be used instead of GMP 5.0.2, but it hasn't been tested by us."
 msgstr ""
@@ -749,8 +618,7 @@ msgstr "Schritt-für-Schritt-Anweisungen"
 
 #: i2p2www/pages/site/misc/jbigi.html:63
 msgid ""
-"Look at <a href=\"http://localhost:7657/logs.jsp\">your running "
-"environment on the logs.jsp page</a>.\n"
+"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n"
 "There should be one of two status messages for JBigI - either"
 msgstr ""
 
@@ -778,35 +646,26 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:78
 msgid ""
-"Look on <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"to see what the lifetime average values for "
-"<code>crypto.elGamal.decrypt</code> and\n"
-"<code>crypto.elGamal.encrypt</code> are. The numbers are times in "
-"milliseconds. Copy these somewhere so you can compare\n"
+"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n"
+"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n"
 "them later on.\n"
 "The network average for encrypt time is about 20ms.\n"
-"If your encrypt time is less than 50ms for a relatively new processor, or"
-" less than 100ms\n"
-"for an older processor, and the native BigInteger library was loaded, you"
-" are probably fine."
+"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n"
+"for an older processor, and the native BigInteger library was loaded, you are probably fine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:87
 #, python-format
 msgid ""
 "Get the latest released source code of I2P from\n"
-"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge "
-"source\n"
+"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n"
 "out of the monotone database mtn.i2p2.de"
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:92
 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>"
-msgstr ""
-"Innerhalb des Sourcebaums in folgendes Verzeichnis wechseln: "
-"<code>core/c/jbigi</code>"
+msgstr "Innerhalb des Sourcebaums in folgendes Verzeichnis wechseln: <code>core/c/jbigi</code>"
 
 #: i2p2www/pages/site/misc/jbigi.html:93
 msgid ""
@@ -814,18 +673,14 @@ msgid ""
 "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n"
 "Use the 'dynamic' argument to build.sh.\n"
 "Otherwise, you must download GMP version 5.0.2 from\n"
-"from <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"saving it to gmp-5.0.2.tar.bz2.\n"
-"If you decide to use a newer version, change the VER= line in "
-"<code>core/c/jbigi/build.sh</code>."
+"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n"
+"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:101
 msgid ""
 "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n"
-"environment variable is set and you are using Linux then it might just "
-"work.\n"
+"environment variable is set and you are using Linux then it might just work.\n"
 "Otherwise change the settings. Remember, you need the Java SDK installed."
 msgstr ""
 
@@ -833,17 +688,13 @@ msgstr ""
 msgid ""
 "Run <code>build.sh</code> (if you downloaded GMP) or\n"
 "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n"
-"Maybe the build spewed out some errors of missing jni.h and jni_md.h "
-"files.\n"
-"Either copy these files from your java install into the "
-"core/c/jbigi/jbigi/include/ directory,\n"
+"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n"
+"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n"
 "or fix $JAVA_HOME.<br>\n"
-"You can run the <code>build.sh</code> from the <code>core/c/</code> "
-"directory which will\n"
+"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n"
 "build all available jbigi libs into a jbigi.jar.</br>\n"
 "A file named <code>libjbigi.so</code> should be created in the current\n"
-"directory. If this doesn't happen and/or you get errors then please "
-"report\n"
+"directory. If this doesn't happen and/or you get errors then please report\n"
 "them."
 msgstr ""
 
@@ -871,11 +722,8 @@ msgstr "Starten Sie Ihre I2P-Programme neu."
 
 #: i2p2www/pages/site/misc/jbigi.html:131
 msgid ""
-"On <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"the <code>crypto.elGamal.decrypt</code> and "
-"<code>crypto.elGamal.encrypt</code>\n"
+"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n"
 "should be a lot faster."
 msgstr ""
 
@@ -885,21 +733,16 @@ msgstr "Jrandom´s Ankündigung"
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:4
 msgid ""
-"The following message was received in mid-November 2007. We have no "
-"further information\n"
+"The following message was received in mid-November 2007. We have no further information\n"
 "on jrandom's status."
-msgstr ""
-"Die folgende Nachricht wurde Mitte November 2007 empfangen. Wir haben "
-"keine weitere Information\n"
-"über Jrandom´s Status."
+msgstr "Die folgende Nachricht wurde Mitte November 2007 empfangen. Wir haben keine weitere Information\nüber Jrandom´s Status."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:9
 #, python-format
 msgid ""
 "Subsequently, in an unrelated incident, the hosting company for\n"
 "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n"
-"on January 13, 2008, and the i2p.net servers did not fully return to "
-"service.\n"
+"on January 13, 2008, and the i2p.net servers did not fully return to service.\n"
 "As only jrandom has the credentials required to restore service,\n"
 "and he could not be contacted,\n"
 "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n"
@@ -911,10 +754,7 @@ msgstr ""
 msgid ""
 "Approximately two months later, for unrelated reasons,\n"
 "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>."
-msgstr ""
-"Etwa zwei Monate später wurde\n"
-"forum.i2p.net aus ganz anderen Gründen nach <a "
-"href=\"http://%(forum)s/\">%(forum)s</a> verschoben."
+msgstr "Etwa zwei Monate später wurde\nforum.i2p.net aus ganz anderen Gründen nach <a href=\"http://%(forum)s/\">%(forum)s</a> verschoben."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:2
 #: i2p2www/pages/site/misc/manual-wrapper.html:4
@@ -924,33 +764,24 @@ msgstr "Java-Wrapper manuell installieren"
 #: i2p2www/pages/site/misc/manual-wrapper.html:6
 #, python-format
 msgid ""
-"The installation package for the <a href=\"%(downloads)s\">I2P router</a>"
-" comes\n"
-"with a Java wrapper for the most common architectures. If your system is "
-"not\n"
-"supported by our installer&mdash;or if you want to update the wrapper to "
-"a\n"
-"newer version&mdash;the following steps describe installing the wrapper "
-"manually."
+"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n"
+"with a Java wrapper for the most common architectures. If your system is not\n"
+"supported by our installer&mdash;or if you want to update the wrapper to a\n"
+"newer version&mdash;the following steps describe installing the wrapper manually."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:14
 msgid ""
-"Check Tanuki Software's <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download"
-" page</a>\n"
+"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n"
 "for your platform. Is your platform listed? If so, you're in\n"
-"luck! Download the most recent version of the Community Edition for your "
-"OS and\n"
+"luck! Download the most recent version of the Community Edition for your OS and\n"
 "CPU and move to <a href=\"#packaged\">the next step</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:20
 msgid ""
-"If your platform does not have an already compiled wrapper available, you"
-"\n"
-"may be able to compile it yourself. If you are willing to have a go at "
-"it, move\n"
+"If your platform does not have an already compiled wrapper available, you\n"
+"may be able to compile it yourself. If you are willing to have a go at it, move\n"
 "on to <a href=\"#compiling\">compiling</a> the wrapper for your system."
 msgstr ""
 
@@ -959,7 +790,8 @@ msgid "Using existing binaries"
 msgstr "Vorhandene Binärdateien verwenden"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:28
-msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>."
+msgid ""
+"In the steps below, $I2P means <em>the location I2P was installed to</em>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:36
@@ -970,18 +802,14 @@ msgstr ""
 #: i2p2www/pages/site/misc/manual-wrapper.html:37
 #: i2p2www/pages/site/misc/manual-wrapper.html:65
 msgid "<code>tail -f /tmp/wrapper.log</code> and look for any problems."
-msgstr ""
-"Mit <code>tail -f /tmp/wrapper.log</code> schauen, ob es dabei Probleme "
-"gibt."
+msgstr "Mit <code>tail -f /tmp/wrapper.log</code> schauen, ob es dabei Probleme gibt."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:39
 #: i2p2www/pages/site/misc/manual-wrapper.html:67
 msgid ""
-"If this did not work you'll need to use <code>runplain.sh</code> to start"
-" I2P."
-msgstr ""
-"Wenn das nicht funktioniert braucht man <code>runplain.sh</code> zum "
-"Starten von I2P."
+"If this did not work you'll need to use <code>runplain.sh</code> to start "
+"I2P."
+msgstr "Wenn das nicht funktioniert braucht man <code>runplain.sh</code> zum Starten von I2P."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:43
 msgid "Compiling from source"
@@ -989,16 +817,15 @@ msgstr "Aus dem Quellcode kompilieren"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:44
 msgid ""
-"These steps worked to compile the wrapper for use on a mipsel system "
-"running Debian. The steps <strong>will</strong> need to be altered for "
-"your system."
+"These steps worked to compile the wrapper for use on a mipsel system running"
+" Debian. The steps <strong>will</strong> need to be altered for your system."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:48
 msgid ""
-"Download the source archive for the community version of the wrapper from"
-" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download"
-" page</a>."
+"Download the source archive for the community version of the wrapper from <a"
+" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download "
+"page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:49
@@ -1007,19 +834,15 @@ msgstr "Tar-Archiv extrahieren"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:51
 msgid ""
-"Set environment variables <code>ANT_HOME</code> and "
-"<code>JAVA_HOME</code>. For example, in Debian:"
-msgstr ""
-"Man setze die ENV-Variablen <code>ANT_HOME</code> und "
-"<code>JAVA_HOME</code>. In Debian geht das z.B. so:"
+"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. "
+"For example, in Debian:"
+msgstr "Man setze die ENV-Variablen <code>ANT_HOME</code> und <code>JAVA_HOME</code>. In Debian geht das z.B. so:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:54
 msgid ""
 "Since there isn't a Makefile for Mipsel, we'll make a copy of an already "
 "existing makefile:"
-msgstr ""
-"Da es für Mipsel kein Makefile gibt, kann man eines anderes Makefile "
-"kopieren."
+msgstr "Da es für Mipsel kein Makefile gibt, kann man eines anderes Makefile kopieren."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:56
 msgid "Now we can attempt to compile the wrapper:"
@@ -1027,9 +850,7 @@ msgstr "Jetzt kann man versuchen, den Wrapper zu kompilieren:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:57
 msgid "use <code>./build64.sh</code> if you have a 64bit CPU and JVM"
-msgstr ""
-"Das Skript <code>./build64.sh</code> verwenden wenn man eine 64bit-CPU "
-"and -JVM benutzt"
+msgstr "Das Skript <code>./build64.sh</code> verwenden wenn man eine 64bit-CPU and -JVM benutzt"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:58
 msgid "Copy the wrapper into its proper place:"
@@ -1053,164 +874,110 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:47
 msgid ""
-"An optimized form, designed to handle only 128KB [1] files and pages, can"
-"\n"
+"An optimized form, designed to handle only 128KB [1] files and pages, can\n"
 "operate significantly faster:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:71
 msgid ""
 "The difference in network load and latency is significant - this is\n"
-"essentially a UDP version of HTTP.  On the normal web, we can't really do"
-" that,\n"
-"since most HTTP requests and responses are orders of magnitude larger "
-"than UDP\n"
-"packets functionally support, but in I2P, messages can be large.  The "
-"savings\n"
-"for the network load comes from the fact that we don't need to send any "
-"ACK\n"
+"essentially a UDP version of HTTP.  On the normal web, we can't really do that,\n"
+"since most HTTP requests and responses are orders of magnitude larger than UDP\n"
+"packets functionally support, but in I2P, messages can be large.  The savings\n"
+"for the network load comes from the fact that we don't need to send any ACK\n"
 "messages - rather than the earlier wrap/unwrap request (that bundles a\n"
-"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery),"
-" the\n"
-"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there"
-" are no\n"
+"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n"
+"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n"
 "resends)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:83
 msgid ""
-"The data that the MinWWW proxy and server need to wrap is trivial - when "
-"the\n"
-"proxy wants to send \"GET /\", it prepends it with the I2P Destination "
-"sending\n"
-"the request, followed by a 4 byte request ID.  The MinWWW server receives"
-" those\n"
-"requests, contacts the appropriate HTTPD, sends the request, waits for "
-"the\n"
+"The data that the MinWWW proxy and server need to wrap is trivial - when the\n"
+"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n"
+"the request, followed by a 4 byte request ID.  The MinWWW server receives those\n"
+"requests, contacts the appropriate HTTPD, sends the request, waits for the\n"
 "response, and sends a reply to the MinWWW proxy containing the response,\n"
-"prefixed with the original request ID.  That response is taken and passed"
-" back\n"
+"prefixed with the original request ID.  That response is taken and passed back\n"
 "to the browser and the connection is closed."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:93
 msgid ""
 "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n"
-"list, going through some round robin or other algorithm, so that there "
-"are\n"
-"multiple outproxies merged transparently.  The bandwidth required for "
-"running\n"
-"one of these outproxies is also greatly reduced, since it will only "
-"handle 128KB\n"
+"list, going through some round robin or other algorithm, so that there are\n"
+"multiple outproxies merged transparently.  The bandwidth required for running\n"
+"one of these outproxies is also greatly reduced, since it will only handle 128KB\n"
 "files (aka no one is going to be downloading porn, warez, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:101
 msgid ""
-"The functionality /is/ limited, but 128KB of data is a lot for a single "
-"HTTP\n"
-"request or response.  The above diagrams are also unrealistic in their "
-"hops -\n"
-"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send "
-"each\n"
-"of the messages through two additional outbound routers, then forwarded "
-"to\n"
-"two additional inbound routers to ROUTERB, so the lag there is "
-"significant -\n"
-"while the above only saves 11 steps, 8 of those steps need to traverse "
-"the\n"
-"entire tunnel path (4+ remote hops each time when tunnels are 2 remote "
-"hops\n"
-"in each stretch), leaving MinWWW with only two full traversals (one for "
-"the\n"
+"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n"
+"request or response.  The above diagrams are also unrealistic in their hops -\n"
+"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send each\n"
+"of the messages through two additional outbound routers, then forwarded to\n"
+"two additional inbound routers to ROUTERB, so the lag there is significant -\n"
+"while the above only saves 11 steps, 8 of those steps need to traverse the\n"
+"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n"
+"in each stretch), leaving MinWWW with only two full traversals (one for the\n"
 "request, one for the response), instead of 10."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:113
 msgid ""
-"Implementing the MinWWW proxy and server should be fairly easy - read an "
-"HTTP\n"
-"request from the client fully (perhaps only start out with HTTP GET, "
-"leaving\n"
-"HTTP POST for later), wrap the message, and wait for the response.  The "
-"server\n"
-"in turn simply needs to parse the request to either open a socket or URL,"
-"\n"
-"send the request, wait for the response, and send it back through the "
-"network.\n"
+"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n"
+"request from the client fully (perhaps only start out with HTTP GET, leaving\n"
+"HTTP POST for later), wrap the message, and wait for the response.  The server\n"
+"in turn simply needs to parse the request to either open a socket or URL,\n"
+"send the request, wait for the response, and send it back through the network.\n"
 "If someone were to implement this, it would be Good :)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:122
 msgid ""
-"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary "
-"message\n"
-"size, but that's going to be going away since it involves either "
-"excessive memory\n"
-"overhead on intermediary routers, or additional implementation details to"
-"\n"
-"handle.  I2PTunnel is currently limited to 128KB and hasn't been a "
-"burden,\n"
+"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary message\n"
+"size, but that's going to be going away since it involves either excessive memory\n"
+"overhead on intermediary routers, or additional implementation details to\n"
+"handle.  I2PTunnel is currently limited to 128KB and hasn't been a burden,\n"
 "so perhaps it could be increased to 256KB when the I2CP spec is updated)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:4
 msgid ""
-"There has been discussion about a distributed blogging application for a "
-"few\n"
-"months now called \"MyI2P\".  While the original discussions were lost, "
-"we were \n"
-"able to retrieve a Google <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
-"of it.  It isn't pretty, but it includes the basic overview and some "
-"discussion\n"
+"There has been discussion about a distributed blogging application for a few\n"
+"months now called \"MyI2P\".  While the original discussions were lost, we were \n"
+"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
+"of it.  It isn't pretty, but it includes the basic overview and some discussion\n"
 "that ensued."
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:12
 #, python-format
 msgid ""
-"The application itself is not yet implemented, and the ideas behind it "
-"have \n"
-"been made less ambitious over time, but they are still valid and the "
-"current \n"
-"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality "
-"available \n"
-"along side the I2P 1.0 release.  That will include a distributed address "
-"book\n"
-"to enable secure, distributed, and human readable naming by sacrificing "
-"the \n"
-"need for global uniqueness - basically everyone has their own local "
-"address book \n"
-"and can 'subscribe' to other people's address books, letting MyI2P "
-"periodically\n"
-"retrieve new name to destination mappings (leaving conflicts up to the "
-"user to\n"
-"resolve).  In addition to the address book, there will be a distributed "
-"blogging\n"
+"The application itself is not yet implemented, and the ideas behind it have \n"
+"been made less ambitious over time, but they are still valid and the current \n"
+"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n"
+"along side the I2P 1.0 release.  That will include a distributed address book\n"
+"to enable secure, distributed, and human readable naming by sacrificing the \n"
+"need for global uniqueness - basically everyone has their own local address book \n"
+"and can 'subscribe' to other people's address books, letting MyI2P periodically\n"
+"retrieve new name to destination mappings (leaving conflicts up to the user to\n"
+"resolve).  In addition to the address book, there will be a distributed blogging\n"
 "system using a reduced and secured subset of \n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to "
-"essentially\n"
-"provide an anonymous <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
-"a 'friends list' and transparent access control (authenticated by the I2P"
-"\n"
-"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the "
-"address book)."
+"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n"
+"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
+"a 'friends list' and transparent access control (authenticated by the I2P\n"
+"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:29
 msgid ""
-"Additional functionality, such as integration with a DHT backing store or"
-" \n"
-"swarming file transfers for 'attachments' can be added later.  Email may "
-"or may\n"
-"not get in the first pass either, though its implementation is "
-"essentially just\n"
-"a blog entry with private access, so perhaps some UI designer can come up"
-" with\n"
-"something.  Exporting the data to RSS or access through ATOM will be an "
-"option \n"
+"Additional functionality, such as integration with a DHT backing store or \n"
+"swarming file transfers for 'attachments' can be added later.  Email may or may\n"
+"not get in the first pass either, though its implementation is essentially just\n"
+"a blog entry with private access, so perhaps some UI designer can come up with\n"
+"something.  Exporting the data to RSS or access through ATOM will be an option \n"
 "down the road as well."
 msgstr ""
 
@@ -1225,11 +992,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/ratestats.html:7
 msgid ""
-"The list was gathered using the following command in the top directory of"
-" the branch i2p.i2p:"
-msgstr ""
-"Die Liste wurde erstellt mit dem folgenden Kommando aus dem obersten "
-"Verzeichnis des Branches i2p.i2p:"
+"The list was gathered using the following command in the top directory of "
+"the branch i2p.i2p:"
+msgstr "Die Liste wurde erstellt mit dem folgenden Kommando aus dem obersten Verzeichnis des Branches i2p.i2p:"
 
 #: i2p2www/pages/site/misc/ratestats.html:10
 msgid "All options aren't needed, but it works."
@@ -1243,36 +1008,17 @@ msgid ""
 "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n"
 "on monotone.\n"
 "See\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p "
-"monotone</a>\n"
-"for more information on how to get started and check out the source "
-"anonymously.\n"
+"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n"
+"for more information on how to get started and check out the source anonymously.\n"
 "There is also a quick-start guide on the\n"
 "<a href=\"%(newdevs)s\">new developer's page</a>."
-msgstr ""
-"Der Quellcode von I2P wird in mehreren verteilten Monotone-Repositories "
-"vorgehalten.\n"
-"Siehe\n"
-"<a href=\"http://www.monotone.ca/\">Monotone-Webseite</a> für "
-"Informationen\n"
-"zu Monotone.\n"
-"Siehe\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">diesen Foreneintrag zu "
-"I2P auf Monotone</a>\n"
-"für weitere Informationen wie man einsteigen und den Quellcode anonym "
-"auschecken kann.\n"
-"Es gibt außerdem eine Schnellstart-Anleitung auf der\n"
-"<a href=\"%(newdevs)s\">neuen Entwickler-Seite</a>."
+msgstr "Der Quellcode von I2P wird in mehreren verteilten Monotone-Repositories vorgehalten.\nSiehe\n<a href=\"http://www.monotone.ca/\">Monotone-Webseite</a> für Informationen\nzu Monotone.\nSiehe\n<a href=\"http://%(forum)s/viewtopic.php?t=2524\">diesen Foreneintrag zu I2P auf Monotone</a>\nfür weitere Informationen wie man einsteigen und den Quellcode anonym auschecken kann.\nEs gibt außerdem eine Schnellstart-Anleitung auf der\n<a href=\"%(newdevs)s\">neuen Entwickler-Seite</a>."
 
 #: i2p2www/pages/site/misc/transition-guide.html:16
 msgid ""
-"If you want to get the source non-anonymously, pull from the public "
-"server mtn.welterde.de.\n"
+"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n"
 "The i2p source code branch is \"i2p.i2p\"."
-msgstr ""
-"Um den Quellcode nicht-anonym zu laden, kann man vom öffentlichen Server "
-"mtn.welterde.de einen Pull-Request machen.\n"
-"Der Branch vom I2P-Quellcode ist \"i2p.i2p\"."
+msgstr "Um den Quellcode nicht-anonym zu laden, kann man vom öffentlichen Server mtn.welterde.de einen Pull-Request machen.\nDer Branch vom I2P-Quellcode ist \"i2p.i2p\"."
 
 #: i2p2www/pages/site/misc/transition-guide.html:21
 msgid "Guide"
@@ -1299,24 +1045,20 @@ msgid ""
 "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n"
 "we do not have his update signing key or access to\n"
 "www.i2p[.net] or dev.i2p[.net].\n"
-"Complication and zzz have generated new signing keys, and they and Amiga "
-"are providing\n"
-"update file hosting. These changes must be configured in your router to "
-"take effect."
+"Complication and zzz have generated new signing keys, and they and Amiga are providing\n"
+"update file hosting. These changes must be configured in your router to take effect."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17
 msgid ""
-"Make the following configuration changes and your router will "
-"automatically install\n"
+"Make the following configuration changes and your router will automatically install\n"
 "the latest release."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22
 #, python-format
 msgid ""
-"We recommend the automated process as it will verify the key of the "
-"signed update file.\n"
+"We recommend the automated process as it will verify the key of the signed update file.\n"
 "If you do not make these changes,\n"
 "you may manually download the i2pupdate.zip file from\n"
 "<a href=\"%(downloads)s\">the download page</a>."
@@ -1329,11 +1071,9 @@ msgstr "Nachrichten-URL ändern zu: %(url)s"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38
 msgid ""
-"Select ONE of the following new Update URLs at random and enter it into "
-"the Update URL box: "
-msgstr ""
-"Wähle EINE der folgenden neuen Aktualisierungs-URLs zufällig aus und gebe"
-" sie in das Feld für die Aktualisierungs-URL ein:"
+"Select ONE of the following new Update URLs at random and enter it into the "
+"Update URL box: "
+msgstr "Wähle EINE der folgenden neuen Aktualisierungs-URLs zufällig aus und gebe sie in das Feld für die Aktualisierungs-URL ein:"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43
 msgid "Check the box \"Update through the eepProxy?\""
@@ -1354,8 +1094,7 @@ msgstr "Klicken Sie auf \"Ãœbernehmen\""
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58
 msgid ""
 "You are now ready to automatically receive the release update file,\n"
-"either by setting your update policy to \"download and install\" or by "
-"clicking on the\n"
+"either by setting your update policy to \"download and install\" or by clicking on the\n"
 "\"update available\" link when it appears."
 msgstr ""
 
@@ -1364,7 +1103,5 @@ msgstr ""
 msgid ""
 "If you would like to verify the trusted update keys, they are also\n"
 "<a href=\"%(url)s\">posted and signed here</a>.\n"
-"Thank you for your support during this transition. For help please "
-"contact us on #i2p."
+"Thank you for your support during this transition. For help please contact us on #i2p."
 msgstr ""
-
diff --git a/i2p2www/translations/el/LC_MESSAGES/about.po b/i2p2www/translations/el/LC_MESSAGES/about.po
index 81602fdefd9a5418e3d1c53cec775822c151a37f..dfc8e601b737137a9ebb6102a0b046d32de03b2a 100644
--- a/i2p2www/translations/el/LC_MESSAGES/about.po
+++ b/i2p2www/translations/el/LC_MESSAGES/about.po
@@ -1,23 +1,24 @@
-# Greek translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # LaScapigliata <ditri2000@hotmail.com>, 2015
 # anvo <fragos.george@hotmail.com>, 2020
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: Elektra M. <safiragon@yahoo.gr>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: anvo <fragos.george@hotmail.com>, 2020\n"
 "Language-Team: Greek (http://www.transifex.com/otf/I2P/language/el/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: el\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -27,15 +28,9 @@ msgstr "Εναλλακτικοί πελάτες/προγράμματα Ι2Ρ"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
-msgstr ""
-"Η κύρια υλοποίηση του πελάτη/προγράμματος Ι2Ρ χρησιμοποιεί Java. Αν για "
-"κάποιον\n"
-"λόγο δεν μπορείτε να χρησιμοποιήσετε την Java στην συσκευή σας υπάρχουν "
-"εναλλακτικές υλοποιήσεις\n"
-"που αναπτύσσονται από μέλη της κοινότητας."
+msgstr "Η κύρια υλοποίηση του πελάτη/προγράμματος Ι2Ρ χρησιμοποιεί Java. Αν για κάποιον\nλόγο δεν μπορείτε να χρησιμοποιήσετε την Java στην συσκευή σας υπάρχουν εναλλακτικές υλοποιήσεις\nπου αναπτύσσονται από μέλη της κοινότητας."
 
 #: i2p2www/pages/site/about/alternative-clients.html:12
 #, python-format
@@ -43,34 +38,21 @@ msgid ""
 "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n"
 "As of early 2016, i2pd is became stable enough to be used in \n"
 "production, and since summer 2016 it fully implements all I2P APIs."
-msgstr ""
-"Το <a href=\"%(i2pd)s\">i2pd</a> είναι μια υλοποίηση προγράμματος/πελάτη "
-"του Ι2Ρ σε C++.\n"
-"Από τις αρχές του 2016 το i2pd έγινε αρκετά σταθερό ώστε να "
-"χρησιμοποιείται στην\n"
-"παραγωγή και από το καλοκαίρι του 2016 εφαρμόζει πλήρως όλα τα ΑΡΙ του "
-"Ι2Ρ."
+msgstr "Το <a href=\"%(i2pd)s\">i2pd</a> είναι μια υλοποίηση προγράμματος/πελάτη του Ι2Ρ σε C++.\nΑπό τις αρχές του 2016 το i2pd έγινε αρκετά σταθερό ώστε να χρησιμοποιείται στην\nπαραγωγή και από το καλοκαίρι του 2016 εφαρμόζει πλήρως όλα τα ΑΡΙ του Ι2Ρ."
 
 #: i2p2www/pages/site/about/alternative-clients.html:19
 #, python-format
 msgid ""
 "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero "
 "cryptocurrency."
-msgstr ""
-"Το <a href=\"%(kovri)s\">Kovri</a> είναι ένας ενεργός κλάδος ανάπτυξης "
-"του i2pd για το κρυπτονόμισμα Monero."
+msgstr "Το <a href=\"%(kovri)s\">Kovri</a> είναι ένας ενεργός κλάδος ανάπτυξης του i2pd για το κρυπτονόμισμα Monero."
 
 #: i2p2www/pages/site/about/alternative-clients.html:24
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
-msgstr ""
-"Το <a href=\"%(go_i2p)s\">Go-I2P</a> είναι ένα πρόγραμμα/πελάτης Ι2Ρ που "
-"αναπτύσσεται με την χρήση της\n"
-"γλώσσας προγραμματισμού <a href=\"%(golang)s\">Go</a>. Το έργο αυτό είναι"
-" σε αρχικό στάδιο ανάπτυξης. "
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
+msgstr "Το <a href=\"%(go_i2p)s\">Go-I2P</a> είναι ένα πρόγραμμα/πελάτης Ι2Ρ που αναπτύσσεται με την χρήση της\nγλώσσας προγραμματισμού <a href=\"%(golang)s\">Go</a>. Το έργο αυτό είναι σε αρχικό στάδιο ανάπτυξης. "
 
 #: i2p2www/pages/site/about/browser-config.html:2
 msgid "Web Browser Configuration"
@@ -82,24 +64,158 @@ msgstr "Γλωσσάρι"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
 
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
+
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -109,15 +225,14 @@ msgstr ""
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -131,12 +246,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -146,13 +257,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -161,15 +272,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -178,28 +289,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -208,36 +318,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -246,13 +355,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -261,15 +370,11 @@ msgstr "Συγκρίσεις"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -288,9 +393,8 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -347,8 +451,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -367,8 +470,7 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
 msgstr ""
 
@@ -377,8 +479,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:76
@@ -391,8 +492,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
@@ -401,8 +501,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:95
@@ -410,8 +510,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -426,15 +525,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -446,8 +543,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -502,16 +598,14 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
@@ -520,11 +614,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:189
@@ -577,16 +669,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
 msgstr ""
@@ -602,12 +692,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -621,35 +708,29 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -658,16 +739,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -684,11 +763,57 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -697,18 +822,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -719,84 +841,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -807,8 +906,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -816,27 +914,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -844,26 +938,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -874,10 +959,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -885,18 +968,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -907,10 +987,8 @@ msgstr ""
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
 msgstr ""
@@ -1082,7 +1160,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1322,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1372,32 +1452,25 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1415,8 +1488,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1455,10 +1528,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1472,15 +1543,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1489,11 +1556,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1548,8 +1612,7 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1567,15 +1630,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1594,14 +1653,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1612,20 +1667,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1636,24 +1684,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1673,33 +1712,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -1712,32 +1742,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -1747,27 +1769,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -1784,17 +1798,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -1807,8 +1818,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -1819,10 +1829,8 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -1841,30 +1849,23 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -1878,55 +1879,40 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -1937,20 +1923,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -1961,16 +1940,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -1980,17 +1954,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -2001,20 +1972,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2028,26 +1992,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2056,18 +2010,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2075,16 +2023,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2100,52 +2043,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2160,102 +2084,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2268,4 +2151,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/el/LC_MESSAGES/get-involved.po b/i2p2www/translations/el/LC_MESSAGES/get-involved.po
index 6410e2c334d011a348d9f7a6727f8c715ace6119..3a900cb6c962b70222a8606b58b8db5781ac28a4 100644
--- a/i2p2www/translations/el/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/el/LC_MESSAGES/get-involved.po
@@ -1,22 +1,23 @@
-# Greek translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # LaScapigliata <ditri2000@hotmail.com>, 2015
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:56+0000\n"
-"Last-Translator: george k <norhorn@gmail.com>\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: LaScapigliata <ditri2000@hotmail.com>, 2015\n"
 "Language-Team: Greek (http://www.transifex.com/otf/I2P/language/el/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: el\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -31,12 +32,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -51,44 +49,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -127,10 +114,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -160,10 +145,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -178,25 +161,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -222,8 +195,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -237,12 +209,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -253,10 +222,8 @@ msgstr "Μετάφραση"
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
 msgstr ""
@@ -267,17 +234,12 @@ msgstr "Τεκμηρίωση"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -288,16 +250,11 @@ msgstr "Δοκιμάζει"
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -310,14 +267,10 @@ msgstr "Υπηρεσίες"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -327,9 +280,9 @@ msgstr "Ανατροφοδότηση"
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -373,8 +326,7 @@ msgstr "Ανάλυση"
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -382,7 +334,7 @@ msgstr ""
 msgid "Roadmap"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/roadmap.html:309
+#: i2p2www/pages/site/get-involved/roadmap.html:210
 #, python-format
 msgid ""
 "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info "
@@ -443,84 +395,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -529,17 +458,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -547,29 +471,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -577,42 +495,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -656,72 +565,52 @@ msgstr ""
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -731,8 +620,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -745,33 +634,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -792,76 +675,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -871,25 +735,18 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -900,29 +757,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -932,10 +781,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -943,13 +790,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -960,43 +804,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1011,28 +848,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1043,8 +872,7 @@ msgstr "Αφαιρέθηκε"
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1058,8 +886,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1078,14 +905,10 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1094,17 +917,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1114,8 +934,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1137,32 +956,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1171,47 +983,39 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1223,12 +1027,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1253,8 +1054,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1273,8 +1074,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1303,20 +1103,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1388,8 +1184,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1402,24 +1197,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1429,22 +1215,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1480,21 +1258,16 @@ msgstr ""
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1518,10 +1291,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1532,8 +1303,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1546,10 +1316,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1559,7 +1327,8 @@ msgid "Release Signing Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1580,7 +1349,8 @@ msgid "Download PGP public key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1588,13 +1358,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1602,7 +1373,8 @@ msgid "Security GPG Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1611,8 +1383,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1644,35 +1415,28 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1680,29 +1444,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1729,12 +1487,10 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1744,10 +1500,8 @@ msgstr "Κοινότητα"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1769,8 +1523,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1778,13 +1532,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1793,8 +1548,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1808,34 +1562,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1845,61 +1593,49 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1926,20 +1662,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1948,14 +1683,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1965,12 +1700,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1990,8 +1726,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2018,12 +1753,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2042,22 +1774,22 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2074,8 +1806,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2092,14 +1824,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2178,34 +1910,26 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2215,20 +1939,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2245,22 +1965,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2272,10 +1989,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2285,38 +2000,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2334,23 +2041,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2364,11 +2065,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2379,34 +2077,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2419,18 +2110,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2444,16 +2131,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2473,67 +2158,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2557,8 +2232,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2574,44 +2249,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2619,8 +2284,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2629,64 +2293,59 @@ msgid "New Developer's Guide"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:6
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:32
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:31
 msgid "Basic study"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:7
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:46
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:45
 msgid "Getting the I2P code"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:9
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:52
 msgid "The new way: Git"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:10
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:11
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81
-msgid "The old way: Monotone"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:145
 msgid "Building I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:166
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:102
 msgid "Development ideas"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:174
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:110
 msgid "Making the results available"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:196
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
 msgid "Get to know us!"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:202
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
 msgid "Translations"
 msgstr "Μεταφράσεις"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:17
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:208
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
 msgid "Tools"
 msgstr "Εργαλεία"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:22
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:21
 msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:26
 #, python-format
 msgid ""
 "\n"
@@ -2694,42 +2353,34 @@ msgid ""
 "Try <a href=\"%(volunteer)s\">getting involved</a> first."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:34
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:38
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:37
 #, python-format
 msgid ""
 "Study the <a href=\"%(intro)s\">how intro</a>,\n"
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:47
 msgid ""
 "For development on the I2P router or the embedded applications,\n"
 "there are two ways to get the source code:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
-msgid "The easy way: Git"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:55
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"For the time being, issues are still being manged on <a "
-"href=\"%(trac)s\">trac</a>."
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
+"issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:58
@@ -2742,143 +2393,31 @@ msgstr ""
 msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:84
-msgid ""
-"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n"
-"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to "
-"the source code (and for a lot of complicated things, but 'keeping track "
-"of changes' is the basic idea)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:89
-msgid ""
-"Skim over the <a "
-"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>,"
-" to make sure you understand the concepts."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:93
-msgid ""
-"If you want to remain anonymous, you need to do an additional step, to "
-"set up a connection to a monotone server over I2P:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
-#, python-format
-msgid ""
-"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port "
-"8998 pointing to mtn.i2p-projekt.i2p."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
-msgid ""
-"Pick a directory where you want to put all your I2P files, and create a "
-"monotone database:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
-msgid ""
-"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or"
-" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the "
-"following contents:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> "
-"into a new file (e.g. <code>keys.txt</code>) in the same directory\n"
-"  that <code>i2p.mtn</code> is in. Import the keys into your database "
-"with <br><code><pre>      mtn -d i2p.mtn read < keys.txt</pre></code>"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
-msgid ""
-"Pull the I2P sources to your machine. This may take a long time, "
-"especially if you are doing this over I2P!"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
-msgid "Anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
-msgid "Non-anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
-msgid ""
-"All the sources are now present on your machine, in the database file. To"
-" make them available in a directory, you need to check them out:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:125
-msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the "
-"I2P sources."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
-msgid "Remarks"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
-msgid ""
-"\n"
-"To download the website files instead of the I2P source files, use "
-"'i2p.www' instead of 'i2p.i2p'."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:133
-msgid ""
-"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it"
-" left off.\n"
-"If you are in a hurry, use the non-anonymous access."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
-#, python-format
-msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on <a"
-" href=\"%(viewmtn)s\">viewmtn</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:141
-#, python-format
-msgid ""
-"A long explanation about using monotone is available on the <a "
-"href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:147
-#, python-format
-msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:155
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:91
 msgid ""
 "To build or work on console translations, you need\n"
 "the xgettext, msgfmt, and msgmerge tools from the\n"
 "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:161
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
 #, python-format
 msgid ""
 "For development on new applications,\n"
 "see the <a href=\"%(apps)s\">application development guide</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:167
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
 #, python-format
 msgid ""
 "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n"
@@ -2887,93 +2426,42 @@ msgid ""
 "for ideas."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:176
-#, python-format
-msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:181
-msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:184
-msgid "use an empty passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:185
-msgid "enter a passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:186
-#, python-format
-msgid ""
-"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get "
-"push privileges"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:187
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get "
-"commit privileges - not required for website"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:188
-msgid "check in with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:189
-msgid "push with this key"
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:191
-#, python-format
-msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:197
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:203
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:209
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:217
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -2993,11 +2481,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3012,10 +2498,8 @@ msgstr ""
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3035,12 +2519,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3051,27 +2532,23 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
 msgstr ""
 
@@ -3087,10 +2564,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3108,8 +2583,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
 msgstr ""
 
@@ -3122,19 +2596,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3142,15 +2612,13 @@ msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3159,8 +2627,8 @@ msgstr "Συχνές ερωτήσεις"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3176,67 +2644,65 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3261,10 +2727,8 @@ msgstr "Επισκόπηση"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3273,21 +2737,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3310,8 +2770,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3321,18 +2780,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3342,10 +2796,8 @@ msgstr "Πολιτική Προστασίας Προσωπικών Δεδομέ
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3354,17 +2806,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3373,10 +2823,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3387,18 +2835,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr ""
-
diff --git a/i2p2www/translations/es/LC_MESSAGES/about.po b/i2p2www/translations/es/LC_MESSAGES/about.po
index 55a8b0003c3ef161f36217364ffd6faac1576cfa..c9a10894bb06aa0ee8ee1c6a55ef79ff35dd6a4b 100644
--- a/i2p2www/translations/es/LC_MESSAGES/about.po
+++ b/i2p2www/translations/es/LC_MESSAGES/about.po
@@ -1,31 +1,34 @@
-# Spanish translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Adolfo Jayme-Barrientos, 2013
-# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04
-# <454cc45058db9632179dc8079c0c1af3_5311>, 2013
+# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013
 # m1xxy <m1xxy@mail.i2p>, 2011
 # Oliver Trash <oliver.trasshh@gmail.com>, 2013
+# Oliver Trash <oliver.trasshh@gmail.com>, 2013
 # strel, 2013
 # strel, 2013-2018
+# strel, 2013
 # trolly, 2013
 # trolly <translatortr@i2pmail.org>, 2013
 # fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
+# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: str4d <str4d@i2pmail.org>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: strel, 2013-2018\n"
 "Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: es\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -35,13 +38,9 @@ msgstr "Clientes I2P alternativos"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
-msgstr ""
-"La principal implementación de cliente I2P usa Java. Si por alguna\n"
-"razón no puede usar Java en su dispositivo, hay implementaciones\n"
-"alternativas desarrolladas por los miembros de la comunidad."
+msgstr "La principal implementación de cliente I2P usa Java. Si por alguna\nrazón no puede usar Java en su dispositivo, hay implementaciones\nalternativas desarrolladas por los miembros de la comunidad."
 
 #: i2p2www/pages/site/about/alternative-clients.html:12
 #, python-format
@@ -49,34 +48,21 @@ msgid ""
 "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n"
 "As of early 2016, i2pd is became stable enough to be used in \n"
 "production, and since summer 2016 it fully implements all I2P APIs."
-msgstr ""
-"<a href=\"%(i2pd)s\">i2pd</a> es una implementación de cliente I2P en "
-"C++.\n"
-"Desde principios de 2016, i2pd se ha vuelto lo suficientemente estable "
-"para ser usado en \n"
-"producción, y desde el verano de 2016 implementa todas las APIs de I2P "
-"por completo."
+msgstr "<a href=\"%(i2pd)s\">i2pd</a> es una implementación de cliente I2P en C++.\nDesde principios de 2016, i2pd se ha vuelto lo suficientemente estable para ser usado en \nproducción, y desde el verano de 2016 implementa todas las APIs de I2P por completo."
 
 #: i2p2www/pages/site/about/alternative-clients.html:19
 #, python-format
 msgid ""
 "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero "
 "cryptocurrency."
-msgstr ""
-"<a href=\"%(kovri)s\">Kovri</a> es un derivado activo de i2pd para la "
-"criptomoneda Monero."
+msgstr "<a href=\"%(kovri)s\">Kovri</a> es un derivado activo de i2pd para la criptomoneda Monero."
 
 #: i2p2www/pages/site/about/alternative-clients.html:24
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
-msgstr ""
-"<a href=\"%(go_i2p)s\">Go-I2P</a> es un cliente I2P desarrollado usando "
-"el lenguage de\n"
-"programación <a href=\"%(golang)s\">Go</a>. El proyecto está en fase "
-"inicial de desarrollo."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
+msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> es un cliente I2P desarrollado usando el lenguage de\nprogramación <a href=\"%(golang)s\">Go</a>. El proyecto está en fase inicial de desarrollo."
 
 #: i2p2www/pages/site/about/browser-config.html:2
 msgid "Web Browser Configuration"
@@ -88,11 +74,147 @@ msgstr "Glosario"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
-"Esta página muestra la terminología usada cuando se habla de I2P y "
-"cifrados."
+
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
@@ -100,14 +222,10 @@ msgstr "Pódium"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -117,18 +235,14 @@ msgstr "¡Muchas gracias a las siguientes personas que han donado a I2P!"
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
-msgstr ""
-"Si ha hecho una donación , por favor envíe un email a <a "
-"href=\"mailto:%(echelon)s\">echelon</a> con su nombre o nick (y "
-"opcionalmente su página web) para que podamos listarle aquí."
+msgstr "Si ha hecho una donación , por favor envíe un email a <a href=\"mailto:%(echelon)s\">echelon</a> con su nombre o nick (y opcionalmente su página web) para que podamos listarle aquí."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -142,12 +256,8 @@ msgstr "El proyecto de Internet Invisible"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -157,13 +267,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -172,15 +282,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -189,28 +299,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -219,36 +328,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -257,13 +365,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -272,37 +380,21 @@ msgstr "Comparaciones"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Hay muchas otras buenas aplicaciones y proyectos trabajando en "
-"comunicaciones anónimas, e I2P se ha inspirado en muchos de sus "
-"esfuerzos. Esto no es una lista completa de recursos para el anonimato - "
-"ambos \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a> y los <a "
-"href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con "
-"GNUnet sirven también para ese mismo propósito. Dicho eso, pocos "
-"proyectos destacan como para comparaciones adicionales. Los siguientes "
-"proyectos tienen webs con comparaciones individuales:"
+msgstr "Hay muchas otras buenas aplicaciones y proyectos trabajando en comunicaciones anónimas, e I2P se ha inspirado en muchos de sus esfuerzos. Esto no es una lista completa de recursos para el anonimato - ambos \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> y los <a href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con GNUnet sirven también para ese mismo propósito. Dicho eso, pocos proyectos destacan como para comparaciones adicionales. Los siguientes proyectos tienen webs con comparaciones individuales:"
 
 #: i2p2www/pages/site/about/intro.html:56
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Los siguientes proyectos son discutidos en la <a "
-"href=\"%(othernetworks)s\">página sobre otras redes:</a>"
+msgstr "Los siguientes proyectos son discutidos en la <a href=\"%(othernetworks)s\">página sobre otras redes:</a>"
 
 #: i2p2www/pages/site/about/media.html:2
 msgid "Presentations on I2P"
@@ -311,13 +403,9 @@ msgstr "Presentaciones sobre I2P"
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
-msgstr ""
-"Los siguientes enlaces son presentaciones, vídeos y tutoriales sobre I2P."
-" Los enlaces para investigación sobre I2P están disponibles <a "
-"href=\"%(papers)s\">aquí</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
+msgstr "Los siguientes enlaces son presentaciones, vídeos y tutoriales sobre I2P. Los enlaces para investigación sobre I2P están disponibles <a href=\"%(papers)s\">aquí</a>."
 
 #: i2p2www/pages/site/about/media.html:8
 #, python-format
@@ -328,9 +416,7 @@ msgstr "Para solicitar añadidos a esta web por favor envíelos a %(email)s."
 msgid ""
 "\n"
 "Newest links are at the bottom of each section."
-msgstr ""
-"\n"
-"Los enlaces más nuevos al final de cada sección."
+msgstr "\nLos enlaces más nuevos al final de cada sección."
 
 #: i2p2www/pages/site/about/media.html:16
 msgid "Presentations"
@@ -343,10 +429,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(transcript)s\">transcript</a>\n"
 "Lance James (0x90), February 2002."
-msgstr ""
-"IIP Presentación en CodeCon <a href=\"%(mp3)s\">MP3 audio</a> <a "
-"href=\"%(transcript)s\">transcripción</a> Lance James (0x90), Febrero "
-"2002."
+msgstr "IIP Presentación en CodeCon <a href=\"%(mp3)s\">MP3 audio</a> <a href=\"%(transcript)s\">transcripción</a> Lance James (0x90), Febrero 2002."
 
 #: i2p2www/pages/site/about/media.html:27
 #, python-format
@@ -355,9 +438,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(slides)s\">slides</a>\n"
 "Lance James (0x90), September 2002."
-msgstr ""
-"IIP Presentación en  ToorCon <a href=\"%(mp3)s\">MP3 audio</a> <a "
-"href=\"%(slides)s\">diapositivas</a> Lance James (0x90), Septiembre 2002."
+msgstr "IIP Presentación en  ToorCon <a href=\"%(mp3)s\">MP3 audio</a> <a href=\"%(slides)s\">diapositivas</a> Lance James (0x90), Septiembre 2002."
 
 #: i2p2www/pages/site/about/media.html:35
 #, python-format
@@ -367,10 +448,7 @@ msgid ""
 "An introduction into anonymous communication with I2P.\n"
 "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n"
 "Jens Kubieziel, 24C3 Berlin, December 28, 2007."
-msgstr ""
-"<a href=\"%(video)s\">To Be or I2P</a> (Youtube Video) Una introducción a"
-" las comunicaciones anónimas con I2P. <a href=\"%(pdf)s\">To Be or I2P "
-"(PDF presentation)</a>, Jens Kubieziel, 24C3 Berlin, Diciembre 28, 2007."
+msgstr "<a href=\"%(video)s\">To Be or I2P</a> (Youtube Video) Una introducción a las comunicaciones anónimas con I2P. <a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>, Jens Kubieziel, 24C3 Berlin, Diciembre 28, 2007."
 
 #: i2p2www/pages/site/about/media.html:44
 #, python-format
@@ -378,15 +456,12 @@ msgid ""
 "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n"
 "Lars Schimmer,\n"
 "March 14-15, 2009"
-msgstr ""
-"<a href=\"%(video)s\">Vídeo de charla I2P en Chemnitz Linux Tag</a>, Lars"
-" Schimmer, Marzo 14-15, 2009"
+msgstr "<a href=\"%(video)s\">Vídeo de charla I2P en Chemnitz Linux Tag</a>, Lars Schimmer, Marzo 14-15, 2009"
 
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -397,9 +472,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n"
 "Adrian Crenshaw. Schmoocon Firetalk, January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a> "
-"Adrian Crenshaw. Schmoocon Firetalk, Enero 2011"
+msgstr "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a> Adrian Crenshaw. Schmoocon Firetalk, Enero 2011"
 
 #: i2p2www/pages/site/about/media.html:62
 #, python-format
@@ -407,111 +480,72 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
-msgstr ""
-"<a href=\"%(link)s\">Usando la tecnología para mejorar la libertad</a> "
-"(Youtube Vídeo) Eric Johnson. <a href=\"http://agora.io/etienne\">Agora "
-"I/O Unconference</a>, Marzo 27, 2011. I2P desde 10:00 a 20:00 en el "
-"vídeo."
+msgstr "<a href=\"%(link)s\">Usando la tecnología para mejorar la libertad</a> (Youtube Vídeo) Eric Johnson. <a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, Marzo 27, 2011. I2P desde 10:00 a 20:00 en el vídeo."
 
 #: i2p2www/pages/site/about/media.html:70
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Common Darknet Weaknesses</a> (Vídeo en Youtube) "
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, Julio "
-"11-15, 2011"
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
+msgstr "<a href=\"%(link)s\">Common Darknet Weaknesses</a> (Vídeo en Youtube) Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, Julio 11-15, 2011"
 
 #: i2p2www/pages/site/about/media.html:76
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011."
-msgstr ""
-"<a href=\"%(link)s\">I2P / Tor Workshop Notes</a> Adrian Crenshaw. DEF "
-"CON 19, Las Vegas, Agosto 6, 2011."
+msgstr "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a> Adrian Crenshaw. DEF CON 19, Las Vegas, Agosto 6, 2011."
 
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011."
-msgstr ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies - DEF CON Vesión en vivo (Vídeo de Youtube)</a>, <a "
-"href=\"%(studio)s\">versión de \"estudio\"  (Youtube Video)</a>, <a "
-"href=\"%(slides)s\">Slides (ppt)</a> Adrian Crenshaw. DEF CON 19, Las "
-"Vegas, Agosto 7, 2011."
+msgstr "<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies - DEF CON Vesión en vivo (Vídeo de Youtube)</a>, <a href=\"%(studio)s\">versión de \"estudio\"  (Youtube Video)</a>, <a href=\"%(slides)s\">Slides (ppt)</a> Adrian Crenshaw. DEF CON 19, Las Vegas, Agosto 7, 2011."
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
-msgstr ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a> "
-"(Ecosistemas de espacio cifrado modernos), 0x375 0x06 (Thessaloniki Tech "
-"Talk Sessions (Charlas técnicas de Tesalónica)), 4 de noviembre de 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
+msgstr "<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a> (Ecosistemas de espacio cifrado modernos), 0x375 0x06 (Thessaloniki Tech Talk Sessions (Charlas técnicas de Tesalónica)), 4 de noviembre de 2011."
 
 #: i2p2www/pages/site/about/media.html:95
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
-msgstr ""
-"<a href=\"%(link)s\">I2P - The Anonymous Network</a> (I2P - La red "
-"anónima)\n"
-"(Vídeo de Youtube)\n"
-"Blair Dick, Universidad de Abertay, Sociedad de hacking ético de Dundee, "
-"25 de enero de 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
+msgstr "<a href=\"%(link)s\">I2P - The Anonymous Network</a> (I2P - La red anónima)\n(Vídeo de Youtube)\nBlair Dick, Universidad de Abertay, Sociedad de hacking ético de Dundee, 25 de enero de 2012."
 
 #: i2p2www/pages/site/about/media.html:101
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2PCon 2015</a>\n"
 "Toronto, August 15-16, 2015"
-msgstr ""
-"<a href=\"%(link)s\">I2PCon 2015</a>\n"
-"Toronto, 15-16 de agosto de 2015"
+msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 de agosto de 2015"
 
 #: i2p2www/pages/site/about/media.html:106
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
-msgstr ""
-"<a href=\"%(link)s\">I2P - ¡Aún vive! (pdf)</a>\n"
-"<a href=\"%(link2)s\">(vídeo)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburgo, 28 de "
-"diciembre de 2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
+msgstr "<a href=\"%(link)s\">I2P - ¡Aún vive! (pdf)</a>\n<a href=\"%(link2)s\">(vídeo)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburgo, 28 de diciembre de 2015"
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
-msgstr ""
-"Reemplazar criptografía débil: Actualizar la red I2P con primitivas más "
-"robustas.\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d (desarrollador), Real World Crypto, Stanford, 8 de enero de 2016"
+msgstr "Reemplazar criptografía débil: Actualizar la red I2P con primitivas más robustas.\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d (desarrollador), Real World Crypto, Stanford, 8 de enero de 2016"
 
 #: i2p2www/pages/site/about/media.html:121
 #, python-format
@@ -519,14 +553,8 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
-msgstr ""
-"Onion y Garlic: Los protocolos de I2P\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d (desarrollador), COMPSCI 460: Computer Networking, University of "
-"Wisconsin Whitewater, 17 de febrero de 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
+msgstr "Onion y Garlic: Los protocolos de I2P\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d (desarrollador), COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17 de febrero de 2016"
 
 #: i2p2www/pages/site/about/media.html:129
 #, python-format
@@ -535,11 +563,7 @@ msgid ""
 "<a href=\"%(link)s\">(mp4)</a>\n"
 "<a href=\"%(link2)s\">(webm)</a>\n"
 "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018"
-msgstr ""
-"The Invisible Internet Project - Una panorámica y guía por la tecnología\n"
-"<a href=\"%(link)s\">(mp4)</a>\n"
-"<a href=\"%(link2)s\">(webm)</a>\n"
-"Andrew Savchenko (bircoph), FOSDEM, Bruselas, 4 de febrero de 2018"
+msgstr "The Invisible Internet Project - Una panorámica y guía por la tecnología\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Bruselas, 4 de febrero de 2018"
 
 #: i2p2www/pages/site/about/media.html:137
 #, python-format
@@ -559,10 +583,7 @@ msgid ""
 "(Youtube Video)\n"
 "This guide will show you how to install I2P in Windows XP.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2P Windows Tutorial</a> (Youtube Video) Esta guía "
-"le mostrará cono instalar I2P en Windows. Por <a "
-"href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2P Windows Tutorial</a> (Youtube Video) Esta guía le mostrará cono instalar I2P en Windows. Por <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:155
 #, python-format
@@ -571,10 +592,7 @@ msgid ""
 "(Youtube Video)\n"
 "This will guide you through how to install I2P on a Debian Linux System.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2P Debian Tutorial</a> (Vídeo en Youtube) Esta guía"
-" le mostrará como instalar I2P en sistemas basados en Debian. Por <a "
-"href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2P Debian Tutorial</a> (Vídeo en Youtube) Esta guía le mostrará como instalar I2P en sistemas basados en Debian. Por <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:162
 #, python-format
@@ -583,49 +601,33 @@ msgid ""
 "(Youtube Video)\n"
 "How to set up an anonymous web site in I2P.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">How to set up anonymous site in I2P</a> (Vídeo en "
-"Youtube) Como configurar una web anónima en I2P. Por <a "
-"href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">How to set up anonymous site in I2P</a> (Vídeo en Youtube) Como configurar una web anónima en I2P. Por <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:169
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2P Tutorial Mac OS X</a> (Vídeo en Youtube) Un "
-"tutorial de como ejecutar I2P en os X y como conectar a "
-"irc.telecomix.i2p. Por <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a> (Vídeo en Youtube) Un tutorial de como ejecutar I2P en os X y como conectar a irc.telecomix.i2p. Por <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-" (Vídeo en Youtube) Agent Felix Atari of the Telecomix Crypto Munitions "
-"Bureau. Por <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a> (Vídeo en Youtube) Agent Felix Atari of the Telecomix Crypto Munitions Bureau. Por <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
-msgstr ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a> (Vídeo en Youtube) Esta guía muestra como instalar "
-"y configurar las aplicaciones necesarias para acceder a I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
+msgstr "<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a> (Vídeo en Youtube) Esta guía muestra como instalar y configurar las aplicaciones necesarias para acceder a I2P."
 
 #: i2p2www/pages/site/about/media.html:189
 #, python-format
@@ -633,9 +635,7 @@ msgid ""
 "<a href=\"%(link)s\">How to connect to I2P</a>\n"
 "(Youtube Video)\n"
 "How to install I2P on Ubuntu."
-msgstr ""
-"<a href=\"%(link)s\">How to connect to I2P</a> (Vídeo en Youtube) Como "
-"instalar I2P en Ubuntu."
+msgstr "<a href=\"%(link)s\">How to connect to I2P</a> (Vídeo en Youtube) Como instalar I2P en Ubuntu."
 
 #: i2p2www/pages/site/about/media.html:195
 #, python-format
@@ -644,9 +644,7 @@ msgid ""
 "(Video)\n"
 "Adrian Crenshaw.\n"
 "January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Installing the I2P darknet software in Linux</a> "
-"(Vídeo) Adrian Crenshaw. Enero 2011"
+msgstr "<a href=\"%(link)s\">Installing the I2P darknet software in Linux</a> (Vídeo) Adrian Crenshaw. Enero 2011"
 
 #: i2p2www/pages/site/about/media.html:202
 #, python-format
@@ -654,9 +652,7 @@ msgid ""
 "<a href=\"%(link)s\">Short garlic routing animation</a>\n"
 "(Youtube Video)\n"
 "Adrian Crenshaw.\n"
-msgstr ""
-"<a href=\"%(link)s\">Short garlic routing animation</a> (Vídeo en "
-"Youtube) Adrian Crenshaw.\n"
+msgstr "<a href=\"%(link)s\">Short garlic routing animation</a> (Vídeo en Youtube) Adrian Crenshaw.\n"
 
 #: i2p2www/pages/site/about/media.html:210
 msgid "Articles and Interviews"
@@ -669,11 +665,7 @@ msgid ""
 "<a href=\"%(link1)s\">Part 1</a>\n"
 "<a href=\"%(link2)s\">Part 2</a>\n"
 "July 26, 2002."
-msgstr ""
-"Lance James (0x90) entrevistado por DistributedCity\n"
-"<a href=\"%(link1)s\">Parte 1</a>\n"
-"<a href=\"%(link2)s\">Parte 2</a>\n"
-"26 de julio de 2002."
+msgstr "Lance James (0x90) entrevistado por DistributedCity\n<a href=\"%(link1)s\">Parte 1</a>\n<a href=\"%(link2)s\">Parte 2</a>\n26 de julio de 2002."
 
 #: i2p2www/pages/site/about/media.html:221
 #, python-format
@@ -682,32 +674,22 @@ msgid ""
 "(original in Spanish)\n"
 "<a href=\"%(link)s\">English translation</a>\n"
 "October 31, 2002."
-msgstr ""
-"Lance James (0x90) entrevistado por El País\n"
-"(original en español)\n"
-"<a href=\"%(link)s\">Traducción al inglés</a>\n"
-"31 de octubre de 2002."
+msgstr "Lance James (0x90) entrevistado por El País\n(original en español)\n<a href=\"%(link)s\">Traducción al inglés</a>\n31 de octubre de 2002."
 
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
-msgstr ""
-"<a href=\"%(link)s\">Artículo de 2003 del Business Week refiriéndose "
-"invisiblenet (red invisible)</a> 14 de septiembre de 2003."
+msgstr "<a href=\"%(link)s\">Artículo de 2003 del Business Week refiriéndose invisiblenet (red invisible)</a> 14 de septiembre de 2003."
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
-msgstr ""
-"<a href=\"%(link)s\">Artículo del Netzwelt.de sobre como permanecer "
-"anónimos en Internet</a> (Alemán) Noviembre 2007."
+msgstr "<a href=\"%(link)s\">Artículo del Netzwelt.de sobre como permanecer anónimos en Internet</a> (Alemán) Noviembre 2007."
 
 #: i2p2www/pages/site/about/media.html:239
 #, python-format
@@ -715,27 +697,15 @@ msgid ""
 "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n"
 "March 2009\n"
 "<a href=\"%(german)s\">German translation</a>"
-msgstr ""
-"<a href=\"%(link)s\">zzz entrevistado por gulli.com</a>\n"
-"Marzo de 2009\n"
-"<a href=\"%(german)s\">Traducción al alemán</a>"
+msgstr "<a href=\"%(link)s\">zzz entrevistado por gulli.com</a>\nMarzo de 2009\n<a href=\"%(german)s\">Traducción al alemán</a>"
 
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz entrevistado en el InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
-"18 de agosto de 2011\n"
-"(enlace muerto, diseminado dentro de I2P por el <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">tracker"
-" de postman</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz entrevistado en el InfoSec Daily Podcast Ep. 454 (mp3)</a>\n18 de agosto de 2011\n(enlace muerto, diseminado dentro de I2P por el <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">tracker de postman</a>)"
 
 #: i2p2www/pages/site/about/media.html:252
 #, python-format
@@ -743,54 +713,34 @@ msgid ""
 "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n"
 "Jonathan Cox,\n"
 "November 11, 2011."
-msgstr ""
-"<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>, Jonathan Cox, "
-"Noviembre 11, 2011."
+msgstr "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>, Jonathan Cox, Noviembre 11, 2011."
 
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz y Lance James entrevistados en el InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
-"16 de febrero de 2012\n"
-"(enlace muerto, diseminado dentro de I2P por el <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">tracker"
-" de postman</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz y Lance James entrevistados en el InfoSec Daily Podcast Ep. 596 (mp3)</a>\n16 de febrero de 2012\n(enlace muerto, diseminado dentro de I2P por el <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">tracker de postman</a>)"
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff y Str4d (desarrolladores) entrevistados en el "
-"Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
-"Parte 1, 28 de febrero de 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff y Str4d (desarrolladores) entrevistados en el Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\nParte 1, 28 de febrero de 2015"
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff y Str4d (desarrolladores) entrevistados en el "
-"Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
-"Parte 2, 6 de marzo de 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff y Str4d (desarrolladores) entrevistados en el Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\nParte 2, 6 de marzo de 2015"
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -799,16 +749,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -820,19 +768,62 @@ msgstr "Otro"
 msgid ""
 "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n"
 "February 14, 2014"
-msgstr ""
-"I2P es mencionado en el episodio 2 de la temporada 2 de la serie \"House "
-"of Cards\" de Netflix,\n"
-"14 de febrero de 2014."
+msgstr "I2P es mencionado en el episodio 2 de la temporada 2 de la serie \"House of Cards\" de Netflix,\n14 de febrero de 2014."
 
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -841,18 +832,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -863,84 +851,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -951,8 +916,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -960,27 +924,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -988,26 +948,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -1018,10 +969,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -1029,18 +978,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -1051,16 +997,11 @@ msgstr "Miembros del proyecto I2P"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
-msgstr ""
-"Somos un pequeño grupo de personas repartidas por varios continentes, "
-"trabajando para mejorar diferentes aspectos del proyecto y discutir el "
-"diseño de la red.<a href=\"%(volunteer)s\">¿Únete!</a>"
+msgstr "Somos un pequeño grupo de personas repartidas por varios continentes, trabajando para mejorar diferentes aspectos del proyecto y discutir el diseño de la red.<a href=\"%(volunteer)s\">¿Únete!</a>"
 
 #: i2p2www/pages/site/about/team.html:14
 msgid "Admin"
@@ -1185,9 +1126,7 @@ msgstr "Administrador de CI"
 
 #: i2p2www/pages/site/about/team.html:82
 msgid "Maintain the Continuous Integration infrastructure"
-msgstr ""
-"Mantiene la infraestructura de integración continua (Continuous "
-"Integration)"
+msgstr "Mantiene la infraestructura de integración continua (Continuous Integration)"
 
 #: i2p2www/pages/site/about/team.html:85
 msgid "Reseed admin"
@@ -1231,7 +1170,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1390,9 +1330,7 @@ msgstr "Encargado de los paquetes para Debian/Ubuntu y del PPA"
 
 #: i2p2www/pages/site/about/team.html:232
 msgid "Routerconsole backend and UI work, website revamp, unit tests work"
-msgstr ""
-"Trabajos en la consola del ruter y el interfaz gráfico, mejora de la web,"
-" y trabajos en los unit tests"
+msgstr "Trabajos en la consola del ruter y el interfaz gráfico, mejora de la web, y trabajos en los unit tests"
 
 #: i2p2www/pages/site/about/team.html:237
 msgid "Help needed on many fronts!"
@@ -1473,10 +1411,9 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "desarrollo de jbigi, migración de la wiki, limpieza de la documentación"
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
-msgstr ""
-"depuración de java y desarrollo del cliente en I2PTunnel y en la consola "
-"del ruter"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
+msgstr "depuración de java y desarrollo del cliente en I2PTunnel y en la consola del ruter"
 
 #: i2p2www/pages/site/about/team.html:323
 msgid "SAM perl module"
@@ -1525,55 +1462,27 @@ msgstr "&hellip; y muchas otros"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
-msgstr ""
-"I2PCon 2015 fue el primer evento de su clase. Tuvo dos metas a corto "
-"plazo.\n"
-"Primero, ofrecer al público general un evento donde se pudiera obtener "
-"conocimiento sobre privacidad.\n"
-"Segundo, para llevar más allá al proyecto I2P y su comunidad con debates "
-"técnicos\n"
-"sobre criptografía, anonimato y temas I2P-céntricos."
+msgstr "I2PCon 2015 fue el primer evento de su clase. Tuvo dos metas a corto plazo.\nPrimero, ofrecer al público general un evento donde se pudiera obtener conocimiento sobre privacidad.\nSegundo, para llevar más allá al proyecto I2P y su comunidad con debates técnicos\nsobre criptografía, anonimato y temas I2P-céntricos."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
-msgstr ""
-"Una meta mayor y a más largo plazo de este evento fue construir una "
-"comunidad de\n"
-"individuos con consciencia sobre privacidad. Al conectar personas que "
-"reconocen la\n"
-"importancia de la privacidad, quisimos ofrecer un foro donde esta "
-"comunidad pueda crecer."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
+msgstr "Una meta mayor y a más largo plazo de este evento fue construir una comunidad de\nindividuos con consciencia sobre privacidad. Al conectar personas que reconocen la\nimportancia de la privacidad, quisimos ofrecer un foro donde esta comunidad pueda crecer."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
-msgstr ""
-"La idea para este evento fue inicialmente concebida por nuestros\n"
-"maravillosos amigos de <a href=\"https://torontocrypto.org/\">Toronto "
-"Crypto</a>.\n"
-"El punto de reunión fue proporcionado por <a "
-"href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
-"El marketing fue encabezado por <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> y Siew.\n"
-"Sin ellos este evento no habría sido posible."
+msgstr "La idea para este evento fue inicialmente concebida por nuestros\nmaravillosos amigos de <a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nEl punto de reunión fue proporcionado por <a href=\"https://hacklab.to/\">Hacklab.to</a>.\nEl marketing fue encabezado por <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> y Siew.\nSin ellos este evento no habría sido posible."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:32
 msgid "Slides and Video"
@@ -1581,20 +1490,16 @@ msgstr "Diapositivas y vídeo"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:34
 msgid "Slides are also available as an in-I2P torrent."
-msgstr ""
-"Las secuencias de diapositivas también están disponibles como un torrent "
-"en-I2P."
+msgstr "Las secuencias de diapositivas también están disponibles como un torrent en-I2P."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:41
 msgid "Note: Video links will be posted as they become available."
-msgstr ""
-"Nota: Los enlaces de vídeo se publicarán tan pronto como estén "
-"disponibles."
+msgstr "Nota: Los enlaces de vídeo se publicarán tan pronto como estén disponibles."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1619,9 +1524,7 @@ msgstr "Diapositivas realizadas por str4d y zzz:"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:71
 msgid "Slides by others: Contact the author for license information."
-msgstr ""
-"Diapositivas realizadas por otros: Contacte con el autor para la "
-"información de licencia."
+msgstr "Diapositivas realizadas por otros: Contacte con el autor para la información de licencia."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:77
 msgid "Speakers"
@@ -1631,22 +1534,13 @@ msgstr "Altavoces"
 msgid ""
 "Colin Mahns has a strong interest in the use of anonymity and encryption "
 "technology to help preserve human rights in the digital age."
-msgstr ""
-"Colin Mahns tiene un fuerte interés en el uso de tecnología de "
-"información y cifrado para ayudar a preservar los derechos humanos en la "
-"era digital."
+msgstr "Colin Mahns tiene un fuerte interés en el uso de tecnología de información y cifrado para ayudar a preservar los derechos humanos en la era digital."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
-msgstr ""
-"David Dagon es un investigador de postdoctorado en Georgia Tech enfocado "
-"en botnets, malware, seguridad de red, y DNS.\n"
-"Su interés en I2P se centra en preservar la privacidad del usuario, el "
-"filtrado autónomo, y el anti-abuso."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
+msgstr "David Dagon es un investigador de postdoctorado en Georgia Tech enfocado en botnets, malware, seguridad de red, y DNS.\nSu interés en I2P se centra en preservar la privacidad del usuario, el filtrado autónomo, y el anti-abuso."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
 #: i2p2www/pages/site/about/i2pcon/2015.html:105
@@ -1659,25 +1553,12 @@ msgstr "J está al frente de Toronto Crypto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
-msgstr ""
-"Lance James es el fundador del Invisible IRC Project, el predecesor de "
-"I2P, allá por 2002.\n"
-"Fundó su propia compañía de inteligencia de cyber amenazas en 2003.\n"
-"Desde entonces está enfocado en la seguridad de red, investigación de "
-"malware, y seguridad de la información.\n"
-"Durante 2011-2013, fue Director de Inteligencia en Amenazas para The "
-"Vigilant, que fue adquirida por Deloitte en 2013.\n"
-"Recientemente abandonó Deloitte para hacer consultoría a través de su "
-"compañía The James Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
+msgstr "Lance James es el fundador del Invisible IRC Project, el predecesor de I2P, allá por 2002.\nFundó su propia compañía de inteligencia de cyber amenazas en 2003.\nDesde entonces está enfocado en la seguridad de red, investigación de malware, y seguridad de la información.\nDurante 2011-2013, fue Director de Inteligencia en Amenazas para The Vigilant, que fue adquirida por Deloitte en 2013.\nRecientemente abandonó Deloitte para hacer consultoría a través de su compañía The James Group."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
 msgid "Nicholas D. is a member of Hacklab Toronto."
@@ -1685,22 +1566,11 @@ msgstr "Nicholas D. es un miembro de Hacklab Toronto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
-msgstr ""
-"Nicholas Johnston es un Profesor de Seguridad de la Información en la "
-"Escuela de Computación Aplicada del Sheridan College en el programa de "
-"Bachelor's degree de InfoSec.\n"
-"Su carrera profesional previa fue en actividades forenses digitales e "
-"investigaciones.\n"
-"También es un contratista especializado en respuesta a incidentes.\n"
-"Sus áreas de investigación incluyen el desarrollo de software de "
-"seguridad y el análisis de datos."
+msgstr "Nicholas Johnston es un Profesor de Seguridad de la Información en la Escuela de Computación Aplicada del Sheridan College en el programa de Bachelor's degree de InfoSec.\nSu carrera profesional previa fue en actividades forenses digitales e investigaciones.\nTambién es un contratista especializado en respuesta a incidentes.\nSus áreas de investigación incluyen el desarrollo de software de seguridad y el análisis de datos."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:124
 msgid "Psi is an I2P developer."
@@ -1752,8 +1622,7 @@ msgstr "Día 2"
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1771,23 +1640,13 @@ msgstr "Agosto del 2010"
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
-msgstr ""
-"Hay varias técnicas para mejorar el rendimiento de I2P - algunas tienen "
-"que ver con la CPU, otras con el ancho de banda y otras relacionadas con "
-"los protocolos. Sin embargo, todas estas mejoras afectan la latencia, la "
-"cantidad de datos enviados y el rendimiento de la red, mientras que "
-"reducen la competencia por los recursos escasos. Esta lista no está "
-"completa, pero abarca las más importantes que se conocen."
+msgstr "Hay varias técnicas para mejorar el rendimiento de I2P - algunas tienen que ver con la CPU, otras con el ancho de banda y otras relacionadas con los protocolos. Sin embargo, todas estas mejoras afectan la latencia, la cantidad de datos enviados y el rendimiento de la red, mientras que reducen la competencia por los recursos escasos. Esta lista no está completa, pero abarca las más importantes que se conocen."
 
 #: i2p2www/pages/site/about/performance/future.html:15
 #: i2p2www/pages/site/about/performance/index.html:106
@@ -1795,9 +1654,7 @@ msgstr ""
 msgid ""
 "For past performance improvements see the <a href=\"%(history)s\">\n"
 "Performance History</a>."
-msgstr ""
-"Para ver las mejoras de rendimiento pasadas vea <a href=\"%(history)s\"> "
-"historial de rendimiento</a>."
+msgstr "Para ver las mejoras de rendimiento pasadas vea <a href=\"%(history)s\"> historial de rendimiento</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:20
 msgid "Better peer profiling and selection"
@@ -1806,24 +1663,13 @@ msgstr "Mejor selección de pares y sus perfiles."
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
-msgstr ""
-"Probablemente, una de las partes más importantes para conseguir una "
-"mejora en el rendimiento será mejorar como los ruters elijen los pares a "
-"través de los que construyen los túneles - asegurándose que no utiliza "
-"pares con enlaces lentos o con enlaces rápidos pero sobrecargados. etc. "
-"Además, tenemos que asegurarnos que no nos exponemos a un ataque <a "
-"href=\"%(sybilpdf)s\">Sybil</a> de un adversario con muchos recursos y "
-"con máquinas muy rápidas."
+msgstr "Probablemente, una de las partes más importantes para conseguir una mejora en el rendimiento será mejorar como los ruters elijen los pares a través de los que construyen los túneles - asegurándose que no utiliza pares con enlaces lentos o con enlaces rápidos pero sobrecargados. etc. Además, tenemos que asegurarnos que no nos exponemos a un ataque <a href=\"%(sybilpdf)s\">Sybil</a> de un adversario con muchos recursos y con máquinas muy rápidas."
 
 #: i2p2www/pages/site/about/performance/future.html:30
 msgid "Network database tuning"
@@ -1831,32 +1677,15 @@ msgstr "Base de datos de la Red I2P"
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
-msgstr ""
-"Queremos ser más eficientes en la reparación de la base de datos de la "
-"red y los algoritmos de mantenimiento - en vez de explorar la red "
-"constantemente buscando nuevos pares - causando un gran número de "
-"mensajes y carga en el ruter -  podemos frenar o incluso parar la "
-"búsqueda mientras no se detecte que hay algo nuevo por explorar (por "
-"ejemplo, ralentizar la tasa de exploración dependiendo de la última vez "
-"que algún par nos dio una referencia de algún otro par desconocido). "
-"También podemos mejorar lo que enviamos - cuantos pares recuperamos (o "
-"incluso si recuperamos una respuesta), también podemos mejorar cuantas "
-"búsquedas concurrentes hacemos."
+msgstr "Queremos ser más eficientes en la reparación de la base de datos de la red y los algoritmos de mantenimiento - en vez de explorar la red constantemente buscando nuevos pares - causando un gran número de mensajes y carga en el ruter -  podemos frenar o incluso parar la búsqueda mientras no se detecte que hay algo nuevo por explorar (por ejemplo, ralentizar la tasa de exploración dependiendo de la última vez que algún par nos dio una referencia de algún otro par desconocido). También podemos mejorar lo que enviamos - cuantos pares recuperamos (o incluso si recuperamos una respuesta), también podemos mejorar cuantas búsquedas concurrentes hacemos."
 
 #: i2p2www/pages/site/about/performance/future.html:42
 msgid "Session Tag Tuning and Improvements"
@@ -1865,48 +1694,24 @@ msgstr "Mejoras en las Etiquetas de Sesión"
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
-msgstr ""
-"La forma en que funciona el algoritmo <a "
-"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> es administrando un "
-"conjunto de arrays de 32 bytes aleatorios de un solo uso, y desechándolos"
-" cuando no se usan los suficientemente rápido. Si los desechamos "
-"demasiado pronto, tenemos que crear otra vez un cifrado (muy caro) "
-"ElGamal, pero si no los desechamos a tiempo, tenemos que reducir su "
-"número o nos quedaremos sin memoria RAM (y si al destinatario de alguna "
-"forma se le corrompen y pierde algunas etiquetas, pueden ocurrir incluso "
-"más fallos en los cifrados). Con algoritmos con detección activa y de "
-"control, podemos ajustar de una forma más segura y eficientemente el "
-"tiempo de vida de una etiqueta, reemplazando el cifrado ElGamal con un "
-"algoritmo más trivial como AES."
+msgstr "La forma en que funciona el algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> es administrando un conjunto de arrays de 32 bytes aleatorios de un solo uso, y desechándolos cuando no se usan los suficientemente rápido. Si los desechamos demasiado pronto, tenemos que crear otra vez un cifrado (muy caro) ElGamal, pero si no los desechamos a tiempo, tenemos que reducir su número o nos quedaremos sin memoria RAM (y si al destinatario de alguna forma se le corrompen y pierde algunas etiquetas, pueden ocurrir incluso más fallos en los cifrados). Con algoritmos con detección activa y de control, podemos ajustar de una forma más segura y eficientemente el tiempo de vida de una etiqueta, reemplazando el cifrado ElGamal con un algoritmo más trivial como AES."
 
 #: i2p2www/pages/site/about/performance/future.html:55
 #, python-format
 msgid ""
 "Additional ideas for improving Session Tag delivery are described on the\n"
 "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>."
-msgstr ""
-"Algunas ideas adicionales para mejorar el envío de las Etiquetas de "
-"Sesión se describen en la <a href=\"%(elgamalaes)s#future\">página de "
-"ElGamal/AES+SessionTag</a>."
+msgstr "Algunas ideas adicionales para mejorar el envío de las Etiquetas de Sesión se describen en la <a href=\"%(elgamalaes)s#future\">página de ElGamal/AES+SessionTag</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:61
 msgid "Migrate sessionTag to synchronized PRNG"
@@ -1917,61 +1722,29 @@ msgstr "Migrar las Etiquetas de sesión a PRNG sincronizado."
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
-msgstr ""
-"Ahora mismo, nuestro algoritmo <a "
-"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> funciona etiquetando "
-"cada mensaje cifrado con un 'nonce' único de 32 bytes (una \"etiqueta de "
-"sesión\"), identificando el mensaje como un mensaje cifrado con la clave "
-"de sesión AES asociada. Esto previene que los pares distingan los "
-"mensajes que son parte de la misma sesión, ya que cada mensaje tiene una "
-"etiqueta nueva completamente aleatoria. Para llevar esto acabo, cada unos"
-" pocos mensajes se envuelven un nuevo conjunto de etiquetas de sesión "
-"dentro del mensaje cifrado, creando una forma transparente de identificar"
-" los mensajes futuros. Por lo tanto tenemos que llevar un control de "
-"cuales mensajes han llegado con éxito a su destino para saber que "
-"etiquetas debemos usar."
+msgstr "Ahora mismo, nuestro algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> funciona etiquetando cada mensaje cifrado con un 'nonce' único de 32 bytes (una \"etiqueta de sesión\"), identificando el mensaje como un mensaje cifrado con la clave de sesión AES asociada. Esto previene que los pares distingan los mensajes que son parte de la misma sesión, ya que cada mensaje tiene una etiqueta nueva completamente aleatoria. Para llevar esto acabo, cada unos pocos mensajes se envuelven un nuevo conjunto de etiquetas de sesión dentro del mensaje cifrado, creando una forma transparente de identificar los mensajes futuros. Por lo tanto tenemos que llevar un control de cuales mensajes han llegado con éxito a su destino para saber que etiquetas debemos usar."
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
 "to handle out of order delivery)."
-msgstr ""
-"Este sistema funciona bien y es muy robusto, aunque no es eficiente en el"
-" uso del ancho de banda, y necesita el envío de estas etiquetas antes de "
-"tiempo (y no todas las etiquetas serán necesarias, o se desperdician, "
-"debido al tiempo de expiración). De media, enviar con antelación las "
-"etiquetas de sesión cuesta 32 bytes por mensaje (el tamaño de una "
-"etiqueta). aunque como ha sugerido Taral, ese tamaño puede evitarse "
-"reemplazando el envío de etiquetas con un PRNG sincronizado - cuando una "
-"nueva sesión se establece (a través de un bloque cifrado ElGamal), ambos "
-"lados siembran un PRNG para generar las etiquetas de sesión cuando se "
-"necesite (con el destinatarios pre calculando los siguientes valores para"
-" poder manejar los envíos)"
+msgstr "Este sistema funciona bien y es muy robusto, aunque no es eficiente en el uso del ancho de banda, y necesita el envío de estas etiquetas antes de tiempo (y no todas las etiquetas serán necesarias, o se desperdician, debido al tiempo de expiración). De media, enviar con antelación las etiquetas de sesión cuesta 32 bytes por mensaje (el tamaño de una etiqueta). aunque como ha sugerido Taral, ese tamaño puede evitarse reemplazando el envío de etiquetas con un PRNG sincronizado - cuando una nueva sesión se establece (a través de un bloque cifrado ElGamal), ambos lados siembran un PRNG para generar las etiquetas de sesión cuando se necesite (con el destinatarios pre calculando los siguientes valores para poder manejar los envíos)"
 
 #: i2p2www/pages/site/about/performance/future.html:87
 msgid "Longer lasting tunnels"
@@ -1979,50 +1752,26 @@ msgstr "Tiempo de duración máximo de los túneles."
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
-msgstr ""
-"El tiempo de duración actual de 10 minutes es bastante arbitrario, aunque"
-" parece que funciona bien. Una vez que tengamos el código de reparación "
-"de túnel y un sistema de detección de fallos más eficiente, podremos "
-"cambiar estas duraciones de forma más segura, reduciendo la carga en la "
-"CPU y en la red (debido al excesivo costo al crear los mensajes de los "
-"túneles). "
+msgstr "El tiempo de duración actual de 10 minutes es bastante arbitrario, aunque parece que funciona bien. Una vez que tengamos el código de reparación de túnel y un sistema de detección de fallos más eficiente, podremos cambiar estas duraciones de forma más segura, reduciendo la carga en la CPU y en la red (debido al excesivo costo al crear los mensajes de los túneles). "
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
-msgstr ""
-"Esto parece un fácil arreglo para la carga de la CPU y el gasto de ancho "
-"de banda en los ruters, pero no podemos usarlos hasta que hayamos afinado"
-" mucho mejor los algoritmos de creación de túneles.\n"
-"Aún así, el tiempo de vida de 10 minutos está incluido en varios sitios, "
-"con lo que hará falta bastante esfuerzo para cambiar esta duración. "
-"Además, será dificil mantener la compatibilidad con versiones anteriores "
-"tras este cambio."
+"Also, it would be difficult to maintain backward compatibility with such a change."
+msgstr "Esto parece un fácil arreglo para la carga de la CPU y el gasto de ancho de banda en los ruters, pero no podemos usarlos hasta que hayamos afinado mucho mejor los algoritmos de creación de túneles.\nAún así, el tiempo de vida de 10 minutos está incluido en varios sitios, con lo que hará falta bastante esfuerzo para cambiar esta duración. Además, será dificil mantener la compatibilidad con versiones anteriores tras este cambio."
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
-msgstr ""
-"Actualmente, ya que el éxito en la creación de túneles de la red es "
-"bastante alto, no existen planes para aumentar el tiempo de vida de los "
-"túneles."
+msgstr "Actualmente, ya que el éxito en la creación de túneles de la red es bastante alto, no existen planes para aumentar el tiempo de vida de los túneles."
 
 #: i2p2www/pages/site/about/performance/future.html:108
 msgid "Adjust the timeouts"
@@ -2030,43 +1779,22 @@ msgstr "Ajustar tiempo máximo de espera"
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
-msgstr ""
-"Otros truquitos arbitrarios que parece que \"funcionan bien\" usados son "
-"los tiempos de vida actuales de varias actividades. ¿Por qué tenemos 60 "
-"segundos para el tiempo de vida de \"par inaccesible\"?¿Por qué "
-"intentamos usar un diferente túnel que el LeaseSet nos avisa después de "
-"10 segundos?¿Por qué las consultas a la base de datos está limitada por "
-"60 o 20 segundos?¿Por qué están las destinaciones configuradas para "
-"preguntar por un nuevo grupo de túneles cada 10 minutos?¿Por qué "
-"permitimos a un par tardar 60 segundos en responder a la petición de "
-"unirse a un túnel?¿Por qué consideramos un túnel como \"muerto\" si no "
-"pasa nuestras pruebas en 60 segundos?"
+msgstr "Otros truquitos arbitrarios que parece que \"funcionan bien\" usados son los tiempos de vida actuales de varias actividades. ¿Por qué tenemos 60 segundos para el tiempo de vida de \"par inaccesible\"?¿Por qué intentamos usar un diferente túnel que el LeaseSet nos avisa después de 10 segundos?¿Por qué las consultas a la base de datos está limitada por 60 o 20 segundos?¿Por qué están las destinaciones configuradas para preguntar por un nuevo grupo de túneles cada 10 minutos?¿Por qué permitimos a un par tardar 60 segundos en responder a la petición de unirse a un túnel?¿Por qué consideramos un túnel como \"muerto\" si no pasa nuestras pruebas en 60 segundos?"
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
-msgstr ""
-"Todos estos imponderables pueden solucionarse con un código más "
-"adaptativo, al igual que con parámetros afinables que compensen el gasto "
-"entre el ancho de banda, latencia y el uso de CPU."
+msgstr "Todos estos imponderables pueden solucionarse con un código más adaptativo, al igual que con parámetros afinables que compensen el gasto entre el ancho de banda, latencia y el uso de CPU."
 
 #: i2p2www/pages/site/about/performance/future.html:125
 msgid "Full streaming protocol improvements"
@@ -2076,48 +1804,33 @@ msgstr "Mejoras en el protocolo de transmisión"
 msgid ""
 "Perhaps re-enable the interactive stream profile (the \n"
 "current implementation only uses the bulk stream profile)."
-msgstr ""
-"Quizás usando de nuevo el perfil de transmisión interactivo (la "
-"implementación actual sólo usa el perfil de transmisión normal)."
+msgstr "Quizás usando de nuevo el perfil de transmisión interactivo (la implementación actual sólo usa el perfil de transmisión normal)."
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
-msgstr ""
-"Limitación del ancho de banda en el cliente (en una o las dos direcciones"
-" de una conexión, o posiblemente compartido entre varias conexiones). "
-"Esto será además del límite general de ancho de banda, por supuesto."
+msgstr "Limitación del ancho de banda en el cliente (en una o las dos direcciones de una conexión, o posiblemente compartido entre varias conexiones). Esto será además del límite general de ancho de banda, por supuesto."
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
-msgstr ""
-"Listas de control de acceso (sólo permitiendo conexiones desde o hacia "
-"otras destinaciones conocidas)."
+msgstr "Listas de control de acceso (sólo permitiendo conexiones desde o hacia otras destinaciones conocidas)."
 
 #: i2p2www/pages/site/about/performance/future.html:147
 msgid ""
 "Web controls and monitoring the health of the various streams, as well \n"
 "as the ability to explicitly close or throttle them."
-msgstr ""
-"Control por web y monitorización del estado de varias conexiones, además "
-"de la posibilidad explícita de cerrarlas o regularlas."
+msgstr "Control por web y monitorización del estado de varias conexiones, además de la posibilidad explícita de cerrarlas o regularlas."
 
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
-msgstr ""
-"Varias ideas para mejorar la librería de straming se describen en la <a "
-"href=\"%(streaming)s#future\">web de la librería de streaming</a>."
+msgstr "Varias ideas para mejorar la librería de straming se describen en la <a href=\"%(streaming)s#future\">web de la librería de streaming</a>."
 
 #: i2p2www/pages/site/about/performance/history.html:2
 msgid "Performance History"
@@ -2126,15 +1839,10 @@ msgstr "Historia de rendimiento."
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
-msgstr ""
-"Usando las técnicas de abajo se ha conseguido muchas mejoras en el "
-"rendimiento. Hay más por hacer, vea la web del <a "
-"href=\"%(performance)s\">Rendimiento</a> para probelmas e ideas."
+msgstr "Usando las técnicas de abajo se ha conseguido muchas mejoras en el rendimiento. Hay más por hacer, vea la web del <a href=\"%(performance)s\">Rendimiento</a> para probelmas e ideas."
 
 #: i2p2www/pages/site/about/performance/history.html:10
 msgid "Native math"
@@ -2151,47 +1859,25 @@ msgstr "implementado"
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
-msgstr ""
-"Cuando examiné el código de I2P, la mayoría del tiempo se gastaba dentro "
-"de una función: java.math. En el <a href=\"%(modpow)s\">modPow</a> de "
-"BigInteger. En vez de intentar mejorar este método, usamos <a "
-"href=\"%(gmp)s\">GNU MP</a> - una librería matemática realmente rápida "
-"(con el ensamblador mejorado para varias arquitecturas).  (<i>Editor: vea"
-" <a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
+msgstr "Cuando examiné el código de I2P, la mayoría del tiempo se gastaba dentro de una función: java.math. En el <a href=\"%(modpow)s\">modPow</a> de BigInteger. En vez de intentar mejorar este método, usamos <a href=\"%(gmp)s\">GNU MP</a> - una librería matemática realmente rápida (con el ensamblador mejorado para varias arquitecturas).  (<i>Editor: vea <a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
-msgstr ""
-"\n"
-"ugha y duck están trabajando en el código de C/JNI, y el código java "
-"actual está  desplegado con los 'ganchos' para cuando esté listo. Los "
-"resultados preliminares se ven fantásticos - ejecutar el ruter con GMP "
-"modPow nativo proporciona un aumento de velocidad del 800&#37; , y la "
-"carga se ha reducido ala mitad. Y esto sólo ha sido en la maquina de un "
-"solo usuario, y las cosas están casi listas para ser empaquetado y "
-"distribuidas."
+msgstr "\nugha y duck están trabajando en el código de C/JNI, y el código java actual está  desplegado con los 'ganchos' para cuando esté listo. Los resultados preliminares se ven fantásticos - ejecutar el ruter con GMP modPow nativo proporciona un aumento de velocidad del 800&#37; , y la carga se ha reducido ala mitad. Y esto sólo ha sido en la maquina de un solo usuario, y las cosas están casi listas para ser empaquetado y distribuidas."
 
 #: i2p2www/pages/site/about/performance/history.html:32
 msgid "Garlic wrapping a \"reply\" LeaseSet"
@@ -2203,82 +1889,42 @@ msgstr "implementado pero necesita mejoras"
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
-msgstr ""
-"Esta mejora en el algoritmo sólo afectará a las aplicaciones que quieran "
-"que los pares les responda (esto incluye todo lo que use I2PTunnel o la "
-"mini-librería de streaming de mihi):"
+msgstr "Esta mejora en el algoritmo sólo afectará a las aplicaciones que quieran que los pares les responda (esto incluye todo lo que use I2PTunnel o la mini-librería de streaming de mihi):"
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
-msgstr ""
-"Anteriormente, cuando Alice enviaba un mensaje a Bob, cuando Bob "
-"respondía tenía que hacer una búsqueda en la base de datos de la red - "
-"enviando varias peticiones para obtener el LeaseSet de Alice. Si ya tiene"
-" el LeaseSet de Alice, puede simplemente enviar su respuesta "
-"inmediatamente - esto es (en parte) por qué normalmente toma más tiempo "
-"conectar con alguien por primera vez, pero posteriormente es más rápido. "
-"Actualmente - para todos los clientes - empaquetamos el LeaseSet del "
-"remitente en el mensaje Garlic que es enviado al destinatario, para que "
-"cuando vaya a responder, <i>siempre</i> tendrán el LeaseSet almacenado "
-"localmente - eliminando completamente la necesidad de hacer búsquedas en "
-"la base de datos de la red al responder. Esto ahorra un gran ancho de "
-"banda  al remitente. Si no hiciésemos las búsquedas a menudo, el uso de "
-"ancho de banda disponible global de la red descendería, ya que el "
-"destinatario no necesita hacer la búsqueda en la base de datos de la red."
+msgstr "Anteriormente, cuando Alice enviaba un mensaje a Bob, cuando Bob respondía tenía que hacer una búsqueda en la base de datos de la red - enviando varias peticiones para obtener el LeaseSet de Alice. Si ya tiene el LeaseSet de Alice, puede simplemente enviar su respuesta inmediatamente - esto es (en parte) por qué normalmente toma más tiempo conectar con alguien por primera vez, pero posteriormente es más rápido. Actualmente - para todos los clientes - empaquetamos el LeaseSet del remitente en el mensaje Garlic que es enviado al destinatario, para que cuando vaya a responder, <i>siempre</i> tendrán el LeaseSet almacenado localmente - eliminando completamente la necesidad de hacer búsquedas en la base de datos de la red al responder. Esto ahorra un gran ancho de banda  al remitente. Si no hiciésemos las búsquedas a menudo, el uso de ancho de banda disponible global de la red descendería, ya que el destinatario no necesita hacer la búsqueda en la base de datos de la red."
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
-msgstr ""
-"Para los LeaseSets no publicados como los \"clientes compartidos\", esta "
-"es la única forma de enviar el LeaseSet a Bob. Desafortunadamente al "
-"construirlo cada vez se añade al menos un 100&#37; de sobre gastos en una"
-" red con mucho ancho de banda, y mucho más en una red con mensajes más "
-"pequeños."
+msgstr "Para los LeaseSets no publicados como los \"clientes compartidos\", esta es la única forma de enviar el LeaseSet a Bob. Desafortunadamente al construirlo cada vez se añade al menos un 100&#37; de sobre gastos en una red con mucho ancho de banda, y mucho más en una red con mensajes más pequeños."
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
-msgstr ""
-"Los cambios programados para la versión 0.6.2 empaquetará el LeaseSet "
-"sólo cuando sea necesario, al iniciar la conexión o cuando el LeaseSet "
-"cambie. Esto reducirá sustancialmente el gasto delos mensajes I2P."
+msgstr "Los cambios programados para la versión 0.6.2 empaquetará el LeaseSet sólo cuando sea necesario, al iniciar la conexión o cuando el LeaseSet cambie. Esto reducirá sustancialmente el gasto delos mensajes I2P."
 
 #: i2p2www/pages/site/about/performance/history.html:66
 msgid "More efficient TCP rejection"
@@ -2287,40 +1933,16 @@ msgstr "Más eficiencia en las caídas y errores del protocolo TCP"
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
-msgstr ""
-"En este momento, todas las conexiones TCP hacen todas sus validaciones \n"
-"de pares ('peer') depués de ir a través de la negociación ('handshaking')"
-"\n"
-"Diffie-Hellman completa (cara) para negociar una clave de sesión privada."
-"\n"
-"Esto significa que si el reloj de alguien está bastante desajustado, o "
-"sus \n"
-"NAT/firewall/etc no están apropiadamente configurados (o sólo están\n"
-"ejecutando una versión incompatible del router), van a causar "
-"consistentemente\n"
-"(aunque no constantemente, gracias a la lista de excluidos) una operación"
-"\n"
-"criptográfica cara y futil sobre todos los pares que conozcan. Aunque\n"
-"querremos mantener parte de las verificaciones/validaciones dentro del\n"
-"ámbito del cifrado, querremos actualizar el protocolo para que haga\n"
-"algunas de ellas primero, de forma que podamos rechazarlos \n"
-"limpiamente sin desperdiciar mucha CPU u otros recursos."
+msgstr "En este momento, todas las conexiones TCP hacen todas sus validaciones \nde pares ('peer') depués de ir a través de la negociación ('handshaking')\nDiffie-Hellman completa (cara) para negociar una clave de sesión privada.\nEsto significa que si el reloj de alguien está bastante desajustado, o sus \nNAT/firewall/etc no están apropiadamente configurados (o sólo están\nejecutando una versión incompatible del router), van a causar consistentemente\n(aunque no constantemente, gracias a la lista de excluidos) una operación\ncriptográfica cara y futil sobre todos los pares que conozcan. Aunque\nquerremos mantener parte de las verificaciones/validaciones dentro del\námbito del cifrado, querremos actualizar el protocolo para que haga\nalgunas de ellas primero, de forma que podamos rechazarlos \nlimpiamente sin desperdiciar mucha CPU u otros recursos."
 
 #: i2p2www/pages/site/about/performance/history.html:81
 msgid "Adjust the tunnel testing"
@@ -2328,26 +1950,13 @@ msgstr "Ajustar las pruebas de túneles"
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
-msgstr ""
-"En vez de usar el esquema bastante aleatorio que tenemos ahora, "
-"deberíamos usar un algoritmo más consciente del contexto para probar los "
-"túneles. Por ejemplo, si ya conocemos sus datos de validación "
-"correctamente, no hay necesidad de probarlo, mientras que si no hemos "
-"visto ningún dato recientemente, quizás valga la pena enviarle algunos "
-"datos. Esto reducirá el parón en los túneles debido a un número de "
-"mensajes excesivo, a la vez que mejorará la velocidad en la detección de "
-"los túneles fallidos."
+msgstr "En vez de usar el esquema bastante aleatorio que tenemos ahora, deberíamos usar un algoritmo más consciente del contexto para probar los túneles. Por ejemplo, si ya conocemos sus datos de validación correctamente, no hay necesidad de probarlo, mientras que si no hemos visto ningún dato recientemente, quizás valga la pena enviarle algunos datos. Esto reducirá el parón en los túneles debido a un número de mensajes excesivo, a la vez que mejorará la velocidad en la detección de los túneles fallidos."
 
 #: i2p2www/pages/site/about/performance/history.html:92
 msgid "Persistent Tunnel / Lease Selection"
@@ -2355,27 +1964,17 @@ msgstr "Túneles persistentes / Selección del LeaseSet"
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
-msgstr ""
-"La selección del túnel de salida se implementó en la versión 0.6.1.30, la"
-" selección del túnel de entrada se implementó en la versión 0.6.2."
+msgstr "La selección del túnel de salida se implementó en la versión 0.6.1.30, la selección del túnel de entrada se implementó en la versión 0.6.2."
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
-msgstr ""
-"Seleccionar los túneles y leases aleatoriamente para cada mensaje crea un"
-" gran problema con el envío de mensajes desordenados, lo cual evita que "
-"la librería de streaming pueda aumentar el tamaño de su 'ventana' tanto "
-"como podría. Al persistir con las mismas selecciones para una conexión "
-"determinada, la velocidad de transferencia es mucho mayor."
+msgstr "Seleccionar los túneles y leases aleatoriamente para cada mensaje crea un gran problema con el envío de mensajes desordenados, lo cual evita que la librería de streaming pueda aumentar el tamaño de su 'ventana' tanto como podría. Al persistir con las mismas selecciones para una conexión determinada, la velocidad de transferencia es mucho mayor."
 
 #: i2p2www/pages/site/about/performance/history.html:104
 msgid "Compress some data structures"
@@ -2383,32 +1982,15 @@ msgstr "Comprimiendo algunas estructuras de datos"
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
-msgstr ""
-"Los mensajes I2NP y los datos que contiene están ya definidos en una "
-"estructura bastante compacta, aunque un atributo de la estructura del "
-"RouterInfo no lo está - \"options\" está en texto ASCII plano en el "
-"formato nombre = valor. Ahora mismo, se está rellenado con estadísticas "
-"publicadas - alrededor de 3300 bytes por par. Implementar la compresión "
-"GZip, lo cual es trivial, ahorraría 1/3 de su tamaño, y cuando se "
-"considera las veces que se pasan las estructuras RouterInfo a través de "
-"la red, es un gran ahorro - cada vez que un ruter pregunta a otro por una"
-" entrada en la netDb que el par no posee, envía de vuelta de 3-10 "
-"estructuras RouterInfo."
+msgstr "Los mensajes I2NP y los datos que contiene están ya definidos en una estructura bastante compacta, aunque un atributo de la estructura del RouterInfo no lo está - \"options\" está en texto ASCII plano en el formato nombre = valor. Ahora mismo, se está rellenado con estadísticas publicadas - alrededor de 3300 bytes por par. Implementar la compresión GZip, lo cual es trivial, ahorraría 1/3 de su tamaño, y cuando se considera las veces que se pasan las estructuras RouterInfo a través de la red, es un gran ahorro - cada vez que un ruter pregunta a otro por una entrada en la netDb que el par no posee, envía de vuelta de 3-10 estructuras RouterInfo."
 
 #: i2p2www/pages/site/about/performance/history.html:117
 msgid "Update the ministreaming protocol"
@@ -2420,39 +2002,17 @@ msgstr "reemplazar por un protocolo full streaming"
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
-msgstr ""
-"Actualmente la librería ministream de mihi tiene un protocolo de "
-"negociación bastante simple - Alice envía a Bob un mensaje SYN, Bob "
-"responde con un ACK, entonces Alice y Bob comparten información, hasta "
-"que uno le envíe a otro un mensaje CLOSE. Para conexiones de larga "
-"duración (por ejemplo a un servidor IRC), esta sobrecarga es "
-"despreciable, pero para situaciones de una sola repuesta (Una petición "
-"HTTP por ejemplo), es más del doble de los mensajes necesarios. Si, de "
-"otra forma, Alice hubiese adjuntado su primer payload con el mensaje SYN,"
-" y Bob hubiese adjuntado su primera respuesta en el ACK - e incluso "
-"incluyendo la etiqueta CLOSE - los envíos transitorios como las respuetas"
-" HTTP podrían reducirse a un par de mensajes, en vez del "
-"SYN+ACK+petición+respuesta+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
+msgstr "Actualmente la librería ministream de mihi tiene un protocolo de negociación bastante simple - Alice envía a Bob un mensaje SYN, Bob responde con un ACK, entonces Alice y Bob comparten información, hasta que uno le envíe a otro un mensaje CLOSE. Para conexiones de larga duración (por ejemplo a un servidor IRC), esta sobrecarga es despreciable, pero para situaciones de una sola repuesta (Una petición HTTP por ejemplo), es más del doble de los mensajes necesarios. Si, de otra forma, Alice hubiese adjuntado su primer payload con el mensaje SYN, y Bob hubiese adjuntado su primera respuesta en el ACK - e incluso incluyendo la etiqueta CLOSE - los envíos transitorios como las respuetas HTTP podrían reducirse a un par de mensajes, en vez del SYN+ACK+petición+respuesta+CLOSE."
 
 #: i2p2www/pages/site/about/performance/history.html:132
 msgid "Implement full streaming protocol"
@@ -2460,60 +2020,26 @@ msgstr "Implementar el protocolo full streaming"
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
-msgstr ""
-"El protocolo ministreaming se aprovecha de una decisión en favor de un "
-"pobre diseño\n"
-"en el protocolo de cliente de I2P (I2CP) - la vulnerabilidad del "
-"\"mode=GUARANTEED\"\n"
-"(garantizado), que permite que lo que de otra forma sería sólo un "
-"protocolo basado en\n"
-"mensajes, no fiable, y que lo hace lo mejor que puede, sea utilizado para"
-" operaciones\n"
-"de bloqueo fiables (bajo las apariencias, todo será aún no fiable y "
-"basado en mensajes,\n"
-"con el router I2P proporcionando garantías de entrega al adjuntar un "
-"mensaje \"ACK\" `[acuse\n"
-"de recibo] dentro junto con la carga, de forma que una vez los datos "
-"llegan al objetivo,\n"
-"el mensaje ACK es reenviado de vuelta a nosotros [a través de túneles, "
-"por supuesto])."
+msgstr "El protocolo ministreaming se aprovecha de una decisión en favor de un pobre diseño\nen el protocolo de cliente de I2P (I2CP) - la vulnerabilidad del \"mode=GUARANTEED\"\n(garantizado), que permite que lo que de otra forma sería sólo un protocolo basado en\nmensajes, no fiable, y que lo hace lo mejor que puede, sea utilizado para operaciones\nde bloqueo fiables (bajo las apariencias, todo será aún no fiable y basado en mensajes,\ncon el router I2P proporcionando garantías de entrega al adjuntar un mensaje \"ACK\" `[acuse\nde recibo] dentro junto con la carga, de forma que una vez los datos llegan al objetivo,\nel mensaje ACK es reenviado de vuelta a nosotros [a través de túneles, por supuesto])."
 
 #: i2p2www/pages/site/about/performance/history.html:143
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
-msgstr ""
-"Como ya he <a href=\"%(link)s\">dicho</a>, permitir que el I2PTunnel (y "
-"la librería ministream) usen esta ruta es lo mejor que se pudo hacer, "
-"pero hay mecanismos más eficientes. Cuando eliminamos la funcionalidad "
-"\"mode=GUARANTEED\", estamos esencialmente dejando un I2CP que parece una"
-" capa IP anónima, y por eso, podremos ser capaces de implementar la "
-"librería de streaming para obtener ventajas de las experiencias de diseño"
-" de la capa TCP - ACKs selectivos, detección de congestión, etc."
+msgstr "Como ya he <a href=\"%(link)s\">dicho</a>, permitir que el I2PTunnel (y la librería ministream) usen esta ruta es lo mejor que se pudo hacer, pero hay mecanismos más eficientes. Cuando eliminamos la funcionalidad \"mode=GUARANTEED\", estamos esencialmente dejando un I2CP que parece una capa IP anónima, y por eso, podremos ser capaces de implementar la librería de streaming para obtener ventajas de las experiencias de diseño de la capa TCP - ACKs selectivos, detección de congestión, etc."
 
 #: i2p2www/pages/site/about/performance/index.html:2
 msgid "Performance"
@@ -2523,95 +2049,44 @@ msgstr "Rendimiento"
 msgid ""
 "How does I2P work, why is it slow, and why does it not use my full "
 "bandwidth?"
-msgstr ""
-"¿Cómo funciona I2P, por qué es lento, y por qué no utiliza todo el ancho "
-"de banda?"
+msgstr "¿Cómo funciona I2P, por qué es lento, y por qué no utiliza todo el ancho de banda?"
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
-msgstr ""
-"Probablemente una de las preguntas más frecuentes es ¿cómo de rápido es "
-"I2P?, y parece que a nadie le gusta la respuesta - \"depende\". Después "
-"de probar I2P, la siguiente cosa que preguntan es ¿será más rápido?, y la"
-" respuesta a eso es un enfático <b>sí</b>."
+msgstr "Probablemente una de las preguntas más frecuentes es ¿cómo de rápido es I2P?, y parece que a nadie le gusta la respuesta - \"depende\". Después de probar I2P, la siguiente cosa que preguntan es ¿será más rápido?, y la respuesta a eso es un enfático <b>sí</b>."
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
-msgstr ""
-"I2P es un red totalmente dinámica. Cada cliente es conocido por otros "
-"nodos y prueba los nodos conocidos localmente para comprobar su "
-"accesibilidad y su capacidad. Sólo los nodos accesibles y capaces son "
-"guardados en la NetDB local (Esto normalmente es sólo una parte de la "
-"red, sobre 500-1000). Cuando I2P construye túneles selecciona los mejores"
-" recursos de esta fuente. Por ejemplo, sólo unos 20-50 nodos están "
-"disponibles para construir túneles. Ya que las pruebas se hacen cada "
-"minuto la fuente de los nodos usados cambia cada minuto. Cada nodo I2P "
-"conoce una parte de la red total, haciendo que cada ruter tenga una lista"
-" diferente de nodos I2P para ser usados como túneles. Incluso si dos "
-"ruters tienen la misma subred de nodos conocidos las pruebas de "
-"accesibilidad y capacidad mostrarán diferentes resultados, ya que cuando "
-"un ruter hace las pruebas otros ruters pueden estar bajo carga, pero "
-"estar libre cuando es un segundo ruter el que hace las pruebas."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
+msgstr "I2P es un red totalmente dinámica. Cada cliente es conocido por otros nodos y prueba los nodos conocidos localmente para comprobar su accesibilidad y su capacidad. Sólo los nodos accesibles y capaces son guardados en la NetDB local (Esto normalmente es sólo una parte de la red, sobre 500-1000). Cuando I2P construye túneles selecciona los mejores recursos de esta fuente. Por ejemplo, sólo unos 20-50 nodos están disponibles para construir túneles. Ya que las pruebas se hacen cada minuto la fuente de los nodos usados cambia cada minuto. Cada nodo I2P conoce una parte de la red total, haciendo que cada ruter tenga una lista diferente de nodos I2P para ser usados como túneles. Incluso si dos ruters tienen la misma subred de nodos conocidos las pruebas de accesibilidad y capacidad mostrarán diferentes resultados, ya que cuando un ruter hace las pruebas otros ruters pueden estar bajo carga, pero estar libre cuando es un segundo ruter el que hace las pruebas."
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
-msgstr ""
-"El texto anterior explica porque cada nodo I2P usa diferentes nodos para "
-"construir sus túneles. Porque cada nodo I2P tienen una latencia y ancho "
-"de banda diferente, los túneles ( que se construyen con estos nodos) "
-"tienen valores diferentes de latencia y ancho de banda. Y ya que cada "
-"nodo I2P tiene diferentes nodos construidos, no hay dos nodos I2P con la "
-"misma configuración de túneles."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
+msgstr "El texto anterior explica porque cada nodo I2P usa diferentes nodos para construir sus túneles. Porque cada nodo I2P tienen una latencia y ancho de banda diferente, los túneles ( que se construyen con estos nodos) tienen valores diferentes de latencia y ancho de banda. Y ya que cada nodo I2P tiene diferentes nodos construidos, no hay dos nodos I2P con la misma configuración de túneles."
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
-msgstr ""
-"Un servidor/cliente se conoce como \"destinación\"  y cada destinación "
-"tiene al menos un túnel de entrada y otro de salida. Por defecto son 3 "
-"saltos por túnel. Esto suman 12 saltos (osea 12 diferentes nodos I2P) "
-"para una ida y vuelta completa cliente-servidor-cliente."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
+msgstr "Un servidor/cliente se conoce como \"destinación\"  y cada destinación tiene al menos un túnel de entrada y otro de salida. Por defecto son 3 saltos por túnel. Esto suman 12 saltos (osea 12 diferentes nodos I2P) para una ida y vuelta completa cliente-servidor-cliente."
 
 #: i2p2www/pages/site/about/performance/index.html:34
 msgid ""
 "Each data package is sent through 6 other I2P nodes until it reaches the "
 "server:"
-msgstr ""
-"Cada paquete de datos es enviado a través de otros 6 nodos I2P hasta que "
-"alcanza el servidor:"
+msgstr "Cada paquete de datos es enviado a través de otros 6 nodos I2P hasta que alcanza el servidor:"
 
 #: i2p2www/pages/site/about/performance/index.html:40
 msgid "and on way back 6 different I2P nodes:"
@@ -2619,165 +2094,62 @@ msgstr "y de vuelta por 6 nodos I2P diferentes:"
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
-msgstr ""
-"Como la mayoría del tráfico I2P (www, torrent, ...) necesita paquetes ack"
-" hasta que la nueva información es enviada, necesita esperar hasta que un"
-" paquete ack regrese del servidor. Al final: envía información, espera "
-"por ack, envía mas información, espera por ack... Y ya que el RTT "
-"(RoundTripTime) añade latencia por cada nodo individual I2P y por cada "
-"conexión de esta ida y vuelta, normalmente tarda de 1-3 segundos hasta "
-"que un paquete ack regresa al cliente. Además el funcionamiento interno "
-"del transporte de TCP y de I2P hacen que un paquete de información tenga "
-"un tamaño limitado y no pueda ser tan grande como desearíamos que fuese. "
-"Estas condiciones unidas crean un límite de ancho de banda por túnel de "
-"20-50 kbyte/sec. Pero, si SÓLO un salto del túnel tiene solamente 5 "
-"kb/sec de ancho de banda para usar, el túnel completo estará limitado a 5"
-" kb/sec, independientemente de las latencia y otras limitaciones."
+msgstr "Como la mayoría del tráfico I2P (www, torrent, ...) necesita paquetes ack hasta que la nueva información es enviada, necesita esperar hasta que un paquete ack regrese del servidor. Al final: envía información, espera por ack, envía mas información, espera por ack... Y ya que el RTT (RoundTripTime) añade latencia por cada nodo individual I2P y por cada conexión de esta ida y vuelta, normalmente tarda de 1-3 segundos hasta que un paquete ack regresa al cliente. Además el funcionamiento interno del transporte de TCP y de I2P hacen que un paquete de información tenga un tamaño limitado y no pueda ser tan grande como desearíamos que fuese. Estas condiciones unidas crean un límite de ancho de banda por túnel de 20-50 kbyte/sec. Pero, si SÓLO un salto del túnel tiene solamente 5 kb/sec de ancho de banda para usar, el túnel completo estará limitado a 5 kb/sec, independientemente de las latencia y otras limitaciones."
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
-msgstr ""
-"Debido al cifrado usado y otras configuraciones de I2P (como se "
-"construyen los túneles, latencia, ...) se utiliza bastante tiempo de la "
-"CPU para crear un túnel. Esto es por lo que una destinación solo tiene "
-"permitido un máximo de 6 túneles de  de entrada y 6 de salida para enviar"
-" información. Con un máximo de 50 kb/sec por túnel una destinación podría"
-" usar aproximadamente 300 kb/sec (en realidad podría ser más si se "
-"utilizan túneles más cortos con poco o ningún anonimato). Los túneles "
-"usados son eliminados cada 10 minutos y se crean unos nuevos. Estos "
-"cambios en los túneles (y a veces los clientes que apagan de golpe usando"
-" \"apagar inmediatamente\" o por caídas de corriente) a veces rompen los "
-"túneles y las conexiones, como se puede ver en las pérdidas de conexiones"
-" en el IRC2P (ping timeout) o cuando se está usando eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
+msgstr "Debido al cifrado usado y otras configuraciones de I2P (como se construyen los túneles, latencia, ...) se utiliza bastante tiempo de la CPU para crear un túnel. Esto es por lo que una destinación solo tiene permitido un máximo de 6 túneles de  de entrada y 6 de salida para enviar información. Con un máximo de 50 kb/sec por túnel una destinación podría usar aproximadamente 300 kb/sec (en realidad podría ser más si se utilizan túneles más cortos con poco o ningún anonimato). Los túneles usados son eliminados cada 10 minutos y se crean unos nuevos. Estos cambios en los túneles (y a veces los clientes que apagan de golpe usando \"apagar inmediatamente\" o por caídas de corriente) a veces rompen los túneles y las conexiones, como se puede ver en las pérdidas de conexiones en el IRC2P (ping timeout) o cuando se está usando eepget."
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
-msgstr ""
-"Con un número limitado de destinaciones y un número limitado de túneles "
-"por destinación, un nodo I2P sólo utiliza un número limitado de túneles a"
-" través de otros nodos de I2P. Por ejemplo, si en el ejemplo de arriba un"
-" nodo I2P es \"hop1\", sólo tendríamos 1 túnel participante originado en "
-"el cliente. Si sumamos toda la red I2P, sólo un número limitado de "
-"túneles participantes pueden ser construidos con una cantidad limitada de"
-" ancho de banda. Si uno distribuye todo ese número limitado entre el "
-"número de nodos I2P, sólo hay disponible una fracción del ancho de "
-"banca/capacidad disponible para el uso."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
+msgstr "Con un número limitado de destinaciones y un número limitado de túneles por destinación, un nodo I2P sólo utiliza un número limitado de túneles a través de otros nodos de I2P. Por ejemplo, si en el ejemplo de arriba un nodo I2P es \"hop1\", sólo tendríamos 1 túnel participante originado en el cliente. Si sumamos toda la red I2P, sólo un número limitado de túneles participantes pueden ser construidos con una cantidad limitada de ancho de banda. Si uno distribuye todo ese número limitado entre el número de nodos I2P, sólo hay disponible una fracción del ancho de banca/capacidad disponible para el uso."
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
-msgstr ""
-"Para permanecer anónimos un ruter no debería usarse por toda la red para "
-"construir túneles, si un solo ruter funciona como túnel para TODOS los "
-"nodos de I2P se convierte en el centro de un problema, así como el punto "
-"central para obtener IPs e información de los clientes. Esto no es bueno."
-" I2P intenta repartir la carga a través de muchos nodos I2P justo por "
-"esta razón."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
+msgstr "Para permanecer anónimos un ruter no debería usarse por toda la red para construir túneles, si un solo ruter funciona como túnel para TODOS los nodos de I2P se convierte en el centro de un problema, así como el punto central para obtener IPs e información de los clientes. Esto no es bueno. I2P intenta repartir la carga a través de muchos nodos I2P justo por esta razón."
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
-msgstr ""
-"Otro punto a tener en cuenta es la red mesh completa. Cada conexión "
-"salto-a-salto utiliza una conexión TCP o UDP en los nodos de I2P. Con "
-"1000 conexiones uno ve 1000 conexiones TCP. Eso es bastante y algunos "
-"ruters domésticos o de oficina (DSL, cable...) sólo permiten un cierto "
-"número de conexiones ( o simplemente se vuelven locos si se usa un número"
-" mayor de X conexiones). I2P intenta limitar esas conexiones por debajo "
-"de 1500 para UDP y TCP. Esto limita también la cantidad de tráfico "
-"enrutado a través de su nodo I2P."
+msgstr "Otro punto a tener en cuenta es la red mesh completa. Cada conexión salto-a-salto utiliza una conexión TCP o UDP en los nodos de I2P. Con 1000 conexiones uno ve 1000 conexiones TCP. Eso es bastante y algunos ruters domésticos o de oficina (DSL, cable...) sólo permiten un cierto número de conexiones ( o simplemente se vuelven locos si se usa un número mayor de X conexiones). I2P intenta limitar esas conexiones por debajo de 1500 para UDP y TCP. Esto limita también la cantidad de tráfico enrutado a través de su nodo I2P."
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
-msgstr ""
-"En resumen, I2P es muy complejo y no hay una forma fácil de determinar "
-"con precisión por qué su nodo no se utiliza. Si su ruter es accesible y "
-"tiene mas de 128 kbyte/sec de ancho de banda compartido y está accesible "
-"24/7, debería ser usado después de algún tiempo de tener tráfico "
-"participante. Si no esta activo siempre, las pruebas de otros nodos sobre"
-" su nodo I2P le dirá: no está accesible. Esto bloquea su nodo por al "
-"menos 24h para los otros nodos. Por lo cual los otros nodos que han "
-"testado su nodo cuando estaba caído no utilizarán su nodo para construir "
-"túneles durante 24h. Esto es por lo que su tráfico será menor después de "
-"un reinicio/apagado por lo menos durante 24h."
+msgstr "En resumen, I2P es muy complejo y no hay una forma fácil de determinar con precisión por qué su nodo no se utiliza. Si su ruter es accesible y tiene mas de 128 kbyte/sec de ancho de banda compartido y está accesible 24/7, debería ser usado después de algún tiempo de tener tráfico participante. Si no esta activo siempre, las pruebas de otros nodos sobre su nodo I2P le dirá: no está accesible. Esto bloquea su nodo por al menos 24h para los otros nodos. Por lo cual los otros nodos que han testado su nodo cuando estaba caído no utilizarán su nodo para construir túneles durante 24h. Esto es por lo que su tráfico será menor después de un reinicio/apagado por lo menos durante 24h."
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
-msgstr ""
-"Además: otros nodos I2P necesitan conocer su ruter I2P para probar la "
-"accesibilidad y capacidad. Toma tiempo que otros nodos lleguen a conocer "
-"su nodo. Será más rápido si utiliza I2P y crea más túneles, por ejemplo "
-"usando torrents o webs i2p durante algún tiempo."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
+msgstr "Además: otros nodos I2P necesitan conocer su ruter I2P para probar la accesibilidad y capacidad. Toma tiempo que otros nodos lleguen a conocer su nodo. Será más rápido si utiliza I2P y crea más túneles, por ejemplo usando torrents o webs i2p durante algún tiempo."
 
 #: i2p2www/pages/site/about/performance/index.html:99
 msgid "Performance Improvements"
@@ -2788,7 +2160,4 @@ msgstr "Mejoras en el rendimiento"
 msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
-msgstr ""
-"Para futuras mejoras en el rendimiento vea <a href=\"%(future)s\">mejoras"
-" futuras en el rendimiento</a>."
-
+msgstr "Para futuras mejoras en el rendimiento vea <a href=\"%(future)s\">mejoras futuras en el rendimiento</a>."
diff --git a/i2p2www/translations/es/LC_MESSAGES/comparison.po b/i2p2www/translations/es/LC_MESSAGES/comparison.po
index 60bfe0e9cfb41365fa5d409557f334ad18959bed..23563f614883d69ba81c5f1bc44a7ba58fbb82ab 100644
--- a/i2p2www/translations/es/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/es/LC_MESSAGES/comparison.po
@@ -1,29 +1,31 @@
-# Spanish translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
-# Adolfo Jayme Barrientos, 2013
-# Daniel Mustieles <inactive+leo@transifex.com>, 2013
+# Adolfo Jayme-Barrientos, 2013
+# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013
 # m1xxy <m1xxy@mail.i2p>, 2011
 # Oliver Trash <oliver.trasshh@gmail.com>, 2013
 # strel, 2016
 # strel, 2013
 # trolly, 2013
-# Trolly, 2013
+# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
+# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2018-10-04 00:26+0000\n"
-"Last-Translator: erinm\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: strel, 2016\n"
 "Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: es\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -31,85 +33,39 @@ msgstr "Comparación de I2P con Freenet"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
-msgstr ""
-"Freenet es una red completamente distribuida, red anónima de publicación "
-"par a par, que ofrece una forma segura de almacenar datos, y también "
-"enfocada en solucionar los problemas de carga y desbordamientos. Mientras"
-" que Freenet está diseñada como un almacén distribuido de datos, la gente"
-" ha construido aplicaciones sobre el sistema para tener otras "
-"comunicaciones anónimas genéricas, como webs estáticas y foros."
+msgstr "Freenet es una red completamente distribuida, red anónima de publicación par a par, que ofrece una forma segura de almacenar datos, y también enfocada en solucionar los problemas de carga y desbordamientos. Mientras que Freenet está diseñada como un almacén distribuido de datos, la gente ha construido aplicaciones sobre el sistema para tener otras comunicaciones anónimas genéricas, como webs estáticas y foros."
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
-msgstr ""
-"Comparado con I2P, Freenet ofrece substanciales beneficios - es un "
-"sistema distribuido de almacenamiento de datos, mientras que I2P no lo "
-"es, permitiendo a la gente obtener al contenido publicado por otros "
-"incluso cuando el que lo ha publicado no esté online. Además es capaz de "
-"distribuir eficientemente la información más utilizada. I2P no tiene ni "
-"tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para "
-"los usuarios que simplemente quieren comunicarse con otros anónimamente a"
-" través de webs, foros, aplicaciones de compartición de archivos, etc.  "
-"Ha habido varios intentos de desarrollar un sistema de almacenamiento "
-"distribuido funcionando sobre I2P, (más recientemente un port de <a "
-"href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavía no está listo para uso "
-"general."
+msgstr "Comparado con I2P, Freenet ofrece substanciales beneficios - es un sistema distribuido de almacenamiento de datos, mientras que I2P no lo es, permitiendo a la gente obtener al contenido publicado por otros incluso cuando el que lo ha publicado no esté online. Además es capaz de distribuir eficientemente la información más utilizada. I2P no tiene ni tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para los usuarios que simplemente quieren comunicarse con otros anónimamente a través de webs, foros, aplicaciones de compartición de archivos, etc.  Ha habido varios intentos de desarrollar un sistema de almacenamiento distribuido funcionando sobre I2P, (más recientemente un port de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavía no está listo para uso general."
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
-msgstr ""
-"Sin embargo, e incluso ignorando los problemas de implementación, hay "
-"algunas preocupaciones sobre la escalabilidad y el anonimato de algunos "
-"algoritmos de Freenet, debido básicamente a la heurística de ruteo  de "
-"Freenet. La unión de varias técnicas puede desalentar el hacer varios "
-"tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo "
-"podrían proveer la escalabilidad esperada. Desafortunadamente, no muchos "
-"de los análisis sobre los algoritmos han dado resultados satisfactorios, "
-"pero aún hay esperanzas. Al final, Freenet nos proporciona bastante "
-"anonimato contra cualquier atacante que no tenga los recursos necesarios "
-"para análisis completos."
+msgstr "Sin embargo, e incluso ignorando los problemas de implementación, hay algunas preocupaciones sobre la escalabilidad y el anonimato de algunos algoritmos de Freenet, debido básicamente a la heurística de ruteo  de Freenet. La unión de varias técnicas puede desalentar el hacer varios tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo podrían proveer la escalabilidad esperada. Desafortunadamente, no muchos de los análisis sobre los algoritmos han dado resultados satisfactorios, pero aún hay esperanzas. Al final, Freenet nos proporciona bastante anonimato contra cualquier atacante que no tenga los recursos necesarios para análisis completos."
 
 #: i2p2www/pages/site/comparison/index.html:2
 msgid "Comparing I2P to other projects"
@@ -117,49 +73,28 @@ msgstr "Comparando I2P con otros proyectos"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Hay muchas otras buenas aplicaciones y proyectos trabajando en "
-"comunicaciones anónimas, e I2P se ha inspirado en muchos de sus "
-"esfuerzos. Esto no es una lista completa de recursos para el anonimato - "
-"ambos \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a> y los <a "
-"href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con "
-"GNUnet sirven también para ese mismo propósito. Dicho eso, pocos "
-"proyectos destacan como para comparaciones adicionales. Los siguientes "
-"proyectos tienen webs con comparaciones individuales:"
+msgstr "Hay muchas otras buenas aplicaciones y proyectos trabajando en comunicaciones anónimas, e I2P se ha inspirado en muchos de sus esfuerzos. Esto no es una lista completa de recursos para el anonimato - ambos \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> y los <a href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con GNUnet sirven también para ese mismo propósito. Dicho eso, pocos proyectos destacan como para comparaciones adicionales. Los siguientes proyectos tienen webs con comparaciones individuales:"
 
 #: i2p2www/pages/site/comparison/index.html:20
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Los siguientes proyectos son discutidos en la <a "
-"href=\"%(othernetworks)s\">página sobre otras redes:</a>"
+msgstr "Los siguientes proyectos son discutidos en la <a href=\"%(othernetworks)s\">página sobre otras redes:</a>"
 
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Los contenidos de esta página pueden ser cambiados o discutidos, y "
-"apreciamos los comentarios y añadidos. Puede contribuir al análisis "
-"creando un <a href=\"%(trac)s\">nuevo ticket en el Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
 msgid "I2P Compared to Other Anonymous Networks"
@@ -176,232 +111,116 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"La mayoría de las secciones siguientes son bastante viejas, y puede que "
-"no sean precisas. Para una vista rápida de las comparaciones disponibles,"
-" vea la <a href=\"%(comparison)s\">página principal de comparaciones</a>."
-" Puede contribuir al análisis creando un <a href=\"%(trac)s\">nuevo "
-"ticket en el Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
-msgstr ""
-"Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par "
-"anónimas con proxies para el anonimato, permitiendo a la gente enviar "
-"datos fuera a través de redes de mezcla de baja latencia. Morphmix "
-"incluye unos algoritmos de detección de colisiones bastante interesante y"
-" defensas contra Sybil, mientras que Tarzan hace uso de la escasez de "
-"direcciones IP para obtener lo mismo. Las dos principales diferencias "
-"entre estos dos sistemas e I2P tienen que ver con el <a "
-"href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y  su diseño de "
-"outproxies (al contrario que el anonimato proporcionado  para ambos, el "
-"que envía y el que recibe). El código está disponible para ambos "
-"sistemas, pero no sabemos de su uso fuera de ambientes académicos."
+msgstr "Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par anónimas con proxies para el anonimato, permitiendo a la gente enviar datos fuera a través de redes de mezcla de baja latencia. Morphmix incluye unos algoritmos de detección de colisiones bastante interesante y defensas contra Sybil, mientras que Tarzan hace uso de la escasez de direcciones IP para obtener lo mismo. Las dos principales diferencias entre estos dos sistemas e I2P tienen que ver con el <a href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y  su diseño de outproxies (al contrario que el anonimato proporcionado  para ambos, el que envía y el que recibe). El código está disponible para ambos sistemas, pero no sabemos de su uso fuera de ambientes académicos."
 
 #: i2p2www/pages/site/comparison/other-networks.html:172
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
-msgstr ""
-"\n"
-"Mixminion y Mixmaster son redes que soportan correos anónimos contra "
-"adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia"
-" sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) "
-"quizás sean adecuadas para satisfacer el modelo de amenazas de estos "
-"adversarios, funcionando en paralelo con las necesidades de baja latencia"
-" de los usuarios, para proporcionar un gran set de anonimato. El soporte "
-"de alta latencia en el ruter de I2P puede que se añada o no en un futuro "
-"distante. Es demasiado pronto para decir si I2P satisfará las necesidades"
-" de los usuarios que requieran una protección extrema para los correos."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
+msgstr "\nMixminion y Mixmaster son redes que soportan correos anónimos contra adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) quizás sean adecuadas para satisfacer el modelo de amenazas de estos adversarios, funcionando en paralelo con las necesidades de baja latencia de los usuarios, para proporcionar un gran set de anonimato. El soporte de alta latencia en el ruter de I2P puede que se añada o no en un futuro distante. Es demasiado pronto para decir si I2P satisfará las necesidades de los usuarios que requieran una protección extrema para los correos."
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
 msgid ""
 "As with Tor and Onion Routing, \n"
 "both Mixminion and Mixmaster take the directory based approach as well."
-msgstr ""
-"Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también"
-" la aproximación basada en directorios."
+msgstr "Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también la aproximación basada en directorios."
 
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
-msgstr ""
-"JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el "
-"anonimato de las solicitudes web que tiene varios nodos centrales "
-"(participantes en la cascada) que combinan y mezclan las solicitudes de "
-"los clientes a través de una secuencia de nodos (la cascada) antes de "
-"enviarlos por un proxy a la web. El alcance, modelo de amenazas y la "
-"seguridad son bastantes diferentes a las de I2P, pero para aquellos que "
-"requieran bastante anonimato pero no están satisfechos con un servicio de"
-" tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un "
-"precaución que debe tener todo aquel que se encuentre bajo la "
-"jurisdicción de  los juzgados alemanes, es que el German Federal Bureau "
-"of Criminal Investigation (FBCI) ha montado un <a "
-"href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el "
-"ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad"
-" es que la información fue sustraída con éxito. Los jueces cambian sus "
-"mentes basados en las circunstancias, y esta es la evidencia de que si el"
-" gobierno quisiese la información podrían conseguirla, aunque fuese "
-"inadmisible más tarde en un juicio)"
+msgstr "JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el anonimato de las solicitudes web que tiene varios nodos centrales (participantes en la cascada) que combinan y mezclan las solicitudes de los clientes a través de una secuencia de nodos (la cascada) antes de enviarlos por un proxy a la web. El alcance, modelo de amenazas y la seguridad son bastantes diferentes a las de I2P, pero para aquellos que requieran bastante anonimato pero no están satisfechos con un servicio de tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un precaución que debe tener todo aquel que se encuentre bajo la jurisdicción de  los juzgados alemanes, es que el German Federal Bureau of Criminal Investigation (FBCI) ha montado un <a href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad es que la información fue sustraída con éxito. Los jueces cambian sus mentes basados en las circunstancias, y esta es la evidencia de que si el gobierno quisiese la información podrían conseguirla, aunque fuese inadmisible más tarde en un juicio)"
 
 #: i2p2www/pages/site/comparison/other-networks.html:216
 #, python-format
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
-msgstr ""
-"Estos dos sistemas trabajan con el rutado básico <a "
-"href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer "
-"negación plausible contra un simple adversario sin colisión. Con el "
-"rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast"
-"  para encontrar  el par o la identidad deseada, y después usan esa "
-"algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones "
-"que sólo quieren saber que tienen que ofrecer la gente que está alrededor"
-" - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se "
-"obtiene un conjunto de nodos que pueden compartit archivos y mantener el "
-"anonimato (aunque no se tiene mucho control sobre quién es ese grupo de "
-"pares)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
+msgstr "Estos dos sistemas trabajan con el rutado básico <a href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer negación plausible contra un simple adversario sin colisión. Con el rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast  para encontrar  el par o la identidad deseada, y después usan esa algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones que sólo quieren saber que tienen que ofrecer la gente que está alrededor - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se obtiene un conjunto de nodos que pueden compartit archivos y mantener el anonimato (aunque no se tiene mucho control sobre quién es ese grupo de pares)."
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
-msgstr ""
-"Sin embargo, el algoritmo no escala bien del todo - si la aplicación "
-"quiere hablar con un par en particular termina haciendo una búsqueda "
-"broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). "
-"Esto significa que mientras esas redes trabajan bien a escalas pequeñas, "
-"no son apropiadas para redes grandes donde alguien quiere ponerse en "
-"contacto con un par en particular. Esto no quiere decir que este sistema "
-"no tenga ningún valor, sólo que su aplicación está limitada a situaciones"
-" donde sus problemas pueden evitarse."
+msgstr "Sin embargo, el algoritmo no escala bien del todo - si la aplicación quiere hablar con un par en particular termina haciendo una búsqueda broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). Esto significa que mientras esas redes trabajan bien a escalas pequeñas, no son apropiadas para redes grandes donde alguien quiere ponerse en contacto con un par en particular. Esto no quiere decir que este sistema no tenga ningún valor, sólo que su aplicación está limitada a situaciones donde sus problemas pueden evitarse."
 
 #: i2p2www/pages/site/comparison/other-networks.html:239
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
-msgstr ""
-"Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo"
-" un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una "
-"herramienta de elusión</a>. No hace falta decir que el ser de código "
-"cerrado y orientada a un país específico no son buenas ideas. I2P es, por"
-" supuesto, de código libre. Aunque el código y nuestra <a "
-"href=\"%(docs)s\">documentación técnica</a> necesitan muchas más "
-"revisión."
+msgstr "Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una herramienta de elusión</a>. No hace falta decir que el ser de código cerrado y orientada a un país específico no son buenas ideas. I2P es, por supuesto, de código libre. Aunque el código y nuestra <a href=\"%(docs)s\">documentación técnica</a> necesitan muchas más revisión."
 
 #: i2p2www/pages/site/comparison/other-networks.html:248
 msgid "Paid VPN Services"
@@ -412,10 +231,8 @@ msgstr "Servicios VPN de pago"
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Puede contribuir al análisis creando un <a href=\"%(trac)s\">nuevo ticket"
-" en el Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
 msgid "Others"
@@ -443,17 +260,7 @@ msgid ""
 "network, as well as gather and report statistics, as \n"
 "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
 "database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
-msgstr ""
-"Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a"
-" la gente salir a través de su red ya mezclada de baja latencia. Las dos "
-"primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo "
-"relacionas con las diferencias en el modelo de amenazas y el diseño de "
-"los outproxies (a través de Tor soporta también servicios ocultos). "
-"Además, Tor usa un enfoque basado en  directorios - creando un punto "
-"central para manejar la 'vista' general de las redes, y además se "
-"obtienen más estadísticas, al contrario que la <a href=\"%(netdb)s\">base"
-" de datos de la red </a> dsitribuida de I2P y la <a "
-"href=\"%(peerselection)s\">selección de pares</a>."
+msgstr "Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a la gente salir a través de su red ya mezclada de baja latencia. Las dos primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo relacionas con las diferencias en el modelo de amenazas y el diseño de los outproxies (a través de Tor soporta también servicios ocultos). Además, Tor usa un enfoque basado en  directorios - creando un punto central para manejar la 'vista' general de las redes, y además se obtienen más estadísticas, al contrario que la <a href=\"%(netdb)s\">base de datos de la red </a> dsitribuida de I2P y la <a href=\"%(peerselection)s\">selección de pares</a>."
 
 #: i2p2www/pages/site/comparison/tor.html:23
 msgid ""
@@ -466,13 +273,7 @@ msgid ""
 "outproxies are prone to abuse, along with all of the \n"
 "other security issues we've come to know and love with \n"
 "normal Internet traffic."
-msgstr ""
-"El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de "
-"ataques - una vez que la comunicación deja la red Tor, adversarios "
-"pasivos pueden hacer más fácilmente ataques de análisis. Además los "
-"outproxies tienen acceso al texto en claro transferido en las dos "
-"direcciones, y los outproxies son propensos a abusos, y además tenemos "
-"que tener en cuenta otros ataques posibles dentro del Internet normal."
+msgstr "El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de ataques - una vez que la comunicación deja la red Tor, adversarios pasivos pueden hacer más fácilmente ataques de análisis. Además los outproxies tienen acceso al texto en claro transferido en las dos direcciones, y los outproxies son propensos a abusos, y además tenemos que tener en cuenta otros ataques posibles dentro del Internet normal."
 
 #: i2p2www/pages/site/comparison/tor.html:35
 msgid ""
@@ -482,12 +283,7 @@ msgid ""
 "to build outproxy functionality on top of an anonymous\n"
 "communication layer, they can).  In fact, some I2P users\n"
 "currently take advantage of Tor to outproxy."
-msgstr ""
-"Aún así, mucha gente no tiene por que preocuparse por estas situaciones, "
-"ya que no están dentro del modelo de amenazas. Y además esto está fuera "
-"del alcance (formal) de I2P (si la gente desea construir un outproxy "
-"sobre la capa de comunicación anónima, pueden hacerlo). De hecho, "
-"actualmente  algunos usuarios utilizan el outproxy de Tor."
+msgstr "Aún así, mucha gente no tiene por que preocuparse por estas situaciones, ya que no están dentro del modelo de amenazas. Y además esto está fuera del alcance (formal) de I2P (si la gente desea construir un outproxy sobre la capa de comunicación anónima, pueden hacerlo). De hecho, actualmente  algunos usuarios utilizan el outproxy de Tor."
 
 #: i2p2www/pages/site/comparison/tor.html:49
 msgid "Comparison of Tor and I2P Terminology"
@@ -497,9 +293,7 @@ msgstr "Comparación de la terminología de I2P y Tor"
 msgid ""
 "While Tor and I2P are similar in many ways, much of the terminology is "
 "different."
-msgstr ""
-"Mientras que Tor e I2p tienen algunas similitudes, mucha de la "
-"terminología cambia."
+msgstr "Mientras que Tor e I2p tienen algunas similitudes, mucha de la terminología cambia."
 
 #: i2p2www/pages/site/comparison/tor.html:55
 msgid "Cell"
@@ -572,8 +366,8 @@ msgstr "Servicio oculto"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
-msgstr "Eepsite o destinación"
+msgid "I2P Site or Destination"
+msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
 msgid "Hidden Service Descriptor"
@@ -623,9 +417,7 @@ msgstr "Punto de reunión"
 
 #: i2p2www/pages/site/comparison/tor.html:70
 msgid "somewhat like Inbound Gateway + Outbound Endpoint"
-msgstr ""
-"algo así como inbound Gateway + Outbound Endpoint, puerta de salida de "
-"entrada + punto final de salida"
+msgstr "algo así como inbound Gateway + Outbound Endpoint, puerta de salida de entrada + punto final de salida"
 
 #: i2p2www/pages/site/comparison/tor.html:71
 msgid "Router Descriptor"
@@ -645,15 +437,10 @@ msgstr "Beneficios de Tor sobre I2p"
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
-msgstr ""
-"El número de usuarios es mucho mayor; mucho más visible en entorno "
-"académicos y comunidades de hackers; tiene los beneficios de tener "
-"estudios formales sobre el anonimato, resistencia y rendimiento; y tienen"
-" un líder no anónimo universitario y visible"
+msgstr "El número de usuarios es mucho mayor; mucho más visible en entorno académicos y comunidades de hackers; tiene los beneficios de tener estudios formales sobre el anonimato, resistencia y rendimiento; y tienen un líder no anónimo universitario y visible"
 
 #: i2p2www/pages/site/comparison/tor.html:84
 msgid "Has already solved some scaling issues I2P has yet to address"
@@ -669,32 +456,24 @@ msgstr "Tiene más desarrolladores, incluso algunos con fondos"
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
-msgstr ""
-"Tiene un bloqueo de nivel de estado más resistente debido la capa de "
-"transporte TLS y a los puentes (I2P tienen propuestas de \"rutas "
-"completamente restringidas\" pero estas aún no están implementadas)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
+msgstr "Tiene un bloqueo de nivel de estado más resistente debido la capa de transporte TLS y a los puentes (I2P tienen propuestas de \"rutas completamente restringidas\" pero estas aún no están implementadas)"
 
 #: i2p2www/pages/site/comparison/tor.html:93
 msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr "Es tan grande que incluso se ha adaptado para bloquear los intentos de DOS"
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
-msgstr ""
-"Diseñado para optimizar el tráfico de salida, con un gran número de nodos"
-" de salida"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
+msgstr "Diseñado para optimizar el tráfico de salida, con un gran número de nodos de salida"
 
 #: i2p2www/pages/site/comparison/tor.html:96
 msgid ""
 "Better documentation, has formal papers and specifications,\n"
 "better website, many more translations"
-msgstr ""
-"Mejor documentación, tiene estudios formales y especificaciones, una web "
-"mejor, y muchas traducciones"
+msgstr "Mejor documentación, tiene estudios formales y especificaciones, una web mejor, y muchas traducciones"
 
 #: i2p2www/pages/site/comparison/tor.html:101
 msgid "More efficient with memory usage"
@@ -708,17 +487,13 @@ msgstr "Los nodos cliente de Tor tienen muy poco gasto de ancho de nada"
 msgid ""
 "Centralized control reduces the complexity at each\n"
 "node and can efficiently address Sybil attacks"
-msgstr ""
-"El control centralizado reduce la complejidad de cada nodo y puede evitar"
-" ataques Sybil fácilmente"
+msgstr "El control centralizado reduce la complejidad de cada nodo y puede evitar ataques Sybil fácilmente"
 
 #: i2p2www/pages/site/comparison/tor.html:110
 msgid ""
 "A core of high capacity nodes provides higher\n"
 "throughput and lower latency"
-msgstr ""
-"Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y "
-"menor latencia"
+msgstr "Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y menor latencia"
 
 #: i2p2www/pages/site/comparison/tor.html:115
 msgid "C, not Java (ewww)"
@@ -730,11 +505,9 @@ msgstr "Beneficios de I2P sobre Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
-msgstr ""
-"Diseñado para optimizar los servicios ocultos, que son mucho más rápidos "
-"que los de Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
+msgstr "Diseñado para optimizar los servicios ocultos, que son mucho más rápidos que los de Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:121
 msgid "Fully distributed and self organizing"
@@ -744,17 +517,13 @@ msgstr "Totalmente distribuido y auto organizado"
 msgid ""
 "Peers are selected by continuously profiling and ranking performance,\n"
 "rather than trusting claimed capacity"
-msgstr ""
-"Los pares son seleccionados continuamente según el rendimiento y "
-"categoría, en vez de confiar en la capacidad indicada"
+msgstr "Los pares son seleccionados continuamente según el rendimiento y categoría, en vez de confiar en la capacidad indicada"
 
 #: i2p2www/pages/site/comparison/tor.html:129
 msgid ""
 "Floodfill peers (\"directory servers\") are varying and untrusted,\n"
 "rather than hardcoded"
-msgstr ""
-"Los pares Floodfill (\"servidores de directorios\") cambian, en vez de "
-"estar siempre fijos."
+msgstr "Los pares Floodfill (\"servidores de directorios\") cambian, en vez de estar siempre fijos."
 
 #: i2p2www/pages/site/comparison/tor.html:134
 msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
@@ -772,17 +541,13 @@ msgstr "Conmutado por paquete en vez de conmutado por circuito"
 msgid ""
 "implicit transparent load balancing of messages \n"
 "across multiple peers, rather than a single path"
-msgstr ""
-"Implica control de carga transparente de los mensajes a través de "
-"múltiples pares, en vez de por un sólo camino."
+msgstr "Implica control de carga transparente de los mensajes a través de múltiples pares, en vez de por un sólo camino."
 
 #: i2p2www/pages/site/comparison/tor.html:145
 msgid ""
 "resilience vs. failures by running multiple \n"
 "tunnels in parallel, plus rotating tunnels"
-msgstr ""
-"Resistencia contra fallos ya que usa varios túneles en paralelo, además "
-"de rotar los túneles"
+msgstr "Resistencia contra fallos ya que usa varios túneles en paralelo, además de rotar los túneles"
 
 #: i2p2www/pages/site/comparison/tor.html:151
 msgid ""
@@ -790,20 +555,14 @@ msgid ""
 "of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
 "used by all of the peers Alice is talking with, \n"
 "rather than a circuit for each)"
-msgstr ""
-"el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por "
-"ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los "
-"pares con lo que habla Alice, en vez de un circuito por cada par)"
+msgstr "el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los pares con lo que habla Alice, en vez de un circuito por cada par)"
 
 #: i2p2www/pages/site/comparison/tor.html:161
 msgid ""
 "Unidirectional tunnels instead of bidirectional\n"
 "circuits, doubling the number of nodes a peer has to\n"
 "compromise to get the same information."
-msgstr ""
-"Túneles unidireccionales en vez de circuitos bidireccionales, usando el "
-"doble de nodos un par se compromete más para obtener la misma "
-"información."
+msgstr "Túneles unidireccionales en vez de circuitos bidireccionales, usando el doble de nodos un par se compromete más para obtener la misma información."
 
 #: i2p2www/pages/site/comparison/tor.html:166
 #, python-format
@@ -817,11 +576,7 @@ msgid ""
 "tunnels are used for more than simply passing end \n"
 "to end messages (e.g. netDb, tunnel management, \n"
 "tunnel testing)"
-msgstr ""
-"Protección contra la detección de la actividad de un cliente, incluso "
-"cuando un atacante participa en el túnel, ya que los túneles no son sólo "
-"usados para pasar el mensaje de punto a punto (por ejemplo, netDB, "
-"administración de túneles, pruebas en los túneles)"
+msgstr "Protección contra la detección de la actividad de un cliente, incluso cuando un atacante participa en el túnel, ya que los túneles no son sólo usados para pasar el mensaje de punto a punto (por ejemplo, netDB, administración de túneles, pruebas en los túneles)"
 
 #: i2p2www/pages/site/comparison/tor.html:180
 msgid ""
@@ -829,19 +584,13 @@ msgid ""
 "of samples that an attacker can use to mount an \n"
 "active attack with, unlike circuits in Tor, which are\n"
 "typically long lived."
-msgstr ""
-"Los túneles de I2P tienen una vida corta, reduciendo el número de "
-"muestras que un atacante puede usar para lograr un ataque activo, al "
-"contrario que con los circuitos en Tor, que son típicamente de larga "
-"duración."
+msgstr "Los túneles de I2P tienen una vida corta, reduciendo el número de muestras que un atacante puede usar para lograr un ataque activo, al contrario que con los circuitos en Tor, que son típicamente de larga duración."
 
 #: i2p2www/pages/site/comparison/tor.html:188
 msgid ""
 "I2P APIs are designed specifically for anonymity and\n"
 "security, while SOCKS is designed for functionality."
-msgstr ""
-"Los APIs de I2P están específicamente diseñados para el anonimato y la "
-"seguridad, mientras que SOCKS está diseñado para su funcionalidad."
+msgstr "Los APIs de I2P están específicamente diseñados para el anonimato y la seguridad, mientras que SOCKS está diseñado para su funcionalidad."
 
 #: i2p2www/pages/site/comparison/tor.html:193
 msgid "Essentially all peers participate in routing for others"
@@ -852,10 +601,7 @@ msgid ""
 "The bandwidth overhead of being a full peer is low, \n"
 "while in Tor, while client nodes don't require much\n"
 "bandwidth, they don't fully participate in the mixnet."
-msgstr ""
-"El uso de ancho de banda de cualquier par completo es bajo, mientras que "
-"en Tor, aunque un nodo cliente no necesita mucho ancho de banda, "
-"realmente no participan completamente en la red."
+msgstr "El uso de ancho de banda de cualquier par completo es bajo, mientras que en Tor, aunque un nodo cliente no necesita mucho ancho de banda, realmente no participan completamente en la red."
 
 #: i2p2www/pages/site/comparison/tor.html:201
 msgid "Integrated automatic update mechanism"
@@ -875,26 +621,20 @@ msgstr "Otros beneficios potenciales de I2P aún no implementados"
 
 #: i2p2www/pages/site/comparison/tor.html:207
 msgid "...and may never be implemented, so don't count on them!"
-msgstr ""
-"...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente"
-" con ellos!"
+msgstr "...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente con ellos!"
 
 #: i2p2www/pages/site/comparison/tor.html:210
 msgid ""
 "Defense vs. message count analysis by garlic wrapping \n"
 "multiple messages"
-msgstr ""
-"Defensa contra el análisis de conteo de mensajes envolviendo múltiples "
-"mensajes dentro de la red garlic"
+msgstr "Defensa contra el análisis de conteo de mensajes envolviendo múltiples mensajes dentro de la red garlic"
 
 #: i2p2www/pages/site/comparison/tor.html:216
 msgid ""
 "Defense vs. long term intersection by adding delays \n"
 "at various hops (where the delays are not discernible\n"
 "by other hops)"
-msgstr ""
-"Defensa contra la intersección a largo plazo añadiendo demoras en varios "
-"saltos (donde las demoras no son perceptibles por los otros saltos)"
+msgstr "Defensa contra la intersección a largo plazo añadiendo demoras en varios saltos (donde las demoras no son perceptibles por los otros saltos)"
 
 #: i2p2www/pages/site/comparison/tor.html:223
 msgid ""
@@ -902,8 +642,4 @@ msgid ""
 "create a tunnel that will handle 500 messages / minute,\n"
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
-msgstr ""
-"Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando "
-"túneles que  manejarán 500 mensajes al minuto, donde el punto final "
-"inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)"
-
+msgstr "Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando túneles que  manejarán 500 mensajes al minuto, donde el punto final inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)"
diff --git a/i2p2www/translations/es/LC_MESSAGES/docs.po b/i2p2www/translations/es/LC_MESSAGES/docs.po
index cc0b6ba6fb52ec1f01fb33effbf0ff5bc7ca53b8..08f033800721d668403834a5044aad4d51aeb7dc 100644
--- a/i2p2www/translations/es/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/es/LC_MESSAGES/docs.po
@@ -4558,7 +4558,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:72
 msgid "for"
-msgstr ""
+msgstr "para"
 
 #: i2p2www/pages/site/docs/applications/git.html:74
 msgid "in order to obscure your local time zone."
diff --git a/i2p2www/translations/es/LC_MESSAGES/misc.po b/i2p2www/translations/es/LC_MESSAGES/misc.po
index 8eba06108160ad0c8a81940f25eebc8982e90428..87c47b0a951d51b604bd4ba02b653e93c0eb5dd5 100644
--- a/i2p2www/translations/es/LC_MESSAGES/misc.po
+++ b/i2p2www/translations/es/LC_MESSAGES/misc.po
@@ -1,29 +1,30 @@
-# Spanish translations for I2P.
-# Copyright (C) 2017 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
-# Adolfo Jayme Barrientos, 2013
-# Daniel Mustieles <inactive+leo@transifex.com>, 2013
+# Adolfo Jayme-Barrientos, 2013
+# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013
 # m1xxy <m1xxy@mail.i2p>, 2011
 # Oliver Trash <oliver.trasshh@gmail.com>, 2013
 # strel, 2016
 # strel, 2013
 # trolly, 2013
-# Trolly, 2013
+# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-02-12 00:06+0000\n"
-"PO-Revision-Date: 2017-09-19 18:21+0000\n"
-"Last-Translator: strel\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: strel, 2016\n"
 "Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: es\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/misc/clt.html:2
 msgid "I2P at CLT and PetCon 2009.1"
@@ -32,78 +33,39 @@ msgstr "I2P en el CLT y el PetCon 2009.1"
 #: i2p2www/pages/site/misc/clt.html:4
 msgid ""
 "Members of I2P will held a talk at CLT and PetCon 2009.1\n"
-"Two members of the I2P team will be at two forthcoming Linux day and "
-"security convention."
-msgstr ""
-"Miembros de I2P darán una charla en el CLT y PetCon 2009.1. Dos miembros "
-"de equipo de I2P estarán en los 2 próximos Linux day y en concenciones de"
-" seguridad."
+"Two members of the I2P team will be at two forthcoming Linux day and security convention."
+msgstr "Miembros de I2P darán una charla en el CLT y PetCon 2009.1. Dos miembros de equipo de I2P estarán en los 2 próximos Linux day y en concenciones de seguridad."
 
 #: i2p2www/pages/site/misc/clt.html:9
 #, python-format
 msgid ""
-"On 14th march of 2009 there will be a short talk about general "
-"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> hold by echelon.\n"
-"Echelon and some other members of the I2P family will attend to the Linux"
-" meeting the whole two days (Saturday and Sunday) and will be "
-"recognizable as I2P family members. Meet them, ask them your questions, "
-"show them your props! Show your support!"
-msgstr ""
-"El 14 de mayo del 2009 habrá un corta charla sobre una introducción "
-"general a I2P en la <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> guiada por echelon. Echelon y algunos otros miembros de la "
-"familia I2P estarán en la conferencia los dos días (sábado y Domingo) y "
-"serán reconocibles como parte de la familia I2P. Conócelos, pregúntales, "
-"muéstreles sus propuestas."
+"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n"
+"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!"
+msgstr "El 14 de mayo del 2009 habrá un corta charla sobre una introducción general a I2P en la <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> guiada por echelon. Echelon y algunos otros miembros de la familia I2P estarán en la conferencia los dos días (sábado y Domingo) y serán reconocibles como parte de la familia I2P. Conócelos, pregúntales, muéstreles sus propuestas."
 
 #: i2p2www/pages/site/misc/clt.html:14
 #, python-format
 msgid ""
-"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security "
-"convention</a> in Dresden will take place.\n"
-"Again, echelon will attend this event and hold a short talk about general"
-" introduction to I2P. Another talk about the profiling by the I2P clients"
-" will be held."
-msgstr ""
-"Justo 10 días después se llevará a cabo la <a href=\"%(petcon)s\">Privacy"
-" and Data Security convention</a> en Dresden.. De igual forma, echelon "
-"estará en el evento y dará una pequeña charla introductoria sobre I2P. "
-"También se dará otra charla sobre los perfiles de los clientes I2P."
+"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n"
+"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held."
+msgstr "Justo 10 días después se llevará a cabo la <a href=\"%(petcon)s\">Privacy and Data Security convention</a> en Dresden.. De igual forma, echelon estará en el evento y dará una pequeña charla introductoria sobre I2P. También se dará otra charla sobre los perfiles de los clientes I2P."
 
 #: i2p2www/pages/site/misc/cvs.html:4
 #, python-format
 msgid ""
-"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a"
-" <a href=\"%(monotone)s\">Monotone</a> repository.\n"
+"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n"
 "For those who aren't very familiar with CVS, there is a\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> "
-"on the\n"
-"subject (developers only need to deal with the first chapter - \"An "
-"Overview of\n"
-"CVS\", as subsequent chapters go into some nasty details very few ever "
-"need to\n"
+"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n"
+"subject (developers only need to deal with the first chapter - \"An Overview of\n"
+"CVS\", as subsequent chapters go into some nasty details very few ever need to\n"
 "touch)."
-msgstr ""
-"El código fuente de I2P se guardaba en un repositorio CVS. En estos "
-"momentos se guarda en un repositorio <a "
-"href=\"%(monotone)s\">Monotone</a>. Para aquellos que no estén "
-"familiarizados con CVS, existe un <a href=\"http://cvsbook.red-"
-"bean.com/cvsbook.html\">libro fantásrico</a> sobre este tema (los "
-"desarrolladores sólo necesitan familiarizarse con el primer capítulo - "
-"\"An Overview of\n"
-"CVS\", ya que los siguientes capítulos tratan sobre algunos feos detalles"
-" que pocas personas necesitarán)."
+msgstr "El código fuente de I2P se guardaba en un repositorio CVS. En estos momentos se guarda en un repositorio <a href=\"%(monotone)s\">Monotone</a>. Para aquellos que no estén familiarizados con CVS, existe un <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">libro fantásrico</a> sobre este tema (los desarrolladores sólo necesitan familiarizarse con el primer capítulo - \"An Overview of\nCVS\", ya que los siguientes capítulos tratan sobre algunos feos detalles que pocas personas necesitarán)."
 
 #: i2p2www/pages/site/misc/cvs.html:31
 msgid ""
-"Humorous quote from WinCVS: \"Did you know...  Never experiment with new "
-"CVS\n"
+"Humorous quote from WinCVS: \"Did you know...  Never experiment with new CVS\n"
 "commands on your working repository.  Create a sample module instead.\""
-msgstr ""
-"Nota humorística en WinCVS: \"¿Sabía que nunca debería experimentar los "
-"nuevos comandos CVS en el repositorio de trabajo?. Es mejor crear un "
-"módulo de ejemplo.\""
+msgstr "Nota humorística en WinCVS: \"¿Sabía que nunca debería experimentar los nuevos comandos CVS en el repositorio de trabajo?. Es mejor crear un módulo de ejemplo.\""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4
@@ -114,13 +76,9 @@ msgstr "Migración de los I2PTunnel"
 msgid ""
 "After upgrading to the new architecture, you'll have to do a \n"
 "little work to get your old I2PTunnel-driven servers running.  \n"
-"Lets walk through a simple example.  For an eepsite with the \n"
+"Lets walk through a simple example.  For an I2P Site with the \n"
 "old clientApp configuration, you had:"
 msgstr ""
-"Después de actualizar la nueva arquitectura, deberá realizar un pequeño "
-"esfuerzo para hacer funcionar de nuevo sus servidores antiguos manejados "
-"por los I2PTunnel. Para una eepsite con la configuración clientApp "
-"antigua, debe:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16
 msgid "To provide that same functionality on the new web architecture:"
@@ -136,12 +94,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\""
 msgstr "Pulse en Añadir un nuevo:[Rúnel Servidor] \"GO\""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21
-msgid "For the name: <code>\"eepsite\"</code>"
-msgstr "Nombre: <code>\"eepsite\"</code> "
+msgid "For the name: <code>\"I2P Site\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22
-msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>"
-msgstr "Descripción:<code>\"Mi eepsite, ¿no es bonita?\"</code>"
+msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23
 msgid ">For the target host:"
@@ -155,10 +113,7 @@ msgstr "Puerto de destino:"
 msgid ""
 "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n"
 "(it is recommended to copy that .dat to your new install dir)"
-msgstr ""
-"Archivo con la clave privada: <code>path de \"myWebPriv.dat\"</code><br "
-"/> (se recomienda que copie ese archivo .dat al nuevo directorio de "
-"instalación)"
+msgstr "Archivo con la clave privada: <code>path de \"myWebPriv.dat\"</code><br /> (se recomienda que copie ese archivo .dat al nuevo directorio de instalación)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29
 msgid "Check the \"Start automatically?\" checkbox"
@@ -174,23 +129,12 @@ msgstr "Responderá diciendo:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39
 msgid ""
-"That's it!  Creating a new I2PTunnel server works the same way too, "
-"except you\n"
-"don't need to \"copy the old file\", obviously.  Behind the scenes, it is"
-" all driven\n"
-"by the <code>i2ptunnel.config</code> file, which you may modify "
-"externally (if you do,\n"
-"hit \"Reload config\" on the I2PTunnel web page, which will tear down all"
-" of your \n"
+"That's it!  Creating a new I2PTunnel server works the same way too, except you\n"
+"don't need to \"copy the old file\", obviously.  Behind the scenes, it is all driven\n"
+"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n"
+"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n"
 "existing tunnels and rebuild new ones)"
-msgstr ""
-"¡Ya está! Para crear el nuevo servidor I2PTunnel funciona de la misma "
-"forma, excepto que no necesita \"copiar el archivo antiguo\". "
-"Internamente está todo controlado por el archivo "
-"<code>i2ptunnel.config</code>, el cual puede editar externamente (si lo "
-"hace, pulse \"Recargar configuración\" en la página web del I2PTunnel, "
-"que apagará todos los túneles existentes y los construirá y levantará de "
-"nuevo)."
+msgstr "¡Ya está! Para crear el nuevo servidor I2PTunnel funciona de la misma forma, excepto que no necesita \"copiar el archivo antiguo\". Internamente está todo controlado por el archivo <code>i2ptunnel.config</code>, el cual puede editar externamente (si lo hace, pulse \"Recargar configuración\" en la página web del I2PTunnel, que apagará todos los túneles existentes y los construirá y levantará de nuevo)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47
 msgid ""
@@ -199,22 +143,15 @@ msgid ""
 "interface.  It will say \"Please be patient\" if you try to \n"
 "beforehand, which means that it is still trying to build the \n"
 "necessary I2PTunnel sessions it has been configured to create."
-msgstr ""
-"Dese cuenta que TENDRÁ que esperar hasta que el ruter esté integrado en "
-"la red antes de poder usar el interfaz web para /i2ptunnel/. Le dirá "
-"\"Por favor sea paciente\" si ya lo ha intentado anteriormente, lo que "
-"significa que aún está intentando de construir las sesiones de los "
-"túneles que ha configurado para ser creados."
+msgstr "Dese cuenta que TENDRÁ que esperar hasta que el ruter esté integrado en la red antes de poder usar el interfaz web para /i2ptunnel/. Le dirá \"Por favor sea paciente\" si ya lo ha intentado anteriormente, lo que significa que aún está intentando de construir las sesiones de los túneles que ha configurado para ser creados."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:2
 msgid "I2PTunnel services"
 msgstr "Servicios I2PTunnel."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:4
-msgid "Below is quick copy of aum's eepsite deployment guide."
+msgid "Below is quick copy of aum's I2P Site deployment guide."
 msgstr ""
-"Más abajo tiene una copia de la guía de aum de como crear una eepsite "
-"rápidamente."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:8
 msgid "1. - Deploy a local server"
@@ -225,70 +162,48 @@ msgid ""
 "For simplicity's sake, we will walk through the setup of a web server; "
 "however, this procedure is the same regardless what protocol of servers "
 "and/or clients you are setting up."
-msgstr ""
-"Para simplificar, seguiremos los pasos de cómo crear un servidor web; aún"
-" así, este procedimiento es le mismo independientemente del protocolo del"
-" servidor o/y los clientes que esté configurando."
+msgstr "Para simplificar, seguiremos los pasos de cómo crear un servidor web; aún así, este procedimiento es le mismo independientemente del protocolo del servidor o/y los clientes que esté configurando."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:13
 msgid ""
-"I recommend the Tiny Httpd web server, thttpd, (windows version available"
-" on site) although you can use anything that you feel comfortable with."
-msgstr ""
-"Recomiendo el servidor web Tiny Httpd, thttpd, (hay una versión "
-"disponible en su web para windows) aunque puede usar cualquier servidor "
-"con el que se encuantre confortable."
+"I recommend the Tiny Httpd web server, thttpd, (windows version available on"
+" site) although you can use anything that you feel comfortable with."
+msgstr "Recomiendo el servidor web Tiny Httpd, thttpd, (hay una versión disponible en su web para windows) aunque puede usar cualquier servidor con el que se encuantre confortable."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:16
 msgid ""
 "Another more robust option would be to use EasyPHP, which is also open "
 "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For "
-"newbies who have no experience setting up and hosting content over "
-"servers, see the hosting page for help."
-msgstr ""
-"Otra opción robusta podría ser usar EasyPHP, el cual es también libre. "
-"Viene con PHP, PHPmyamin, mySQL y el servidor web Apache. Para los "
-"principiantes que no tengan experiencia en configurar un domino o "
-"servidores de contenido, vea la web de hosting/servidores para más ayuda."
+"newbies who have no experience setting up and hosting content over servers, "
+"see the hosting page for help."
+msgstr "Otra opción robusta podría ser usar EasyPHP, el cual es también libre. Viene con PHP, PHPmyamin, mySQL y el servidor web Apache. Para los principiantes que no tengan experiencia en configurar un domino o servidores de contenido, vea la web de hosting/servidores para más ayuda."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:19
 msgid ""
-"With the web server you've chosen, configure it to listen on a port of "
-"your choice, and serve its documents from a directory of your choice. For"
-" this example, we'll assume port 10880."
-msgstr ""
-"En el servidor web que haya elegido, configúrelo para que escuche en un "
-"puerto de su elección, y sirva los documentos de un directorio de su "
-"elección. Para este ejemplo supondremos que usamos el puerto 10880."
+"With the web server you've chosen, configure it to listen on a port of your "
+"choice, and serve its documents from a directory of your choice. For this "
+"example, we'll assume port 10880."
+msgstr "En el servidor web que haya elegido, configúrelo para que escuche en un puerto de su elección, y sirva los documentos de un directorio de su elección. Para este ejemplo supondremos que usamos el puerto 10880."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:22
 msgid ""
 "Make sure your firewall is set up so that you cannot receive incoming "
 "connections on this port (which would breach your anonymity)."
-msgstr ""
-"Asegúrese que su cortafuegos está configurado para bloquear las "
-"conexiones entrantes a este puerto (si no, al poder acceder directamente "
-"a este puerto, eliminaría su anonimato)"
+msgstr "Asegúrese que su cortafuegos está configurado para bloquear las conexiones entrantes a este puerto (si no, al poder acceder directamente a este puerto, eliminaría su anonimato)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:25
 msgid ""
 "Test the webserver, by pointing your normal browser (the one with the "
 "\"direct connection\") at <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the "
-"port number you have chosen)."
-msgstr ""
-"Pruebe el servidor web abriendo en su navegador web (el navegador con "
-"\"conexión directa\") la dirección <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (cambiando el puerto 10880 "
-"por el número que haya elejido)."
+"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port"
+" number you have chosen)."
+msgstr "Pruebe el servidor web abriendo en su navegador web (el navegador con \"conexión directa\") la dirección <a href=\"http://localhost:10880\" target=\"_blank\">http://localhost:10880</a> (cambiando el puerto 10880 por el número que haya elejido)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:28
 msgid ""
 "Once your webserver is working, and you can access it locally with your "
 "browser, continue to the next step."
-msgstr ""
-"Una vez que el servidor esté funcionando, y pueda acceder a él localmente"
-" con su explorador, continue con el siguiente paso."
+msgstr "Una vez que el servidor esté funcionando, y pueda acceder a él localmente con su explorador, continue con el siguiente paso."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:33
 msgid "2 - Generate an I2P Destination Keypair"
@@ -296,45 +211,29 @@ msgstr "2 - Genere el par de claves de destino de I2P"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:35
 msgid ""
-"I2P does not deal in IP addresses. To protect your anonymity, it deals in"
-" unique addresses called destination keys."
-msgstr ""
-"I2P no funciona con su dirección IP. Para proteger su anonimato funciona "
-"con direcciones únicas llamadas claves de destino."
+"I2P does not deal in IP addresses. To protect your anonymity, it deals in "
+"unique addresses called destination keys."
+msgstr "I2P no funciona con su dirección IP. Para proteger su anonimato funciona con direcciones únicas llamadas claves de destino."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:38
 msgid ""
 "A destination key works a lot like a regular IP address, except that it "
-"can't be traced to your IP address or physical location. When users place"
-" a request to speak with you, your gateways are the ones that answer for "
-"you. So the requesting user can only know the IP address of your "
-"gateways. However, gateways don't know your IP address, because gateways "
-"are the last nodes on your tunnels, and you anonymously create tunnels by"
-" way of garlic routing. (So gateways are like puppets that can't see "
-"their masters, and everyone communicates through these puppets)"
-msgstr ""
-"Una clave de Destino funciona como una dirección IP normal, excepto que "
-"no se puede seguir dicha dirección hasta tu localización local. Cuando "
-"los usuarios hacen una petición para hablarle, sus puertas de salida, "
-"gateways son las que responden por usted. Con lo que los usuarios sólo "
-"pueden saber las IP de sus gateways. Además, las gateways no saben su IP,"
-" ya que las gateways son los últimos nodos de sus túneles, y los túneles "
-"han sido creado anónimamante con el rutado Garlic. (Las gateways son como"
-" mascotas que no pueden ver a sus dueños, y todo el mundo se comunica a "
-"través de estas mascotas)"
+"can't be traced to your IP address or physical location. When users place a "
+"request to speak with you, your gateways are the ones that answer for you. "
+"So the requesting user can only know the IP address of your gateways. "
+"However, gateways don't know your IP address, because gateways are the last "
+"nodes on your tunnels, and you anonymously create tunnels by way of garlic "
+"routing. (So gateways are like puppets that can't see their masters, and "
+"everyone communicates through these puppets)"
+msgstr "Una clave de Destino funciona como una dirección IP normal, excepto que no se puede seguir dicha dirección hasta tu localización local. Cuando los usuarios hacen una petición para hablarle, sus puertas de salida, gateways son las que responden por usted. Con lo que los usuarios sólo pueden saber las IP de sus gateways. Además, las gateways no saben su IP, ya que las gateways son los últimos nodos de sus túneles, y los túneles han sido creado anónimamante con el rutado Garlic. (Las gateways son como mascotas que no pueden ver a sus dueños, y todo el mundo se comunica a través de estas mascotas)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:41
 msgid ""
 "To deploy a server on I2P, you create a destination keypair. You use the "
-"private key to authenticate your server when connecting it to I2P, and "
-"you make the public key (aka destination key) known publicly, so others "
-"can connect to your server. (indirectly, through your gateways)"
-msgstr ""
-"Para crear un servicio en I2P, se crean un par de claves de destino. Se "
-"utiliza la clave privada para autentificar sur servidor cuando se conecta"
-" a I2P, y se hace pública la clave pública (también llamada clave de "
-"destino), así otros pueden conectarse a su servidor. (indirectamente, a "
-"través de sus gateways)"
+"private key to authenticate your server when connecting it to I2P, and you "
+"make the public key (aka destination key) known publicly, so others can "
+"connect to your server. (indirectly, through your gateways)"
+msgstr "Para crear un servicio en I2P, se crean un par de claves de destino. Se utiliza la clave privada para autentificar sur servidor cuando se conecta a I2P, y se hace pública la clave pública (también llamada clave de destino), así otros pueden conectarse a su servidor. (indirectamente, a través de sus gateways)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:44
 msgid "Each service you run on I2P requires a different keypair."
@@ -345,77 +244,52 @@ msgid ""
 "To generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code> (all on one line)"
-msgstr ""
-"Para generar el par de claves, ejecute el comando: <code>java -jar "
-"lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
-"myWebPubKey.dat\"</code> (en una sola línea)"
+msgstr "Para generar el par de claves, ejecute el comando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code> (en una sola línea)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:50
 msgid ""
 "In windows, to generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code>"
-msgstr ""
-"Para generar el par de claves en windows, ejecute el comando: <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
-"myWebPubKey.dat\"</code>"
+msgstr "Para generar el par de claves en windows, ejecute el comando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:53
 msgid ""
-"The filenames <code>myWebPrivKey.dat</code> and "
-"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want "
-"here, as long as you understand your own choices."
-msgstr ""
-"Los nombres de archivo <code>myWebPrivKey.dat</code> y "
-"<code>myWebPubKey.dat</code> son arbitrarios - elija el que desee, al "
-"menos mientras entienda sus elecciones."
+"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>"
+" are arbitrary - choose whatever you want here, as long as you understand "
+"your own choices."
+msgstr "Los nombres de archivo <code>myWebPrivKey.dat</code> y <code>myWebPubKey.dat</code> son arbitrarios - elija el que desee, al menos mientras entienda sus elecciones."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:56
 msgid ""
 "We now need to export your public key into base64 format, which you will "
 "share with others."
-msgstr ""
-"Ahora necesitamos exportar su clave pública al formato base64, el cual "
-"compartirá con otros."
+msgstr "Ahora necesitamos exportar su clave pública al formato base64, el cual compartirá con otros."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:59
 msgid ""
-"To convert your myWebPubKey.dat file into shareable base64, type the "
-"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (all on one line)."
-msgstr ""
-"Para convertir su archivo myWebPubKey.dat al formato base64 compartible, "
-"ejecute el comando <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (todo en la misma línea)."
+"To convert your myWebPubKey.dat file into shareable base64, type the command"
+" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; "
+"myWebPubKey.txt</code> (all on one line)."
+msgstr "Para convertir su archivo myWebPubKey.dat al formato base64 compartible, ejecute el comando <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; myWebPubKey.txt</code> (todo en la misma línea)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:62
 msgid ""
-"This file you have just generated, <code>myWebPubKey.txt</code>, contains"
-" a long base64 string (516 chars at last count), which we call a "
-"destination key. All you need to know about this string for now is that "
-"it allows remote clients to uniquely pinpoint and connect to your server,"
-" just the same way as an IP address allows remote machines to pinpoint "
-"and connect to your machine."
-msgstr ""
-"El archivo que acaba de generar, <code>myWebPubKey.txt</code>, contiene "
-"una cadena larga base64 (con 516 caracteres), lo que llamamos una clave "
-"de destino. Todo lo que necesita saber por el momento es que esta clave "
-"de destino permite que los clientes remotos localicen con precisión su "
-"servicio y se conecten a él, justamente de la misma forma que una IP "
-"permite que las máquinas remotas puedan localizar su máquina y se "
-"conecten a ella."
+"This file you have just generated, <code>myWebPubKey.txt</code>, contains a "
+"long base64 string (516 chars at last count), which we call a destination "
+"key. All you need to know about this string for now is that it allows remote"
+" clients to uniquely pinpoint and connect to your server, just the same way "
+"as an IP address allows remote machines to pinpoint and connect to your "
+"machine."
+msgstr "El archivo que acaba de generar, <code>myWebPubKey.txt</code>, contiene una cadena larga base64 (con 516 caracteres), lo que llamamos una clave de destino. Todo lo que necesita saber por el momento es que esta clave de destino permite que los clientes remotos localicen con precisión su servicio y se conecten a él, justamente de la misma forma que una IP permite que las máquinas remotas puedan localizar su máquina y se conecten a ella."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:65
 msgid ""
 "However, in contrast to an IP address, there is no way to trace your "
-"machine's physical location - even though your server can be addressed "
-"via I2P, your IP address cannot be traced or associated with this "
-"destination key."
-msgstr ""
-"Aunque, y a diferencia de una dirección IP, no hay forma de rastrear la "
-"localización física de su máquina - aunque el servidor pueda ser accedido"
-" desde I2P, su dirección IP no puede ser rastreada o asociada a esta "
-"clave de destino."
+"machine's physical location - even though your server can be addressed via "
+"I2P, your IP address cannot be traced or associated with this destination "
+"key."
+msgstr "Aunque, y a diferencia de una dirección IP, no hay forma de rastrear la localización física de su máquina - aunque el servidor pueda ser accedido desde I2P, su dirección IP no puede ser rastreada o asociada a esta clave de destino."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:70
 msgid "3 - Open a 'Tunnel' from I2P To Your Server"
@@ -423,51 +297,37 @@ msgstr "3 - Abra un 'Túnel' desde I2P hacia su servicio/servidor"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:72
 msgid ""
-"For clients elsewhere in I2P to be able to access your server, you must "
-"run a 'bridge' or 'tunnel', which takes connections from these clients "
-"and forwards them to your local server."
-msgstr ""
-"Para que los clientes de I2P sean capaces de acceder a su servidor, tiene"
-" que ejecutar un 'bridge', puente, o un 'túnel', los cuales cogen las "
-"conexiones desde esos clientes y las reenvían hasta su servidor local."
+"For clients elsewhere in I2P to be able to access your server, you must run "
+"a 'bridge' or 'tunnel', which takes connections from these clients and "
+"forwards them to your local server."
+msgstr "Para que los clientes de I2P sean capaces de acceder a su servidor, tiene que ejecutar un 'bridge', puente, o un 'túnel', los cuales cogen las conexiones desde esos clientes y las reenvían hasta su servidor local."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:75
 msgid ""
 "To activate such a tunnel, type the command <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code> (all one line)."
-msgstr ""
-"Para activar este tipo de túneles, ejecute el comando <code>java -jar "
-"lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
-"myWebPrivKey.dat\"</code> (todo en la misma línea)."
+msgstr "Para activar este tipo de túneles, ejecute el comando <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code> (todo en la misma línea)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:78
 msgid ""
 "If you used different filenames or port number earlier on, change these "
 "accordingly"
-msgstr ""
-"Si anteriormente ha usado nombres diferentes en los archivos, o usado "
-"números de puertos diferentes, cámbielos de acuerdo a ello."
+msgstr "Si anteriormente ha usado nombres diferentes en los archivos, o usado números de puertos diferentes, cámbielos de acuerdo a ello."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:81
 msgid ""
 "Windows users, remember to replace apostrophes with double quotes. Thus: "
 "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code>"
-msgstr ""
-"Para usuarios de windows; recuerden cambiar los apostrofes con comillas "
-"dobles. Tal que: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server "
-"localhost 10880 myWebPrivKey.dat\"</code>"
+msgstr "Para usuarios de windows; recuerden cambiar los apostrofes con comillas dobles. Tal que: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:84
 msgid ""
-"Within a few seconds, the 'tunnel' should now be active, and remote "
-"clients should be able to reach your server anonymously. Remember to let "
-"your router \"warm up\" before opening clients to it."
-msgstr ""
-"En unos pocos segundos el 'túnel' debería estar activo, y los clientes "
-"remotos deberían poder acceder al servicio anónimamante. Recuerde dejar "
-"su ruter \"calentarse\" antes de permitir que los clientes se conecten."
+"Within a few seconds, the 'tunnel' should now be active, and remote clients "
+"should be able to reach your server anonymously. Remember to let your router"
+" \"warm up\" before opening clients to it."
+msgstr "En unos pocos segundos el 'túnel' debería estar activo, y los clientes remotos deberían poder acceder al servicio anónimamante. Recuerde dejar su ruter \"calentarse\" antes de permitir que los clientes se conecten."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:89
 msgid "4 - Update Your hosts.txt File "
@@ -479,32 +339,21 @@ msgid ""
 "hosts.txt file, so I2P can translate the simple URL you place in the "
 "browser's address bar into the full public key text needed to find your "
 "server."
-msgstr ""
-"Para probar su propio servicio localmente debe crear una entrada en su "
-"archivo host.txt, para que I2P pueda traducir la URL sencilla que "
-"introduce en la barra de direcciones de su navegador en la clave pública "
-"completa que necesita para encontrar su servidor."
+msgstr "Para probar su propio servicio localmente debe crear una entrada en su archivo host.txt, para que I2P pueda traducir la URL sencilla que introduce en la barra de direcciones de su navegador en la clave pública completa que necesita para encontrar su servidor."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:94
 msgid ""
 "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where "
-"myserver.i2p is an I2P 'domain' you want to associate with your site, and"
-" the blahblahblah is the text of the base64 public key you created "
-"earlier in the file myWebPubKey.txt"
-msgstr ""
-"Edite su archivo host.txt y añada la línea myserver.i2p=blahblahblah, "
-"donde myserver.i2p es un 'dominio' I2P que desea asociar con su web, y en"
-" donde el blahblahblah es el texto de la clave pública base64 que ha "
-"creado anteriormente en el archivo "
+"myserver.i2p is an I2P 'domain' you want to associate with your site, and "
+"the blahblahblah is the text of the base64 public key you created earlier in"
+" the file myWebPubKey.txt"
+msgstr "Edite su archivo host.txt y añada la línea myserver.i2p=blahblahblah, donde myserver.i2p es un 'dominio' I2P que desea asociar con su web, y en donde el blahblahblah es el texto de la clave pública base64 que ha creado anteriormente en el archivo "
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:97
 msgid ""
 "With this in place, you and others can reach your server with the simple "
 "domain name myserver.i2p in the browser's address bar."
-msgstr ""
-"Una vez hecho esto, usted y otros pueden acceder a su servidor "
-"simplemente poniendo el nombre de dominio myserver.i2p en la barra de "
-"direcciones del navegador."
+msgstr "Una vez hecho esto, usted y otros pueden acceder a su servidor simplemente poniendo el nombre de dominio myserver.i2p en la barra de direcciones del navegador."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:102
 msgid "5 - Surf Your Site Within I2P"
@@ -515,10 +364,7 @@ msgid ""
 "Using your secondary browser - the one you earlier configured to use "
 "localhost:4444 as a proxy - point this browser to the address <a "
 "href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>"
-msgstr ""
-"Usando su navegador web secundario -  el que anteriormente ha configurado"
-" para usar el proxy localhost:4444 - acceda en su navegador a la "
-"dirección "
+msgstr "Usando su navegador web secundario -  el que anteriormente ha configurado para usar el proxy localhost:4444 - acceda en su navegador a la dirección "
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:107
 msgid "You should see the main page of your webserver come up."
@@ -534,61 +380,43 @@ msgstr "Ahora debemos pensara más allá de los servidores web."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:117
 msgid ""
-"As you grow into I2P and get more of a 'feel' for it, you will want to "
-"use all manner of servers and clients."
-msgstr ""
-"Según use más I2P y lo conozca mejor, deseará usar todo tipo de "
-"servidores y clientes."
+"As you grow into I2P and get more of a 'feel' for it, you will want to use "
+"all manner of servers and clients."
+msgstr "Según use más I2P y lo conozca mejor, deseará usar todo tipo de servidores y clientes."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:120
 msgid ""
-"The beauty of I2P is that it allows standard Internet clients and servers"
-" for most protocols to be transparently 'tunneled' through the anonymous "
+"The beauty of I2P is that it allows standard Internet clients and servers "
+"for most protocols to be transparently 'tunneled' through the anonymous "
 "network."
-msgstr ""
-"La belleza de I2P radica en que permite que los clientes y servidores de "
-"la mayoría de los protocolos sean 'tunelados' transparentemente a través "
-"de la red anónima I2P."
+msgstr "La belleza de I2P radica en que permite que los clientes y servidores de la mayoría de los protocolos sean 'tunelados' transparentemente a través de la red anónima I2P."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:123
 msgid ""
-"You can run mailservers/clients, nameservers/clients, newsservers/clients"
-" - almost anything at all - perhaps even FTP in passive mode."
-msgstr ""
-"Puede ejecutar servidores/clientes de correo, de nombres, de noticias "
-"(usenet) - realmente casi cualquier cosa - quizá incluso FTP en modo "
-"pasivo."
+"You can run mailservers/clients, nameservers/clients, newsservers/clients - "
+"almost anything at all - perhaps even FTP in passive mode."
+msgstr "Puede ejecutar servidores/clientes de correo, de nombres, de noticias (usenet) - realmente casi cualquier cosa - quizá incluso FTP en modo pasivo."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:126
 msgid ""
-"Now, we'll create a client tunnel. This is like the server tunnel we "
-"created earlier, but works in reverse. It listens to a port on your local"
-" machine; your local client connects to this port; the connection gets "
-"forwarded through I2P to the service on the other end."
-msgstr ""
-"Ahora vamos a crear un túnel cliente. Este es como el túnel servidor que "
-"hemos creado anteriormente, pero funciona al revés. Escucha en un puerto "
-"en su máquina local; su cliente local se conecta a este puerto; la "
-"conexión se reenvía a través de I2P hasta el servicio de destino."
+"Now, we'll create a client tunnel. This is like the server tunnel we created"
+" earlier, but works in reverse. It listens to a port on your local machine; "
+"your local client connects to this port; the connection gets forwarded "
+"through I2P to the service on the other end."
+msgstr "Ahora vamos a crear un túnel cliente. Este es como el túnel servidor que hemos creado anteriormente, pero funciona al revés. Escucha en un puerto en su máquina local; su cliente local se conecta a este puerto; la conexión se reenvía a través de I2P hasta el servicio de destino."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:129
 msgid ""
-"To open your client tunnel for your server, type the command <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (all one line)."
-msgstr ""
-"Para abrir el túnel cliente para su servidor, ejecute el comando "
-"<code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e "
-"\"client 10888 textofbase64key\"</code> (todo en una línea)."
+"To open your client tunnel for your server, type the command <code>java -jar"
+" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 "
+"textofbase64key\"</code> (all one line)."
+msgstr "Para abrir el túnel cliente para su servidor, ejecute el comando <code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 textofbase64key\"</code> (todo en una línea)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:132
 msgid ""
-"The port 10888 is arbitrary - it just needs to be something other than "
-"the physical port your server is listening on."
-msgstr ""
-"El puerto10888 es arbitrario -  simplemente es necesario que sea un "
-"puerto diferente al que ocupa su servidor, y que no esté usado por ningún"
-" otro servicio."
+"The port 10888 is arbitrary - it just needs to be something other than the "
+"physical port your server is listening on."
+msgstr "El puerto10888 es arbitrario -  simplemente es necesario que sea un puerto diferente al que ocupa su servidor, y que no esté usado por ningún otro servicio."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:135
 msgid ""
@@ -596,52 +424,34 @@ msgid ""
 "myWebPubKey.txt, reproduced fully on one line (alternately, instead of "
 "textofbase64key, you can specify the name from your hosts.txt - e.g. "
 "myserver.i2p)"
-msgstr ""
-"textofbase64key no es más que el contenido del archivo de la clave "
-"pública myWebPubKey.txt, reproducido completamente en una línea "
-"(alternativamente, en vez de usar textofbase64key, puede especificar el "
-"nombre en su hosts.txt - por ejemplo myserver.i2p)"
+msgstr "textofbase64key no es más que el contenido del archivo de la clave pública myWebPubKey.txt, reproducido completamente en una línea (alternativamente, en vez de usar textofbase64key, puede especificar el nombre en su hosts.txt - por ejemplo myserver.i2p)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:138
 msgid ""
 "Within a minute or two of launching this command, the client tunnel from "
 "your local machine into I2P will be open and ready for use."
-msgstr ""
-"Después de un minuto o dos de haber ejecutado este comando, el túnel "
-"cliente desde su máquina local hacia I2P estará abierto y listo para "
-"usar."
+msgstr "Después de un minuto o dos de haber ejecutado este comando, el túnel cliente desde su máquina local hacia I2P estará abierto y listo para usar."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:141
 msgid ""
 "Point your regular web browser (ie, not the one you configured to use "
 "localhost:4444), and point it to <a href=\"http://localhost:10888\" "
 "target=\"_blank\">http://localhost:10888</a>"
-msgstr ""
-"Apunte su navegador web normal (no el que ha configurado para usar "
-"localhost:4444), hacia <a href=\"http://localhost:10888\" "
-"target=\"_blank\">http://localhost:10888</a>"
+msgstr "Apunte su navegador web normal (no el que ha configurado para usar localhost:4444), hacia <a href=\"http://localhost:10888\" target=\"_blank\">http://localhost:10888</a>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:144
 msgid ""
 "Verify that the main page of your server eventually comes up in your "
 "browser."
-msgstr ""
-"Asegúrese que la página principal de su servidor aparece en su navegador "
-"web."
+msgstr "Asegúrese que la página principal de su servidor aparece en su navegador web."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:147
 msgid ""
-"You use the same procedure for using any local client program to access a"
-" remote I2P server - just get the base64 public key (called destination "
-"key) of the remote server, choose a local port to connect to the remote "
-"server, open the tunnel, and just connect with your client to your "
-"heart's content."
-msgstr ""
-"Usará el mismo procedimiento para que cualquier aplicación cliente local "
-"pueda acceder a un servidor remoto I2P - simplemente consiga la clave "
-"pública base64 (llamada clave de destino) del servidor remoto, elija un "
-"puerto local para conectarse al servidor remoto, abra el túnel, y conecte"
-" con su cliente al contenido deseado. "
+"You use the same procedure for using any local client program to access a "
+"remote I2P server - just get the base64 public key (called destination key) "
+"of the remote server, choose a local port to connect to the remote server, "
+"open the tunnel, and just connect with your client to your heart's content."
+msgstr "Usará el mismo procedimiento para que cualquier aplicación cliente local pueda acceder a un servidor remoto I2P - simplemente consiga la clave pública base64 (llamada clave de destino) del servidor remoto, elija un puerto local para conectarse al servidor remoto, abra el túnel, y conecte con su cliente al contenido deseado. "
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:152
 msgid "7 - Share your server details with others"
@@ -651,43 +461,26 @@ msgstr "7 - Comparta los datos del servidor con otros"
 msgid ""
 "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's "
 "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. "
-"Others will then be able to reach your server remotely, without either of"
-" you jeopardizing your anonymity."
-msgstr ""
-"Usando un medio anónimo (por ejemplo unos los servidores IRC en I2P o la "
-"wiki de ugha), anuncie su nombre de dominio ( por ejemplo <a "
-"href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a>) así "
-"como su clave de destino. Entonces otros podrán conectarse a su servidor "
-"remotamente sin comprometer su anonimato o el de ellos."
+"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others"
+" will then be able to reach your server remotely, without either of you "
+"jeopardizing your anonymity."
+msgstr "Usando un medio anónimo (por ejemplo unos los servidores IRC en I2P o la wiki de ugha), anuncie su nombre de dominio ( por ejemplo <a href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a>) así como su clave de destino. Entonces otros podrán conectarse a su servidor remotamente sin comprometer su anonimato o el de ellos."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:157
 msgid ""
-"Remember, you can go to What's on I2P and find the latest public keys "
-"linked to their URL. You should also post your own public key and URL "
-"their. However, you will want to do this anonymously, of course. "
-"Drupal.i2p.net is currently, as of this writing, only accessible from the"
-" net. So, to access the outside WWW anonymously from inside of I2P, you "
-"will need to start up your script called startSquid. Do it the same way "
-"you have been doing these other scripts. Reconfigure your browser to "
-"proxy on localhost:5555, as defined in the script, and when the script "
-"has generated it's keys, you can access the squid proxy. Put any WWW URL "
-"(such as Google or this i2p site) into your browser's address bar and you"
-" will be surfing the World Wide Web anonymously. Now you can safely post "
-"your public key, and no one can detect your IP address."
-msgstr ""
-"Recuerde, pude ir a What's on I2P y buscar las últimas claves públicas "
-"enlazadas a su URL. También debería añadir su clave pública y URL allí. "
-"Pero por supuesto, quiere hacer esto anónimamente. Drupal.i2p.net es sólo"
-" accesible desde la clearnet. Por lo que para acceder a la WWW "
-"anónimamante desde I2P, necesitará ejecutar el script startSquid. Hágalo "
-"de la misma forma que ha ejecutado otros scripts. Vuelva a configurar su "
-"navegador web para que use localhost:5555 como proxy, como se ha definido"
-" en el script, y cuando el script haya generado sus claves, ya puede "
-"acceder el proxy squid. Ponga cualquier URL WWW (como Google o esta web "
-"de I2P) en su navegador y estará navegando la clearnet anónimamante. "
-"Ahora puede añadir su clave pública seguro, y nadie puede averiguar si "
-"IP."
+"Remember, you can go to What's on I2P and find the latest public keys linked"
+" to their URL. You should also post your own public key and URL their. "
+"However, you will want to do this anonymously, of course. Drupal.i2p.net is "
+"currently, as of this writing, only accessible from the net. So, to access "
+"the outside WWW anonymously from inside of I2P, you will need to start up "
+"your script called startSquid. Do it the same way you have been doing these "
+"other scripts. Reconfigure your browser to proxy on localhost:5555, as "
+"defined in the script, and when the script has generated it's keys, you can "
+"access the squid proxy. Put any WWW URL (such as Google or this i2p site) "
+"into your browser's address bar and you will be surfing the World Wide Web "
+"anonymously. Now you can safely post your public key, and no one can detect "
+"your IP address."
+msgstr "Recuerde, pude ir a What's on I2P y buscar las últimas claves públicas enlazadas a su URL. También debería añadir su clave pública y URL allí. Pero por supuesto, quiere hacer esto anónimamente. Drupal.i2p.net es sólo accesible desde la clearnet. Por lo que para acceder a la WWW anónimamante desde I2P, necesitará ejecutar el script startSquid. Hágalo de la misma forma que ha ejecutado otros scripts. Vuelva a configurar su navegador web para que use localhost:5555 como proxy, como se ha definido en el script, y cuando el script haya generado sus claves, ya puede acceder el proxy squid. Ponga cualquier URL WWW (como Google o esta web de I2P) en su navegador y estará navegando la clearnet anónimamante. Ahora puede añadir su clave pública seguro, y nadie puede averiguar si IP."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:162
 msgid "8 - Write Some Scripts To Handle All This Menial Nonsense"
@@ -695,11 +488,9 @@ msgstr "8 - Cree algunos scripts para manejar todo este sinsentido"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:164
 msgid ""
-"It would drive most people crazy, going through all these steps every "
-"time one sets up an I2P server, and/or deploys a client."
-msgstr ""
-"Repetir estos pasos cada vez que se configura un cliente o servidor I2P "
-"puede volver loco a mucha gente."
+"It would drive most people crazy, going through all these steps every time "
+"one sets up an I2P server, and/or deploys a client."
+msgstr "Repetir estos pasos cada vez que se configura un cliente o servidor I2P puede volver loco a mucha gente."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:167
 msgid ""
@@ -707,41 +498,29 @@ msgid ""
 "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called "
 "setupServer.py which automates all this nonsense into one simple command "
 "line . But I respect that people's tastes in user interfaces differ, and "
-"trying to write something which satisfies everyone's needs usually "
-"results in something so complex that it turns into newbie-repellent."
-msgstr ""
-"En la web de Aum <a href=\"http://www.freenet.org.nz/i2p/\" "
-"target=\"_blank\">http://www.freenet.org.nz/i2p/</a> hay un script "
-"llamado setupServer.py que automatiza todo este sinsentido en un comando "
-"de una sola línea."
+"trying to write something which satisfies everyone's needs usually results "
+"in something so complex that it turns into newbie-repellent."
+msgstr "En la web de Aum <a href=\"http://www.freenet.org.nz/i2p/\" target=\"_blank\">http://www.freenet.org.nz/i2p/</a> hay un script llamado setupServer.py que automatiza todo este sinsentido en un comando de una sola línea."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:170
 msgid ""
 "So please feel free to use and/or customize setupServer.py to taste, or "
 "write your own in Python or another language."
-msgstr ""
-"Siéntase libre de usar o cambiar etupServer.py para probarlo, o para "
-"escribir su propio script en Python o en cualquier otro lenguaje."
+msgstr "Siéntase libre de usar o cambiar etupServer.py para probarlo, o para escribir su propio script en Python o en cualquier otro lenguaje."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:173
 msgid ""
-"Also, you may want to write a script which handles the startup of the I2P"
-" Router, the eepProxy, plus any and all tunnels you are using. I've got "
-"such a script called startEverything.sh, which gets launched at system "
-"startup. (Be sure to search this site for template scripts to automate "
-"your I2P commands. If I create a page for one, I'll try to remember to "
-"link it here."
-msgstr ""
-"También pude querer escribir para que maneje el inicio del Ruter I2P, el "
-"eepProxy y los túneles que esté usando. Yo uso un script llamado "
-"startEverything.sh, que se ejecuta al iniciar al sistema. (Estos scripts "
-"no son necesarios en las nuevas versiones de I2P)."
+"Also, you may want to write a script which handles the startup of the I2P "
+"Router, the eepProxy, plus any and all tunnels you are using. I've got such "
+"a script called startEverything.sh, which gets launched at system startup. "
+"(Be sure to search this site for template scripts to automate your I2P "
+"commands. If I create a page for one, I'll try to remember to link it here."
+msgstr "También pude querer escribir para que maneje el inicio del Ruter I2P, el eepProxy y los túneles que esté usando. Yo uso un script llamado startEverything.sh, que se ejecuta al iniciar al sistema. (Estos scripts no son necesarios en las nuevas versiones de I2P)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:176
-msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
-msgstr ""
-"Un ejercicio para los usuarios de Windows - portar setupServer.py a un "
-"archivo MS-DOS .BAT."
+msgid ""
+"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
+msgstr "Un ejercicio para los usuarios de Windows - portar setupServer.py a un archivo MS-DOS .BAT."
 
 #: i2p2www/pages/site/misc/invisiblenet.html:2
 msgid "Old Documents"
@@ -749,18 +528,12 @@ msgstr "Documentos viejos"
 
 #: i2p2www/pages/site/misc/invisiblenet.html:5
 msgid ""
-"Following is a list of documents originally on www.invisiblenet.net/i2p/ "
-"and\n"
+"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n"
 "rescued via the\n"
 "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
 "They are quite dated and may or may not be accurate.\n"
-"However, the I2CP and I2NP documents in particular have some good "
-"information."
-msgstr ""
-"Aquí hay una lista de documentos originarios de www.invisiblenet.net/i2p/"
-" y rescatado gracias a la <a href=\"http://www.archive.org/\">Wayback "
-"Machine</a>. Son bastantes antiguos y pueden que ya no sean precisos. Aún"
-" así, los documentos sobre I2CP e I2NP tienen información bastante buena."
+"However, the I2CP and I2NP documents in particular have some good information."
+msgstr "Aquí hay una lista de documentos originarios de www.invisiblenet.net/i2p/ y rescatado gracias a la <a href=\"http://www.archive.org/\">Wayback Machine</a>. Son bastantes antiguos y pueden que ya no sean precisos. Aún así, los documentos sobre I2CP e I2NP tienen información bastante buena."
 
 #: i2p2www/pages/site/misc/jbigi.html:3
 msgid "August 2011"
@@ -772,14 +545,10 @@ msgstr "Vista general"
 
 #: i2p2www/pages/site/misc/jbigi.html:7
 msgid ""
-"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a "
-"little\n"
+"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n"
 "manual work and a piece of chewing gum we have made several\n"
 "cryptography operations quite a bit faster."
-msgstr ""
-"Usando JNI (Interfaz nativo de Java), un poco de código C (¡gracias "
-"ugha!), un poco de trabajo manual y un trozo de chicle hemos hecho que "
-"varias operaciones de cifrados sean un poco más rápidas."
+msgstr "Usando JNI (Interfaz nativo de Java), un poco de código C (¡gracias ugha!), un poco de trabajo manual y un trozo de chicle hemos hecho que varias operaciones de cifrados sean un poco más rápidas."
 
 #: i2p2www/pages/site/misc/jbigi.html:13
 #, python-format
@@ -790,37 +559,21 @@ msgid ""
 "<a href=\"%(func)s\">mpz_powm()</a>\n"
 "as a replacement for the\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n"
-"As modPow() is a significant computational portion of many crypto "
-"operations, this is of significant benefit."
-msgstr ""
-"El aumento de velocidad se debe a la súper rápida <a "
-"href=\"%(gmplib)s\">librería GNU MP Bignum (libgmp)</a>. Sólo usamos una "
-"función de libgmp - <a href=\"%(func)s\">mpz_powm()</a> como reemplazo de"
-" la <a href=\"%(bigint)s\">modPow() BigInteger en la librería Java "
-"Math</a>. Ya que modPow() es una importante parte de los cálculos de "
-"cifrados, se consigue un beneficio sognificante."
+"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit."
+msgstr "El aumento de velocidad se debe a la súper rápida <a href=\"%(gmplib)s\">librería GNU MP Bignum (libgmp)</a>. Sólo usamos una función de libgmp - <a href=\"%(func)s\">mpz_powm()</a> como reemplazo de la <a href=\"%(bigint)s\">modPow() BigInteger en la librería Java Math</a>. Ya que modPow() es una importante parte de los cálculos de cifrados, se consigue un beneficio sognificante."
 
 #: i2p2www/pages/site/misc/jbigi.html:25
 #, python-format
 msgid ""
-"The standard I2P installation includes about 20 versions of the library "
-"for different platforms,\n"
+"The standard I2P installation includes about 20 versions of the library for different platforms,\n"
 "each about 50KB, inside the jbigi.jar file.\n"
-"The initialization of the JBigI library, including CPU identification, "
-"selection, and extraction\n"
+"The initialization of the JBigI library, including CPU identification, selection, and extraction\n"
 "of the correct loadable module, is handled by the\n"
 "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n"
 "If no module is available for the current platform, the standard\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>\n"
 "is used."
-msgstr ""
-"La instalación estándar de I2P incluye como 20 versiones de la librería "
-"para diferentes plataformas, dentro del archivo jbigi.jar, cada una sobre"
-" 50kb. El inicio de la librería JBigl, la identificación de la CPU, "
-"selección y extracción del módulo correcto a cargar es manejado por la <a"
-" href=\"%(nativebigint)s\">clase NativeBigInteger</a>. Si no hay un "
-"módulo disponible para la plataforma usada, se usará la librería estándar"
-"  <a href=\"%(bigint)s\">modPow() BigInteger de Java Math library</a>."
+msgstr "La instalación estándar de I2P incluye como 20 versiones de la librería para diferentes plataformas, dentro del archivo jbigi.jar, cada una sobre 50kb. El inicio de la librería JBigl, la identificación de la CPU, selección y extracción del módulo correcto a cargar es manejado por la <a href=\"%(nativebigint)s\">clase NativeBigInteger</a>. Si no hay un módulo disponible para la plataforma usada, se usará la librería estándar  <a href=\"%(bigint)s\">modPow() BigInteger de Java Math library</a>."
 
 #: i2p2www/pages/site/misc/jbigi.html:38
 msgid "Rebuilding and Testing JBigI"
@@ -828,12 +581,9 @@ msgstr "Recompilando y probando JBigl"
 
 #: i2p2www/pages/site/misc/jbigi.html:39
 msgid ""
-"Following are the instructions to build a new jbigi library for your own "
-"platform\n"
+"Following are the instructions to build a new jbigi library for your own platform\n"
 "and testing its performance."
-msgstr ""
-"Aquí están las instrucciones para compilar una nueva librería jbigi para "
-"su propia plataforma y poder probar su rendimiento."
+msgstr "Aquí están las instrucciones para compilar una nueva librería jbigi para su propia plataforma y poder probar su rendimiento."
 
 #: i2p2www/pages/site/misc/jbigi.html:42
 msgid "Requirements"
@@ -842,49 +592,28 @@ msgstr "Dependencias"
 #: i2p2www/pages/site/misc/jbigi.html:43
 msgid ""
 "This works on Linux, and with a few changes in build.sh probably also on\n"
-"other platforms. FreeBSD has also been reported to work too. On Kaffee "
-"the\n"
-"speedup is very small, because it already uses native BitInteger "
-"internally.\n"
+"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n"
+"speedup is very small, because it already uses native BitInteger internally.\n"
 "Blackdown seems to cause strange errors. Because you are going to do\n"
 "compilation, you need JDK; JRE won't work."
-msgstr ""
-"Funciona en Linux con unos pocos cambios en build.sh, probablemente "
-"también en otras plataformas. En Kaffe el aumento de velocidad es muy "
-"pequeño, porque ya usa internamente el BitInteger nativo. Blackdown "
-"parece producir errores extraños. Ya que va a compilar necesita JDK; el "
-"JRE no funcionará."
+msgstr "Funciona en Linux con unos pocos cambios en build.sh, probablemente también en otras plataformas. En Kaffe el aumento de velocidad es muy pequeño, porque ya usa internamente el BitInteger nativo. Blackdown parece producir errores extraños. Ya que va a compilar necesita JDK; el JRE no funcionará."
 
 #: i2p2www/pages/site/misc/jbigi.html:50
 msgid ""
-"The required code is available in monotone database and the latest source"
-" tarball. "
-msgstr ""
-"El código necesario está disponible en monotone y en el último tarball de"
-" las fuentes."
+"The required code is available in monotone database and the latest source "
+"tarball. "
+msgstr "El código necesario está disponible en monotone y en el último tarball de las fuentes."
 
 #: i2p2www/pages/site/misc/jbigi.html:51
 msgid ""
 "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n"
-"included in your OS / distribution or installed already, it can be "
-"received from\n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Even if you\n"
-"have already installed it as binary, it might still be worth a try to "
-"compile\n"
-"GMP yourself, since then it will be able to use the specific instructions"
-" of\n"
+"included in your OS / distribution or installed already, it can be received from\n"
+"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n"
+"have already installed it as binary, it might still be worth a try to compile\n"
+"GMP yourself, since then it will be able to use the specific instructions of\n"
 "your processor. The latest GMP may also\n"
 "be used instead of GMP 5.0.2, but it hasn't been tested by us."
-msgstr ""
-"Necesita instalar la librería GNU MP Bignu (libgmp), si no está incluida "
-"en su OS / distribución puede obtenerla de <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Incluso si ya tiene instalada como un binario, vale la pena compilar GMP "
-"por usted mismo, ya que de esta forma será capaz de usar las "
-"instrucciones específicas de su procesador. Probablemente se pueda usar "
-"la última versión de GMP en vez de la 5.0.2, pero no ha sido probado por "
-"nosotros."
+msgstr "Necesita instalar la librería GNU MP Bignu (libgmp), si no está incluida en su OS / distribución puede obtenerla de <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Incluso si ya tiene instalada como un binario, vale la pena compilar GMP por usted mismo, ya que de esta forma será capaz de usar las instrucciones específicas de su procesador. Probablemente se pueda usar la última versión de GMP en vez de la 5.0.2, pero no ha sido probado por nosotros."
 
 #: i2p2www/pages/site/misc/jbigi.html:61
 msgid "Step-by-step instructions"
@@ -892,19 +621,13 @@ msgstr "Instrucciones paso a paso"
 
 #: i2p2www/pages/site/misc/jbigi.html:63
 msgid ""
-"Look at <a href=\"http://localhost:7657/logs.jsp\">your running "
-"environment on the logs.jsp page</a>.\n"
+"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n"
 "There should be one of two status messages for JBigI - either"
-msgstr ""
-"Mire en <a href=\"http://localhost:7657/logs.jsp\">, en la web de los "
-"registros, el entorno que está ejecutando . Deberían aparecer uno o dos "
-"mensajes sobre JBigi"
+msgstr "Mire en <a href=\"http://localhost:7657/logs.jsp\">, en la web de los registros, el entorno que está ejecutando . Deberían aparecer uno o dos mensajes sobre JBigi"
 
 #: i2p2www/pages/site/misc/jbigi.html:66
 msgid "Locally optimized native BigInteger loaded from the library path"
-msgstr ""
-"Librería nativa local optimizada BigInteger has sido cargada "
-"satisfactoriamente."
+msgstr "Librería nativa local optimizada BigInteger has sido cargada satisfactoriamente."
 
 #: i2p2www/pages/site/misc/jbigi.html:68
 msgid "or"
@@ -922,57 +645,30 @@ msgid ""
 "may require you to compile your own library.\n"
 "If the BigInteger library was loaded, do at least the next step to see\n"
 "what your performance is."
-msgstr ""
-"Si la librería nativa BigInteger NO ha sida cargada, definitivamente "
-"necesita compilarla. Algunas plataformas, como OS X, OpenSolaris y los "
-"sistemas de 64 bits, pueden necesitar que compile su propia librería. Si "
-"la librería BigInteger se ha cargado, al menos haga el siguiente paso "
-"para comprobar su rendimiento."
+msgstr "Si la librería nativa BigInteger NO ha sida cargada, definitivamente necesita compilarla. Algunas plataformas, como OS X, OpenSolaris y los sistemas de 64 bits, pueden necesitar que compile su propia librería. Si la librería BigInteger se ha cargado, al menos haga el siguiente paso para comprobar su rendimiento."
 
 #: i2p2www/pages/site/misc/jbigi.html:78
 msgid ""
-"Look on <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"to see what the lifetime average values for "
-"<code>crypto.elGamal.decrypt</code> and\n"
-"<code>crypto.elGamal.encrypt</code> are. The numbers are times in "
-"milliseconds. Copy these somewhere so you can compare\n"
+"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n"
+"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n"
 "them later on.\n"
 "The network average for encrypt time is about 20ms.\n"
-"If your encrypt time is less than 50ms for a relatively new processor, or"
-" less than 100ms\n"
-"for an older processor, and the native BigInteger library was loaded, you"
-" are probably fine."
-msgstr ""
-"Mire en <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-" para ver cuales son los valores medios del tiempo de vida para "
-"<code>crypto.elGamal.decrypt</code> y "
-"<code>crypto.elGamal.encrypt</code>. Los números son el tiempo en mili "
-"segundos. Cópielos para poder compararlos más tarde.   El tiempo medio de"
-" cifrado es alrededor de 20ms. Si el tiempo de cifrado es menor de 50ms "
-"para un procesador relativamente nuevo, o menos de 100ms para un "
-"procesador viejo, y la librería BigIntefer ha sido cargada, probablemente"
-" esté todo bien."
+"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n"
+"for an older processor, and the native BigInteger library was loaded, you are probably fine."
+msgstr "Mire en <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> para ver cuales son los valores medios del tiempo de vida para <code>crypto.elGamal.decrypt</code> y <code>crypto.elGamal.encrypt</code>. Los números son el tiempo en mili segundos. Cópielos para poder compararlos más tarde.   El tiempo medio de cifrado es alrededor de 20ms. Si el tiempo de cifrado es menor de 50ms para un procesador relativamente nuevo, o menos de 100ms para un procesador viejo, y la librería BigIntefer ha sido cargada, probablemente esté todo bien."
 
 #: i2p2www/pages/site/misc/jbigi.html:87
 #, python-format
 msgid ""
 "Get the latest released source code of I2P from\n"
-"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge "
-"source\n"
+"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n"
 "out of the monotone database mtn.i2p2.de"
-msgstr ""
-"Obtenga las últimas sources de I2P desde <a href=\"%(downloads)s\">la "
-"página de descargas</a>, u obtenga el código más actualizado desde la "
-"base de datos de monotone en mtn.i2p2.de"
+msgstr "Obtenga las últimas sources de I2P desde <a href=\"%(downloads)s\">la página de descargas</a>, u obtenga el código más actualizado desde la base de datos de monotone en mtn.i2p2.de"
 
 #: i2p2www/pages/site/misc/jbigi.html:92
 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>"
-msgstr ""
-"Dentro del directorio de las fuentes cambie a la carpeta: "
-"<code>core/c/jbigi</code>"
+msgstr "Dentro del directorio de las fuentes cambie a la carpeta: <code>core/c/jbigi</code>"
 
 #: i2p2www/pages/site/misc/jbigi.html:93
 msgid ""
@@ -980,58 +676,30 @@ msgid ""
 "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n"
 "Use the 'dynamic' argument to build.sh.\n"
 "Otherwise, you must download GMP version 5.0.2 from\n"
-"from <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"saving it to gmp-5.0.2.tar.bz2.\n"
-"If you decide to use a newer version, change the VER= line in "
-"<code>core/c/jbigi/build.sh</code>."
-msgstr ""
-"Lea el archivo README. Si ya tiene un archivo /usr/lib/libgmp.so, no "
-"necesita descargar GMP. Use la opción 'dynamic' para build.sh. De otra "
-"forma, también puede descargar la versión 5.0.2 de GMP desde "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"guardándolo como  gmp-5.0.2.tar.bz2. Si decide usar una versión más "
-"nueva, cambie la línea VER= en <code>core/c/jbigi/build.sh</code>. "
+"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n"
+"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>."
+msgstr "Lea el archivo README. Si ya tiene un archivo /usr/lib/libgmp.so, no necesita descargar GMP. Use la opción 'dynamic' para build.sh. De otra forma, también puede descargar la versión 5.0.2 de GMP desde href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, guardándolo como  gmp-5.0.2.tar.bz2. Si decide usar una versión más nueva, cambie la línea VER= en <code>core/c/jbigi/build.sh</code>. "
 
 #: i2p2www/pages/site/misc/jbigi.html:101
 msgid ""
 "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n"
-"environment variable is set and you are using Linux then it might just "
-"work.\n"
+"environment variable is set and you are using Linux then it might just work.\n"
 "Otherwise change the settings. Remember, you need the Java SDK installed."
-msgstr ""
-"Échele un vistazo a <code>build.sh</code>, si su variable de entorno "
-"<code>JAVA_HOME</code> está puesta y usa Linux, simplemente debería "
-"funcionar. En caso contrario, cambie las configuraciones. Recuerde, "
-"necesita tener instalado el SDK de Java."
+msgstr "Échele un vistazo a <code>build.sh</code>, si su variable de entorno <code>JAVA_HOME</code> está puesta y usa Linux, simplemente debería funcionar. En caso contrario, cambie las configuraciones. Recuerde, necesita tener instalado el SDK de Java."
 
 #: i2p2www/pages/site/misc/jbigi.html:106
 msgid ""
 "Run <code>build.sh</code> (if you downloaded GMP) or\n"
 "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n"
-"Maybe the build spewed out some errors of missing jni.h and jni_md.h "
-"files.\n"
-"Either copy these files from your java install into the "
-"core/c/jbigi/jbigi/include/ directory,\n"
+"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n"
+"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n"
 "or fix $JAVA_HOME.<br>\n"
-"You can run the <code>build.sh</code> from the <code>core/c/</code> "
-"directory which will\n"
+"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n"
 "build all available jbigi libs into a jbigi.jar.</br>\n"
 "A file named <code>libjbigi.so</code> should be created in the current\n"
-"directory. If this doesn't happen and/or you get errors then please "
-"report\n"
+"directory. If this doesn't happen and/or you get errors then please report\n"
 "them."
-msgstr ""
-"Ejecute <code>build.sh</code> (si ha descargado GMP) o <code>build.sh "
-"dynamic</code> (si ya tiene /usr/lib/libgmp.so).<br/> Quizás al compilar "
-"le arroje algunos errores sobre la falta de los archivos jni.h y "
-"jni_md.h. Puede copiar estos archivos desde su instalación de java al "
-"directorio core/c/jbigi/jbigi/include/, o arregle su $JAVA_HOME.<br> "
-"Puede ejecutar <code>build.sh</code> desde el directorio "
-"<code>core/c/</code>, lo cual compilará todas las librerías jbigi "
-"disponibles dentro de jbigi.jar.</br>. En dicho directorio debería "
-"crearse un archivo llamado <code>libjbigi.so</code>. Si no aparece y/o "
-"obtiene errores, por favor repórtelo."
+msgstr "Ejecute <code>build.sh</code> (si ha descargado GMP) o <code>build.sh dynamic</code> (si ya tiene /usr/lib/libgmp.so).<br/> Quizás al compilar le arroje algunos errores sobre la falta de los archivos jni.h y jni_md.h. Puede copiar estos archivos desde su instalación de java al directorio core/c/jbigi/jbigi/include/, o arregle su $JAVA_HOME.<br> Puede ejecutar <code>build.sh</code> desde el directorio <code>core/c/</code>, lo cual compilará todas las librerías jbigi disponibles dentro de jbigi.jar.</br>. En dicho directorio debería crearse un archivo llamado <code>libjbigi.so</code>. Si no aparece y/o obtiene errores, por favor repórtelo."
 
 #: i2p2www/pages/site/misc/jbigi.html:118
 msgid ""
@@ -1039,18 +707,13 @@ msgid ""
 "the speed test.\n"
 "Read the final lines of the speed test's output for some additional\n"
 "info, it will be something like this:"
-msgstr ""
-"Siga las instrucciones de core/c/README para instalar la librería y "
-"ejecutar las pruebas de velocidad. Lea las últimas líneas del test de "
-"velocidad para obtener información adicional, debería ser algo como esto:"
+msgstr "Siga las instrucciones de core/c/README para instalar la librería y ejecutar las pruebas de velocidad. Lea las últimas líneas del test de velocidad para obtener información adicional, debería ser algo como esto:"
 
 #: i2p2www/pages/site/misc/jbigi.html:128
 msgid ""
 "If the native is indeed 5-7x faster (or more) then it looks all good. If "
 "not, please report."
-msgstr ""
-"Si el nativo es 5-7 veces más rápido (o más), entonces todo está bien. Si"
-" no, avísenos."
+msgstr "Si el nativo es 5-7 veces más rápido (o más), entonces todo está bien. Si no, avísenos."
 
 #: i2p2www/pages/site/misc/jbigi.html:129
 msgid "Copy <code>libjbigi.so</code> to your i2p directory"
@@ -1062,17 +725,10 @@ msgstr "Reinicie sus programas I2P"
 
 #: i2p2www/pages/site/misc/jbigi.html:131
 msgid ""
-"On <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"the <code>crypto.elGamal.decrypt</code> and "
-"<code>crypto.elGamal.encrypt</code>\n"
+"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n"
 "should be a lot faster."
-msgstr ""
-"En <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-" las velocidades en <code>crypto.elGamal.decrypt</code> y "
-"<code>crypto.elGamal.encrypt</code> deberían ser mucho más rápidas."
+msgstr "En <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> las velocidades en <code>crypto.elGamal.decrypt</code> y <code>crypto.elGamal.encrypt</code> deberían ser mucho más rápidas."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:2
 msgid "Jrandom's Announcement"
@@ -1080,40 +736,28 @@ msgstr "Aviso de Jrandom"
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:4
 msgid ""
-"The following message was received in mid-November 2007. We have no "
-"further information\n"
+"The following message was received in mid-November 2007. We have no further information\n"
 "on jrandom's status."
-msgstr ""
-"El siguiente mensaje fue recibido a mediados de Noviembre del 2007. No "
-"tenemos más información sobre jrandom."
+msgstr "El siguiente mensaje fue recibido a mediados de Noviembre del 2007. No tenemos más información sobre jrandom."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:9
 #, python-format
 msgid ""
 "Subsequently, in an unrelated incident, the hosting company for\n"
 "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n"
-"on January 13, 2008, and the i2p.net servers did not fully return to "
-"service.\n"
+"on January 13, 2008, and the i2p.net servers did not fully return to service.\n"
 "As only jrandom has the credentials required to restore service,\n"
 "and he could not be contacted,\n"
 "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n"
 "and related subdomains."
-msgstr ""
-"Más tarde, en un incidente no relacionado, la compañía de hosting de "
-"todos los servidores *.i2p.net (excepto forum.i2p.net) sufrió una perdida"
-" de corriente el 13 de Enero del 2008, y los servidores i2p.net no "
-"volvieron a funcionar. Ya que sólo jrandom tiene las credenciales para "
-"restaurar el servicio, y no puede ser contactado, movimos todos los "
-"servicios públicos a <a href=\"%(site)s\">www.i2p2.de</a>."
+msgstr "Más tarde, en un incidente no relacionado, la compañía de hosting de todos los servidores *.i2p.net (excepto forum.i2p.net) sufrió una perdida de corriente el 13 de Enero del 2008, y los servidores i2p.net no volvieron a funcionar. Ya que sólo jrandom tiene las credenciales para restaurar el servicio, y no puede ser contactado, movimos todos los servicios públicos a <a href=\"%(site)s\">www.i2p2.de</a>."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:19
 #, python-format
 msgid ""
 "Approximately two months later, for unrelated reasons,\n"
 "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>."
-msgstr ""
-"Dos meses más tarde, aproximadamente, y por otras razones, forum.i2p.net "
-"fue movido a <a href=\"http://%(forum)s/\">%(forum)s</a>. "
+msgstr "Dos meses más tarde, aproximadamente, y por otras razones, forum.i2p.net fue movido a <a href=\"http://%(forum)s/\">%(forum)s</a>. "
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:2
 #: i2p2www/pages/site/misc/manual-wrapper.html:4
@@ -1123,59 +767,35 @@ msgstr "Instalar manualmente el Wrapper de Java"
 #: i2p2www/pages/site/misc/manual-wrapper.html:6
 #, python-format
 msgid ""
-"The installation package for the <a href=\"%(downloads)s\">I2P router</a>"
-" comes\n"
-"with a Java wrapper for the most common architectures. If your system is "
-"not\n"
-"supported by our installer&mdash;or if you want to update the wrapper to "
-"a\n"
-"newer version&mdash;the following steps describe installing the wrapper "
-"manually."
-msgstr ""
-"El paquete de instalación para el <a href=\"%(downloads)s\">ruter I2P</a>"
-" viene con un wrapper de Java para las arquitecturas más comunes. Si su "
-"sistema no está soportado por nuestro instalador, o si desea actualizar "
-"el wrapper a una nueva versión, los siguientes pasos describen como "
-"instalar el wrapper a mano."
+"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n"
+"with a Java wrapper for the most common architectures. If your system is not\n"
+"supported by our installer&mdash;or if you want to update the wrapper to a\n"
+"newer version&mdash;the following steps describe installing the wrapper manually."
+msgstr "El paquete de instalación para el <a href=\"%(downloads)s\">ruter I2P</a> viene con un wrapper de Java para las arquitecturas más comunes. Si su sistema no está soportado por nuestro instalador, o si desea actualizar el wrapper a una nueva versión, los siguientes pasos describen como instalar el wrapper a mano."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:14
 msgid ""
-"Check Tanuki Software's <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download"
-" page</a>\n"
+"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n"
 "for your platform. Is your platform listed? If so, you're in\n"
-"luck! Download the most recent version of the Community Edition for your "
-"OS and\n"
+"luck! Download the most recent version of the Community Edition for your OS and\n"
 "CPU and move to <a href=\"#packaged\">the next step</a>."
-msgstr ""
-"Compruebe la <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">página"
-" de descargas</a> de Tanuki Software por su plataforma. ¿Está su "
-"plataforma listada? Si es así, ¡está de suerte! Descargue la versión más "
-"reciente para su sistema operativo y su CPU y vaya al <a "
-"href=\"#packaged\">siguiente paso</a>."
+msgstr "Compruebe la <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">página de descargas</a> de Tanuki Software por su plataforma. ¿Está su plataforma listada? Si es así, ¡está de suerte! Descargue la versión más reciente para su sistema operativo y su CPU y vaya al <a href=\"#packaged\">siguiente paso</a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:20
 msgid ""
-"If your platform does not have an already compiled wrapper available, you"
-"\n"
-"may be able to compile it yourself. If you are willing to have a go at "
-"it, move\n"
+"If your platform does not have an already compiled wrapper available, you\n"
+"may be able to compile it yourself. If you are willing to have a go at it, move\n"
 "on to <a href=\"#compiling\">compiling</a> the wrapper for your system."
-msgstr ""
-"Si su plataforma no tiene todavía un wrapper disponible compilado, podría"
-" ser capaz de compilarlo usted mismo. Si desea hacerlo, vaya a <a "
-"href=\"#compiling\">compilar</a> el wrapper para su sistema."
+msgstr "Si su plataforma no tiene todavía un wrapper disponible compilado, podría ser capaz de compilarlo usted mismo. Si desea hacerlo, vaya a <a href=\"#compiling\">compilar</a> el wrapper para su sistema."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:27
 msgid "Using existing binaries"
 msgstr "Usando binarios ya existentes"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:28
-msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>."
-msgstr ""
-"En los pasos de más abajo, $I2P significa <em>el lugar donde ha sido "
-"instalado I2P</em>."
+msgid ""
+"In the steps below, $I2P means <em>the location I2P was installed to</em>."
+msgstr "En los pasos de más abajo, $I2P significa <em>el lugar donde ha sido instalado I2P</em>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:36
 #: i2p2www/pages/site/misc/manual-wrapper.html:64
@@ -1190,11 +810,9 @@ msgstr "<code>tail -f /tmp/wrapper.log</code> y busque los problemas."
 #: i2p2www/pages/site/misc/manual-wrapper.html:39
 #: i2p2www/pages/site/misc/manual-wrapper.html:67
 msgid ""
-"If this did not work you'll need to use <code>runplain.sh</code> to start"
-" I2P."
-msgstr ""
-"Si esto no funciona necesitará ejecutar <code>runplain.sh</code> para "
-"arrancar I2P."
+"If this did not work you'll need to use <code>runplain.sh</code> to start "
+"I2P."
+msgstr "Si esto no funciona necesitará ejecutar <code>runplain.sh</code> para arrancar I2P."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:43
 msgid "Compiling from source"
@@ -1202,23 +820,16 @@ msgstr "Compilando desde las fuentes"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:44
 msgid ""
-"These steps worked to compile the wrapper for use on a mipsel system "
-"running Debian. The steps <strong>will</strong> need to be altered for "
-"your system."
-msgstr ""
-"Estos pasos han funcionado para compilar el wrapper en un sistema mipsel "
-"ejecutando debian. Estos pasos <strong>tendrán</strong> que ser cambiados"
-" dependiendo de su sistema."
+"These steps worked to compile the wrapper for use on a mipsel system running"
+" Debian. The steps <strong>will</strong> need to be altered for your system."
+msgstr "Estos pasos han funcionado para compilar el wrapper en un sistema mipsel ejecutando debian. Estos pasos <strong>tendrán</strong> que ser cambiados dependiendo de su sistema."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:48
 msgid ""
-"Download the source archive for the community version of the wrapper from"
-" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download"
-" page</a>."
-msgstr ""
-"Descargue el archivo con las fuentes para la versión del wrapper desde <a"
-" href=\"http://wrapper.tanukisoftware.com/downloads\">la página de "
-"descarga del wrapper</a>."
+"Download the source archive for the community version of the wrapper from <a"
+" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download "
+"page</a>."
+msgstr "Descargue el archivo con las fuentes para la versión del wrapper desde <a href=\"http://wrapper.tanukisoftware.com/downloads\">la página de descarga del wrapper</a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:49
 msgid "Extract the tarball"
@@ -1226,19 +837,15 @@ msgstr "Descompriba el archivo"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:51
 msgid ""
-"Set environment variables <code>ANT_HOME</code> and "
-"<code>JAVA_HOME</code>. For example, in Debian:"
-msgstr ""
-"Ajuste las variables <code>ANT_HOME</code> y <code>JAVA_HOME</code>. For "
-"ejemplo en Debian:"
+"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. "
+"For example, in Debian:"
+msgstr "Ajuste las variables <code>ANT_HOME</code> y <code>JAVA_HOME</code>. For ejemplo en Debian:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:54
 msgid ""
 "Since there isn't a Makefile for Mipsel, we'll make a copy of an already "
 "existing makefile:"
-msgstr ""
-"Ya que no existe un Makefile para Mipsel, haremos una copia de un "
-"makefile ya existente:"
+msgstr "Ya que no existe un Makefile para Mipsel, haremos una copia de un makefile ya existente:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:56
 msgid "Now we can attempt to compile the wrapper:"
@@ -1256,9 +863,7 @@ msgstr "Copie el wrapper al su lugar correcto:"
 msgid ""
 "Here's an outline and rationale for a minimal WWW proxy app for use over "
 "I2P."
-msgstr ""
-"Aquí hay un esquema para una aplicación proxy WWW mínima para usar sobre "
-"I2P "
+msgstr "Aquí hay un esquema para una aplicación proxy WWW mínima para usar sobre I2P "
 
 #: i2p2www/pages/site/misc/minwww.html:8
 msgid ""
@@ -1268,252 +873,116 @@ msgid ""
 "in the router (but later versions of the SocketLibrary will be able to\n"
 "use selective ACK and large window sizes, allowing more ACKs to be\n"
 "skipped)"
-msgstr ""
-"Usar HTTP sobre I2P usando un I2PTunnel. Cuando la librería base "
-"SocketLibrary esté lista, los únicos cambios significantes serán que el "
-"'wrapRequest' y 'unwrapRequest' serán alojados funcionalmente en la "
-"librería socketLibrary, no en el ruter (pero las versiones más nuevas de "
-"SocketLibrary serán capaces de usar ACK selectivo y windows de grandes "
-"tamaños, permitiendo que sean omitidos más Acks)"
+msgstr "Usar HTTP sobre I2P usando un I2PTunnel. Cuando la librería base SocketLibrary esté lista, los únicos cambios significantes serán que el 'wrapRequest' y 'unwrapRequest' serán alojados funcionalmente en la librería socketLibrary, no en el ruter (pero las versiones más nuevas de SocketLibrary serán capaces de usar ACK selectivo y windows de grandes tamaños, permitiendo que sean omitidos más Acks)"
 
 #: i2p2www/pages/site/misc/minwww.html:47
 msgid ""
-"An optimized form, designed to handle only 128KB [1] files and pages, can"
-"\n"
+"An optimized form, designed to handle only 128KB [1] files and pages, can\n"
 "operate significantly faster:"
-msgstr ""
-"Un clase optimizada, diseñada para manejar archivos y páginas de "
-"sólo128KB [1], pude funcionar mucho más rápida:"
+msgstr "Un clase optimizada, diseñada para manejar archivos y páginas de sólo128KB [1], pude funcionar mucho más rápida:"
 
 #: i2p2www/pages/site/misc/minwww.html:71
 msgid ""
 "The difference in network load and latency is significant - this is\n"
-"essentially a UDP version of HTTP.  On the normal web, we can't really do"
-" that,\n"
-"since most HTTP requests and responses are orders of magnitude larger "
-"than UDP\n"
-"packets functionally support, but in I2P, messages can be large.  The "
-"savings\n"
-"for the network load comes from the fact that we don't need to send any "
-"ACK\n"
+"essentially a UDP version of HTTP.  On the normal web, we can't really do that,\n"
+"since most HTTP requests and responses are orders of magnitude larger than UDP\n"
+"packets functionally support, but in I2P, messages can be large.  The savings\n"
+"for the network load comes from the fact that we don't need to send any ACK\n"
 "messages - rather than the earlier wrap/unwrap request (that bundles a\n"
-"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery),"
-" the\n"
-"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there"
-" are no\n"
+"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n"
+"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n"
 "resends)."
-msgstr ""
-"La diferencia en la carga y latencia de la red es significante - esto es "
-"esencialmente una versión UDP de HTTP. En las webs normales no podemos "
-"hacer esto, ya que la mayoría de las peticiones y respuestas HTTP son "
-"mayores de lo que permiten los paquetes UDP, pero en I2P, los mensajes "
-"pueden ser más grandes. El ahorro para la red viene de que no necesitamos"
-" enviar ningún mensaje ACK - al contrario que las peticiones wrap/unwrap "
-"anteriores (que unen un DataMessage con un DeliveryStatusMessage para "
-"asegurarse que que ha sido entregado), el proxy MinWWW se encarga de "
-"estos reenvíos (si es necesario - en los I2PTunnel no hay reenvíos)."
+msgstr "La diferencia en la carga y latencia de la red es significante - esto es esencialmente una versión UDP de HTTP. En las webs normales no podemos hacer esto, ya que la mayoría de las peticiones y respuestas HTTP son mayores de lo que permiten los paquetes UDP, pero en I2P, los mensajes pueden ser más grandes. El ahorro para la red viene de que no necesitamos enviar ningún mensaje ACK - al contrario que las peticiones wrap/unwrap anteriores (que unen un DataMessage con un DeliveryStatusMessage para asegurarse que que ha sido entregado), el proxy MinWWW se encarga de estos reenvíos (si es necesario - en los I2PTunnel no hay reenvíos)."
 
 #: i2p2www/pages/site/misc/minwww.html:83
 msgid ""
-"The data that the MinWWW proxy and server need to wrap is trivial - when "
-"the\n"
-"proxy wants to send \"GET /\", it prepends it with the I2P Destination "
-"sending\n"
-"the request, followed by a 4 byte request ID.  The MinWWW server receives"
-" those\n"
-"requests, contacts the appropriate HTTPD, sends the request, waits for "
-"the\n"
+"The data that the MinWWW proxy and server need to wrap is trivial - when the\n"
+"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n"
+"the request, followed by a 4 byte request ID.  The MinWWW server receives those\n"
+"requests, contacts the appropriate HTTPD, sends the request, waits for the\n"
 "response, and sends a reply to the MinWWW proxy containing the response,\n"
-"prefixed with the original request ID.  That response is taken and passed"
-" back\n"
+"prefixed with the original request ID.  That response is taken and passed back\n"
 "to the browser and the connection is closed."
-msgstr ""
-"Los datos que el servidor y el proxy MinWWW necesitan envolver son "
-"triviales - cuando el proxy quiere enviar un \"GET /\", lo antepone con "
-"la destinación I2P y envía la petición, seguido por un ID de petición de "
-"4 bytes. El servidor MinWWW recibe entonces estas peticiones, contacta "
-"con el servidor HTTP apropiado, envía la petición, espera por la "
-"respuesta, y envía una respuesta al proxy MinWWW con la respuesta dentro,"
-" y con el ID original de la petición como prefijo. Esa respuesta se toma "
-"y se envía de vuelta al navegador, y se cierra la conexión."
+msgstr "Los datos que el servidor y el proxy MinWWW necesitan envolver son triviales - cuando el proxy quiere enviar un \"GET /\", lo antepone con la destinación I2P y envía la petición, seguido por un ID de petición de 4 bytes. El servidor MinWWW recibe entonces estas peticiones, contacta con el servidor HTTP apropiado, envía la petición, espera por la respuesta, y envía una respuesta al proxy MinWWW con la respuesta dentro, y con el ID original de la petición como prefijo. Esa respuesta se toma y se envía de vuelta al navegador, y se cierra la conexión."
 
 #: i2p2www/pages/site/misc/minwww.html:93
 msgid ""
 "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n"
-"list, going through some round robin or other algorithm, so that there "
-"are\n"
-"multiple outproxies merged transparently.  The bandwidth required for "
-"running\n"
-"one of these outproxies is also greatly reduced, since it will only "
-"handle 128KB\n"
+"list, going through some round robin or other algorithm, so that there are\n"
+"multiple outproxies merged transparently.  The bandwidth required for running\n"
+"one of these outproxies is also greatly reduced, since it will only handle 128KB\n"
 "files (aka no one is going to be downloading porn, warez, etc)."
-msgstr ""
-"Además, el proxy MinWWW puede elegir el servidor MinWWW a usar de una "
-"lista, a través de round robin u otro algoritmo, con lo que habría "
-"múltiples outproxies unidos transparentemente. El ancho de banda "
-"necesario para ejecutar estos outproxies se reduce drásticamente, ya que "
-"sólo maneja archivos de 128KB (tambien conocido como: nadie va a bajar "
-"porno, software, etc)."
+msgstr "Además, el proxy MinWWW puede elegir el servidor MinWWW a usar de una lista, a través de round robin u otro algoritmo, con lo que habría múltiples outproxies unidos transparentemente. El ancho de banda necesario para ejecutar estos outproxies se reduce drásticamente, ya que sólo maneja archivos de 128KB (tambien conocido como: nadie va a bajar porno, software, etc)."
 
 #: i2p2www/pages/site/misc/minwww.html:101
 msgid ""
-"The functionality /is/ limited, but 128KB of data is a lot for a single "
-"HTTP\n"
-"request or response.  The above diagrams are also unrealistic in their "
-"hops -\n"
-"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send "
-"each\n"
-"of the messages through two additional outbound routers, then forwarded "
-"to\n"
-"two additional inbound routers to ROUTERB, so the lag there is "
-"significant -\n"
-"while the above only saves 11 steps, 8 of those steps need to traverse "
-"the\n"
-"entire tunnel path (4+ remote hops each time when tunnels are 2 remote "
-"hops\n"
-"in each stretch), leaving MinWWW with only two full traversals (one for "
-"the\n"
+"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n"
+"request or response.  The above diagrams are also unrealistic in their hops -\n"
+"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send each\n"
+"of the messages through two additional outbound routers, then forwarded to\n"
+"two additional inbound routers to ROUTERB, so the lag there is significant -\n"
+"while the above only saves 11 steps, 8 of those steps need to traverse the\n"
+"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n"
+"in each stretch), leaving MinWWW with only two full traversals (one for the\n"
 "request, one for the response), instead of 10."
-msgstr ""
-"Esta funcionalidad /está/ limitada, pero 128KB es mucho para una simple "
-"respuesta o petición HTTP. Los diagramas de más arriba además no son "
-"realistas en sus saltos - ROUTERA nunca conectará directamente con "
-"ROUTERB, ROUTERA enviará sus mensajes a través de dos ruters de salida "
-"adicionales, entonces se reenviará a dos túneles adicionales hacia "
-"ROUTERB, con lo que el retraso es significante - mientras que lo anterior"
-"  sólo ahorra 11 pasos, 8 de estos pasos necesitan atravesar el camino "
-"entero de túneles (4 saltos más remotos cada vez), dejando MinWWW con "
-"sólo dos recorridos completos (uno para la petición, otro para la "
-"respuesta), en vez de 10."
+msgstr "Esta funcionalidad /está/ limitada, pero 128KB es mucho para una simple respuesta o petición HTTP. Los diagramas de más arriba además no son realistas en sus saltos - ROUTERA nunca conectará directamente con ROUTERB, ROUTERA enviará sus mensajes a través de dos ruters de salida adicionales, entonces se reenviará a dos túneles adicionales hacia ROUTERB, con lo que el retraso es significante - mientras que lo anterior  sólo ahorra 11 pasos, 8 de estos pasos necesitan atravesar el camino entero de túneles (4 saltos más remotos cada vez), dejando MinWWW con sólo dos recorridos completos (uno para la petición, otro para la respuesta), en vez de 10."
 
 #: i2p2www/pages/site/misc/minwww.html:113
 msgid ""
-"Implementing the MinWWW proxy and server should be fairly easy - read an "
-"HTTP\n"
-"request from the client fully (perhaps only start out with HTTP GET, "
-"leaving\n"
-"HTTP POST for later), wrap the message, and wait for the response.  The "
-"server\n"
-"in turn simply needs to parse the request to either open a socket or URL,"
-"\n"
-"send the request, wait for the response, and send it back through the "
-"network.\n"
+"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n"
+"request from the client fully (perhaps only start out with HTTP GET, leaving\n"
+"HTTP POST for later), wrap the message, and wait for the response.  The server\n"
+"in turn simply needs to parse the request to either open a socket or URL,\n"
+"send the request, wait for the response, and send it back through the network.\n"
 "If someone were to implement this, it would be Good :)"
-msgstr ""
-"Implementar el proxy y el servidor MinWWW debería ser bastante fácil - "
-"leer una petición HTTP del cliente (quizás sólo empezar con un HTTP GET; "
-"dejando HTTP POST para más tarde), envolver el mensaje, y esperar por la "
-"respuesta. El servidor de turno sólo necesita  analizar la petición para "
-"abrir un socket o una URL, enviar la petición, esperar por la respuesta y"
-" enviarlo de vuelta a través de la red. ¡Si alguien implementase esto, "
-"sería Genial!  :)"
+msgstr "Implementar el proxy y el servidor MinWWW debería ser bastante fácil - leer una petición HTTP del cliente (quizás sólo empezar con un HTTP GET; dejando HTTP POST para más tarde), envolver el mensaje, y esperar por la respuesta. El servidor de turno sólo necesita  analizar la petición para abrir un socket o una URL, enviar la petición, esperar por la respuesta y enviarlo de vuelta a través de la red. ¡Si alguien implementase esto, sería Genial!  :)"
 
 #: i2p2www/pages/site/misc/minwww.html:122
 msgid ""
-"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary "
-"message\n"
-"size, but that's going to be going away since it involves either "
-"excessive memory\n"
-"overhead on intermediary routers, or additional implementation details to"
-"\n"
-"handle.  I2PTunnel is currently limited to 128KB and hasn't been a "
-"burden,\n"
+"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary message\n"
+"size, but that's going to be going away since it involves either excessive memory\n"
+"overhead on intermediary routers, or additional implementation details to\n"
+"handle.  I2PTunnel is currently limited to 128KB and hasn't been a burden,\n"
 "so perhaps it could be increased to 256KB when the I2CP spec is updated)"
-msgstr ""
-"[1] ¿Por qué archivos de 128KB? Actualmente I2P permite mensajes de "
-"tamaño arbitrario, pero eso se eliminará ya que implica un gasto de "
-"memoria en los ruters intermedios. Los túneles I2P están limitados a "
-"128KB y no ha sido un problema, son lo que quizás podría ampliarse a "
-"256KB cuando las espcificaciones de I2CP se actualicen)"
+msgstr "[1] ¿Por qué archivos de 128KB? Actualmente I2P permite mensajes de tamaño arbitrario, pero eso se eliminará ya que implica un gasto de memoria en los ruters intermedios. Los túneles I2P están limitados a 128KB y no ha sido un problema, son lo que quizás podría ampliarse a 256KB cuando las espcificaciones de I2CP se actualicen)"
 
 #: i2p2www/pages/site/misc/myi2p.html:4
 msgid ""
-"There has been discussion about a distributed blogging application for a "
-"few\n"
-"months now called \"MyI2P\".  While the original discussions were lost, "
-"we were \n"
-"able to retrieve a Google <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
-"of it.  It isn't pretty, but it includes the basic overview and some "
-"discussion\n"
+"There has been discussion about a distributed blogging application for a few\n"
+"months now called \"MyI2P\".  While the original discussions were lost, we were \n"
+"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
+"of it.  It isn't pretty, but it includes the basic overview and some discussion\n"
 "that ensued."
-msgstr ""
-"Ha habido discusiones durante unos meses sobre una aplicación de blogging"
-" llamada ahora \"MyI2P\". Aunque la discusión original se perdió, fuimos "
-"capaces de conseguirla con el <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> de "
-"Google. "
+msgstr "Ha habido discusiones durante unos meses sobre una aplicación de blogging llamada ahora \"MyI2P\". Aunque la discusión original se perdió, fuimos capaces de conseguirla con el <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> de Google. "
 
 #: i2p2www/pages/site/misc/myi2p.html:12
 #, python-format
 msgid ""
-"The application itself is not yet implemented, and the ideas behind it "
-"have \n"
-"been made less ambitious over time, but they are still valid and the "
-"current \n"
-"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality "
-"available \n"
-"along side the I2P 1.0 release.  That will include a distributed address "
-"book\n"
-"to enable secure, distributed, and human readable naming by sacrificing "
-"the \n"
-"need for global uniqueness - basically everyone has their own local "
-"address book \n"
-"and can 'subscribe' to other people's address books, letting MyI2P "
-"periodically\n"
-"retrieve new name to destination mappings (leaving conflicts up to the "
-"user to\n"
-"resolve).  In addition to the address book, there will be a distributed "
-"blogging\n"
+"The application itself is not yet implemented, and the ideas behind it have \n"
+"been made less ambitious over time, but they are still valid and the current \n"
+"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n"
+"along side the I2P 1.0 release.  That will include a distributed address book\n"
+"to enable secure, distributed, and human readable naming by sacrificing the \n"
+"need for global uniqueness - basically everyone has their own local address book \n"
+"and can 'subscribe' to other people's address books, letting MyI2P periodically\n"
+"retrieve new name to destination mappings (leaving conflicts up to the user to\n"
+"resolve).  In addition to the address book, there will be a distributed blogging\n"
 "system using a reduced and secured subset of \n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to "
-"essentially\n"
-"provide an anonymous <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
-"a 'friends list' and transparent access control (authenticated by the I2P"
-"\n"
-"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the "
-"address book)."
-msgstr ""
-"La aplicación en si misma no está implementada, y las ideas detrás de "
-"ella se han hecho menos ambiciosas con el tiempo, pero aún son válidas y "
-"el <a href=\"%(roadmap)s\">plan</a> actual es tener el núcleo de MyI2P "
-"disponible con la versión 1.0 de I2P. Esto incluirá una libreta de "
-"direcciones distribuida para permitir un sistema de nombres seguro y "
-"distribuido aunque signifique sacrificar la necesidad de unicidad global "
-"- básicamente cada uno tiene su libreta de direcciones locales y puede "
-"'suscribirse' a las libretas de direcciones de otros usuarios, "
-"permitiendo a MyI2P obtener periódicamente nuevos nombres de destinos "
-"(dejando al usuario arreglar los conflictos). Ademas de la libreta de "
-"direcciones, habrá un sistema de blogs distribuidos usando una parte "
-"segura de <a "
-"href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a>, para "
-"proveer un <a href=\"http://www.livejournal.com/\">LiveJournal</a> "
-"anónimo, una 'lista de amigos' y un control de acceso transparente "
-"(autentificado por los <a href=\"%(datagrams)s\">datagramas</a> de I2P "
-"con normas definidas basadas en la libreta de direcciones)."
+"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n"
+"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
+"a 'friends list' and transparent access control (authenticated by the I2P\n"
+"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)."
+msgstr "La aplicación en si misma no está implementada, y las ideas detrás de ella se han hecho menos ambiciosas con el tiempo, pero aún son válidas y el <a href=\"%(roadmap)s\">plan</a> actual es tener el núcleo de MyI2P disponible con la versión 1.0 de I2P. Esto incluirá una libreta de direcciones distribuida para permitir un sistema de nombres seguro y distribuido aunque signifique sacrificar la necesidad de unicidad global - básicamente cada uno tiene su libreta de direcciones locales y puede 'suscribirse' a las libretas de direcciones de otros usuarios, permitiendo a MyI2P obtener periódicamente nuevos nombres de destinos (dejando al usuario arreglar los conflictos). Ademas de la libreta de direcciones, habrá un sistema de blogs distribuidos usando una parte segura de <a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a>, para proveer un <a href=\"http://www.livejournal.com/\">LiveJournal</a> anónimo, una 'lista de amigos' y un control de acceso transparente (autentificado por los <a href=\"%(datagrams)s\">datagramas</a> de I2P con normas definidas basadas en la libreta de direcciones)."
 
 #: i2p2www/pages/site/misc/myi2p.html:29
 msgid ""
-"Additional functionality, such as integration with a DHT backing store or"
-" \n"
-"swarming file transfers for 'attachments' can be added later.  Email may "
-"or may\n"
-"not get in the first pass either, though its implementation is "
-"essentially just\n"
-"a blog entry with private access, so perhaps some UI designer can come up"
-" with\n"
-"something.  Exporting the data to RSS or access through ATOM will be an "
-"option \n"
+"Additional functionality, such as integration with a DHT backing store or \n"
+"swarming file transfers for 'attachments' can be added later.  Email may or may\n"
+"not get in the first pass either, though its implementation is essentially just\n"
+"a blog entry with private access, so perhaps some UI designer can come up with\n"
+"something.  Exporting the data to RSS or access through ATOM will be an option \n"
 "down the road as well."
-msgstr ""
-"Las funcionalidades adicionales, como la integración del almacenamiento "
-"de copias DHT o la transferencia de archivos cmoo 'adjuntos' puede "
-"añadirse más tarde. El email puede estar listo o no en esta primera "
-"versión, aunque su implementación es esencialmente simplemente una "
-"entrada de blog con acceso privado, con lo que quizás algún diseñador de "
-"aplicaciones gráficas podría hacer algo. Esportando los datos a RSS o el "
-"acceso a través de ATOM podría ser unas opciones también."
+msgstr "Las funcionalidades adicionales, como la integración del almacenamiento de copias DHT o la transferencia de archivos cmoo 'adjuntos' puede añadirse más tarde. El email puede estar listo o no en esta primera versión, aunque su implementación es esencialmente simplemente una entrada de blog con acceso privado, con lo que quizás algún diseñador de aplicaciones gráficas podría hacer algo. Esportando los datos a RSS o el acceso a través de ATOM podría ser unas opciones también."
 
 #: i2p2www/pages/site/misc/ratestats.html:2
 #: i2p2www/pages/site/misc/ratestats.html:5
@@ -1526,11 +995,9 @@ msgstr "I2p permite un gran número de diferentes velocidades."
 
 #: i2p2www/pages/site/misc/ratestats.html:7
 msgid ""
-"The list was gathered using the following command in the top directory of"
-" the branch i2p.i2p:"
-msgstr ""
-"La lista fue obtenida usando el siguiente comando en el directorio "
-"principal de la rama 2p.i2p:"
+"The list was gathered using the following command in the top directory of "
+"the branch i2p.i2p:"
+msgstr "La lista fue obtenida usando el siguiente comando en el directorio principal de la rama 2p.i2p:"
 
 #: i2p2www/pages/site/misc/ratestats.html:10
 msgid "All options aren't needed, but it works."
@@ -1544,30 +1011,17 @@ msgid ""
 "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n"
 "on monotone.\n"
 "See\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p "
-"monotone</a>\n"
-"for more information on how to get started and check out the source "
-"anonymously.\n"
+"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n"
+"for more information on how to get started and check out the source anonymously.\n"
 "There is also a quick-start guide on the\n"
 "<a href=\"%(newdevs)s\">new developer's page</a>."
-msgstr ""
-"El código fuente de i2p es mantenido en varios repositorios distribuidos "
-"de monotone. Vea la <a href=\"http://www.monotone.ca/\">Web de "
-"Monotone</a> para mas información sobre monotone. Vea <a "
-"href=\"http://%(forum)s/viewtopic.php?t=2524\">este foro sobre i2p y "
-"monotone</a> para obtener mas información de como comenzar y descargar el"
-" código fuente anónimamente. También hay una guía rápida en la <a "
-"href=\"%(newdevs)s\">web de nuevos desarrolladores</a>."
+msgstr "El código fuente de i2p es mantenido en varios repositorios distribuidos de monotone. Vea la <a href=\"http://www.monotone.ca/\">Web de Monotone</a> para mas información sobre monotone. Vea <a href=\"http://%(forum)s/viewtopic.php?t=2524\">este foro sobre i2p y monotone</a> para obtener mas información de como comenzar y descargar el código fuente anónimamente. También hay una guía rápida en la <a href=\"%(newdevs)s\">web de nuevos desarrolladores</a>."
 
 #: i2p2www/pages/site/misc/transition-guide.html:16
 msgid ""
-"If you want to get the source non-anonymously, pull from the public "
-"server mtn.welterde.de.\n"
+"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n"
 "The i2p source code branch is \"i2p.i2p\"."
-msgstr ""
-"Si desea obtener el código fuente no anónimamente, descargue desde el "
-"servidor publico mtn.welterde.de.\n"
-"La rama del código fuente de i2p es \"i2p.i2p\"."
+msgstr "Si desea obtener el código fuente no anónimamente, descargue desde el servidor publico mtn.welterde.de.\nLa rama del código fuente de i2p es \"i2p.i2p\"."
 
 #: i2p2www/pages/site/misc/transition-guide.html:21
 msgid "Guide"
@@ -1577,9 +1031,7 @@ msgstr "Guía"
 msgid ""
 "\n"
 "The following is a detailed guide by Complication."
-msgstr ""
-"\n"
-"Lo siguiente es una guía detallada hecha por Complication."
+msgstr "\nLo siguiente es una guía detallada hecha por Complication."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2
 msgid "How to Upgrade from 0.6.1.30 and Earlier"
@@ -1596,40 +1048,24 @@ msgid ""
 "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n"
 "we do not have his update signing key or access to\n"
 "www.i2p[.net] or dev.i2p[.net].\n"
-"Complication and zzz have generated new signing keys, and they and Amiga "
-"are providing\n"
-"update file hosting. These changes must be configured in your router to "
-"take effect."
-msgstr ""
-"Desde que el programador principal de i2p <a href=\"%(jrandom)s\">se "
-"ausentó sin avisar, AWOL</a>, no tenemos su clave de actualización "
-"firmada o acceso a www.i2p[.net] o dev.i2p[.net]. Complication y zzz han "
-"generado nuevas claves de firmado, y ellos y Amiga proveen alojamiento a "
-"los archivos de actualización. Estos cambios tienen que ser configurados "
-"en su ruter para que tengan efecto. "
+"Complication and zzz have generated new signing keys, and they and Amiga are providing\n"
+"update file hosting. These changes must be configured in your router to take effect."
+msgstr "Desde que el programador principal de i2p <a href=\"%(jrandom)s\">se ausentó sin avisar, AWOL</a>, no tenemos su clave de actualización firmada o acceso a www.i2p[.net] o dev.i2p[.net]. Complication y zzz han generado nuevas claves de firmado, y ellos y Amiga proveen alojamiento a los archivos de actualización. Estos cambios tienen que ser configurados en su ruter para que tengan efecto. "
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17
 msgid ""
-"Make the following configuration changes and your router will "
-"automatically install\n"
+"Make the following configuration changes and your router will automatically install\n"
 "the latest release."
-msgstr ""
-"Haga los siguientes cambios de configuración y su ruter instalará "
-"automáticamente la última versión"
+msgstr "Haga los siguientes cambios de configuración y su ruter instalará automáticamente la última versión"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22
 #, python-format
 msgid ""
-"We recommend the automated process as it will verify the key of the "
-"signed update file.\n"
+"We recommend the automated process as it will verify the key of the signed update file.\n"
 "If you do not make these changes,\n"
 "you may manually download the i2pupdate.zip file from\n"
 "<a href=\"%(downloads)s\">the download page</a>."
-msgstr ""
-"Recomendamos el proceso automático ya que verificará la clave del archivo"
-" de actualización firmado. Si no hace estos cambios, puede descargar "
-"manualmente el archivo i2pupdate.zip de la <a "
-"href=\"%(downloads)s\">página de descargas</a>."
+msgstr "Recomendamos el proceso automático ya que verificará la clave del archivo de actualización firmado. Si no hace estos cambios, puede descargar manualmente el archivo i2pupdate.zip de la <a href=\"%(downloads)s\">página de descargas</a>."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:34
 #, python-format
@@ -1638,11 +1074,9 @@ msgstr "Cambiar el enlace de la suscripción de noticias a: %(url)s"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38
 msgid ""
-"Select ONE of the following new Update URLs at random and enter it into "
-"the Update URL box: "
-msgstr ""
-"Seleccione una de las siguientes enlaces de actualización aleatoriamente "
-"e introdúzcalo dentro de la casilla Update URL:"
+"Select ONE of the following new Update URLs at random and enter it into the "
+"Update URL box: "
+msgstr "Seleccione una de las siguientes enlaces de actualización aleatoriamente e introdúzcalo dentro de la casilla Update URL:"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43
 msgid "Check the box \"Update through the eepProxy?\""
@@ -1663,25 +1097,14 @@ msgstr "Pulse \"Aplicar\""
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58
 msgid ""
 "You are now ready to automatically receive the release update file,\n"
-"either by setting your update policy to \"download and install\" or by "
-"clicking on the\n"
+"either by setting your update policy to \"download and install\" or by clicking on the\n"
 "\"update available\" link when it appears."
-msgstr ""
-"Ahora estas listo para recibir automáticamente el archivo de "
-"actualización, ya sea configurando su política de actualizaciones a "
-"\"descargar e instalar\" o pulsando en el enlace \"actualización "
-"disponible\" cuando aparezca."
+msgstr "Ahora estas listo para recibir automáticamente el archivo de actualización, ya sea configurando su política de actualizaciones a \"descargar e instalar\" o pulsando en el enlace \"actualización disponible\" cuando aparezca."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:65
 #, python-format
 msgid ""
 "If you would like to verify the trusted update keys, they are also\n"
 "<a href=\"%(url)s\">posted and signed here</a>.\n"
-"Thank you for your support during this transition. For help please "
-"contact us on #i2p."
-msgstr ""
-"Si deseas verificar las claves de actualización de confianza, se "
-"encuentran también <a href=\"%(url)s\">subidas y firmadas aquí</a>. "
-"Gracias por su ayuda durante la transición. Por favor, para pedir ayuda "
-"contacte con nosotros en #I2P."
-
+"Thank you for your support during this transition. For help please contact us on #i2p."
+msgstr "Si deseas verificar las claves de actualización de confianza, se encuentran también <a href=\"%(url)s\">subidas y firmadas aquí</a>. Gracias por su ayuda durante la transición. Por favor, para pedir ayuda contacte con nosotros en #I2P."
diff --git a/i2p2www/translations/es_AR/LC_MESSAGES/docs.po b/i2p2www/translations/es_AR/LC_MESSAGES/docs.po
index e229e5412845d09963f3549f6fcbfdd642e4f759..3d6cbfcf62144f49f689f4ed605dabf16ac3a032 100644
--- a/i2p2www/translations/es_AR/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/es_AR/LC_MESSAGES/docs.po
@@ -4547,7 +4547,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:72
 msgid "for"
-msgstr ""
+msgstr "para"
 
 #: i2p2www/pages/site/docs/applications/git.html:74
 msgid "in order to obscure your local time zone."
diff --git a/i2p2www/translations/fa/LC_MESSAGES/about.po b/i2p2www/translations/fa/LC_MESSAGES/about.po
index 39df10553392759683aa95753400f56736eddd11..1c106f6578cfb9a1799fb8f77a029097feb998ce 100644
--- a/i2p2www/translations/fa/LC_MESSAGES/about.po
+++ b/i2p2www/translations/fa/LC_MESSAGES/about.po
@@ -1,23 +1,24 @@
-# Persian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Amir H. Firouzian, 2014
 # Reza Ghasemi, 2019
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-10-11 16:26+0000\n"
-"PO-Revision-Date: 2021-11-28 10:01+0000\n"
-"Last-Translator: Vox <voxp@protonmail.com>\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Reza Ghasemi, 2019\n"
 "Language-Team: Persian (http://www.transifex.com/otf/I2P/language/fa/)\n"
-"Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: fa\n"
+"Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -27,8 +28,7 @@ msgstr "کلاینت های I2P دیگر"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
 msgstr ""
 
@@ -51,8 +51,7 @@ msgstr ""
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
 msgstr ""
 
 #: i2p2www/pages/site/about/browser-config.html:2
@@ -72,18 +71,15 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:9
 msgid ""
 "I2P: Invisible Internet Project: a project meant to\n"
-"        provide an anonymity layer, so user can communicate anonymously "
-"using a\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
 "        range of applications."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:12
 msgid ""
 "Router: The core I2P software, which routes encrypted\n"
-"        packets on the I2P network. All routers by default participate in"
-" the\n"
-"        network, which both helps the network and provides cover traffic "
-"for any\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
 "        clients or servers connecting to the I2P network through the\n"
 "        router."
 msgstr ""
@@ -91,26 +87,22 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:17
 msgid ""
 "RouterIdentity: A collection of information required to\n"
-"        communicate directly with a router, such as its IP address and "
-"listening\n"
+"        communicate directly with a router, such as its IP address and listening\n"
 "        port, public signing and encryption keys etc."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:20
 msgid ""
 "Tunnel: An anonymous communication pathway between a\n"
-"        client or server and the I2P network. Tunnels are unidirectional,"
-" so any\n"
-"        one client or server must have at least two Tunnels - one for "
-"inbound\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
 "        traffic and one for outbound traffic."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:24
 msgid ""
 "Destination: The cryptographic identity of a tunnel.\n"
-"        These are the identities of clients and servers within the I2P "
-"network,\n"
+"        These are the identities of clients and servers within the I2P network,\n"
 "        and are analogous to the IP:port of a computer on the normal\n"
 "        internet."
 msgstr ""
@@ -118,39 +110,32 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:28
 msgid ""
 "LeaseSet: A collection of information required to\n"
-"        communicate with a client or server at a particular Destination, "
-"such as\n"
+"        communicate with a client or server at a particular Destination, such as\n"
 "        the gateways of the inbound Tunnels for that\n"
 "        Destination."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:34
 msgid ""
-"This table lists definition of different networks and their components. "
-"These\n"
+"This table lists definition of different networks and their components. These\n"
 "terms and the definitions provided are taken from\n"
-"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization"
-" Off The\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
 "Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:40
 msgid ""
 "Decentralization: Network architecture that avoids\n"
-"        reliance on a single party. Encompasses peer-to-peer, blockchain,"
-"\n"
-"        federated, and distributed technologies that involve many "
-"individual\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
 "        users."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:44
 msgid ""
 "Peer-to-Peer (p2p): Peers make a portion of their \n"
-"        resources, such as processing power, disk storage or network "
-"bandwidth,\n"
-"        directly available to other network participants, without the "
-"need for\n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
 "        central coordination by servers or stable hosts. Popularized by\n"
 "        BitTorrent, Napster, and Bitcoin."
 msgstr ""
@@ -158,32 +143,25 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:49
 msgid ""
 "Federated: Federation allows separate deployments of a\n"
-"        service to communicate with each other through a common protocol,"
-" for\n"
-"        instance a mail server run by Google federates with a mail server"
-" run by\n"
-"        Microsoft when you send an email from @gmail.com to @hotmail.com."
-"\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
 "        Each deployment may host multiple users."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:54
 msgid ""
 "Blockchain: A distributed ledger that can record\n"
-"        transactions between multiple parties efficiently and in a "
-"verifiable\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
 "        and permanent way."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:57
 msgid ""
 "Distributed systems: Academic topic within the\n"
-"        discipline of Computer Science which is concerned with the design"
-" of\n"
-"        computer systems that consist of many individual computers "
-"connected\n"
-"        over a network. Peer-to-peer networks and blockchains are "
-"examples of\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
 "        distributed systems architectures."
 msgstr ""
 
@@ -197,8 +175,7 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:65
 msgid ""
 "DHT: Distributed hash table, used in some projects to\n"
-"        connect peers to each other by storing information in the form of"
-"\n"
+"        connect peers to each other by storing information in the form of\n"
 "        key-value pairs in a distributed manner."
 msgstr ""
 
@@ -218,16 +195,14 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:73
 msgid ""
 "Hash: A number, usually displayed as a string of letters\n"
-"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying"
-"\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
 "        data."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:76
 msgid ""
 "UX: User experience, the overall experience of a person\n"
-"        using a product or a service, especially in terms of how easy it "
-"is to\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
 "        use."
 msgstr ""
 
@@ -237,14 +212,10 @@ msgstr "تالار شهرت"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -254,15 +225,14 @@ msgstr ""
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -276,12 +246,8 @@ msgstr "پروژه اینترنت نامرئی"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -291,13 +257,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -306,15 +272,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -323,28 +289,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -353,36 +318,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -391,13 +355,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -406,15 +370,11 @@ msgstr "مقایسه ها"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -433,9 +393,8 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -492,8 +451,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -512,8 +470,7 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
 msgstr ""
 
@@ -522,8 +479,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:76
@@ -536,8 +492,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
@@ -546,8 +501,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:95
@@ -555,8 +510,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -571,15 +525,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -591,8 +543,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -647,16 +598,14 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
@@ -665,11 +614,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:189
@@ -722,16 +669,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
 msgstr ""
@@ -747,12 +692,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -766,35 +708,29 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -803,16 +739,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -829,8 +763,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
@@ -840,29 +773,20 @@ msgstr ""
 
 #: i2p2www/pages/site/about/restrictive-countries.html:4
 msgid ""
-"This implementation of I2P (the Java implementation distributed on this "
-"site)\n"
-"includes a \"Strict Countries List\" which we use to decide how routers "
-"should behave \n"
-"within regions where applications like I2P may be limited by law. For "
-"example, while\n"
-"no countries that we know of prohibit using I2P, some have broad "
-"prohibitions on\n"
-"participating in routing for others. Routers that appear to be in the "
-"\"Strict\"\n"
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
 "countries will automatically be placed into \"Hidden\" mode."
 msgstr ""
 
 #: i2p2www/pages/site/about/restrictive-countries.html:11
 msgid ""
-"The Project relies on the research provided by civil and digital rights "
-"organizations in order\n"
-"to make decisions that offer protections for its users. In this case the "
-"ongoing research\n"
-"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has "
-"been referenced. General\n"
-"guidance is to include countries with a Civil Liberties (CL) score of 16 "
-"or less or an Internet\n"
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
 "Freedom score of 39 or less (not free)."
 msgstr ""
 
@@ -872,16 +796,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/restrictive-countries.html:19
 msgid ""
-"When a router is placed into hidden mode, three key things change about "
-"it's behavior.\n"
-"It will no longer publish a routerInfo to the NetDB, it will no longer "
-"accept\n"
-"participating tunnels, and it will reject direct connections to routers "
-"in the same\n"
-"country that it is in. These defenses make the routers more difficult to "
-"enumerate\n"
-"reliably, and prevent them from running afoul of restrictions on routing "
-"traffic for\n"
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
 "others."
 msgstr ""
 
@@ -903,18 +822,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -925,84 +841,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -1013,8 +906,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -1022,27 +914,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -1050,26 +938,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -1080,10 +959,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -1091,18 +968,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -1113,10 +987,8 @@ msgstr "اعضا پروژه I2P"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
 msgstr ""
@@ -1288,7 +1160,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1528,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1578,32 +1452,25 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1621,8 +1488,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1661,10 +1528,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1678,15 +1543,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1695,11 +1556,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1754,8 +1612,7 @@ msgstr "روز 2"
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1773,15 +1630,11 @@ msgstr "آگوست 2010"
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1800,14 +1653,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1818,20 +1667,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1842,24 +1684,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1879,33 +1712,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -1918,32 +1742,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -1953,27 +1769,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -1990,17 +1798,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -2013,8 +1818,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -2025,10 +1829,8 @@ msgstr "تاریخچه عملکرد"
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -2047,30 +1849,23 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -2084,55 +1879,40 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -2143,20 +1923,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -2167,16 +1940,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -2186,17 +1954,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -2207,20 +1972,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2234,26 +1992,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2262,18 +2010,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2281,16 +2023,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2306,52 +2043,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2366,102 +2084,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2474,4 +2151,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/fr/LC_MESSAGES/about.po b/i2p2www/translations/fr/LC_MESSAGES/about.po
index b020ea763a6fbe08cdc06b3a44295e44a10a5d73..c9a540282b0bd42d329ab314f1234e00c15809a4 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/about.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/about.po
@@ -1,12 +1,13 @@
-# French translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # AO <ao@localizationlab.org>, 2018-2021
 # Boxoa590, 2013
 # AO <ao@localizationlab.org>, 2017-2018
 # magma <magma@mail.i2p>, 2011
+# Boxoa590, 2013
 # Nicolas Belleau <nbbelleau@gmail.com>, 2019
 # syl_, 2013
 # syl_, 2013,2015-2016
@@ -14,17 +15,18 @@
 # Towinet, 2013-2017
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: AO <ao@localizationlab.org>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: AO <ao@localizationlab.org>, 2018-2021\n"
 "Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n"
-"Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: fr\n"
+"Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -34,14 +36,9 @@ msgstr "Clients I2P de remplacement"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
-msgstr ""
-"L’implémentation du principal client I2P utilise Java. Si pour certaines "
-"raisons vous ne pouvez pas utiliser Java sur votre dispositif, il y a des"
-" implémentations alternatives développées par des membres de la "
-"communauté."
+msgstr "L’implémentation du principal client I2P utilise Java. Si pour certaines raisons vous ne pouvez pas utiliser Java sur votre dispositif, il y a des implémentations alternatives développées par des membres de la communauté."
 
 #: i2p2www/pages/site/about/alternative-clients.html:12
 #, python-format
@@ -49,33 +46,21 @@ msgid ""
 "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n"
 "As of early 2016, i2pd is became stable enough to be used in \n"
 "production, and since summer 2016 it fully implements all I2P APIs."
-msgstr ""
-"<a href=\"%(i2pd)s\">i2pd</a> est une implémentation de client I2P écrite"
-" en C++.\n"
-"Début 2016, i2pd est devenu suffisamment stable pour être utilisable en "
-"production, et depuis l’été 2016 il implémente complètement toutes les "
-"APIs d’I2P."
+msgstr "<a href=\"%(i2pd)s\">i2pd</a> est une implémentation de client I2P écrite en C++.\nDébut 2016, i2pd est devenu suffisamment stable pour être utilisable en production, et depuis l’été 2016 il implémente complètement toutes les APIs d’I2P."
 
 #: i2p2www/pages/site/about/alternative-clients.html:19
 #, python-format
 msgid ""
 "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero "
 "cryptocurrency."
-msgstr ""
-"<a href=\"%(kovri)s\">Kovri</a> est une fourche active d’I2P développée "
-"pour la cryptomonnaie Monero."
+msgstr "<a href=\"%(kovri)s\">Kovri</a> est une fourche active d’I2P développée pour la cryptomonnaie Monero."
 
 #: i2p2www/pages/site/about/alternative-clients.html:24
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
-msgstr ""
-"<a href=\"%(go_i2p)s\">Go-I2P</a> est un client I2P client développé en "
-"utilisant le langage de programmation \n"
-"<a href=\"%(golang)s\">Go</a>. Le projet est au début de son "
-"développement."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
+msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> est un client I2P client développé en utilisant le langage de programmation \n<a href=\"%(golang)s\">Go</a>. Le projet est au début de son développement."
 
 #: i2p2www/pages/site/about/browser-config.html:2
 msgid "Web Browser Configuration"
@@ -87,11 +72,147 @@ msgstr "Glossaire"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
-"Cette page liste la terminologie souvent utilisée lors de discussions au "
-"sujet d’I2P et de la cryptographie."
+
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
@@ -99,22 +220,11 @@ msgstr "Temple de la renommée"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
-msgstr ""
-"I2P est un projet entièrement réalisé par des passionnés pendant leur "
-"temps libre. Mais un grand projet tel qu’I2P n’est pas seulement "
-"constitué de logiciels. Plusieurs serveurs, abonnements de domaines et "
-"cafés doivent être payés pour obtenir un excellent résultat. Des gens du "
-"monde entier ont fait des dons afin qu’I2P atteignent l’état où il se "
-"trouve actuellement. Nous gardons ici une trace de ceux qui nous ont "
-"donné un nom à publier dans le temple de la renommée d’I2P."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
+msgstr "I2P est un projet entièrement réalisé par des passionnés pendant leur temps libre. Mais un grand projet tel qu’I2P n’est pas seulement constitué de logiciels. Plusieurs serveurs, abonnements de domaines et cafés doivent être payés pour obtenir un excellent résultat. Des gens du monde entier ont fait des dons afin qu’I2P atteignent l’état où il se trouve actuellement. Nous gardons ici une trace de ceux qui nous ont donné un nom à publier dans le temple de la renommée d’I2P."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
 msgid "Big thanks go to the following people who have donated to I2P!"
@@ -123,21 +233,15 @@ msgstr "Un grand merci aux personnes suivantes qui ont donné à I2P !"
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
-msgstr ""
-"Si vous avez fait un don, veuillez envoyer un courriel à <a "
-"href=\"mailto:%(echelon)s\">echelon</a> avec votre nom ou pseudo (et "
-"facultativement votre page Web) afin que nous puissions vous lister ici."
+msgstr "Si vous avez fait un don, veuillez envoyer un courriel à <a href=\"mailto:%(echelon)s\">echelon</a> avec votre nom ou pseudo (et facultativement votre page Web) afin que nous puissions vous lister ici."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
-msgstr ""
-"La liste non triée de donateurs à I2P lors des quinze années d’histoire "
-"d’I2P, de mars 2004 à mars 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
+msgstr "La liste non triée de donateurs à I2P lors des quinze années d’histoire d’I2P, de mars 2004 à mars 2019."
 
 #: i2p2www/pages/site/about/intro.html:2
 #: i2p2www/pages/site/about/software.html:2
@@ -150,12 +254,8 @@ msgstr "The Invisible Internet Project (le projet internet invisible)"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -165,13 +265,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -180,15 +280,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -197,28 +297,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -227,39 +326,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
-msgstr ""
-"Dans la console du routeur, je vois les adresses IP de tous les autres "
-"nœuds d’I2P. Cela signifie-t-il que les autres peuvent voir mon adresse "
-"IP ?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
+msgstr "Dans la console du routeur, je vois les adresses IP de tous les autres nœuds d’I2P. Cela signifie-t-il que les autres peuvent voir mon adresse IP ?"
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -268,13 +363,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -283,36 +378,21 @@ msgstr "Comparaisons"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Il existe un grand nombre d’autres applications et de projets travaillant"
-" sur les communications anonymes et I2P s’en est largement inspiré. Cette"
-" liste est loin d’être exhaustive concernant le thème de l’anonymat (<a "
-"href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a> de Freehaven\n"
-"et les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à "
-"GNUnet servent à celà). \n"
-"Néanmoins, certains systèmes se prêtent bien à la comparaison. Les "
-"suivants disposent d’ailleurs d’une page dédiée :"
+msgstr "Il existe un grand nombre d’autres applications et de projets travaillant sur les communications anonymes et I2P s’en est largement inspiré. Cette liste est loin d’être exhaustive concernant le thème de l’anonymat (<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> de Freehaven\net les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à GNUnet servent à celà). \nNéanmoins, certains systèmes se prêtent bien à la comparaison. Les suivants disposent d’ailleurs d’une page dédiée :"
 
 #: i2p2www/pages/site/about/intro.html:56
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Ceux qui suivent sont discuté sur la page <a "
-"href=\"%(othernetworks)s\">autres réseaux</a>"
+msgstr "Ceux qui suivent sont discuté sur la page <a href=\"%(othernetworks)s\">autres réseaux</a>"
 
 #: i2p2www/pages/site/about/media.html:2
 msgid "Presentations on I2P"
@@ -321,13 +401,9 @@ msgstr "Présentations sur I2P"
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
-msgstr ""
-"Voici des liens vers des présentations, des vidéos et des tutoriels sur "
-"I2P. Des liens vers des documents de recherche sur I2P sont proposés <a "
-"href=\"%(papers)s\">ici</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
+msgstr "Voici des liens vers des présentations, des vidéos et des tutoriels sur I2P. Des liens vers des documents de recherche sur I2P sont proposés <a href=\"%(papers)s\">ici</a>."
 
 #: i2p2www/pages/site/about/media.html:8
 #, python-format
@@ -338,9 +414,7 @@ msgstr "Pour demander un ajout à cette page, veuillez l’envoyer à %(email)s.
 msgid ""
 "\n"
 "Newest links are at the bottom of each section."
-msgstr ""
-"\n"
-"Les liens les plus récents se trouvent au bas de chaque section."
+msgstr "\nLes liens les plus récents se trouvent au bas de chaque section."
 
 #: i2p2www/pages/site/about/media.html:16
 msgid "Presentations"
@@ -353,11 +427,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(transcript)s\">transcript</a>\n"
 "Lance James (0x90), February 2002."
-msgstr ""
-"Présentation IIP à Codecon\n"
-"<a href=\"%(mp3)s\">audio MP3</a>\n"
-"<a href=\"%(transcript)s\">transcription</a>\n"
-"Lance James (0x90), février 2002."
+msgstr "Présentation IIP à Codecon\n<a href=\"%(mp3)s\">audio MP3</a>\n<a href=\"%(transcript)s\">transcription</a>\nLance James (0x90), février 2002."
 
 #: i2p2www/pages/site/about/media.html:27
 #, python-format
@@ -366,11 +436,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(slides)s\">slides</a>\n"
 "Lance James (0x90), September 2002."
-msgstr ""
-"Présentation IIP à ToorCon\n"
-"<a href=\"%(mp3)s\">audio MP3</a>\n"
-"<a href=\"%(slides)s\">diaporama</a>\n"
-" Lance James (0x90), septembre 2002."
+msgstr "Présentation IIP à ToorCon\n<a href=\"%(mp3)s\">audio MP3</a>\n<a href=\"%(slides)s\">diaporama</a>\n Lance James (0x90), septembre 2002."
 
 #: i2p2www/pages/site/about/media.html:35
 #, python-format
@@ -380,12 +446,7 @@ msgid ""
 "An introduction into anonymous communication with I2P.\n"
 "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n"
 "Jens Kubieziel, 24C3 Berlin, December 28, 2007."
-msgstr ""
-"<a href=\"%(video)s\">To Be or I2P</a>\n"
-"(vidéo Youtube)\n"
-"Une introduction à la communication anonyme avec I2P.\n"
-"<a href=\"%(pdf)s\">To Be or I2P (présentation PDF)</a>,\n"
-"Jens Kubieziel, 24C3 Berlin, le 28 décembre 2007."
+msgstr "<a href=\"%(video)s\">To Be or I2P</a>\n(vidéo Youtube)\nUne introduction à la communication anonyme avec I2P.\n<a href=\"%(pdf)s\">To Be or I2P (présentation PDF)</a>,\nJens Kubieziel, 24C3 Berlin, le 28 décembre 2007."
 
 #: i2p2www/pages/site/about/media.html:44
 #, python-format
@@ -393,17 +454,12 @@ msgid ""
 "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n"
 "Lars Schimmer,\n"
 "March 14-15, 2009"
-msgstr ""
-"<a href=\"%(video)s\">Vidéo de la conférence I2P au « Chemnitz Linux "
-"Tag »</a>,\n"
-"Lars Schimmer,\n"
-"14 au 15 mars 2009"
+msgstr "<a href=\"%(video)s\">Vidéo de la conférence I2P au « Chemnitz Linux Tag »</a>,\nLars Schimmer,\n14 au 15 mars 2009"
 
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -414,9 +470,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n"
 "Adrian Crenshaw. Schmoocon Firetalk, January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n"
-"Adrian Crenshaw. Schmoocon Firetalk, janvier 2011"
+msgstr "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\nAdrian Crenshaw. Schmoocon Firetalk, janvier 2011"
 
 #: i2p2www/pages/site/about/media.html:62
 #, python-format
@@ -424,114 +478,72 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
-msgstr ""
-"<a href=\"%(link)s\">Utiliser la technologie pour faire avancer la "
-"liberté</a>\n"
-"(vidéo Youtube)\n"
-"Eric Johnson. \n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, le 27 "
-"mars 2011. \n"
-"I2P couvert de 10:00 à 20:00 dans la vidéo."
+msgstr "<a href=\"%(link)s\">Utiliser la technologie pour faire avancer la liberté</a>\n(vidéo Youtube)\nEric Johnson. \n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, le 27 mars 2011. \nI2P couvert de 10:00 à 20:00 dans la vidéo."
 
 #: i2p2www/pages/site/about/media.html:70
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Faiblesses communes du darknet (Common Darknet "
-"Weaknesses)</a>\n"
-"(vidéo Youtube)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 "
-"juillet 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
+msgstr "<a href=\"%(link)s\">Faiblesses communes du darknet (Common Darknet Weaknesses)</a>\n(vidéo Youtube)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 juillet 2011."
 
 #: i2p2www/pages/site/about/media.html:76
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011."
-msgstr ""
-"<a href=\"%(link)s\"> I2P / Tor notes d’atelier</a>\n"
-"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 août 2011."
+msgstr "<a href=\"%(link)s\"> I2P / Tor notes d’atelier</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 août 2011."
 
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011."
-msgstr ""
-"<a href=\"%(live)s\"> Cipherspaces / Darknets : un aperçu des stratégies "
-"d’attaque –\n"
-"DEF CON Live version (vidéo Youtube) </a>,\n"
-"<a href=\"%(studio)s\">Version \"Studio\" (vidéo Youtube) </a>,\n"
-"<a href=\"%(slides)s\">Diaporama (ppt)</a>\n"
-"Adrian Crenshaw. DEF CON 19, Las Vegas, 7 août 2011."
+msgstr "<a href=\"%(live)s\"> Cipherspaces / Darknets : un aperçu des stratégies d’attaque –\nDEF CON Live version (vidéo Youtube) </a>,\n<a href=\"%(studio)s\">Version \"Studio\" (vidéo Youtube) </a>,\n<a href=\"%(slides)s\">Diaporama (ppt)</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 7 août 2011."
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
-msgstr ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), 4 novembre 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
+msgstr "<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4 novembre 2011."
 
 #: i2p2www/pages/site/about/media.html:95
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
-msgstr ""
-"<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
-"(vidéo Youtube)\n"
-"Blair Dick, Université d’Abertay, Dundee Ethical Hacking Society, 25 "
-"janvier 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
+msgstr "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n(vidéo Youtube)\nBlair Dick, Université d’Abertay, Dundee Ethical Hacking Society, 25 janvier 2012."
 
 #: i2p2www/pages/site/about/media.html:101
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2PCon 2015</a>\n"
 "Toronto, August 15-16, 2015"
-msgstr ""
-"<a href=\"%(link)s\">I2PCon 2015</a>\n"
-"Toronto, 15-16 août 2015"
+msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 août 2015"
 
 #: i2p2www/pages/site/about/media.html:106
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
-msgstr ""
-"<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
-"<a href=\"%(link2)s\">(vidéo)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 décembre 2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
+msgstr "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n<a href=\"%(link2)s\">(vidéo)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 décembre 2015"
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
-msgstr ""
-"Remplacement de crypto usée (anglais: Weary) : mise à niveau du réseau "
-"I2P avec des primitives plus fortes\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, Real World Crypto, Stanford, 8 janvier 2016"
+msgstr "Remplacement de crypto usée (anglais: Weary) : mise à niveau du réseau I2P avec des primitives plus fortes\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, Real World Crypto, Stanford, 8 janvier 2016"
 
 #: i2p2www/pages/site/about/media.html:121
 #, python-format
@@ -539,14 +551,8 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
-msgstr ""
-"Onions and Garlic: the protocols of I2P\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, 17 février 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
+msgstr "Onions and Garlic: the protocols of I2P\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17 février 2016"
 
 #: i2p2www/pages/site/about/media.html:129
 #, python-format
@@ -555,22 +561,14 @@ msgid ""
 "<a href=\"%(link)s\">(mp4)</a>\n"
 "<a href=\"%(link2)s\">(webm)</a>\n"
 "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018"
-msgstr ""
-"Le projet de l’Internet invisible — Une vue d’ensemble et un guide des "
-"technologies\n"
-"<a href=\"%(link)s\">(mp4)</a>\n"
-"<a href=\"%(link2)s\">(webm)</a>\n"
-"Andrew Savchenko (bircoph), FOSDEM, Bruxelles, le 4 février 2018"
+msgstr "Le projet de l’Internet invisible — Une vue d’ensemble et un guide des technologies\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Bruxelles, le 4 février 2018"
 
 #: i2p2www/pages/site/about/media.html:137
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">Intro to I2P for App Developers (mp4)</a>\n"
 "idk"
-msgstr ""
-"<a href=\"%(link)s\">Présentation d’I2P pour les développeurs d’appli "
-"(mp4)</a>\n"
-"idk"
+msgstr "<a href=\"%(link)s\">Présentation d’I2P pour les développeurs d’appli (mp4)</a>\nidk"
 
 #: i2p2www/pages/site/about/media.html:145
 msgid "Tutorials"
@@ -583,11 +581,7 @@ msgid ""
 "(Youtube Video)\n"
 "This guide will show you how to install I2P in Windows XP.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Tutoriel I2P sous Windows</a>\n"
-"(vidéo Youtube)\n"
-"Ce guide vous montrera comment installer I2P sous Windows XP.\n"
-"Par <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Tutoriel I2P sous Windows</a>\n(vidéo Youtube)\nCe guide vous montrera comment installer I2P sous Windows XP.\nPar <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:155
 #, python-format
@@ -596,12 +590,7 @@ msgid ""
 "(Youtube Video)\n"
 "This will guide you through how to install I2P on a Debian Linux System.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Tutoriel I2P sous Debian</a>\n"
-"(vidéo Youtube)\n"
-"Ce tutoriel vous guidera dans l’installation d’I2P sur un système Linux "
-"Debian.\n"
-"Par <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Tutoriel I2P sous Debian</a>\n(vidéo Youtube)\nCe tutoriel vous guidera dans l’installation d’I2P sur un système Linux Debian.\nPar <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:162
 #, python-format
@@ -610,57 +599,33 @@ msgid ""
 "(Youtube Video)\n"
 "How to set up an anonymous web site in I2P.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Comment mettre en place un site anonyme dans I2P</a>"
-"\n"
-"(vidéo Youtube)\n"
-"Comment mettre en place un site Web anonyme dans I2P.\n"
-"Par <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Comment mettre en place un site anonyme dans I2P</a>\n(vidéo Youtube)\nComment mettre en place un site Web anonyme dans I2P.\nPar <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:169
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Tutoriel I2P Mac OS X</a>\n"
-"(vidéo Youtube)\n"
-"Un tutoriel sur la façon d’exécuter I2P sur Mac OS X et comment se "
-"connecter à irc.telecomix.i2p.\n"
-"Par <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Tutoriel I2P Mac OS X</a>\n(vidéo Youtube)\nUn tutoriel sur la façon d’exécuter I2P sur Mac OS X et comment se connecter à irc.telecomix.i2p.\nPar <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Felix Atari explique les principes de base d’I2P</a>"
-"\n"
-"(vidéo YouTube)\n"
-"Agent Felix Atari du « Telecomix Crypto Munitions Bureau ».\n"
-"Par <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Felix Atari explique les principes de base d’I2P</a>\n(vidéo YouTube)\nAgent Felix Atari du « Telecomix Crypto Munitions Bureau ».\nPar <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
-msgstr ""
-"<a href=\"%(link)s\"> Comment aller sur I2P, le darknet P2P anonyme "
-"(installeur Windows) </a>\n"
-"(vidéo Youtube)\n"
-"Ce tutoriel montre comment installer et configurer le logiciel nécessaire"
-" pour accéder à I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
+msgstr "<a href=\"%(link)s\"> Comment aller sur I2P, le darknet P2P anonyme (installeur Windows) </a>\n(vidéo Youtube)\nCe tutoriel montre comment installer et configurer le logiciel nécessaire pour accéder à I2P."
 
 #: i2p2www/pages/site/about/media.html:189
 #, python-format
@@ -668,10 +633,7 @@ msgid ""
 "<a href=\"%(link)s\">How to connect to I2P</a>\n"
 "(Youtube Video)\n"
 "How to install I2P on Ubuntu."
-msgstr ""
-"<a href=\"%(link)s\">Comment se connecter à I2P</a>\n"
-"(vidéo Youtube)\n"
-"Comment installer I2P sur Ubuntu."
+msgstr "<a href=\"%(link)s\">Comment se connecter à I2P</a>\n(vidéo Youtube)\nComment installer I2P sur Ubuntu."
 
 #: i2p2www/pages/site/about/media.html:195
 #, python-format
@@ -680,11 +642,7 @@ msgid ""
 "(Video)\n"
 "Adrian Crenshaw.\n"
 "January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Installation du logiciel darknet I2P sous Linux</a>\n"
-"(vidéo)\n"
-"Adrian Crenshaw. \n"
-"Janvier 2011"
+msgstr "<a href=\"%(link)s\">Installation du logiciel darknet I2P sous Linux</a>\n(vidéo)\nAdrian Crenshaw. \nJanvier 2011"
 
 #: i2p2www/pages/site/about/media.html:202
 #, python-format
@@ -692,10 +650,7 @@ msgid ""
 "<a href=\"%(link)s\">Short garlic routing animation</a>\n"
 "(Youtube Video)\n"
 "Adrian Crenshaw.\n"
-msgstr ""
-"<a href=\"%(link)s\">Courte animation du garlic routing</a>\n"
-"(vidéo Youtube)\n"
-"Adrian Crenshaw.\n"
+msgstr "<a href=\"%(link)s\">Courte animation du garlic routing</a>\n(vidéo Youtube)\nAdrian Crenshaw.\n"
 
 #: i2p2www/pages/site/about/media.html:210
 msgid "Articles and Interviews"
@@ -708,11 +663,7 @@ msgid ""
 "<a href=\"%(link1)s\">Part 1</a>\n"
 "<a href=\"%(link2)s\">Part 2</a>\n"
 "July 26, 2002."
-msgstr ""
-"Lance James (0x90) interviewé par DistributedCity\n"
-"<a href=\"%(link1)s\">Partie 1</a>\n"
-"<a href=\"%(link2)s\">Partie 2</a>\n"
-"26 juillet 2002."
+msgstr "Lance James (0x90) interviewé par DistributedCity\n<a href=\"%(link1)s\">Partie 1</a>\n<a href=\"%(link2)s\">Partie 2</a>\n26 juillet 2002."
 
 #: i2p2www/pages/site/about/media.html:221
 #, python-format
@@ -721,35 +672,22 @@ msgid ""
 "(original in Spanish)\n"
 "<a href=\"%(link)s\">English translation</a>\n"
 "October 31, 2002."
-msgstr ""
-"Lance James (0x90) interviewé par El País\n"
-"(original en Espagnol)\n"
-"<a href=\"%(link)s\">Traduction en Anglais</a>\n"
-"31 octobre 2002."
+msgstr "Lance James (0x90) interviewé par El País\n(original en Espagnol)\n<a href=\"%(link)s\">Traduction en Anglais</a>\n31 octobre 2002."
 
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
-msgstr ""
-"<a href=\"%(link)s\">2003 article de Business Week référençant "
-"Invisiblenet</a>\n"
-"14 septembre 2003."
+msgstr "<a href=\"%(link)s\">2003 article de Business Week référençant Invisiblenet</a>\n14 septembre 2003."
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
-msgstr ""
-"<a href=\"%(link)s\">Article de Netzwelt.de traitant de l’anonymat sur "
-"Internet</a>\n"
-"(Allemand)\n"
-"Novembre 2007."
+msgstr "<a href=\"%(link)s\">Article de Netzwelt.de traitant de l’anonymat sur Internet</a>\n(Allemand)\nNovembre 2007."
 
 #: i2p2www/pages/site/about/media.html:239
 #, python-format
@@ -757,26 +695,15 @@ msgid ""
 "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n"
 "March 2009\n"
 "<a href=\"%(german)s\">German translation</a>"
-msgstr ""
-"<a href=\"%(link)s\">zzz interviewé par gulli.com</a>\n"
-"Mars 2009\n"
-"<a href=\"%(german)s\">Traduction allemande</a>"
+msgstr "<a href=\"%(link)s\">zzz interviewé par gulli.com</a>\nMars 2009\n<a href=\"%(german)s\">Traduction allemande</a>"
 
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz lors de l’entrevue du balado « InfoSec Daily "
-"Podcast Ep. 454 » (mp3)</a>, le 18 août 2011 (lien mort, propagé dans I2P"
-" au <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">traqueur"
-" de Postman</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz lors de l’entrevue du balado « InfoSec Daily Podcast Ep. 454 » (mp3)</a>, le 18 août 2011 (lien mort, propagé dans I2P au <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">traqueur de Postman</a>)"
 
 #: i2p2www/pages/site/about/media.html:252
 #, python-format
@@ -784,83 +711,52 @@ msgid ""
 "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n"
 "Jonathan Cox,\n"
 "November 11, 2011."
-msgstr ""
-"<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n"
-"Jonathan Cox,\n"
-"11 novembre 2011."
+msgstr "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\nJonathan Cox,\n11 novembre 2011."
 
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz et Lance James lors de l’entrevue du balado "
-"« InfoSec Daily Podcast Ep. 596 » (mp3)</a>, le 16 février 2012 (lien "
-"mort, propagé dans I2P au <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">traqueur"
-" de Postman</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz et Lance James lors de l’entrevue du balado « InfoSec Daily Podcast Ep. 596 » (mp3)</a>, le 16 février 2012 (lien mort, propagé dans I2P au <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">traqueur de Postman</a>)"
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff et Str4d interviewés lors du Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
-"Partie 1, 28 février 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff et Str4d interviewés lors du Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\nPartie 1, 28 février 2015"
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff et Str4d interviewés lors du Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
-"Partie 2, 6 mars 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff et Str4d interviewés lors du Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\nPartie 2, 6 mars 2015"
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
-msgstr ""
-"<a href=\"%(link)s\">Fireside avec Lei — Épisode 18 : Lance James. "
-"Succès, échec, deuil et boudhism.</a> <a "
-"href=\"%(archive)s\">(archive.org)</a> <a href=\"%(mp3)s\">(mp3)</a> "
-"Robert Lei, 31 décembre 2018"
+msgstr "<a href=\"%(link)s\">Fireside avec Lei — Épisode 18 : Lance James. Succès, échec, deuil et boudhism.</a> <a href=\"%(archive)s\">(archive.org)</a> <a href=\"%(mp3)s\">(mp3)</a> Robert Lei, 31 décembre 2018"
 
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
-msgstr ""
-"<a href=\"%(mhatta)s\">Articles par le contributeur d’I2p Masayuki Hatta "
-"sur medium.com</a> 2019\n"
+msgstr "<a href=\"%(mhatta)s\">Articles par le contributeur d’I2p Masayuki Hatta sur medium.com</a> 2019\n"
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
-msgstr ""
-"<a href=\"%(ctrl)s\">Activer à la fois le routage .onion et .i2p grâce à "
-"la configuration automatique du mandataire</a>\n"
-"Daniel Aleksandersen, 7 février 2019"
+msgstr "<a href=\"%(ctrl)s\">Activer à la fois le routage .onion et .i2p grâce à la configuration automatique du mandataire</a>\nDaniel Aleksandersen, 7 février 2019"
 
 #: i2p2www/pages/site/about/media.html:295
 msgid "Other"
@@ -870,21 +766,61 @@ msgstr "Autres"
 msgid ""
 "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n"
 "February 14, 2014"
-msgstr ""
-"I2P mentionné dans \"House of Cards\" de Netflix, saison 2 épisode 2,\n"
-"14 février 2014"
+msgstr "I2P mentionné dans \"House of Cards\" de Netflix, saison 2 épisode 2,\n14 février 2014"
 
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
+msgstr "<a href=\"%(meeh)s\">Une liste organisée par le contributeur d’I2p meeh des mises en œuvre, bibliothèques, ressources, projets et autres choses rutilantes d’I2P</a>\n2019"
+
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
 msgstr ""
-"<a href=\"%(meeh)s\">Une liste organisée par le contributeur d’I2p meeh "
-"des mises en œuvre, bibliothèques, ressources, projets et autres choses "
-"rutilantes d’I2P</a>\n"
-"2019"
 
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
@@ -894,18 +830,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -916,84 +849,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -1004,8 +914,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -1013,27 +922,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -1041,26 +946,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -1071,10 +967,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -1082,18 +976,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -1104,19 +995,11 @@ msgstr "Membres du projet I2P"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
-msgstr ""
-"Nous sommes un petit groupe disséminé sur tous les continents qui "
-"travaille\n"
-"à l’amélioration des différents aspects du projet et qui étudie et débat "
-"sur la\n"
-"conception du réseau.\n"
-"<a href=\"%(volunteer)s\">Impliquez-vous !</a>"
+msgstr "Nous sommes un petit groupe disséminé sur tous les continents qui travaille\nà l’amélioration des différents aspects du projet et qui étudie et débat sur la\nconception du réseau.\n<a href=\"%(volunteer)s\">Impliquez-vous !</a>"
 
 #: i2p2www/pages/site/about/team.html:14
 msgid "Admin"
@@ -1285,7 +1168,8 @@ msgid "Product Development"
 msgstr "Développement de produits"
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1367,9 +1251,7 @@ msgstr "Greffon I2P-Bote"
 #: i2p2www/pages/site/about/team.html:182
 #, python-format
 msgid "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a> lead"
-msgstr ""
-"Responsable de <a "
-"href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>"
+msgstr "Responsable de <a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>"
 
 #: i2p2www/pages/site/about/team.html:184
 msgid "Maintains the integrated Bittorrent client"
@@ -1446,9 +1328,7 @@ msgstr "Intégrateur Debian/Ubuntu et mainteneur du PPA "
 
 #: i2p2www/pages/site/about/team.html:232
 msgid "Routerconsole backend and UI work, website revamp, unit tests work"
-msgstr ""
-"Arrière-plan et travail sur l’UI de la console routeur, réorganisation du"
-" site Web, travail sur les tests d’unité"
+msgstr "Arrière-plan et travail sur l’UI de la console routeur, réorganisation du site Web, travail sur les tests d’unité"
 
 #: i2p2www/pages/site/about/team.html:237
 msgid "Help needed on many fronts!"
@@ -1529,10 +1409,9 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "Développement jbigi, migration du wiki, nettoyage de la doc"
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
-msgstr ""
-"Débogage java debugging et développement de client sur I2PTunnel et la "
-"console du routeur"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
+msgstr "Débogage java debugging et développement de client sur I2PTunnel et la console du routeur"
 
 #: i2p2www/pages/site/about/team.html:323
 msgid "SAM perl module"
@@ -1581,52 +1460,27 @@ msgstr "&hellip; et de nombreux autres"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
-msgstr ""
-"I2PCon 2015 était le premier événement de cet type. Il avait deux "
-"objectifs à court terme.\n"
-"D’abord, de fournir au grand public un événement où il pourrait obtenir "
-"de la connaissance au sujet de la vie privée.\n"
-"Deuxièmement, à prolonger le projet I2P et sa communauté avec des "
-"discussions techniques au sujet de la cryptographie, l’anonymat et les "
-"sujets centrés sur I2P."
+msgstr "I2PCon 2015 était le premier événement de cet type. Il avait deux objectifs à court terme.\nD’abord, de fournir au grand public un événement où il pourrait obtenir de la connaissance au sujet de la vie privée.\nDeuxièmement, à prolonger le projet I2P et sa communauté avec des discussions techniques au sujet de la cryptographie, l’anonymat et les sujets centrés sur I2P."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
-msgstr ""
-"Un objectif plus grand et à plus à long terme de cet événement était de "
-"construire une communauté d’individus conscients de la vie privée. En "
-"connectant des gens qui reconnaissent  l’importance de la vie privée, "
-"nous avons voulu fournir un forum où cette communauté peut croître."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
+msgstr "Un objectif plus grand et à plus à long terme de cet événement était de construire une communauté d’individus conscients de la vie privée. En connectant des gens qui reconnaissent  l’importance de la vie privée, nous avons voulu fournir un forum où cette communauté peut croître."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
-msgstr ""
-"L’idée de cet événement a été d’abord engendré par nos merveilleux amis "
-"du\n"
-"<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"Le lieu a été fourni par <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
-"Le marketing a été mené par <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> et Siew.\n"
-"Sans eux cet événement n’aurait pas été possible."
+msgstr "L’idée de cet événement a été d’abord engendré par nos merveilleux amis du\n<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nLe lieu a été fourni par <a href=\"https://hacklab.to/\">Hacklab.to</a>.\nLe marketing a été mené par <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> et Siew.\nSans eux cet événement n’aurait pas été possible."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:32
 msgid "Slides and Video"
@@ -1642,8 +1496,8 @@ msgstr "Note : des liens de vidéos seront affichés dès qu’ils seront dispo
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1668,9 +1522,7 @@ msgstr "Diaporamas par str4d et zzz :"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:71
 msgid "Slides by others: Contact the author for license information."
-msgstr ""
-"Diaporamas réalisées par d’autres : contactez l’auteur pour les "
-"informations de licence."
+msgstr "Diaporamas réalisées par d’autres : contactez l’auteur pour les informations de licence."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:77
 msgid "Speakers"
@@ -1680,23 +1532,13 @@ msgstr "Orateurs"
 msgid ""
 "Colin Mahns has a strong interest in the use of anonymity and encryption "
 "technology to help preserve human rights in the digital age."
-msgstr ""
-"Colin Mahns a un grand intérêt dans l’utilisation de l’anonymat et de la "
-"technologie de chiffrement pour aider à préserver les droits humains à "
-"l’âge numérique."
+msgstr "Colin Mahns a un grand intérêt dans l’utilisation de l’anonymat et de la technologie de chiffrement pour aider à préserver les droits humains à l’âge numérique."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
-msgstr ""
-"David Dagon est un chercheur postdoctoral à l’université « Georgia "
-"Tech ». Il concentre ses recherches sur les réseaux de zombies, les "
-"programmes malveillants, la sécurité des réseaux et le DNS.\n"
-"Son intérêt pour I2P est axé sur la protection de la vie privée des "
-"utilisateurs, le filtrage autonome et la lutte contre les abus."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
+msgstr "David Dagon est un chercheur postdoctoral à l’université « Georgia Tech ». Il concentre ses recherches sur les réseaux de zombies, les programmes malveillants, la sécurité des réseaux et le DNS.\nSon intérêt pour I2P est axé sur la protection de la vie privée des utilisateurs, le filtrage autonome et la lutte contre les abus."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
 #: i2p2www/pages/site/about/i2pcon/2015.html:105
@@ -1709,25 +1551,12 @@ msgstr "J est le responsable de Toronto Crypto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
-msgstr ""
-"Lance James est le fondateur du projet IRC Invisible, le prédécesseur "
-"d’I2P, lancé en 2002.\n"
-"Il a fondé sa propre entreprise d’intelligence en cyber menace en 2003. \n"
-"Depuis, il a été concentré sur la sécurité de réseau, la recherche "
-"concernant le logiciel malveillant et la sécurité de l’information.\n"
-"Durant 2011-2013, il était le directeur d’intelligence de menace pour The"
-" Vigilant, qui a été acquis par Deloitte en 2013.\n"
-"Il a récemment quitté Deloitte pour effectuer du conseil via son "
-"entreprise James Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
+msgstr "Lance James est le fondateur du projet IRC Invisible, le prédécesseur d’I2P, lancé en 2002.\nIl a fondé sa propre entreprise d’intelligence en cyber menace en 2003. \nDepuis, il a été concentré sur la sécurité de réseau, la recherche concernant le logiciel malveillant et la sécurité de l’information.\nDurant 2011-2013, il était le directeur d’intelligence de menace pour The Vigilant, qui a été acquis par Deloitte en 2013.\nIl a récemment quitté Deloitte pour effectuer du conseil via son entreprise James Group."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
 msgid "Nicholas D. is a member of Hacklab Toronto."
@@ -1735,20 +1564,11 @@ msgstr "Nicholas D. est un membre du Hacklab Toronto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
-msgstr ""
-"Nicholas Johnston est un professeur de sécurité de l’information au "
-"\"Sheridan College’s School of Applied Computing\" dans le programme de "
-"licence d’InfoSec. Sa carrière professionnelle précédente était dans la "
-"science légale numérique et les enquêtes. Il est aussi un entrepreneur se"
-" spécialisant dans la réponse à l’incident. Ses zones de recherche "
-"incluent le développement logiciel sécurisé et l’analytique de données."
+msgstr "Nicholas Johnston est un professeur de sécurité de l’information au \"Sheridan College’s School of Applied Computing\" dans le programme de licence d’InfoSec. Sa carrière professionnelle précédente était dans la science légale numérique et les enquêtes. Il est aussi un entrepreneur se spécialisant dans la réponse à l’incident. Ses zones de recherche incluent le développement logiciel sécurisé et l’analytique de données."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:124
 msgid "Psi is an I2P developer."
@@ -1800,14 +1620,9 @@ msgstr "Jour 2"
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
-msgstr ""
-"La première conférence dédiée à I2P à eu lieu à Toronto du 15 au 16 août "
-"2015.\n"
-"Voir les liens ci-dessous pour plus de précisions et les liens vers les "
-"diaporamas et les vidéos."
+msgstr "La première conférence dédiée à I2P à eu lieu à Toronto du 15 au 16 août 2015.\nVoir les liens ci-dessous pour plus de précisions et les liens vers les diaporamas et les vidéos."
 
 #: i2p2www/pages/site/about/i2pcon/index.html:9
 msgid "Past years"
@@ -1823,24 +1638,13 @@ msgstr "Août 2010"
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
-msgstr ""
-"Il existe quelques techniques principales qui peuvent être appliquées "
-"pour améliorer les performances perçues d’I2P. Certaines des suivantes "
-"sont liées à l’UCT, d’autres à la bande passante et d’autres encore au "
-"protocole. Cependant, toutes ces dimensions affectent la latence, le "
-"débit, et les performances perçues du réseau, car elles réduisent les "
-"conflits pour des ressources rares. Cette liste n’est bien sûr pas "
-"complète, mais elle couvre les techniques principales observées."
+msgstr "Il existe quelques techniques principales qui peuvent être appliquées pour améliorer les performances perçues d’I2P. Certaines des suivantes sont liées à l’UCT, d’autres à la bande passante et d’autres encore au protocole. Cependant, toutes ces dimensions affectent la latence, le débit, et les performances perçues du réseau, car elles réduisent les conflits pour des ressources rares. Cette liste n’est bien sûr pas complète, mais elle couvre les techniques principales observées."
 
 #: i2p2www/pages/site/about/performance/future.html:15
 #: i2p2www/pages/site/about/performance/index.html:106
@@ -1848,10 +1652,7 @@ msgstr ""
 msgid ""
 "For past performance improvements see the <a href=\"%(history)s\">\n"
 "Performance History</a>."
-msgstr ""
-"Pour les améliorations de performance passées voir <a "
-"href=\"%(history)s\">\n"
-"l’historique de performance</a>."
+msgstr "Pour les améliorations de performance passées voir <a href=\"%(history)s\">\nl’historique de performance</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:20
 msgid "Better peer profiling and selection"
@@ -1860,27 +1661,13 @@ msgstr "Meilleure sélection et profilage du pair"
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
-msgstr ""
-"Une des parties probablement les plus importantes pour obtenir la "
-"performance plus rapide sera\n"
-"d’améliorer comment les routeurs choisissent les pairs( au travers "
-"desquels ils construisent leurs tunnels -\n"
-"en s’assurant qu’ils n’utilisent pas de pairs avec des liens lents ou "
-"avec des liens rapides qui\n"
-"seraient surchargés, etc. De plus, nous devons nous assurer que nous ne "
-"nous exposons pas\n"
-"nous-mêmes à une attaque <a href=\"%(sybilpdf)s\">Sybil</a>\n"
-"lancée depuis un adversaire puissant avec beaucoup de machines rapides."
+msgstr "Une des parties probablement les plus importantes pour obtenir la performance plus rapide sera\nd’améliorer comment les routeurs choisissent les pairs( au travers desquels ils construisent leurs tunnels -\nen s’assurant qu’ils n’utilisent pas de pairs avec des liens lents ou avec des liens rapides qui\nseraient surchargés, etc. De plus, nous devons nous assurer que nous ne nous exposons pas\nnous-mêmes à une attaque <a href=\"%(sybilpdf)s\">Sybil</a>\nlancée depuis un adversaire puissant avec beaucoup de machines rapides."
 
 #: i2p2www/pages/site/about/performance/future.html:30
 msgid "Network database tuning"
@@ -1888,38 +1675,15 @@ msgstr "Mise au point de la base de données de réseau"
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
-msgstr ""
-"Nous allons vouloir être plus efficaces en guérissant la base de données "
-"de réseau\n"
-"et les algorithmes de maintenance - plutôt que constamment explorer le "
-"keyspace pour de nouveaux\n"
-"pairs - cause d’un nombre important de messages de réseau et de charge de"
-" routeur - nous\n"
-"pouvons ralentir ou peut même arrêter d’explorer jusqu’à ce que nous "
-"détections qu’il y a\n"
-"quelque chose de nouveau méritant d’être trouvé (ex: dégrader le taux "
-"d’exploration en se basant sur la dernière fois que quelqu’un nous a "
-"donné une référence de quelqu’un dont nous n’avions jamais entendu "
-"parler). Nous pouvons aussi faire certains\n"
-"réglages sur ce que nous envoyons actuellement - sur combien de pairs "
-"nous rebondissons (ou même si nous\n"
-"rebondissons en retour une réponse), aussi bien que combien de recherches"
-" simultanées nous accomplissons."
+msgstr "Nous allons vouloir être plus efficaces en guérissant la base de données de réseau\net les algorithmes de maintenance - plutôt que constamment explorer le keyspace pour de nouveaux\npairs - cause d’un nombre important de messages de réseau et de charge de routeur - nous\npouvons ralentir ou peut même arrêter d’explorer jusqu’à ce que nous détections qu’il y a\nquelque chose de nouveau méritant d’être trouvé (ex: dégrader le taux d’exploration en se basant sur la dernière fois que quelqu’un nous a donné une référence de quelqu’un dont nous n’avions jamais entendu parler). Nous pouvons aussi faire certains\nréglages sur ce que nous envoyons actuellement - sur combien de pairs nous rebondissons (ou même si nous\nrebondissons en retour une réponse), aussi bien que combien de recherches simultanées nous accomplissons."
 
 #: i2p2www/pages/site/about/performance/future.html:42
 msgid "Session Tag Tuning and Improvements"
@@ -1928,53 +1692,24 @@ msgstr "Mise au point et améliorations des étiquettes de session"
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
-msgstr ""
-"La façon dont l’algorithme <a "
-"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a>\n"
-"fonctione est en gérant un ensemble de tableaux de 32 octets à usage "
-"unique, et en\n"
-"les faisant expirer s’ils ne sont pas utilisés assez rapidement. Si nous "
-"les faisons expirer trop tôt, nous\n"
-"sommes obligés de nous replier en ayant recours à un (coûteux) plein "
-"chiffrement ElGamal, mais si nous ne\n"
-"les faisons pas expirer assez rapidement, nous devons réduire leur "
-"quantité pour que nous ne soyons pas \n"
-"à court de mémoire (et si le destinataire est d’une façon ou d’une autre "
-"corrompu et perd certaines étiquettes, encore plus d’échecs de "
-"chiffrement peuvent se produire avant la détection). Avec une certaine "
-"détection plus active et\n"
-"des algorithmes de retour d’information, nous pouvons sans risque et plus"
-" efficacement ajuster la durée de vie des étiquettes, remplaçant le "
-"chiffrement ElGamal avec une insignifiante opération AES."
+msgstr "La façon dont l’algorithme <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a>\nfonctione est en gérant un ensemble de tableaux de 32 octets à usage unique, et en\nles faisant expirer s’ils ne sont pas utilisés assez rapidement. Si nous les faisons expirer trop tôt, nous\nsommes obligés de nous replier en ayant recours à un (coûteux) plein chiffrement ElGamal, mais si nous ne\nles faisons pas expirer assez rapidement, nous devons réduire leur quantité pour que nous ne soyons pas \nà court de mémoire (et si le destinataire est d’une façon ou d’une autre corrompu et perd certaines étiquettes, encore plus d’échecs de chiffrement peuvent se produire avant la détection). Avec une certaine détection plus active et\ndes algorithmes de retour d’information, nous pouvons sans risque et plus efficacement ajuster la durée de vie des étiquettes, remplaçant le chiffrement ElGamal avec une insignifiante opération AES."
 
 #: i2p2www/pages/site/about/performance/future.html:55
 #, python-format
 msgid ""
 "Additional ideas for improving Session Tag delivery are described on the\n"
 "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>."
-msgstr ""
-"Des idées supplémentaires pour améliorer la livraison d’étiquettes de "
-"session sont décrites sur la\n"
-"<a href=\"%(elgamalaes)s#future\">page ElGamal/AES+SessionTag</a>."
+msgstr "Des idées supplémentaires pour améliorer la livraison d’étiquettes de session sont décrites sur la\n<a href=\"%(elgamalaes)s#future\">page ElGamal/AES+SessionTag</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:61
 msgid "Migrate sessionTag to synchronized PRNG"
@@ -1985,75 +1720,29 @@ msgstr "Migrer l’étiquette de session vers un PRNG synchronisé"
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
-msgstr ""
-"Dès maintenant, notre algorithme <a "
-"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
-"fonctionne en étiquetant chaque message chiffré avec un nonce unique "
-"aléatoire \n"
-"de 32 octets (une \"étiquette de session\"), identifiant ce message comme"
-" étant chiffré \n"
-"avec la clé de la session AES associée. Ceci empêche des pairs de "
-"distinguer\n"
-"les messages faisant partie de la même session, sachant que chaque "
-"message a une nouvelle étiquette complètement aléatoire. Pour accomplir "
-"ceci, tous les quelques messages empaquette un tout\n"
-"nouvel ensemble d’étiquettes de session dans le message chiffré lui-même,"
-" livrant d’une manière transparente\n"
-"une façon d’identifier des messages futurs. Nous devons alors garder la "
-"trace\n"
-"de quels messages sont livrés avec succès afin que nous sachions quelles "
-"étiquettes\n"
-"nous pouvons utiliser."
+msgstr "Dès maintenant, notre algorithme <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \nfonctionne en étiquetant chaque message chiffré avec un nonce unique aléatoire \nde 32 octets (une \"étiquette de session\"), identifiant ce message comme étant chiffré \navec la clé de la session AES associée. Ceci empêche des pairs de distinguer\nles messages faisant partie de la même session, sachant que chaque message a une nouvelle étiquette complètement aléatoire. Pour accomplir ceci, tous les quelques messages empaquette un tout\nnouvel ensemble d’étiquettes de session dans le message chiffré lui-même, livrant d’une manière transparente\nune façon d’identifier des messages futurs. Nous devons alors garder la trace\nde quels messages sont livrés avec succès afin que nous sachions quelles étiquettes\nnous pouvons utiliser."
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
 "to handle out of order delivery)."
-msgstr ""
-"Ceci marche bien et c’est assez robuste, cependant c’est inefficace en "
-"termes\n"
-"d’utilisation de bande passante, comme cela exige la livraison de ces "
-"étiquettes en avance de\n"
-"temps (et toutes les étiquettes peuvent ne pas être nécessaires, ou "
-"certaines peuvent être gaspillés, en raison de\n"
-"leur expiration). En moyenne cependant, pré délivrer l’étiquette de "
-"session coûte\n"
-"32 octets par message (la taille d’une étiquette). Comme Taral l’a "
-"suggéré, cette\n"
-"taille peut être évitée en remplaçant la livraison des étiquettes par un "
-"PRNG synchronisé\n"
-" - quand une nouvelle session est établie (via un block ElGamal chiffré),"
-"\n"
-"les deux côtés essaiment un PRNG pour utilisation et produisent les "
-"étiquettes de session sur\n"
-"demande (avec le destinataire pré calculant à l’avance les quelques peu "
-"de valeurs suivantes possibles\n"
-"afin de traiter la panne de livraison)."
+msgstr "Ceci marche bien et c’est assez robuste, cependant c’est inefficace en termes\nd’utilisation de bande passante, comme cela exige la livraison de ces étiquettes en avance de\ntemps (et toutes les étiquettes peuvent ne pas être nécessaires, ou certaines peuvent être gaspillés, en raison de\nleur expiration). En moyenne cependant, pré délivrer l’étiquette de session coûte\n32 octets par message (la taille d’une étiquette). Comme Taral l’a suggéré, cette\ntaille peut être évitée en remplaçant la livraison des étiquettes par un PRNG synchronisé\n - quand une nouvelle session est établie (via un block ElGamal chiffré),\nles deux côtés essaiment un PRNG pour utilisation et produisent les étiquettes de session sur\ndemande (avec le destinataire pré calculant à l’avance les quelques peu de valeurs suivantes possibles\nafin de traiter la panne de livraison)."
 
 #: i2p2www/pages/site/about/performance/future.html:87
 msgid "Longer lasting tunnels"
@@ -2061,53 +1750,26 @@ msgstr "Tunnels de longue durée"
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
-msgstr ""
-"La durée actuelle de tunnel est par défaut de 10 minutes, c’est assez "
-"arbitraire, quoique\n"
-"cela \"va bien\". Une fois que nous aurons le code de guérison de tunnel "
-"et un code de détection d’échec plus efficace, nous pourrons sans risque "
-"varier ces durées, réduisant les\n"
-"charges réseau et UC (dues aux coûteux messages de création de tunnel)."
+msgstr "La durée actuelle de tunnel est par défaut de 10 minutes, c’est assez arbitraire, quoique\ncela \"va bien\". Une fois que nous aurons le code de guérison de tunnel et un code de détection d’échec plus efficace, nous pourrons sans risque varier ces durées, réduisant les\ncharges réseau et UC (dues aux coûteux messages de création de tunnel)."
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
-msgstr ""
-"Ceci semble être une réparation facile pour une haute charge sur des "
-"routeurs à grande bande passante, mais\n"
-"nous ne devrions pas y recourir jusqu’à ce que nous ayons ajusté le "
-"tunnel construisant des algorithmes plus loin. \n"
-"Cependant, la durée de vie de tunnel de 10  minutes est codée en dur dans"
-" un bon nombre d’endroits,\n"
-"donc un effort substantiel serait exigé pour changer la durée.\n"
-"Aussi, il serait difficile de maintenir la compatibilité descendante avec"
-" un tel changement."
+"Also, it would be difficult to maintain backward compatibility with such a change."
+msgstr "Ceci semble être une réparation facile pour une haute charge sur des routeurs à grande bande passante, mais\nnous ne devrions pas y recourir jusqu’à ce que nous ayons ajusté le tunnel construisant des algorithmes plus loin. \nCependant, la durée de vie de tunnel de 10  minutes est codée en dur dans un bon nombre d’endroits,\ndonc un effort substantiel serait exigé pour changer la durée.\nAussi, il serait difficile de maintenir la compatibilité descendante avec un tel changement."
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
-msgstr ""
-"Actuellement, puisque dans le réseau le taux de réussite de construction "
-"de tunnel est en moyenne assez élevé,\n"
-"il n’y a actuellement aucun plan visant à étendre la durée de vie de "
-"tunnel."
+msgstr "Actuellement, puisque dans le réseau le taux de réussite de construction de tunnel est en moyenne assez élevé,\nil n’y a actuellement aucun plan visant à étendre la durée de vie de tunnel."
 
 #: i2p2www/pages/site/about/performance/future.html:108
 msgid "Adjust the timeouts"
@@ -2115,46 +1777,22 @@ msgstr "Ajuster les temps d’échéance"
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
-msgstr ""
-"Les temporisations actuelles pour diverses activités sont une autre des "
-"choses assez arbitraires, mais qui « semblent correcte » que nous avons. "
-"Pourquoi avons-nous une temporisation « pair inaccessible » de 60 "
-"secondes ? Pourquoi essayons-nous après 10 secondes d’envoyer au travers "
-"d’un tunnel différent que celui annoncé par le jeu de baux ? Pourquoi les"
-" requêtes à la base de données de réseau sont-elles restreintes par des "
-"limites de 60 ou 20 secondes ? Pourquoi les destinations sont-elles "
-"configurées pour demander un nouveau jeu de tunnels toutes les 10 "
-"minutes ? Pourquoi permettons-nous 60 secondes à un pair pour répondre à "
-"notre demande de se joindre à un tunnel ? Pourquoi considérons-nous comme"
-" « mort » un tunnel qui ne réussi pas notre test dans les 60 secondes ?"
+msgstr "Les temporisations actuelles pour diverses activités sont une autre des choses assez arbitraires, mais qui « semblent correcte » que nous avons. Pourquoi avons-nous une temporisation « pair inaccessible » de 60 secondes ? Pourquoi essayons-nous après 10 secondes d’envoyer au travers d’un tunnel différent que celui annoncé par le jeu de baux ? Pourquoi les requêtes à la base de données de réseau sont-elles restreintes par des limites de 60 ou 20 secondes ? Pourquoi les destinations sont-elles configurées pour demander un nouveau jeu de tunnels toutes les 10 minutes ? Pourquoi permettons-nous 60 secondes à un pair pour répondre à notre demande de se joindre à un tunnel ? Pourquoi considérons-nous comme « mort » un tunnel qui ne réussi pas notre test dans les 60 secondes ?"
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
-msgstr ""
-"Chacun de ces impondérables peut être abordé avec du code plus adaptatif,"
-" et aussi\n"
-"avec des paramètres ajustables pour tenir compte de différences plus "
-"appropriées entre\n"
-"bande passante, latence et utilisation de CPU."
+msgstr "Chacun de ces impondérables peut être abordé avec du code plus adaptatif, et aussi\navec des paramètres ajustables pour tenir compte de différences plus appropriées entre\nbande passante, latence et utilisation de CPU."
 
 #: i2p2www/pages/site/about/performance/future.html:125
 msgid "Full streaming protocol improvements"
@@ -2164,52 +1802,33 @@ msgstr "Améliorations du protocole full streaming"
 msgid ""
 "Perhaps re-enable the interactive stream profile (the \n"
 "current implementation only uses the bulk stream profile)."
-msgstr ""
-"Peut-être re-permettre le profil stream interactif (la\n"
-"mise en Å“uvre actuelle utilise seulement le profil stream en vrac (bulk)."
+msgstr "Peut-être re-permettre le profil stream interactif (la\nmise en œuvre actuelle utilise seulement le profil stream en vrac (bulk)."
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
-msgstr ""
-"Limitation de bande passante au niveau du client (ou dans les deux "
-"directions sur un flux stream,\n"
-"ou probablement partagée à travers de multiples flux stream). Ceci serait"
-" bien sûr en supplément à\n"
-"la limitation de bande passante globale du routeur."
+msgstr "Limitation de bande passante au niveau du client (ou dans les deux directions sur un flux stream,\nou probablement partagée à travers de multiples flux stream). Ceci serait bien sûr en supplément à\nla limitation de bande passante globale du routeur."
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
-msgstr ""
-"Listes de contrôle d’accès (permettant seulement des flux vers ou depuis "
-"certaines autres\n"
-"destinations connues)."
+msgstr "Listes de contrôle d’accès (permettant seulement des flux vers ou depuis certaines autres\ndestinations connues)."
 
 #: i2p2www/pages/site/about/performance/future.html:147
 msgid ""
 "Web controls and monitoring the health of the various streams, as well \n"
 "as the ability to explicitly close or throttle them."
-msgstr ""
-"Contrôles Web et suivi de la santé des divers flux, ainsi que la capacité"
-" de les fermer ou de les ralentir explicitement."
+msgstr "Contrôles Web et suivi de la santé des divers flux, ainsi que la capacité de les fermer ou de les ralentir explicitement."
 
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
-msgstr ""
-"Des idées supplémentaires pour améliorer la bibliothèque de streaming "
-"sont décrites sur la\n"
-"<a href=\"%(streaming)s#future\">page de bibliothèque streaming</a>."
+msgstr "Des idées supplémentaires pour améliorer la bibliothèque de streaming sont décrites sur la\n<a href=\"%(streaming)s#future\">page de bibliothèque streaming</a>."
 
 #: i2p2www/pages/site/about/performance/history.html:2
 msgid "Performance History"
@@ -2218,17 +1837,10 @@ msgstr "Historique des performances"
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
-msgstr ""
-"Des améliorations notables de performance ont été faites en utilisant les"
-" techniques ci-dessous.\n"
-"Il y a plus à faire, voir la page <a "
-"href=\"%(performance)s\">performance</a>\n"
-"pour les problèmes actuels et les idées."
+msgstr "Des améliorations notables de performance ont été faites en utilisant les techniques ci-dessous.\nIl y a plus à faire, voir la page <a href=\"%(performance)s\">performance</a>\npour les problèmes actuels et les idées."
 
 #: i2p2www/pages/site/about/performance/history.html:10
 msgid "Native math"
@@ -2245,55 +1857,25 @@ msgstr "implémenté"
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
-msgstr ""
-"Quand j’ai dernièrement établi le profil du code d’I2P, la grande "
-"majorité du temps a été passée dans\n"
-"une fonction : java.math.BigInteger’s\n"
-"<a href=\"%(modpow)s\">modPow</a>.\n"
-"Plutôt que d’essayer d’accorder cette méthode, nous ferons appel à\n"
-"<a href=\"%(gmp)s\">GNU MP</a> – une bibliothèque mathématique follement "
-"rapide\n"
-"(avec assembleur accordé pour beaucoup d’architectures). (<i>éditeur : "
-"voir\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger pour cryptographie clé publique "
-"plus rapide</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
+msgstr "Quand j’ai dernièrement établi le profil du code d’I2P, la grande majorité du temps a été passée dans\nune fonction : java.math.BigInteger’s\n<a href=\"%(modpow)s\">modPow</a>.\nPlutôt que d’essayer d’accorder cette méthode, nous ferons appel à\n<a href=\"%(gmp)s\">GNU MP</a> – une bibliothèque mathématique follement rapide\n(avec assembleur accordé pour beaucoup d’architectures). (<i>éditeur : voir\n<a href=\"%(jbigi)s\">NativeBigInteger pour cryptographie clé publique plus rapide</a></i>)"
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
-msgstr ""
-"\n"
-"ugha et duck travaillent sur le code glue de C/JNI, et le code Java "
-"existant\n"
-"est déjà déployé avec des crochets pour cela quand ce sera prêt. Les "
-"résultats préliminaires\n"
-"semblent fantastiques - faire tourner le routeur avec le modPow GMP natal"
-" fournit\n"
-"une accélération de 800* *37; de la performance en chiffrement, et la "
-"charge a été réduite à moitié. Ceci\n"
-"était juste sur la machine d’un utilisateur et les choses sont très loin "
-"d’être prêtes pour le paquetage\n"
-"ni le déploiement, pour le moment."
+msgstr "\nugha et duck travaillent sur le code glue de C/JNI, et le code Java existant\nest déjà déployé avec des crochets pour cela quand ce sera prêt. Les résultats préliminaires\nsemblent fantastiques - faire tourner le routeur avec le modPow GMP natal fournit\nune accélération de 800* *37; de la performance en chiffrement, et la charge a été réduite à moitié. Ceci\nétait juste sur la machine d’un utilisateur et les choses sont très loin d’être prêtes pour le paquetage\nni le déploiement, pour le moment."
 
 #: i2p2www/pages/site/about/performance/history.html:32
 msgid "Garlic wrapping a \"reply\" LeaseSet"
@@ -2305,87 +1887,42 @@ msgstr "implémenté mais aurait besoin d’ajustements"
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
-msgstr ""
-"Cet ajustement de l’algorithme ne sera seulement pertinent que pour les "
-"applications qui veulent que leurs pairs leur répondent (quoique cela "
-"inclue tout ce qui utilise I2PTunnel ou la bibliothèque « ministreaming »"
-" de mihi) :"
+msgstr "Cet ajustement de l’algorithme ne sera seulement pertinent que pour les applications qui veulent que leurs pairs leur répondent (quoique cela inclue tout ce qui utilise I2PTunnel ou la bibliothèque « ministreaming » de mihi) :"
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
-msgstr ""
-"Précédemment, quand Alice a envoyé un message à Bob, quand Bob a répondu "
-"qu’il avait dû consulter la base de données de réseau, émettant quelques "
-"requêtes pour obtenir le jeu de baux actuel d’Alice. S’il a déjà le jeu "
-"de baux actuel d’Alice, il peut alors juste envoyer sa réponse "
-"immédiatement - c’est (en partie) pourquoi cela prend habituellement un "
-"peu plus longtemps de parler à quelqu’un la première fois que vous vous "
-"connectez, mais les communications subséquentes sont plus rapides. "
-"Actuellement, pour tous les clients, nous enveloppons le jeu de baux "
-"actuel de l’expéditeur dans l’ail qui est livré au destinataire, afin "
-"qu’ils aient <i>toujours</i> le jeu de baux stocké localement quand ils "
-"s’apprêtent à répondre, supprimant complètement le besoin de consulter la"
-" base de données de réseau lors des réponses. \n"
-"Ceci échange une grande partie de la bande passante de l’expéditeur "
-"contre cette réponse plus rapide.\n"
-"Si nous ne le faisions pas très souvent, l’utilisation globale de la "
-"bande passante du réseau diminuerait, puisque le destinataire n’a pas à "
-"consulter de base de données de réseau."
+msgstr "Précédemment, quand Alice a envoyé un message à Bob, quand Bob a répondu qu’il avait dû consulter la base de données de réseau, émettant quelques requêtes pour obtenir le jeu de baux actuel d’Alice. S’il a déjà le jeu de baux actuel d’Alice, il peut alors juste envoyer sa réponse immédiatement - c’est (en partie) pourquoi cela prend habituellement un peu plus longtemps de parler à quelqu’un la première fois que vous vous connectez, mais les communications subséquentes sont plus rapides. Actuellement, pour tous les clients, nous enveloppons le jeu de baux actuel de l’expéditeur dans l’ail qui est livré au destinataire, afin qu’ils aient <i>toujours</i> le jeu de baux stocké localement quand ils s’apprêtent à répondre, supprimant complètement le besoin de consulter la base de données de réseau lors des réponses. \nCeci échange une grande partie de la bande passante de l’expéditeur contre cette réponse plus rapide.\nSi nous ne le faisions pas très souvent, l’utilisation globale de la bande passante du réseau diminuerait, puisque le destinataire n’a pas à consulter de base de données de réseau."
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
-msgstr ""
-"Pour les jeux de baux non publiés tels que les « clients partagés », "
-"c’est la seule façon d’envoyer le jeu de baux à Bob. Malheureusement, ce "
-"groupage, répété toutes les fois, ajoute presque 100 &#37; de surcharge à"
-" une connexion à large bande passante et beaucoup plus à une connexion "
-"avec de plus petits messages."
+msgstr "Pour les jeux de baux non publiés tels que les « clients partagés », c’est la seule façon d’envoyer le jeu de baux à Bob. Malheureusement, ce groupage, répété toutes les fois, ajoute presque 100 &#37; de surcharge à une connexion à large bande passante et beaucoup plus à une connexion avec de plus petits messages."
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
-msgstr ""
-"Les changements prévus pour la version 0.6.2 grouperont le jeu de baux "
-"seulement si requis, au début d’une connexion ou quand le jeu de baux "
-"change.\n"
-"Cela réduira considérablement la surcharge totale de la messagerie d’I2P."
+msgstr "Les changements prévus pour la version 0.6.2 grouperont le jeu de baux seulement si requis, au début d’une connexion ou quand le jeu de baux change.\nCela réduira considérablement la surcharge totale de la messagerie d’I2P."
 
 #: i2p2www/pages/site/about/performance/history.html:66
 msgid "More efficient TCP rejection"
@@ -2394,42 +1931,16 @@ msgstr "Refus TCP plus efficace"
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
-msgstr ""
-"À l’heure actuelle, toutes les connexions TCP font toute leur validation "
-"de pair après\n"
-"avoir passé la (coûteuse) poignée de mains Diffie-Hellman pour négocier "
-"une\n"
-"clé de session privée. Cela signifie que si l’horloge de quelqu’un est "
-"vraiment fausse, ou \n"
-"que leur NAT/pare-feu/etc est incorrectement configuré (ou qu’ils font "
-"juste fonctionner\n"
-"une version incompatible du routeur), ils vont systématiquement (quoique "
-"non\n"
-"constamment, grâce à la banlist) causer un chère et futile opération "
-"cryptographique\n"
-"sur tous les pairs qu’ils connaissent. Tandis que nous voudrons garder "
-"quelques \n"
-"vérifications/validations dans la frontière de chiffrement, nous voudrons"
-" mettre à jour le\n"
-"protocole pour faire un peu de cela d’abord, afin que nous puissions les "
-"rejeter proprement\n"
-"sans gaspiller beaucoup de CPU ou d’autres ressources."
+msgstr "À l’heure actuelle, toutes les connexions TCP font toute leur validation de pair après\navoir passé la (coûteuse) poignée de mains Diffie-Hellman pour négocier une\nclé de session privée. Cela signifie que si l’horloge de quelqu’un est vraiment fausse, ou \nque leur NAT/pare-feu/etc est incorrectement configuré (ou qu’ils font juste fonctionner\nune version incompatible du routeur), ils vont systématiquement (quoique non\nconstamment, grâce à la banlist) causer un chère et futile opération cryptographique\nsur tous les pairs qu’ils connaissent. Tandis que nous voudrons garder quelques \nvérifications/validations dans la frontière de chiffrement, nous voudrons mettre à jour le\nprotocole pour faire un peu de cela d’abord, afin que nous puissions les rejeter proprement\nsans gaspiller beaucoup de CPU ou d’autres ressources."
 
 #: i2p2www/pages/site/about/performance/history.html:81
 msgid "Adjust the tunnel testing"
@@ -2437,27 +1948,13 @@ msgstr "Ajuster le test de tunnel"
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
-msgstr ""
-"Plutôt que d’aller avec l’approche assez aléatoire que nous avons "
-"maintenant, nous devrions utiliser un algorithme plus conscient du "
-"contexte pour tester les tunnels. Par exemple, si nous savons déjà qu’il "
-"laisse correctement passer des données valides, il est inutile de le "
-"tester. Alors que si nous n’avons pas vu passer de données récemment, il "
-"pourrait être utile d’y envoyer des données. Cela réduira la contention "
-"du tunnel causée par un excès de messages et améliorera aussi notre "
-"vitesse de détections des tunnels en échec ainsi que notre vitesse "
-"d’intervention."
+msgstr "Plutôt que d’aller avec l’approche assez aléatoire que nous avons maintenant, nous devrions utiliser un algorithme plus conscient du contexte pour tester les tunnels. Par exemple, si nous savons déjà qu’il laisse correctement passer des données valides, il est inutile de le tester. Alors que si nous n’avons pas vu passer de données récemment, il pourrait être utile d’y envoyer des données. Cela réduira la contention du tunnel causée par un excès de messages et améliorera aussi notre vitesse de détections des tunnels en échec ainsi que notre vitesse d’intervention."
 
 #: i2p2www/pages/site/about/performance/history.html:92
 msgid "Persistent Tunnel / Lease Selection"
@@ -2465,30 +1962,17 @@ msgstr "Tunnel persistant / Sélection de bail"
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
-msgstr ""
-"La sélection de tunnels sortants est mise en œuvre dans 0.6.1.30, la "
-"sélection de baux entrants est mise en œuvre dans la version 0.6.2."
+msgstr "La sélection de tunnels sortants est mise en œuvre dans 0.6.1.30, la sélection de baux entrants est mise en œuvre dans la version 0.6.2."
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
-msgstr ""
-"Sélectionner au hasard des tunnels et des baux pour chaque message crée "
-"une grande\n"
-"incidence de défaillance de livraison, laquelle empêche la lib streaming "
-"d'\n"
-"augmenter sa taille de fenêtre autant qu’elle le pourrait. En persistant "
-"avec les\n"
-"mêmes sélections pour une connexion donné, le taux de transfert est "
-"beaucoup plus rapide."
+msgstr "Sélectionner au hasard des tunnels et des baux pour chaque message crée une grande\nincidence de défaillance de livraison, laquelle empêche la lib streaming d'\naugmenter sa taille de fenêtre autant qu’elle le pourrait. En persistant avec les\nmêmes sélections pour une connexion donné, le taux de transfert est beaucoup plus rapide."
 
 #: i2p2www/pages/site/about/performance/history.html:104
 msgid "Compress some data structures"
@@ -2496,32 +1980,15 @@ msgstr "Compresse certaines structures de données"
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
-msgstr ""
-"Les messages I2NP et les données qu’ils contiennent sont déjà définis "
-"dans une structure assez compacte, bien qu’un attribut de la structure "
-"d’infosRouteur ne l’est pas. « options » est un mappage nom = valeur "
-"ASCII en clair. Pour l’instant, nous le remplissons avec ces statistiques"
-" publiées - autour de 3300 octets par pair. Facile à mettre en œuvre, la "
-"compression GZIP le réduirait presque d’un tiers et, quand l’on tient "
-"compte du nombre de fois que des structures InfosRouteur sont échangées "
-"par le réseau, cela représente des économies significatives. Chaque fois "
-"qu’un routeur demande à un autre routeur une entrée networkDb que le pair"
-" n’a pas, il en renvoie de 3 à 10 InfosRouteur."
+msgstr "Les messages I2NP et les données qu’ils contiennent sont déjà définis dans une structure assez compacte, bien qu’un attribut de la structure d’infosRouteur ne l’est pas. « options » est un mappage nom = valeur ASCII en clair. Pour l’instant, nous le remplissons avec ces statistiques publiées - autour de 3300 octets par pair. Facile à mettre en œuvre, la compression GZIP le réduirait presque d’un tiers et, quand l’on tient compte du nombre de fois que des structures InfosRouteur sont échangées par le réseau, cela représente des économies significatives. Chaque fois qu’un routeur demande à un autre routeur une entrée networkDb que le pair n’a pas, il en renvoie de 3 à 10 InfosRouteur."
 
 #: i2p2www/pages/site/about/performance/history.html:117
 msgid "Update the ministreaming protocol"
@@ -2533,40 +2000,17 @@ msgstr "remplacé par le protocole plein ministreaming"
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
-msgstr ""
-"Actuellement, la bibliothèque de minidiffusion de mihi a un protocole de "
-"négociation de flux assez simple. Alice envoie à Bob un message SYN, Bob "
-"répond par un message ACK, ensuite Alice et Bob s’envoient des données, "
-"jusqu’à ce que l’un d’entre eux envoie à l’autre un message CLOSE. Pour "
-"les connexions longues (p. ex. à un serveur IRC), cette surcharge est "
-"négligeable, mais pour les situations simples de demande/réponse unique "
-"(p. ex. une demande/réponse HTTP), c’est plus du double de messages que "
-"nécessaire. Si, cependant, Alice avait ajouté ses premières données "
-"utiles au message SYN et Bob avait ajouté sa première réponse avec le "
-"message ACK, et peut-être aussi\n"
-"inclus le drapeau CLOSE, les flux transitoires tels que les requêtes HTTP"
-" pourraient être réduits à deux messages, au lieu du "
-"SYN+ACK+requête+réponse+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
+msgstr "Actuellement, la bibliothèque de minidiffusion de mihi a un protocole de négociation de flux assez simple. Alice envoie à Bob un message SYN, Bob répond par un message ACK, ensuite Alice et Bob s’envoient des données, jusqu’à ce que l’un d’entre eux envoie à l’autre un message CLOSE. Pour les connexions longues (p. ex. à un serveur IRC), cette surcharge est négligeable, mais pour les situations simples de demande/réponse unique (p. ex. une demande/réponse HTTP), c’est plus du double de messages que nécessaire. Si, cependant, Alice avait ajouté ses premières données utiles au message SYN et Bob avait ajouté sa première réponse avec le message ACK, et peut-être aussi\ninclus le drapeau CLOSE, les flux transitoires tels que les requêtes HTTP pourraient être réduits à deux messages, au lieu du SYN+ACK+requête+réponse+CLOSE."
 
 #: i2p2www/pages/site/about/performance/history.html:132
 msgid "Implement full streaming protocol"
@@ -2574,55 +2018,26 @@ msgstr "Implémenter protocole full streaming"
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
-msgstr ""
-"Le protocole « ministreaming » profite d’une mauvaise décision de "
-"conception dans le protocole client I2P (I2CP) ; l’exposition de "
-"« mode=GUARANTEED », permettant à ce qui serait autrement un protocole "
-"non fiable, au meilleur effort, basé sur des messages d’être utilisé pour"
-" une opération de blocage fiable (sous le capot, tout est encore non "
-"fiable et basé sur des messages, le routeur fournissant des garanties de "
-"livraison par l’enveloppage ail d’un message « ACK » avec les données "
-"utiles. Donc une fois que les données atteignent la cible, le message ACK"
-" nous est retourné [par des tunnels, bien sûr])."
+msgstr "Le protocole « ministreaming » profite d’une mauvaise décision de conception dans le protocole client I2P (I2CP) ; l’exposition de « mode=GUARANTEED », permettant à ce qui serait autrement un protocole non fiable, au meilleur effort, basé sur des messages d’être utilisé pour une opération de blocage fiable (sous le capot, tout est encore non fiable et basé sur des messages, le routeur fournissant des garanties de livraison par l’enveloppage ail d’un message « ACK » avec les données utiles. Donc une fois que les données atteignent la cible, le message ACK nous est retourné [par des tunnels, bien sûr])."
 
 #: i2p2www/pages/site/about/performance/history.html:143
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
-msgstr ""
-"Comme je l’ai <a href=\"%(link)s\">dit</a>, faire qu’I2PTunnel (et la "
-"bibliothèque ministreaming) suivent cette route était la meilleure chose "
-"à faire, mais des mécanismes plus efficaces existent. Quand nous ôtons la"
-"\n"
-"fonction « Mode=GUARANTEED », nous nous trouvons essentiellement avec un "
-"I2CP qui ressemble à une couche IP anonyme, et il nous sera ainsi "
-"possible de mettre en œuvre la bibliothèque de diffusion afin de profiter"
-" des expériences de conception de la couche TCP : ACK sélectifs, "
-"détection de la congestion, nagle, etc."
+msgstr "Comme je l’ai <a href=\"%(link)s\">dit</a>, faire qu’I2PTunnel (et la bibliothèque ministreaming) suivent cette route était la meilleure chose à faire, mais des mécanismes plus efficaces existent. Quand nous ôtons la\nfonction « Mode=GUARANTEED », nous nous trouvons essentiellement avec un I2CP qui ressemble à une couche IP anonyme, et il nous sera ainsi possible de mettre en œuvre la bibliothèque de diffusion afin de profiter des expériences de conception de la couche TCP : ACK sélectifs, détection de la congestion, nagle, etc."
 
 #: i2p2www/pages/site/about/performance/index.html:2
 msgid "Performance"
@@ -2632,105 +2047,44 @@ msgstr "Performance"
 msgid ""
 "How does I2P work, why is it slow, and why does it not use my full "
 "bandwidth?"
-msgstr ""
-"Comment est-ce que I2P fonctionne, pourquoi est-il lent, et pourquoi "
-"n’utilise-t-il pas complètement ma bande passante ?"
+msgstr "Comment est-ce que I2P fonctionne, pourquoi est-il lent, et pourquoi n’utilise-t-il pas complètement ma bande passante ?"
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
-msgstr ""
-"Probablement qu’une de choses la plus fréquemment demandée par les gens "
-"est \"à quelle vitesse est I2P ?\",\n"
-"et aucun ne semble aimer la réponse - \"cela dépend\". Après avoir essayé"
-" I2P, la\n"
-"chose suivante qu’ils demandent est \"deviendra-t-il plus rapide ?\", et "
-"la réponse à cela est plus\n"
-"emphatique <b>oui</b>."
+msgstr "Probablement qu’une de choses la plus fréquemment demandée par les gens est \"à quelle vitesse est I2P ?\",\net aucun ne semble aimer la réponse - \"cela dépend\". Après avoir essayé I2P, la\nchose suivante qu’ils demandent est \"deviendra-t-il plus rapide ?\", et la réponse à cela est plus\nemphatique <b>oui</b>."
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
-msgstr ""
-"I2P est un réseau complètement dynamique. Chaque client est connu par les"
-" autres nœuds et teste l’accessibilité et la capacité des nœuds locaux "
-"connus.\n"
-"Seuls les nœuds accessibles et aptes sont enregistrés dans une base de "
-"données NetDB locale (généralement une portion du réseau seulement, "
-"environ 500 à 1 000).\n"
-"Quand I2P construit des tunnels, la meilleure ressource est sélectionnée "
-"de cette réserve. Par exemple, un petit sous-ensemble de 20 à 50 nœuds "
-"n’est disponible que pour construire des tunnels.\n"
-"Avec des tests toutes les minutes, la réserve de nœuds utilisés change "
-"toutes les minutes.\n"
-"Chaque nœud d’I2P connaît une partie différente du réseau, ce qui "
-"signifie que chaque routeur connaît un ensemble différent de nœuds d’I2P "
-"pouvant être utilisés pour les tunnels.\n"
-"Même si deux routeurs possédaient le même sous-ensemble de nœuds connus, "
-"les tests d’accessibilité et de capacité donneraient probablement des "
-"résultats différents, car les autres routeurs pourraient subir une charge"
-" lors du test d’un routeur, mais être libres lors du test du deuxième "
-"routeur."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
+msgstr "I2P est un réseau complètement dynamique. Chaque client est connu par les autres nœuds et teste l’accessibilité et la capacité des nœuds locaux connus.\nSeuls les nœuds accessibles et aptes sont enregistrés dans une base de données NetDB locale (généralement une portion du réseau seulement, environ 500 à 1 000).\nQuand I2P construit des tunnels, la meilleure ressource est sélectionnée de cette réserve. Par exemple, un petit sous-ensemble de 20 à 50 nœuds n’est disponible que pour construire des tunnels.\nAvec des tests toutes les minutes, la réserve de nœuds utilisés change toutes les minutes.\nChaque nœud d’I2P connaît une partie différente du réseau, ce qui signifie que chaque routeur connaît un ensemble différent de nœuds d’I2P pouvant être utilisés pour les tunnels.\nMême si deux routeurs possédaient le même sous-ensemble de nœuds connus, les tests d’accessibilité et de capacité donneraient probablement des résultats différents, car les autres routeurs pourraient subir une charge lors du test d’un routeur, mais être libres lors du test du deuxième routeur."
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
-msgstr ""
-"Le texte ci-dessus décrit pourquoi chaque noeud I2P a des noeuds "
-"différents pour construire des tunnels.\n"
-"Parce que chaque noeud I2P a une latence différente et une largeur de "
-"bande passante, des tunnels (qui sont construits via ces noeuds) ont une "
-"latence différente et des valeurs différentes de bande passante.\n"
-"Et parce que chaque noeud I2P a différents tunnels construits, aucun de "
-"deux noeud I2P n’a les mêmes ensembles de tunnels."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
+msgstr "Le texte ci-dessus décrit pourquoi chaque noeud I2P a des noeuds différents pour construire des tunnels.\nParce que chaque noeud I2P a une latence différente et une largeur de bande passante, des tunnels (qui sont construits via ces noeuds) ont une latence différente et des valeurs différentes de bande passante.\nEt parce que chaque noeud I2P a différents tunnels construits, aucun de deux noeud I2P n’a les mêmes ensembles de tunnels."
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
-msgstr ""
-"Un serveur ou client est connu comme une « destination » et chaque "
-"destination a au moins un tunnel entrant et un tunnel sortant. Il y a par"
-" défaut 3 sauts par tunnel.\n"
-"Cela s’élève à 12 sauts (c.-à-d. 12 nœuds I2P différents) pour un aller-"
-"retour complet client-serveur-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
+msgstr "Un serveur ou client est connu comme une « destination » et chaque destination a au moins un tunnel entrant et un tunnel sortant. Il y a par défaut 3 sauts par tunnel.\nCela s’élève à 12 sauts (c.-à-d. 12 nœuds I2P différents) pour un aller-retour complet client-serveur-client."
 
 #: i2p2www/pages/site/about/performance/index.html:34
 msgid ""
 "Each data package is sent through 6 other I2P nodes until it reaches the "
 "server:"
-msgstr ""
-"Chaque paquet de données est envoyé par 6 autres noeuds I2P jusqu’à ce "
-"qu’il atteigne le serveur :"
+msgstr "Chaque paquet de données est envoyé par 6 autres noeuds I2P jusqu’à ce qu’il atteigne le serveur :"
 
 #: i2p2www/pages/site/about/performance/index.html:40
 msgid "and on way back 6 different I2P nodes:"
@@ -2738,180 +2092,62 @@ msgstr "et au retour 6 noeuds I2P différents :"
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
-msgstr ""
-"Comme la plupart du trafic sur I2P (www, torrent, etc.) a besoin de "
-"paquets ack jusqu’à ce que de nouvelles données soient envoyées, il doit "
-"attendre jusqu’à ce qu’un paquet ack revienne du serveur.\n"
-"Donc : envoyer des données, attendre ack, envoyer plus de données, "
-"attendre ack, etc.\n"
-"Comme le RTT (temps aller-retour) s’ajoute à la latence de chaque "
-"nœud I2P individuel et à chaque connexion pendant cet aller-retour, un "
-"paquet ack revient habituellement vers le client en 1 à 3 secondes.\n"
-"En raison de contrainte du transport TCP et I2P, un paquet de données a "
-"une taille limitée et ne peut pas être aussi grand que nous le "
-"souhaitons.\n"
-"Ensemble, ces conditions définissent une limite de bande passante "
-"maximale de 20 à 50 Ko/s par tunnel.\n"
-"Mais si SEULEMENT UN saut dans le tunnel n’a qu’une bande passante de "
-"5 Ko/s à pouvoir, le tunnel entier est limité à 5 Ko/s, indépendamment de"
-" la latence et autres restrictions."
+msgstr "Comme la plupart du trafic sur I2P (www, torrent, etc.) a besoin de paquets ack jusqu’à ce que de nouvelles données soient envoyées, il doit attendre jusqu’à ce qu’un paquet ack revienne du serveur.\nDonc : envoyer des données, attendre ack, envoyer plus de données, attendre ack, etc.\nComme le RTT (temps aller-retour) s’ajoute à la latence de chaque nœud I2P individuel et à chaque connexion pendant cet aller-retour, un paquet ack revient habituellement vers le client en 1 à 3 secondes.\nEn raison de contrainte du transport TCP et I2P, un paquet de données a une taille limitée et ne peut pas être aussi grand que nous le souhaitons.\nEnsemble, ces conditions définissent une limite de bande passante maximale de 20 à 50 Ko/s par tunnel.\nMais si SEULEMENT UN saut dans le tunnel n’a qu’une bande passante de 5 Ko/s à pouvoir, le tunnel entier est limité à 5 Ko/s, indépendamment de la latence et autres restrictions."
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
-msgstr ""
-"En raison du chiffrement utilisé et d’autres configurations dans I2P "
-"(comment construire des tunnels, la latence…) la construction d’un tunnel"
-" est gourmande en temps UCT. C’est pourquoi une destination n’est "
-"autorisée à avoir qu’un maximum de 6 tunnels entrants et 6 sortants pour "
-"transporter les données. Avec un maximum de 50 ko/s par tunnel, une "
-"destination pourrait utiliser à peu près 300 ko/s de trafic combiné (en "
-"réalité peut-être plus si des tunnels plus courts sont utilisés avec un "
-"anonymat disponible faible ou nul).\n"
-"Les tunnels utilisés sont éliminés toutes les 10 minutes et d’autres sont"
-" construits.\n"
-"Ce changement de tunnels (et parfois des clients qui se ferment à froid, "
-"car ils utilisent la « fermeture immédiate » ou des situations de panne "
-"de courant) met parfois fin aux tunnels et aux connexions, comme observé "
-"sur le réseau IRC2P en perte de connexion (dépassement du temps de ping) "
-"ou lors de l’utilisation d’eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
+msgstr "En raison du chiffrement utilisé et d’autres configurations dans I2P (comment construire des tunnels, la latence…) la construction d’un tunnel est gourmande en temps UCT. C’est pourquoi une destination n’est autorisée à avoir qu’un maximum de 6 tunnels entrants et 6 sortants pour transporter les données. Avec un maximum de 50 ko/s par tunnel, une destination pourrait utiliser à peu près 300 ko/s de trafic combiné (en réalité peut-être plus si des tunnels plus courts sont utilisés avec un anonymat disponible faible ou nul).\nLes tunnels utilisés sont éliminés toutes les 10 minutes et d’autres sont construits.\nCe changement de tunnels (et parfois des clients qui se ferment à froid, car ils utilisent la « fermeture immédiate » ou des situations de panne de courant) met parfois fin aux tunnels et aux connexions, comme observé sur le réseau IRC2P en perte de connexion (dépassement du temps de ping) ou lors de l’utilisation d’eepget."
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
-msgstr ""
-"Avec un ensemble limité de destinations et un ensemble limité de tunnels "
-"par destination, un noeud I2P utilise seulement un ensemble limité de "
-"tunnels à travers d’autres noeuds I2P.\n"
-"Par exemple, si un noeud I2P est \"hop1\" dans le petit exemple ci-"
-"dessus, nous voyons seulement 1 tunnel participant provenant du client.\n"
-"Si nous résumons le réseau I2P entier, seul un nombre plutôt limité de "
-"tunnels participants pourrait être construit avec une quantité limitée de"
-" bande passante tous ensemble.\n"
-"Si on distribue ces nombres limités à travers le numéro de noeuds I2P, il"
-" y a seulement une fraction de bande passante/capacité disponible "
-"disponible pour utilisation."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
+msgstr "Avec un ensemble limité de destinations et un ensemble limité de tunnels par destination, un noeud I2P utilise seulement un ensemble limité de tunnels à travers d’autres noeuds I2P.\nPar exemple, si un noeud I2P est \"hop1\" dans le petit exemple ci-dessus, nous voyons seulement 1 tunnel participant provenant du client.\nSi nous résumons le réseau I2P entier, seul un nombre plutôt limité de tunnels participants pourrait être construit avec une quantité limitée de bande passante tous ensemble.\nSi on distribue ces nombres limités à travers le numéro de noeuds I2P, il y a seulement une fraction de bande passante/capacité disponible disponible pour utilisation."
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
-msgstr ""
-"Pour rester anonyme, un routeur ne devrait pas être utilisé par "
-"l’ensemble du réseau pour la construction de tunnels.\n"
-"Si un routeur agit comme routeur de tunnels pour tous les nœuds d’I2P, il"
-" devient un véritable point central de défaillance, ainsi qu’un point "
-"central pour récolter des adresses IP et des données des clients. Ce "
-"n’est pas souhaitable.\n"
-"I2P tente de répartir la charge sur un grand nombre de nœuds d’I2P pour "
-"cette raison."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
+msgstr "Pour rester anonyme, un routeur ne devrait pas être utilisé par l’ensemble du réseau pour la construction de tunnels.\nSi un routeur agit comme routeur de tunnels pour tous les nœuds d’I2P, il devient un véritable point central de défaillance, ainsi qu’un point central pour récolter des adresses IP et des données des clients. Ce n’est pas souhaitable.\nI2P tente de répartir la charge sur un grand nombre de nœuds d’I2P pour cette raison."
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
-msgstr ""
-"Un autre point est le réseau complètement maillé. Chaque connexion "
-"saut-à-saut utilise une connexion TCP ou UDP sur les nœuds I2P. Avec 1000"
-" connexions, on voit\n"
-"1000 connexions TCP. C’est beaucoup et certains routeurs (DSL, câble, …) "
-"domestique ou de petit bureau permettent seulement un petit nombre de "
-"connexions (ou deviennent simplement fous si vous utilisez plus de X "
-"connexions.)\n"
-"I2P essaie de limiter le nombre de ces connexions pour être en dessous de"
-" 1500 par UDP et par type TCP.\n"
-"Ce qui limite la quantité de trafic acheminé à travers votre nœud I2P "
-"aussi."
+msgstr "Un autre point est le réseau complètement maillé. Chaque connexion saut-à-saut utilise une connexion TCP ou UDP sur les nœuds I2P. Avec 1000 connexions, on voit\n1000 connexions TCP. C’est beaucoup et certains routeurs (DSL, câble, …) domestique ou de petit bureau permettent seulement un petit nombre de connexions (ou deviennent simplement fous si vous utilisez plus de X connexions.)\nI2P essaie de limiter le nombre de ces connexions pour être en dessous de 1500 par UDP et par type TCP.\nCe qui limite la quantité de trafic acheminé à travers votre nœud I2P aussi."
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
-msgstr ""
-"En résumé, I2P est très complexe et il n’y a aucune façon facile "
-"d’identifier exactement pourquoi votre nœud n’est pas utilisé.\n"
-"Si votre nœud est accessible, a un paramètre de bande passante partagée >"
-" à 128 ko/s, est accessible jour et nuit, il devrait être utilisé après "
-"quelque temps pour le trafic participant. \n"
-"S’il est hors service entre temps, le test de votre nœud I2P par d’autres"
-" nœuds leur indiquera que vous n’êtes pas accessible. Pour les autres "
-"nœuds, votre nœud sera bloqué pour au moins 24 h. Ainsi, les autres nœuds"
-" qui vous ont testé comme étant hors service n’utiliseront pas votre nœud"
-" pour construire des tunnels durant 24 h. C’est pourquoi votre trafic "
-"sera inférieur après un redémarrage, une fermeture pendant au moins 24 h."
+msgstr "En résumé, I2P est très complexe et il n’y a aucune façon facile d’identifier exactement pourquoi votre nœud n’est pas utilisé.\nSi votre nœud est accessible, a un paramètre de bande passante partagée > à 128 ko/s, est accessible jour et nuit, il devrait être utilisé après quelque temps pour le trafic participant. \nS’il est hors service entre temps, le test de votre nœud I2P par d’autres nœuds leur indiquera que vous n’êtes pas accessible. Pour les autres nœuds, votre nœud sera bloqué pour au moins 24 h. Ainsi, les autres nœuds qui vous ont testé comme étant hors service n’utiliseront pas votre nœud pour construire des tunnels durant 24 h. C’est pourquoi votre trafic sera inférieur après un redémarrage, une fermeture pendant au moins 24 h."
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
-msgstr ""
-"Aussi : les autres noeuds I2P doivent connaître votre routeur I2P pour "
-"tester son accessibilité et sa capacité. Cela prend du temps pour que les"
-" autres noeuds prennent connaissance de votre noeud.\n"
-"Cela sera plus rapide si vous utilisez I2P et construisez davantage de "
-"tunnels, par exemple utilisez un torrent ou www pendant quelque temps."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
+msgstr "Aussi : les autres noeuds I2P doivent connaître votre routeur I2P pour tester son accessibilité et sa capacité. Cela prend du temps pour que les autres noeuds prennent connaissance de votre noeud.\nCela sera plus rapide si vous utilisez I2P et construisez davantage de tunnels, par exemple utilisez un torrent ou www pendant quelque temps."
 
 #: i2p2www/pages/site/about/performance/index.html:99
 msgid "Performance Improvements"
@@ -2922,7 +2158,4 @@ msgstr "Améliorations de performance"
 msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
-msgstr ""
-"Pour de possible futures améliorations de performance voir\n"
-"<a href=\"%(future)s\">Améliorations de performance futures</a>."
-
+msgstr "Pour de possible futures améliorations de performance voir\n<a href=\"%(future)s\">Améliorations de performance futures</a>."
diff --git a/i2p2www/translations/fr/LC_MESSAGES/comparison.po b/i2p2www/translations/fr/LC_MESSAGES/comparison.po
index 0eae3f088491964ca1a19129cc8ddde7a3480bb0..d65b9a18540ac2f360db90f3e9d0ee46f97d47d9 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/comparison.po
@@ -1,28 +1,30 @@
-# French translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # bassmax, 2015
 # AO <ao@localizationlab.org>, 2018-2020
 # Boxoa590, 2013
 # AO <ao@localizationlab.org>, 2017-2018
 # magma <magma@mail.i2p>, 2011
+# Boxoa590, 2013
 # syl_, 2013,2015-2016
 # Towinet, 2013-2016
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2020-04-03 21:47+0000\n"
-"Last-Translator: AO <ao@localizationlab.org>\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: AO <ao@localizationlab.org>, 2018-2020\n"
 "Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n"
-"Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: fr\n"
+"Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -30,89 +32,39 @@ msgstr "I2P comparé à Freenet"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
-msgstr ""
-"Freenet est entièrement distribué, c’est un réseau pair à pair de "
-"publication anonyme, offrant\n"
-"des moyens sûrs pour stocker des données, ainsi que des approches qui "
-"tentent de répondre aux charges\n"
-"d’une crue éclair. Alors que Freenet est conçu comme un magasin de "
-"données distribuées, des gens ont\n"
-"construit des applications par dessus celui-ci afin de faire de la "
-"communication anonyme plus générique, tels\n"
-"que des sites web statiques et des forums électroniques."
+msgstr "Freenet est entièrement distribué, c’est un réseau pair à pair de publication anonyme, offrant\ndes moyens sûrs pour stocker des données, ainsi que des approches qui tentent de répondre aux charges\nd’une crue éclair. Alors que Freenet est conçu comme un magasin de données distribuées, des gens ont\nconstruit des applications par dessus celui-ci afin de faire de la communication anonyme plus générique, tels\nque des sites Web statiques et des forums électroniques."
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
-msgstr ""
-"Comparé à I2P, Freenet offre des avantages considérables : c’est un "
-"magasin de données distribuées, alors qu’I2P ne l’est pas, ce qui permet "
-"de récupérer les contenus publiés par autrui, même si l’éditeur n’est "
-"plus en ligne. En outre, il devrait être en mesure de distribuer des "
-"données populaires assez efficacement. I2P même n’offre et n’offrira pas "
-"cette fonction. D’autre part, il existe un chevauchement pour les "
-"utilisateurs qui veulent simplement communiquer anonymement les uns avec "
-"les autres par les sites Web, les forums, les logiciels de partage de "
-"fichiers, etc. Il y a aussi eu des tentatives de développement d’un "
-"magasin de données distribuées qui fonctionnerait par-dessus I2P (plus "
-"récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), mais rien "
-"n’est encore prêt pour une utilisation générale."
+msgstr "Comparé à I2P, Freenet offre des avantages considérables : c’est un magasin de données distribuées, alors qu’I2P ne l’est pas, ce qui permet de récupérer les contenus publiés par autrui, même si l’éditeur n’est plus en ligne. En outre, il devrait être en mesure de distribuer des données populaires assez efficacement. I2P même n’offre et n’offrira pas cette fonction. D’autre part, il existe un chevauchement pour les utilisateurs qui veulent simplement communiquer anonymement les uns avec les autres par les sites Web, les forums, les logiciels de partage de fichiers, etc. Il y a aussi eu des tentatives de développement d’un magasin de données distribuées qui fonctionnerait par-dessus I2P (plus récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), mais rien n’est encore prêt pour une utilisation générale."
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
-msgstr ""
-"Cependant, même sans tenir compte des questions relatives aux mises en "
-"œuvre, il y a des préoccupations sur les algorithmes de Freenet à la fois"
-" sur l’évolutivité et la perspective d’anonymat, en raison en grande "
-"partie du mode de routage de Freenet, axé heuristique. Les interactions "
-"des différentes techniques peuvent certainement réussir à dissuader "
-"diverses attaques, et peut-être que certains aspects des algorithmes de "
-"routage peuvent faire espérer de l’évolutivité. Malheureusement, peu "
-"d’analyses des algorithmes concernés ont abouti à des résultats positifs,"
-" mais il reste encore de l’espoir. À tout le moins, Freenet fournit un "
-"anonymat substantiel contre un assaillant qui n’aurait pas les ressources"
-" nécessaires pour l’analyser davantage."
+msgstr "Cependant, même sans tenir compte des questions relatives aux mises en œuvre, il y a des préoccupations sur les algorithmes de Freenet à la fois sur l’évolutivité et la perspective d’anonymat, en raison en grande partie du mode de routage de Freenet, axé heuristique. Les interactions des différentes techniques peuvent certainement réussir à dissuader diverses attaques, et peut-être que certains aspects des algorithmes de routage peuvent faire espérer de l’évolutivité. Malheureusement, peu d’analyses des algorithmes concernés ont abouti à des résultats positifs, mais il reste encore de l’espoir. À tout le moins, Freenet fournit un anonymat substantiel contre un assaillant qui n’aurait pas les ressources nécessaires pour l’analyser davantage."
 
 #: i2p2www/pages/site/comparison/index.html:2
 msgid "Comparing I2P to other projects"
@@ -120,49 +72,28 @@ msgstr "I2P comparé à d’autres projets"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Il existe un grand nombre d’autres applications et de projets travaillant"
-" sur les communications anonymes et I2P s’en est largement inspiré. Cette"
-" liste est loin d’être exhaustive concernant le thème de l’anonymat (<a "
-"href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a> de Freehaven\n"
-"et les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à "
-"GNUnet servent à celà). \n"
-"Néanmoins, certains systèmes se prêtent bien à la comparaison. Les "
-"suivants disposent d’ailleurs d’une page dédiée :"
+msgstr "Il existe un grand nombre d’autres applications et de projets travaillant sur les communications anonymes et I2P s’en est largement inspiré. Cette liste est loin d’être exhaustive concernant le thème de l’anonymat (<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> de Freehaven\net les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à GNUnet servent à celà). \nNéanmoins, certains systèmes se prêtent bien à la comparaison. Les suivants disposent d’ailleurs d’une page dédiée :"
 
 #: i2p2www/pages/site/comparison/index.html:20
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Ceux qui suivent sont discuté sur la page <a "
-"href=\"%(othernetworks)s\">autres réseaux</a>"
+msgstr "Ceux qui suivent sont discuté sur la page <a href=\"%(othernetworks)s\">autres réseaux</a>"
 
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Le contenu de cette page est soumis à mises à jour, discussions et "
-"conflits, et nous accueillons avec plaisir les commentaires et ajouts.\n"
-"Vous pouvez nous faire part de votre analyse en saisissant un <a "
-"href=\"%(trac)s\">nouveau ticket dans Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
 msgid "I2P Compared to Other Anonymous Networks"
@@ -179,247 +110,116 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"La plupart des sections suivantes sont assez vieilles et peuvent ne pas "
-"être précises.\n"
-"Pour une vue d’ensemble des comparaisons disponibles, voir la\n"
-"<a href=\"%(comparison)s\">page de comparaisons réseau principale</a>.\n"
-"Vous pouvez également nous faire part de votre analyse en créant un\n"
-"<a href=\"%(trac)s\">nouveau ticket dans Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
-msgstr ""
-"Morphmix et Tarzan sont tous les deux des réseaux pair à pair de "
-"mandataires d’anonymisation entièrement distribués, permettant aux "
-"utilisateurs de tunnelliser vers l’extérieur par le réseau de mélange à "
-"latence faible. Morphmix comportent des algorithmes très intéressants de "
-"détection de collusion et des défenses contre les Sybil, tandis que "
-"Tarzan fait appel à la rareté d’adresses IP pour accomplir la même chose."
-" Les deux principales différences entre ces systèmes et I2P sont liées au"
-" <a href=\"%(threatmodel)s\">modèle de menace</a> d’I2P et à leur "
-"conception de mandataire sortant (au lieu de fournir de l’anonymat à la "
-"fois à l’émetteur et au destinataire). Le code source est offert pour les"
-" deux systèmes, mais nous ne sommes pas au courant d’une utilisation en "
-"dehors des milieux universitaires."
+msgstr "Morphmix et Tarzan sont tous les deux des réseaux pair à pair de mandataires d’anonymisation entièrement distribués, permettant aux utilisateurs de tunnelliser vers l’extérieur par le réseau de mélange à latence faible. Morphmix comportent des algorithmes très intéressants de détection de collusion et des défenses contre les Sybil, tandis que Tarzan fait appel à la rareté d’adresses IP pour accomplir la même chose. Les deux principales différences entre ces systèmes et I2P sont liées au <a href=\"%(threatmodel)s\">modèle de menace</a> d’I2P et à leur conception de mandataire sortant (au lieu de fournir de l’anonymat à la fois à l’émetteur et au destinataire). Le code source est offert pour les deux systèmes, mais nous ne sommes pas au courant d’une utilisation en dehors des milieux universitaires."
 
 #: i2p2www/pages/site/comparison/other-networks.html:172
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
-msgstr ""
-"\n"
-"Mixminion et Mixmaster sont des réseaux pour offrir un système de "
-"courriel anonyme contre des adversaires très puissants.\n"
-"Les applications de messagerie à latence élevée fonctionnant sur I2P (par"
-" exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se "
-"révéler adéquates pour répondre au modèle de menace de ces adversaires, "
-"en s’exécutant simultanément aux besoins des utilisateurs à latence "
-"faible, pour fournir un jeu d’anonymat considérablement plus important.\n"
-"La prise en charge d’une latence élevée dans le routeur I2P même pourrait"
-" ou pas être ajoutée dans une version future éloignée.\n"
-"Il est trop tôt pour dire si I2P répondra aux besoins d’utilisateurs "
-"exigeant une protection extrême pour le courriel."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
+msgstr "\nMixminion et Mixmaster sont des réseaux pour offrir un système de courriel anonyme contre des adversaires très puissants.\nLes applications de messagerie à latence élevée fonctionnant sur I2P (par exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se révéler adéquates pour répondre au modèle de menace de ces adversaires, en s’exécutant simultanément aux besoins des utilisateurs à latence faible, pour fournir un jeu d’anonymat considérablement plus important.\nLa prise en charge d’une latence élevée dans le routeur I2P même pourrait ou pas être ajoutée dans une version future éloignée.\nIl est trop tôt pour dire si I2P répondra aux besoins d’utilisateurs exigeant une protection extrême pour le courriel."
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
 msgid ""
 "As with Tor and Onion Routing, \n"
 "both Mixminion and Mixmaster take the directory based approach as well."
-msgstr ""
-"Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée"
-" sur un répertoire."
+msgstr "Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée sur un répertoire."
 
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
-msgstr ""
-"JAP (mandataire anonyme Java) est un réseau de mélange en cascades pour "
-"l’anonymisation de demandes Web et comme tel a quelques nœuds centralisés"
-" (participants à la cascade) qui brassent et mélangent les requêtes des "
-"clients à travers la séquence de nœuds (la cascade) avant de les relayer "
-"vers le Toile par un mandataire. Le champ d’application, le modèle de "
-"menace et la sécurité sont sensiblement\n"
-"différents d’I2P, mais pour ceux qui n’exige pas un anonymat important, "
-"mais qui ne sont quand même pas satisfaits par un service genre "
-"Anonymizer, JAP mérite d’être examiné. Une précaution à noter pour toute "
-"personne relevant de la juridiction des tribunaux allemands, car le "
-"bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec "
-"succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la"
-" méthode de cette attaque a ensuite été jugée illégale par les tribunaux "
-"allemands, le fait que les données ont été recueillies avec succès est "
-"une préoccupation. Les tribunaux changent d’avis selon les circonstances "
-"et c’est la preuve que si un organisme gouvernemental ou une agence de "
-"renseignement le voulaient, ils pourraient recueillir les données, même "
-"si cela peut être déclaré irrecevable ultérieurement par certains "
-"tribunaux)"
+msgstr "JAP (mandataire anonyme Java) est un réseau de mélange en cascades pour l’anonymisation de demandes Web et comme tel a quelques nœuds centralisés (participants à la cascade) qui brassent et mélangent les requêtes des clients à travers la séquence de nœuds (la cascade) avant de les relayer vers le Toile par un mandataire. Le champ d’application, le modèle de menace et la sécurité sont sensiblement\ndifférents d’I2P, mais pour ceux qui n’exige pas un anonymat important, mais qui ne sont quand même pas satisfaits par un service genre Anonymizer, JAP mérite d’être examiné. Une précaution à noter pour toute personne relevant de la juridiction des tribunaux allemands, car le bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la méthode de cette attaque a ensuite été jugée illégale par les tribunaux allemands, le fait que les données ont été recueillies avec succès est une préoccupation. Les tribunaux changent d’avis selon les circonstances et c’est la preuve que si un organisme gouvernemental ou une agence de renseignement le voulaient, ils pourraient recueillir les données, même si cela peut être déclaré irrecevable ultérieurement par certains tribunaux)"
 
 #: i2p2www/pages/site/comparison/other-networks.html:216
 #, python-format
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
-msgstr ""
-"Ces deux systèmes fonctionnent par le même routage <a "
-"href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré "
-"d’anonymat d’après un modèle de menace qui consiste à fournir un déni "
-"plausible contre un adversaire seul. Avec le routage d’antnet, soit ils "
-"appliquent d’abord un cheminement aléatoire, soit une recherche par "
-"diffusion pour trouver un pair ayant les données ou l’identité désirée. "
-"Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce "
-"chemin trouvé. Cela fonctionne bien pour les applications qui veulent "
-"simplement savoir ce que les autres aux alentours ont à offrir. « Comment"
-" allez vous tous ? » par opposition à « Salut Alice, comment vas-tu ? ». "
-"Vous obtenez essentiellement une grappe locale de nœuds qui peuvent "
-"partager des fichiers et garder un certain niveau d’anonymat (quoique "
-"vous n’ayez pas beaucoup de contrôle sur qui est dans ce groupe de "
-"pairs)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
+msgstr "Ces deux systèmes fonctionnent par le même routage <a href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré d’anonymat d’après un modèle de menace qui consiste à fournir un déni plausible contre un adversaire seul. Avec le routage d’antnet, soit ils appliquent d’abord un cheminement aléatoire, soit une recherche par diffusion pour trouver un pair ayant les données ou l’identité désirée. Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce chemin trouvé. Cela fonctionne bien pour les applications qui veulent simplement savoir ce que les autres aux alentours ont à offrir. « Comment allez vous tous ? » par opposition à « Salut Alice, comment vas-tu ? ». Vous obtenez essentiellement une grappe locale de nœuds qui peuvent partager des fichiers et garder un certain niveau d’anonymat (quoique vous n’ayez pas beaucoup de contrôle sur qui est dans ce groupe de pairs)."
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
-msgstr ""
-"Cependant, l’algorithme d’adaptation en taille (scale) ne se fait pas du "
-"tout - si l’application veut parler avec un\n"
-"pair en particulier cela finit par faire une large recherche (broadcast) "
-"ou une promenade aléatoire (random walk) (quoique s’ils ont assez\n"
-"de chance pour que cela réussisse, le routage antnet devrait optimiser "
-"cette connexion trouvée). Cela signifie que\n"
-"tandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne"
-" sont pas appropriés pour de grands réseaux où\n"
-"quelqu’un veut se mettre en contact avec un autre pair spécifique. Cela "
-"ne signifie pas qu’il n’y a pas\n"
-"de valeur dans ces systèmes, juste que leur applicabilité est limitée aux"
-" situations où leur\n"
-"problèmes (issues) particuliers peuvent être adressés."
+msgstr "Cependant, l’algorithme d’adaptation en taille (scale) ne se fait pas du tout - si l’application veut parler avec un\npair en particulier cela finit par faire une large recherche (broadcast) ou une promenade aléatoire (random walk) (quoique s’ils ont assez\nde chance pour que cela réussisse, le routage antnet devrait optimiser cette connexion trouvée). Cela signifie que\ntandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne sont pas appropriés pour de grands réseaux où\nquelqu’un veut se mettre en contact avec un autre pair spécifique. Cela ne signifie pas qu’il n’y a pas\nde valeur dans ces systèmes, juste que leur applicabilité est limitée aux situations où leur\nproblèmes (issues) particuliers peuvent être adressés."
 
 #: i2p2www/pages/site/comparison/other-networks.html:239
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
-msgstr ""
-"C’était un réseau closed-source visant les utilisateurs iraniens.\n"
-"Tor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que l’on "
-"doit chercher dans un outil de mise en échec</a>.\n"
-"Suffit-il de dire que être closed-source et cibler publiquement un pays "
-"spécifique ne sont pas de bonnes idées.\n"
-"I2P est, bien sûr, open-source. Cependant, ce code source, et notre\n"
-"<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup "
-"plus d’examen."
+msgstr "C’était un réseau closed-source visant les utilisateurs iraniens.\nTor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que l’on doit chercher dans un outil de mise en échec</a>.\nSuffit-il de dire que être closed-source et cibler publiquement un pays spécifique ne sont pas de bonnes idées.\nI2P est, bien sûr, open-source. Cependant, ce code source, et notre\n<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup plus d’examen."
 
 #: i2p2www/pages/site/comparison/other-networks.html:248
 msgid "Paid VPN Services"
@@ -430,10 +230,8 @@ msgstr "Services RPV payants"
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Vous pouvez contribuer par votre analyse en saisissant un\n"
-"<a href=\"%(trac)s\">nouveau ticket dans Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
 msgid "Others"
@@ -461,18 +259,7 @@ msgid ""
 "network, as well as gather and report statistics, as \n"
 "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
 "database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
-msgstr ""
-"Tor et le routage en oignon sont tous deux des réseaux mandataires "
-"d’anonymisation, permettant aux gens de tunnelliser par leur réseau de "
-"mélange à latence faible. Les deux principales différences entre Tor, le "
-"routage en oignon et I2P sont, encore une fois, liées à des différences "
-"dans le modèle de menaces et la conception du mandataire sortant (bien "
-"que Tor prenne aussi en charge les services cachés). De plus, Tor\n"
-"utilise une approche basée sur un annuaire, fournissant un point "
-"centralisé de gestion de la « vue » d’ensemble du réseau, recueille et "
-"rapporte aussi des statistiques, contrairement à la <a "
-"href=\"%(netdb)s\">base de données de réseau</a> distribuée d’I2P et la "
-"<a href=\"%(peerselection)s\">sélection de pairs</a>."
+msgstr "Tor et le routage en oignon sont tous deux des réseaux mandataires d’anonymisation, permettant aux gens de tunnelliser par leur réseau de mélange à latence faible. Les deux principales différences entre Tor, le routage en oignon et I2P sont, encore une fois, liées à des différences dans le modèle de menaces et la conception du mandataire sortant (bien que Tor prenne aussi en charge les services cachés). De plus, Tor\nutilise une approche basée sur un annuaire, fournissant un point centralisé de gestion de la « vue » d’ensemble du réseau, recueille et rapporte aussi des statistiques, contrairement à la <a href=\"%(netdb)s\">base de données de réseau</a> distribuée d’I2P et la <a href=\"%(peerselection)s\">sélection de pairs</a>."
 
 #: i2p2www/pages/site/comparison/tor.html:23
 msgid ""
@@ -485,15 +272,7 @@ msgid ""
 "outproxies are prone to abuse, along with all of the \n"
 "other security issues we've come to know and love with \n"
 "normal Internet traffic."
-msgstr ""
-"La fonction de mandataire sortant d’I2P/Tor présente quelques\n"
-"faiblesses importantes contre certains assaillants. Une fois que la "
-"communication quitte le réseau de mélange, les adversaires\n"
-"passifs de partout peuvent plus facilement mettre en place une analyse du"
-" trafic. De plus, les mandataires sortants ont accès aux données en clair"
-" transférées dans les deux sens, et les mandataires sortants sont sujets "
-"aux abus, en plus de tous les autres problèmes de sécurité inhérents au "
-"trafic normal d’Internet, que nous avons appris à connaître et à aimer."
+msgstr "La fonction de mandataire sortant d’I2P/Tor présente quelques\nfaiblesses importantes contre certains assaillants. Une fois que la communication quitte le réseau de mélange, les adversaires\npassifs de partout peuvent plus facilement mettre en place une analyse du trafic. De plus, les mandataires sortants ont accès aux données en clair transférées dans les deux sens, et les mandataires sortants sont sujets aux abus, en plus de tous les autres problèmes de sécurité inhérents au trafic normal d’Internet, que nous avons appris à connaître et à aimer."
 
 #: i2p2www/pages/site/comparison/tor.html:35
 msgid ""
@@ -503,14 +282,7 @@ msgid ""
 "to build outproxy functionality on top of an anonymous\n"
 "communication layer, they can).  In fact, some I2P users\n"
 "currently take advantage of Tor to outproxy."
-msgstr ""
-"Cependant, la plupart des gens ne doivent pas s’inquiéter de\n"
-"ces situations, car elles ne correspondent pas à leur modèle de menace. "
-"Et cela dépasse aussi le champ d’action fonctionnel (officiel) d’I2P (si "
-"des personnes veulent construire une fonction de mandataire sortant par-"
-"dessus une couche de communication anonyme, elles le peuvent). En fait, "
-"certains utilisateurs d’I2P utilisent actuellement Tor comme mandataire "
-"sortant."
+msgstr "Cependant, la plupart des gens ne doivent pas s’inquiéter de\nces situations, car elles ne correspondent pas à leur modèle de menace. Et cela dépasse aussi le champ d’action fonctionnel (officiel) d’I2P (si des personnes veulent construire une fonction de mandataire sortant par-dessus une couche de communication anonyme, elles le peuvent). En fait, certains utilisateurs d’I2P utilisent actuellement Tor comme mandataire sortant."
 
 #: i2p2www/pages/site/comparison/tor.html:49
 msgid "Comparison of Tor and I2P Terminology"
@@ -520,9 +292,7 @@ msgstr "Comparaison de terminologie entre Tor et I2P"
 msgid ""
 "While Tor and I2P are similar in many ways, much of the terminology is "
 "different."
-msgstr ""
-"Alors que Tor et I2P sont similaires à bien des égards, une grande partie"
-" de la terminologie est différente."
+msgstr "Alors que Tor et I2P sont similaires à bien des égards, une grande partie de la terminologie est différente."
 
 #: i2p2www/pages/site/comparison/tor.html:55
 msgid "Cell"
@@ -595,8 +365,8 @@ msgstr "Service caché"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
-msgstr "Eepsite ou Destination"
+msgid "I2P Site or Destination"
+msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
 msgid "Hidden Service Descriptor"
@@ -666,21 +436,14 @@ msgstr "Avantages de Tor sur I2P"
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
-msgstr ""
-"Plus grand nombre d’utilisateurs ; beaucoup plus de visibilité dans les "
-"communautés universitaires et hackers ; bénéficie\n"
-"d’études formelles d’anonymat, de résistance, et de performance ;\n"
-"a un chef de file universitaire non-anonyme, visible"
+msgstr "Plus grand nombre d’utilisateurs ; beaucoup plus de visibilité dans les communautés universitaires et hackers ; bénéficie\nd’études formelles d’anonymat, de résistance, et de performance ;\na un chef de file universitaire non-anonyme, visible"
 
 #: i2p2www/pages/site/comparison/tor.html:84
 msgid "Has already solved some scaling issues I2P has yet to address"
-msgstr ""
-"A déjà résolu certains problèmes d’échelle que I2P n’a pas eu encore à "
-"aborder"
+msgstr "A déjà résolu certains problèmes d’échelle que I2P n’a pas eu encore à aborder"
 
 #: i2p2www/pages/site/comparison/tor.html:85
 msgid "Has significant funding"
@@ -692,33 +455,24 @@ msgstr "À plus de développeurs, dont plusieurs sont financés"
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
-msgstr ""
-"Plus résistant au blocage au niveau d’un État en raison de la couche "
-"transport TLS et des ponts\n"
-"(I2P a des propositions pour des \"routes restreintes pleines\" mais "
-"celles-ci ne sont pas encore mises en Å“uvre)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
+msgstr "Plus résistant au blocage au niveau d’un État en raison de la couche transport TLS et des ponts\n(I2P a des propositions pour des \"routes restreintes pleines\" mais celles-ci ne sont pas encore mises en œuvre)"
 
 #: i2p2www/pages/site/comparison/tor.html:93
 msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr "Assez grand pour avoir dû s’adapter aux tentatives de blocage et de DOS"
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
-msgstr ""
-"Conçu et optimisé pour le trafic sortant, avec un grand nombre de nœuds "
-"de sortie"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
+msgstr "Conçu et optimisé pour le trafic sortant, avec un grand nombre de nœuds de sortie"
 
 #: i2p2www/pages/site/comparison/tor.html:96
 msgid ""
 "Better documentation, has formal papers and specifications,\n"
 "better website, many more translations"
-msgstr ""
-"Une meilleure documentation avec des articles et des spécifications "
-"formelles, un meilleur site Web, beaucoup plus de traductions"
+msgstr "Une meilleure documentation avec des articles et des spécifications formelles, un meilleur site Web, beaucoup plus de traductions"
 
 #: i2p2www/pages/site/comparison/tor.html:101
 msgid "More efficient with memory usage"
@@ -732,17 +486,13 @@ msgstr "Les nœuds client de Tor ont une très faible surcharge de la bande pass
 msgid ""
 "Centralized control reduces the complexity at each\n"
 "node and can efficiently address Sybil attacks"
-msgstr ""
-"Le contrôle centralisé réduit la complexité à chaque\n"
-"nœud et peut répondre efficacement à des attaques Sybil"
+msgstr "Le contrôle centralisé réduit la complexité à chaque\nnœud et peut répondre efficacement à des attaques Sybil"
 
 #: i2p2www/pages/site/comparison/tor.html:110
 msgid ""
 "A core of high capacity nodes provides higher\n"
 "throughput and lower latency"
-msgstr ""
-"Un coeur de nœuds à grande capacité a la possibilité de fournir un\n"
-"plus haut débit tout en gardant une faible latence"
+msgstr "Un coeur de nœuds à grande capacité a la possibilité de fournir un\nplus haut débit tout en gardant une faible latence"
 
 #: i2p2www/pages/site/comparison/tor.html:115
 msgid "C, not Java (ewww)"
@@ -754,11 +504,9 @@ msgstr "Avantages d’I2P sur Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
-msgstr ""
-"Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide"
-" que dans Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
+msgstr "Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide que dans Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:121
 msgid "Fully distributed and self organizing"
@@ -768,25 +516,17 @@ msgstr "Entièrement distribué et auto-organisé"
 msgid ""
 "Peers are selected by continuously profiling and ranking performance,\n"
 "rather than trusting claimed capacity"
-msgstr ""
-"Les pairs sont choisis par profilage continu et par classement de leurs "
-"performances,\n"
-"plutôt que de se contenter de faire confiance à la capacité qu’ils "
-"revendiquent"
+msgstr "Les pairs sont choisis par profilage continu et par classement de leurs performances,\nplutôt que de se contenter de faire confiance à la capacité qu’ils revendiquent"
 
 #: i2p2www/pages/site/comparison/tor.html:129
 msgid ""
 "Floodfill peers (\"directory servers\") are varying and untrusted,\n"
 "rather than hardcoded"
-msgstr ""
-"Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne"
-" sont pas fiables, plutôt que figés dans le code"
+msgstr "Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne sont pas fiables, plutôt que figés dans le code"
 
 #: i2p2www/pages/site/comparison/tor.html:134
 msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
-msgstr ""
-"Tellement petit qu’il n’a pas été bloqué ni subi beaucoup de DOS, ou pas "
-"du tout"
+msgstr "Tellement petit qu’il n’a pas été bloqué ni subi beaucoup de DOS, ou pas du tout"
 
 #: i2p2www/pages/site/comparison/tor.html:135
 msgid "Peer-to-peer friendly"
@@ -800,17 +540,13 @@ msgstr "Commutation de paquets à la place de commutation de circuit"
 msgid ""
 "implicit transparent load balancing of messages \n"
 "across multiple peers, rather than a single path"
-msgstr ""
-"équilibrage de charge transparent et implicite des messages\n"
-"à travers plusieurs pairs, plutôt que par un seul chemin"
+msgstr "équilibrage de charge transparent et implicite des messages\nà travers plusieurs pairs, plutôt que par un seul chemin"
 
 #: i2p2www/pages/site/comparison/tor.html:145
 msgid ""
 "resilience vs. failures by running multiple \n"
 "tunnels in parallel, plus rotating tunnels"
-msgstr ""
-"résistance contre les défaillances, ceci par exécution de plusieurs\n"
-"tunnels en parallèle, ainsi que par rotation des tunnels"
+msgstr "résistance contre les défaillances, ceci par exécution de plusieurs\ntunnels en parallèle, ainsi que par rotation des tunnels"
 
 #: i2p2www/pages/site/comparison/tor.html:151
 msgid ""
@@ -818,21 +554,14 @@ msgid ""
 "of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
 "used by all of the peers Alice is talking with, \n"
 "rather than a circuit for each)"
-msgstr ""
-"s’adapte à l’échelle des connexions de chaque client à O(1) au lieu\n"
-"de O(N) (Alice a par exemple 2 tunnels entrants qui sont\n"
-"utilisés par tous les pairs avec lesquels parle Alice,\n"
-"plutôt qu’un circuit pour chaque)"
+msgstr "s’adapte à l’échelle des connexions de chaque client à O(1) au lieu\nde O(N) (Alice a par exemple 2 tunnels entrants qui sont\nutilisés par tous les pairs avec lesquels parle Alice,\nplutôt qu’un circuit pour chaque)"
 
 #: i2p2www/pages/site/comparison/tor.html:161
 msgid ""
 "Unidirectional tunnels instead of bidirectional\n"
 "circuits, doubling the number of nodes a peer has to\n"
 "compromise to get the same information."
-msgstr ""
-"Tunnels unidirectionnels au lieu de circuits\n"
-"bidirectionnel, doublant le nombre de nœuds qu’un\n"
-"pair doit avoir à compromettre pour obtenir la même information."
+msgstr "Tunnels unidirectionnels au lieu de circuits\nbidirectionnel, doublant le nombre de nœuds qu’un\npair doit avoir à compromettre pour obtenir la même information."
 
 #: i2p2www/pages/site/comparison/tor.html:166
 #, python-format
@@ -846,11 +575,7 @@ msgid ""
 "tunnels are used for more than simply passing end \n"
 "to end messages (e.g. netDb, tunnel management, \n"
 "tunnel testing)"
-msgstr ""
-"Protection contre la détection de l’activité du client, même si un "
-"assaillant participe au tunnel, puisque les tunnels ne sont pas juste "
-"utilisés pour passer simplement des messages de bout en bout (p. ex. "
-"BDréseau, gestion de tunnels, test de tunnels)"
+msgstr "Protection contre la détection de l’activité du client, même si un assaillant participe au tunnel, puisque les tunnels ne sont pas juste utilisés pour passer simplement des messages de bout en bout (p. ex. BDréseau, gestion de tunnels, test de tunnels)"
 
 #: i2p2www/pages/site/comparison/tor.html:180
 msgid ""
@@ -858,19 +583,13 @@ msgid ""
 "of samples that an attacker can use to mount an \n"
 "active attack with, unlike circuits in Tor, which are\n"
 "typically long lived."
-msgstr ""
-"Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le "
-"nombre d’échantillons qu’un assaillant peut utiliser pour lancer une\n"
-"attaque active, contrairement aux circuits dans Tor, qui ont généralement"
-" une durée de vie longue."
+msgstr "Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le nombre d’échantillons qu’un assaillant peut utiliser pour lancer une\nattaque active, contrairement aux circuits dans Tor, qui ont généralement une durée de vie longue."
 
 #: i2p2www/pages/site/comparison/tor.html:188
 msgid ""
 "I2P APIs are designed specifically for anonymity and\n"
 "security, while SOCKS is designed for functionality."
-msgstr ""
-"Les API d’I2P sont conçues précisément pour assurer anonymat et sécurité,"
-" tandis que SOCKS est conçu pour la fonctionnalité."
+msgstr "Les API d’I2P sont conçues précisément pour assurer anonymat et sécurité, tandis que SOCKS est conçu pour la fonctionnalité."
 
 #: i2p2www/pages/site/comparison/tor.html:193
 msgid "Essentially all peers participate in routing for others"
@@ -881,11 +600,7 @@ msgid ""
 "The bandwidth overhead of being a full peer is low, \n"
 "while in Tor, while client nodes don't require much\n"
 "bandwidth, they don't fully participate in the mixnet."
-msgstr ""
-"Être un pair à part entière ne présente qu’une faible surcharge de bande "
-"passante, alors que dans Tor, bien que les nœuds client n’exigent que peu"
-" de bande passante, ils ne participent pas complètement au réseau de "
-"mélange."
+msgstr "Être un pair à part entière ne présente qu’une faible surcharge de bande passante, alors que dans Tor, bien que les nœuds client n’exigent que peu de bande passante, ils ne participent pas complètement au réseau de mélange."
 
 #: i2p2www/pages/site/comparison/tor.html:201
 msgid "Integrated automatic update mechanism"
@@ -905,27 +620,20 @@ msgstr "Autres avantages potentiels d’I2P, mais pas encore mis en œuvre"
 
 #: i2p2www/pages/site/comparison/tor.html:207
 msgid "...and may never be implemented, so don't count on them!"
-msgstr ""
-"… et qui pourraient ne jamais être mis en œuvre, alors ne comptez pas sur"
-" eux !"
+msgstr "… et qui pourraient ne jamais être mis en œuvre, alors ne comptez pas sur eux !"
 
 #: i2p2www/pages/site/comparison/tor.html:210
 msgid ""
 "Defense vs. message count analysis by garlic wrapping \n"
 "multiple messages"
-msgstr ""
-"Défense contre l’analyse du nombre de messages par enveloppement en ail\n"
-"de plusieurs messages"
+msgstr "Défense contre l’analyse du nombre de messages par enveloppement en ail\nde plusieurs messages"
 
 #: i2p2www/pages/site/comparison/tor.html:216
 msgid ""
 "Defense vs. long term intersection by adding delays \n"
 "at various hops (where the delays are not discernible\n"
 "by other hops)"
-msgstr ""
-"Défense contre intersection long terme en ajoutant des retards\n"
-"à différents sauts (où les retards ne sont pas discernables\n"
-"par d’autres sauts)"
+msgstr "Défense contre intersection long terme en ajoutant des retards\nà différents sauts (où les retards ne sont pas discernables\npar d’autres sauts)"
 
 #: i2p2www/pages/site/comparison/tor.html:223
 msgid ""
@@ -933,9 +641,4 @@ msgid ""
 "create a tunnel that will handle 500 messages / minute,\n"
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
-msgstr ""
-"Diverses stratégies de mélange au niveau du tunnel (par exemple\n"
-"créer un tunnel qui va gérer 500 messages / minute,\n"
-"dans lequel le point final va injecter des messages factices si\n"
-"il y a une nombre de messages insuffisant, etc)"
-
+msgstr "Diverses stratégies de mélange au niveau du tunnel (par exemple\ncréer un tunnel qui va gérer 500 messages / minute,\ndans lequel le point final va injecter des messages factices si\nil y a une nombre de messages insuffisant, etc)"
diff --git a/i2p2www/translations/fr/LC_MESSAGES/docs.po b/i2p2www/translations/fr/LC_MESSAGES/docs.po
index dd515ad826905dd9430b9ad1e2726b4cc21fe9c9..44a3e86d6ea4c9789798c12698fde60e56ff2577 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/docs.po
@@ -4556,7 +4556,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:72
 msgid "for"
-msgstr ""
+msgstr "pour"
 
 #: i2p2www/pages/site/docs/applications/git.html:74
 msgid "in order to obscure your local time zone."
diff --git a/i2p2www/translations/fr/LC_MESSAGES/misc.po b/i2p2www/translations/fr/LC_MESSAGES/misc.po
index 92ab2b3c3ce621f53237a321a572167e5f638801..1447c2973ca70c269908782353c593b1bb088484 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/misc.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/misc.po
@@ -1,9 +1,9 @@
-# French translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
-# AO <ao@localizationlab.org>, 2018-2019
+# AO <ao@localizationlab.org>, 2018-2020
 # AO <ao@localizationlab.org>, 2017
 # Boxoa590, 2013
 # Nicolas Belleau <nbbelleau@gmail.com>, 2019
@@ -11,17 +11,18 @@
 # Towinet, 2014-2015
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-02-12 00:06+0000\n"
-"PO-Revision-Date: 2019-11-26 17:01+0000\n"
-"Last-Translator: AO <ao@localizationlab.org>\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: AO <ao@localizationlab.org>, 2018-2020\n"
 "Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n"
-"Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: fr\n"
+"Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #: i2p2www/pages/site/misc/clt.html:2
 msgid "I2P at CLT and PetCon 2009.1"
@@ -30,79 +31,39 @@ msgstr "I2P au CLT et PetCon 2009.1"
 #: i2p2www/pages/site/misc/clt.html:4
 msgid ""
 "Members of I2P will held a talk at CLT and PetCon 2009.1\n"
-"Two members of the I2P team will be at two forthcoming Linux day and "
-"security convention."
-msgstr ""
-"Les membres d’I2P tiendront une conférence à CLT et PetCon 2009.1\n"
-"Deux membres de l’équipe I2P assisteront à deux journées Linux et à une "
-"conférence sur la sécurité à venir."
+"Two members of the I2P team will be at two forthcoming Linux day and security convention."
+msgstr "Les membres d’I2P tiendront une conférence à CLT et PetCon 2009.1\nDeux membres de l’équipe I2P assisteront à deux journées Linux et à une conférence sur la sécurité à venir."
 
 #: i2p2www/pages/site/misc/clt.html:9
 #, python-format
 msgid ""
-"On 14th march of 2009 there will be a short talk about general "
-"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> hold by echelon.\n"
-"Echelon and some other members of the I2P family will attend to the Linux"
-" meeting the whole two days (Saturday and Sunday) and will be "
-"recognizable as I2P family members. Meet them, ask them your questions, "
-"show them your props! Show your support!"
-msgstr ""
-"Le 14 mars 2009 il y aura une courte conférence de présentation générale "
-"d’I2P lors du <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a>, "
-"présentée par echelon.\n"
-"Echelon et quelques autres membres de la famille I2P participeront à la "
-"réunion Linux pendant les deux journées (samedi et dimanche) et seront "
-"reconnaissables comme membres de la famille I2P. Rencontrez-les, posez-"
-"leur vos questions, montrez-leur vos propositions ! Manifestez votre "
-"soutien !"
+"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n"
+"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!"
+msgstr "Le 14 mars 2009 il y aura une courte conférence de présentation générale d’I2P lors du <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a>, présentée par echelon.\nEchelon et quelques autres membres de la famille I2P participeront à la réunion Linux pendant les deux journées (samedi et dimanche) et seront reconnaissables comme membres de la famille I2P. Rencontrez-les, posez-leur vos questions, montrez-leur vos propositions ! Manifestez votre soutien !"
 
 #: i2p2www/pages/site/misc/clt.html:14
 #, python-format
 msgid ""
-"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security "
-"convention</a> in Dresden will take place.\n"
-"Again, echelon will attend this event and hold a short talk about general"
-" introduction to I2P. Another talk about the profiling by the I2P clients"
-" will be held."
-msgstr ""
-"Seulement 10 jours plus tard, le <a href=\"%(petcon)s\">congrès sur la "
-"protection et la sécurité des données</a> aura lieu à Dresden.\n"
-"Encore une fois, echelon participera à cet événement et donnera une brève"
-" présentation générale d’I2P. Un autre exposé sur le profilage par les "
-"clients I2P aura lieu."
+"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n"
+"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held."
+msgstr "Seulement 10 jours plus tard, le <a href=\"%(petcon)s\">congrès sur la protection et la sécurité des données</a> aura lieu à Dresden.\nEncore une fois, echelon participera à cet événement et donnera une brève présentation générale d’I2P. Un autre exposé sur le profilage par les clients I2P aura lieu."
 
 #: i2p2www/pages/site/misc/cvs.html:4
 #, python-format
 msgid ""
-"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a"
-" <a href=\"%(monotone)s\">Monotone</a> repository.\n"
+"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n"
 "For those who aren't very familiar with CVS, there is a\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> "
-"on the\n"
-"subject (developers only need to deal with the first chapter - \"An "
-"Overview of\n"
-"CVS\", as subsequent chapters go into some nasty details very few ever "
-"need to\n"
+"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n"
+"subject (developers only need to deal with the first chapter - \"An Overview of\n"
+"CVS\", as subsequent chapters go into some nasty details very few ever need to\n"
 "touch)."
-msgstr ""
-"Le code source d’I2P était conservé dans un dépôt CVS. De nos jours, il "
-"est conservé dans un dépôt <a href=\"%(monotone)s\">Monotone</a>.\n"
-"Pour ceux qui ne connaissent pas très bien CVS, il existe un <a "
-"href=\"http://cvsbook.red-bean.com/cvsbook.html\">livre fantastique</a> "
-"(en anglais) sur le sujet (les développeurs ne devront s’intéresser qu’au"
-" premier chapitre « An overview of CVS », car les chapitres suivants "
-"entrent dans de vilains détails, qui intéresseront peu de monde)."
+msgstr "Le code source d’I2P était conservé dans un dépôt CVS. De nos jours, il est conservé dans un dépôt <a href=\"%(monotone)s\">Monotone</a>.\nPour ceux qui ne connaissent pas très bien CVS, il existe un <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">livre fantastique</a> (en anglais) sur le sujet (les développeurs ne devront s’intéresser qu’au premier chapitre « An overview of CVS », car les chapitres suivants entrent dans de vilains détails, qui intéresseront peu de monde)."
 
 #: i2p2www/pages/site/misc/cvs.html:31
 msgid ""
-"Humorous quote from WinCVS: \"Did you know...  Never experiment with new "
-"CVS\n"
+"Humorous quote from WinCVS: \"Did you know...  Never experiment with new CVS\n"
 "commands on your working repository.  Create a sample module instead.\""
-msgstr ""
-"Citation humoristique de WinCVS : « Le saviez-vous ? N’expérimentez "
-"jamais de nouvelles commandes CVS sur votre dépôt de travail. Créez "
-"plutôt un module d’entraînement. »"
+msgstr "Citation humoristique de WinCVS : « Le saviez-vous ? N’expérimentez jamais de nouvelles commandes CVS sur votre dépôt de travail. Créez plutôt un module d’entraînement. »"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4
@@ -113,14 +74,9 @@ msgstr "Migration d’I2PTunnel"
 msgid ""
 "After upgrading to the new architecture, you'll have to do a \n"
 "little work to get your old I2PTunnel-driven servers running.  \n"
-"Lets walk through a simple example.  For an eepsite with the \n"
+"Lets walk through a simple example.  For an I2P Site with the \n"
 "old clientApp configuration, you had:"
 msgstr ""
-"Après mise à niveau vers la nouvelle architecture, vous aurez un peu de "
-"travail pour mettre en fonction vos anciens serveurs propulsée par "
-"I2PTunnel.\n"
-"Prenons un exemple simple. Pour un site eep avec l’ancienne configuration"
-" clientApp, vous aviez :"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16
 msgid "To provide that same functionality on the new web architecture:"
@@ -136,12 +92,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\""
 msgstr "Cliquez sur Ajouter : [tunnel serveur] « Aller »"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21
-msgid "For the name: <code>\"eepsite\"</code>"
-msgstr "Pour le nom : <code>« site eep »</code>"
+msgid "For the name: <code>\"I2P Site\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22
-msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>"
-msgstr "Pour la description : <code>« Mon site eep, n’est-il pas beau ? »</code>"
+msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23
 msgid ">For the target host:"
@@ -155,10 +111,7 @@ msgstr "Pour le port cible :"
 msgid ""
 "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n"
 "(it is recommended to copy that .dat to your new install dir)"
-msgstr ""
-"Pour le fichier de clé privée : <code>chemin vers "
-"« monWebPriv.dat »</code><br />(il est recommandé de copier ce .dat vers "
-"votre nouveau répertoire d’installation)"
+msgstr "Pour le fichier de clé privée : <code>chemin vers « monWebPriv.dat »</code><br />(il est recommandé de copier ce .dat vers votre nouveau répertoire d’installation)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29
 msgid "Check the \"Start automatically?\" checkbox"
@@ -174,14 +127,10 @@ msgstr "Vous obtiendrez :"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39
 msgid ""
-"That's it!  Creating a new I2PTunnel server works the same way too, "
-"except you\n"
-"don't need to \"copy the old file\", obviously.  Behind the scenes, it is"
-" all driven\n"
-"by the <code>i2ptunnel.config</code> file, which you may modify "
-"externally (if you do,\n"
-"hit \"Reload config\" on the I2PTunnel web page, which will tear down all"
-" of your \n"
+"That's it!  Creating a new I2PTunnel server works the same way too, except you\n"
+"don't need to \"copy the old file\", obviously.  Behind the scenes, it is all driven\n"
+"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n"
+"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n"
 "existing tunnels and rebuild new ones)"
 msgstr ""
 
@@ -199,7 +148,7 @@ msgid "I2PTunnel services"
 msgstr "Services d’I2PTunnel"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:4
-msgid "Below is quick copy of aum's eepsite deployment guide."
+msgid "Below is quick copy of aum's I2P Site deployment guide."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:8
@@ -215,23 +164,23 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:13
 msgid ""
-"I recommend the Tiny Httpd web server, thttpd, (windows version available"
-" on site) although you can use anything that you feel comfortable with."
+"I recommend the Tiny Httpd web server, thttpd, (windows version available on"
+" site) although you can use anything that you feel comfortable with."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:16
 msgid ""
 "Another more robust option would be to use EasyPHP, which is also open "
 "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For "
-"newbies who have no experience setting up and hosting content over "
-"servers, see the hosting page for help."
+"newbies who have no experience setting up and hosting content over servers, "
+"see the hosting page for help."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:19
 msgid ""
-"With the web server you've chosen, configure it to listen on a port of "
-"your choice, and serve its documents from a directory of your choice. For"
-" this example, we'll assume port 10880."
+"With the web server you've chosen, configure it to listen on a port of your "
+"choice, and serve its documents from a directory of your choice. For this "
+"example, we'll assume port 10880."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:22
@@ -244,8 +193,8 @@ msgstr ""
 msgid ""
 "Test the webserver, by pointing your normal browser (the one with the "
 "\"direct connection\") at <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the "
-"port number you have chosen)."
+"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port"
+" number you have chosen)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:28
@@ -260,28 +209,28 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:35
 msgid ""
-"I2P does not deal in IP addresses. To protect your anonymity, it deals in"
-" unique addresses called destination keys."
+"I2P does not deal in IP addresses. To protect your anonymity, it deals in "
+"unique addresses called destination keys."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:38
 msgid ""
 "A destination key works a lot like a regular IP address, except that it "
-"can't be traced to your IP address or physical location. When users place"
-" a request to speak with you, your gateways are the ones that answer for "
-"you. So the requesting user can only know the IP address of your "
-"gateways. However, gateways don't know your IP address, because gateways "
-"are the last nodes on your tunnels, and you anonymously create tunnels by"
-" way of garlic routing. (So gateways are like puppets that can't see "
-"their masters, and everyone communicates through these puppets)"
+"can't be traced to your IP address or physical location. When users place a "
+"request to speak with you, your gateways are the ones that answer for you. "
+"So the requesting user can only know the IP address of your gateways. "
+"However, gateways don't know your IP address, because gateways are the last "
+"nodes on your tunnels, and you anonymously create tunnels by way of garlic "
+"routing. (So gateways are like puppets that can't see their masters, and "
+"everyone communicates through these puppets)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:41
 msgid ""
 "To deploy a server on I2P, you create a destination keypair. You use the "
-"private key to authenticate your server when connecting it to I2P, and "
-"you make the public key (aka destination key) known publicly, so others "
-"can connect to your server. (indirectly, through your gateways)"
+"private key to authenticate your server when connecting it to I2P, and you "
+"make the public key (aka destination key) known publicly, so others can "
+"connect to your server. (indirectly, through your gateways)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:44
@@ -304,9 +253,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:53
 msgid ""
-"The filenames <code>myWebPrivKey.dat</code> and "
-"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want "
-"here, as long as you understand your own choices."
+"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>"
+" are arbitrary - choose whatever you want here, as long as you understand "
+"your own choices."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:56
@@ -317,27 +266,27 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:59
 msgid ""
-"To convert your myWebPubKey.dat file into shareable base64, type the "
-"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (all on one line)."
+"To convert your myWebPubKey.dat file into shareable base64, type the command"
+" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; "
+"myWebPubKey.txt</code> (all on one line)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:62
 msgid ""
-"This file you have just generated, <code>myWebPubKey.txt</code>, contains"
-" a long base64 string (516 chars at last count), which we call a "
-"destination key. All you need to know about this string for now is that "
-"it allows remote clients to uniquely pinpoint and connect to your server,"
-" just the same way as an IP address allows remote machines to pinpoint "
-"and connect to your machine."
+"This file you have just generated, <code>myWebPubKey.txt</code>, contains a "
+"long base64 string (516 chars at last count), which we call a destination "
+"key. All you need to know about this string for now is that it allows remote"
+" clients to uniquely pinpoint and connect to your server, just the same way "
+"as an IP address allows remote machines to pinpoint and connect to your "
+"machine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:65
 msgid ""
 "However, in contrast to an IP address, there is no way to trace your "
-"machine's physical location - even though your server can be addressed "
-"via I2P, your IP address cannot be traced or associated with this "
-"destination key."
+"machine's physical location - even though your server can be addressed via "
+"I2P, your IP address cannot be traced or associated with this destination "
+"key."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:70
@@ -346,9 +295,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:72
 msgid ""
-"For clients elsewhere in I2P to be able to access your server, you must "
-"run a 'bridge' or 'tunnel', which takes connections from these clients "
-"and forwards them to your local server."
+"For clients elsewhere in I2P to be able to access your server, you must run "
+"a 'bridge' or 'tunnel', which takes connections from these clients and "
+"forwards them to your local server."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:75
@@ -373,9 +322,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:84
 msgid ""
-"Within a few seconds, the 'tunnel' should now be active, and remote "
-"clients should be able to reach your server anonymously. Remember to let "
-"your router \"warm up\" before opening clients to it."
+"Within a few seconds, the 'tunnel' should now be active, and remote clients "
+"should be able to reach your server anonymously. Remember to let your router"
+" \"warm up\" before opening clients to it."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:89
@@ -393,9 +342,9 @@ msgstr ""
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:94
 msgid ""
 "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where "
-"myserver.i2p is an I2P 'domain' you want to associate with your site, and"
-" the blahblahblah is the text of the base64 public key you created "
-"earlier in the file myWebPubKey.txt"
+"myserver.i2p is an I2P 'domain' you want to associate with your site, and "
+"the blahblahblah is the text of the base64 public key you created earlier in"
+" the file myWebPubKey.txt"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:97
@@ -429,45 +378,42 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:117
 msgid ""
-"As you grow into I2P and get more of a 'feel' for it, you will want to "
-"use all manner of servers and clients."
+"As you grow into I2P and get more of a 'feel' for it, you will want to use "
+"all manner of servers and clients."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:120
 msgid ""
-"The beauty of I2P is that it allows standard Internet clients and servers"
-" for most protocols to be transparently 'tunneled' through the anonymous "
+"The beauty of I2P is that it allows standard Internet clients and servers "
+"for most protocols to be transparently 'tunneled' through the anonymous "
 "network."
-msgstr ""
-"Ce qu’il y a de bien avec I2P, c’est qu’elle permet, pour la plupart des "
-"protocoles, aux clients et serveurs Internet normaux d’être tunnellisés "
-"de manière transparente par le réseau anonyme."
+msgstr "Ce qu’il y a de bien avec I2P, c’est qu’elle permet, pour la plupart des protocoles, aux clients et serveurs Internet normaux d’être tunnellisés de manière transparente par le réseau anonyme."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:123
 msgid ""
-"You can run mailservers/clients, nameservers/clients, newsservers/clients"
-" - almost anything at all - perhaps even FTP in passive mode."
+"You can run mailservers/clients, nameservers/clients, newsservers/clients - "
+"almost anything at all - perhaps even FTP in passive mode."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:126
 msgid ""
-"Now, we'll create a client tunnel. This is like the server tunnel we "
-"created earlier, but works in reverse. It listens to a port on your local"
-" machine; your local client connects to this port; the connection gets "
-"forwarded through I2P to the service on the other end."
+"Now, we'll create a client tunnel. This is like the server tunnel we created"
+" earlier, but works in reverse. It listens to a port on your local machine; "
+"your local client connects to this port; the connection gets forwarded "
+"through I2P to the service on the other end."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:129
 msgid ""
-"To open your client tunnel for your server, type the command <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (all one line)."
+"To open your client tunnel for your server, type the command <code>java -jar"
+" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 "
+"textofbase64key\"</code> (all one line)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:132
 msgid ""
-"The port 10888 is arbitrary - it just needs to be something other than "
-"the physical port your server is listening on."
+"The port 10888 is arbitrary - it just needs to be something other than the "
+"physical port your server is listening on."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:135
@@ -499,11 +445,10 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:147
 msgid ""
-"You use the same procedure for using any local client program to access a"
-" remote I2P server - just get the base64 public key (called destination "
-"key) of the remote server, choose a local port to connect to the remote "
-"server, open the tunnel, and just connect with your client to your "
-"heart's content."
+"You use the same procedure for using any local client program to access a "
+"remote I2P server - just get the base64 public key (called destination key) "
+"of the remote server, choose a local port to connect to the remote server, "
+"open the tunnel, and just connect with your client to your heart's content."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:152
@@ -514,25 +459,25 @@ msgstr ""
 msgid ""
 "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's "
 "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. "
-"Others will then be able to reach your server remotely, without either of"
-" you jeopardizing your anonymity."
+"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others"
+" will then be able to reach your server remotely, without either of you "
+"jeopardizing your anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:157
 msgid ""
-"Remember, you can go to What's on I2P and find the latest public keys "
-"linked to their URL. You should also post your own public key and URL "
-"their. However, you will want to do this anonymously, of course. "
-"Drupal.i2p.net is currently, as of this writing, only accessible from the"
-" net. So, to access the outside WWW anonymously from inside of I2P, you "
-"will need to start up your script called startSquid. Do it the same way "
-"you have been doing these other scripts. Reconfigure your browser to "
-"proxy on localhost:5555, as defined in the script, and when the script "
-"has generated it's keys, you can access the squid proxy. Put any WWW URL "
-"(such as Google or this i2p site) into your browser's address bar and you"
-" will be surfing the World Wide Web anonymously. Now you can safely post "
-"your public key, and no one can detect your IP address."
+"Remember, you can go to What's on I2P and find the latest public keys linked"
+" to their URL. You should also post your own public key and URL their. "
+"However, you will want to do this anonymously, of course. Drupal.i2p.net is "
+"currently, as of this writing, only accessible from the net. So, to access "
+"the outside WWW anonymously from inside of I2P, you will need to start up "
+"your script called startSquid. Do it the same way you have been doing these "
+"other scripts. Reconfigure your browser to proxy on localhost:5555, as "
+"defined in the script, and when the script has generated it's keys, you can "
+"access the squid proxy. Put any WWW URL (such as Google or this i2p site) "
+"into your browser's address bar and you will be surfing the World Wide Web "
+"anonymously. Now you can safely post your public key, and no one can detect "
+"your IP address."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:162
@@ -541,8 +486,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:164
 msgid ""
-"It would drive most people crazy, going through all these steps every "
-"time one sets up an I2P server, and/or deploys a client."
+"It would drive most people crazy, going through all these steps every time "
+"one sets up an I2P server, and/or deploys a client."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:167
@@ -551,8 +496,8 @@ msgid ""
 "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called "
 "setupServer.py which automates all this nonsense into one simple command "
 "line . But I respect that people's tastes in user interfaces differ, and "
-"trying to write something which satisfies everyone's needs usually "
-"results in something so complex that it turns into newbie-repellent."
+"trying to write something which satisfies everyone's needs usually results "
+"in something so complex that it turns into newbie-repellent."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:170
@@ -563,16 +508,16 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:173
 msgid ""
-"Also, you may want to write a script which handles the startup of the I2P"
-" Router, the eepProxy, plus any and all tunnels you are using. I've got "
-"such a script called startEverything.sh, which gets launched at system "
-"startup. (Be sure to search this site for template scripts to automate "
-"your I2P commands. If I create a page for one, I'll try to remember to "
-"link it here."
+"Also, you may want to write a script which handles the startup of the I2P "
+"Router, the eepProxy, plus any and all tunnels you are using. I've got such "
+"a script called startEverything.sh, which gets launched at system startup. "
+"(Be sure to search this site for template scripts to automate your I2P "
+"commands. If I create a page for one, I'll try to remember to link it here."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:176
-msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
+msgid ""
+"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
 msgstr ""
 
 #: i2p2www/pages/site/misc/invisiblenet.html:2
@@ -581,13 +526,11 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/invisiblenet.html:5
 msgid ""
-"Following is a list of documents originally on www.invisiblenet.net/i2p/ "
-"and\n"
+"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n"
 "rescued via the\n"
 "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
 "They are quite dated and may or may not be accurate.\n"
-"However, the I2CP and I2NP documents in particular have some good "
-"information."
+"However, the I2CP and I2NP documents in particular have some good information."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:3
@@ -600,8 +543,7 @@ msgstr "Vue d’ensemble"
 
 #: i2p2www/pages/site/misc/jbigi.html:7
 msgid ""
-"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a "
-"little\n"
+"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n"
 "manual work and a piece of chewing gum we have made several\n"
 "cryptography operations quite a bit faster."
 msgstr ""
@@ -615,18 +557,15 @@ msgid ""
 "<a href=\"%(func)s\">mpz_powm()</a>\n"
 "as a replacement for the\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n"
-"As modPow() is a significant computational portion of many crypto "
-"operations, this is of significant benefit."
+"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:25
 #, python-format
 msgid ""
-"The standard I2P installation includes about 20 versions of the library "
-"for different platforms,\n"
+"The standard I2P installation includes about 20 versions of the library for different platforms,\n"
 "each about 50KB, inside the jbigi.jar file.\n"
-"The initialization of the JBigI library, including CPU identification, "
-"selection, and extraction\n"
+"The initialization of the JBigI library, including CPU identification, selection, and extraction\n"
 "of the correct loadable module, is handled by the\n"
 "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n"
 "If no module is available for the current platform, the standard\n"
@@ -640,8 +579,7 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:39
 msgid ""
-"Following are the instructions to build a new jbigi library for your own "
-"platform\n"
+"Following are the instructions to build a new jbigi library for your own platform\n"
 "and testing its performance."
 msgstr ""
 
@@ -652,31 +590,25 @@ msgstr "Exigences"
 #: i2p2www/pages/site/misc/jbigi.html:43
 msgid ""
 "This works on Linux, and with a few changes in build.sh probably also on\n"
-"other platforms. FreeBSD has also been reported to work too. On Kaffee "
-"the\n"
-"speedup is very small, because it already uses native BitInteger "
-"internally.\n"
+"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n"
+"speedup is very small, because it already uses native BitInteger internally.\n"
 "Blackdown seems to cause strange errors. Because you are going to do\n"
 "compilation, you need JDK; JRE won't work."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:50
 msgid ""
-"The required code is available in monotone database and the latest source"
-" tarball. "
+"The required code is available in monotone database and the latest source "
+"tarball. "
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:51
 msgid ""
 "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n"
-"included in your OS / distribution or installed already, it can be "
-"received from\n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Even if you\n"
-"have already installed it as binary, it might still be worth a try to "
-"compile\n"
-"GMP yourself, since then it will be able to use the specific instructions"
-" of\n"
+"included in your OS / distribution or installed already, it can be received from\n"
+"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n"
+"have already installed it as binary, it might still be worth a try to compile\n"
+"GMP yourself, since then it will be able to use the specific instructions of\n"
 "your processor. The latest GMP may also\n"
 "be used instead of GMP 5.0.2, but it hasn't been tested by us."
 msgstr ""
@@ -687,20 +619,13 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:63
 msgid ""
-"Look at <a href=\"http://localhost:7657/logs.jsp\">your running "
-"environment on the logs.jsp page</a>.\n"
+"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n"
 "There should be one of two status messages for JBigI - either"
-msgstr ""
-"Vous trouverez les informations sur votre environnement d’exécution sur "
-"<a href=\"http://localhost:7657/logs.jsp\">la page logs.jsp</a>.\n"
-"Il devrait y avoir un message d’état pour JBigI sur deux possibilités. "
-"Soit"
+msgstr "Vous trouverez les informations sur votre environnement d’exécution sur <a href=\"http://localhost:7657/logs.jsp\">la page logs.jsp</a>.\nIl devrait y avoir un message d’état pour JBigI sur deux possibilités. Soit"
 
 #: i2p2www/pages/site/misc/jbigi.html:66
 msgid "Locally optimized native BigInteger loaded from the library path"
-msgstr ""
-"BigInteger natif optimisé localement a été chargé du chemin de la "
-"bibliothèque"
+msgstr "BigInteger natif optimisé localement a été chargé du chemin de la bibliothèque"
 
 #: i2p2www/pages/site/misc/jbigi.html:68
 msgid "or"
@@ -708,9 +633,7 @@ msgstr "soit"
 
 #: i2p2www/pages/site/misc/jbigi.html:70
 msgid "Native BigInteger library jbigi not loaded - using pure java"
-msgstr ""
-"La bibliothèque native BigInteger JBigI n’a pas été à chargée. "
-"Utilisation de Java pur"
+msgstr "La bibliothèque native BigInteger JBigI n’a pas été à chargée. Utilisation de Java pur"
 
 #: i2p2www/pages/site/misc/jbigi.html:71
 msgid ""
@@ -724,27 +647,20 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:78
 msgid ""
-"Look on <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"to see what the lifetime average values for "
-"<code>crypto.elGamal.decrypt</code> and\n"
-"<code>crypto.elGamal.encrypt</code> are. The numbers are times in "
-"milliseconds. Copy these somewhere so you can compare\n"
+"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n"
+"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n"
 "them later on.\n"
 "The network average for encrypt time is about 20ms.\n"
-"If your encrypt time is less than 50ms for a relatively new processor, or"
-" less than 100ms\n"
-"for an older processor, and the native BigInteger library was loaded, you"
-" are probably fine."
+"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n"
+"for an older processor, and the native BigInteger library was loaded, you are probably fine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:87
 #, python-format
 msgid ""
 "Get the latest released source code of I2P from\n"
-"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge "
-"source\n"
+"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n"
 "out of the monotone database mtn.i2p2.de"
 msgstr ""
 
@@ -758,18 +674,14 @@ msgid ""
 "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n"
 "Use the 'dynamic' argument to build.sh.\n"
 "Otherwise, you must download GMP version 5.0.2 from\n"
-"from <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"saving it to gmp-5.0.2.tar.bz2.\n"
-"If you decide to use a newer version, change the VER= line in "
-"<code>core/c/jbigi/build.sh</code>."
+"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n"
+"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:101
 msgid ""
 "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n"
-"environment variable is set and you are using Linux then it might just "
-"work.\n"
+"environment variable is set and you are using Linux then it might just work.\n"
 "Otherwise change the settings. Remember, you need the Java SDK installed."
 msgstr ""
 
@@ -777,17 +689,13 @@ msgstr ""
 msgid ""
 "Run <code>build.sh</code> (if you downloaded GMP) or\n"
 "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n"
-"Maybe the build spewed out some errors of missing jni.h and jni_md.h "
-"files.\n"
-"Either copy these files from your java install into the "
-"core/c/jbigi/jbigi/include/ directory,\n"
+"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n"
+"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n"
 "or fix $JAVA_HOME.<br>\n"
-"You can run the <code>build.sh</code> from the <code>core/c/</code> "
-"directory which will\n"
+"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n"
 "build all available jbigi libs into a jbigi.jar.</br>\n"
 "A file named <code>libjbigi.so</code> should be created in the current\n"
-"directory. If this doesn't happen and/or you get errors then please "
-"report\n"
+"directory. If this doesn't happen and/or you get errors then please report\n"
 "them."
 msgstr ""
 
@@ -815,11 +723,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:131
 msgid ""
-"On <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"the <code>crypto.elGamal.decrypt</code> and "
-"<code>crypto.elGamal.encrypt</code>\n"
+"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n"
 "should be a lot faster."
 msgstr ""
 
@@ -829,43 +734,28 @@ msgstr "Annonce de Jrandom"
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:4
 msgid ""
-"The following message was received in mid-November 2007. We have no "
-"further information\n"
+"The following message was received in mid-November 2007. We have no further information\n"
 "on jrandom's status."
-msgstr ""
-"Le message ci-dessous a été reçu à la mi-novembre 2007. Nous n’avons "
-"aucune information complémentaire concernant l’état de jrandom."
+msgstr "Le message ci-dessous a été reçu à la mi-novembre 2007. Nous n’avons aucune information complémentaire concernant l’état de jrandom."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:9
 #, python-format
 msgid ""
 "Subsequently, in an unrelated incident, the hosting company for\n"
 "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n"
-"on January 13, 2008, and the i2p.net servers did not fully return to "
-"service.\n"
+"on January 13, 2008, and the i2p.net servers did not fully return to service.\n"
 "As only jrandom has the credentials required to restore service,\n"
 "and he could not be contacted,\n"
 "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n"
 "and related subdomains."
-msgstr ""
-"Par la suite, lors d’un incident distinct, l’entreprise d’hébergement de "
-"tous les serveurs *.i2p.net (sauf le forum i2p.net) a subi une coupure de"
-" courant le 13 janvier 2008 et les serveurs i2p.net n’ont pas "
-"complètement été remis en service.\n"
-"Comme seul jrandom avait les identifiants exigés pour restaurer le "
-"service et qu’il ne pouvait pas être contacté, nous avons déménagé tous "
-"les services publics vers <a href=\"%(site)s\">www.i2p2.de</a> et les "
-"sous-domaines connexes."
+msgstr "Par la suite, lors d’un incident distinct, l’entreprise d’hébergement de tous les serveurs *.i2p.net (sauf le forum i2p.net) a subi une coupure de courant le 13 janvier 2008 et les serveurs i2p.net n’ont pas complètement été remis en service.\nComme seul jrandom avait les identifiants exigés pour restaurer le service et qu’il ne pouvait pas être contacté, nous avons déménagé tous les services publics vers <a href=\"%(site)s\">www.i2p2.de</a> et les sous-domaines connexes."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:19
 #, python-format
 msgid ""
 "Approximately two months later, for unrelated reasons,\n"
 "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>."
-msgstr ""
-"Environ deux mois plus tard, pour des raisons distinctes, le "
-"forum i2p.net a été déménagé vers <a "
-"href=\"http://%(forum)s/\">%(forum)s</a>."
+msgstr "Environ deux mois plus tard, pour des raisons distinctes, le forum i2p.net a été déménagé vers <a href=\"http://%(forum)s/\">%(forum)s</a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:2
 #: i2p2www/pages/site/misc/manual-wrapper.html:4
@@ -875,33 +765,24 @@ msgstr ""
 #: i2p2www/pages/site/misc/manual-wrapper.html:6
 #, python-format
 msgid ""
-"The installation package for the <a href=\"%(downloads)s\">I2P router</a>"
-" comes\n"
-"with a Java wrapper for the most common architectures. If your system is "
-"not\n"
-"supported by our installer&mdash;or if you want to update the wrapper to "
-"a\n"
-"newer version&mdash;the following steps describe installing the wrapper "
-"manually."
+"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n"
+"with a Java wrapper for the most common architectures. If your system is not\n"
+"supported by our installer&mdash;or if you want to update the wrapper to a\n"
+"newer version&mdash;the following steps describe installing the wrapper manually."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:14
 msgid ""
-"Check Tanuki Software's <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download"
-" page</a>\n"
+"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n"
 "for your platform. Is your platform listed? If so, you're in\n"
-"luck! Download the most recent version of the Community Edition for your "
-"OS and\n"
+"luck! Download the most recent version of the Community Edition for your OS and\n"
 "CPU and move to <a href=\"#packaged\">the next step</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:20
 msgid ""
-"If your platform does not have an already compiled wrapper available, you"
-"\n"
-"may be able to compile it yourself. If you are willing to have a go at "
-"it, move\n"
+"If your platform does not have an already compiled wrapper available, you\n"
+"may be able to compile it yourself. If you are willing to have a go at it, move\n"
 "on to <a href=\"#compiling\">compiling</a> the wrapper for your system."
 msgstr ""
 
@@ -910,7 +791,8 @@ msgid "Using existing binaries"
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:28
-msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>."
+msgid ""
+"In the steps below, $I2P means <em>the location I2P was installed to</em>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:36
@@ -926,8 +808,8 @@ msgstr ""
 #: i2p2www/pages/site/misc/manual-wrapper.html:39
 #: i2p2www/pages/site/misc/manual-wrapper.html:67
 msgid ""
-"If this did not work you'll need to use <code>runplain.sh</code> to start"
-" I2P."
+"If this did not work you'll need to use <code>runplain.sh</code> to start "
+"I2P."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:43
@@ -936,16 +818,15 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:44
 msgid ""
-"These steps worked to compile the wrapper for use on a mipsel system "
-"running Debian. The steps <strong>will</strong> need to be altered for "
-"your system."
+"These steps worked to compile the wrapper for use on a mipsel system running"
+" Debian. The steps <strong>will</strong> need to be altered for your system."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:48
 msgid ""
-"Download the source archive for the community version of the wrapper from"
-" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download"
-" page</a>."
+"Download the source archive for the community version of the wrapper from <a"
+" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download "
+"page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:49
@@ -954,8 +835,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:51
 msgid ""
-"Set environment variables <code>ANT_HOME</code> and "
-"<code>JAVA_HOME</code>. For example, in Debian:"
+"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. "
+"For example, in Debian:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:54
@@ -994,191 +875,110 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:47
 msgid ""
-"An optimized form, designed to handle only 128KB [1] files and pages, can"
-"\n"
+"An optimized form, designed to handle only 128KB [1] files and pages, can\n"
 "operate significantly faster:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:71
 msgid ""
 "The difference in network load and latency is significant - this is\n"
-"essentially a UDP version of HTTP.  On the normal web, we can't really do"
-" that,\n"
-"since most HTTP requests and responses are orders of magnitude larger "
-"than UDP\n"
-"packets functionally support, but in I2P, messages can be large.  The "
-"savings\n"
-"for the network load comes from the fact that we don't need to send any "
-"ACK\n"
+"essentially a UDP version of HTTP.  On the normal web, we can't really do that,\n"
+"since most HTTP requests and responses are orders of magnitude larger than UDP\n"
+"packets functionally support, but in I2P, messages can be large.  The savings\n"
+"for the network load comes from the fact that we don't need to send any ACK\n"
 "messages - rather than the earlier wrap/unwrap request (that bundles a\n"
-"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery),"
-" the\n"
-"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there"
-" are no\n"
+"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n"
+"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n"
 "resends)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:83
 msgid ""
-"The data that the MinWWW proxy and server need to wrap is trivial - when "
-"the\n"
-"proxy wants to send \"GET /\", it prepends it with the I2P Destination "
-"sending\n"
-"the request, followed by a 4 byte request ID.  The MinWWW server receives"
-" those\n"
-"requests, contacts the appropriate HTTPD, sends the request, waits for "
-"the\n"
+"The data that the MinWWW proxy and server need to wrap is trivial - when the\n"
+"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n"
+"the request, followed by a 4 byte request ID.  The MinWWW server receives those\n"
+"requests, contacts the appropriate HTTPD, sends the request, waits for the\n"
 "response, and sends a reply to the MinWWW proxy containing the response,\n"
-"prefixed with the original request ID.  That response is taken and passed"
-" back\n"
+"prefixed with the original request ID.  That response is taken and passed back\n"
 "to the browser and the connection is closed."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:93
 msgid ""
 "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n"
-"list, going through some round robin or other algorithm, so that there "
-"are\n"
-"multiple outproxies merged transparently.  The bandwidth required for "
-"running\n"
-"one of these outproxies is also greatly reduced, since it will only "
-"handle 128KB\n"
+"list, going through some round robin or other algorithm, so that there are\n"
+"multiple outproxies merged transparently.  The bandwidth required for running\n"
+"one of these outproxies is also greatly reduced, since it will only handle 128KB\n"
 "files (aka no one is going to be downloading porn, warez, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:101
 msgid ""
-"The functionality /is/ limited, but 128KB of data is a lot for a single "
-"HTTP\n"
-"request or response.  The above diagrams are also unrealistic in their "
-"hops -\n"
-"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send "
-"each\n"
-"of the messages through two additional outbound routers, then forwarded "
-"to\n"
-"two additional inbound routers to ROUTERB, so the lag there is "
-"significant -\n"
-"while the above only saves 11 steps, 8 of those steps need to traverse "
-"the\n"
-"entire tunnel path (4+ remote hops each time when tunnels are 2 remote "
-"hops\n"
-"in each stretch), leaving MinWWW with only two full traversals (one for "
-"the\n"
+"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n"
+"request or response.  The above diagrams are also unrealistic in their hops -\n"
+"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send each\n"
+"of the messages through two additional outbound routers, then forwarded to\n"
+"two additional inbound routers to ROUTERB, so the lag there is significant -\n"
+"while the above only saves 11 steps, 8 of those steps need to traverse the\n"
+"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n"
+"in each stretch), leaving MinWWW with only two full traversals (one for the\n"
 "request, one for the response), instead of 10."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:113
 msgid ""
-"Implementing the MinWWW proxy and server should be fairly easy - read an "
-"HTTP\n"
-"request from the client fully (perhaps only start out with HTTP GET, "
-"leaving\n"
-"HTTP POST for later), wrap the message, and wait for the response.  The "
-"server\n"
-"in turn simply needs to parse the request to either open a socket or URL,"
-"\n"
-"send the request, wait for the response, and send it back through the "
-"network.\n"
+"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n"
+"request from the client fully (perhaps only start out with HTTP GET, leaving\n"
+"HTTP POST for later), wrap the message, and wait for the response.  The server\n"
+"in turn simply needs to parse the request to either open a socket or URL,\n"
+"send the request, wait for the response, and send it back through the network.\n"
 "If someone were to implement this, it would be Good :)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:122
 msgid ""
-"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary "
-"message\n"
-"size, but that's going to be going away since it involves either "
-"excessive memory\n"
-"overhead on intermediary routers, or additional implementation details to"
-"\n"
-"handle.  I2PTunnel is currently limited to 128KB and hasn't been a "
-"burden,\n"
+"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary message\n"
+"size, but that's going to be going away since it involves either excessive memory\n"
+"overhead on intermediary routers, or additional implementation details to\n"
+"handle.  I2PTunnel is currently limited to 128KB and hasn't been a burden,\n"
 "so perhaps it could be increased to 256KB when the I2CP spec is updated)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:4
 msgid ""
-"There has been discussion about a distributed blogging application for a "
-"few\n"
-"months now called \"MyI2P\".  While the original discussions were lost, "
-"we were \n"
-"able to retrieve a Google <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
-"of it.  It isn't pretty, but it includes the basic overview and some "
-"discussion\n"
+"There has been discussion about a distributed blogging application for a few\n"
+"months now called \"MyI2P\".  While the original discussions were lost, we were \n"
+"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
+"of it.  It isn't pretty, but it includes the basic overview and some discussion\n"
 "that ensued."
-msgstr ""
-"Depuis déjà quelques mois, il y a eu des discussions au sujet d’une "
-"application distribuée de blogage appelée « MyI2P ». Bien que les "
-"discussions originales aient été perdues, nous avons réussi à en "
-"récupérer une version dans le <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> de "
-"Google. Ce n’est pas très beau, mais inclut un aperçu de base et "
-"certaines discussions qui s’ensuivirent."
+msgstr "Depuis déjà quelques mois, il y a eu des discussions au sujet d’une application distribuée de blogage appelée « MyI2P ». Bien que les discussions originales aient été perdues, nous avons réussi à en récupérer une version dans le <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> de Google. Ce n’est pas très beau, mais inclut un aperçu de base et certaines discussions qui s’ensuivirent."
 
 #: i2p2www/pages/site/misc/myi2p.html:12
 #, python-format
 msgid ""
-"The application itself is not yet implemented, and the ideas behind it "
-"have \n"
-"been made less ambitious over time, but they are still valid and the "
-"current \n"
-"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality "
-"available \n"
-"along side the I2P 1.0 release.  That will include a distributed address "
-"book\n"
-"to enable secure, distributed, and human readable naming by sacrificing "
-"the \n"
-"need for global uniqueness - basically everyone has their own local "
-"address book \n"
-"and can 'subscribe' to other people's address books, letting MyI2P "
-"periodically\n"
-"retrieve new name to destination mappings (leaving conflicts up to the "
-"user to\n"
-"resolve).  In addition to the address book, there will be a distributed "
-"blogging\n"
+"The application itself is not yet implemented, and the ideas behind it have \n"
+"been made less ambitious over time, but they are still valid and the current \n"
+"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n"
+"along side the I2P 1.0 release.  That will include a distributed address book\n"
+"to enable secure, distributed, and human readable naming by sacrificing the \n"
+"need for global uniqueness - basically everyone has their own local address book \n"
+"and can 'subscribe' to other people's address books, letting MyI2P periodically\n"
+"retrieve new name to destination mappings (leaving conflicts up to the user to\n"
+"resolve).  In addition to the address book, there will be a distributed blogging\n"
 "system using a reduced and secured subset of \n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to "
-"essentially\n"
-"provide an anonymous <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
-"a 'friends list' and transparent access control (authenticated by the I2P"
-"\n"
-"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the "
-"address book)."
-msgstr ""
-"L’application même n’est pas encore mise en œuvre et les idées qui sous-"
-"tendent sa conception sont devenues moins ambitieuses au fil du temps. "
-"Elles sont cependant encore valides et le <a "
-"href=\"%(roadmap)s\">plan</a> actuel prévoit que la fonctionnalité "
-"principale MyI2P soit proposée en parallèle à la version 1.0 d’I2P. Un "
-"carnet d’adresses distribué sera inclus afin de permettre un adressage "
-"sécurisé, distribué et interprétable par l’utilisateur en sacrifiant le "
-"besoin d’unicité globale. Essentiellement, tout le monde aura son propre "
-"carnet d’adresses local et pourra « s’abonner » aux carnets d’adresses "
-"d’autrui, en laissant MyI2P récupérer périodiquement les mappages des "
-"nouveaux noms vers les destinations (en laissant la résolution des "
-"conflits à l’utilisateur). En plus du carnet d’adresses, il y aura un "
-"système de blogage distribué utilisant un sous-ensemble réduit et "
-"sécurisé de <a "
-"href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> afin "
-"d’offrir essentiellement un <a "
-"href=\"http://www.livejournal.com/\">« LiveJournal »</a> anonyme avec une"
-" liste d’amis et un contrôle d’accès transparent authentifié par les <a "
-"href=\"%(datagrams)s\">datagrammes</a> d’I2P avec des règles définies "
-"d’après le carnet d’adresses."
+"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n"
+"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
+"a 'friends list' and transparent access control (authenticated by the I2P\n"
+"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)."
+msgstr "L’application même n’est pas encore mise en œuvre et les idées qui sous-tendent sa conception sont devenues moins ambitieuses au fil du temps. Elles sont cependant encore valides et le <a href=\"%(roadmap)s\">plan</a> actuel prévoit que la fonctionnalité principale MyI2P soit proposée en parallèle à la version 1.0 d’I2P. Un carnet d’adresses distribué sera inclus afin de permettre un adréessage sécurisé, distribué et interprétable par l’utilisateur en sacrifiant le besoin d’unicité globale. Essentiellement, tout le monde aura son propre carnet d’adresses local et pourra « s’abonner » aux carnets d’adresses d’autrui, en laissant MyI2P récupérer périodiquement les mappages des nouveaux noms vers les destinations (en laissant la résolution des conflits à l’utilisateur). En plus du carnet d’adresses, il y aura un système de blogage distribué utilisant un sous-ensemble réduit et sécurisé de <a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> afin d’offrir essentiellement un <a href=\"http://www.livejournal.com/\">« LiveJournal »</a> anonyme avec une liste d’amis et un contrôle d’accès transparent authentifié par les <a href=\"%(datagrams)s\">datagrammes</a> d’I2P avec des règles définies d’après le carnet d’adresses."
 
 #: i2p2www/pages/site/misc/myi2p.html:29
 msgid ""
-"Additional functionality, such as integration with a DHT backing store or"
-" \n"
-"swarming file transfers for 'attachments' can be added later.  Email may "
-"or may\n"
-"not get in the first pass either, though its implementation is "
-"essentially just\n"
-"a blog entry with private access, so perhaps some UI designer can come up"
-" with\n"
-"something.  Exporting the data to RSS or access through ATOM will be an "
-"option \n"
+"Additional functionality, such as integration with a DHT backing store or \n"
+"swarming file transfers for 'attachments' can be added later.  Email may or may\n"
+"not get in the first pass either, though its implementation is essentially just\n"
+"a blog entry with private access, so perhaps some UI designer can come up with\n"
+"something.  Exporting the data to RSS or access through ATOM will be an option \n"
 "down the road as well."
 msgstr ""
 
@@ -1193,8 +993,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/ratestats.html:7
 msgid ""
-"The list was gathered using the following command in the top directory of"
-" the branch i2p.i2p:"
+"The list was gathered using the following command in the top directory of "
+"the branch i2p.i2p:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/ratestats.html:10
@@ -1209,27 +1009,15 @@ msgid ""
 "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n"
 "on monotone.\n"
 "See\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p "
-"monotone</a>\n"
-"for more information on how to get started and check out the source "
-"anonymously.\n"
+"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n"
+"for more information on how to get started and check out the source anonymously.\n"
 "There is also a quick-start guide on the\n"
 "<a href=\"%(newdevs)s\">new developer's page</a>."
-msgstr ""
-"Le code source d’I2P est conservé sur plusieurs dépôts Monotone.\n"
-"Consultez le <a href=\"http://www.monotone.ca/\">site web de Monotone</a>"
-" pour obtenir des renseignements sur Monotone.\n"
-"Consultez <a href=\"http://%(forum)s/viewtopic.php?t=2524\">cette article"
-" de forum au sujet d’i2p monotone</a> pour obtenir de plus amples "
-"renseignements sur la façon de débuter et de vérifier la source "
-"anonymement.\n"
-"Un guide de démarrage se trouve aussi sur la <a href=\"%(newdevs)s\">page"
-" du nouveau développeur</a>."
+msgstr "Le code source d’I2P est conservé sur plusieurs dépôts Monotone.\nConsultez le <a href=\"http://www.monotone.ca/\">site Web de Monotone</a> pour obtenir des renseignements sur Monotone.\nConsultez <a href=\"http://%(forum)s/viewtopic.php?t=2524\">cette article de forum au sujet d’i2p monotone</a> pour obtenir de plus amples renseignements sur la façon de débuter et de vérifier la source anonymement.\nUn guide de démarrage se trouve aussi sur la <a href=\"%(newdevs)s\">page du nouveau développeur</a>."
 
 #: i2p2www/pages/site/misc/transition-guide.html:16
 msgid ""
-"If you want to get the source non-anonymously, pull from the public "
-"server mtn.welterde.de.\n"
+"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n"
 "The i2p source code branch is \"i2p.i2p\"."
 msgstr ""
 
@@ -1258,24 +1046,20 @@ msgid ""
 "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n"
 "we do not have his update signing key or access to\n"
 "www.i2p[.net] or dev.i2p[.net].\n"
-"Complication and zzz have generated new signing keys, and they and Amiga "
-"are providing\n"
-"update file hosting. These changes must be configured in your router to "
-"take effect."
+"Complication and zzz have generated new signing keys, and they and Amiga are providing\n"
+"update file hosting. These changes must be configured in your router to take effect."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17
 msgid ""
-"Make the following configuration changes and your router will "
-"automatically install\n"
+"Make the following configuration changes and your router will automatically install\n"
 "the latest release."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22
 #, python-format
 msgid ""
-"We recommend the automated process as it will verify the key of the "
-"signed update file.\n"
+"We recommend the automated process as it will verify the key of the signed update file.\n"
 "If you do not make these changes,\n"
 "you may manually download the i2pupdate.zip file from\n"
 "<a href=\"%(downloads)s\">the download page</a>."
@@ -1288,8 +1072,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38
 msgid ""
-"Select ONE of the following new Update URLs at random and enter it into "
-"the Update URL box: "
+"Select ONE of the following new Update URLs at random and enter it into the "
+"Update URL box: "
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43
@@ -1311,8 +1095,7 @@ msgstr "Cliquez sur « Appliquer »"
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58
 msgid ""
 "You are now ready to automatically receive the release update file,\n"
-"either by setting your update policy to \"download and install\" or by "
-"clicking on the\n"
+"either by setting your update policy to \"download and install\" or by clicking on the\n"
 "\"update available\" link when it appears."
 msgstr ""
 
@@ -1321,7 +1104,5 @@ msgstr ""
 msgid ""
 "If you would like to verify the trusted update keys, they are also\n"
 "<a href=\"%(url)s\">posted and signed here</a>.\n"
-"Thank you for your support during this transition. For help please "
-"contact us on #i2p."
+"Thank you for your support during this transition. For help please contact us on #i2p."
 msgstr ""
-
diff --git a/i2p2www/translations/fr/LC_MESSAGES/research.po b/i2p2www/translations/fr/LC_MESSAGES/research.po
index c464621ac19406aa9d97256c55a0b2553c7a74e4..7d728c67eba64fb87b9eb42991583977fe65004d 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/research.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/research.po
@@ -1,7 +1,7 @@
-# French translations for I2P.
-# Copyright (C) 2019 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # AO <ao@localizationlab.org>, 2017
 # Boxoa590, 2013
@@ -11,17 +11,18 @@
 # Towinet, 2013-2014,2016
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-06-24 13:48+0000\n"
-"PO-Revision-Date: 2019-04-25 20:10+0000\n"
-"Last-Translator: AO <ao@localizationlab.org>\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:01+0000\n"
+"Last-Translator: AO <ao@localizationlab.org>, 2017\n"
 "Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n"
-"Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: fr\n"
+"Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #: i2p2www/pages/site/research/index.html:2
 msgid "Academic Research"
@@ -42,16 +43,11 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:10
 msgid ""
-"I2P is a very unique project that unfortunately has not received the "
-"wider\n"
-"academic attention it deserves. To date, most research focus on anonymous"
-" and\n"
-"onion-routing technology has been around Tor, and while those papers "
-"benefit us\n"
-"as well, there is a great need for I2P-focused research. This plays a key"
-" role\n"
-"in both maintaining the security and integrity of the network, as well as"
-"\n"
+"I2P is a very unique project that unfortunately has not received the wider\n"
+"academic attention it deserves. To date, most research focus on anonymous and\n"
+"onion-routing technology has been around Tor, and while those papers benefit us\n"
+"as well, there is a great need for I2P-focused research. This plays a key role\n"
+"in both maintaining the security and integrity of the network, as well as\n"
 "opening doors for more impactful future development."
 msgstr ""
 
@@ -59,48 +55,27 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"There is a large research community investigating a wide range of aspects"
-" of\n"
-"anonymity. For a current and comprehensive list of relevant papers, see "
-"the\n"
+"There is a large research community investigating a wide range of aspects of\n"
+"anonymity. For a current and comprehensive list of relevant papers, see the\n"
 "<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
-"I2P benefits from much of the research into Tor and onion routing, but "
-"there is\n"
-"little dedicated research interest into the theory behind I2P, and the "
-"choices\n"
-"and tradeoffs that the network makes. This presents a unique opportunity "
-"for\n"
+"I2P benefits from much of the research into Tor and onion routing, but there is\n"
+"little dedicated research interest into the theory behind I2P, and the choices\n"
+"and tradeoffs that the network makes. This presents a unique opportunity for\n"
 "original research.\n"
-msgstr ""
-"\n"
-"Il y a une large communauté de recherche examinant une vaste gamme des "
-"aspects de\n"
-"l’anonymat. Pour une liste actuelle et compréhensive des papiers "
-"pertinents, voir la\n"
-"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
-"I2P bénéficie d’une grande partie de la recherche faite dans Tor et le "
-"routage en oignon, mais il y a\n"
-"peu d’intérêt en recherche consacrée à la théorie derrière I2P, et les "
-"choix\n"
-"et différences que le réseau fait. Cela présente une occasion unique pour"
-" \n"
-"de la recherche originale.\n"
+msgstr "\nIl y a une large communauté de recherche examinant une vaste gamme des aspects de\nl’anonymat. Pour une liste actuelle et compréhensive des papiers pertinents, voir la\n<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\nI2P bénéficie d’une grande partie de la recherche faite dans Tor et le routage en oignon, mais il y a\npeu d’intérêt en recherche consacrée à la théorie derrière I2P, et les choix\net différences que le réseau fait. Cela présente une occasion unique pour \nde la recherche originale.\n"
 
 #: i2p2www/pages/site/research/index.html:29
 #, python-format
 msgid ""
 "A list of known published papers about I2P is available <a "
 "href=\"%(papers)s\">here</a>."
-msgstr ""
-"Une liste des articles publiés connus sur I2P est proposée <a "
-"href=\"%(papers)s\">ici</a>."
+msgstr "Une liste des articles publiés connus sur I2P est proposée <a href=\"%(papers)s\">ici</a>."
 
 #: i2p2www/pages/site/research/index.html:34
 msgid ""
 "\n"
 "This page aims to outline the most needed fields of research, notes to\n"
-"potential researchers, our general safety guidelines as well as an "
-"expanding\n"
+"potential researchers, our general safety guidelines as well as an expanding\n"
 "list of open questions that you can begin on at any time.\n"
 msgstr ""
 
@@ -114,16 +89,12 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:44
 msgid ""
-"While all research on the I2P network is beneficial and appreciated, "
-"there are\n"
+"While all research on the I2P network is beneficial and appreciated, there are\n"
 "certain areas which are more in need than others - most so in defensive\n"
 "research. Most people enjoy coming up with fun ways to launch offensives\n"
-"against anonymous software, and this is further reinforced by the "
-"incentives in\n"
-"academic institutions. While we know it is often not the first choice for"
-"\n"
-"researchers, We would certainly appreciate any and all work towards ways "
-"to\n"
+"against anonymous software, and this is further reinforced by the incentives in\n"
+"academic institutions. While we know it is often not the first choice for\n"
+"researchers, We would certainly appreciate any and all work towards ways to\n"
 "fortify the network!"
 msgstr ""
 
@@ -134,27 +105,17 @@ msgstr ""
 #: i2p2www/pages/site/research/index.html:56
 #, python-format
 msgid ""
-"If you've decided on a research topic that aims to hands-on investigate "
-"the I2P\n"
-"network or solve a problem of large proportions we ask you to "
-"<b>please</b> \n"
-"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
-"team, the\n"
-"sooner the better. I2P is under constant development and a significant "
-"amount\n"
-"of roadmapping occurs, therefore your problem may have already been "
-"identified\n"
-"and flagged for update or patch. In the unlikely event you are conducting"
-"\n"
-"testing that overlaps with / would be of interest to another research "
-"project\n"
-"already in motion, we are also able to make you aware of this (with their"
-"\n"
-"permission, of course), and possibly open the door for collaboration. "
-"There is\n"
+"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
+"network or solve a problem of large proportions we ask you to <b>please</b> \n"
+"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
+"sooner the better. I2P is under constant development and a significant amount\n"
+"of roadmapping occurs, therefore your problem may have already been identified\n"
+"and flagged for update or patch. In the unlikely event you are conducting\n"
+"testing that overlaps with / would be of interest to another research project\n"
+"already in motion, we are also able to make you aware of this (with their\n"
+"permission, of course), and possibly open the door for collaboration. There is\n"
 "also a chance that the test itself may significantly harm the network or\n"
-"regular users, and the team may have ideas or suggestions to mitigate "
-"that risk\n"
+"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
 "and increase the safety of your testing."
 msgstr ""
 
@@ -170,13 +131,11 @@ msgstr ""
 msgid ""
 "<ol>\n"
 "  <li>\n"
-"    Consider the benefits and risks - is there any doubt that the "
-"research\n"
+"    Consider the benefits and risks - is there any doubt that the research\n"
 "    provides more value than danger?\n"
 "  </li>\n"
 "  <li>\n"
-"    If the research can be done on a test network then that is the "
-"preferred\n"
+"    If the research can be done on a test network then that is the preferred\n"
 "    method\n"
 "  </li>\n"
 "  <li>\n"
@@ -184,10 +143,8 @@ msgid ""
 "    collecting data about yourself\n"
 "  </li>\n"
 "  <li>\n"
-"    If you need 'bigger data', It is recommended to first see if you can "
-"use\n"
-"    data sets from previous experiments or other third party resources is"
-"\n"
+"    If you need 'bigger data', It is recommended to first see if you can use\n"
+"    data sets from previous experiments or other third party resources is\n"
 "    recommended\n"
 "  </li>\n"
 "  <li>\n"
@@ -195,10 +152,8 @@ msgid ""
 "    publication and collect as little as possible\n"
 "  </li>\n"
 "  <li>\n"
-"    After testing and before publish, review that all data which is to be"
-"\n"
-"    published publicly is <b><i>not</i></b> intended to be private by the"
-"\n"
+"    After testing and before publish, review that all data which is to be\n"
+"    published publicly is <b><i>not</i></b> intended to be private by the\n"
 "    originator\n"
 "  </li>\n"
 "</ol>"
@@ -210,32 +165,24 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:108
 msgid ""
-"I2P can be run as a separate test network by controlling the locations "
-"that a\n"
+"I2P can be run as a separate test network by controlling the locations that a\n"
 "new router reseeds from so that it only finds other test routers.\n"
 "\n"
-"The standard mode of operation is to have one JVM per router instance; "
-"hence\n"
-"running multiple copies of I2P on a single machine is inadvisable, both "
-"due to\n"
+"The standard mode of operation is to have one JVM per router instance; hence\n"
+"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
 "the potential resource drain and the certain port conflicts. To better\n"
-"facilitate setting up small test networks, I2P has a multirouter mode "
-"which\n"
+"facilitate setting up small test networks, I2P has a multirouter mode which\n"
 "enables multiple distinct routers to be run in the same JVM.\n"
 "\n"
-"MultiRouter can be started from the i2p base directory by running the "
-"below\n"
+"MultiRouter can be started from the i2p base directory by running the below\n"
 "command."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:124
 msgid ""
-"Additionally, I2P can be started in a virtual network mode. This mode "
-"disables\n"
-"all transports, allowing the router to be tested in isolation without "
-"network\n"
-"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
-"the\n"
+"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
+"all transports, allowing the router to be tested in isolation without network\n"
+"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
 "router.config before starting."
 msgstr ""
 
@@ -246,13 +193,10 @@ msgstr ""
 #: i2p2www/pages/site/research/index.html:133
 #, python-format
 msgid ""
-"As stated above in the researcher notes, please <a "
-"href=\"%(contact)s\">contact\n"
+"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
 "  us</a> before you commence your testing. While we do not discourage\n"
-"researchers from responsibly testing their ideas on the live network, if "
-"an\n"
-"attack becomes apparent and we don't have any line of communication then "
-"we\n"
+"researchers from responsibly testing their ideas on the live network, if an\n"
+"attack becomes apparent and we don't have any line of communication then we\n"
 "will end up taking countermeasures which could interfere with the test."
 msgstr ""
 
@@ -262,35 +206,23 @@ msgstr "Configuration d’une famille de routeurs"
 
 #: i2p2www/pages/site/research/index.html:143
 msgid ""
-"As of release 0.9.25, I2P supports a router family configuration. This "
-"provides\n"
-"researchers who run multiple routers with the means to publicly identify "
-"those\n"
-"routers. In turn, this helps the I2P project understand that these "
-"routers are\n"
-"not running an attack on the network. It also will prevent other routers "
-"from\n"
-"including multiple routers of the family in a single tunnel, which could "
-"lead\n"
-"to deanonymization. Routers that appear to be colluding but do not have a"
-"\n"
-"declared family may be assumed to be an attack on the network, and may be"
-"\n"
-"blocked. The best way to ensure the success of your research project is "
-"to work\n"
+"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
+"researchers who run multiple routers with the means to publicly identify those\n"
+"routers. In turn, this helps the I2P project understand that these routers are\n"
+"not running an attack on the network. It also will prevent other routers from\n"
+"including multiple routers of the family in a single tunnel, which could lead\n"
+"to deanonymization. Routers that appear to be colluding but do not have a\n"
+"declared family may be assumed to be an attack on the network, and may be\n"
+"blocked. The best way to ensure the success of your research project is to work\n"
 "with us directly."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:155
 msgid ""
-"A router family shares a private key so that participation in the family "
-"cannot\n"
-"be spoofed. To configure a router family, click on the 'I2P Internals' "
-"link in\n"
-"the router console, and then on the 'Family' tab. Follow the instructions"
-" there\n"
-"to generate the private key for the first router in the family. Then, "
-"export\n"
+"A router family shares a private key so that participation in the family cannot\n"
+"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
+"the router console, and then on the 'Family' tab. Follow the instructions there\n"
+"to generate the private key for the first router in the family. Then, export\n"
 "the key from that router, and import it to other members of the family."
 msgstr ""
 
@@ -342,59 +274,67 @@ msgstr ""
 msgid "Vulnerability Response Process"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:3
-msgid "January 2017"
-msgstr "Janvier 2017"
-
 #: i2p2www/pages/site/research/vrp.html:6
 msgid ""
 "\n"
-"This process is subject to change. Please refer to this page for the "
-"current VRP."
+"This process is subject to change. Please refer to this page for the current VRP."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:10
+msgid "This page was last updated in June 2020."
+msgstr ""
+
+#: i2p2www/pages/site/research/vrp.html:12
+msgid ""
+"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
+"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
+"centers"
+msgstr ""
+
+#: i2p2www/pages/site/research/vrp.html:15
+msgid ""
+"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
+"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
+msgstr ""
+
+#: i2p2www/pages/site/research/vrp.html:18
 msgid "Point of Contact for Security Issues"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:14
+#: i2p2www/pages/site/research/vrp.html:22
 msgid "Security Response Team"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:16
-msgid "Only the following members have access to the security point of contact:"
+#: i2p2www/pages/site/research/vrp.html:24
+msgid ""
+"Echelon is the trusted security point-of-contact. He forwards e-mails to "
+"team members as appropriate."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:25
+#: i2p2www/pages/site/research/vrp.html:28
 msgid "Incident Response"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:28
-msgid "Researcher submits report via one or both of two methods:"
+#: i2p2www/pages/site/research/vrp.html:31
+msgid "Researcher submits report via:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:32
-msgid "Email"
-msgstr "Courriel"
-
 #: i2p2www/pages/site/research/vrp.html:37
 msgid ""
-"Response Team designates a Response Manager who is in charge of the "
-"particular\n"
+"Response Team designates a Response Manager who is in charge of the particular\n"
 "report based on availability and/or knowledge-set."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:42
 #, python-format
 msgid ""
-"In no more than %(limit)s working days, Response Team should gratefully\n"
+"In no more than %(limit)s working days, Response Team should\n"
 "respond to researcher using only encrypted methods."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:47
 msgid ""
-"Response Manager makes inquiries to satisfy any needed information and to"
-"\n"
+"Response Manager makes inquiries to satisfy any needed information and to\n"
 "confirm if submission is indeed a vulnerability."
 msgstr ""
 
@@ -414,369 +354,357 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:62
 msgid ""
-"Response Manager moves discussion to a new or existing ticket on public "
-"Trac if necessary."
+"Response Manager moves discussion to a new or existing ticket on public Trac"
+" if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:70
 msgid ""
-"If over email, Response Manager opens a HackerOne issue for new "
-"submission."
-msgstr ""
-
-#: i2p2www/pages/site/research/vrp.html:74
-msgid ""
 "\n"
 "Establish severity of vulnerability:\n"
 "  "
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:79
+#: i2p2www/pages/site/research/vrp.html:75
 msgid ""
-"Effects network as a whole, has potential to break entire network or is "
-"on a scale of great catastrophe."
+"Affects network as a whole, has potential to break entire network or is on a"
+" scale of great catastrophe."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:83
-msgid "Effects individual routers, or must be carefully exploited."
+#: i2p2www/pages/site/research/vrp.html:79
+msgid "Affects individual routers, or must be carefully exploited."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:87
+#: i2p2www/pages/site/research/vrp.html:83
 msgid "Is not easily exploitable."
 msgstr "N’est pas facilement exploitable."
 
-#: i2p2www/pages/site/research/vrp.html:93
+#: i2p2www/pages/site/research/vrp.html:89
 msgid "Respond according to the severity of the vulnerability:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:97
+#: i2p2www/pages/site/research/vrp.html:93
 #, python-format
 msgid ""
-"HIGH severities must be notified on website and news feed within "
-"%(limit)s\n"
+"HIGH severities must be notified on website and news feed within %(limit)s\n"
 "working days of classification."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:102
-msgid "The notification should list appropriate steps for users to take, if any."
+#: i2p2www/pages/site/research/vrp.html:98
+msgid ""
+"The notification should list appropriate steps for users to take, if any."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:105
+#: i2p2www/pages/site/research/vrp.html:101
 msgid ""
-"The notification must not include any details that could suggest an "
-"exploitation\n"
+"The notification must not include any details that could suggest an exploitation\n"
 "path."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:109
+#: i2p2www/pages/site/research/vrp.html:105
 msgid "The latter takes precedence over the former."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:113
+#: i2p2www/pages/site/research/vrp.html:109
 msgid "MEDIUM and HIGH severities will require a Point Release."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:116
+#: i2p2www/pages/site/research/vrp.html:112
 msgid "LOW severities will be addressed in the next Regular Release."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:122
+#: i2p2www/pages/site/research/vrp.html:118
 msgid "Response Team applies appropriate patch(es)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:126
+#: i2p2www/pages/site/research/vrp.html:122
 msgid ""
-"Response Manager designates a PRIVATE monotone \"hotfix branch\" to work "
-"in."
+"Response Manager works on a patch LOCALLY, patches are shared by the "
+"response team via PGP-encrypted e-mail until such a time as it is safe to "
+"expose to the public."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:129
+#: i2p2www/pages/site/research/vrp.html:125
 msgid "Patches are reviewed with the researcher."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:132
+#: i2p2www/pages/site/research/vrp.html:128
 msgid ""
-"Any messages associated with PUBLIC commits during the time of review "
-"should not\n"
-"make reference to the security nature of the PRIVATE branch or its "
-"commits."
+"Any messages associated with PUBLIC commits during the time of review should not\n"
+"make reference to the security nature of the PRIVATE branch or its commits."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:136
+#: i2p2www/pages/site/research/vrp.html:132
 msgid "Vulnerability announcement is drafted."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:140
+#: i2p2www/pages/site/research/vrp.html:136
 msgid "Include severity of vulnerability."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:143
+#: i2p2www/pages/site/research/vrp.html:139
 msgid "Include systems/apps effected."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:146
+#: i2p2www/pages/site/research/vrp.html:142
 msgid "Include solutions (if any) if patch cannot be applied."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:150
+#: i2p2www/pages/site/research/vrp.html:146
 msgid "Release date is discussed."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:156
+#: i2p2www/pages/site/research/vrp.html:152
 msgid ""
 "At release date, Response Team coordinates with developers to finalize "
 "update:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:160
+#: i2p2www/pages/site/research/vrp.html:156
 msgid "Response Manager propagates the \"hotfix branch\" to trunk."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:163
+#: i2p2www/pages/site/research/vrp.html:159
 msgid ""
-"Response Manager includes vulnerability announcement draft in release "
-"notes."
+"Response Manager includes vulnerability announcement draft in release notes."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:166
-msgid "Proceed with the Point or Regular Release."
+#: i2p2www/pages/site/research/vrp.html:162
+msgid ""
+"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
+"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
+"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
+"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:173
+#: i2p2www/pages/site/research/vrp.html:172
 msgid "Post-release Disclosure Process"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:176
+#: i2p2www/pages/site/research/vrp.html:175
 #, python-format
-msgid "Response Team has %(limit)s days to fulfill all points within section III."
+msgid ""
+"Response Team has %(limit)s days to fulfill all points within section III."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:180
-msgid "If the Incident Response process in section III is successfully completed:"
+#: i2p2www/pages/site/research/vrp.html:179
+msgid ""
+"If the Incident Response process in section III is successfully completed:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:184
+#: i2p2www/pages/site/research/vrp.html:183
 msgid ""
 "Response Manager contacts researcher and asks if researcher wishes for "
 "credit."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:187
+#: i2p2www/pages/site/research/vrp.html:186
 msgid "Finalize vulnerability announcement draft and include the following:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:191
+#: i2p2www/pages/site/research/vrp.html:190
 msgid "Project name and URL."
 msgstr "Nom du projet et URL."
 
-#: i2p2www/pages/site/research/vrp.html:194
+#: i2p2www/pages/site/research/vrp.html:193
 msgid "Versions known to be affected."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:197
+#: i2p2www/pages/site/research/vrp.html:196
 msgid ""
 "Versions known to be not affected (for example, the vulnerable code was "
 "introduced in a recent version, and older versions are therefore "
 "unaffected)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:200
+#: i2p2www/pages/site/research/vrp.html:199
 msgid "Versions not checked."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:203
+#: i2p2www/pages/site/research/vrp.html:202
 msgid "Type of vulnerability and its impact."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:206
+#: i2p2www/pages/site/research/vrp.html:205
 msgid "If already obtained or applicable, a CVE-ID."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:209
+#: i2p2www/pages/site/research/vrp.html:208
 msgid "The planned, coordinated release date."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:212
+#: i2p2www/pages/site/research/vrp.html:211
 msgid ""
 "Mitigating factors (for example, the vulnerability is only exposed in "
 "uncommon, non-default configurations)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:215
+#: i2p2www/pages/site/research/vrp.html:214
 msgid ""
-"Workarounds (configuration changes users can make to reduce their "
-"exposure to the vulnerability)."
+"Workarounds (configuration changes users can make to reduce their exposure "
+"to the vulnerability)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:218
+#: i2p2www/pages/site/research/vrp.html:217
 msgid "If applicable, credits to the original reporter."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:223
-msgid "Release finalized vulnerability announcement on website and in news feed."
+#: i2p2www/pages/site/research/vrp.html:222
+msgid ""
+"Release finalized vulnerability announcement on website and in news feed."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:226
+#: i2p2www/pages/site/research/vrp.html:230
 msgid ""
-"For HIGH severities, release finalized vulnerability announcement on "
-"well-known mailing lists:"
+"For HIGH severities, release finalized vulnerability announcement on well-"
+"known mailing lists:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:234
+#: i2p2www/pages/site/research/vrp.html:238
 msgid "If applicable, developers request a CVE-ID."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:238
+#: i2p2www/pages/site/research/vrp.html:242
 msgid ""
-"The commit that applied the fix is made reference too in a future commit "
-"and includes a CVE-ID."
+"The commit that applied the fix is made reference too in a future commit and"
+" includes a CVE-ID."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:246
+#: i2p2www/pages/site/research/vrp.html:250
 msgid ""
 "If the Incident Response process in section III is *not* successfully "
 "completed:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:250
+#: i2p2www/pages/site/research/vrp.html:254
 msgid ""
-"Response Team and developers organize an IRC meeting to discuss why/what "
-"points\n"
-"in section III were not resolved and how the team can resolve them in the"
-"\n"
+"Response Team and developers organize an IRC meeting to discuss why/what points\n"
+"in section III were not resolved and how the team can resolve them in the\n"
 "future."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:255
+#: i2p2www/pages/site/research/vrp.html:259
 msgid ""
-"Any developer meetings immediately following the incident should include "
-"points\n"
+"Any developer meetings immediately following the incident should include points\n"
 "made in section V."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:259
+#: i2p2www/pages/site/research/vrp.html:263
 msgid ""
 "If disputes arise about whether or when to disclose information about a\n"
-"vulnerability, the Response Team will publicly discuss the issue via IRC "
-"and\n"
+"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
 "attempt to reach consensus."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:264
+#: i2p2www/pages/site/research/vrp.html:268
 #, python-format
 msgid ""
-"If consensus on a timely disclosure is not met (no later than %(limit)s "
-"days),\n"
+"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
 "the researcher (after %(limit)s days) has every right to expose the\n"
 "vulnerability to the public."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:273
+#: i2p2www/pages/site/research/vrp.html:277
 msgid "Incident Analysis"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:276
+#: i2p2www/pages/site/research/vrp.html:280
 msgid "Isolate codebase"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:278
-#: i2p2www/pages/site/research/vrp.html:298
-msgid "Response Team and developers should coordinate to work on the following:"
+#: i2p2www/pages/site/research/vrp.html:282
+#: i2p2www/pages/site/research/vrp.html:302
+msgid ""
+"Response Team and developers should coordinate to work on the following:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:282
+#: i2p2www/pages/site/research/vrp.html:286
 msgid "Problematic implementation of classes/libraries/functions, etc."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:285
+#: i2p2www/pages/site/research/vrp.html:289
 msgid "Focus on apps/distro packaging, etc."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:288
+#: i2p2www/pages/site/research/vrp.html:292
 msgid "Operator/config error, etc."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:296
+#: i2p2www/pages/site/research/vrp.html:300
 msgid "Auditing"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:302
+#: i2p2www/pages/site/research/vrp.html:306
 msgid "Auditing of problem area(s) as discussed in point 1."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:305
+#: i2p2www/pages/site/research/vrp.html:309
 msgid "Generate internal reports and store for future reference."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:308
+#: i2p2www/pages/site/research/vrp.html:312
 msgid ""
-"If results are not sensitive, share with the public via IRC or public "
-"Trac."
+"If results are not sensitive, share with the public via IRC or public Trac."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:316
+#: i2p2www/pages/site/research/vrp.html:320
 #, python-format
 msgid ""
-"Response Team has %(limit)s days following completion of section III to "
-"ensure\n"
+"Response Team has %(limit)s days following completion of section III to ensure\n"
 "completion of section V."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:322
+#: i2p2www/pages/site/research/vrp.html:326
 msgid "Resolutions"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:324
+#: i2p2www/pages/site/research/vrp.html:328
 msgid ""
-"Any further questions or resolutions regarding the incident(s) between "
-"the\n"
-"researcher and response + development team after public disclosure can be"
-"\n"
+"Any further questions or resolutions regarding the incident(s) between the\n"
+"researcher and response + development team after public disclosure can be\n"
 "addressed via the following:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:338
+#: i2p2www/pages/site/research/vrp.html:341
 msgid "Continuous Improvement"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:341
+#: i2p2www/pages/site/research/vrp.html:344
 msgid ""
-"Response Team and developers should hold annual meetings to review the "
-"previous\n"
+"Response Team and developers should hold annual meetings to review the previous\n"
 "year's incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:346
+#: i2p2www/pages/site/research/vrp.html:349
 msgid ""
 "Response Team or designated person(s) should give a brief presentation, "
 "including:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:350
+#: i2p2www/pages/site/research/vrp.html:353
 msgid "Areas of I2P affected by the incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:353
+#: i2p2www/pages/site/research/vrp.html:356
 msgid "Any network downtime or monetary cost (if any) of the incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:356
+#: i2p2www/pages/site/research/vrp.html:359
 msgid "Ways in which the incidents could have been avoided (if any)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:359
+#: i2p2www/pages/site/research/vrp.html:362
 msgid "How effective this process was in dealing with the incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:365
+#: i2p2www/pages/site/research/vrp.html:368
 msgid "After the presentation, Response Team and developers should discuss:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:369
+#: i2p2www/pages/site/research/vrp.html:372
 msgid "Potential changes to development processes to reduce future incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:372
+#: i2p2www/pages/site/research/vrp.html:375
 msgid "Potential changes to this process to improve future responses."
 msgstr ""
-
diff --git a/i2p2www/translations/gl/LC_MESSAGES/about.po b/i2p2www/translations/gl/LC_MESSAGES/about.po
index 2dedb2709a638d0aa6e07e956bf28da23c35b23a..d67849323877b541e410f4ed085a7a6fd71930d4 100644
--- a/i2p2www/translations/gl/LC_MESSAGES/about.po
+++ b/i2p2www/translations/gl/LC_MESSAGES/about.po
@@ -1,21 +1,22 @@
-# Galician translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-10-11 16:26+0000\n"
-"PO-Revision-Date: 2021-10-11 16:29+0000\n"
-"Last-Translator: zzzi2p\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Galician (http://www.transifex.com/otf/I2P/language/gl/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: gl\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -25,8 +26,7 @@ msgstr ""
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
 msgstr ""
 
@@ -49,8 +49,7 @@ msgstr ""
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
 msgstr ""
 
 #: i2p2www/pages/site/about/browser-config.html:2
@@ -70,18 +69,15 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:9
 msgid ""
 "I2P: Invisible Internet Project: a project meant to\n"
-"        provide an anonymity layer, so user can communicate anonymously "
-"using a\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
 "        range of applications."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:12
 msgid ""
 "Router: The core I2P software, which routes encrypted\n"
-"        packets on the I2P network. All routers by default participate in"
-" the\n"
-"        network, which both helps the network and provides cover traffic "
-"for any\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
 "        clients or servers connecting to the I2P network through the\n"
 "        router."
 msgstr ""
@@ -89,26 +85,22 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:17
 msgid ""
 "RouterIdentity: A collection of information required to\n"
-"        communicate directly with a router, such as its IP address and "
-"listening\n"
+"        communicate directly with a router, such as its IP address and listening\n"
 "        port, public signing and encryption keys etc."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:20
 msgid ""
 "Tunnel: An anonymous communication pathway between a\n"
-"        client or server and the I2P network. Tunnels are unidirectional,"
-" so any\n"
-"        one client or server must have at least two Tunnels - one for "
-"inbound\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
 "        traffic and one for outbound traffic."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:24
 msgid ""
 "Destination: The cryptographic identity of a tunnel.\n"
-"        These are the identities of clients and servers within the I2P "
-"network,\n"
+"        These are the identities of clients and servers within the I2P network,\n"
 "        and are analogous to the IP:port of a computer on the normal\n"
 "        internet."
 msgstr ""
@@ -116,39 +108,32 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:28
 msgid ""
 "LeaseSet: A collection of information required to\n"
-"        communicate with a client or server at a particular Destination, "
-"such as\n"
+"        communicate with a client or server at a particular Destination, such as\n"
 "        the gateways of the inbound Tunnels for that\n"
 "        Destination."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:34
 msgid ""
-"This table lists definition of different networks and their components. "
-"These\n"
+"This table lists definition of different networks and their components. These\n"
 "terms and the definitions provided are taken from\n"
-"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization"
-" Off The\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
 "Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:40
 msgid ""
 "Decentralization: Network architecture that avoids\n"
-"        reliance on a single party. Encompasses peer-to-peer, blockchain,"
-"\n"
-"        federated, and distributed technologies that involve many "
-"individual\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
 "        users."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:44
 msgid ""
 "Peer-to-Peer (p2p): Peers make a portion of their \n"
-"        resources, such as processing power, disk storage or network "
-"bandwidth,\n"
-"        directly available to other network participants, without the "
-"need for\n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
 "        central coordination by servers or stable hosts. Popularized by\n"
 "        BitTorrent, Napster, and Bitcoin."
 msgstr ""
@@ -156,32 +141,25 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:49
 msgid ""
 "Federated: Federation allows separate deployments of a\n"
-"        service to communicate with each other through a common protocol,"
-" for\n"
-"        instance a mail server run by Google federates with a mail server"
-" run by\n"
-"        Microsoft when you send an email from @gmail.com to @hotmail.com."
-"\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
 "        Each deployment may host multiple users."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:54
 msgid ""
 "Blockchain: A distributed ledger that can record\n"
-"        transactions between multiple parties efficiently and in a "
-"verifiable\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
 "        and permanent way."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:57
 msgid ""
 "Distributed systems: Academic topic within the\n"
-"        discipline of Computer Science which is concerned with the design"
-" of\n"
-"        computer systems that consist of many individual computers "
-"connected\n"
-"        over a network. Peer-to-peer networks and blockchains are "
-"examples of\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
 "        distributed systems architectures."
 msgstr ""
 
@@ -195,8 +173,7 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:65
 msgid ""
 "DHT: Distributed hash table, used in some projects to\n"
-"        connect peers to each other by storing information in the form of"
-"\n"
+"        connect peers to each other by storing information in the form of\n"
 "        key-value pairs in a distributed manner."
 msgstr ""
 
@@ -216,16 +193,14 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:73
 msgid ""
 "Hash: A number, usually displayed as a string of letters\n"
-"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying"
-"\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
 "        data."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:76
 msgid ""
 "UX: User experience, the overall experience of a person\n"
-"        using a product or a service, especially in terms of how easy it "
-"is to\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
 "        use."
 msgstr ""
 
@@ -235,14 +210,10 @@ msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -252,15 +223,14 @@ msgstr ""
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -274,12 +244,8 @@ msgstr "O Proxecto da Internet Invisible"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -289,13 +255,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -304,15 +270,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -321,28 +287,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -351,36 +316,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -389,13 +353,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -404,15 +368,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -431,9 +391,8 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -490,8 +449,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -510,8 +468,7 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
 msgstr ""
 
@@ -520,8 +477,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:76
@@ -534,8 +490,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
@@ -544,8 +499,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:95
@@ -553,8 +508,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -569,15 +523,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -589,8 +541,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -645,16 +596,14 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
@@ -663,11 +612,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:189
@@ -720,16 +667,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
 msgstr ""
@@ -745,12 +690,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -764,35 +706,29 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -801,16 +737,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -827,8 +761,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
@@ -838,29 +771,20 @@ msgstr ""
 
 #: i2p2www/pages/site/about/restrictive-countries.html:4
 msgid ""
-"This implementation of I2P (the Java implementation distributed on this "
-"site)\n"
-"includes a \"Strict Countries List\" which we use to decide how routers "
-"should behave \n"
-"within regions where applications like I2P may be limited by law. For "
-"example, while\n"
-"no countries that we know of prohibit using I2P, some have broad "
-"prohibitions on\n"
-"participating in routing for others. Routers that appear to be in the "
-"\"Strict\"\n"
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
 "countries will automatically be placed into \"Hidden\" mode."
 msgstr ""
 
 #: i2p2www/pages/site/about/restrictive-countries.html:11
 msgid ""
-"The Project relies on the research provided by civil and digital rights "
-"organizations in order\n"
-"to make decisions that offer protections for its users. In this case the "
-"ongoing research\n"
-"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has "
-"been referenced. General\n"
-"guidance is to include countries with a Civil Liberties (CL) score of 16 "
-"or less or an Internet\n"
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
 "Freedom score of 39 or less (not free)."
 msgstr ""
 
@@ -870,16 +794,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/restrictive-countries.html:19
 msgid ""
-"When a router is placed into hidden mode, three key things change about "
-"it's behavior.\n"
-"It will no longer publish a routerInfo to the NetDB, it will no longer "
-"accept\n"
-"participating tunnels, and it will reject direct connections to routers "
-"in the same\n"
-"country that it is in. These defenses make the routers more difficult to "
-"enumerate\n"
-"reliably, and prevent them from running afoul of restrictions on routing "
-"traffic for\n"
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
 "others."
 msgstr ""
 
@@ -901,18 +820,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -923,84 +839,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -1011,8 +904,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -1020,27 +912,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -1048,26 +936,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -1078,10 +957,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -1089,18 +966,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -1111,10 +985,8 @@ msgstr ""
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
 msgstr ""
@@ -1286,7 +1158,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1526,7 +1399,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1576,32 +1450,25 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1619,8 +1486,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1659,10 +1526,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1676,15 +1541,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1693,11 +1554,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1752,8 +1610,7 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1771,15 +1628,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1798,14 +1651,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1816,20 +1665,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1840,24 +1682,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1877,33 +1710,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -1916,32 +1740,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -1951,27 +1767,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -1988,17 +1796,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -2011,8 +1816,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -2023,10 +1827,8 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -2045,30 +1847,23 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -2082,55 +1877,40 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -2141,20 +1921,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -2165,16 +1938,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -2184,17 +1952,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -2205,20 +1970,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2232,26 +1990,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2260,18 +2008,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2279,16 +2021,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2304,52 +2041,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2364,102 +2082,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2472,4 +2149,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/gl/LC_MESSAGES/get-involved.po b/i2p2www/translations/gl/LC_MESSAGES/get-involved.po
index 9ba9dcfd2a9b157ef6cb0874be1d4837ffcd2eaa..4502a0ef5529d34fa1d290358a50362cbaec2308 100644
--- a/i2p2www/translations/gl/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/gl/LC_MESSAGES/get-involved.po
@@ -1,22 +1,23 @@
-# Galician translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Uberius Crypto <uberius@anonymail.tech>, 2016
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: zzzi2p\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Uberius Crypto <uberius@anonymail.tech>, 2016\n"
 "Language-Team: Galician (http://www.transifex.com/otf/I2P/language/gl/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: gl\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -31,12 +32,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -51,44 +49,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -127,10 +114,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -160,10 +145,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -178,25 +161,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -222,8 +195,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -237,12 +209,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -253,10 +222,8 @@ msgstr "Tradución"
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
 msgstr ""
@@ -267,17 +234,12 @@ msgstr "Documentación"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -288,16 +250,11 @@ msgstr "A probar..."
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -310,14 +267,10 @@ msgstr "Servizos"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -327,9 +280,9 @@ msgstr "Resementando"
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -373,8 +326,7 @@ msgstr "Análise"
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -382,7 +334,7 @@ msgstr ""
 msgid "Roadmap"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/roadmap.html:309
+#: i2p2www/pages/site/get-involved/roadmap.html:210
 #, python-format
 msgid ""
 "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info "
@@ -443,84 +395,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -529,17 +458,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -547,29 +471,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -577,42 +495,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -656,72 +565,52 @@ msgstr ""
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -731,8 +620,8 @@ msgstr "Figura 1:"
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -745,33 +634,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -792,76 +675,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -871,25 +735,18 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -900,29 +757,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -932,10 +781,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -943,13 +790,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -960,43 +804,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1011,28 +848,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1043,8 +872,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1058,8 +886,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1078,14 +905,10 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1094,17 +917,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1114,8 +934,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1137,32 +956,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1171,47 +983,39 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1223,12 +1027,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1253,8 +1054,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1273,8 +1074,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1303,20 +1103,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1388,8 +1184,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1402,24 +1197,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1429,22 +1215,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1480,21 +1258,16 @@ msgstr ""
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1518,10 +1291,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1532,8 +1303,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1546,10 +1316,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1559,7 +1327,8 @@ msgid "Release Signing Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1580,7 +1349,8 @@ msgid "Download PGP public key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1588,13 +1358,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1602,7 +1373,8 @@ msgid "Security GPG Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1611,8 +1383,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1644,35 +1415,28 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1680,29 +1444,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1729,12 +1487,10 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1744,10 +1500,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1769,8 +1523,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1778,13 +1532,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1793,8 +1548,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1808,34 +1562,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1845,61 +1593,49 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1926,20 +1662,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1948,14 +1683,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1965,12 +1700,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1990,8 +1726,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2018,12 +1753,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2042,22 +1774,22 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2074,8 +1806,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2092,14 +1824,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2178,34 +1910,26 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2215,20 +1939,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2245,22 +1965,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2272,10 +1989,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2285,38 +2000,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2334,23 +2041,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2364,11 +2065,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2379,34 +2077,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2419,18 +2110,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2444,16 +2131,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2473,67 +2158,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2557,8 +2232,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2574,44 +2249,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2619,8 +2284,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2629,64 +2293,59 @@ msgid "New Developer's Guide"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:6
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:32
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:31
 msgid "Basic study"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:7
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:46
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:45
 msgid "Getting the I2P code"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:9
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:52
 msgid "The new way: Git"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:10
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:11
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81
-msgid "The old way: Monotone"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:145
 msgid "Building I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:166
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:102
 msgid "Development ideas"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:174
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:110
 msgid "Making the results available"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:196
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
 msgid "Get to know us!"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:202
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
 msgid "Translations"
 msgstr "Traducións"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:17
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:208
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
 msgid "Tools"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:22
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:21
 msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:26
 #, python-format
 msgid ""
 "\n"
@@ -2694,42 +2353,34 @@ msgid ""
 "Try <a href=\"%(volunteer)s\">getting involved</a> first."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:34
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:38
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:37
 #, python-format
 msgid ""
 "Study the <a href=\"%(intro)s\">how intro</a>,\n"
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:47
 msgid ""
 "For development on the I2P router or the embedded applications,\n"
 "there are two ways to get the source code:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
-msgid "The easy way: Git"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:55
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"For the time being, issues are still being manged on <a "
-"href=\"%(trac)s\">trac</a>."
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
+"issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:58
@@ -2742,143 +2393,31 @@ msgstr ""
 msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:84
-msgid ""
-"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n"
-"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to "
-"the source code (and for a lot of complicated things, but 'keeping track "
-"of changes' is the basic idea)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:89
-msgid ""
-"Skim over the <a "
-"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>,"
-" to make sure you understand the concepts."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:93
-msgid ""
-"If you want to remain anonymous, you need to do an additional step, to "
-"set up a connection to a monotone server over I2P:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
-#, python-format
-msgid ""
-"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port "
-"8998 pointing to mtn.i2p-projekt.i2p."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
-msgid ""
-"Pick a directory where you want to put all your I2P files, and create a "
-"monotone database:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
-msgid ""
-"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or"
-" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the "
-"following contents:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> "
-"into a new file (e.g. <code>keys.txt</code>) in the same directory\n"
-"  that <code>i2p.mtn</code> is in. Import the keys into your database "
-"with <br><code><pre>      mtn -d i2p.mtn read < keys.txt</pre></code>"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
-msgid ""
-"Pull the I2P sources to your machine. This may take a long time, "
-"especially if you are doing this over I2P!"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
-msgid "Anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
-msgid "Non-anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
-msgid ""
-"All the sources are now present on your machine, in the database file. To"
-" make them available in a directory, you need to check them out:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:125
-msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the "
-"I2P sources."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
-msgid "Remarks"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
-msgid ""
-"\n"
-"To download the website files instead of the I2P source files, use "
-"'i2p.www' instead of 'i2p.i2p'."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:133
-msgid ""
-"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it"
-" left off.\n"
-"If you are in a hurry, use the non-anonymous access."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
-#, python-format
-msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on <a"
-" href=\"%(viewmtn)s\">viewmtn</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:141
-#, python-format
-msgid ""
-"A long explanation about using monotone is available on the <a "
-"href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:147
-#, python-format
-msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:155
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:91
 msgid ""
 "To build or work on console translations, you need\n"
 "the xgettext, msgfmt, and msgmerge tools from the\n"
 "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:161
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
 #, python-format
 msgid ""
 "For development on new applications,\n"
 "see the <a href=\"%(apps)s\">application development guide</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:167
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
 #, python-format
 msgid ""
 "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n"
@@ -2887,93 +2426,42 @@ msgid ""
 "for ideas."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:176
-#, python-format
-msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:181
-msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:184
-msgid "use an empty passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:185
-msgid "enter a passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:186
-#, python-format
-msgid ""
-"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get "
-"push privileges"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:187
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get "
-"commit privileges - not required for website"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:188
-msgid "check in with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:189
-msgid "push with this key"
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:191
-#, python-format
-msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:197
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:203
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:209
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:217
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -2993,11 +2481,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3012,10 +2498,8 @@ msgstr ""
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3035,12 +2519,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3051,27 +2532,23 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
 msgstr ""
 
@@ -3087,10 +2564,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3108,8 +2583,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
 msgstr ""
 
@@ -3122,19 +2596,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3142,15 +2612,13 @@ msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3159,8 +2627,8 @@ msgstr "PUF"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3176,67 +2644,65 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3261,10 +2727,8 @@ msgstr "Vista Xeral"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3273,21 +2737,17 @@ msgstr "Requerimentos"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3310,8 +2770,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3321,18 +2780,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3342,10 +2796,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3354,17 +2806,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3373,10 +2823,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3387,18 +2835,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr ""
-
diff --git a/i2p2www/translations/gl/LC_MESSAGES/misc.po b/i2p2www/translations/gl/LC_MESSAGES/misc.po
index e80388b600abc0dc39afb7f6ef21ac31d4f2ff43..e2f30fb3e4088502955275c136a2955b56e17017 100644
--- a/i2p2www/translations/gl/LC_MESSAGES/misc.po
+++ b/i2p2www/translations/gl/LC_MESSAGES/misc.po
@@ -1,22 +1,23 @@
-# Galician translations for I2P.
-# Copyright (C) 2017 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Uberius Crypto <uberius@anonymail.tech>, 2016
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-02-12 00:06+0000\n"
-"PO-Revision-Date: 2017-09-23 02:02+0000\n"
-"Last-Translator: Uberius Crypto <uberius@anonymail.tech>\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Uberius Crypto <uberius@anonymail.tech>, 2016\n"
 "Language-Team: Galician (http://www.transifex.com/otf/I2P/language/gl/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: gl\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/misc/clt.html:2
 msgid "I2P at CLT and PetCon 2009.1"
@@ -25,54 +26,37 @@ msgstr "I2P en CLT e PetCon 2009.1"
 #: i2p2www/pages/site/misc/clt.html:4
 msgid ""
 "Members of I2P will held a talk at CLT and PetCon 2009.1\n"
-"Two members of the I2P team will be at two forthcoming Linux day and "
-"security convention."
-msgstr ""
-"Os membros de I2P darán unha conferencia en CLT e en PetCon 2009.1\n"
-"Dous membros do equipo I2P estarán nas dúas seguintes convencións do día "
-"de Linux e seguridade."
+"Two members of the I2P team will be at two forthcoming Linux day and security convention."
+msgstr "Os membros de I2P darán unha conferencia en CLT e en PetCon 2009.1\nDous membros do equipo I2P estarán nas dúas seguintes convencións do día de Linux e seguridade."
 
 #: i2p2www/pages/site/misc/clt.html:9
 #, python-format
 msgid ""
-"On 14th march of 2009 there will be a short talk about general "
-"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> hold by echelon.\n"
-"Echelon and some other members of the I2P family will attend to the Linux"
-" meeting the whole two days (Saturday and Sunday) and will be "
-"recognizable as I2P family members. Meet them, ask them your questions, "
-"show them your props! Show your support!"
+"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n"
+"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!"
 msgstr ""
 
 #: i2p2www/pages/site/misc/clt.html:14
 #, python-format
 msgid ""
-"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security "
-"convention</a> in Dresden will take place.\n"
-"Again, echelon will attend this event and hold a short talk about general"
-" introduction to I2P. Another talk about the profiling by the I2P clients"
-" will be held."
+"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n"
+"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held."
 msgstr ""
 
 #: i2p2www/pages/site/misc/cvs.html:4
 #, python-format
 msgid ""
-"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a"
-" <a href=\"%(monotone)s\">Monotone</a> repository.\n"
+"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n"
 "For those who aren't very familiar with CVS, there is a\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> "
-"on the\n"
-"subject (developers only need to deal with the first chapter - \"An "
-"Overview of\n"
-"CVS\", as subsequent chapters go into some nasty details very few ever "
-"need to\n"
+"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n"
+"subject (developers only need to deal with the first chapter - \"An Overview of\n"
+"CVS\", as subsequent chapters go into some nasty details very few ever need to\n"
 "touch)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/cvs.html:31
 msgid ""
-"Humorous quote from WinCVS: \"Did you know...  Never experiment with new "
-"CVS\n"
+"Humorous quote from WinCVS: \"Did you know...  Never experiment with new CVS\n"
 "commands on your working repository.  Create a sample module instead.\""
 msgstr ""
 
@@ -85,7 +69,7 @@ msgstr "Migración dos túneles I2P"
 msgid ""
 "After upgrading to the new architecture, you'll have to do a \n"
 "little work to get your old I2PTunnel-driven servers running.  \n"
-"Lets walk through a simple example.  For an eepsite with the \n"
+"Lets walk through a simple example.  For an I2P Site with the \n"
 "old clientApp configuration, you had:"
 msgstr ""
 
@@ -103,11 +87,11 @@ msgid "Click on Add new: [Server tunnel] \"GO\""
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21
-msgid "For the name: <code>\"eepsite\"</code>"
+msgid "For the name: <code>\"I2P Site\"</code>"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22
-msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>"
+msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23
@@ -138,14 +122,10 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39
 msgid ""
-"That's it!  Creating a new I2PTunnel server works the same way too, "
-"except you\n"
-"don't need to \"copy the old file\", obviously.  Behind the scenes, it is"
-" all driven\n"
-"by the <code>i2ptunnel.config</code> file, which you may modify "
-"externally (if you do,\n"
-"hit \"Reload config\" on the I2PTunnel web page, which will tear down all"
-" of your \n"
+"That's it!  Creating a new I2PTunnel server works the same way too, except you\n"
+"don't need to \"copy the old file\", obviously.  Behind the scenes, it is all driven\n"
+"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n"
+"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n"
 "existing tunnels and rebuild new ones)"
 msgstr ""
 
@@ -163,7 +143,7 @@ msgid "I2PTunnel services"
 msgstr "Servizos do túnel I2P"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:4
-msgid "Below is quick copy of aum's eepsite deployment guide."
+msgid "Below is quick copy of aum's I2P Site deployment guide."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:8
@@ -179,23 +159,23 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:13
 msgid ""
-"I recommend the Tiny Httpd web server, thttpd, (windows version available"
-" on site) although you can use anything that you feel comfortable with."
+"I recommend the Tiny Httpd web server, thttpd, (windows version available on"
+" site) although you can use anything that you feel comfortable with."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:16
 msgid ""
 "Another more robust option would be to use EasyPHP, which is also open "
 "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For "
-"newbies who have no experience setting up and hosting content over "
-"servers, see the hosting page for help."
+"newbies who have no experience setting up and hosting content over servers, "
+"see the hosting page for help."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:19
 msgid ""
-"With the web server you've chosen, configure it to listen on a port of "
-"your choice, and serve its documents from a directory of your choice. For"
-" this example, we'll assume port 10880."
+"With the web server you've chosen, configure it to listen on a port of your "
+"choice, and serve its documents from a directory of your choice. For this "
+"example, we'll assume port 10880."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:22
@@ -208,8 +188,8 @@ msgstr ""
 msgid ""
 "Test the webserver, by pointing your normal browser (the one with the "
 "\"direct connection\") at <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the "
-"port number you have chosen)."
+"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port"
+" number you have chosen)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:28
@@ -224,28 +204,28 @@ msgstr "Xerar un par de chaves de destino I2P"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:35
 msgid ""
-"I2P does not deal in IP addresses. To protect your anonymity, it deals in"
-" unique addresses called destination keys."
+"I2P does not deal in IP addresses. To protect your anonymity, it deals in "
+"unique addresses called destination keys."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:38
 msgid ""
 "A destination key works a lot like a regular IP address, except that it "
-"can't be traced to your IP address or physical location. When users place"
-" a request to speak with you, your gateways are the ones that answer for "
-"you. So the requesting user can only know the IP address of your "
-"gateways. However, gateways don't know your IP address, because gateways "
-"are the last nodes on your tunnels, and you anonymously create tunnels by"
-" way of garlic routing. (So gateways are like puppets that can't see "
-"their masters, and everyone communicates through these puppets)"
+"can't be traced to your IP address or physical location. When users place a "
+"request to speak with you, your gateways are the ones that answer for you. "
+"So the requesting user can only know the IP address of your gateways. "
+"However, gateways don't know your IP address, because gateways are the last "
+"nodes on your tunnels, and you anonymously create tunnels by way of garlic "
+"routing. (So gateways are like puppets that can't see their masters, and "
+"everyone communicates through these puppets)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:41
 msgid ""
 "To deploy a server on I2P, you create a destination keypair. You use the "
-"private key to authenticate your server when connecting it to I2P, and "
-"you make the public key (aka destination key) known publicly, so others "
-"can connect to your server. (indirectly, through your gateways)"
+"private key to authenticate your server when connecting it to I2P, and you "
+"make the public key (aka destination key) known publicly, so others can "
+"connect to your server. (indirectly, through your gateways)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:44
@@ -268,9 +248,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:53
 msgid ""
-"The filenames <code>myWebPrivKey.dat</code> and "
-"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want "
-"here, as long as you understand your own choices."
+"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>"
+" are arbitrary - choose whatever you want here, as long as you understand "
+"your own choices."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:56
@@ -281,27 +261,27 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:59
 msgid ""
-"To convert your myWebPubKey.dat file into shareable base64, type the "
-"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (all on one line)."
+"To convert your myWebPubKey.dat file into shareable base64, type the command"
+" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; "
+"myWebPubKey.txt</code> (all on one line)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:62
 msgid ""
-"This file you have just generated, <code>myWebPubKey.txt</code>, contains"
-" a long base64 string (516 chars at last count), which we call a "
-"destination key. All you need to know about this string for now is that "
-"it allows remote clients to uniquely pinpoint and connect to your server,"
-" just the same way as an IP address allows remote machines to pinpoint "
-"and connect to your machine."
+"This file you have just generated, <code>myWebPubKey.txt</code>, contains a "
+"long base64 string (516 chars at last count), which we call a destination "
+"key. All you need to know about this string for now is that it allows remote"
+" clients to uniquely pinpoint and connect to your server, just the same way "
+"as an IP address allows remote machines to pinpoint and connect to your "
+"machine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:65
 msgid ""
 "However, in contrast to an IP address, there is no way to trace your "
-"machine's physical location - even though your server can be addressed "
-"via I2P, your IP address cannot be traced or associated with this "
-"destination key."
+"machine's physical location - even though your server can be addressed via "
+"I2P, your IP address cannot be traced or associated with this destination "
+"key."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:70
@@ -310,9 +290,9 @@ msgstr "3 - Abre un 'Túnel' dende I2p ó teu servidor"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:72
 msgid ""
-"For clients elsewhere in I2P to be able to access your server, you must "
-"run a 'bridge' or 'tunnel', which takes connections from these clients "
-"and forwards them to your local server."
+"For clients elsewhere in I2P to be able to access your server, you must run "
+"a 'bridge' or 'tunnel', which takes connections from these clients and "
+"forwards them to your local server."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:75
@@ -337,9 +317,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:84
 msgid ""
-"Within a few seconds, the 'tunnel' should now be active, and remote "
-"clients should be able to reach your server anonymously. Remember to let "
-"your router \"warm up\" before opening clients to it."
+"Within a few seconds, the 'tunnel' should now be active, and remote clients "
+"should be able to reach your server anonymously. Remember to let your router"
+" \"warm up\" before opening clients to it."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:89
@@ -357,9 +337,9 @@ msgstr ""
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:94
 msgid ""
 "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where "
-"myserver.i2p is an I2P 'domain' you want to associate with your site, and"
-" the blahblahblah is the text of the base64 public key you created "
-"earlier in the file myWebPubKey.txt"
+"myserver.i2p is an I2P 'domain' you want to associate with your site, and "
+"the blahblahblah is the text of the base64 public key you created earlier in"
+" the file myWebPubKey.txt"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:97
@@ -393,42 +373,42 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:117
 msgid ""
-"As you grow into I2P and get more of a 'feel' for it, you will want to "
-"use all manner of servers and clients."
+"As you grow into I2P and get more of a 'feel' for it, you will want to use "
+"all manner of servers and clients."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:120
 msgid ""
-"The beauty of I2P is that it allows standard Internet clients and servers"
-" for most protocols to be transparently 'tunneled' through the anonymous "
+"The beauty of I2P is that it allows standard Internet clients and servers "
+"for most protocols to be transparently 'tunneled' through the anonymous "
 "network."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:123
 msgid ""
-"You can run mailservers/clients, nameservers/clients, newsservers/clients"
-" - almost anything at all - perhaps even FTP in passive mode."
+"You can run mailservers/clients, nameservers/clients, newsservers/clients - "
+"almost anything at all - perhaps even FTP in passive mode."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:126
 msgid ""
-"Now, we'll create a client tunnel. This is like the server tunnel we "
-"created earlier, but works in reverse. It listens to a port on your local"
-" machine; your local client connects to this port; the connection gets "
-"forwarded through I2P to the service on the other end."
+"Now, we'll create a client tunnel. This is like the server tunnel we created"
+" earlier, but works in reverse. It listens to a port on your local machine; "
+"your local client connects to this port; the connection gets forwarded "
+"through I2P to the service on the other end."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:129
 msgid ""
-"To open your client tunnel for your server, type the command <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (all one line)."
+"To open your client tunnel for your server, type the command <code>java -jar"
+" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 "
+"textofbase64key\"</code> (all one line)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:132
 msgid ""
-"The port 10888 is arbitrary - it just needs to be something other than "
-"the physical port your server is listening on."
+"The port 10888 is arbitrary - it just needs to be something other than the "
+"physical port your server is listening on."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:135
@@ -460,11 +440,10 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:147
 msgid ""
-"You use the same procedure for using any local client program to access a"
-" remote I2P server - just get the base64 public key (called destination "
-"key) of the remote server, choose a local port to connect to the remote "
-"server, open the tunnel, and just connect with your client to your "
-"heart's content."
+"You use the same procedure for using any local client program to access a "
+"remote I2P server - just get the base64 public key (called destination key) "
+"of the remote server, choose a local port to connect to the remote server, "
+"open the tunnel, and just connect with your client to your heart's content."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:152
@@ -475,25 +454,25 @@ msgstr "7 - Comparte os detalles do teu servidor con outros/as"
 msgid ""
 "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's "
 "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. "
-"Others will then be able to reach your server remotely, without either of"
-" you jeopardizing your anonymity."
+"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others"
+" will then be able to reach your server remotely, without either of you "
+"jeopardizing your anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:157
 msgid ""
-"Remember, you can go to What's on I2P and find the latest public keys "
-"linked to their URL. You should also post your own public key and URL "
-"their. However, you will want to do this anonymously, of course. "
-"Drupal.i2p.net is currently, as of this writing, only accessible from the"
-" net. So, to access the outside WWW anonymously from inside of I2P, you "
-"will need to start up your script called startSquid. Do it the same way "
-"you have been doing these other scripts. Reconfigure your browser to "
-"proxy on localhost:5555, as defined in the script, and when the script "
-"has generated it's keys, you can access the squid proxy. Put any WWW URL "
-"(such as Google or this i2p site) into your browser's address bar and you"
-" will be surfing the World Wide Web anonymously. Now you can safely post "
-"your public key, and no one can detect your IP address."
+"Remember, you can go to What's on I2P and find the latest public keys linked"
+" to their URL. You should also post your own public key and URL their. "
+"However, you will want to do this anonymously, of course. Drupal.i2p.net is "
+"currently, as of this writing, only accessible from the net. So, to access "
+"the outside WWW anonymously from inside of I2P, you will need to start up "
+"your script called startSquid. Do it the same way you have been doing these "
+"other scripts. Reconfigure your browser to proxy on localhost:5555, as "
+"defined in the script, and when the script has generated it's keys, you can "
+"access the squid proxy. Put any WWW URL (such as Google or this i2p site) "
+"into your browser's address bar and you will be surfing the World Wide Web "
+"anonymously. Now you can safely post your public key, and no one can detect "
+"your IP address."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:162
@@ -502,8 +481,8 @@ msgstr "8 - Escribe algún script para manexar todas istas parvadas"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:164
 msgid ""
-"It would drive most people crazy, going through all these steps every "
-"time one sets up an I2P server, and/or deploys a client."
+"It would drive most people crazy, going through all these steps every time "
+"one sets up an I2P server, and/or deploys a client."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:167
@@ -512,8 +491,8 @@ msgid ""
 "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called "
 "setupServer.py which automates all this nonsense into one simple command "
 "line . But I respect that people's tastes in user interfaces differ, and "
-"trying to write something which satisfies everyone's needs usually "
-"results in something so complex that it turns into newbie-repellent."
+"trying to write something which satisfies everyone's needs usually results "
+"in something so complex that it turns into newbie-repellent."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:170
@@ -524,16 +503,16 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:173
 msgid ""
-"Also, you may want to write a script which handles the startup of the I2P"
-" Router, the eepProxy, plus any and all tunnels you are using. I've got "
-"such a script called startEverything.sh, which gets launched at system "
-"startup. (Be sure to search this site for template scripts to automate "
-"your I2P commands. If I create a page for one, I'll try to remember to "
-"link it here."
+"Also, you may want to write a script which handles the startup of the I2P "
+"Router, the eepProxy, plus any and all tunnels you are using. I've got such "
+"a script called startEverything.sh, which gets launched at system startup. "
+"(Be sure to search this site for template scripts to automate your I2P "
+"commands. If I create a page for one, I'll try to remember to link it here."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:176
-msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
+msgid ""
+"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
 msgstr ""
 
 #: i2p2www/pages/site/misc/invisiblenet.html:2
@@ -542,13 +521,11 @@ msgstr "Documentos antigos"
 
 #: i2p2www/pages/site/misc/invisiblenet.html:5
 msgid ""
-"Following is a list of documents originally on www.invisiblenet.net/i2p/ "
-"and\n"
+"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n"
 "rescued via the\n"
 "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
 "They are quite dated and may or may not be accurate.\n"
-"However, the I2CP and I2NP documents in particular have some good "
-"information."
+"However, the I2CP and I2NP documents in particular have some good information."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:3
@@ -561,8 +538,7 @@ msgstr "Vista Xeral"
 
 #: i2p2www/pages/site/misc/jbigi.html:7
 msgid ""
-"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a "
-"little\n"
+"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n"
 "manual work and a piece of chewing gum we have made several\n"
 "cryptography operations quite a bit faster."
 msgstr ""
@@ -576,18 +552,15 @@ msgid ""
 "<a href=\"%(func)s\">mpz_powm()</a>\n"
 "as a replacement for the\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n"
-"As modPow() is a significant computational portion of many crypto "
-"operations, this is of significant benefit."
+"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:25
 #, python-format
 msgid ""
-"The standard I2P installation includes about 20 versions of the library "
-"for different platforms,\n"
+"The standard I2P installation includes about 20 versions of the library for different platforms,\n"
 "each about 50KB, inside the jbigi.jar file.\n"
-"The initialization of the JBigI library, including CPU identification, "
-"selection, and extraction\n"
+"The initialization of the JBigI library, including CPU identification, selection, and extraction\n"
 "of the correct loadable module, is handled by the\n"
 "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n"
 "If no module is available for the current platform, the standard\n"
@@ -601,8 +574,7 @@ msgstr "Reconstruindo e probando JBigI"
 
 #: i2p2www/pages/site/misc/jbigi.html:39
 msgid ""
-"Following are the instructions to build a new jbigi library for your own "
-"platform\n"
+"Following are the instructions to build a new jbigi library for your own platform\n"
 "and testing its performance."
 msgstr ""
 
@@ -613,31 +585,25 @@ msgstr "Requerimentos"
 #: i2p2www/pages/site/misc/jbigi.html:43
 msgid ""
 "This works on Linux, and with a few changes in build.sh probably also on\n"
-"other platforms. FreeBSD has also been reported to work too. On Kaffee "
-"the\n"
-"speedup is very small, because it already uses native BitInteger "
-"internally.\n"
+"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n"
+"speedup is very small, because it already uses native BitInteger internally.\n"
 "Blackdown seems to cause strange errors. Because you are going to do\n"
 "compilation, you need JDK; JRE won't work."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:50
 msgid ""
-"The required code is available in monotone database and the latest source"
-" tarball. "
+"The required code is available in monotone database and the latest source "
+"tarball. "
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:51
 msgid ""
 "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n"
-"included in your OS / distribution or installed already, it can be "
-"received from\n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Even if you\n"
-"have already installed it as binary, it might still be worth a try to "
-"compile\n"
-"GMP yourself, since then it will be able to use the specific instructions"
-" of\n"
+"included in your OS / distribution or installed already, it can be received from\n"
+"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n"
+"have already installed it as binary, it might still be worth a try to compile\n"
+"GMP yourself, since then it will be able to use the specific instructions of\n"
 "your processor. The latest GMP may also\n"
 "be used instead of GMP 5.0.2, but it hasn't been tested by us."
 msgstr ""
@@ -648,8 +614,7 @@ msgstr "Instruccións paso a paso"
 
 #: i2p2www/pages/site/misc/jbigi.html:63
 msgid ""
-"Look at <a href=\"http://localhost:7657/logs.jsp\">your running "
-"environment on the logs.jsp page</a>.\n"
+"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n"
 "There should be one of two status messages for JBigI - either"
 msgstr ""
 
@@ -677,27 +642,20 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:78
 msgid ""
-"Look on <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"to see what the lifetime average values for "
-"<code>crypto.elGamal.decrypt</code> and\n"
-"<code>crypto.elGamal.encrypt</code> are. The numbers are times in "
-"milliseconds. Copy these somewhere so you can compare\n"
+"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n"
+"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n"
 "them later on.\n"
 "The network average for encrypt time is about 20ms.\n"
-"If your encrypt time is less than 50ms for a relatively new processor, or"
-" less than 100ms\n"
-"for an older processor, and the native BigInteger library was loaded, you"
-" are probably fine."
+"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n"
+"for an older processor, and the native BigInteger library was loaded, you are probably fine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:87
 #, python-format
 msgid ""
 "Get the latest released source code of I2P from\n"
-"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge "
-"source\n"
+"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n"
 "out of the monotone database mtn.i2p2.de"
 msgstr ""
 
@@ -711,18 +669,14 @@ msgid ""
 "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n"
 "Use the 'dynamic' argument to build.sh.\n"
 "Otherwise, you must download GMP version 5.0.2 from\n"
-"from <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"saving it to gmp-5.0.2.tar.bz2.\n"
-"If you decide to use a newer version, change the VER= line in "
-"<code>core/c/jbigi/build.sh</code>."
+"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n"
+"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:101
 msgid ""
 "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n"
-"environment variable is set and you are using Linux then it might just "
-"work.\n"
+"environment variable is set and you are using Linux then it might just work.\n"
 "Otherwise change the settings. Remember, you need the Java SDK installed."
 msgstr ""
 
@@ -730,17 +684,13 @@ msgstr ""
 msgid ""
 "Run <code>build.sh</code> (if you downloaded GMP) or\n"
 "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n"
-"Maybe the build spewed out some errors of missing jni.h and jni_md.h "
-"files.\n"
-"Either copy these files from your java install into the "
-"core/c/jbigi/jbigi/include/ directory,\n"
+"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n"
+"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n"
 "or fix $JAVA_HOME.<br>\n"
-"You can run the <code>build.sh</code> from the <code>core/c/</code> "
-"directory which will\n"
+"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n"
 "build all available jbigi libs into a jbigi.jar.</br>\n"
 "A file named <code>libjbigi.so</code> should be created in the current\n"
-"directory. If this doesn't happen and/or you get errors then please "
-"report\n"
+"directory. If this doesn't happen and/or you get errors then please report\n"
 "them."
 msgstr ""
 
@@ -768,11 +718,8 @@ msgstr "Reinicia os teus programas de I2P"
 
 #: i2p2www/pages/site/misc/jbigi.html:131
 msgid ""
-"On <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"the <code>crypto.elGamal.decrypt</code> and "
-"<code>crypto.elGamal.encrypt</code>\n"
+"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n"
 "should be a lot faster."
 msgstr ""
 
@@ -782,8 +729,7 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:4
 msgid ""
-"The following message was received in mid-November 2007. We have no "
-"further information\n"
+"The following message was received in mid-November 2007. We have no further information\n"
 "on jrandom's status."
 msgstr ""
 
@@ -792,8 +738,7 @@ msgstr ""
 msgid ""
 "Subsequently, in an unrelated incident, the hosting company for\n"
 "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n"
-"on January 13, 2008, and the i2p.net servers did not fully return to "
-"service.\n"
+"on January 13, 2008, and the i2p.net servers did not fully return to service.\n"
 "As only jrandom has the credentials required to restore service,\n"
 "and he could not be contacted,\n"
 "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n"
@@ -815,33 +760,24 @@ msgstr "A instalar manualmente o Java Wrapper"
 #: i2p2www/pages/site/misc/manual-wrapper.html:6
 #, python-format
 msgid ""
-"The installation package for the <a href=\"%(downloads)s\">I2P router</a>"
-" comes\n"
-"with a Java wrapper for the most common architectures. If your system is "
-"not\n"
-"supported by our installer&mdash;or if you want to update the wrapper to "
-"a\n"
-"newer version&mdash;the following steps describe installing the wrapper "
-"manually."
+"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n"
+"with a Java wrapper for the most common architectures. If your system is not\n"
+"supported by our installer&mdash;or if you want to update the wrapper to a\n"
+"newer version&mdash;the following steps describe installing the wrapper manually."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:14
 msgid ""
-"Check Tanuki Software's <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download"
-" page</a>\n"
+"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n"
 "for your platform. Is your platform listed? If so, you're in\n"
-"luck! Download the most recent version of the Community Edition for your "
-"OS and\n"
+"luck! Download the most recent version of the Community Edition for your OS and\n"
 "CPU and move to <a href=\"#packaged\">the next step</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:20
 msgid ""
-"If your platform does not have an already compiled wrapper available, you"
-"\n"
-"may be able to compile it yourself. If you are willing to have a go at "
-"it, move\n"
+"If your platform does not have an already compiled wrapper available, you\n"
+"may be able to compile it yourself. If you are willing to have a go at it, move\n"
 "on to <a href=\"#compiling\">compiling</a> the wrapper for your system."
 msgstr ""
 
@@ -850,7 +786,8 @@ msgid "Using existing binaries"
 msgstr "A usar binarios existentes"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:28
-msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>."
+msgid ""
+"In the steps below, $I2P means <em>the location I2P was installed to</em>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:36
@@ -866,8 +803,8 @@ msgstr ""
 #: i2p2www/pages/site/misc/manual-wrapper.html:39
 #: i2p2www/pages/site/misc/manual-wrapper.html:67
 msgid ""
-"If this did not work you'll need to use <code>runplain.sh</code> to start"
-" I2P."
+"If this did not work you'll need to use <code>runplain.sh</code> to start "
+"I2P."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:43
@@ -876,16 +813,15 @@ msgstr "A compilar dende o código fonte"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:44
 msgid ""
-"These steps worked to compile the wrapper for use on a mipsel system "
-"running Debian. The steps <strong>will</strong> need to be altered for "
-"your system."
+"These steps worked to compile the wrapper for use on a mipsel system running"
+" Debian. The steps <strong>will</strong> need to be altered for your system."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:48
 msgid ""
-"Download the source archive for the community version of the wrapper from"
-" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download"
-" page</a>."
+"Download the source archive for the community version of the wrapper from <a"
+" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download "
+"page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:49
@@ -894,8 +830,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:51
 msgid ""
-"Set environment variables <code>ANT_HOME</code> and "
-"<code>JAVA_HOME</code>. For example, in Debian:"
+"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. "
+"For example, in Debian:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:54
@@ -934,164 +870,110 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:47
 msgid ""
-"An optimized form, designed to handle only 128KB [1] files and pages, can"
-"\n"
+"An optimized form, designed to handle only 128KB [1] files and pages, can\n"
 "operate significantly faster:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:71
 msgid ""
 "The difference in network load and latency is significant - this is\n"
-"essentially a UDP version of HTTP.  On the normal web, we can't really do"
-" that,\n"
-"since most HTTP requests and responses are orders of magnitude larger "
-"than UDP\n"
-"packets functionally support, but in I2P, messages can be large.  The "
-"savings\n"
-"for the network load comes from the fact that we don't need to send any "
-"ACK\n"
+"essentially a UDP version of HTTP.  On the normal web, we can't really do that,\n"
+"since most HTTP requests and responses are orders of magnitude larger than UDP\n"
+"packets functionally support, but in I2P, messages can be large.  The savings\n"
+"for the network load comes from the fact that we don't need to send any ACK\n"
 "messages - rather than the earlier wrap/unwrap request (that bundles a\n"
-"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery),"
-" the\n"
-"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there"
-" are no\n"
+"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n"
+"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n"
 "resends)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:83
 msgid ""
-"The data that the MinWWW proxy and server need to wrap is trivial - when "
-"the\n"
-"proxy wants to send \"GET /\", it prepends it with the I2P Destination "
-"sending\n"
-"the request, followed by a 4 byte request ID.  The MinWWW server receives"
-" those\n"
-"requests, contacts the appropriate HTTPD, sends the request, waits for "
-"the\n"
+"The data that the MinWWW proxy and server need to wrap is trivial - when the\n"
+"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n"
+"the request, followed by a 4 byte request ID.  The MinWWW server receives those\n"
+"requests, contacts the appropriate HTTPD, sends the request, waits for the\n"
 "response, and sends a reply to the MinWWW proxy containing the response,\n"
-"prefixed with the original request ID.  That response is taken and passed"
-" back\n"
+"prefixed with the original request ID.  That response is taken and passed back\n"
 "to the browser and the connection is closed."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:93
 msgid ""
 "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n"
-"list, going through some round robin or other algorithm, so that there "
-"are\n"
-"multiple outproxies merged transparently.  The bandwidth required for "
-"running\n"
-"one of these outproxies is also greatly reduced, since it will only "
-"handle 128KB\n"
+"list, going through some round robin or other algorithm, so that there are\n"
+"multiple outproxies merged transparently.  The bandwidth required for running\n"
+"one of these outproxies is also greatly reduced, since it will only handle 128KB\n"
 "files (aka no one is going to be downloading porn, warez, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:101
 msgid ""
-"The functionality /is/ limited, but 128KB of data is a lot for a single "
-"HTTP\n"
-"request or response.  The above diagrams are also unrealistic in their "
-"hops -\n"
-"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send "
-"each\n"
-"of the messages through two additional outbound routers, then forwarded "
-"to\n"
-"two additional inbound routers to ROUTERB, so the lag there is "
-"significant -\n"
-"while the above only saves 11 steps, 8 of those steps need to traverse "
-"the\n"
-"entire tunnel path (4+ remote hops each time when tunnels are 2 remote "
-"hops\n"
-"in each stretch), leaving MinWWW with only two full traversals (one for "
-"the\n"
+"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n"
+"request or response.  The above diagrams are also unrealistic in their hops -\n"
+"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send each\n"
+"of the messages through two additional outbound routers, then forwarded to\n"
+"two additional inbound routers to ROUTERB, so the lag there is significant -\n"
+"while the above only saves 11 steps, 8 of those steps need to traverse the\n"
+"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n"
+"in each stretch), leaving MinWWW with only two full traversals (one for the\n"
 "request, one for the response), instead of 10."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:113
 msgid ""
-"Implementing the MinWWW proxy and server should be fairly easy - read an "
-"HTTP\n"
-"request from the client fully (perhaps only start out with HTTP GET, "
-"leaving\n"
-"HTTP POST for later), wrap the message, and wait for the response.  The "
-"server\n"
-"in turn simply needs to parse the request to either open a socket or URL,"
-"\n"
-"send the request, wait for the response, and send it back through the "
-"network.\n"
+"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n"
+"request from the client fully (perhaps only start out with HTTP GET, leaving\n"
+"HTTP POST for later), wrap the message, and wait for the response.  The server\n"
+"in turn simply needs to parse the request to either open a socket or URL,\n"
+"send the request, wait for the response, and send it back through the network.\n"
 "If someone were to implement this, it would be Good :)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:122
 msgid ""
-"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary "
-"message\n"
-"size, but that's going to be going away since it involves either "
-"excessive memory\n"
-"overhead on intermediary routers, or additional implementation details to"
-"\n"
-"handle.  I2PTunnel is currently limited to 128KB and hasn't been a "
-"burden,\n"
+"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary message\n"
+"size, but that's going to be going away since it involves either excessive memory\n"
+"overhead on intermediary routers, or additional implementation details to\n"
+"handle.  I2PTunnel is currently limited to 128KB and hasn't been a burden,\n"
 "so perhaps it could be increased to 256KB when the I2CP spec is updated)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:4
 msgid ""
-"There has been discussion about a distributed blogging application for a "
-"few\n"
-"months now called \"MyI2P\".  While the original discussions were lost, "
-"we were \n"
-"able to retrieve a Google <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
-"of it.  It isn't pretty, but it includes the basic overview and some "
-"discussion\n"
+"There has been discussion about a distributed blogging application for a few\n"
+"months now called \"MyI2P\".  While the original discussions were lost, we were \n"
+"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
+"of it.  It isn't pretty, but it includes the basic overview and some discussion\n"
 "that ensued."
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:12
 #, python-format
 msgid ""
-"The application itself is not yet implemented, and the ideas behind it "
-"have \n"
-"been made less ambitious over time, but they are still valid and the "
-"current \n"
-"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality "
-"available \n"
-"along side the I2P 1.0 release.  That will include a distributed address "
-"book\n"
-"to enable secure, distributed, and human readable naming by sacrificing "
-"the \n"
-"need for global uniqueness - basically everyone has their own local "
-"address book \n"
-"and can 'subscribe' to other people's address books, letting MyI2P "
-"periodically\n"
-"retrieve new name to destination mappings (leaving conflicts up to the "
-"user to\n"
-"resolve).  In addition to the address book, there will be a distributed "
-"blogging\n"
+"The application itself is not yet implemented, and the ideas behind it have \n"
+"been made less ambitious over time, but they are still valid and the current \n"
+"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n"
+"along side the I2P 1.0 release.  That will include a distributed address book\n"
+"to enable secure, distributed, and human readable naming by sacrificing the \n"
+"need for global uniqueness - basically everyone has their own local address book \n"
+"and can 'subscribe' to other people's address books, letting MyI2P periodically\n"
+"retrieve new name to destination mappings (leaving conflicts up to the user to\n"
+"resolve).  In addition to the address book, there will be a distributed blogging\n"
 "system using a reduced and secured subset of \n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to "
-"essentially\n"
-"provide an anonymous <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
-"a 'friends list' and transparent access control (authenticated by the I2P"
-"\n"
-"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the "
-"address book)."
+"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n"
+"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
+"a 'friends list' and transparent access control (authenticated by the I2P\n"
+"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:29
 msgid ""
-"Additional functionality, such as integration with a DHT backing store or"
-" \n"
-"swarming file transfers for 'attachments' can be added later.  Email may "
-"or may\n"
-"not get in the first pass either, though its implementation is "
-"essentially just\n"
-"a blog entry with private access, so perhaps some UI designer can come up"
-" with\n"
-"something.  Exporting the data to RSS or access through ATOM will be an "
-"option \n"
+"Additional functionality, such as integration with a DHT backing store or \n"
+"swarming file transfers for 'attachments' can be added later.  Email may or may\n"
+"not get in the first pass either, though its implementation is essentially just\n"
+"a blog entry with private access, so perhaps some UI designer can come up with\n"
+"something.  Exporting the data to RSS or access through ATOM will be an option \n"
 "down the road as well."
 msgstr ""
 
@@ -1106,8 +988,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/ratestats.html:7
 msgid ""
-"The list was gathered using the following command in the top directory of"
-" the branch i2p.i2p:"
+"The list was gathered using the following command in the top directory of "
+"the branch i2p.i2p:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/ratestats.html:10
@@ -1122,18 +1004,15 @@ msgid ""
 "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n"
 "on monotone.\n"
 "See\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p "
-"monotone</a>\n"
-"for more information on how to get started and check out the source "
-"anonymously.\n"
+"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n"
+"for more information on how to get started and check out the source anonymously.\n"
 "There is also a quick-start guide on the\n"
 "<a href=\"%(newdevs)s\">new developer's page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/transition-guide.html:16
 msgid ""
-"If you want to get the source non-anonymously, pull from the public "
-"server mtn.welterde.de.\n"
+"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n"
 "The i2p source code branch is \"i2p.i2p\"."
 msgstr ""
 
@@ -1162,24 +1041,20 @@ msgid ""
 "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n"
 "we do not have his update signing key or access to\n"
 "www.i2p[.net] or dev.i2p[.net].\n"
-"Complication and zzz have generated new signing keys, and they and Amiga "
-"are providing\n"
-"update file hosting. These changes must be configured in your router to "
-"take effect."
+"Complication and zzz have generated new signing keys, and they and Amiga are providing\n"
+"update file hosting. These changes must be configured in your router to take effect."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17
 msgid ""
-"Make the following configuration changes and your router will "
-"automatically install\n"
+"Make the following configuration changes and your router will automatically install\n"
 "the latest release."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22
 #, python-format
 msgid ""
-"We recommend the automated process as it will verify the key of the "
-"signed update file.\n"
+"We recommend the automated process as it will verify the key of the signed update file.\n"
 "If you do not make these changes,\n"
 "you may manually download the i2pupdate.zip file from\n"
 "<a href=\"%(downloads)s\">the download page</a>."
@@ -1192,8 +1067,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38
 msgid ""
-"Select ONE of the following new Update URLs at random and enter it into "
-"the Update URL box: "
+"Select ONE of the following new Update URLs at random and enter it into the "
+"Update URL box: "
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43
@@ -1215,8 +1090,7 @@ msgstr "Preme en \"Aplicar\""
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58
 msgid ""
 "You are now ready to automatically receive the release update file,\n"
-"either by setting your update policy to \"download and install\" or by "
-"clicking on the\n"
+"either by setting your update policy to \"download and install\" or by clicking on the\n"
 "\"update available\" link when it appears."
 msgstr ""
 
@@ -1225,7 +1099,5 @@ msgstr ""
 msgid ""
 "If you would like to verify the trusted update keys, they are also\n"
 "<a href=\"%(url)s\">posted and signed here</a>.\n"
-"Thank you for your support during this transition. For help please "
-"contact us on #i2p."
+"Thank you for your support during this transition. For help please contact us on #i2p."
 msgstr ""
-
diff --git a/i2p2www/translations/he/LC_MESSAGES/about.po b/i2p2www/translations/he/LC_MESSAGES/about.po
index f265c990b3ac5e5411a3db6f0ff4e8b181547966..fe7799173faf8fce9a04284c0717fc8b222d76fd 100644
--- a/i2p2www/translations/he/LC_MESSAGES/about.po
+++ b/i2p2www/translations/he/LC_MESSAGES/about.po
@@ -1,22 +1,22 @@
-# Hebrew translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: str4d <str4d@i2pmail.org>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Hebrew (http://www.transifex.com/otf/I2P/language/he/)\n"
-"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && "
-"n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: he\n"
+"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3;\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -26,8 +26,7 @@ msgstr ""
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
 msgstr ""
 
@@ -50,8 +49,7 @@ msgstr ""
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
 msgstr ""
 
 #: i2p2www/pages/site/about/browser-config.html:2
@@ -64,24 +62,158 @@ msgstr "מילון מונחים"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
 
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
+
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -91,15 +223,14 @@ msgstr ""
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -113,12 +244,8 @@ msgstr "פרויקט האינטרנט הבלתי נראה"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -128,13 +255,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -143,15 +270,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -160,28 +287,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -190,36 +316,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -228,13 +353,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -243,15 +368,11 @@ msgstr "השוואות"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -270,9 +391,8 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -329,8 +449,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -349,8 +468,7 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
 msgstr ""
 
@@ -359,8 +477,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:76
@@ -373,8 +490,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
@@ -383,8 +499,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:95
@@ -392,8 +508,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -408,15 +523,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -428,8 +541,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -484,16 +596,14 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
@@ -502,11 +612,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:189
@@ -559,16 +667,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
 msgstr ""
@@ -584,12 +690,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -603,35 +706,29 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -640,16 +737,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -666,11 +761,57 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -679,18 +820,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -701,84 +839,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -789,8 +904,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -798,27 +912,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -826,26 +936,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -856,10 +957,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -867,18 +966,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -889,10 +985,8 @@ msgstr ""
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
 msgstr ""
@@ -1064,7 +1158,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1304,7 +1399,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1354,32 +1450,25 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1397,8 +1486,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1437,10 +1526,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1454,15 +1541,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1471,11 +1554,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1530,8 +1610,7 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1549,15 +1628,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1576,14 +1651,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1594,20 +1665,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1618,24 +1682,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1655,33 +1710,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -1694,32 +1740,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -1729,27 +1767,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -1766,17 +1796,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -1789,8 +1816,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -1801,10 +1827,8 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -1823,30 +1847,23 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -1860,55 +1877,40 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -1919,20 +1921,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -1943,16 +1938,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -1962,17 +1952,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -1983,20 +1970,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2010,26 +1990,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2038,18 +2008,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2057,16 +2021,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2082,52 +2041,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2142,102 +2082,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2250,4 +2149,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/he/LC_MESSAGES/get-involved.po b/i2p2www/translations/he/LC_MESSAGES/get-involved.po
index d524d4b6d35703cd2b6280617c54213ecd9e57e6..4f6ad96a45e398ba4a22f9aa5bcbaff0db07a50a 100644
--- a/i2p2www/translations/he/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/he/LC_MESSAGES/get-involved.po
@@ -1,22 +1,22 @@
-# Hebrew translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:56+0000\n"
-"Last-Translator: ION\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Hebrew (http://www.transifex.com/otf/I2P/language/he/)\n"
-"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && "
-"n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: he\n"
+"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3;\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -31,12 +31,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -51,44 +48,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -127,10 +113,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -160,10 +144,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -178,25 +160,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -222,8 +194,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -237,12 +208,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -253,10 +221,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
 msgstr ""
@@ -267,17 +233,12 @@ msgstr "תיעוד"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -288,16 +249,11 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -310,14 +266,10 @@ msgstr "שירותים"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -327,9 +279,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -373,8 +325,7 @@ msgstr "ניתוח"
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -382,7 +333,7 @@ msgstr ""
 msgid "Roadmap"
 msgstr "מפת דרכים"
 
-#: i2p2www/pages/site/get-involved/roadmap.html:309
+#: i2p2www/pages/site/get-involved/roadmap.html:210
 #, python-format
 msgid ""
 "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info "
@@ -443,84 +394,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -529,17 +457,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -547,29 +470,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -577,42 +494,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -656,72 +564,52 @@ msgstr ""
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -731,8 +619,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -745,33 +633,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -792,76 +674,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -871,25 +734,18 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -900,29 +756,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -932,10 +780,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -943,13 +789,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -960,43 +803,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1011,28 +847,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1043,8 +871,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1058,8 +885,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1078,14 +904,10 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1094,17 +916,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1114,8 +933,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1137,32 +955,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1171,47 +982,39 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1223,12 +1026,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1253,8 +1053,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1273,8 +1073,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1303,20 +1102,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1388,8 +1183,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1402,24 +1196,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1429,22 +1214,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1480,21 +1257,16 @@ msgstr ""
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1518,10 +1290,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1532,8 +1302,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1546,10 +1315,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1559,7 +1326,8 @@ msgid "Release Signing Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1580,7 +1348,8 @@ msgid "Download PGP public key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1588,13 +1357,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1602,7 +1372,8 @@ msgid "Security GPG Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1611,8 +1382,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1644,35 +1414,28 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1680,29 +1443,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1729,12 +1486,10 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1744,10 +1499,8 @@ msgstr "קהילה"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1769,8 +1522,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1778,13 +1531,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1793,8 +1547,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1808,34 +1561,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1845,61 +1592,49 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1926,20 +1661,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1948,14 +1682,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1965,12 +1699,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1990,8 +1725,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2018,12 +1752,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2042,22 +1773,22 @@ msgstr "שימוש בסביבת פיתוח מובנית (IDE) עם I2P"
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2074,8 +1805,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2092,14 +1823,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2178,34 +1909,26 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2215,20 +1938,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2245,22 +1964,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2272,10 +1988,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2285,38 +1999,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2334,23 +2040,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2364,11 +2064,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2379,34 +2076,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2419,18 +2109,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2444,16 +2130,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2473,67 +2157,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2557,8 +2231,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2574,44 +2248,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2619,8 +2283,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2629,64 +2292,59 @@ msgid "New Developer's Guide"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:6
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:32
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:31
 msgid "Basic study"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:7
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:46
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:45
 msgid "Getting the I2P code"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:9
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:52
 msgid "The new way: Git"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:10
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:11
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81
-msgid "The old way: Monotone"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:145
 msgid "Building I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:166
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:102
 msgid "Development ideas"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:174
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:110
 msgid "Making the results available"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:196
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
 msgid "Get to know us!"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:202
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
 msgid "Translations"
 msgstr "תרגומים"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:17
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:208
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
 msgid "Tools"
 msgstr "כלי עבודה"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:22
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:21
 msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:26
 #, python-format
 msgid ""
 "\n"
@@ -2694,42 +2352,34 @@ msgid ""
 "Try <a href=\"%(volunteer)s\">getting involved</a> first."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:34
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:38
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:37
 #, python-format
 msgid ""
 "Study the <a href=\"%(intro)s\">how intro</a>,\n"
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:47
 msgid ""
 "For development on the I2P router or the embedded applications,\n"
 "there are two ways to get the source code:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
-msgid "The easy way: Git"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:55
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"For the time being, issues are still being manged on <a "
-"href=\"%(trac)s\">trac</a>."
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
+"issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:58
@@ -2742,143 +2392,31 @@ msgstr ""
 msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:84
-msgid ""
-"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n"
-"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to "
-"the source code (and for a lot of complicated things, but 'keeping track "
-"of changes' is the basic idea)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:89
-msgid ""
-"Skim over the <a "
-"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>,"
-" to make sure you understand the concepts."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:93
-msgid ""
-"If you want to remain anonymous, you need to do an additional step, to "
-"set up a connection to a monotone server over I2P:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
-#, python-format
-msgid ""
-"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port "
-"8998 pointing to mtn.i2p-projekt.i2p."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
-msgid ""
-"Pick a directory where you want to put all your I2P files, and create a "
-"monotone database:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
-msgid ""
-"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or"
-" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the "
-"following contents:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> "
-"into a new file (e.g. <code>keys.txt</code>) in the same directory\n"
-"  that <code>i2p.mtn</code> is in. Import the keys into your database "
-"with <br><code><pre>      mtn -d i2p.mtn read < keys.txt</pre></code>"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
-msgid ""
-"Pull the I2P sources to your machine. This may take a long time, "
-"especially if you are doing this over I2P!"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
-msgid "Anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
-msgid "Non-anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
-msgid ""
-"All the sources are now present on your machine, in the database file. To"
-" make them available in a directory, you need to check them out:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:125
-msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the "
-"I2P sources."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
-msgid "Remarks"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
-msgid ""
-"\n"
-"To download the website files instead of the I2P source files, use "
-"'i2p.www' instead of 'i2p.i2p'."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:133
-msgid ""
-"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it"
-" left off.\n"
-"If you are in a hurry, use the non-anonymous access."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
-#, python-format
-msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on <a"
-" href=\"%(viewmtn)s\">viewmtn</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:141
-#, python-format
-msgid ""
-"A long explanation about using monotone is available on the <a "
-"href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:147
-#, python-format
-msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:155
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:91
 msgid ""
 "To build or work on console translations, you need\n"
 "the xgettext, msgfmt, and msgmerge tools from the\n"
 "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:161
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
 #, python-format
 msgid ""
 "For development on new applications,\n"
 "see the <a href=\"%(apps)s\">application development guide</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:167
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
 #, python-format
 msgid ""
 "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n"
@@ -2887,93 +2425,42 @@ msgid ""
 "for ideas."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:176
-#, python-format
-msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:181
-msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:184
-msgid "use an empty passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:185
-msgid "enter a passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:186
-#, python-format
-msgid ""
-"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get "
-"push privileges"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:187
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get "
-"commit privileges - not required for website"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:188
-msgid "check in with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:189
-msgid "push with this key"
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:191
-#, python-format
-msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:197
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:203
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:209
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:217
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -2993,11 +2480,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3012,10 +2497,8 @@ msgstr ""
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3035,12 +2518,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3051,27 +2531,23 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
 msgstr ""
 
@@ -3087,10 +2563,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3108,8 +2582,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
 msgstr ""
 
@@ -3122,19 +2595,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3142,15 +2611,13 @@ msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3159,8 +2626,8 @@ msgstr "שאלות נפוצות"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3176,67 +2643,65 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3261,10 +2726,8 @@ msgstr "תשקיף"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3273,21 +2736,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3310,8 +2769,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3321,18 +2779,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3342,10 +2795,8 @@ msgstr "מדיניות פרטיות"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3354,17 +2805,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3373,10 +2822,8 @@ msgstr "מתחילים"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3387,18 +2834,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr ""
-
diff --git a/i2p2www/translations/he/LC_MESSAGES/priority.po b/i2p2www/translations/he/LC_MESSAGES/priority.po
index c3fe08fa5e6f10e90ebdc3935a7162dfbe127b86..acca3ed551fef21ff2e0b9370bde7baeeaa8a94b 100644
--- a/i2p2www/translations/he/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/he/LC_MESSAGES/priority.po
@@ -1,25 +1,25 @@
-# Hebrew translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # AnonWolf <anonwolf911@gmail.com>, 2015
 # fengari <bokstafur@mail.i2p>, 2014
 # Johnny Diralenzo, 2015
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-10-11 16:27+0000\n"
-"PO-Revision-Date: 2021-10-11 16:30+0000\n"
-"Last-Translator: ION\n"
+"PO-Revision-Date: 2013-02-03 00:02+0000\n"
+"Last-Translator: Johnny Diralenzo, 2015\n"
 "Language-Team: Hebrew (http://www.transifex.com/otf/I2P/language/he/)\n"
-"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && "
-"n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: he\n"
+"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3;\n"
 
 #: i2p2www/pages/blog/category.html:2
 msgid "Blog Category"
@@ -58,10 +58,8 @@ msgstr "יוצר:"
 
 #: i2p2www/pages/downloads/browser-content.html:1
 msgid ""
-"Your web browser will need to be configured in order to browse web sites "
-"on I2P\n"
-"and to utilize the outproxies available within I2P. Below are "
-"walkthroughs for\n"
+"Your web browser will need to be configured in order to browse web sites on I2P\n"
+"and to utilize the outproxies available within I2P. Below are walkthroughs for\n"
 "some of the most popular browsers."
 msgstr ""
 
@@ -72,15 +70,13 @@ msgstr ""
 #: i2p2www/pages/downloads/browser-content.html:8
 #, python-format
 msgid ""
-"If you are using Windows, the recommended way of accessing I2P is using "
-"the\n"
+"If you are using Windows, the recommended way of accessing I2P is using the\n"
 "<a href='%(profile)s'>Firefox profile</a>."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:12
 msgid ""
-"If you do not wish to use that profile or are not on Windows, you need to"
-"\n"
+"If you do not wish to use that profile or are not on Windows, you need to\n"
 "configure your browser yourself.  Read below on how to that."
 msgstr ""
 
@@ -101,26 +97,21 @@ msgstr ""
 #: i2p2www/pages/downloads/browser-content.html:30
 msgid ""
 "A new way of automatically configuring the I2P Browser is\n"
-"currently being tested. It uses the Firefox's \"Container Tabs\" to build"
-" private\n"
+"currently being tested. It uses the Firefox's \"Container Tabs\" to build private\n"
 "browsing tools for use with I2P and I2P applications."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:33
 msgid ""
 "It does pre-configuration of your browser by enabling some of\n"
-"the privacy Browser Settings like ResistFingerprinting, and enforces "
-"WebRTC proxy\n"
-"obedience. It also contains menus, shortcuts, and monitoring tools "
-"improving\n"
-"Firefox's integration with I2P. It is a by-product of the I2P Browser "
-"project.\n"
+"the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy\n"
+"obedience. It also contains menus, shortcuts, and monitoring tools improving\n"
+"Firefox's integration with I2P. It is a by-product of the I2P Browser project.\n"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:38
 msgid ""
-"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon"
-"/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n"
+"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n"
 "can be obtained from the Mozilla addon store.\n"
 msgstr ""
 
@@ -131,8 +122,7 @@ msgstr ""
 #: i2p2www/pages/downloads/browser-content.html:42
 msgid ""
 "From the Menu button in the top right, select <em>Preferences</em>.\n"
-"Scroll down until you see the <em>Network Proxy</em> section, as shown in"
-" the\n"
+"Scroll down until you see the <em>Network Proxy</em> section, as shown in the\n"
 "screenshot below. Click on <em>Settings</em>"
 msgstr ""
 
@@ -144,8 +134,7 @@ msgstr ""
 msgid ""
 "In the <em>Connection Settings</em> pop-up, select <em>Manual proxy\n"
 "    configuration</em>. Set both the HTTP and SSL Proxy to address\n"
-"<code>127.0.0.1</code> with port <code>4444</code> as shown in the "
-"following\n"
+"<code>127.0.0.1</code> with port <code>4444</code> as shown in the following\n"
 "screenshot."
 msgstr ""
 
@@ -182,17 +171,11 @@ msgstr ""
 #: i2p2www/pages/downloads/browser-content.html:69
 msgid ""
 "An experimental, partially-automated configuration process for\n"
-"Chrome is available. In order to configure it, create a new "
-"<em>Profile</em>\n"
-"especially for your I2P browsing, separate from the default profile. Then"
-" install\n"
-"this <a "
-"href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a>"
-" in your newly-created profile. This profile\n"
-"is now configured to use I2P. Highly detailed instructions are available "
-"at the\n"
-"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-"
-"Chromium\">homepage.</a>\n"
+"Chrome is available. In order to configure it, create a new <em>Profile</em>\n"
+"especially for your I2P browsing, separate from the default profile. Then install\n"
+"this <a href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a> in your newly-created profile. This profile\n"
+"is now configured to use I2P. Highly detailed instructions are available at the\n"
+"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-Chromium\">homepage.</a>\n"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:76
@@ -201,14 +184,10 @@ msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:77
 msgid ""
-"Chromium-Based Browsers like Chrome have slightly different places for "
-"their\n"
-"proxy settings depending on variant and platform. These instructions may "
-"be\n"
-"slightly different in Brave or Iridium, for instance. From the "
-"<em>Main</em>\n"
-"menu, navigate to the <em>Settings</em>, and search for the <em></em> "
-"menu item.\n"
+"Chromium-Based Browsers like Chrome have slightly different places for their\n"
+"proxy settings depending on variant and platform. These instructions may be\n"
+"slightly different in Brave or Iridium, for instance. From the <em>Main</em>\n"
+"menu, navigate to the <em>Settings</em>, and search for the <em></em> menu item.\n"
 "Clicking it will open the right settings for your platform."
 msgstr ""
 
@@ -218,10 +197,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:85
 msgid ""
-"On Windows, this button will launch you into the shared proxy settings "
-"used\n"
-"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure"
-" it by\n"
+"On Windows, this button will launch you into the shared proxy settings used\n"
+"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure it by\n"
 "following the Internet Explorer 8 guide."
 msgstr ""
 
@@ -236,42 +213,29 @@ msgstr ""
 #: i2p2www/pages/downloads/browser-content.html:94
 msgid ""
 "Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have\n"
-"an about:config page for you to configure proxy settings manually. It is "
-"further\n"
-"not possible to use most extensions in Fenix-based Firefoxes. It is "
-"possible to\n"
-"enable support about:config and enable more extensions in Firefox Nightly"
-" at the time \n"
-"of this writing, but it's a manual and difficult process. "
-"<em>IceRaven</em> is a fork\n"
-"of Firefox which enables a collection of extensions while Mozilla and the"
-" Mozilla\n"
-"Community work on adding support for extensions to Firefox for Android. "
-"It provides\n"
-"the easiest way of configuring a modern Firefox-based Browser for "
-"Android. It does\n"
-"not come from Mozilla and carries no guarantees from them. <em>Installing"
-" the extension\n"
+"an about:config page for you to configure proxy settings manually. It is further\n"
+"not possible to use most extensions in Fenix-based Firefoxes. It is possible to\n"
+"enable support about:config and enable more extensions in Firefox Nightly at the time \n"
+"of this writing, but it's a manual and difficult process. <em>IceRaven</em> is a fork\n"
+"of Firefox which enables a collection of extensions while Mozilla and the Mozilla\n"
+"Community work on adding support for extensions to Firefox for Android. It provides\n"
+"the easiest way of configuring a modern Firefox-based Browser for Android. It does\n"
+"not come from Mozilla and carries no guarantees from them. <em>Installing the extension\n"
 "in IceRaven will proxy all your IceRaven browsing over I2P.</em>"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:104
 msgid ""
-"If you have not installed IceRaven yet, go to the next step. If you have "
-"been\n"
-"using IceRaven for a while, go to the main menu, select the History tab, "
-"and make\n"
-"sure that you have cleared information about your past browsing by "
-"tapping the\n"
+"If you have not installed IceRaven yet, go to the next step. If you have been\n"
+"using IceRaven for a while, go to the main menu, select the History tab, and make\n"
+"sure that you have cleared information about your past browsing by tapping the\n"
 "\"Delete History\" button."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:108
 msgid ""
-"Open the IceRaven main menu, and scroll to the top until you see the "
-"\"Add-Ons\"\n"
-"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. "
-"Install\n"
+"Open the IceRaven main menu, and scroll to the top until you see the \"Add-Ons\"\n"
+"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. Install\n"
 "the extension named <em>I2P Proxy for Android and other Systems</em>.\n"
 msgstr ""
 
@@ -283,23 +247,19 @@ msgstr ""
 msgid ""
 "This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based\n"
 "web browsers, if installed from the following addons.mozilla.org URL.\n"
-"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-"
-"proxy/\">I2P Proxy for Android and Other Systems</a><em>\n"
+"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-proxy/\">I2P Proxy for Android and Other Systems</a><em>\n"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:118
 msgid ""
-"This extension is identical to the Chromium extension and is built from "
-"the same source."
+"This extension is identical to the Chromium extension and is built from the "
+"same source."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:119
 msgid ""
-"In order to enable extension support in Firefox Nightly, you should "
-"follow\n"
-"the steps provided by Mozilla on their <a "
-"href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-"
-"support-in-firefox-for-android-nightly/\">Blog</a>"
+"In order to enable extension support in Firefox Nightly, you should follow\n"
+"the steps provided by Mozilla on their <a href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-support-in-firefox-for-android-nightly/\">Blog</a>"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:124
@@ -308,8 +268,7 @@ msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:125
 msgid ""
-"In the start menu search for the the \"Network and Internet Settings\" to"
-" open the\n"
+"In the start menu search for the the \"Network and Internet Settings\" to open the\n"
 "settings. The last entry in the menu is the Proxy Settings, click it to\n"
 "your proxy to connect to I2P."
 msgstr ""
@@ -320,14 +279,10 @@ msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:131
 msgid ""
-"Now set the checkmark at \"use a proxy server for your LAN\" and at the "
-"\"Bypass\n"
-"proxy server for local addresses\". With a click on Advanced-button you "
-"open the\n"
-"window to open the ports. Enter the values like on the picture, IP "
-"127.0.0.1\n"
-"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save "
-"the\n"
+"Now set the checkmark at \"use a proxy server for your LAN\" and at the \"Bypass\n"
+"proxy server for local addresses\". With a click on Advanced-button you open the\n"
+"window to open the ports. Enter the values like on the picture, IP 127.0.0.1\n"
+"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the\n"
 "settings and your browser is set to use the I2P proxy."
 msgstr ""
 
@@ -337,18 +292,15 @@ msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:143
 msgid ""
-"Remember: I2P was not designed for creating proxies to the outer "
-"Internet.\n"
+"Remember: I2P was not designed for creating proxies to the outer Internet.\n"
 "Instead, it is meant to be used as an internal network."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:147
 msgid ""
-"<p><b>The I2P project itself does not run any proxies to the "
-"Internet.</b>\n"
+"<p><b>The I2P project itself does not run any proxies to the Internet.</b>\n"
 "The only outproxy is a service from the privacy solutions project.\n"
-"Consider donating to them for a continued stable service. Increased "
-"funding will\n"
+"Consider donating to them for a continued stable service. Increased funding will\n"
 "allow them to improve this service. </p>\n"
 "<a href=\"http://privacysolutions.no\"\n"
 "    target=\"_blank\">http://privacysolutions.no</a>"
@@ -357,10 +309,8 @@ msgstr ""
 #: i2p2www/pages/downloads/browser-content.html:155
 #, python-format
 msgid ""
-"By default, I2P comes with two outproxies configured: "
-"<code>%(http)s</code>\n"
-"and <code>%(https)s</code>. Even the domain names are different, it's the"
-" same outproxy you hit.\n"
+"By default, I2P comes with two outproxies configured: <code>%(http)s</code>\n"
+"and <code>%(https)s</code>. Even the domain names are different, it's the same outproxy you hit.\n"
 "(multi-homed/keyed for better performance)"
 msgstr ""
 
@@ -368,15 +318,13 @@ msgstr ""
 msgid ""
 "Filtering is active on these outproxies (for example, mibbit and torrent\n"
 "tracker access is blocked). I2P Sites\n"
-"that are accessible via .i2p addresses are also not allowed via the "
-"outproxies.\n"
+"that are accessible via .i2p addresses are also not allowed via the outproxies.\n"
 "As a convenience, the outproxy blocks ad servers."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:166
 msgid ""
-"<a href=\"https://www.torproject.org\">Tor</a> is a good application to "
-"use as an\n"
+"<a href=\"https://www.torproject.org\">Tor</a> is a good application to use as an\n"
 "outproxy to the Internet."
 msgstr ""
 
@@ -394,13 +342,10 @@ msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:7
 msgid ""
-"I2P is available in the official repositories for Ubuntu Bionic and "
-"later, and Debian Buster and Sid.\n"
-"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have "
-"older I2P versions.\n"
+"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n"
+"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n"
 "If you are not running Debian Sid or the latest Ubuntu release,\n"
-"use our Debian repo or Launchpad PPA to ensure you're running the latest "
-"I2P version."
+"use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:14
@@ -422,23 +367,16 @@ msgstr "<a href=\"#debian\">לינוקס דביאן</a> (Wheezy וגרסאות 
 #: i2p2www/pages/downloads/debian.html:23
 #, python-format
 msgid ""
-"The I2P packages <em>may</em> work on systems not listed above. Please "
-"report any issues\n"
+"The I2P packages <em>may</em> work on systems not listed above. Please report any issues\n"
 "with these packages on <a href=\"%(trac)s\">Trac</a> at\n"
 "<a href=\"%(trac)s\">https://trac.i2p2.de</a>."
-msgstr ""
-"החבילות של I2P <em>עשויות</em> לעבוד על מערכות שאינן רשומות למעלה. אנא "
-"דווחו על בעיות\n"
-"בחבילות אלה ב־<a href=\"%(trac)s\">Trac</a> at\n"
-"<a href=\"%(trac)s\">https://trac.i2p2.de</a>."
+msgstr "החבילות של I2P <em>עשויות</em> לעבוד על מערכות שאינן רשומות למעלה. אנא דווחו על בעיות\nבחבילות אלה ב־<a href=\"%(trac)s\">Trac</a> at\n<a href=\"%(trac)s\">https://trac.i2p2.de</a>."
 
 #: i2p2www/pages/downloads/debian.html:29
 msgid ""
 "Option 1: <a href=\"#ubuntu\">Recent versions</a> of Ubuntu and its "
 "derivatives (<em>Try this if you're not using Debian)</em>"
-msgstr ""
-"אפשרות 1: <a href=\"#ubuntu\">גרסאות עדכניות</a> של אובונטו ושל נגזרותיה "
-"(<em>נסו זאת אם אינכם משתמשים בדביאן</em>)"
+msgstr "אפשרות 1: <a href=\"#ubuntu\">גרסאות עדכניות</a> של אובונטו ושל נגזרותיה (<em>נסו זאת אם אינכם משתמשים בדביאן</em>)"
 
 #: i2p2www/pages/downloads/debian.html:30
 msgid "Option 2: <a href=\"#debian\">Debian</a> (including Debian-derivatives)"
@@ -461,10 +399,7 @@ msgid ""
 "This command will add the PPA to /etc/apt/sources.list.d and fetch the\n"
 "gpg key that the repository has been signed with. The GPG key ensures\n"
 "that the packages have not been tampered with since being built."
-msgstr ""
-"פקודה זו תוסיף את ה־PPA ל־‎/etc/apt/sources.list.d ‏ותייבא את\n"
-"מפתח ה־gpg שבאמצעותו נחתם המאגר. מפתח ה־GPG מבטיח\n"
-"כי לא נערכו שינויים זדוניים בחבילות לאחר יצירתן."
+msgstr "פקודה זו תוסיף את ה־PPA ל־‎/etc/apt/sources.list.d ‏ותייבא את\nמפתח ה־gpg שבאמצעותו נחתם המאגר. מפתח ה־GPG מבטיח\nכי לא נערכו שינויים זדוניים בחבילות לאחר יצירתן."
 
 #: i2p2www/pages/downloads/debian.html:46
 msgid "Notify your package manager of the new PPA by entering:"
@@ -475,10 +410,7 @@ msgid ""
 "This command will retrieve the latest list of software from each\n"
 "repository that is enabled on your system, including the I2P PPA that\n"
 "was added with the earlier command."
-msgstr ""
-"פקודה זו רשימת התוכנות העדכנית מכל מאגר\n"
-"המאופשר במערכת שלכם, כולל ה־PPA של I2P\n"
-"שנוסף קודם לכן."
+msgstr "פקודה זו רשימת התוכנות העדכנית מכל מאגר\nהמאופשר במערכת שלכם, כולל ה־PPA של I2P\nשנוסף קודם לכן."
 
 #: i2p2www/pages/downloads/debian.html:54
 msgid "You are now ready to install I2P!"
@@ -490,51 +422,36 @@ msgstr "הוספת ה־PPA דרך Synaptic"
 
 #: i2p2www/pages/downloads/debian.html:61
 msgid ""
-"Open Synaptic (System -&gt; Administration -&gt; Synaptic Package "
-"Manager)."
+"Open Synaptic (System -&gt; Administration -&gt; Synaptic Package Manager)."
 msgstr "פתחו את Synaptic (מערכת -&gt; ניהול -&gt; מנהל החבילות Synaptic)."
 
 #: i2p2www/pages/downloads/debian.html:66
 msgid ""
-"Once Synaptic opens, select <em>Repositories</em> from the "
-"<em>Settings</em> menu."
+"Once Synaptic opens, select <em>Repositories</em> from the <em>Settings</em>"
+" menu."
 msgstr "לאחר ש־Synaptic נפתח, בחרו באפשרות <em>מאגרים</em> מתפריט <em>הגדרות</em>."
 
 #: i2p2www/pages/downloads/debian.html:71
 msgid ""
 "Click the <em>Other Sources</em> tab and click <em>Add</em>. Paste "
 "<code>ppa:i2p-maintainers/i2p</code> into the APT-line field and click "
-"<em>Add Source</em>. Click the <em>Close</em> button then "
-"<em>Reload</em>."
-msgstr ""
-"עברו ללשונית <em>מקורות אחרים</em> (Other Software) ולחצו על "
-"<em>הוספה</em> (Add). הדביקו את השורה <code>ppa:i2p-"
-"maintainers/i2p</code> לשדה <em>שורת APT</em> ולחצו על <em>הוספת "
-"מקור</em> (Add Source). לחצו על <em>סגירה</em> ולאחר מכן על "
-"<em>רענון</em>."
+"<em>Add Source</em>. Click the <em>Close</em> button then <em>Reload</em>."
+msgstr "עברו ללשונית <em>מקורות אחרים</em> (Other Software) ולחצו על <em>הוספה</em> (Add). הדביקו את השורה <code>ppa:i2p-maintainers/i2p</code> לשדה <em>שורת APT</em> ולחצו על <em>הוספת מקור</em> (Add Source). לחצו על <em>סגירה</em> ולאחר מכן על <em>רענון</em>."
 
 #: i2p2www/pages/downloads/debian.html:76
 msgid ""
 "In the Quick Filter box, type in <code>i2p</code> and press enter. When "
 "<code>i2p</code> is returned in the results list, right click "
-"<code>i2p</code> and select <em>Mark for Installation</em>. After doing "
-"so you may see a <em>Mark additional required changes?</em> popup. If so,"
-" click <em>Mark</em> then <em>Apply</em>."
-msgstr ""
-"בתיבת הסינון המהיר, הזינו i2p ולחצו Enter. כאשר <code>i2p</code> מופיע "
-"ברשימת התוצאות, לחצו עליו לחיצה ימנית ובחרו <em>סימון עבור התקנה</em>. "
-"לאחר מכן ייתכן שתישאלו האם <em>לסמן שינויים נחוצים נוספים</em>. במקרה כזה"
-" לחצו על <em>סימון</em> ולאחר מכן על <em>בצע</em>."
+"<code>i2p</code> and select <em>Mark for Installation</em>. After doing so "
+"you may see a <em>Mark additional required changes?</em> popup. If so, click"
+" <em>Mark</em> then <em>Apply</em>."
+msgstr "בתיבת הסינון המהיר, הזינו i2p ולחצו Enter. כאשר <code>i2p</code> מופיע ברשימת התוצאות, לחצו עליו לחיצה ימנית ובחרו <em>סימון עבור התקנה</em>. לאחר מכן ייתכן שתישאלו האם <em>לסמן שינויים נחוצים נוספים</em>. במקרה כזה לחצו על <em>סימון</em> ולאחר מכן על <em>בצע</em>."
 
 #: i2p2www/pages/downloads/debian.html:82
 msgid ""
 "After the installation process completes you can move on to the next\n"
-"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring "
-"it for your system."
-msgstr ""
-"לאחר סיום תהליך ההתקנה אתם יכולים לעבור לחלק הבא\n"
-"<a href=\"#Post-install_work\">הרצת I2P</a> ולהגדיר את התצורה של I2P עבור"
-" המערכת שלכם."
+"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your system."
+msgstr "לאחר סיום תהליך ההתקנה אתם יכולים לעבור לחלק הבא\n<a href=\"#Post-install_work\">הרצת I2P</a> ולהגדיר את התצורה של I2P עבור המערכת שלכם."
 
 #: i2p2www/pages/downloads/debian.html:87
 msgid "Instructions for Debian"
@@ -546,10 +463,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:91
 msgid ""
-"Note: The steps below should be performed with root access (i.e., "
-"switching\n"
-"user to root with <code>su</code> or by prefixing each command with "
-"<code>sudo</code>)."
+"Note: The steps below should be performed with root access (i.e., switching\n"
+"user to root with <code>su</code> or by prefixing each command with <code>sudo</code>)."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:96
@@ -562,8 +477,7 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"    Check which version of Debian you are using on this page at the <a "
-"href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n"
+"    Check which version of Debian you are using on this page at the <a href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n"
 "    and verify with <code>%(file2)s</code> on your system.\n"
 "    Then, add lines like the following to <code>%(file)s</code>."
 msgstr ""
@@ -594,31 +508,22 @@ msgstr "יידעו את מנהל החבילות שלכם על המאגר החד
 #: i2p2www/pages/downloads/debian.html:175
 msgid ""
 "This command will retrieve the latest list of software from every\n"
-"repository enabled on your system, including the I2P repository added in "
-"step\n"
-"1."
-msgstr ""
-"פקודה זו תוריד את רשימת התוכנות העדכנית מכל מאגר\n"
-"המאופשר במערכת שלכם, כולל המאגר של I2P שנוסף בצעד\n"
+"repository enabled on your system, including the I2P repository added in step\n"
 "1."
+msgstr "פקודה זו תוריד את רשימת התוכנות העדכנית מכל מאגר\nהמאופשר במערכת שלכם, כולל המאגר של I2P שנוסף בצעד\n1."
 
 #: i2p2www/pages/downloads/debian.html:181
 msgid ""
-"You are now ready to install I2P! Installing the <code>i2p-keyring</code>"
-"\n"
+"You are now ready to install I2P! Installing the <code>i2p-keyring</code>\n"
 "package will ensure that you receive updates to the repository's GPG key."
-msgstr ""
-"כעת אתם מוכנים להתקנת I2P! התקנת החבילה <code>i2p-keyring</code>\n"
-"תבטיח שתקבלו עדכונים למפתח ה־GPG של המאגר."
+msgstr "כעת אתם מוכנים להתקנת I2P! התקנת החבילה <code>i2p-keyring</code>\nתבטיח שתקבלו עדכונים למפתח ה־GPG של המאגר."
 
 #: i2p2www/pages/downloads/debian.html:191
 msgid ""
-"After the installation process completes you can move on to the next part"
-" of <a href=\"#Post-install_work\">starting I2P</a> and configuring it "
-"for your system."
-msgstr ""
-"לאחר השלמת תהליך ההתקנה אתם יכולים להמשיך הלאה לשלב הבא, <a href=\"#Post-"
-"install_work\">הרצת I2P</a>, ולהגדיר את התצורה של I2P עבור המערכת שלכם."
+"After the installation process completes you can move on to the next part of"
+" <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your"
+" system."
+msgstr "לאחר השלמת תהליך ההתקנה אתם יכולים להמשיך הלאה לשלב הבא, <a href=\"#Post-install_work\">הרצת I2P</a>, ולהגדיר את התצורה של I2P עבור המערכת שלכם."
 
 #: i2p2www/pages/downloads/debian.html:196
 #: i2p2www/pages/downloads/post-install.html:1
@@ -629,89 +534,51 @@ msgstr "צעדים לאחר ההתקנה"
 msgid ""
 "Using these I2P packages the I2P router can be started in the following\n"
 "three ways:"
-msgstr ""
-"על־ידי שימוש בחבילות של I2P ניתן להריץ את נתב ה־I2P בשלוש\n"
-"הדרכים הבאות:"
+msgstr "על־ידי שימוש בחבילות של I2P ניתן להריץ את נתב ה־I2P בשלוש\nהדרכים הבאות:"
 
 #: i2p2www/pages/downloads/debian.html:204
 msgid ""
-"&quot;on demand&quot; using the i2prouter script. Simply run "
-"&quot;<code>i2prouter\n"
-"start</code>&quot; from a command prompt. (Note: Do "
-"<strong><u>not</u></strong> use\n"
+"&quot;on demand&quot; using the i2prouter script. Simply run &quot;<code>i2prouter\n"
+"start</code>&quot; from a command prompt. (Note: Do <strong><u>not</u></strong> use\n"
 "sudo or run it as root!)"
-msgstr ""
-"‏&quot;לפי הצורך&quot; באמצעות התסריט i2prouter. פשוט הריצו "
-"&quot;<code>i2prouter\n"
-"‏start</code>&quot; בשורת הפקודה. (הערה: <strong><u>אל</u></strong> תריצו"
-"\n"
-"כמשתמש root ואל תשתמשו ב־sudo!)"
+msgstr "‏&quot;לפי הצורך&quot; באמצעות התסריט i2prouter. פשוט הריצו &quot;<code>i2prouter\n‏start</code>&quot; בשורת הפקודה. (הערה: <strong><u>אל</u></strong> תריצו\nכמשתמש root ואל תשתמשו ב־sudo!)"
 
 #: i2p2www/pages/downloads/debian.html:211
 msgid ""
-"&quot;on demand&quot; without the <a "
-"href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n"
-"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-"
-"nowrapper</code>\".\n"
+"&quot;on demand&quot; without the <a href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n"
+"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-nowrapper</code>\".\n"
 "(Note: Do <strong><u>not</u></strong>\n"
 "use sudo or run it as root!)"
-msgstr ""
-"‏&quot;לפי הצורך&quot; ללא ה־<a "
-"href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n"
-"(נדרש במערכות שאינן מריצות גנו/לינוקס או שאינן x86) על־ידי הרצת \"<code"
-">i2prouter-nowrapper</code>\".\n"
-"(הערה: <strong><u>אל</u></strong> תריצו\n"
-"כמשתמש root ואל תשתמשו ב־sudo!)"
+msgstr "‏&quot;לפי הצורך&quot; ללא ה־<a href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n(נדרש במערכות שאינן מריצות גנו/לינוקס או שאינן x86) על־ידי הרצת \"<code>i2prouter-nowrapper</code>\".\n(הערה: <strong><u>אל</u></strong> תריצו\nכמשתמש root ואל תשתמשו ב־sudo!)"
 
 #: i2p2www/pages/downloads/debian.html:219
 msgid ""
 "as a service that automatically runs when your system boots, even\n"
-"before logging in. The service can be enabled with \"<code>dpkg-"
-"reconfigure\n"
-"i2p</code>\" as root or using sudo. This is the recommended means of "
-"operation."
-msgstr ""
-"כשירות שרץ באופן עצמאי כאשר המערכת עולה, עוד\n"
-"לפני שהמשתמש נכנס. ניתן להפעיל את השירות עם \"<code>dpkg-reconfigure\n"
-"‏i2p</code>\" בתור root או על־ידי שימוש ב־sudo. זהו אופן השימוש המומלץ."
+"before logging in. The service can be enabled with \"<code>dpkg-reconfigure\n"
+"i2p</code>\" as root or using sudo. This is the recommended means of operation."
+msgstr "כשירות שרץ באופן עצמאי כאשר המערכת עולה, עוד\nלפני שהמשתמש נכנס. ניתן להפעיל את השירות עם \"<code>dpkg-reconfigure\n‏i2p</code>\" בתור root או על־ידי שימוש ב־sudo. זהו אופן השימוש המומלץ."
 
 #: i2p2www/pages/downloads/debian.html:227
 msgid ""
-"When installing for the first time, please remember to <b>adjust your "
-"NAT/firewall</b>\n"
-"if you can. The ports to forward can be found on the <a "
-"href=\"http://127.0.0.1:7657/confignet\">\n"
-"network configuration page</a> in the router console. If guidance with "
-"respect to forwarding ports is needed,\n"
-"you may find <a href=\"http://portforward.com\">portforward.com</a> to be"
-" helpful."
-msgstr ""
-"בעת ההתקנה בפעם הראשונה, אנא זכרו להגדיר את ה־<b>NAT/חומת האש</b>\n"
-"שלכם אם אתם יכולים. ניתן למצוא את הפתחות שיש להעביר ב<a "
-"href=\"http://127.0.0.1:7657/confignet\">\n"
-"עמוד הגדרות הרשת</a> בממשק הנתב. אם אתם זקוקים להדרכה כיצד להעביר פתחות,\n"
-"‏<a href=\"http://portforward.com\">portforward.com</a> יכול לעזור."
+"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n"
+"if you can. The ports to forward can be found on the <a href=\"http://127.0.0.1:7657/confignet\">\n"
+"network configuration page</a> in the router console. If guidance with respect to forwarding ports is needed,\n"
+"you may find <a href=\"http://portforward.com\">portforward.com</a> to be helpful."
+msgstr "בעת ההתקנה בפעם הראשונה, אנא זכרו להגדיר את ה־<b>NAT/חומת האש</b>\nשלכם אם אתם יכולים. ניתן למצוא את הפתחות שיש להעביר ב<a href=\"http://127.0.0.1:7657/confignet\">\nעמוד הגדרות הרשת</a> בממשק הנתב. אם אתם זקוקים להדרכה כיצד להעביר פתחות,\n‏<a href=\"http://portforward.com\">portforward.com</a> יכול לעזור."
 
 #: i2p2www/pages/downloads/debian.html:234
 msgid ""
 "Please review and <b>adjust the bandwidth settings</b> on the\n"
 "<a href=\"http://127.0.0.1:7657/config.jsp\">configuration page</a>,\n"
-"as the default settings of 96 KB/s down / 40 KB/s up are fairly "
-"conservative."
-msgstr ""
-"אנא בדקו את <b>הגדרות רוחב־הפס</b> ב<a "
-"href=\"http://127.0.0.1:7657/config.jsp\">עמוד\n"
-"הגדרות התצורה</a>,\n"
-"מאחר והגדרות ברירת המחדל (96 ק\"ב/שניה בהורדה ו־40 ק\"ב/שניה בהעלאה) די "
-"נמוכות."
+"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative."
+msgstr "אנא בדקו את <b>הגדרות רוחב־הפס</b> ב<a href=\"http://127.0.0.1:7657/config.jsp\">עמוד\nהגדרות התצורה</a>,\nמאחר והגדרות ברירת המחדל (96 ק\"ב/שניה בהורדה ו־40 ק\"ב/שניה בהעלאה) די נמוכות."
 
 #: i2p2www/pages/downloads/debian.html:240
 #: i2p2www/pages/downloads/post-install.html:34
 #, python-format
 msgid ""
 "If you want to reach I2P Sites via your browser, have a look on the <a "
-"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy "
-"howto."
+"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy howto."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:5
@@ -746,9 +613,9 @@ msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:24
 msgid ""
-"<p>Note that this quick-start approach is not suitable for production "
-"use.  If you want to use I2P in production please read all the "
-"instructions on this page."
+"<p>Note that this quick-start approach is not suitable for production use.  "
+"If you want to use I2P in production please read all the instructions on "
+"this page."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:25
@@ -772,8 +639,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:30
 msgid ""
-"The container requires a volume for the configuration data to be mounted."
-" Optionally, you can mount a separate volume for torrent (“i2psnark”) "
+"The container requires a volume for the configuration data to be mounted. "
+"Optionally, you can mount a separate volume for torrent (“i2psnark”) "
 "downloads. See the example below."
 msgstr ""
 
@@ -794,8 +661,8 @@ msgstr "פתחות"
 
 #: i2p2www/pages/downloads/docker.html:34
 msgid ""
-"There are several ports which are exposed by the image. You can choose "
-"which ones to publish depending on your specific needs."
+"There are several ports which are exposed by the image. You can choose which"
+" ones to publish depending on your specific needs."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:38
@@ -869,11 +736,10 @@ msgstr ""
 #: i2p2www/pages/downloads/docker.html:96
 msgid ""
 "You probably want at least the Router Console (7657) and the HTTP Proxy "
-"(4444). If you want I2P to be able to receive incoming connections from "
-"the internet, and hence not think it’s firewalled, publish the I2NP "
-"Protocol port (12345) - but make sure you publish to a different random "
-"port, otherwise others may be able to guess you’re running I2P in a "
-"Docker image."
+"(4444). If you want I2P to be able to receive incoming connections from the "
+"internet, and hence not think it’s firewalled, publish the I2NP Protocol "
+"port (12345) - but make sure you publish to a different random port, "
+"otherwise others may be able to guess you’re running I2P in a Docker image."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:97
@@ -883,9 +749,9 @@ msgstr ""
 #: i2p2www/pages/downloads/docker.html:98
 msgid ""
 "Here is an example container that mounts <code>i2phome</code> as home "
-"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, "
-"IRC, Router Console and I2NP Protocols. It also limits the memory "
-"available to the JVM to 256MB."
+"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, IRC,"
+" Router Console and I2NP Protocols. It also limits the memory available to "
+"the JVM to 256MB."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:6
@@ -896,17 +762,12 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:7
 #, python-format
 msgid ""
-"This is an \"All-in-One\" installer for Windows 10 which includes the "
-"complete I2P\n"
-"desktop software and all of its dependencies in a single, easy-to-install"
-"\n"
-"package. It is built on the premise that I2P should be easy, and that we "
-"should\n"
-"help our users get their initial configuration in place instead of "
-"requiring an\n"
+"This is an \"All-in-One\" installer for Windows 10 which includes the complete I2P\n"
+"desktop software and all of its dependencies in a single, easy-to-install\n"
+"package. It is built on the premise that I2P should be easy, and that we should\n"
+"help our users get their initial configuration in place instead of requiring an\n"
 "elaborate install process. To learn more about the Firefox profile that\n"
-"comes bundled with this installer, visit <a href=\"%(firefox)s\">The "
-"Firefox\n"
+"comes bundled with this installer, visit <a href=\"%(firefox)s\">The Firefox\n"
 "Profile Page</a>."
 msgstr ""
 
@@ -921,12 +782,9 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:19
 #, python-format
 msgid ""
-"This installer still requires Firefox to be installed on the system, it "
-"does not\n"
-"bundle a Firefox installer of its own. Please obtain Firefox from "
-"Mozilla, or\n"
-"Tor Browser from the Tor Project or one of their mirrors. If you would "
-"like to\n"
+"This installer still requires Firefox to be installed on the system, it does not\n"
+"bundle a Firefox installer of its own. Please obtain Firefox from Mozilla, or\n"
+"Tor Browser from the Tor Project or one of their mirrors. If you would like to\n"
 "discuss supporting other browsers, please join the discussionon the\n"
 "<a href=\"%(issueurl)s\">Gitlab Issue</a>. This is a Windows-only\n"
 "product."
@@ -939,17 +797,12 @@ msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:28
 msgid ""
-"This installer package reduces the number of steps required to install an"
-" I2P\n"
-"router on Windows from about 30 to a matter of completing a single, "
-"familiar\n"
-"installer process, combining the I2P installation and Browser "
-"configuration into\n"
+"This installer package reduces the number of steps required to install an I2P\n"
+"router on Windows from about 30 to a matter of completing a single, familiar\n"
+"installer process, combining the I2P installation and Browser configuration into\n"
 "the same steps. Besides that, it launches the user directly into the\n"
-"automatically configured I2P browser with their applications ready-to-"
-"use, with\n"
-"no need to refer to potentially unhelpful system-wide Windows settings. "
-"The I2P\n"
+"automatically configured I2P browser with their applications ready-to-use, with\n"
+"no need to refer to potentially unhelpful system-wide Windows settings. The I2P\n"
 "it uses is otherwise identical to the \"regular\" I2P."
 msgstr ""
 
@@ -963,32 +816,24 @@ msgstr ""
 #, python-format
 msgid ""
 "First, download and install <a href=\"%(firefox)s\">Firefox</a>, then,\n"
-"just download and install <a href=\"%(postfilename)s\">this "
-"installer</a>. To\n"
+"just download and install <a href=\"%(postfilename)s\">this installer</a>. To\n"
 "start an installer, \"double-click\" the downloaded .exe file."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:43
 msgid ""
-"Running the installer will create a shortcut to start browsing I2P in "
-"your start\n"
-"menu and on your desktop. Clicking this shortcut will start I2P if "
-"necessary,\n"
-"then start an I2P Browser. On the first run, you will also be promted "
-"with the\n"
-"bandwidth wizard in your browser window. You will also see a \"Toopie\" "
-"icon in\n"
-"your taskbar to indicate that I2P is working when the browser window is "
-"closed."
+"Running the installer will create a shortcut to start browsing I2P in your start\n"
+"menu and on your desktop. Clicking this shortcut will start I2P if necessary,\n"
+"then start an I2P Browser. On the first run, you will also be promted with the\n"
+"bandwidth wizard in your browser window. You will also see a \"Toopie\" icon in\n"
+"your taskbar to indicate that I2P is working when the browser window is closed."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:50
 msgid ""
 "I2P Browsing uses a separate, I2P-Only Firefox\n"
-"profile, so it won't interfere with your regular Firefox use or require "
-"any\n"
-"special configuration. You don't even need to close existing Firefox "
-"windows."
+"profile, so it won't interfere with your regular Firefox use or require any\n"
+"special configuration. You don't even need to close existing Firefox windows."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:65
@@ -1028,10 +873,8 @@ msgstr ""
 #: i2p2www/pages/downloads/firefox.html:73
 msgid ""
 "The I2P router is \"jpackaged\" which means that it includes all\n"
-"the required Java components it needs to run successfully. It does not "
-"require\n"
-"a separate Java installation, because it bundles a Java 16 Runtime which "
-"is only\n"
+"the required Java components it needs to run successfully. It does not require\n"
+"a separate Java installation, because it bundles a Java 16 Runtime which is only\n"
 "used for I2P."
 msgstr ""
 
@@ -1043,16 +886,11 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:95
 #: i2p2www/pages/downloads/firefox.html:80
 msgid ""
-"The browser profile also includes both the NoScript and HTTPSEverywhere "
-"plugin for\n"
-"better protection Javascript based attacks and HTTPS support where "
-"available. It\n"
-"also keeps your I2P search activity separate from your visible internet "
-"search\n"
-"activity. The profile configures the I2P Proxy for all sites and browser "
-"features.\n"
-"I2P In Private Browsing is used to provide I2P-Specific browser "
-"integrations."
+"The browser profile also includes both the NoScript and HTTPSEverywhere plugin for\n"
+"better protection Javascript based attacks and HTTPS support where available. It\n"
+"also keeps your I2P search activity separate from your visible internet search\n"
+"activity. The profile configures the I2P Proxy for all sites and browser features.\n"
+"I2P In Private Browsing is used to provide I2P-Specific browser integrations."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:101
@@ -1063,19 +901,16 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:102
 #: i2p2www/pages/downloads/firefox.html:87
 msgid ""
-"If you would like to examine the source code for individual components, "
-"you may\n"
-"find it on i2pgit.org or github.com. The license for each respective "
-"component\n"
-"can be found in the license directory of the <code>i2p.firefox</code> "
-"project."
+"If you would like to examine the source code for individual components, you may\n"
+"find it on i2pgit.org or github.com. The license for each respective component\n"
+"can be found in the license directory of the <code>i2p.firefox</code> project."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:107
 #: i2p2www/pages/downloads/easyinstall.html:115
 #: i2p2www/pages/downloads/firefox.html:92
-#: i2p2www/pages/downloads/firefox.html:100 i2p2www/pages/downloads/mac.html:79
-#: i2p2www/pages/downloads/mac.html:86
+#: i2p2www/pages/downloads/firefox.html:100
+#: i2p2www/pages/downloads/mac.html:79 i2p2www/pages/downloads/mac.html:86
 msgid "Gitlab Repository"
 msgstr ""
 
@@ -1087,11 +922,9 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:109
 #: i2p2www/pages/downloads/firefox.html:94
 msgid ""
-"If you wish to file an issue about the Firefox profile, please use Gitlab"
-" to\n"
+"If you wish to file an issue about the Firefox profile, please use Gitlab to\n"
 "contact us. For security-sensitive issues, please remember to check the\n"
-"\"This issue is confidential and should only be visible to team members "
-"with at least Reporter access\"\n"
+"\"This issue is confidential and should only be visible to team members with at least Reporter access\"\n"
 "option when filing the issue."
 msgstr ""
 
@@ -1103,50 +936,34 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:117
 #: i2p2www/pages/downloads/firefox.html:102
 msgid ""
-"This is not a fork of Firefox. Instead, it is a browser profile with pre-"
-"configured\n"
-"settings, combined with an I2P router and some launcher scripts. That "
-"means that\n"
-"it requires Firefox(Or Tor Browser) to be installed before you can use "
-"it. This\n"
-"is for security reasons, it is important that you are able to recieve "
-"reliable\n"
+"This is not a fork of Firefox. Instead, it is a browser profile with pre-configured\n"
+"settings, combined with an I2P router and some launcher scripts. That means that\n"
+"it requires Firefox(Or Tor Browser) to be installed before you can use it. This\n"
+"is for security reasons, it is important that you are able to recieve reliable\n"
 "updates from a trustworthy vendor."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:124
 #: i2p2www/pages/downloads/firefox.html:109
 msgid ""
-"I2P routers are designed to have long uptimes, and so unlike Tor Browser,"
-" the\n"
-"lifetime of your I2P Router is not tied to the lifetime of your I2P "
-"browsing\n"
-"session. The browser profile will manage your history, your browser's "
-"local\n"
-"storage and cache, and your browsing context but it will never stop your "
-"I2P\n"
-"router on its own. You may stop the router using the web interface on the"
-"\n"
+"I2P routers are designed to have long uptimes, and so unlike Tor Browser, the\n"
+"lifetime of your I2P Router is not tied to the lifetime of your I2P browsing\n"
+"session. The browser profile will manage your history, your browser's local\n"
+"storage and cache, and your browsing context but it will never stop your I2P\n"
+"router on its own. You may stop the router using the web interface on the\n"
 "router console homepage."
 msgstr ""
 
 #: i2p2www/pages/downloads/firefox.html:7
 #, python-format
 msgid ""
-"The I2P Firefox Browser Profile has been expanded into the new I2P Easy "
-"Install\n"
-"Bundle, which is in Beta. If you already have an I2P Router installed, it"
-" is\n"
-"still safe to use this installer to configure your I2P Browser. Your "
-"existing\n"
-"I2P Settings will be left untouched. If you do not have an I2P router "
-"installed,\n"
-"then you do not need to install I2P. This package will install I2P at the"
-" same\n"
-"time it installs the browser profile. This page has been kept to document"
-" the\n"
-"motivations and design of the included Firefox profile. To learn more "
-"about the\n"
+"The I2P Firefox Browser Profile has been expanded into the new I2P Easy Install\n"
+"Bundle, which is in Beta. If you already have an I2P Router installed, it is\n"
+"still safe to use this installer to configure your I2P Browser. Your existing\n"
+"I2P Settings will be left untouched. If you do not have an I2P router installed,\n"
+"then you do not need to install I2P. This package will install I2P at the same\n"
+"time it installs the browser profile. This page has been kept to document the\n"
+"motivations and design of the included Firefox profile. To learn more about the\n"
 "new bundle, visit <a href=\"%(nsis)s\">The Easy Install Bundle Page</a>."
 msgstr ""
 
@@ -1156,30 +973,20 @@ msgstr ""
 
 #: i2p2www/pages/downloads/firefox.html:18
 msgid ""
-"Now that you have joined the I2P network, you will want to see I2P Sites "
-"and and \n"
-"other content that is hosted on the network. The Firefox browser profile "
-"is \n"
-"pre-configured to allow you to access the content available on the "
-"network."
+"Now that you have joined the I2P network, you will want to see I2P Sites and and \n"
+"other content that is hosted on the network. The Firefox browser profile is \n"
+"pre-configured to allow you to access the content available on the network."
 msgstr ""
 
 #: i2p2www/pages/downloads/firefox.html:24
 msgid ""
-"Browsers are highly complex and powerful engines for executing code and "
-"displaying\n"
-"information obtained mainly from strangers on the internet. By default, "
-"they\n"
-"tend to leak a great deal of information about the person using them to "
-"the servers\n"
-"they retrieve information from. Using this browser profile allows you to "
-"become\n"
-"part of a \"common\" set of very similar browser users, instead of "
-"appearing unique\n"
-"or revealing details of your hardware or software. Because this involves "
-"disabling \n"
-"some browser features, this also reduces the attack surface available to "
-"outsiders. \n"
+"Browsers are highly complex and powerful engines for executing code and displaying\n"
+"information obtained mainly from strangers on the internet. By default, they\n"
+"tend to leak a great deal of information about the person using them to the servers\n"
+"they retrieve information from. Using this browser profile allows you to become\n"
+"part of a \"common\" set of very similar browser users, instead of appearing unique\n"
+"or revealing details of your hardware or software. Because this involves disabling \n"
+"some browser features, this also reduces the attack surface available to outsiders. \n"
 "This keeps you safer while browsing the Invisible Web."
 msgstr ""
 
@@ -1212,8 +1019,7 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"If you would like to try the latest experimental I2P projects, visit the "
-"<a href = \"%(lab)s\">I2P Lab</a>\n"
+"If you would like to try the latest experimental I2P projects, visit the <a href = \"%(lab)s\">I2P Lab</a>\n"
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:26
@@ -1238,8 +1044,7 @@ msgstr ""
 #, python-format
 msgid ""
 " I2P is written in Java and requires\n"
-"a Java system to be installed to run. In addition to the I2P download, "
-"you need to install Java if you do not have it \n"
+"a Java system to be installed to run. In addition to the I2P download, you need to install Java if you do not have it \n"
 "already installed. I2P requires Java Runtime Version 7 or higher.\n"
 "(<a href=\"%(java)s\">Oracle</a>,\n"
 "<a href=\"%(openjdk)s\">OpenJDK</a>, or\n"
@@ -1250,8 +1055,7 @@ msgid ""
 "<br />\n"
 "<a href=\"%(detectjre)s\">Determine your installed Java version here</a>\n"
 "or type <tt>java -version</tt> at your command prompt.\n"
-"Only two platforms do not require Java to be installed before I2P is "
-"installed, those platforms are:"
+"Only two platforms do not require Java to be installed before I2P is installed, those platforms are:"
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:50
@@ -1261,8 +1065,7 @@ msgstr ""
 #: i2p2www/pages/downloads/list.html:50
 msgid ""
 "Android comes with a Java virtual machine\n"
-"as part of the platform, which I2P for Android uses. Therefore it is not "
-"necessary to install Java to use\n"
+"as part of the platform, which I2P for Android uses. Therefore it is not necessary to install Java to use\n"
 "I2P for Android."
 msgstr ""
 
@@ -1273,8 +1076,7 @@ msgstr ""
 #: i2p2www/pages/downloads/list.html:53
 msgid ""
 "On Debian and Ubuntu when using\n"
-"a .deb package to install, the system will automatically install and "
-"configure a Java environment for you."
+"a .deb package to install, the system will automatically install and configure a Java environment for you."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:56
@@ -1294,8 +1096,7 @@ msgstr ""
 #: i2p2www/pages/downloads/list.html:58
 msgid ""
 "Finally, you'll need to\n"
-"configure applications to use I2P. Many applications can use I2P, but the"
-" first application most people configure is a Web\n"
+"configure applications to use I2P. Many applications can use I2P, but the first application most people configure is a Web\n"
 "Browser for browsing I2P sites. Detailed instructions are available on the"
 msgstr ""
 
@@ -1342,10 +1143,8 @@ msgstr ""
 #: i2p2www/pages/downloads/list.html:106
 msgid ""
 "It's now possible to install all I2P components using\n"
-"      a single package(<strong>No Java Required</strong>). To try out the"
-" new installer, click here.\n"
-"      This bundle can also be used to configure a Firefox Profile. It "
-"will not\n"
+"      a single package(<strong>No Java Required</strong>). To try out the new installer, click here.\n"
+"      This bundle can also be used to configure a Firefox Profile. It will not\n"
 "      interfere with an existing I2P installation if one exists.\n"
 "      "
 msgstr ""
@@ -1360,8 +1159,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/list.html:116
 msgid ""
-"Here is a helpful guide to installing I2P for Windows using a separate "
-"Java installation and the classic installer."
+"Here is a helpful guide to installing I2P for Windows using a separate Java "
+"installation and the classic installer."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:120
@@ -1371,14 +1170,10 @@ msgstr ""
 #: i2p2www/pages/downloads/list.html:122 i2p2www/pages/downloads/list.html:150
 #, python-format
 msgid ""
-"The most reliable way to launch the installer is from a terminal like "
-"this:\n"
-"    <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will "
-"launch the GUI installer.\n"
-"    Depending on how your computer is set up, you may be able to start "
-"the\n"
-"    installer by double-clicking the "
-"&quot;i2pinstall_%(i2pversion)s.jar&quot; file or\n"
+"The most reliable way to launch the installer is from a terminal like this:\n"
+"    <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will launch the GUI installer.\n"
+"    Depending on how your computer is set up, you may be able to start the\n"
+"    installer by double-clicking the &quot;i2pinstall_%(i2pversion)s.jar&quot; file or\n"
 "    right-clicking the file and selecting &quot;Open with Java&quot;.\n"
 "    Unfortunately, this behaviour is difficult to predict."
 msgstr ""
@@ -1390,13 +1185,10 @@ msgstr "התקנה בשורת הפקודה (headless):"
 #: i2p2www/pages/downloads/list.html:132 i2p2www/pages/downloads/list.html:160
 #, python-format
 msgid ""
-"I2P can also be installed in a terminal environment, which may be "
-"especially\n"
-"    useful for servers, containers, or certain virtual machines. If you "
-"wish to\n"
+"I2P can also be installed in a terminal environment, which may be especially\n"
+"    useful for servers, containers, or certain virtual machines. If you wish to\n"
 "    use the installer without a GUI, you can use the command \n"
-"    <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to "
-"follow\n"
+"    <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to follow\n"
 "    the install procedure in your terminal."
 msgstr ""
 
@@ -1422,13 +1214,10 @@ msgstr "קיימות חבילות לדביאן ולאובונטו."
 
 #: i2p2www/pages/downloads/list.html:174
 msgid ""
-"I2P is available in the official repositories for Ubuntu Bionic and "
-"later, and Debian Buster and Sid.\n"
-"    However, Debian Buster and Ubuntu Bionic (LTS) distributions will "
-"have older I2P versions.\n"
+"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n"
+"    However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n"
 "    If you are not running Debian Sid or the latest Ubuntu release,\n"
-"    use our Debian repo or Launchpad PPA to ensure you're running the "
-"latest I2P version."
+"    use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:182
@@ -1437,10 +1226,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/list.html:185
 msgid ""
-"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier "
-"installed\n"
-"      I2P, unfortunately this release fixes some IPC issues which will "
-"force you to uninstall your current installation before installing this."
+"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier installed\n"
+"      I2P, unfortunately this release fixes some IPC issues which will force you to uninstall your current installation before installing this."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:189
@@ -1449,10 +1236,8 @@ msgstr "מינימום RAM 512 MB; מומלץ 1 GB."
 
 #: i2p2www/pages/downloads/list.html:192
 msgid ""
-"The releases are not compatible with eachother, as they have different "
-"signatures. Uninstall them\n"
-"      completely before installing any other version. The apk's from "
-"download.i2p2.de are signed by idk."
+"The releases are not compatible with eachother, as they have different signatures. Uninstall them\n"
+"      completely before installing any other version. The apk's from download.i2p2.de are signed by idk."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:199
@@ -1470,39 +1255,27 @@ msgid "docker pull geti2p/i2p"
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:219
-msgid "Additional instructions for configuring your container can be found here."
+msgid ""
+"Additional instructions for configuring your container can be found here."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:224
 #, python-format
 msgid ""
-"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s"
-"#getting-the-i2p-code\">monotone</a>\n"
-"    or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a "
-"href=\"%(github)s\">Github</a>.\n"
+"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a>\n"
+"    or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a href=\"%(github)s\">Github</a>.\n"
 "    <br />\n"
-"    Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd "
-"i2p-%(i2pversion)s ; ant pkg)</code> then either\n"
+"    Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> then either\n"
 "    run the GUI installer or headless install as above."
-msgstr ""
-"לחילופין, אתם יכולים להוריד את קבצי המקור מ־<a href=\"%(monotoneurl)s"
-"#getting-the-i2p-code\">monotone</a>\n"
-"    או דרך גיט בכתובת <a href=\"%(gitrepo)s\">git.repo.i2p</a> או מ<a "
-"href=\"%(github)s\">גיטהאב</a>.\n"
-"    <br />\n"
-"    הריצו <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd "
-"i2p-%(i2pversion)s ; ant pkg)</code> ולאחר מכן\n"
-"    הריצו את ההתקנה הגרפית או את ההתקנה בשורת הפקודה כפי שמתואר לעיל."
+msgstr "לחילופין, אתם יכולים להוריד את קבצי המקור מ־<a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a>\n    או דרך גיט בכתובת <a href=\"%(gitrepo)s\">git.repo.i2p</a> או מ<a href=\"%(github)s\">גיטהאב</a>.\n    <br />\n    הריצו <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> ולאחר מכן\n    הריצו את ההתקנה הגרפית או את ההתקנה בשורת הפקודה כפי שמתואר לעיל."
 
 #: i2p2www/pages/downloads/list.html:234
 #, python-format
 msgid ""
-"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-"
-"code\">git</a>\n"
+"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-code\">git</a>\n"
 "    and on <a href=\"%(github)s\">Github</a>.\n"
 "    Android builds require the I2P source.\n"
-"    See the documentation in the Android source for additional build "
-"requirements and instructions."
+"    See the documentation in the Android source for additional build requirements and instructions."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:251
@@ -1515,8 +1288,7 @@ msgstr ""
 #: i2p2www/pages/downloads/list.html:257
 #, python-format
 msgid ""
-"The Mac OS X native installer is signed by %(signer)s with his Apple "
-"Developer ID certificate,\n"
+"The Mac OS X native installer is signed by %(signer)s with his Apple Developer ID certificate,\n"
 "<a href=\"%(signingkey)s\">whose key is here</a>."
 msgstr ""
 
@@ -1531,21 +1303,14 @@ msgstr "עדכונים אוטומטיים וגם ידניים אפשריים ע
 #: i2p2www/pages/downloads/list.html:270
 msgid ""
 "If you are running 0.7.5 or later, your router should detect the\n"
-"new release. To upgrade simply click the 'Download Update' button on your"
-" router console\n"
+"new release. To upgrade simply click the 'Download Update' button on your router console\n"
 "when it appears."
-msgstr ""
-"אם אתם מריצים 0.7.5 ומעלה, הנתב שלכם אמור לגלות\n"
-"את הגרסה החדשה. על־מנת לשדרג, פשוט לחצו על כפתור 'הורדת עדכון' בממשק הנתב"
-"\n"
-"כאשר הוא מופיע."
+msgstr "אם אתם מריצים 0.7.5 ומעלה, הנתב שלכם אמור לגלות\nאת הגרסה החדשה. על־מנת לשדרג, פשוט לחצו על כפתור 'הורדת עדכון' בממשק הנתב\nכאשר הוא מופיע."
 
 #: i2p2www/pages/downloads/list.html:276
 msgid ""
-"Since 0.9.23, some releases are signed by str4d, whose signing key has "
-"been in the router\n"
-"since 0.9.9. Routers older than 0.9.9 will fail to verify update files "
-"signed by str4d,\n"
+"Since 0.9.23, some releases are signed by str4d, whose signing key has been in the router\n"
+"since 0.9.9. Routers older than 0.9.9 will fail to verify update files signed by str4d,\n"
 "and will need to be manually updated using the process below."
 msgstr ""
 
@@ -1553,8 +1318,7 @@ msgstr ""
 msgid ""
 "Download the file to your I2P\n"
 "    installation directory and <b>rename as i2pupdate.zip</b>.\n"
-"    (alternately, you can get the source as above and run \"ant "
-"updater\", then copy the\n"
+"    (alternately, you can get the source as above and run \"ant updater\", then copy the\n"
 "    resulting i2pupdate.zip to your I2P installation directory).  You do\n"
 "    NOT need to unzip the file."
 msgstr ""
@@ -1581,25 +1345,15 @@ msgstr "גרסאות קודמות"
 #: i2p2www/pages/downloads/list.html:316
 #, python-format
 msgid ""
-"Previous releases are available on <a "
-"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google "
-"Code</a>\n"
+"Previous releases are available on <a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code</a>\n"
 "and <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\n"
-"and within the I2P network on <a "
-"href=\"http://%(echelon)s/\">%(echelon)s</a>."
-msgstr ""
-"ניתן למצוא גרסאות קודמות ב<a "
-"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">גוגל קוד</a>,"
-"\n"
-"ב־<a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\n"
-"ובתוך רשת ה־I2P בכתובת <a href=\"http://%(echelon)s/\">%(echelon)s</a>."
+"and within the I2P network on <a href=\"http://%(echelon)s/\">%(echelon)s</a>."
+msgstr "ניתן למצוא גרסאות קודמות ב<a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">גוגל קוד</a>,\nב־<a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\nובתוך רשת ה־I2P בכתובת <a href=\"http://%(echelon)s/\">%(echelon)s</a>."
 
 #: i2p2www/pages/downloads/mac.html:7
 msgid ""
-"We are excited to offer you a DMG bundle for Mac OS.  It installs and "
-"behaves\n"
-"the same way many other Mac OS applications do and does not require a "
-"Java\n"
+"We are excited to offer you a DMG bundle for Mac OS.  It installs and behaves\n"
+"the same way many other Mac OS applications do and does not require a Java\n"
 "Runtime Environment to be available."
 msgstr ""
 
@@ -1607,61 +1361,44 @@ msgstr ""
 #, python-format
 msgid ""
 "This bundle is built for <code>x86_64(Intel)</code> Macs. It will run on\n"
-"<code>ARM(M1)</code> Macs in emulated mode, but the performance is "
-"unknown. M1 Mac\n"
-"users should report results to us at the <a href=\"%(perf)s\">Gitlab "
-"Repository</a>."
+"<code>ARM(M1)</code> Macs in emulated mode, but the performance is unknown. M1 Mac\n"
+"users should report results to us at the <a href=\"%(perf)s\">Gitlab Repository</a>."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:18
 msgid ""
-"Double-Click on the .dmg file, which you may download from this page. "
-"When a\n"
-"window appears with the I2P application inside it, \"drag\" the "
-"application to the\n"
-"\"Applications\" side of the window to install it. Once you're finished, "
-"I2P is\n"
-"installed and can be launched from Finder. This procedure is the same as "
-"any\n"
-"other Mac application. When you launch I2P, the I2P icon will appear on "
-"the Dock\n"
-"and a few seconds later a browser will open with the I2P console page, "
-"inviting\n"
+"Double-Click on the .dmg file, which you may download from this page. When a\n"
+"window appears with the I2P application inside it, \"drag\" the application to the\n"
+"\"Applications\" side of the window to install it. Once you're finished, I2P is\n"
+"installed and can be launched from Finder. This procedure is the same as any\n"
+"other Mac application. When you launch I2P, the I2P icon will appear on the Dock\n"
+"and a few seconds later a browser will open with the I2P console page, inviting\n"
 "you to complete the bandwidth setup wizard."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:27
 #, python-format
 msgid ""
-"If you want to browse hidden websites ('eepsites') on the I2P network, "
-"you need\n"
-"to configure your browser. Instructions for configuring a range of "
-"browsers are\n"
+"If you want to browse hidden websites ('eepsites') on the I2P network, you need\n"
+"to configure your browser. Instructions for configuring a range of browsers are\n"
 "available on <a href=\"%(browser)s\">the browser configuration\n"
 "page</a>."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:34
 msgid ""
-"Two important reasons, 1) because this package is a .dmg, it can be "
-"signed with\n"
-"a certificate which will be recognized by your computer. This means that "
-"your\n"
-"computer can automatically make sure that you've obtained I2P from the "
-"I2P\n"
-"Project, rather than a potentially altered or \"fake\" installer, and 2) "
-"because\n"
-"it makes I2P easier to install and work with on Apple computers by using "
-"tools\n"
+"Two important reasons, 1) because this package is a .dmg, it can be signed with\n"
+"a certificate which will be recognized by your computer. This means that your\n"
+"computer can automatically make sure that you've obtained I2P from the I2P\n"
+"Project, rather than a potentially altered or \"fake\" installer, and 2) because\n"
+"it makes I2P easier to install and work with on Apple computers by using tools\n"
 "that are familiar and built-into the operating system."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:61
 msgid ""
-"Download that file and double-click on it.  Accept the License Agreement,"
-" then\n"
-"drag the <code>I2P</code> icon on top of the <code>Applications</code> "
-"icon.\n"
+"Download that file and double-click on it.  Accept the License Agreement, then\n"
+"drag the <code>I2P</code> icon on top of the <code>Applications</code> icon.\n"
 "Launch I2P from Finder."
 msgstr ""
 
@@ -1671,18 +1408,14 @@ msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:69
 msgid ""
-"I2P will not install any launch agents on your Mac.  If you want I2P to "
-"start on\n"
-"system startup, you need to configure a launch agent yourself. You can "
-"configure\n"
-"I2P to launch when your user logs in by right-clicking on the I2P Dock "
-"icon."
+"I2P will not install any launch agents on your Mac.  If you want I2P to start on\n"
+"system startup, you need to configure a launch agent yourself. You can configure\n"
+"I2P to launch when your user logs in by right-clicking on the I2P Dock icon."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:75
 msgid ""
-"If you would like to examine the source code for individual components, "
-"you may\n"
+"If you would like to examine the source code for individual components, you may\n"
 "find it on i2pgit.org."
 msgstr ""
 
@@ -1690,77 +1423,45 @@ msgstr ""
 msgid ""
 "If you wish to file an issue about the DMG Bundle, please use Gitlab to\n"
 "contact us. For security-sensitive issues, please remember to check the\n"
-"\"This issue is confidential and should only be visible to team members "
-"with at\n"
+"\"This issue is confidential and should only be visible to team members with at\n"
 "least Reporter access\" option when filing the issue."
 msgstr ""
 
 #: i2p2www/pages/downloads/post-install.html:3
 msgid ""
-"After running the installer on windows, simply click on the \"Start I2P\""
-" button\n"
-"which will bring up the <a "
-"href=\"http://localhost:7657/index.jsp\">router console</a>,\n"
+"After running the installer on windows, simply click on the \"Start I2P\" button\n"
+"which will bring up the <a href=\"http://localhost:7657/index.jsp\">router console</a>,\n"
 "which has further instructions."
-msgstr ""
-"לאחר הרצת תוכנת ההתקנה על חלונות, פשוט לחצו על הכפתור \"התחל את I2P\",\n"
-"מה שיפתח את <a href=\"http://localhost:7657/index.jsp\">ממשק הנתב</a>\n"
-"המכיל הוראות נוספות."
+msgstr "לאחר הרצת תוכנת ההתקנה על חלונות, פשוט לחצו על הכפתור \"התחל את I2P\",\nמה שיפתח את <a href=\"http://localhost:7657/index.jsp\">ממשק הנתב</a>\nהמכיל הוראות נוספות."
 
 #: i2p2www/pages/downloads/post-install.html:9
 msgid ""
 "On Unix-like systems, I2P can be started as a service\n"
-"using the \"i2prouter\" script, located in the directory you selected for"
-" I2P.\n"
-"Changing to that directory in a console and issuing \"sh i2prouter "
-"status\"\n"
-"should tell you the router's status. The arguments \"start\", \"stop\" "
-"and \"restart\"\n"
-"control the service. The <a "
-"href=\"http://localhost:7657/index.jsp\">router console</a>\n"
+"using the \"i2prouter\" script, located in the directory you selected for I2P.\n"
+"Changing to that directory in a console and issuing \"sh i2prouter status\"\n"
+"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n"
+"control the service. The <a href=\"http://localhost:7657/index.jsp\">router console</a>\n"
 "can be accessed at its usual location.\n"
-"For users on OpenSolaris and other systems for which the wrapper (i2psvc)"
-" is not supported,\n"
+"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n"
 "start the router with \"sh runplain.sh\" instead."
-msgstr ""
-"במערכות דמויות יוניקס, ניתן להריץ את I2P כשירות\n"
-"על־ידי שימוש בתסריט \"i2prouter\" הממוקם בתיקיה שבחרתם עבור I2P.\n"
-"מעבר לתיקיה זו והרצת הפקודה \"sh i2prouter status\" יאמר לכם מה\n"
-"מצב הנתב. הארגומנטים ‏\"start\", ‏\"stop\" ו־\"restart\" שולטים על "
-"השירות.\n"
-"ניתן להיכנס ל<a href=\"http://localhost:7657/index.jsp\">ממשק הנתב</a>\n"
-"במיקום הרגיל שלו.\n"
-"עבור משתמשים של OpenSolaris ומערכות אחרות בהן העוטף (i2psvc) אינו נתמך,\n"
-"הריצו את הנתב עם הפקודה \"sh runplain.sh\" במקום זאת."
+msgstr "במערכות דמויות יוניקס, ניתן להריץ את I2P כשירות\nעל־ידי שימוש בתסריט \"i2prouter\" הממוקם בתיקיה שבחרתם עבור I2P.\nמעבר לתיקיה זו והרצת הפקודה \"sh i2prouter status\" יאמר לכם מה\nמצב הנתב. הארגומנטים ‏\"start\", ‏\"stop\" ו־\"restart\" שולטים על השירות.\nניתן להיכנס ל<a href=\"http://localhost:7657/index.jsp\">ממשק הנתב</a>\nבמיקום הרגיל שלו.\nעבור משתמשים של OpenSolaris ומערכות אחרות בהן העוטף (i2psvc) אינו נתמך,\nהריצו את הנתב עם הפקודה \"sh runplain.sh\" במקום זאת."
 
 #: i2p2www/pages/downloads/post-install.html:20
 #, python-format
 msgid ""
-"When installing for the first time, please remember to <b>adjust your "
-"NAT/firewall</b>\n"
+"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n"
 "if you can, bearing in mind the Internet-facing ports I2P uses,\n"
 "<a href=\"%(faq)s#ports\">described here</a> among other ports.\n"
-"If you have successfully opened your port to inbound TCP, also enable "
-"inbound TCP on the\n"
+"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n"
 "<a href=\"http://localhost:7657/confignet.jsp\">configuration page</a>."
-msgstr ""
-"בעת ההתקנה בפעם הראשונה, אנא זכרו <b>להגדיר את ה־NAT/חומת האש</b>\n"
-"אם אתם יכולים. שימו לב לפתחות הפונות כלפי האינטרנט בהן I2P משתמשת\n"
-"‏<a href=\"%(faq)s#ports\">המתוארות כאן</a>.\n"
-"אם פתחתם בהצלחה את הפתחה לתקשורת TCP נכנסת, אפשרו תקשורת TCP\n"
-"נכנסת גם ב<a href=\"http://localhost:7657/confignet.jsp\">עמוד הגדרות "
-"התצורה</a>."
+msgstr "בעת ההתקנה בפעם הראשונה, אנא זכרו <b>להגדיר את ה־NAT/חומת האש</b>\nאם אתם יכולים. שימו לב לפתחות הפונות כלפי האינטרנט בהן I2P משתמשת\n‏<a href=\"%(faq)s#ports\">המתוארות כאן</a>.\nאם פתחתם בהצלחה את הפתחה לתקשורת TCP נכנסת, אפשרו תקשורת TCP\nנכנסת גם ב<a href=\"http://localhost:7657/confignet.jsp\">עמוד הגדרות התצורה</a>."
 
 #: i2p2www/pages/downloads/post-install.html:28
 msgid ""
 "Also, please review and <b>adjust the bandwidth settings</b> on the\n"
 "<a href=\"http://localhost:7657/config.jsp\">configuration page</a>,\n"
 "as the default settings of 96 KBps down / 40 KBps up are fairly slow."
-msgstr ""
-"כמו כן, אנא בדקו את <b>הגדרות רוחב הפס</b>\n"
-"ב<a href=\"http://localhost:7657/config.jsp\">עמוד הגדרות התצורה</a>,\n"
-"שכן הגדרות ברירת המחדל של 96 ק\"ב/שניה בהורדה ו־40 ק\"ב/שניה בהעלאה הן די"
-" איטיות."
+msgstr "כמו כן, אנא בדקו את <b>הגדרות רוחב הפס</b>\nב<a href=\"http://localhost:7657/config.jsp\">עמוד הגדרות התצורה</a>,\nשכן הגדרות ברירת המחדל של 96 ק\"ב/שניה בהורדה ו־40 ק\"ב/שניה בהעלאה הן די איטיות."
 
 #: i2p2www/pages/downloads/redirect.html:2
 msgid "Downloading..."
@@ -1771,9 +1472,7 @@ msgstr "מוריד..."
 msgid ""
 "Your download will begin shortly. If it doesn't start within 5 seconds, "
 "click <a href=\"%(url)s\">here</a>."
-msgstr ""
-"ההורדה תתחיל תוך זמן קצר. אם היא לא מתחילה תוך 5 שניות, לחצו <a "
-"href=\"%(url)s\">כאן</a>."
+msgstr "ההורדה תתחיל תוך זמן קצר. אם היא לא מתחילה תוך 5 שניות, לחצו <a href=\"%(url)s\">כאן</a>."
 
 #: i2p2www/pages/downloads/select.html:2 i2p2www/pages/downloads/select.html:4
 msgid "Mirror selection"
@@ -1795,12 +1494,9 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:7
 msgid ""
-"This is the long way of installing I2P for Windows, using the IzPack "
-"based\n"
-"installer and a separate Java Virtual Machine installed on the host. If "
-"you're new to I2P, you may\n"
-"want to try the Beta installer, which requires fewer total steps and "
-"automatically configures a JVM,\n"
+"This is the long way of installing I2P for Windows, using the IzPack based\n"
+"installer and a separate Java Virtual Machine installed on the host. If you're new to I2P, you may\n"
+"want to try the Beta installer, which requires fewer total steps and automatically configures a JVM,\n"
 "I2P, and sets up a Firefox Profile in a single step."
 msgstr ""
 
@@ -1810,12 +1506,9 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:14
 msgid ""
-"This is a detailed, step-by-step guide to installing and configuring I2P,"
-" including\n"
-"all dependencies and setting up a browser, on a new Windows 10 system. "
-"Many users\n"
-"will be able to skip steps if they already have Java 8 or Firefox "
-"installed."
+"This is a detailed, step-by-step guide to installing and configuring I2P, including\n"
+"all dependencies and setting up a browser, on a new Windows 10 system. Many users\n"
+"will be able to skip steps if they already have Java 8 or Firefox installed."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:18
@@ -1848,10 +1541,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:31
 msgid ""
-"In order to use I2P, you will need a suitable Java environment. On "
-"Windows, users should\n"
-"probably choose Oracle's Java 8 implementation. Please install it by "
-"following the\n"
+"In order to use I2P, you will need a suitable Java environment. On Windows, users should\n"
+"probably choose Oracle's Java 8 implementation. Please install it by following the\n"
 "instructions below:"
 msgstr ""
 
@@ -1861,15 +1552,13 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:38
 msgid ""
-"I2P requires Java to run, if you don't have Java installed, you will get "
-"an error\n"
+"I2P requires Java to run, if you don't have Java installed, you will get an error\n"
 "that looks like this:"
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:43
 msgid ""
-"We appreciate that you have a wide range of choices in Java software, but"
-" the Oracle\n"
+"We appreciate that you have a wide range of choices in Java software, but the Oracle\n"
 "Java software is the easiest to install and use with I2P on Windows."
 msgstr ""
 
@@ -1879,15 +1568,13 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:52
 msgid ""
-"Double-click the Java Installer you just downloaded. Don't set a custom "
-"path, just\n"
+"Double-click the Java Installer you just downloaded. Don't set a custom path, just\n"
 "use the default one."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:57
 msgid ""
-"Java will show you some information about what it is and where it runs "
-"while you\n"
+"Java will show you some information about what it is and where it runs while you\n"
 "wait for it to finish installing."
 msgstr ""
 
@@ -1912,7 +1599,8 @@ msgid "https://geti2p.net"
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:79
-msgid "'I2P is available in many languages. Pick one that is familiar to you.'"
+msgid ""
+"'I2P is available in many languages. Pick one that is familiar to you.'"
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:83
@@ -1921,22 +1609,19 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:87
 msgid ""
-"I2P is mostly public domain software, with permissive licenses and a "
-"small amount of GPL2'ed\n"
+"I2P is mostly public domain software, with permissive licenses and a small amount of GPL2'ed\n"
 "Free Software."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:92
 msgid ""
-"You should probably leave I2P installed at the default path, as it is "
-"easiest to work with this\n"
+"You should probably leave I2P installed at the default path, as it is easiest to work with this\n"
 "way."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:97
 msgid ""
-"Don't bother running it as a Windows service for now, an easy-to-use "
-"shortcut will be added to\n"
+"Don't bother running it as a Windows service for now, an easy-to-use shortcut will be added to\n"
 "the start menu for you to control I2P with."
 msgstr ""
 
@@ -1946,8 +1631,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:106
 msgid ""
-"I2P is now installed! You can start it using the \"Start I2P\" entries in"
-" your Start Menu and on your Desktop."
+"I2P is now installed! You can start it using the \"Start I2P\" entries in "
+"your Start Menu and on your Desktop."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:109
@@ -1956,18 +1641,15 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:111
 msgid ""
-"If you already have either Firefox or Tor Browser installed, skip the "
-"first 2 steps."
+"If you already have either Firefox or Tor Browser installed, skip the first "
+"2 steps."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:113
 msgid ""
-"Unfortunately for Windows users, Microsoft Edge does not have proxy "
-"settings that are safe to use with I2P. The browser\n"
-"that is easiest to configure with I2P in a reasonably good way is "
-"Firefox(Although Chrome is possible, this procedure\n"
-"is only recommended for experts). I2P participants who want to browse I2P"
-" Sites can follow these steps to install\n"
+"Unfortunately for Windows users, Microsoft Edge does not have proxy settings that are safe to use with I2P. The browser\n"
+"that is easiest to configure with I2P in a reasonably good way is Firefox(Although Chrome is possible, this procedure\n"
+"is only recommended for experts). I2P participants who want to browse I2P Sites can follow these steps to install\n"
 "and configure Firefox for I2P."
 msgstr ""
 
@@ -1997,10 +1679,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:142
 msgid ""
-"The Profile Bundle incorporates lots of external software, so it has a "
-"detailed license \n"
-"document. All of the external software is Free and Open Source, with the "
-"license included."
+"The Profile Bundle incorporates lots of external software, so it has a detailed license \n"
+"document. All of the external software is Free and Open Source, with the license included."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:147
@@ -2013,8 +1693,7 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:153
 msgid ""
-"When you visit the I2P router console for the first time, it will "
-"automatically direct you to the bandwidth\n"
+"When you visit the I2P router console for the first time, it will automatically direct you to the bandwidth\n"
 "configuration wizard."
 msgstr ""
 
@@ -2033,22 +1712,20 @@ msgid "Here we have an overview of the applications."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:170
-msgid "Now you have your bandwidth configured to efficiently contribute to I2P."
+msgid ""
+"Now you have your bandwidth configured to efficiently contribute to I2P."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:176
 msgid ""
-"If you want to re-run the welcome wizard after completing it, you can "
-"visit the page\n"
+"If you want to re-run the welcome wizard after completing it, you can visit the page\n"
 "on"
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:179
 msgid ""
-"That's it! You're now ready to use I2P. You can browse I2P Sites, "
-"download files, host services,\n"
-"e-mail and chat anonymously. Visit the <a "
-"href=\"https://localhost:7657/home\">router console homepage</a> to\n"
+"That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services,\n"
+"e-mail and chat anonymously. Visit the <a href=\"https://localhost:7657/home\">router console homepage</a> to\n"
 "get started."
 msgstr ""
 
@@ -2058,8 +1735,8 @@ msgstr "לא נמצא"
 
 #: i2p2www/pages/global/error_404.html:9
 msgid ""
-"Yep... the resource, you were searching for, is named differently, "
-"doesn't exist or was removed."
+"Yep... the resource, you were searching for, is named differently, doesn't "
+"exist or was removed."
 msgstr "כן ... המשאב, אותו חיפשת, קיים בשם שונה, לא קיים או הוסר."
 
 #: i2p2www/pages/global/error_500.html:5
@@ -2128,9 +1805,7 @@ msgstr "פרויקט האינטרנט הבלתי נראה"
 msgid ""
 "This page was last updated in %(lastupdated)s and is accurate for router "
 "version %(accuratefor)s."
-msgstr ""
-"עמוד זה עודכן לאחרונה ב־%(lastupdated)s והוא מדויק עבור גרסת הנתב "
-"%(accuratefor)s."
+msgstr "עמוד זה עודכן לאחרונה ב־%(lastupdated)s והוא מדויק עבור גרסת הנתב %(accuratefor)s."
 
 #: i2p2www/pages/global/layout.html:84
 #, python-format
@@ -2473,8 +2148,7 @@ msgstr "זרם Atom של ישיבות I2P"
 #: i2p2www/pages/meetings/index.html:7
 #, python-format
 msgid ""
-"Regularly scheduled project meetings are held on the first Tuesday of "
-"every month at 8 PM UTC.\n"
+"Regularly scheduled project meetings are held on the first Tuesday of every month at 8 PM UTC.\n"
 "Anyone can schedule and\n"
 "run a meeting, by posting the agenda in\n"
 "<a href=\"%(mtgforum)s\">the meetings forum</a>."
@@ -2483,13 +2157,9 @@ msgstr ""
 #: i2p2www/pages/meetings/index.html:14
 #, python-format
 msgid ""
-"If you have something to discuss, please find the developers on IRC in "
-"#i2p-dev.\n"
-"<a href=\"%(blogindex)s\">Status updates</a> from developers are also "
-"available."
-msgstr ""
-"אם יש לכם משהו לדון עליו, אנא מצאו את המפתחים ב־IRC בערוץ ‎#i2p-dev.\n"
-"‏ישנם גם <a href=\"%(blogindex)s\">עדכוני מצב</a> מהמפתחים."
+"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n"
+"<a href=\"%(blogindex)s\">Status updates</a> from developers are also available."
+msgstr "אם יש לכם משהו לדון עליו, אנא מצאו את המפתחים ב־IRC בערוץ ‎#i2p-dev.\n‏ישנם גם <a href=\"%(blogindex)s\">עדכוני מצב</a> מהמפתחים."
 
 #: i2p2www/pages/meetings/show.html:2
 #, python-format
@@ -2521,23 +2191,14 @@ msgid ""
 "<a href=\"%(bibtex)s\">BibTeX source page</a> for examples.<br />\n"
 "Remember to include URLs if possible:\n"
 "<a href=\"%(citeseer)s\">offline papers are less useful</a>."
-msgstr ""
-"נא שלחו רשומות חדשות או מתוקנות\n"
-"לכתובת <a name=\"contact\"><span class=\"email\">%(email)s</span></a>.<br"
-" />\n"
-"אם אתם יכולים, נא סדרו אותן כ־BibTex; ראו את\n"
-"‏<a href=\"%(bibtex)s\">עמוד המקור של BibTex</a> לדוגמאות.<br />\n"
-"זכרו לכלול כתובות רשת אם הדבר אפשרי:\n"
-"‏<a href=\"%(citeseer)s\">מסמכים לא־מקוונים הם פחות שימושיים</a>."
+msgstr "נא שלחו רשומות חדשות או מתוקנות\nלכתובת <a name=\"contact\"><span class=\"email\">%(email)s</span></a>.<br />\nאם אתם יכולים, נא סדרו אותן כ־BibTex; ראו את\n‏<a href=\"%(bibtex)s\">עמוד המקור של BibTex</a> לדוגמאות.<br />\nזכרו לכלול כתובות רשת אם הדבר אפשרי:\n‏<a href=\"%(citeseer)s\">מסמכים לא־מקוונים הם פחות שימושיים</a>."
 
 #: i2p2www/pages/papers/list.html:80
 #, python-format
 msgid ""
 "The source code for this page was adapted from\n"
 "<a href=\"%(anonbib)s\">Free Haven's anonymity bibliography</a>."
-msgstr ""
-"קוד המקור של עמוד זה הותאם\n"
-"מ<a href=\"%(anonbib)s\">הביבליוגרפיה של Free Haven על אנונימיות</a>."
+msgstr "קוד המקור של עמוד זה הותאם\nמ<a href=\"%(anonbib)s\">הביבליוגרפיה של Free Haven על אנונימיות</a>."
 
 #: i2p2www/pages/site/contact.html:4
 msgid "Email"
@@ -2563,9 +2224,9 @@ msgstr ""
 #, python-format
 msgid ""
 "Most of the discussion about I2P's development happens on the <a "
-"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from "
-"within I2P network). This is usually the best place to start with "
-"inquiries, if the dev IRC channel is inactive."
+"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from within "
+"I2P network). This is usually the best place to start with inquiries, if the"
+" dev IRC channel is inactive."
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:30
@@ -2575,34 +2236,19 @@ msgstr ""
 #: i2p2www/pages/site/contact.html:32
 msgid ""
 "<ul>\n"
-"  <li><a href=\"https://mastodon.social/@i2p\">Mastodon - "
-"https://mastodon.social/@i2p</a></li>\n"
-"  <li><a href=\"https://twitter.com/GetI2P\">Twitter - "
-"https://twitter.com/GetI2P</a></li>\n"
-"  <li><a href=\"https://old.reddit.com/i2p\">Reddit - "
-"https://old.reddit.com/i2p</a></li>\n"
+"  <li><a href=\"https://mastodon.social/@i2p\">Mastodon - https://mastodon.social/@i2p</a></li>\n"
+"  <li><a href=\"https://twitter.com/GetI2P\">Twitter - https://twitter.com/GetI2P</a></li>\n"
+"  <li><a href=\"https://old.reddit.com/i2p\">Reddit - https://old.reddit.com/i2p</a></li>\n"
 "</ul>"
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:41
 msgid ""
-"Our primary IRC network is the Irc2P network within I2P; a default tunnel"
-" to this network is set up with new router installs.\n"
-"  We are also present on multiple standard networks like <a "
-"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n"
-"  <a href=\"http://www.einirc.de/\">EIN</a> and <a "
-"href=\"http://freenode.net/\">Freenode</a>.\n"
-"  All I2P-related channels on all these network are linked to the main "
-"channels on Irc2P via relay bots."
-msgstr ""
-"רשת ה־IRC הראשית שלנו היא רשת ה־Irc2P שבתוך I2P; מסלול ברירת מחדל לרשת זו"
-" מותקן בעת התקנת הנתב.\n"
-"  אנחנו נמצאים גם ברשתות סטנדרטיות אחדות כמו <a "
-"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n"
-"  ‏<a href=\"http://www.einirc.de/\">EIN</a> ו־<a "
-"href=\"http://freenode.net/\">Freenode</a>.\n"
-"  כל הערוצים הקשורים ל־I2P ברשתות אלה מקושרים לערוצים הראשיים ב־Irc2P דרך"
-" רובוטי ממסור."
+"Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs.\n"
+"  We are also present on multiple standard networks like <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n"
+"  <a href=\"http://www.einirc.de/\">EIN</a> and <a href=\"http://freenode.net/\">Freenode</a>.\n"
+"  All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots."
+msgstr "רשת ה־IRC הראשית שלנו היא רשת ה־Irc2P שבתוך I2P; מסלול ברירת מחדל לרשת זו מותקן בעת התקנת הנתב.\n  אנחנו נמצאים גם ברשתות סטנדרטיות אחדות כמו <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n  ‏<a href=\"http://www.einirc.de/\">EIN</a> ו־<a href=\"http://freenode.net/\">Freenode</a>.\n  כל הערוצים הקשורים ל־I2P ברשתות אלה מקושרים לערוצים הראשיים ב־Irc2P דרך רובוטי ממסור."
 
 #: i2p2www/pages/site/contact.html:49
 msgid "Channel list:"
@@ -2643,8 +2289,8 @@ msgstr "דיוני מפתח I2P - כל הקשור לפיתוח של I2P"
 
 #: i2p2www/pages/site/contact.html:71 i2p2www/pages/site/contact.html:75
 msgid ""
-"General I2P discussion - anything that doesn't fit in a different list "
-"goes here"
+"General I2P discussion - anything that doesn't fit in a different list goes "
+"here"
 msgstr "דיון כללי I2P - כל דבר שאינו מתאים לרשימה אחרת הולך לכאן"
 
 #: i2p2www/pages/site/contact.html:80
@@ -2816,7 +2462,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:186
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:189
@@ -3063,7 +2710,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:393
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:397
@@ -3116,16 +2764,11 @@ msgstr ""
 
 #: i2p2www/pages/site/contact.html:475
 msgid ""
-"I2P welcomes all kinds of people, as long as they are friendly and "
-"helpful to each other.<br>\n"
+"I2P welcomes all kinds of people, as long as they are friendly and helpful to each other.<br>\n"
 "We disgrace hate, anger, racism, and bad speaking towards anyone.<br>\n"
-"We do support LBGT, suppressed minorites and other people, wether they "
-"need help in kind of our I2P software or not.<br>\n"
-"We work together to build a free world without hate, racism and "
-"violence.<br>\n"
-"The I2P router software was created in this spirit and should be used to "
-"help repressed people to regain their freedom of speech, while not "
-"suppressing others."
+"We do support LBGT, suppressed minorites and other people, wether they need help in kind of our I2P software or not.<br>\n"
+"We work together to build a free world without hate, racism and violence.<br>\n"
+"The I2P router software was created in this spirit and should be used to help repressed people to regain their freedom of speech, while not suppressing others."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:2
@@ -3146,8 +2789,7 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:10
 msgid ""
-"What is an \"I2P Site\" and how do I configure my browser so I can use "
-"them?"
+"What is an \"I2P Site\" and how do I configure my browser so I can use them?"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:11 i2p2www/pages/site/faq.html:109
@@ -3161,11 +2803,9 @@ msgstr "לנתב שלי יש מעט מאוד עמיתים פעילים, האם 
 
 #: i2p2www/pages/site/faq.html:13 i2p2www/pages/site/faq.html:117
 msgid ""
-"I am opposed to certain types of content. How do I keep from "
-"distributing, storing, or accessing them?"
-msgstr ""
-"אני מתנגד/ת לסוגי תוכן מסוימים. כיצד להימנע מלהפיץ אותם, לאחסן אותם או "
-"לגשת אליהם?"
+"I am opposed to certain types of content. How do I keep from distributing, "
+"storing, or accessing them?"
+msgstr "אני מתנגד/ת לסוגי תוכן מסוימים. כיצד להימנע מלהפיץ אותם, לאחסן אותם או לגשת אליהם?"
 
 #: i2p2www/pages/site/faq.html:14
 msgid "Is it possible to block I2P?"
@@ -3175,9 +2815,7 @@ msgstr ""
 msgid ""
 "In <code>wrapper.log</code> I see an error stating <code>Protocol family "
 "unavailable</code> when I2P is loading"
-msgstr ""
-"ב< code> wrapper.log </ code> אני רואה שגיאה המציינת <code> </ code> "
-"פרוטוקול משפחה לא זמין כאשר I2P נטען"
+msgstr "ב< code> wrapper.log </ code> אני רואה שגיאה המציינת <code> </ code> פרוטוקול משפחה לא זמין כאשר I2P נטען"
 
 #: i2p2www/pages/site/faq.html:16 i2p2www/pages/site/faq.html:189
 msgid "Most of the I2P Sites within I2P are down?"
@@ -3225,8 +2863,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:29 i2p2www/pages/site/faq.html:558
 msgid ""
-"How can I access the web console from my other machines or password "
-"protect it?"
+"How can I access the web console from my other machines or password protect "
+"it?"
 msgstr "כיצד לגשת לממשק הרשת של הנתב ממחשבים אחרים או להגן עליו עם ססמה?"
 
 #: i2p2www/pages/site/faq.html:30 i2p2www/pages/site/faq.html:622
@@ -3239,8 +2877,7 @@ msgstr "האם ניתן להשתמש ב־I2P בתור מתווך SOCKS?"
 
 #: i2p2www/pages/site/faq.html:32 i2p2www/pages/site/faq.html:648
 msgid ""
-"How do I access IRC, BitTorrent, or other services on the regular "
-"Internet?"
+"How do I access IRC, BitTorrent, or other services on the regular Internet?"
 msgstr "כיצד לגשת ל־IRC, לביטורנט או לשירותים אחרים באינטרנט הרגיל?"
 
 #: i2p2www/pages/site/faq.html:34
@@ -3277,8 +2914,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:44 i2p2www/pages/site/faq.html:685
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:45 i2p2www/pages/site/faq.html:704
@@ -3305,14 +2942,12 @@ msgstr ""
 msgid ""
 "My active peers / known peers / participating tunnels / connections / "
 "bandwidth vary dramatically over time! Is anything wrong?"
-msgstr ""
-"העמיתים הפעילים / העמיתים המוכרים / המסלולים המשתתפים / החיבורים / רוחב "
-"הפס שלי משתנים מאוד במשך הזמן! האם משהו אינו כשורה?"
+msgstr "העמיתים הפעילים / העמיתים המוכרים / המסלולים המשתתפים / החיבורים / רוחב הפס שלי משתנים מאוד במשך הזמן! האם משהו אינו כשורה?"
 
 #: i2p2www/pages/site/faq.html:55 i2p2www/pages/site/faq.html:963
 msgid ""
-"What makes downloads, torrents, web browsing, and everything else slower "
-"on I2P as compared to the regular internet?"
+"What makes downloads, torrents, web browsing, and everything else slower on "
+"I2P as compared to the regular internet?"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:59 i2p2www/pages/site/faq.html:1036
@@ -3326,41 +2961,31 @@ msgstr "יש לי שאלה!"
 #: i2p2www/pages/site/faq.html:69
 #, python-format
 msgid ""
-"I2P is written in the <a href=\"%(java)s\">Java programming language</a>."
-" \n"
+"I2P is written in the <a href=\"%(java)s\">Java programming language</a>. \n"
 "It has been tested on Windows, Linux, FreeBSD and OSX. \n"
 "An <a href=\"%(android)s\">Android port</a> is also available."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:76
 msgid ""
-"In terms of memory usage, I2P is configured to use 128 MB of RAM by "
-"default. \n"
-"This is sufficient for browsing and IRC usage. However, other activities "
-"may require greater memory allocation. \n"
-"For example, if one wishes to run a high-bandwidth router, participate in"
-" I2P torrents or serve high-traffic hidden services, \n"
+"In terms of memory usage, I2P is configured to use 128 MB of RAM by default. \n"
+"This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. \n"
+"For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, \n"
 "a higher amount of memory is required."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:81
 #, python-format
 msgid ""
-"In terms of CPU usage, I2P has been tested to run on modest systems such "
-"as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board "
-"computers.\n"
-"As I2P makes heavy use of cryptographic techniques, a stronger CPU will "
-"be better suited to handle the workload generated by I2P as well as tasks"
-" \n"
-"related to the rest of the system (i.e. Operating System, GUI, Other "
-"processes e.g. Web Browsing)."
+"In terms of CPU usage, I2P has been tested to run on modest systems such as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board computers.\n"
+"As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks \n"
+"related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing)."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:86
 #, python-format
 msgid ""
-"A comparison of some of the available Java Runtime Environments (JRE) is "
-"available here: \n"
+"A comparison of some of the available Java Runtime Environments (JRE) is available here: \n"
 "<a href=\"%(chart)s\">%(chart)s</a>.\n"
 "\n"
 "Using Sun/Oracle Java or OpenJDK is recommended."
@@ -3369,8 +2994,7 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:95
 #, python-format
 msgid ""
-"While the main I2P client implementation requires Java, there are several"
-"\n"
+"While the main I2P client implementation requires Java, there are several\n"
 "<a href=\"%(alt)s\">alternative clients</a> which don't require Java."
 msgstr ""
 
@@ -3381,36 +3005,22 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:103
 #, python-format
 msgid ""
-"Formerly called an eepSite, an I2P Site is a website that is hosted "
-"anonymously, a hidden service which is accessible through your web "
-"browser. \n"
-"It can be accessed by setting your web browser's HTTP proxy to use the "
-"I2P web proxy (typically it listens on localhost port 4444), and browsing"
-" to the site. Detailed instructions for configuring your browse can be "
-"found on the <a href=\"%(browsers)s\">browser configuration page</a>."
+"Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. \n"
+"It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. Detailed instructions for configuring your browse can be found on the <a href=\"%(browsers)s\">browser configuration page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:111
 msgid ""
-"x is the number of peers you've sent or received a message from "
-"successfully in the last minute, y is the number of peers seen in the "
-"last hour or so. \n"
-"Try hovering your cursor over the other lines of information for a brief "
-"description."
+"x is the number of peers you've sent or received a message from successfully in the last minute, y is the number of peers seen in the last hour or so. \n"
+"Try hovering your cursor over the other lines of information for a brief description."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:119
 msgid ""
-"I2P is an anonymous network - it is designed to withstand attempts at "
-"blocking or censoring of content, thus providing a means for "
-"communication that anyone can use. \n"
-"I2P traffic that transits through your router is encrypted with several "
-"layers of encryption. \n"
-"Except in the case of a serious security vulnerability (of which none are"
-" currently known), \n"
-"it is not possible to know what the contents of the traffic are and thus "
-"not possible to distinguish between traffic which one is opposed to or "
-"not opposed to.  \n"
+"I2P is an anonymous network - it is designed to withstand attempts at blocking or censoring of content, thus providing a means for communication that anyone can use. \n"
+"I2P traffic that transits through your router is encrypted with several layers of encryption. \n"
+"Except in the case of a serious security vulnerability (of which none are currently known), \n"
+"it is not possible to know what the contents of the traffic are and thus not possible to distinguish between traffic which one is opposed to or not opposed to.  \n"
 "\n"
 " We consider the 3 parts of the question:"
 msgstr ""
@@ -3418,50 +3028,34 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:129
 msgid ""
 "<b>Distribution</b><br> \n"
-"All traffic on I2P is encrypted in multiple layers. You don't know a "
-"message's contents, source, or destination.\n"
-"All traffic you route is internal to the I2P network, you are not an <a "
-"href=\"#exit\">exit node</a> (referred to as an outproxy in our "
-"documentation).\n"
-"Your only alternative is to refuse to route <i>any</i> traffic, by "
-"setting your share bandwidth or maximum participating tunnels to 0 (see "
-"above).\n"
-"It would be nice if you didn't do this, you should help the network by "
-"routing traffic for others.\n"
+"All traffic on I2P is encrypted in multiple layers. You don't know a message's contents, source, or destination.\n"
+"All traffic you route is internal to the I2P network, you are not an <a href=\"#exit\">exit node</a> (referred to as an outproxy in our documentation).\n"
+"Your only alternative is to refuse to route <i>any</i> traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n"
+"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n"
 "Over 95&#37; of users route traffic for others."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:139
 msgid ""
 "<b>Storage</b><br> \n"
-"I2P does not do distributed storage of content, this has to be "
-"specifically installed and configured by the user (with Tahoe-LAFS, for "
-"example). \n"
-"That is a feature of a different anonymous network, <a "
-"href=\"http://freenetproject.org/\">Freenet</a>.\n"
+"I2P does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). \n"
+"That is a feature of a different anonymous network, <a href=\"http://freenetproject.org/\">Freenet</a>.\n"
 "By running I2P, you are not storing content for anyone."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:147
 msgid ""
 "<b>Access</b><br>\n"
-"If there are hidden services which you dislike, you may refrain from "
-"visiting them.\n"
-"Your router will not request any content without your specific "
-"instruction to do so."
+"If there are hidden services which you dislike, you may refrain from visiting them.\n"
+"Your router will not request any content without your specific instruction to do so."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:155
 msgid ""
-"Yes, by far the easiest and most common way is by blocking bootstrap, or "
-"\"Reseed\" servers. Completely blocking all obfuscated traffic\n"
-"would work as well (although it would break many, many other things that "
-"are not I2P and most are not willing to go this far).\n"
-"In the case of reseed blocking, there is a reseed bundle on Github, "
-"blocking it will also block Github.\n"
-"You can reseed over a proxy (many can be found on Internet if you do not "
-"want to use Tor) or share reseed bundles on a friend-to-friend basis "
-"offline."
+"Yes, by far the easiest and most common way is by blocking bootstrap, or \"Reseed\" servers. Completely blocking all obfuscated traffic\n"
+"would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).\n"
+"In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.\n"
+"You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:161
@@ -3472,9 +3066,9 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:163
 msgid ""
-"Often this error will occur with any network enabled java software on "
-"some systems that are configured to use IPv6 by default. There are a few "
-"ways to solve this:"
+"Often this error will occur with any network enabled java software on some "
+"systems that are configured to use IPv6 by default. There are a few ways to "
+"solve this:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:168
@@ -3489,8 +3083,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:174
 msgid ""
-"If the lines are there, uncomment them by removing the \"#\"s. If the "
-"lines are not there, add them without the \"#\"s."
+"If the lines are there, uncomment them by removing the \"#\"s. If the lines "
+"are not there, add them without the \"#\"s."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:177
@@ -3501,8 +3095,7 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:181
 msgid ""
-"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> "
-"to take effect, you must completely\n"
+"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> to take effect, you must completely\n"
 "stop the router and the wrapper. Clicking <em>Restart</em> on your\n"
 "router console will NOT reread this file! You must\n"
 "click <em>Shutdown</em>, wait 11 minutes, then start I2P."
@@ -3511,11 +3104,9 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:191
 #, python-format
 msgid ""
-"If you consider every I2P Site that has ever been created, yes, most of "
-"them are down.\n"
+"If you consider every I2P Site that has ever been created, yes, most of them are down.\n"
 "People and I2P Sites come and go.\n"
-"A good way to get started in I2P is check out a list of I2P Sites that "
-"are currently up.\n"
+"A good way to get started in I2P is check out a list of I2P Sites that are currently up.\n"
 "<a href=\"%(eepstatus)s\">%(eepstatus)s</a> tracks active I2P Sites."
 msgstr ""
 
@@ -3525,13 +3116,9 @@ msgstr "למה I2P מאזין בפורט 32000?"
 
 #: i2p2www/pages/site/faq.html:201
 msgid ""
-"The Tanuki java service wrapper that we use opens this port &mdash;bound "
-"to localhost&mdash; in order to communicate with software running inside "
-"the JVM. \n"
-"When the JVM is launched it is given a key so it can connect to the "
-"wrapper. \n"
-"After the JVM establishes its connection to the wrapper, the wrapper "
-"refuses any additional connections."
+"The Tanuki java service wrapper that we use opens this port &mdash;bound to localhost&mdash; in order to communicate with software running inside the JVM. \n"
+"When the JVM is launched it is given a key so it can connect to the wrapper. \n"
+"After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:206
@@ -3544,47 +3131,32 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:215
 #, python-format
 msgid ""
-"The proxy config for different browsers is on a <a "
-"href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n"
-"More advanced configs with external tools, such as the browser plug-in "
-"FoxyProxy or the proxy server Privoxy, are possible but could introduce "
-"leaks in your setup."
+"The proxy config for different browsers is on a <a href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n"
+"More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:223
 msgid ""
 "\n"
-"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is"
-" installed (see the <a "
-"href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel "
-"configuration page</a>), and is automatically started when the I2P router"
-" starts. \n"
-"To connect to it, tell your IRC client to connect to <code>localhost "
-"6668</code>. \n"
-"HexChat-like client users can create a new network with the server "
-"<code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if "
-"you have a proxy server configured).\n"
+"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the <a href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel configuration page</a>), and is automatically started when the I2P router starts. \n"
+"To connect to it, tell your IRC client to connect to <code>localhost 6668</code>. \n"
+"HexChat-like client users can create a new network with the server <code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if you have a proxy server configured).\n"
 "Weechat users can use the following command to add a new network:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:238
 msgid ""
-"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the "
-"top of your router console for instructions."
+"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the top "
+"of your router console for instructions."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:243
 msgid ""
-"If you're hosting a personal blog or doing something otherwise non-"
-"sensitive, then you are obviously in little danger.\n"
-"If you have privacy needs that are basically non-specific, you are in "
-"little danger. If you are hosting something sensitive, then\n"
-"your services will go down at the same time that your router goes down. "
-"Someone who observes your downtime and correlates it to\n"
-"real-world events could probably de-anonymize you with enough effort. I2P"
-" has defenses available against this like multihoming or\n"
-"Tahoe-LAFS, but they require additional set up and are only appropriate "
-"for some threat models. There is no magic solution, protecting\n"
+"If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.\n"
+"If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then\n"
+"your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to\n"
+"real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or\n"
+"Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting\n"
 "yourself from a real threat will take real consideration in any case."
 msgstr ""
 
@@ -3598,23 +3170,23 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:254
 msgid ""
-"You cannot add an address without knowing at least the base32 or base64 "
-"of the site you want to visit. The \"hostname\" which is human-readable "
-"is only an alias for the cryptographic address, which corresponds to the "
-"base32 or base64. Without the cryptographic address, there is no way to "
-"access an I2P Site, this is by design. Distributing the address to people"
-" who do not know it yet is usually the responsibility of the Jump service"
-" provider. Visiting an I2P Site which is unknown will trigger the use of "
-"a Jump service. stats.i2p is the most reliable Jump service."
+"You cannot add an address without knowing at least the base32 or base64 of "
+"the site you want to visit. The \"hostname\" which is human-readable is only"
+" an alias for the cryptographic address, which corresponds to the base32 or "
+"base64. Without the cryptographic address, there is no way to access an I2P "
+"Site, this is by design. Distributing the address to people who do not know "
+"it yet is usually the responsibility of the Jump service provider. Visiting "
+"an I2P Site which is unknown will trigger the use of a Jump service. "
+"stats.i2p is the most reliable Jump service."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:256
 msgid ""
-"If you're hosting a site via i2ptunnel, then it won't have a registration"
-" with a jump service yet. To give it a URL locally, then visit the "
+"If you're hosting a site via i2ptunnel, then it won't have a registration "
+"with a jump service yet. To give it a URL locally, then visit the "
 "configuration page and click the button that says \"Add to Local Address "
-"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper"
-" URL and share it."
+"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper "
+"URL and share it."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:261
@@ -3637,12 +3209,9 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:275
 msgid ""
-"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not "
-"use port 8887; \n"
-"    a random port between 9000 and 31000 is selected when the program is "
-"run for the first time. \n"
-"    The selected port is shown on the router <a "
-"href=\"http://127.0.0.1:7657/confignet\">configuration page</a>."
+"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not use port 8887; \n"
+"    a random port between 9000 and 31000 is selected when the program is run for the first time. \n"
+"    The selected port is shown on the router <a href=\"http://127.0.0.1:7657/confignet\">configuration page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:278
@@ -3652,8 +3221,8 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:280
 msgid ""
 "UDP from the random port listed on the <a "
-"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to "
-"arbitrary remote UDP ports, allowing for replies"
+"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to arbitrary"
+" remote UDP ports, allowing for replies"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:281
@@ -3663,9 +3232,7 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:282
 msgid ""
 "Outbound UDP on port 123, allowing for replies. \n"
-"        This is necessary for I2P's internal time sync (via SNTP - "
-"querying a random SNTP host in pool.ntp.org or another server you "
-"specify)"
+"        This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:285
@@ -3718,133 +3285,100 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:324
 msgid ""
-"A higher level socket API for clients. Disabled by default. May be "
-"enabled/disabled on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
+"A higher level socket API for clients. Disabled by default. May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
 "          May be changed in the bob.config file."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:336 i2p2www/pages/site/faq.html:347
 #: i2p2www/pages/site/faq.html:358
 msgid ""
-"May be disabled or changed on the i2ptunnel page in the router console. "
-"May also be configured to be bound to a specific interface or all "
-"interfaces."
+"May be disabled or changed on the i2ptunnel page in the router console. May "
+"also be configured to be bound to a specific interface or all interfaces."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:369
 msgid ""
 "Binds to the LAN address. \n"
-"          May be changed with advanced config "
-"<code>i2np.upnp.HTTPPort=nnnn</code>. \n"
-"          May be disabled on <a "
-"href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
+"          May be changed with advanced config <code>i2np.upnp.HTTPPort=nnnn</code>. \n"
+"          May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:382
 msgid ""
 "Binds to the LAN address. \n"
-"          May be changed with advanced config "
-"<code>i2np.upnp.SSDPPort=nnnn</code>. \n"
-"          May be disabled on <a "
-"href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
+"          May be changed with advanced config <code>i2np.upnp.SSDPPort=nnnn</code>. \n"
+"          May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:395
 msgid ""
 "Used by client apps. \n"
-"          May be changed to a different port on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this "
-"is not recommended. \n"
-"          May be to bind to a different interface or all interfaces, or "
-"disabled, on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>."
+"          May be changed to a different port on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this is not recommended. \n"
+"          May be to bind to a different interface or all interfaces, or disabled, on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:408
 msgid ""
-"A higher level socket API for clients Only opened when a SAM V3 client "
-"requests a UDP session. \n"
-"          May be enabled/disabled on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
-"          May be changed in the <code>clients.config</code> file with the"
-" SAM command line option <code>sam.udp.port=nnnn</code>."
+"A higher level socket API for clients Only opened when a SAM V3 client requests a UDP session. \n"
+"          May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
+"          May be changed in the <code>clients.config</code> file with the SAM command line option <code>sam.udp.port=nnnn</code>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:421
 msgid ""
-"A higher level socket API for clients Disabled by default for new "
-"installs as of release 0.6.5. \n"
-"          May be enabled/disabled on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
+"A higher level socket API for clients Disabled by default for new installs as of release 0.6.5. \n"
+"          May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
 "          May be changed in the <code>clients.config</code> file."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:434
 msgid ""
 "May be disabled in the <code>clients.config</code>file. \n"
-"          May also be configured to be bound to a specific interface or "
-"all interfaces in that file."
+"          May also be configured to be bound to a specific interface or all interfaces in that file."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:446
 msgid ""
 "May be disabled in the <code>clients.config</code> file. \n"
-"          May also be configured to be bound to a specific interface or "
-"all interfaces in the <code>jetty.xml</code> file."
+"          May also be configured to be bound to a specific interface or all interfaces in the <code>jetty.xml</code> file."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:458 i2p2www/pages/site/faq.html:470
 #: i2p2www/pages/site/faq.html:482
 msgid ""
 "May be disabled or changed on the i2ptunnel page in the router console. \n"
-"          May also be configured to be bound to a specific interface or "
-"all interfaces."
+"          May also be configured to be bound to a specific interface or all interfaces."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:494
 msgid ""
 "Outbound to 32000 only, does not listen on this port. \n"
-"          Starts at 31000 and will increment until 31999 looking for a "
-"free port. \n"
-"          To change, see the <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
-"port.html\">wrapper documentation</a>. \n"
+"          Starts at 31000 and will increment until 31999 looking for a free port. \n"
+"          To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n"
 "          For more information see <a href=\"#port32000\">below</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:508
 msgid ""
-"To change, see the <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
-"port.html\">wrapper documentation</a>. \n"
+"To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n"
 "          For more information see <a href=\"#port32000\">below</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:516
 msgid ""
-"The local I2P ports and the I2PTunnel ports do not need to be reachable "
-"from \n"
-"remote machines, but *should* be reachable locally.  You can also create"
-" \n"
-"additional ports for I2PTunnel instances via "
-"http://localhost:7657/i2ptunnel/ \n"
-"(and in turn, would need to get your firewall to allow you local access, "
-"but \n"
+"The local I2P ports and the I2PTunnel ports do not need to be reachable from \n"
+"remote machines, but *should* be reachable locally.  You can also create \n"
+"additional ports for I2PTunnel instances via http://localhost:7657/i2ptunnel/ \n"
+"(and in turn, would need to get your firewall to allow you local access, but \n"
 "not remote access, unless desired)."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:524
 msgid ""
-"So, to summarize, nothing needs to be reachable by unsolicited remote "
-"peers, but\n"
-"if you can configure your NAT/firewall to allow inbound UDP and TCP the "
-"<a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll"
-"\n"
-"get better performance.  You will also need to be able to send outbound "
-"UDP packets\n"
-"to arbitrary remote peers (blocking IPs randomly with something like "
-"PeerGuardian\n"
+"So, to summarize, nothing needs to be reachable by unsolicited remote peers, but\n"
+"if you can configure your NAT/firewall to allow inbound UDP and TCP the <a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll\n"
+"get better performance.  You will also need to be able to send outbound UDP packets\n"
+"to arbitrary remote peers (blocking IPs randomly with something like PeerGuardian\n"
 "only hurts you - don't do it)."
 msgstr ""
 
@@ -3860,22 +3394,16 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:540
 msgid ""
-"Human-readable addresses such as <i>http://website.i2p</i> are references"
-" to a long, random string known as a <b>destination</b>. \n"
-"    These references are registered and stored at address book services "
-"such as stats.i2p, which is run by zzz. \n"
-"    You will often encounter a \"b32\" address. A \"b32\" is a hash "
-"(specifically, a <a "
-"href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n"
-"    destination. This hash is appended with \".b32.i2p\" and serves as a "
-"convenient way to link to your hidden service, without requiring any "
-"registration on an address book service."
+"Human-readable addresses such as <i>http://website.i2p</i> are references to a long, random string known as a <b>destination</b>. \n"
+"    These references are registered and stored at address book services such as stats.i2p, which is run by zzz. \n"
+"    You will often encounter a \"b32\" address. A \"b32\" is a hash (specifically, a <a href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n"
+"    destination. This hash is appended with \".b32.i2p\" and serves as a convenient way to link to your hidden service, without requiring any registration on an address book service."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:544
 msgid ""
-"It is possible to add subscriptions to your router's configuration which "
-"may reduce the frequency of these messages."
+"It is possible to add subscriptions to your router's configuration which may"
+" reduce the frequency of these messages."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:545
@@ -3884,8 +3412,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:546
 msgid ""
-"This is a list of files hosted on various I2P websites each of which "
-"contain a list of I2P hosts and their associated destinations."
+"This is a list of files hosted on various I2P websites each of which contain"
+" a list of I2P hosts and their associated destinations."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:547
@@ -3905,8 +3433,7 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:560
 msgid ""
-"For security purposes, the router's admin console by default only listens"
-" for connections on the local interface.  \n"
+"For security purposes, the router's admin console by default only listens for connections on the local interface.  \n"
 "\n"
 "There are two methods for accessing the console remotely:"
 msgstr ""
@@ -3927,17 +3454,14 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:573
 msgid ""
-"If you are running a Unix-like Operating System, this is the easiest "
-"method for remotely accessing your I2P console. \n"
-"      (Note: SSH server software is available for systems running "
-"Windows, for example <a "
-"href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)"
+"If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. \n"
+"      (Note: SSH server software is available for systems running Windows, for example <a href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:575
 msgid ""
-"Once you have configured SSH access to your system, the '-L' flag is "
-"passed to SSH with appropriate arguments - for example:"
+"Once you have configured SSH access to your system, the '-L' flag is passed "
+"to SSH with appropriate arguments - for example:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:593
@@ -3946,114 +3470,84 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:607
 msgid ""
-"Go to <a "
-"href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a>"
-" and add a console username and password if desired - \n"
-"        Adding a username &amp; password is highly recommended to secure "
-"your I2P console from tampering, which could lead to de-anonymization."
+"Go to <a href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a> and add a console username and password if desired - \n"
+"        Adding a username &amp; password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:609
 msgid ""
-"Go to <a "
-"href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and "
-"hit \"Graceful restart\", \n"
+"Go to <a href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and hit \"Graceful restart\", \n"
 "        which restarts the JVM and reloads the client applications"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:612
 msgid ""
-"After that fires up, you should now be able to reach your console "
-"remotely. \n"
-"      Load the router console at <code>http://(System_IP):7657</code> and"
-" you will be prompted for the username and password you specified in step"
-" 2 above if your browser supports the authentication popup."
+"After that fires up, you should now be able to reach your console remotely. \n"
+"      Load the router console at <code>http://(System_IP):7657</code> and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:615
 msgid ""
 "NOTE: You can specify 0.0.0.0 in the above configuration. \n"
 "      This specifies an interface, not a network or netmask. \n"
-"      0.0.0.0 means \"bind to all interfaces\", so it can be reachable on"
-" 127.0.0.1:7657 as well as any LAN/WAN IP. \n"
-"      Be careful when using this option as the console will be available "
-"on ALL addresses configured on your system."
+"      0.0.0.0 means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. \n"
+"      Be careful when using this option as the console will be available on ALL addresses configured on your system."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:624
 msgid ""
-"Please see the previous answer for instructions on using SSH Port "
-"Forwarding, and also see this page in your console: \n"
-"<a "
-"href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>"
+"Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: \n"
+"<a href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:632
 msgid ""
-"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are"
-" supported. \n"
-"I2P does not have a SOCKS outproxy so it is limited to use within I2P "
-"only."
+"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. \n"
+"I2P does not have a SOCKS outproxy so it is limited to use within I2P only."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:636
 msgid ""
-"Many applications leak sensitive information that could identify you on "
-"the Internet and this is a risk that one should be aware of when using "
-"the I2P SOCKS proxy. \n"
-"I2P only filters connection data, but if the program you intend to run "
-"sends this information as content, I2P has no way to protect your "
-"anonymity. \n"
-"For example, some mail applications will send the IP address of the "
-"machine they are running on to a mail server. \n"
-"There is no way for I2P to filter this, thus using I2P to 'socksify' "
-"existing applications is possible, but extremely dangerous."
+"Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. \n"
+"I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. \n"
+"For example, some mail applications will send the IP address of the machine they are running on to a mail server. \n"
+"There is no way for I2P to filter this, thus using I2P to 'socksify' existing applications is possible, but extremely dangerous."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:642
 #, python-format
 msgid ""
-"If you would like more information on the socks proxy application anyway,"
-"\n"
+"If you would like more information on the socks proxy application anyway,\n"
 "there are some helpful hints on the <a href=\"%(socks)s\">socks page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:650
 msgid ""
-"Unless an outproxy has been specifically set up for the service you want "
-"to connect to, this cannot be done. \n"
-"There are only three types of outproxies running right now: HTTP, HTTPS, "
-"and email. Note that there is no SOCKS outproxy. \n"
+"Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. \n"
+"There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. \n"
 "If this type of service is required, we recommend that you use Tor. \n"
 "\n"
-"Please be aware that the Tor project <a "
-"href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-"
-"idea\">recommends against using BitTorrent over Tor</a>, \n"
+"Please be aware that the Tor project <a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">recommends against using BitTorrent over Tor</a>, \n"
 "as there are serious anonymity-related issues associated with doing so."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:662
 msgid ""
-"Is my router an \"exit node\" to the regular Internet? I don't want it to"
-" be."
+"Is my router an \"exit node\" to the regular Internet? I don't want it to "
+"be."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:664
 #, python-format
 msgid ""
-"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit "
-"nodes\" - or \"outproxies\" as they are referred to on the I2P network -"
-" \n"
+"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit nodes\" - or \"outproxies\" as they are referred to on the I2P network - \n"
 "are not an inherent part of the network. \n"
-"Only volunteers who specifically set up and run separate applications "
-"will relay traffic to the regular Internet. \n"
+"Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. \n"
 "There are very, very few of these.\n"
 "\n"
-"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a "
-"single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n"
+"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n"
 "\n"
-"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our "
-"forums, if you would like to learn more about running an outproxy."
+"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our forums, if you would like to learn more about running an outproxy."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:679
@@ -4063,157 +3557,118 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:681
 msgid ""
 " It may be dangerous to use I2P in what the project calls \"Strict "
-"Countries\" where the law may not be clear on anonymizing software and "
-"where risks are judged to be fairly high. Most I2P peers are not in those"
-" strict countries and the ones that are, are placed in \"Hidden Mode\" "
-"where they interact with the rest of the network in more limited ways, so"
-" that they are less visible to network observers.\n"
+"Countries\" where the law may not be clear on anonymizing software and where"
+" risks are judged to be fairly high. Most I2P peers are not in those strict "
+"countries and the ones that are, are placed in \"Hidden Mode\" where they "
+"interact with the rest of the network in more limited ways, so that they are"
+" less visible to network observers.\n"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:687
 msgid ""
-"Yes, and this is how a fully distributed peer-to-peer network works. "
-"Every node participates in routing packets for others, so your IP address"
-" must be known to establish connections."
+"Yes, and this is how a fully distributed peer-to-peer network works. Every "
+"node participates in routing packets for others, so your IP address must be "
+"known to establish connections."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:691
 msgid ""
-"While the fact that your computer runs I2P is public, nobody can see your"
-" activities in it. You can't say if a user behind this IP address is "
-"sharing files, hosting a website, doing research or just running a node "
-"to contribute bandwidth to the project."
+"While the fact that your computer runs I2P is public, nobody can see your "
+"activities in it. You can't say if a user behind this IP address is sharing "
+"files, hosting a website, doing research or just running a node to "
+"contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:696
 msgid ""
-"It can be deduced that somebody is using the I2P network with some "
-"reliability, but it is a little difficult to know for sure.\n"
-"The most reliable way to know for sure would be to have a computer with a"
-" fairly stable IP address that you suspect is an I2P user, and a\n"
-"bunch of computers you control on different networks all running I2P. "
-"When one of them connects to your suspected computer, you will be able\n"
-"to see their I2P router in the netDB. This might take time, and it might "
-"never happen. You could also try blocking all obfuscated traffic\n"
-"on a particular network until you're sure every I2P router on that "
-"network has lost all of it's peers. At that point, they'll reach out\n"
-"to reseed servers to get more peers, which a network administrator can "
-"probably observe."
+"It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.\n"
+"The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a\n"
+"bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able\n"
+"to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic\n"
+"on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out\n"
+"to reseed servers to get more peers, which a network administrator can probably observe."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:706
 msgid ""
-"I2P does not encrypt the Internet, neither does Tor - for example, "
-"through <a "
-"href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport"
-" Layer Security (TLS)</a>. \n"
-"I2P and Tor both aim to transport your traffic as-is securely and "
-"anonymously over the corresponding network, to its destination. \n"
-"Any unencrypted traffic generated at your system will arrive at the "
-"outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n"
-"This means that you are vulnerable to snooping by the outproxy operators."
-" \n"
-"One way to protect your outproxy traffic against this is to ensure that "
-"any traffic that will be handled by the outproxy is encrypted with TLS."
+"I2P does not encrypt the Internet, neither does Tor - for example, through <a href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport Layer Security (TLS)</a>. \n"
+"I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. \n"
+"Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n"
+"This means that you are vulnerable to snooping by the outproxy operators. \n"
+"One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:714
 msgid ""
-"For more information, you may read the Tor FAQ's answer to this question:"
-"\n"
-"<a "
-"href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>"
+"For more information, you may read the Tor FAQ's answer to this question:\n"
+"<a href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:719
 #, python-format
 msgid ""
-"In addition, you may be vulnerable to collusion between the outproxy "
-"operator\n"
-"and operators of other I2P services, if you use the same tunnels "
-"(\"shared clients\").\n"
-"There is additional discussion about this on <a "
-"href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n"
-"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our "
-"forums</a> as well."
+"In addition, you may be vulnerable to collusion between the outproxy operator\n"
+"and operators of other I2P services, if you use the same tunnels (\"shared clients\").\n"
+"There is additional discussion about this on <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n"
+"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our forums</a> as well."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:726
 #, python-format
 msgid ""
 "\n"
-"Ultimately, this is a question that only you can answer because the "
-"correct answer depends on your browsing behaviour, \n"
-"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you "
-"choose to trust the outproxy operator."
+"Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, \n"
+"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you choose to trust the outproxy operator."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:734
 msgid ""
-"Reducing anonymity is typically done by A) identifying characteristics "
-"that are consistent across anonymous identities or\n"
-"B) identifying ephemeral characteristics of repeated connections. We say "
-"\"reducing\" anonymity because many of these characteristics\n"
-"are shared by many of our users, making these anonymity \"sets,\" the "
-"smaller the anonymity set and the more small sets you belong to,\n"
+"Reducing anonymity is typically done by A) identifying characteristics that are consistent across anonymous identities or\n"
+"B) identifying ephemeral characteristics of repeated connections. We say \"reducing\" anonymity because many of these characteristics\n"
+"are shared by many of our users, making these anonymity \"sets,\" the smaller the anonymity set and the more small sets you belong to,\n"
 "the more brittle your anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:741
 msgid ""
-"Attacks on I2P in the past have relied on correlating NetDB storage and "
-"verification, by randomizing \n"
-"the delay between storage and verification, we reduce the consistency "
-"with which that verification can be linked to I2P activity,\n"
+"Attacks on I2P in the past have relied on correlating NetDB storage and verification, by randomizing \n"
+"the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity,\n"
 "thereby limiting the utility of that data point."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:746
 msgid ""
-"Attacks on software configured to work with I2P are out of scope for I2P "
-"to solve. When browsing I2P or hosting\n"
-"I2P services, it's is the responsibility of the user to consider their "
-"threat model. Browsers are particularly problematic\n"
-"due to fingerprinting attacks, and the wide variety of information that "
-"can be gleaned from them. Using a standardized browsing\n"
+"Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P or hosting\n"
+"I2P services, it's is the responsibility of the user to consider their threat model. Browsers are particularly problematic\n"
+"due to fingerprinting attacks, and the wide variety of information that can be gleaned from them. Using a standardized browsing\n"
 "profile is thought to help mitigate the impact of fingerprinting."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:757
 msgid ""
-"New installations of I2P carry out the reseeding process automatically, "
-"as well as when the number of known peers falls to a drastically low "
-"value. \n"
-"If you need to carry out a reseed of your router, please see the <a "
-"href=\"#manual_reseed\">reseed instructions</a>."
+"New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. \n"
+"If you need to carry out a reseed of your router, please see the <a href=\"#manual_reseed\">reseed instructions</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:765
 msgid ""
-"An I2P router only needs to be seeded once, to join the network for the "
-"first\n"
-"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled "
-"into a\n"
+"An I2P router only needs to be seeded once, to join the network for the first\n"
+"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled into a\n"
 "signed zip-file) from at least two predefined server URLs picked from a\n"
 "volunteer-run group of non-private internet HTTPS servers."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:772
 msgid ""
-"A typical symptom of a failed reseed is the \"Known\" indicator (on the "
-"left\n"
-"sidebar of the router console) displaying a very small value (often less "
-"than\n"
-"5) which does not increase. This can occur, among other things, if your "
-"local\n"
-"firewall limits outbound traffic or if the reseed request is blocked "
-"entirely."
+"A typical symptom of a failed reseed is the \"Known\" indicator (on the left\n"
+"sidebar of the router console) displaying a very small value (often less than\n"
+"5) which does not increase. This can occur, among other things, if your local\n"
+"firewall limits outbound traffic or if the reseed request is blocked entirely."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:779
 msgid ""
-"If you are stuck behind an ISP firewall or filter, you can use the "
-"following\n"
+"If you are stuck behind an ISP firewall or filter, you can use the following\n"
 "manual method (non-automated technical solution) to join the I2P network."
 msgstr ""
 
@@ -4221,10 +3676,8 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"As of release 0.9.33, you may also configure your router to reseed "
-"through a proxy.\n"
-"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, "
-"hostname, and port."
+"As of release 0.9.33, you may also configure your router to reseed through a proxy.\n"
+"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, hostname, and port."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:789
@@ -4233,18 +3686,12 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:790
 msgid ""
-"Please contact a known trustworthy friend who has a running I2P router, "
-"and ask\n"
-"them for help with reseeding your I2P router. Request that they send you "
-"a\n"
-"reseed file exported from their running I2P router. It is vital that the "
-"file is\n"
-"exchanged over a secure channel, e.g. encrypted to avoid external "
-"tampering (PGP\n"
-"Sign, Encrypt and Verified with a trusted public key). The file itself is"
-"\n"
-"unsigned, so please accept files only from known trusted friends. Never "
-"import\n"
+"Please contact a known trustworthy friend who has a running I2P router, and ask\n"
+"them for help with reseeding your I2P router. Request that they send you a\n"
+"reseed file exported from their running I2P router. It is vital that the file is\n"
+"exchanged over a secure channel, e.g. encrypted to avoid external tampering (PGP\n"
+"Sign, Encrypt and Verified with a trusted public key). The file itself is\n"
+"unsigned, so please accept files only from known trusted friends. Never import\n"
 "a reseed file if you can not verify its source."
 msgstr ""
 
@@ -4282,8 +3729,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:812
 msgid ""
-"For trusted friends you can use your local I2P router to give them a jump"
-" start:"
+"For trusted friends you can use your local I2P router to give them a jump "
+"start:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:815
@@ -4298,12 +3745,9 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:818
 msgid ""
 "Do not reveal this file in any case to unknown users, since it contains\n"
-"sensitive private data (100 RouterInfo) from your own I2P router! In "
-"order to\n"
-"protect your anonymity: you may wait a few random hours/days before you "
-"share\n"
-"the file with your trusted friend. It is also advisable to use this "
-"procedure\n"
+"sensitive private data (100 RouterInfo) from your own I2P router! In order to\n"
+"protect your anonymity: you may wait a few random hours/days before you share\n"
+"the file with your trusted friend. It is also advisable to use this procedure\n"
 "sparingly (< 2 per week)."
 msgstr ""
 
@@ -4313,12 +3757,13 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:828
 msgid ""
-"Do not publicly publish the reseed file or share these files with a "
-"friend of a friend!"
+"Do not publicly publish the reseed file or share these files with a friend "
+"of a friend!"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:829
-msgid "This file should be used only for a very limited number of friends (< 3)!"
+msgid ""
+"This file should be used only for a very limited number of friends (< 3)!"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:830
@@ -4327,52 +3772,33 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:839
 msgid ""
-"I2P is primarily not intended, nor designed, to be used as a proxy to the"
-" regular internet. \n"
-"With that said, there are services which are provided by volunteers that "
-"act as proxies to non-private internet based content - these are referred"
-" to as \"outproxies\" on the I2P network. \n"
-"There is an outproxy configured by default in I2P's HTTP client tunnel - "
-"false.i2p. \n"
-"While this service does currently exist, there is no guarantee that it "
-"will always be there as it is not an official service provided by the I2P"
-" project. \n"
-"If your main requirement from an anonymous network is the ability to "
-"access non-private internet resources, we would recommend using <a "
-"href=\"https://www.torproject.org/\">Tor</a>."
+"I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. \n"
+"With that said, there are services which are provided by volunteers that act as proxies to non-private internet based content - these are referred to as \"outproxies\" on the I2P network. \n"
+"There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. \n"
+"While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. \n"
+"If your main requirement from an anonymous network is the ability to access non-private internet resources, we would recommend using <a href=\"https://www.torproject.org/\">Tor</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:852
 msgid ""
 "Within I2P, there is no requirement to use HTTPS. \n"
-"    All traffic is encrypted end-to-end, any further encryption, e.g. "
-"with the use of HTTPS, doesn't create any further anonymity-related "
-"benefits.\n"
+"    All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n"
 "\n"
-"    However, if one would like to use HTTPS or has a requirement to do "
-"so, the existing default I2P HTTP Proxy has support for HTTPS traffic."
-"  \n"
-"    Any hidden service operator would have to specifically set up and "
-"enable HTTPS access."
+"    However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic.  \n"
+"    Any hidden service operator would have to specifically set up and enable HTTPS access."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:861
 msgid ""
 "FTP is not supported for technical reasons.\n"
 "\n"
-"    There are no FTP \"outproxies\" to the Internet—it may not even be "
-"possible to set up one. \n"
-"    Any other kind of outproxy may work if it's set up with a standard "
-"tunnel. \n"
-"    If you would like to set up some type of outproxy, carefully research"
-" the potential risks. \n"
-"    The I2P community may or may not be able to help with the technical "
-"aspects, feel free to ask.\n"
+"    There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one. \n"
+"    Any other kind of outproxy may work if it's set up with a standard tunnel. \n"
+"    If you would like to set up some type of outproxy, carefully research the potential risks. \n"
+"    The I2P community may or may not be able to help with the technical aspects, feel free to ask.\n"
 "\n"
-"    As explained several times above, any existing outproxy isn't a core "
-"part of the network. \n"
-"    They are services run by individuals and they may or may not be "
-"operational at any given time."
+"    As explained several times above, any existing outproxy isn't a core part of the network. \n"
+"    They are services run by individuals and they may or may not be operational at any given time."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:876
@@ -4389,10 +3815,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:883
 msgid ""
-"Try to use either OpenJDK or Sun/Oracle Java if it's available for your "
-"system. \n"
-"You can check which version of java you have installed by typing "
-"<code>java -version</code> at a command/shell prompt. \n"
+"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. \n"
+"You can check which version of java you have installed by typing <code>java -version</code> at a command/shell prompt. \n"
 "Performance tends to suffer with other implementations of java."
 msgstr ""
 
@@ -4402,8 +3826,7 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:889
 msgid ""
-"Are you running a BitTorrent client over I2P? Try reducing the number of "
-"torrents, the bandwidth limits,\n"
+"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n"
 "or try turning it off completely to see if that helps."
 msgstr ""
 
@@ -4413,10 +3836,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:896
 msgid ""
-"Are your bandwidth limits set too high? It is possible that too much "
-"traffic is going through your I2P router and it is overloaded. \n"
-"Try reducing the setting for <em>share bandwidth percentage</em> on the "
-"<a href=\"http://localhost:7657/config\">configuration</a> page."
+"Are your bandwidth limits set too high? It is possible that too much traffic is going through your I2P router and it is overloaded. \n"
+"Try reducing the setting for <em>share bandwidth percentage</em> on the <a href=\"http://localhost:7657/config\">configuration</a> page."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:901
@@ -4425,11 +3846,9 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:902
 msgid ""
-"Make sure that you're running the latest version of I2P to get the "
-"benefits of increased performance and bug fixes."
-msgstr ""
-"ודא שאתה מפעיל את הגרסה האחרונה של I2P כדי לקבל את היתרונות של תיקוני "
-"באגים וביצועים מוגברים."
+"Make sure that you're running the latest version of I2P to get the benefits "
+"of increased performance and bug fixes."
+msgstr "ודא שאתה מפעיל את הגרסה האחרונה של I2P כדי לקבל את היתרונות של תיקוני באגים וביצועים מוגברים."
 
 #: i2p2www/pages/site/faq.html:907
 msgid "Memory allocation"
@@ -4437,12 +3856,9 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:908
 msgid ""
-"Has enough memory been set aside for use by I2P? Look at the memory graph"
-" on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n"
-"to see if the memory usage is \"pegged\"&mdash;the JVM is spending most "
-"of its time in garbage collection. \n"
-"Increase the setting <code>wrapper.java.maxmemory</code> in the file "
-"<code>wrapper.config</code>."
+"Has enough memory been set aside for use by I2P? Look at the memory graph on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n"
+"to see if the memory usage is \"pegged\"&mdash;the JVM is spending most of its time in garbage collection. \n"
+"Increase the setting <code>wrapper.java.maxmemory</code> in the file <code>wrapper.config</code>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:915
@@ -4452,8 +3868,7 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:916
 msgid ""
-"Is the CPU usage simply higher than you would like, or is it pegged at "
-"100&#37; for a long time?\n"
+"Is the CPU usage simply higher than you would like, or is it pegged at 100&#37; for a long time?\n"
 "If it is pegged, this could be a bug. Look in the logs for clues."
 msgstr ""
 
@@ -4464,11 +3879,8 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:923
 #, python-format
 msgid ""
-"You may be using the Java-based BigInteger library instead of the native "
-"version, especially if you are running on a new or unusual OS or hardware"
-" (OpenSolaris, mipsel, etc.).\n"
-"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on "
-"diagnosing, building, and testing methods."
+"You may be using the Java-based BigInteger library instead of the native version, especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n"
+"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on diagnosing, building, and testing methods."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:929
@@ -4477,154 +3889,107 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:930
 msgid ""
-"If your native jbigi library is working fine, the biggest user of CPU may"
-" be routing traffic for participating tunnels. \n"
-"This uses CPU because at each hop a layer of encryption must be decoded. "
-"You can limit participating traffic in two ways -\n"
-"by reducing the share bandwidth on the <a "
-"href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n"
-"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a "
-"href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> "
-"page."
+"If your native jbigi library is working fine, the biggest user of CPU may be routing traffic for participating tunnels. \n"
+"This uses CPU because at each hop a layer of encryption must be decoded. You can limit participating traffic in two ways -\n"
+"by reducing the share bandwidth on the <a href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n"
+"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> page."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:942
 msgid ""
 "If your router has 10 or more active peers, everything is fine. \n"
 "The router should maintain connections to a few peers at all times. \n"
-"The best way to stay \"better-connected\" to the network is to share more"
-" bandwidth. \n"
-"The amount of bandwidth that is shared by the router can be changed on "
-"the configuration page: \n"
-"  <a "
-"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>"
+"The best way to stay \"better-connected\" to the network is to share more bandwidth. \n"
+"The amount of bandwidth that is shared by the router can be changed on the configuration page: \n"
+"  <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:953
 msgid ""
 "No, there isn't anything wrong. \n"
 "This is normal behavior. \n"
-"All routers adjust dynamically to changing network conditions and "
-"demands. \n"
-"Routers come online and go offline depending on whether the system it is "
-"installed on is operational or not, as well as whether there is an "
-"available network connection. \n"
+"All routers adjust dynamically to changing network conditions and demands. \n"
+"Routers come online and go offline depending on whether the system it is installed on is operational or not, as well as whether there is an available network connection. \n"
 "Your router is constantly updating its local Network Database. \n"
-"Tunnels which your router is participating in expire every 10 minutes and"
-" may or may not be rebuilt through your router."
+"Tunnels which your router is participating in expire every 10 minutes and may or may not be rebuilt through your router."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:965
 msgid ""
-"The encryption and routing within the I2P network adds a substantial "
-"amount of overhead and limits bandwidth. \n"
+"The encryption and routing within the I2P network adds a substantial amount of overhead and limits bandwidth. \n"
 "\n"
 "We can try to clarify this with the aid of a diagram:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:973
 msgid ""
-"In this diagram, the path that some I2P traffic takes as it travels "
-"through the network is traced. \n"
-"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden "
-"Service (for example, the http://stats.i2p website) is labelled as 'B'."
-" \n"
-"Both the client and the server are using 3-hop tunnels, these hops are "
-"represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', "
-"'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'."
+"In this diagram, the path that some I2P traffic takes as it travels through the network is traced. \n"
+"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden Service (for example, the http://stats.i2p website) is labelled as 'B'. \n"
+"Both the client and the server are using 3-hop tunnels, these hops are represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', 'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:979
 msgid ""
-"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A "
-"while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel"
-" for 'B'. \n"
-"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound "
-"tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent "
-"an inbound tunnel for 'A'. \n"
+"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel for 'B'. \n"
+"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. \n"
 "The arrows in between the boxes show the direction of traffic. \n"
-"The text above and below the arrows detail some example bandwidth between"
-" a pair of hops as well as example latencies."
+"The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:986
 msgid ""
-"When both client and server are using 3-hop tunnels throughout, a total "
-"of 12 other I2P routers are involved in relaying traffic. \n"
-"6 peers relay traffic from the client to the server which is split into a"
-" 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound "
-"tunnel to 'B' ('X', 'Y', 'Z').  \n"
+"When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. \n"
+"6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z').  \n"
 "Similarly, 6 peers relay traffic from the server to back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:992
 msgid ""
-"First, we can consider latency - the time that it takes for a request "
-"from a client to traverse the I2P network, reach the the server and "
-"traverse back to the client. \n"
+"First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. \n"
 "Adding up all latencies we see that:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1006
 msgid ""
-"The total round-trip time in our example adds up to 740 ms - certainly "
-"much higher than what one would normally see while browsing regular "
-"internet websites."
+"The total round-trip time in our example adds up to 740 ms - certainly much "
+"higher than what one would normally see while browsing regular internet "
+"websites."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1010
 msgid ""
 "Second, we can consider available bandwidth. \n"
-"This is determined through the slowest link between hops from the client "
-"and server as well as when traffic is being transmitted by the server to "
-"the client. \n"
-"For traffic going from the client to the server, we see that the "
-"available bandwidth in our example between hops 'R' &amp; 'X' as well as "
-"hops 'X' &amp; 'Y' is 32 KB/s. \n"
-"Despite higher available bandwidth between the other hops, these hops "
-"will act as a bottleneck and will limit the maximum available bandwidth "
-"for traffic from 'A' to 'B' at 32 KB/s. \n"
-"Similarly, tracing the path from server to client shows that there is "
-"maximum bandwidth of 64 KB/s - between hops 'Z_1' &amp; 'Y_1, 'Y_1' &amp;"
-" 'X_1' and 'Q_1' &amp; 'P_1'."
+"This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. \n"
+"For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' &amp; 'X' as well as hops 'X' &amp; 'Y' is 32 KB/s. \n"
+"Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. \n"
+"Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' &amp; 'Y_1, 'Y_1' &amp; 'X_1' and 'Q_1' &amp; 'P_1'."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1018
 msgid ""
 "We recommend increasing your bandwidth limits. \n"
-"This helps the network by increasing the amount of available bandwidth "
-"which will in turn improve your I2P experience. \n"
-"Bandwidth settings are located on the <a "
-"href=\"http://localhost:7657/config\">http://localhost:7657/config</a> "
-"page. \n"
-"Please be aware of your internet connection's limits as determined by "
-"your ISP, and adjust your settings accordingly."
+"This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. \n"
+"Bandwidth settings are located on the <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a> page. \n"
+"Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1025
 msgid ""
-"We also recommend setting a sufficient amount of shared bandwidth - this "
-"allows for participating tunnels to be routed through your I2P router. \n"
-"Allowing participating traffic keeps your router well-integrated in the "
-"network and improves your transfer speeds."
+"We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. \n"
+"Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1030
 #, python-format
 msgid ""
-"I2P is a work in progress. Lots of improvements and fixes are being "
-"implemented, and, generally speaking, running the latest release will "
-"help your performance.\n"
-"If you haven't, <a href=\"%(downloadslist)s\">install the latest "
-"release</a>."
+"I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance.\n"
+"If you haven't, <a href=\"%(downloadslist)s\">install the latest release</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1038
 msgid ""
-"You may report any bugs/issues that you encounter on our bugtracker, "
-"which is available over both non-private internet and I2P. \n"
-"We have a discussion forum, also available on I2P and non-private "
-"internet. You can join our IRC channel as well: \n"
+"You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. \n"
+"We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: \n"
 "either through our IRC network, IRC2P, or on Freenode."
 msgstr ""
 
@@ -4646,14 +4011,10 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:1050
 msgid ""
-"You may paste any interesting logs to a paste service such as the non-"
-"private internet services listed on the \n"
-"  <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-"
-"Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n"
-"  <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this"
-" \n"
-"  <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and"
-" follow up on IRC in #i2p<"
+"You may paste any interesting logs to a paste service such as the non-private internet services listed on the \n"
+"  <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n"
+"  <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this \n"
+"  <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and follow up on IRC in #i2p<"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1054
@@ -4662,13 +4023,10 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:1058
 msgid ""
-"Please include relevant information from the router logs page which is "
-"available at: \n"
+"Please include relevant information from the router logs page which is available at: \n"
 "<a href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>.\n"
-"We request that you share all of the text under the 'I2P Version and "
-"Running Environment' \n"
-"section as well as any errors or warnings displayed in the various logs "
-"displayed on the page."
+"We request that you share all of the text under the 'I2P Version and Running Environment' \n"
+"section as well as any errors or warnings displayed in the various logs displayed on the page."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1070
@@ -4679,8 +4037,7 @@ msgid ""
 "  <li>on <code>irc.freenode.net</code> channel <code>#i2p</code></li>\n"
 "  <li>on <code>IRC2P</code> channel <code>#i2p</code></li>\n"
 "</ul>\n"
-"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it "
-"here (with the answer, hopefully)."
+"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it here (with the answer, hopefully)."
 msgstr ""
 
 #: i2p2www/pages/site/impressum.html:4
@@ -4694,8 +4051,8 @@ msgstr "הרשת האנונימית I2P"
 #: i2p2www/pages/site/index.html:4
 msgid ""
 "Anonymous peer-to-peer distributed communication layer built with open "
-"source tools and designed to run any traditional Internet service such as"
-" email, IRC or web hosting."
+"source tools and designed to run any traditional Internet service such as "
+"email, IRC or web hosting."
 msgstr ""
 
 #: i2p2www/pages/site/index.html:8
@@ -4704,8 +4061,7 @@ msgstr ""
 
 #: i2p2www/pages/site/index.html:9
 msgid ""
-"The Invisible Internet is a privacy by design, people-powered network. It"
-" is a truly free and anonymizing Internet alternative. Get I2P.\n"
+"The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P.\n"
 "  "
 msgstr ""
 
@@ -4721,14 +4077,10 @@ msgstr "מה הוא I2P?"
 #: i2p2www/pages/site/index.html:17
 msgid ""
 "\n"
-"        The Invisible Internet Project (I2P) is a fully encrypted private"
-" network layer.\n"
-"        It protects your activity and location. Every day people use the "
-"network to connect\n"
-"        with people without worry of being tracked or their data being "
-"collected. In some\n"
-"        cases people rely on the network when they need to be discrete or"
-" are doing sensitive work."
+"        The Invisible Internet Project (I2P) is a fully encrypted private network layer.\n"
+"        It protects your activity and location. Every day people use the network to connect\n"
+"        with people without worry of being tracked or their data being collected. In some\n"
+"        cases people rely on the network when they need to be discrete or are doing sensitive work."
 msgstr ""
 
 #: i2p2www/pages/site/index.html:23
@@ -4738,13 +4090,13 @@ msgstr ""
 #: i2p2www/pages/site/index.html:25
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/index.html:27
@@ -4758,8 +4110,8 @@ msgstr ""
 #: i2p2www/pages/site/index.html:33
 msgid ""
 "The network is people powered . Peers make a portion of their resources, "
-"particularly bandwidth, available to other network participants. This "
-"allows the network to function without relying on centralized servers."
+"particularly bandwidth, available to other network participants. This allows"
+" the network to function without relying on centralized servers."
 msgstr ""
 
 #: i2p2www/pages/site/index.html:33
@@ -4808,8 +4160,7 @@ msgstr "קישורים ומקורות מומלצים"
 #, python-format
 msgid ""
 "See also the page with\n"
-"<a href=\"%(media)s\">links to presentations, videos, and tutorials about"
-" I2P</a>."
+"<a href=\"%(media)s\">links to presentations, videos, and tutorials about I2P</a>."
 msgstr ""
 
 #: i2p2www/pages/site/links.html:12
@@ -4835,4 +4186,3 @@ msgstr "לוחות, אתרי חדשות, אחרים"
 #: i2p2www/pages/site/links.html:51
 msgid "Very Old Stuff"
 msgstr "דברים מאוד ישנים"
-
diff --git a/i2p2www/translations/hu/LC_MESSAGES/comparison.po b/i2p2www/translations/hu/LC_MESSAGES/comparison.po
index 03a9adb0404398aa2b57b04892cecbdc9d7f3794..d930498559d783161d05ce3b31ae1f7ab57921d9 100644
--- a/i2p2www/translations/hu/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/hu/LC_MESSAGES/comparison.po
@@ -1,21 +1,22 @@
-# Hungarian translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2018-10-04 00:57+0000\n"
-"Last-Translator: erinm\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Hungarian (http://www.transifex.com/otf/I2P/language/hu/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: hu\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -23,34 +24,23 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
@@ -58,20 +48,13 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
 msgstr ""
 
@@ -81,15 +64,11 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -104,10 +83,8 @@ msgstr ""
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
@@ -125,52 +102,38 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
 msgstr ""
 
@@ -178,19 +141,15 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
@@ -202,32 +161,20 @@ msgstr ""
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
 msgstr ""
 
@@ -236,36 +183,23 @@ msgstr ""
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
 msgstr ""
 
@@ -273,10 +207,8 @@ msgstr ""
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
 msgstr ""
@@ -290,7 +222,7 @@ msgstr ""
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
@@ -425,7 +357,7 @@ msgstr "Rejtett Szolgáltatás"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
+msgid "I2P Site or Destination"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
@@ -496,8 +428,7 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
 msgstr ""
@@ -516,10 +447,8 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:93
@@ -527,7 +456,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:96
@@ -566,8 +496,8 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:121
@@ -704,4 +634,3 @@ msgid ""
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
 msgstr ""
-
diff --git a/i2p2www/translations/hu/LC_MESSAGES/get-involved.po b/i2p2www/translations/hu/LC_MESSAGES/get-involved.po
index 35ee425e4d6e80b7d1cd15c33b6d3cc53dd4a3ac..2bd8bd1fa77645b32631ffdad6f2889a6daf7c43 100644
--- a/i2p2www/translations/hu/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/hu/LC_MESSAGES/get-involved.po
@@ -1,21 +1,22 @@
-# Hungarian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-06-19 15:11+0000\n"
-"Last-Translator: Nyul Csoki <csokinyul@i2pmail.org>\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Hungarian (http://www.transifex.com/otf/I2P/language/hu/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: hu\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -30,12 +31,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -50,44 +48,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -126,10 +113,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -159,10 +144,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -177,25 +160,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -221,8 +194,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -236,12 +208,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -252,10 +221,8 @@ msgstr "Fordítás"
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
 msgstr ""
@@ -266,17 +233,12 @@ msgstr "Dokumentáció"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -287,16 +249,11 @@ msgstr "Tesztelés"
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -309,14 +266,10 @@ msgstr "Szolgáltatások"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -326,9 +279,9 @@ msgstr "Újratáplálás (reseed) folyamatban"
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -372,8 +325,7 @@ msgstr ""
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -381,7 +333,7 @@ msgstr ""
 msgid "Roadmap"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/roadmap.html:309
+#: i2p2www/pages/site/get-involved/roadmap.html:210
 #, python-format
 msgid ""
 "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info "
@@ -442,84 +394,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -528,17 +457,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -546,29 +470,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -576,42 +494,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -655,72 +564,52 @@ msgstr ""
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -730,8 +619,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -744,33 +633,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -791,76 +674,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -870,25 +734,18 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -899,29 +756,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -931,10 +780,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -942,13 +789,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -959,43 +803,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1010,28 +847,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1042,8 +871,7 @@ msgstr "Eltávolítva"
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1057,8 +885,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1077,14 +904,10 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1093,17 +916,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1113,8 +933,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1136,32 +955,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1170,47 +982,39 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1222,12 +1026,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1252,8 +1053,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1272,8 +1073,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1302,20 +1102,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1387,8 +1183,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1401,24 +1196,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1428,22 +1214,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1479,21 +1257,16 @@ msgstr ""
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1517,10 +1290,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1531,8 +1302,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1545,10 +1315,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1558,7 +1326,8 @@ msgid "Release Signing Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1579,7 +1348,8 @@ msgid "Download PGP public key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1587,13 +1357,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1601,7 +1372,8 @@ msgid "Security GPG Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1610,8 +1382,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1643,35 +1414,28 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1679,29 +1443,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1728,12 +1486,10 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1743,10 +1499,8 @@ msgstr "Közösség"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1768,8 +1522,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1777,13 +1531,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1792,8 +1547,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1807,34 +1561,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1844,61 +1592,49 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1925,20 +1661,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1947,14 +1682,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1964,12 +1699,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1989,8 +1725,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2017,12 +1752,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2041,22 +1773,22 @@ msgstr "IDE használata az I2P-vel"
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2073,8 +1805,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2091,14 +1823,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2177,34 +1909,26 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2214,20 +1938,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2244,22 +1964,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2271,10 +1988,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2284,38 +1999,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2333,23 +2040,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2363,11 +2064,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2378,34 +2076,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2418,18 +2109,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2443,16 +2130,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2472,67 +2157,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2556,8 +2231,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2573,44 +2248,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2618,8 +2283,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2628,64 +2292,59 @@ msgid "New Developer's Guide"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:6
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:32
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:31
 msgid "Basic study"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:7
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:46
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:45
 msgid "Getting the I2P code"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:9
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:52
 msgid "The new way: Git"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:10
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:11
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81
-msgid "The old way: Monotone"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:145
 msgid "Building I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:166
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:102
 msgid "Development ideas"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:174
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:110
 msgid "Making the results available"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:196
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
 msgid "Get to know us!"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:202
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
 msgid "Translations"
 msgstr "Fordítások"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:17
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:208
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
 msgid "Tools"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:22
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:21
 msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:26
 #, python-format
 msgid ""
 "\n"
@@ -2693,42 +2352,34 @@ msgid ""
 "Try <a href=\"%(volunteer)s\">getting involved</a> first."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:34
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:38
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:37
 #, python-format
 msgid ""
 "Study the <a href=\"%(intro)s\">how intro</a>,\n"
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:47
 msgid ""
 "For development on the I2P router or the embedded applications,\n"
 "there are two ways to get the source code:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
-msgid "The easy way: Git"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:55
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"For the time being, issues are still being manged on <a "
-"href=\"%(trac)s\">trac</a>."
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
+"issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:58
@@ -2741,143 +2392,31 @@ msgstr ""
 msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:84
-msgid ""
-"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n"
-"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to "
-"the source code (and for a lot of complicated things, but 'keeping track "
-"of changes' is the basic idea)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:89
-msgid ""
-"Skim over the <a "
-"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>,"
-" to make sure you understand the concepts."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:93
-msgid ""
-"If you want to remain anonymous, you need to do an additional step, to "
-"set up a connection to a monotone server over I2P:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
-#, python-format
-msgid ""
-"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port "
-"8998 pointing to mtn.i2p-projekt.i2p."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
-msgid ""
-"Pick a directory where you want to put all your I2P files, and create a "
-"monotone database:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
-msgid ""
-"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or"
-" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the "
-"following contents:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> "
-"into a new file (e.g. <code>keys.txt</code>) in the same directory\n"
-"  that <code>i2p.mtn</code> is in. Import the keys into your database "
-"with <br><code><pre>      mtn -d i2p.mtn read < keys.txt</pre></code>"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
-msgid ""
-"Pull the I2P sources to your machine. This may take a long time, "
-"especially if you are doing this over I2P!"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
-msgid "Anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
-msgid "Non-anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
-msgid ""
-"All the sources are now present on your machine, in the database file. To"
-" make them available in a directory, you need to check them out:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:125
-msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the "
-"I2P sources."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
-msgid "Remarks"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
-msgid ""
-"\n"
-"To download the website files instead of the I2P source files, use "
-"'i2p.www' instead of 'i2p.i2p'."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:133
-msgid ""
-"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it"
-" left off.\n"
-"If you are in a hurry, use the non-anonymous access."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
-#, python-format
-msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on <a"
-" href=\"%(viewmtn)s\">viewmtn</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:141
-#, python-format
-msgid ""
-"A long explanation about using monotone is available on the <a "
-"href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:147
-#, python-format
-msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:155
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:91
 msgid ""
 "To build or work on console translations, you need\n"
 "the xgettext, msgfmt, and msgmerge tools from the\n"
 "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:161
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
 #, python-format
 msgid ""
 "For development on new applications,\n"
 "see the <a href=\"%(apps)s\">application development guide</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:167
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
 #, python-format
 msgid ""
 "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n"
@@ -2886,93 +2425,42 @@ msgid ""
 "for ideas."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:176
-#, python-format
-msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:181
-msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:184
-msgid "use an empty passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:185
-msgid "enter a passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:186
-#, python-format
-msgid ""
-"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get "
-"push privileges"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:187
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get "
-"commit privileges - not required for website"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:188
-msgid "check in with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:189
-msgid "push with this key"
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:191
-#, python-format
-msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:197
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:203
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:209
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:217
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -2992,11 +2480,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3011,10 +2497,8 @@ msgstr ""
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3034,12 +2518,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3050,27 +2531,23 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
 msgstr ""
 
@@ -3086,10 +2563,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3107,8 +2582,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
 msgstr ""
 
@@ -3121,19 +2595,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3141,15 +2611,13 @@ msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3158,8 +2626,8 @@ msgstr "GYIK"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3175,67 +2643,65 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3260,10 +2726,8 @@ msgstr "Áttekintés"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3272,21 +2736,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3309,8 +2769,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3320,18 +2779,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3341,10 +2795,8 @@ msgstr "Adatvédelmi irányelvek"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3353,17 +2805,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3372,10 +2822,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3386,18 +2834,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr ""
-
diff --git a/i2p2www/translations/id/LC_MESSAGES/about.po b/i2p2www/translations/id/LC_MESSAGES/about.po
index 6fe5bb543530fc92701394963fad80247626306d..ff519d8a8717e2e4b852beca162524e13b56e1ff 100644
--- a/i2p2www/translations/id/LC_MESSAGES/about.po
+++ b/i2p2www/translations/id/LC_MESSAGES/about.po
@@ -1,24 +1,24 @@
-# Indonesian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Khairul Agasta <khairuldroids@gmail.com>, 2014
 # Robert Dafis <robertdafis@gmail.com>, 2018
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: Robert Dafis <robertdafis@gmail.com>\n"
-"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)"
-"\n"
-"Plural-Forms: nplurals=1; plural=0\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Robert Dafis <robertdafis@gmail.com>, 2018\n"
+"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: id\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -28,14 +28,9 @@ msgstr "Cient I2P alternatif"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
-msgstr ""
-"Implementasi client I2P utama menggunakan Java. Jika karena suatu alasan "
-"tertentu anda tidak dapat menggunakan Java di perangkat anda, ada "
-"beberapa alternatif implementasi yang dikembangkan oleh anggota "
-"komunitas."
+msgstr "Implementasi client I2P utama menggunakan Java. Jika karena suatu alasan tertentu anda tidak dapat menggunakan Java di perangkat anda, ada beberapa alternatif implementasi yang dikembangkan oleh anggota komunitas."
 
 #: i2p2www/pages/site/about/alternative-clients.html:12
 #, python-format
@@ -43,30 +38,21 @@ msgid ""
 "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n"
 "As of early 2016, i2pd is became stable enough to be used in \n"
 "production, and since summer 2016 it fully implements all I2P APIs."
-msgstr ""
-"<a href=\"%(i2pd)s\">I2pd</a> adalah implementasi client I2P di C++.\n"
-"Pada awal 2016, i2pd menjadi cukup stabil untuk digunakan dalam produksi,"
-" dan sejak musim panas 2016, semua API I2P sepenuhnya diterapkan."
+msgstr "<a href=\"%(i2pd)s\">I2pd</a> adalah implementasi client I2P di C++.\nPada awal 2016, i2pd menjadi cukup stabil untuk digunakan dalam produksi, dan sejak musim panas 2016, semua API I2P sepenuhnya diterapkan."
 
 #: i2p2www/pages/site/about/alternative-clients.html:19
 #, python-format
 msgid ""
 "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero "
 "cryptocurrency."
-msgstr ""
-"<a href=\"%(kovri)s\">Kovri</a> adalah fork aktif i2pd yang dikembangkan "
-"untuk cryptocurrency Monero."
+msgstr "<a href=\"%(kovri)s\">Kovri</a> adalah fork aktif i2pd yang dikembangkan untuk cryptocurrency Monero."
 
 #: i2p2www/pages/site/about/alternative-clients.html:24
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
-msgstr ""
-"<a href=\"%(go_i2p)s\">Go-I2P</a> adalah lient I2P yang dikembangkan "
-"menggunakan bahasa pemrograman <a href=\"%(golang)s\">Go</a> . Proyek ini"
-" masih dalam perkembangan awal."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
+msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> adalah lient I2P yang dikembangkan menggunakan bahasa pemrograman <a href=\"%(golang)s\">Go</a> . Proyek ini masih dalam perkembangan awal."
 
 #: i2p2www/pages/site/about/browser-config.html:2
 msgid "Web Browser Configuration"
@@ -78,11 +64,147 @@ msgstr "Glosarium"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
-"Halaman ini menampilkan terminologi yang sering digunakan ketika "
-"mendiskusikan I2P dan kriptografi."
+
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
@@ -90,38 +212,27 @@ msgstr "Hall Of Fame "
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
 msgid "Big thanks go to the following people who have donated to I2P!"
-msgstr ""
-"Terima kasih yang sebesar-besarnya kepada mereka yang telah mendonasikan "
-"ke I2P!"
+msgstr "Terima kasih yang sebesar-besarnya kepada mereka yang telah mendonasikan ke I2P!"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
-msgstr ""
-"Jika anda telah melakukan donasi, silahkan kirimkan email ke <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
-"dengan nama atau alias Anda (dan homepage, jika ada) jadi kami dapat "
-"mendaftarkan anda disini."
+msgstr "Jika anda telah melakukan donasi, silahkan kirimkan email ke <a href=\"mailto:%(echelon)s\">echelon</a>\ndengan nama atau alias Anda (dan homepage, jika ada) jadi kami dapat mendaftarkan anda disini."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -135,12 +246,8 @@ msgstr "The Invisible Internet Project "
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -150,13 +257,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -165,15 +272,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -182,28 +289,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -212,36 +318,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -250,13 +355,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -265,38 +370,21 @@ msgstr "Perbandingan"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi"
-" \n"
-"anonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah"
-" \n"
-"daftar komprehensif sumber anonimitas - kedua freehaven \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi "
-"Anonimitas</a>\n"
-"dan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\n"
-"melayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\n"
-"untuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan "
-"individu:"
+msgstr "Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi \nanonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah \ndaftar komprehensif sumber anonimitas - kedua freehaven \n<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi Anonimitas</a>\ndan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\nmelayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\nuntuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan individu:"
 
 #: i2p2www/pages/site/about/intro.html:56
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman "
-"jaringan lain:</a>"
+msgstr "Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman jaringan lain:</a>"
 
 #: i2p2www/pages/site/about/media.html:2
 msgid "Presentations on I2P"
@@ -305,13 +393,9 @@ msgstr "Presentasi mengenai I2P"
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
-msgstr ""
-"Berikut adalah link ke presentasi, video, dan tutorial tentang I2P. Link "
-"ke makalah penelitian pada I2P juga tersedia <a href=\"%(papers)s\">di "
-"sini</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
+msgstr "Berikut adalah link ke presentasi, video, dan tutorial tentang I2P. Link ke makalah penelitian pada I2P juga tersedia <a href=\"%(papers)s\">di sini</a>."
 
 #: i2p2www/pages/site/about/media.html:8
 #, python-format
@@ -322,9 +406,7 @@ msgstr "Untuk meminta tambahan untuk Halaman ini, silahkan kirim ke %(email)s."
 msgid ""
 "\n"
 "Newest links are at the bottom of each section."
-msgstr ""
-"\n"
-"Link terbaru ada di bagian bawah di setiap bagian."
+msgstr "\nLink terbaru ada di bagian bawah di setiap bagian."
 
 #: i2p2www/pages/site/about/media.html:16
 msgid "Presentations"
@@ -337,10 +419,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(transcript)s\">transcript</a>\n"
 "Lance James (0x90), February 2002."
-msgstr ""
-"Presentasi IIP di CodeCon <a href=\"%(mp3)s\">MP3 audio</a>\n"
-"<a href=\"%(transcript)s\">transkrip</a> Lance James (0x90), Februari "
-"2002."
+msgstr "Presentasi IIP di CodeCon <a href=\"%(mp3)s\">MP3 audio</a>\n<a href=\"%(transcript)s\">transkrip</a> Lance James (0x90), Februari 2002."
 
 #: i2p2www/pages/site/about/media.html:27
 #, python-format
@@ -349,9 +428,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(slides)s\">slides</a>\n"
 "Lance James (0x90), September 2002."
-msgstr ""
-"Presentasi IIP di ToorCon <a href=\"%(mp3)s\">MP3 audio</a>\n"
-"<a href=\"%(slides)s\">slide</a> Lance James (0x90), September 2002."
+msgstr "Presentasi IIP di ToorCon <a href=\"%(mp3)s\">MP3 audio</a>\n<a href=\"%(slides)s\">slide</a> Lance James (0x90), September 2002."
 
 #: i2p2www/pages/site/about/media.html:35
 #, python-format
@@ -361,12 +438,7 @@ msgid ""
 "An introduction into anonymous communication with I2P.\n"
 "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n"
 "Jens Kubieziel, 24C3 Berlin, December 28, 2007."
-msgstr ""
-"<a href=\"%(video)s\">To be atau I2P</a>\n"
-"(Video Youtube)\n"
-"Pengenalan kepada komunikasi  anonim dengan I2P.\n"
-"<a href=\"%(pdf)s\">To be atau I2P (PDF presentasi)</a>, Jens Kubieziel, "
-"24C 3 Berlin, 28 Desember 2007."
+msgstr "<a href=\"%(video)s\">To be atau I2P</a>\n(Video Youtube)\nPengenalan kepada komunikasi  anonim dengan I2P.\n<a href=\"%(pdf)s\">To be atau I2P (PDF presentasi)</a>, Jens Kubieziel, 24C 3 Berlin, 28 Desember 2007."
 
 #: i2p2www/pages/site/about/media.html:44
 #, python-format
@@ -374,15 +446,12 @@ msgid ""
 "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n"
 "Lars Schimmer,\n"
 "March 14-15, 2009"
-msgstr ""
-"<a href=\"%(video)s\">Video diskusi I2P di Chemnitz Linux Tag</a>, Lars "
-"Schimmer, 14-15 Maret 2009"
+msgstr "<a href=\"%(video)s\">Video diskusi I2P di Chemnitz Linux Tag</a>, Lars Schimmer, 14-15 Maret 2009"
 
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -393,9 +462,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n"
 "Adrian Crenshaw. Schmoocon Firetalk, January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Ke Darknet I2P: Selamat Datang di Cipherspace</a> "
-"Adrian Crenshaw. Schmoocon Firetalk, bulan January 2011"
+msgstr "<a href=\"%(link)s\">Ke Darknet I2P: Selamat Datang di Cipherspace</a> Adrian Crenshaw. Schmoocon Firetalk, bulan January 2011"
 
 #: i2p2www/pages/site/about/media.html:62
 #, python-format
@@ -403,111 +470,72 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
-msgstr ""
-"<a href=\"%(link)s\">Menggunakan teknologi untuk memajukan kebebasan</a>\n"
-"(Youtube Video)\n"
-"Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 Maret "
-"2011.\n"
-"I2p dibahas pukul 10:00-20:00 di dalam video."
+msgstr "<a href=\"%(link)s\">Menggunakan teknologi untuk memajukan kebebasan</a>\n(Youtube Video)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 Maret 2011.\nI2p dibahas pukul 10:00-20:00 di dalam video."
 
 #: i2p2www/pages/site/about/media.html:70
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Kelemahan Umum Darknet</a>\n"
-"(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AJUDAN</a>, 11-15 "
-"Juli 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
+msgstr "<a href=\"%(link)s\">Kelemahan Umum Darknet</a>\n(Youtube Video)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AJUDAN</a>, 11-15 Juli 2011."
 
 #: i2p2www/pages/site/about/media.html:76
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Catatan Workshop I2P / Tor </a>\n"
-"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 Agustus 2011."
+msgstr "<a href=\"%(link)s\">Catatan Workshop I2P / Tor </a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 Agustus 2011."
 
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011."
-msgstr ""
-"<a href=\"%(live)s\">Cipherspaces Darknets: Overview Strategi Serangan - "
-"DEF CON Versi Live (Youtube Video)</a>, <a href=\"%(studio)s\">\"versi "
-"Studio\" (Youtube Video)</a>, Adrian Crenshaw <a "
-"href=\"%(slides)s\">slide (ppt)</a> . DEF CON 19, Las Vegas, 7 Agustus "
-"2011."
+msgstr "<a href=\"%(live)s\">Cipherspaces Darknets: Overview Strategi Serangan - DEF CON Versi Live (Youtube Video)</a>, <a href=\"%(studio)s\">\"versi Studio\" (Youtube Video)</a>, Adrian Crenshaw <a href=\"%(slides)s\">slide (ppt)</a> . DEF CON 19, Las Vegas, 7 Agustus 2011."
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
-msgstr ""
-"<a href=\"http://0x375.org/\">Ekosistem Modern cipherspace</a>, 0x375 "
-"0x06 (Sesi Diskusi Thessaloniki Tech), 4 November 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
+msgstr "<a href=\"http://0x375.org/\">Ekosistem Modern cipherspace</a>, 0x375 0x06 (Sesi Diskusi Thessaloniki Tech), 4 November 2011."
 
 #: i2p2www/pages/site/about/media.html:95
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
-msgstr ""
-"<a href=\"%(link)s\">I2p - jaringan anonim</a>\n"
-"(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, 25 "
-"Januari 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
+msgstr "<a href=\"%(link)s\">I2p - jaringan anonim</a>\n(Youtube Video)\nBlair Dick, University of Abertay, Dundee Ethical Hacking Society, 25 Januari 2012."
 
 #: i2p2www/pages/site/about/media.html:101
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2PCon 2015</a>\n"
 "Toronto, August 15-16, 2015"
-msgstr ""
-"<a href=\"%(link)s\">I2PCon 2015</a>\n"
-"Toronto, 15-16 Agustus 2015"
+msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 Agustus 2015"
 
 #: i2p2www/pages/site/about/media.html:106
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
-msgstr ""
-"<a href=\"%(link)s\">I2p - masih hidup!</a> (pdf)</a>\n"
-"<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 Desember 2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
+msgstr "<a href=\"%(link)s\">I2p - masih hidup!</a> (pdf)</a>\n<a href=\"%(link2)s\">(video)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 Desember 2015"
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
-msgstr ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, Real World Crypto, Stanford, 8 Januari 2016"
+msgstr "Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, Real World Crypto, Stanford, 8 Januari 2016"
 
 #: i2p2www/pages/site/about/media.html:121
 #, python-format
@@ -515,14 +543,8 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
-msgstr ""
-"Onions and Garlic: the protocols of I2P\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, 17 Februari 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
+msgstr "Onions and Garlic: the protocols of I2P\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17 Februari 2016"
 
 #: i2p2www/pages/site/about/media.html:129
 #, python-format
@@ -531,11 +553,7 @@ msgid ""
 "<a href=\"%(link)s\">(mp4)</a>\n"
 "<a href=\"%(link2)s\">(webm)</a>\n"
 "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018"
-msgstr ""
-"The Invisible Internet Project - Penjelasan umum dan panduan teknologi\n"
-"<a href=\"%(link)s\">(mp4)</a>\n"
-"<a href=\"%(link2)s\">(webm)</a>\n"
-"Andrew Savchenko (bircoph), FOSDEM, Brussel, 4 Februari 2018"
+msgstr "The Invisible Internet Project - Penjelasan umum dan panduan teknologi\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Brussel, 4 Februari 2018"
 
 #: i2p2www/pages/site/about/media.html:137
 #, python-format
@@ -555,12 +573,7 @@ msgid ""
 "(Youtube Video)\n"
 "This guide will show you how to install I2P in Windows XP.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2p Windows Tutorial</a>\n"
-"(Youtube Video)\n"
-"Panduan ini akan menunjukkan kepada anda tentang cara menginstal I2P di "
-"Windows XP.\n"
-"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2p Windows Tutorial</a>\n(Youtube Video)\nPanduan ini akan menunjukkan kepada anda tentang cara menginstal I2P di Windows XP.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:155
 #, python-format
@@ -569,11 +582,7 @@ msgid ""
 "(Youtube Video)\n"
 "This will guide you through how to install I2P on a Debian Linux System.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2p Debian Tutorial</a>\n"
-"(Youtube Video)\n"
-"Ini akan memandu anda dalam menginstal I2P pada sistem Debian Linux.\n"
-"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2p Debian Tutorial</a>\n(Youtube Video)\nIni akan memandu anda dalam menginstal I2P pada sistem Debian Linux.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:162
 #, python-format
@@ -582,56 +591,33 @@ msgid ""
 "(Youtube Video)\n"
 "How to set up an anonymous web site in I2P.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Cara membuat situs anonim dalam I2P</a>\n"
-"(Youtube Video)\n"
-"Cara membuat sebuah situs web yang anonim di I2P.\n"
-"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Cara membuat situs anonim dalam I2P</a>\n(Youtube Video)\nCara membuat sebuah situs web yang anonim di I2P.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:169
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
-"(Youtube Video)\n"
-"Sebuah tutorial mengenai cara menjalankan i2p pada Mac OS X dan cara "
-"untuk terhubung ke irc.telecomix.i2p.\n"
-"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n(Youtube Video)\nSebuah tutorial mengenai cara menjalankan i2p pada Mac OS X dan cara untuk terhubung ke irc.telecomix.i2p.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Felix Atari menjelaskan prinsip-prinsip dasar "
-"I2P</a>\n"
-"(Youtube Video)\n"
-"Agen Felix Atari dari Telecomix Crypto Munitions Bureau.\n"
-"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Felix Atari menjelaskan prinsip-prinsip dasar I2P</a>\n(Youtube Video)\nAgen Felix Atari dari Telecomix Crypto Munitions Bureau.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
-msgstr ""
-"<a href=\"%(link)s\">Cara untuk mendapatkan I2P, Darknet P2P anonim "
-"(menginstal Windows)</a>\n"
-"(Youtube Video)\n"
-"Tutorial ini menunjukkan cara menginstal dan mengkonfigurasi perangkat "
-"lunak yang diperlukan untuk mengakses I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
+msgstr "<a href=\"%(link)s\">Cara untuk mendapatkan I2P, Darknet P2P anonim (menginstal Windows)</a>\n(Youtube Video)\nTutorial ini menunjukkan cara menginstal dan mengkonfigurasi perangkat lunak yang diperlukan untuk mengakses I2P."
 
 #: i2p2www/pages/site/about/media.html:189
 #, python-format
@@ -639,10 +625,7 @@ msgid ""
 "<a href=\"%(link)s\">How to connect to I2P</a>\n"
 "(Youtube Video)\n"
 "How to install I2P on Ubuntu."
-msgstr ""
-"<a href=\"%(link)s\">Cara mengakses I2P</a>\n"
-"(Youtube Video)\n"
-"Cara Instal I2P pada Ubuntu."
+msgstr "<a href=\"%(link)s\">Cara mengakses I2P</a>\n(Youtube Video)\nCara Instal I2P pada Ubuntu."
 
 #: i2p2www/pages/site/about/media.html:195
 #, python-format
@@ -651,12 +634,7 @@ msgid ""
 "(Video)\n"
 "Adrian Crenshaw.\n"
 "January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Cara menginstal perangkat lunak darknet I2P di "
-"Linux</a>\n"
-"(Video)\n"
-"Adrian Crenshaw.\n"
-"Januari 2011"
+msgstr "<a href=\"%(link)s\">Cara menginstal perangkat lunak darknet I2P di Linux</a>\n(Video)\nAdrian Crenshaw.\nJanuari 2011"
 
 #: i2p2www/pages/site/about/media.html:202
 #, python-format
@@ -664,10 +642,7 @@ msgid ""
 "<a href=\"%(link)s\">Short garlic routing animation</a>\n"
 "(Youtube Video)\n"
 "Adrian Crenshaw.\n"
-msgstr ""
-"<a href=\"%(link)s\">animasi singkat garlic routing</a>\n"
-"(Youtube Video)\n"
-"Adrian Crenshaw.\n"
+msgstr "<a href=\"%(link)s\">animasi singkat garlic routing</a>\n(Youtube Video)\nAdrian Crenshaw.\n"
 
 #: i2p2www/pages/site/about/media.html:210
 msgid "Articles and Interviews"
@@ -680,10 +655,7 @@ msgid ""
 "<a href=\"%(link1)s\">Part 1</a>\n"
 "<a href=\"%(link2)s\">Part 2</a>\n"
 "July 26, 2002."
-msgstr ""
-"Lance James (0x90) yang diwawancarai oleh DistributedCity <a "
-"href=\"%(link1)s\">Bagian 1</a>\n"
-"<a href=\"%(link2)s\">Bagian 2</a> 26 Juli 2002."
+msgstr "Lance James (0x90) yang diwawancarai oleh DistributedCity <a href=\"%(link1)s\">Bagian 1</a>\n<a href=\"%(link2)s\">Bagian 2</a> 26 Juli 2002."
 
 #: i2p2www/pages/site/about/media.html:221
 #, python-format
@@ -692,34 +664,22 @@ msgid ""
 "(original in Spanish)\n"
 "<a href=\"%(link)s\">English translation</a>\n"
 "October 31, 2002."
-msgstr ""
-"Lance James (0x90) diwawancarai oleh El País (aslinya dalam bahasa "
-"Spanyol) <a href=\"%(link)s\">terjemahan bahasa Inggris</a> 31 Oktober "
-"2002."
+msgstr "Lance James (0x90) diwawancarai oleh El País (aslinya dalam bahasa Spanyol) <a href=\"%(link)s\">terjemahan bahasa Inggris</a> 31 Oktober 2002."
 
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
-msgstr ""
-"<a href=\"%(link)s\">2003 business Week artikel membahas invisiblenet</a>"
-"\n"
-"14 September 2003."
+msgstr "<a href=\"%(link)s\">2003 business Week artikel membahas invisiblenet</a>\n14 September 2003."
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
-msgstr ""
-"<a href=\"%(link)s\">artikel di Netzwelt.de  tentang menjadi anonim di "
-"Internet</a>\n"
-"(bahasa Jerman)\n"
-"November 2007."
+msgstr "<a href=\"%(link)s\">artikel di Netzwelt.de  tentang menjadi anonim di Internet</a>\n(bahasa Jerman)\nNovember 2007."
 
 #: i2p2www/pages/site/about/media.html:239
 #, python-format
@@ -727,24 +687,15 @@ msgid ""
 "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n"
 "March 2009\n"
 "<a href=\"%(german)s\">German translation</a>"
-msgstr ""
-"<a href=\"%(link)s\">Zzz diwawancarai oleh gulli.com</a>\n"
-"Maret 2009 <a href=\"%(german)s\">terjemahan bahasa Jerman</a>"
+msgstr "<a href=\"%(link)s\">Zzz diwawancarai oleh gulli.com</a>\nMaret 2009 <a href=\"%(german)s\">terjemahan bahasa Jerman</a>"
 
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">ZZZ diwawancarai InfoSec Daily Podcast Ep.</a> 454 "
-"(mp3) 18 Agustus 2011 (link tidak aktif, di-seed di dalam I2P di <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">ZZZ diwawancarai InfoSec Daily Podcast Ep.</a> 454 (mp3) 18 Agustus 2011 (link tidak aktif, di-seed di dalam I2P di <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 
 #: i2p2www/pages/site/about/media.html:252
 #, python-format
@@ -752,51 +703,34 @@ msgid ""
 "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n"
 "Jonathan Cox,\n"
 "November 11, 2011."
-msgstr ""
-"<a href=\"%(link)s\">I2P - anonimitas untuk masyarakat luas</a>, Jonathan"
-" Cox, 11 November 2011."
+msgstr "<a href=\"%(link)s\">I2P - anonimitas untuk masyarakat luas</a>, Jonathan Cox, 11 November 2011."
 
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">ZZZ dan Lance James diwawancarai InfoSec Daily "
-"Podcast Ep.</a> 596 (mp3) 16 Februari 2012 (link tidak aktif, di-seed di "
-"dalam I2P di <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">ZZZ dan Lance James diwawancarai InfoSec Daily Podcast Ep.</a> 596 (mp3) 16 Februari 2012 (link tidak aktif, di-seed di dalam I2P di <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff dan Str4d diwawancarai di Brakeing Down Security"
-" Podcast Ep.</a> 2015-010 (mp3) bagian 1, 28 Februari 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff dan Str4d diwawancarai di Brakeing Down Security Podcast Ep.</a> 2015-010 (mp3) bagian 1, 28 Februari 2015"
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff dan Str4d diwawancarai di Brakeing Down Security"
-" Podcast Ep.</a> 2015-011 (mp3) bagian 2, 6 Maret 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff dan Str4d diwawancarai di Brakeing Down Security Podcast Ep.</a> 2015-011 (mp3) bagian 2, 6 Maret 2015"
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -805,16 +739,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -826,18 +758,62 @@ msgstr "Lainnya"
 msgid ""
 "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n"
 "February 14, 2014"
-msgstr ""
-"I2p disebut di dalam Netflix's \"House of Cards\" Season 2 Episode 2, 14 "
-"Februari 2014"
+msgstr "I2p disebut di dalam Netflix's \"House of Cards\" Season 2 Episode 2, 14 Februari 2014"
 
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -846,18 +822,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -868,84 +841,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -956,8 +906,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -965,27 +914,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -993,26 +938,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -1023,10 +959,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -1034,18 +968,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -1056,17 +987,11 @@ msgstr "Anggota Proyek i2p"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
-msgstr ""
-"Kami adalah sekelompok kecil orang yang tersebar di beberapa benua, "
-"bekerja untuk memajukan aspek yang berbeda dari proyek dan membahas "
-"rancangan jaringan.\n"
-"<a href=\"%(volunteer)s\">Ikut terlibat!</a>"
+msgstr "Kami adalah sekelompok kecil orang yang tersebar di beberapa benua, bekerja untuk memajukan aspek yang berbeda dari proyek dan membahas rancangan jaringan.\n<a href=\"%(volunteer)s\">Ikut terlibat!</a>"
 
 #: i2p2www/pages/site/about/team.html:14
 msgid "Admin"
@@ -1228,16 +1153,15 @@ msgstr "User Advocate "
 
 #: i2p2www/pages/site/about/team.html:112
 msgid "gather, prioritize, advocate for user needs"
-msgstr ""
-"mengumpulkan, memprioritaskan, dan melakukan advokasi untuk kebutuhan "
-"pengguna"
+msgstr "mengumpulkan, memprioritaskan, dan melakukan advokasi untuk kebutuhan pengguna"
 
 #: i2p2www/pages/site/about/team.html:115
 msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1396,9 +1320,7 @@ msgstr "Debian/Ubuntu Packager and PPA maintainer "
 
 #: i2p2www/pages/site/about/team.html:232
 msgid "Routerconsole backend and UI work, website revamp, unit tests work"
-msgstr ""
-"Router console backend dan pekerjaan UI, perombakan situs web, pekerjaan "
-"tes unit"
+msgstr "Router console backend dan pekerjaan UI, perombakan situs web, pekerjaan tes unit"
 
 #: i2p2www/pages/site/about/team.html:237
 msgid "Help needed on many fronts!"
@@ -1479,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "pengembangan jbigi, migrasi wiki, pembersihan doc"
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr "Debugging java dan pengembangan client di I2PTunnel dan router console"
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1529,51 +1452,27 @@ msgstr "&hellip; dan banyak lagi"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
-msgstr ""
-"I2PCon 2015 adalah acara pertama. Ini mempunyai dua tujuan jangka pendek."
-"\n"
-"Pertama, untuk menyediakan masyarakat umum dengan suatu peristiwa yang "
-"mana pengetahuan tentang privasi dapat diperoleh.\n"
-"Kedua, untuk memajukan proyek I2P dan komunitasnya dengan diskusi teknis"
-"  tentang kriptografi, anonimitas dan topik I2P-sentris."
+msgstr "I2PCon 2015 adalah acara pertama. Ini mempunyai dua tujuan jangka pendek.\nPertama, untuk menyediakan masyarakat umum dengan suatu peristiwa yang mana pengetahuan tentang privasi dapat diperoleh.\nKedua, untuk memajukan proyek I2P dan komunitasnya dengan diskusi teknis  tentang kriptografi, anonimitas dan topik I2P-sentris."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
-msgstr ""
-"Tujuan yang lebih besar dan lebih jangka panjang dari acara ini adalah "
-"untuk membangun sebuah keberlangsungan dari individu yang sadar privasi. "
-"Dengan menghubungkan orang-orang yang menyadari pentingnya privasi, kami "
-"ingin menyediakan forum di mana komunitas ini dapat berkembang."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
+msgstr "Tujuan yang lebih besar dan lebih jangka panjang dari acara ini adalah untuk membangun sebuah keberlangsungan dari individu yang sadar privasi. Dengan menghubungkan orang-orang yang menyadari pentingnya privasi, kami ingin menyediakan forum di mana komunitas ini dapat berkembang."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
-msgstr ""
-"Ide untuk acara ini adalah pertama dilahirkan  oleh teman-teman kita yang"
-" luar biasa di <a href=\"https://torontocrypto.org/\">Toronto Crypto</a>."
-"\n"
-"Tempat disediakan oleh <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
-"Pemasaran ini dipelopori oleh <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> dan Siew.\n"
-"Tanpa mereka acara ini akan tidak mungkin dilaksanakan."
+msgstr "Ide untuk acara ini adalah pertama dilahirkan  oleh teman-teman kita yang luar biasa di <a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nTempat disediakan oleh <a href=\"https://hacklab.to/\">Hacklab.to</a>.\nPemasaran ini dipelopori oleh <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> dan Siew.\nTanpa mereka acara ini akan tidak mungkin dilaksanakan."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:32
 msgid "Slides and Video"
@@ -1589,8 +1488,8 @@ msgstr "Catatan: Tautan video akan diposkan saat tersedia."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1625,22 +1524,13 @@ msgstr "Pembicara"
 msgid ""
 "Colin Mahns has a strong interest in the use of anonymity and encryption "
 "technology to help preserve human rights in the digital age."
-msgstr ""
-"Colin Mahns memiliki minat yang kuat dalam penggunaan teknologi "
-"anonimitas dan enkripsi untuk membantu melestarikan hak asasi manusia di "
-"era digital."
+msgstr "Colin Mahns memiliki minat yang kuat dalam penggunaan teknologi anonimitas dan enkripsi untuk membantu melestarikan hak asasi manusia di era digital."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
-msgstr ""
-"David Dagon adalah peneliti postdoc di Georgia Tech yang berfokus pada "
-"botnet, malware, keamanan jaringan, dan DNS.\n"
-"Minatnya I2P berpusat pada menjaga privasi pengguna, penyaringan otonom, "
-"dan anti-pelecehan."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
+msgstr "David Dagon adalah peneliti postdoc di Georgia Tech yang berfokus pada botnet, malware, keamanan jaringan, dan DNS.\nMinatnya I2P berpusat pada menjaga privasi pengguna, penyaringan otonom, dan anti-pelecehan."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
 #: i2p2www/pages/site/about/i2pcon/2015.html:105
@@ -1653,25 +1543,12 @@ msgstr "J adalah kepala Toronto Crypto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
-msgstr ""
-"Lance James adalah pendiri dari Invisibile IRC Project, pendahulu I2P, "
-"pada tahun 2002.\n"
-"Dia mendirikan perusahaan intelijen cyber pada tahun 2003.\n"
-"Dia sudah terfokus pada keamanan jaringan, penelitian malware dan "
-"keamanan informasi sejak.\n"
-"Selama 2011-2013, ia adalah Direktur intelijen ancaman untuk The "
-"Vigilant, yang diakuisisi oleh Deloitte pada tahun 2013.\n"
-"Ia baru saja meninggalkan Deloitte untuk melakukan konsultasi melalui "
-"perusahaannya: The James Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
+msgstr "Lance James adalah pendiri dari Invisibile IRC Project, pendahulu I2P, pada tahun 2002.\nDia mendirikan perusahaan intelijen cyber pada tahun 2003.\nDia sudah terfokus pada keamanan jaringan, penelitian malware dan keamanan informasi sejak.\nSelama 2011-2013, ia adalah Direktur intelijen ancaman untuk The Vigilant, yang diakuisisi oleh Deloitte pada tahun 2013.\nIa baru saja meninggalkan Deloitte untuk melakukan konsultasi melalui perusahaannya: The James Group."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
 msgid "Nicholas D. is a member of Hacklab Toronto."
@@ -1679,20 +1556,11 @@ msgstr "Nicholas D. adalah anggota Hacklab Toronto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
-msgstr ""
-"Nicholas Johnston adalah profesor informasi keamanan di Sheridan "
-"College's School of Applied Computing di program sarjana S1 InfoSec.\n"
-"Karier profesional sebelumnya adalah digital forensik dan investigasi.\n"
-"Dia juga adalah kontraktor yang berspesialisasi di respon kejadian\n"
-"Daerah penelitiannya termasuk analisis data dan pengembangan perangkat "
-"lunak yang aman."
+msgstr "Nicholas Johnston adalah profesor informasi keamanan di Sheridan College's School of Applied Computing di program sarjana S1 InfoSec.\nKarier profesional sebelumnya adalah digital forensik dan investigasi.\nDia juga adalah kontraktor yang berspesialisasi di respon kejadian\nDaerah penelitiannya termasuk analisis data dan pengembangan perangkat lunak yang aman."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:124
 msgid "Psi is an I2P developer."
@@ -1744,14 +1612,9 @@ msgstr "Hari 2"
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
-msgstr ""
-"Konferensi pertama didedikasikan untuk I2P diadakan di Toronto pada 15-16"
-" Agustus 2015.\n"
-"Lihat link di bawah untuk informasi lebih lanjut dan link ke slide dan "
-"video."
+msgstr "Konferensi pertama didedikasikan untuk I2P diadakan di Toronto pada 15-16 Agustus 2015.\nLihat link di bawah untuk informasi lebih lanjut dan link ke slide dan video."
 
 #: i2p2www/pages/site/about/i2pcon/index.html:9
 msgid "Past years"
@@ -1767,23 +1630,13 @@ msgstr "Agustus 2010"
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
-msgstr ""
-"Ada beberapa teknik utama yang dapat dilakukan untuk meningkatkan kinerja"
-" I2P - seperti yang terkait dengan CPU, yang terkait bandwidth, dan yang "
-"terkait protokol.  Namun, semua dimensi tersebut mempengaruhi latensi, "
-"throughput, dan kinerja jaringan yang dirasakan, karena mengurangi "
-"pertengkaran sumber daya yang langka.  Daftar ini tentu tidak "
-"komprehensif, tapi sudah mencakup hal-hal yang utama."
+msgstr "Ada beberapa teknik utama yang dapat dilakukan untuk meningkatkan kinerja I2P - seperti yang terkait dengan CPU, yang terkait bandwidth, dan yang terkait protokol.  Namun, semua dimensi tersebut mempengaruhi latensi, throughput, dan kinerja jaringan yang dirasakan, karena mengurangi pertengkaran sumber daya yang langka.  Daftar ini tentu tidak komprehensif, tapi sudah mencakup hal-hal yang utama."
 
 #: i2p2www/pages/site/about/performance/future.html:15
 #: i2p2www/pages/site/about/performance/index.html:106
@@ -1791,9 +1644,7 @@ msgstr ""
 msgid ""
 "For past performance improvements see the <a href=\"%(history)s\">\n"
 "Performance History</a>."
-msgstr ""
-"Untuk perbaikan kinerja masa lalu, lihat <a href=\"%(history)s\">Riwayat "
-"kinerja</a>."
+msgstr "Untuk perbaikan kinerja masa lalu, lihat <a href=\"%(history)s\">Riwayat kinerja</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:20
 msgid "Better peer profiling and selection"
@@ -1802,24 +1653,13 @@ msgstr "Pembuatan profil dan seleksi peer yang lebih baik"
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
-msgstr ""
-"Mungkin salah satu bagian yang paling penting dari mendapatkan kinerja "
-"yang lebih cepat adalah meningkatkan cara router memilih peer yang di "
-"mana mereka membangun tunnel - memastikan mereka tidak menggunakan peer "
-"dengan link lambat atau peer dengan link cepat yang kelebihan beban, dll."
-"  Selain itu, kita harus memastikan bahwa kami tidak membuka diri "
-"terhadap serangan <a href=\"%(sybilpdf)s\">Sybil</a> dari musuh yang kuat"
-" dengan banyak komputer yang cepat."
+msgstr "Mungkin salah satu bagian yang paling penting dari mendapatkan kinerja yang lebih cepat adalah meningkatkan cara router memilih peer yang di mana mereka membangun tunnel - memastikan mereka tidak menggunakan peer dengan link lambat atau peer dengan link cepat yang kelebihan beban, dll.  Selain itu, kita harus memastikan bahwa kami tidak membuka diri terhadap serangan <a href=\"%(sybilpdf)s\">Sybil</a> dari musuh yang kuat dengan banyak komputer yang cepat."
 
 #: i2p2www/pages/site/about/performance/future.html:30
 msgid "Network database tuning"
@@ -1827,32 +1667,15 @@ msgstr "Network database tuning "
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
-msgstr ""
-"Kita akan ingin untuk menjadi lebih efisien dengan algoritma penyembuhan "
-"database dan pemeliharaan - daripada terus-menerus menjelajahi keyspace "
-"untuk peer baru - menyebabkan sejumlah besar pesan jaringan dan beban "
-"router - kita dapat memperlambat atau bahkan berhenti menjelajahi sampai "
-"mendeteksi yang ada sesuatu yang baru yang bernilai (misalnya decay dari "
-"tingkat eksplorasi berdasarkan terakhir kali seseorang memberi kami "
-"rujukan kepada seseorang yang kami belum pernah dengar).  Kita juga dapat"
-" melakukan beberapa tuning pada apa benar-benar kita kirimkan - berapa "
-"banyak peer yang bounce back (atau bahkan jika kita bounce back balasan),"
-" serta seberapa banyak kita melakukan pencarian simultan."
+msgstr "Kita akan ingin untuk menjadi lebih efisien dengan algoritma penyembuhan database dan pemeliharaan - daripada terus-menerus menjelajahi keyspace untuk peer baru - menyebabkan sejumlah besar pesan jaringan dan beban router - kita dapat memperlambat atau bahkan berhenti menjelajahi sampai mendeteksi yang ada sesuatu yang baru yang bernilai (misalnya decay dari tingkat eksplorasi berdasarkan terakhir kali seseorang memberi kami rujukan kepada seseorang yang kami belum pernah dengar).  Kita juga dapat melakukan beberapa tuning pada apa benar-benar kita kirimkan - berapa banyak peer yang bounce back (atau bahkan jika kita bounce back balasan), serta seberapa banyak kita melakukan pencarian simultan."
 
 #: i2p2www/pages/site/about/performance/future.html:42
 msgid "Session Tag Tuning and Improvements"
@@ -1861,47 +1684,24 @@ msgstr "Session Tag Tuning and Penyempurnaan"
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
-msgstr ""
-"Cara  <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a> algoritma"
-" bekerja adalah dengan mengelola serangkaian 32 byte array acak satu-"
-"kali-digunakan, dan hal itu menjadi kadaluarsa jika tidak digunakan "
-"dengan cukup cepat.  Jika kita mengakhiri mereka terlalu cepat, kita "
-"dipaksa untuk kembali kepada enkripsi ElGamal penuh (mahal), tapi jika "
-"kita tidak membuat mereka kedaluwarsa dengan cukup cepat, kita harus "
-"mengurangi jumlah mereka sehingga kita tidak kehabisan memori (dan jika "
-"penerima entah bagaimana rusak dan kehilangan beberapa tag, bahkan lebih "
-"banyak kegagalan enkripsi mungkin terjadi sebelum deteksi).  Dengan "
-"deteksi lebih aktif dan umpan balik yang didorong algoritma, kita bisa "
-"dengan aman dan lebih efisien mengelola masa waktu tag, menggantikan "
-"enkripsi ElGamal dengan operasi trivial AES ."
+msgstr "Cara  <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a> algoritma bekerja adalah dengan mengelola serangkaian 32 byte array acak satu-kali-digunakan, dan hal itu menjadi kadaluarsa jika tidak digunakan dengan cukup cepat.  Jika kita mengakhiri mereka terlalu cepat, kita dipaksa untuk kembali kepada enkripsi ElGamal penuh (mahal), tapi jika kita tidak membuat mereka kedaluwarsa dengan cukup cepat, kita harus mengurangi jumlah mereka sehingga kita tidak kehabisan memori (dan jika penerima entah bagaimana rusak dan kehilangan beberapa tag, bahkan lebih banyak kegagalan enkripsi mungkin terjadi sebelum deteksi).  Dengan deteksi lebih aktif dan umpan balik yang didorong algoritma, kita bisa dengan aman dan lebih efisien mengelola masa waktu tag, menggantikan enkripsi ElGamal dengan operasi trivial AES ."
 
 #: i2p2www/pages/site/about/performance/future.html:55
 #, python-format
 msgid ""
 "Additional ideas for improving Session Tag delivery are described on the\n"
 "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>."
-msgstr ""
-"Ide-ide tambahan untuk meningkatkan pengiriman sesi Tag dijelaskan pada "
-"<a href=\"%(elgamalaes)s#future\">ElGamal / AES + SessionTag halaman</a>."
+msgstr "Ide-ide tambahan untuk meningkatkan pengiriman sesi Tag dijelaskan pada <a href=\"%(elgamalaes)s#future\">ElGamal / AES + SessionTag halaman</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:61
 msgid "Migrate sessionTag to synchronized PRNG"
@@ -1912,60 +1712,29 @@ msgstr "Memigrasi sessionTag ke PRNG tersinkronisasi"
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
-msgstr ""
-"Sekarang, algoritma <a href=\"%(elgamalaes)s\">ElGamal / AES + "
-"SessionTag</a> bekerja dengan tagging setiap pesan terenkripsi dengan "
-"unique random 32 byte (\"session tag\"), yang mengidentifikasi bahwa "
-"pesan dienkripsi dengan session key AES terkait. Hal ini mencegah peer "
-"dari membedakan pesan-pesan yang merupakan bagian dari sesi yang sama "
-"karena setiap pesan memiliki tag acak yang benar-benar baru. Untuk "
-"mencapai hal ini, setiap beberapa pesan menggabungkan keseluruhan tag "
-"sesi baru dalam pesan terenkripsi itu sendiri, secara transparan "
-"memberikan cara untuk mengidentifikasi pesan di masa mendatang. Kami "
-"kemudian harus melacak pesan yang berhasil dikirim sehingga kami tahu tag"
-" apa yang dapat digunakan."
+msgstr "Sekarang, algoritma <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a> bekerja dengan tagging setiap pesan terenkripsi dengan unique random 32 byte (\"session tag\"), yang mengidentifikasi bahwa pesan dienkripsi dengan session key AES terkait. Hal ini mencegah peer dari membedakan pesan-pesan yang merupakan bagian dari sesi yang sama karena setiap pesan memiliki tag acak yang benar-benar baru. Untuk mencapai hal ini, setiap beberapa pesan menggabungkan keseluruhan tag sesi baru dalam pesan terenkripsi itu sendiri, secara transparan memberikan cara untuk mengidentifikasi pesan di masa mendatang. Kami kemudian harus melacak pesan yang berhasil dikirim sehingga kami tahu tag apa yang dapat digunakan."
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
 "to handle out of order delivery)."
-msgstr ""
-"Ini bekerja dengan baik dan cukup berguna, namun ini tidak efisien dalam "
-"penggunaan bandwidth, karena memerlukan pengiriman tag terlebih dahulu "
-"(dan tidak semua tag mungkin diperlukan, atau beberapa mungkin terbuang "
-"akibat mereka menjadi kadaluarsa). Rata-rata, predelivering tag sesi "
-"memiliki biaya 32 byte per pesan (ukuran tagnya). Seperti yang disarankan"
-" oleh Taral, ukuran sebesar itu dapat dihindari dengan mengganti "
-"pengiriman tag dengan sebuah PRNG disinkronisasi - ketika sesi baru "
-"dimulai (melalui blok dienkripsi oleh ElGamal), kedua belah pihak seed "
-"sebuah PRNG untuk digunakan dan menghasilkan session tag on demand "
-"(dengan penerima precalculating berikutnya beberapa nilai yang mungkin "
-"untuk menangani pengiriman)."
+msgstr "Ini bekerja dengan baik dan cukup berguna, namun ini tidak efisien dalam penggunaan bandwidth, karena memerlukan pengiriman tag terlebih dahulu (dan tidak semua tag mungkin diperlukan, atau beberapa mungkin terbuang akibat mereka menjadi kadaluarsa). Rata-rata, predelivering tag sesi memiliki biaya 32 byte per pesan (ukuran tagnya). Seperti yang disarankan oleh Taral, ukuran sebesar itu dapat dihindari dengan mengganti pengiriman tag dengan sebuah PRNG disinkronisasi - ketika sesi baru dimulai (melalui blok dienkripsi oleh ElGamal), kedua belah pihak seed sebuah PRNG untuk digunakan dan menghasilkan session tag on demand (dengan penerima precalculating berikutnya beberapa nilai yang mungkin untuk menangani pengiriman)."
 
 #: i2p2www/pages/site/about/performance/future.html:87
 msgid "Longer lasting tunnels"
@@ -1973,50 +1742,26 @@ msgstr "Tunnel yang bertahan lebih lama"
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
-msgstr ""
-"Durasi default tunnel saat ini 10 menit cukup arbritrary, meski \"terasa "
-"oke\".  Begitu kita mendapat tunnel healing code dan deteksi kegagalan "
-"yang lebih efektif, kita akan bisa lebih aman memvariasikan durasi, "
-"mengurangi beban jaringan dan CPU (karena penciptaan message tunnel yang "
-"mahal)."
+msgstr "Durasi default tunnel saat ini 10 menit cukup arbritrary, meski \"terasa oke\".  Begitu kita mendapat tunnel healing code dan deteksi kegagalan yang lebih efektif, kita akan bisa lebih aman memvariasikan durasi, mengurangi beban jaringan dan CPU (karena penciptaan message tunnel yang mahal)."
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
-msgstr ""
-"Ini tampaknya merupakan perbaikan yang mudah untuk beban tinggi pada "
-"router dengan bandwidth besar, namun kami sebaiknya tidak menggunakannya "
-"sampai kami telah menyempurnakan algoritma pengembangan tunnel lebih "
-"jauh.\n"
-"Namun, 10 menit umur tunnel adalah hardcoded di beberapa tempat, sehingga"
-" upaya substansial akan diperlukan untuk mengubah durasi.\n"
-"Juga, akan sulit untuk menjaga kompatibilitas dengan perubahan seperti "
-"itu."
+"Also, it would be difficult to maintain backward compatibility with such a change."
+msgstr "Ini tampaknya merupakan perbaikan yang mudah untuk beban tinggi pada router dengan bandwidth besar, namun kami sebaiknya tidak menggunakannya sampai kami telah menyempurnakan algoritma pengembangan tunnel lebih jauh.\nNamun, 10 menit umur tunnel adalah hardcoded di beberapa tempat, sehingga upaya substansial akan diperlukan untuk mengubah durasi.\nJuga, akan sulit untuk menjaga kompatibilitas dengan perubahan seperti itu."
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
-msgstr ""
-"Saat ini, karena rata-rata tingkat keberhasilan pembangunan jaringan "
-"tunnel cukup tinggi, tidak ada rencana saat ini untuk memperpanjang umur "
-"tunnel."
+msgstr "Saat ini, karena rata-rata tingkat keberhasilan pembangunan jaringan tunnel cukup tinggi, tidak ada rencana saat ini untuk memperpanjang umur tunnel."
 
 #: i2p2www/pages/site/about/performance/future.html:108
 msgid "Adjust the timeouts"
@@ -2024,44 +1769,22 @@ msgstr "Adjust the timeout"
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
-msgstr ""
-"Namun, hal lain yang cukup arbritrary namun \"rasanya oke\" yang kita "
-"dapatkan adalah timeout saat ini untuk berbagai aktivitas.  Mengapa kita "
-"memiliki timeout 60 detik untuk \"peer unreachable\"?  Mengapa kita "
-"mencoba mengirimkan sebuah pesan melalui tunnel yang berbeda yang "
-"diiklankan oleh LeaseSet setelah 10 detik?  Mengapa query database "
-"jaringan dibatasi oleh batas-batas 60 atau 20 detik?  Mengapa destinasi "
-"dikonfigurasi untuk meminta serangkaian tunnel baru setiap 10 menit?  "
-"Mengapa kita memperbolehkan 60 detik untuk peer untuk membalas permintaan"
-" kami bahwa mereka bergabung dengan sebuah tunnel?  Mengapa kita "
-"menganggap sebuah tunnel yang tidak lulus tes kami dalam waktu 60 detik "
-"dianggap \"mati\"?"
+msgstr "Namun, hal lain yang cukup arbritrary namun \"rasanya oke\" yang kita dapatkan adalah timeout saat ini untuk berbagai aktivitas.  Mengapa kita memiliki timeout 60 detik untuk \"peer unreachable\"?  Mengapa kita mencoba mengirimkan sebuah pesan melalui tunnel yang berbeda yang diiklankan oleh LeaseSet setelah 10 detik?  Mengapa query database jaringan dibatasi oleh batas-batas 60 atau 20 detik?  Mengapa destinasi dikonfigurasi untuk meminta serangkaian tunnel baru setiap 10 menit?  Mengapa kita memperbolehkan 60 detik untuk peer untuk membalas permintaan kami bahwa mereka bergabung dengan sebuah tunnel?  Mengapa kita menganggap sebuah tunnel yang tidak lulus tes kami dalam waktu 60 detik dianggap \"mati\"?"
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
-msgstr ""
-"Setiap dari imponderables tersebut dapat diatasi dengan kode lebih "
-"adaptif, serta tunable parameter untuk memungkinkan timbal balik lebih "
-"tepat antara bandwidth, latensi, dan penggunaan CPU."
+msgstr "Setiap dari imponderables tersebut dapat diatasi dengan kode lebih adaptif, serta tunable parameter untuk memungkinkan timbal balik lebih tepat antara bandwidth, latensi, dan penggunaan CPU."
 
 #: i2p2www/pages/site/about/performance/future.html:125
 msgid "Full streaming protocol improvements"
@@ -2071,48 +1794,33 @@ msgstr "Perbaikan protokol streaming penuh"
 msgid ""
 "Perhaps re-enable the interactive stream profile (the \n"
 "current implementation only uses the bulk stream profile)."
-msgstr ""
-"Mungkin kembali mengaktifkan profil stream interaktif (implementasi saat "
-"ini hanya menggunakan sebagian besar stream profile)."
+msgstr "Mungkin kembali mengaktifkan profil stream interaktif (implementasi saat ini hanya menggunakan sebagian besar stream profile)."
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
-msgstr ""
-"Pembatasan bandwidth di tingkat client (dalam salah satu atau kedua arah "
-"stream, atau mungkin dibagi di beberapa aliran). Ini akan menjadi "
-"tambahan untuk keseluruhan pembatasan bandwidth router, tentu saja."
+msgstr "Pembatasan bandwidth di tingkat client (dalam salah satu atau kedua arah stream, atau mungkin dibagi di beberapa aliran). Ini akan menjadi tambahan untuk keseluruhan pembatasan bandwidth router, tentu saja."
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
-msgstr ""
-"Daftar kontrol akses (hanya mengizinkan arus ke atau dari tujuan estinasi"
-" lainnya yang diketahui)."
+msgstr "Daftar kontrol akses (hanya mengizinkan arus ke atau dari tujuan estinasi lainnya yang diketahui)."
 
 #: i2p2www/pages/site/about/performance/future.html:147
 msgid ""
 "Web controls and monitoring the health of the various streams, as well \n"
 "as the ability to explicitly close or throttle them."
-msgstr ""
-"Kontrol web dan pemantauan kesehatan berbagai aliran, serta kemampuan "
-"untuk secara eksplisit menutup atau meningkatkannya."
+msgstr "Kontrol web dan pemantauan kesehatan berbagai aliran, serta kemampuan untuk secara eksplisit menutup atau meningkatkannya."
 
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
-msgstr ""
-"Ide-ide tambahan untuk meningkatkan streaming library dijelaskan pada <a "
-"href=\"%(streaming)s#future\">halaman streaming library</a>."
+msgstr "Ide-ide tambahan untuk meningkatkan streaming library dijelaskan pada <a href=\"%(streaming)s#future\">halaman streaming library</a>."
 
 #: i2p2www/pages/site/about/performance/history.html:2
 msgid "Performance History"
@@ -2121,17 +1829,10 @@ msgstr "Riwayat kinerja"
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
-msgstr ""
-"Peningkatan kinerja yang baik adalah menggunakan teknik yang di bawah "
-"ini.\n"
-"Ada lebih banyak hal yang harus dilakukan, lihat halaman <a "
-"href=\"%(performance)s\">kinerja</a> untuk isu-isu dan pemikiran saat "
-"ini."
+msgstr "Peningkatan kinerja yang baik adalah menggunakan teknik yang di bawah ini.\nAda lebih banyak hal yang harus dilakukan, lihat halaman <a href=\"%(performance)s\">kinerja</a> untuk isu-isu dan pemikiran saat ini."
 
 #: i2p2www/pages/site/about/performance/history.html:10
 msgid "Native math"
@@ -2148,47 +1849,25 @@ msgstr "diimplementasikan"
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
-msgstr ""
-"Ketika saya terakhir memprofilkan kode I2P, sebagian besar waktu "
-"dihabiskan dalam satu fungsi: java.math.BigInteger's <a "
-"href=\"%(modpow)s\">modPow</a>.\n"
-"Alih-alih mencoba menyesuaikan metode ini, kita akan memanggil <a "
-"href=\"%(gmp)s\">GNU MP</a> - sebuah library matematika yang sangat cepat"
-" (dengan assembler yang disetel untuk banyak arsitektur). (<i>Editor: "
-"Lihat <a href=\"%(jbigi)s\">NativeBigInteger untuk kriptografi public key"
-" lebih cepat </a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
+msgstr "Ketika saya terakhir memprofilkan kode I2P, sebagian besar waktu dihabiskan dalam satu fungsi: java.math.BigInteger's <a href=\"%(modpow)s\">modPow</a>.\nAlih-alih mencoba menyesuaikan metode ini, kita akan memanggil <a href=\"%(gmp)s\">GNU MP</a> - sebuah library matematika yang sangat cepat (dengan assembler yang disetel untuk banyak arsitektur). (<i>Editor: Lihat <a href=\"%(jbigi)s\">NativeBigInteger untuk kriptografi public key lebih cepat </a></i>)"
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
-msgstr ""
-"\n"
-"ugha dan duck sedang mengerjakan kode C/JNI glue, dan kode Java yang ada "
-"sudah diterapkan dengan hook untuk itu kapanpun itu siap.  Hasil awal "
-"terlihat fantastis - menjalankan router dengan modPow GMP asli "
-"menyediakan lebih dari 800 &#37; speedup dalam kinerja enkripsi, dan "
-"beban sudah terpotong setengah.  Ini hanya pada komputer yang digunakan "
-"oleh satu pengguna, dan semuanya tidak siap untuk dipaket dan dipasang."
+msgstr "\nugha dan duck sedang mengerjakan kode C/JNI glue, dan kode Java yang ada sudah diterapkan dengan hook untuk itu kapanpun itu siap.  Hasil awal terlihat fantastis - menjalankan router dengan modPow GMP asli menyediakan lebih dari 800 &#37; speedup dalam kinerja enkripsi, dan beban sudah terpotong setengah.  Ini hanya pada komputer yang digunakan oleh satu pengguna, dan semuanya tidak siap untuk dipaket dan dipasang."
 
 #: i2p2www/pages/site/about/performance/history.html:32
 msgid "Garlic wrapping a \"reply\" LeaseSet"
@@ -2200,86 +1879,42 @@ msgstr "Diimplementasi namun memerlukan penyempurnaan"
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
-msgstr ""
-"Tweak algoritma ini hanya akan relevan untuk aplikasi yang ingin peer "
-"membalas kepada mereka (meskipun yang meliputi segala sesuatu yang "
-"menggunakan I2PTunnel atau mihi's ministreaming lib):"
+msgstr "Tweak algoritma ini hanya akan relevan untuk aplikasi yang ingin peer membalas kepada mereka (meskipun yang meliputi segala sesuatu yang menggunakan I2PTunnel atau mihi's ministreaming lib):"
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
-msgstr ""
-"Sebelumnya, ketika Alice mengirim pesan kepada Bob, ketika Bob membalas, "
-"Bob harus melakukan lookup dalam database jaringan - mengirimkan beberapa"
-" permintaan untuk mendapatkan LeaseSet milik Alice saat ini.  Jika Bob "
-"sudah memiliki Alice LeaseSet saat ini, ia hanya dapat mengirim balasan "
-"nya segera - ini (sebagian) penyebab biasanya dibutuhkan waktu sedikit "
-"lebih lama untuk berbicara dengan seseorang saat pertama kalinya nda "
-"terhubung, tetapi berikutnya komunikasi dapat lebih cepat.  Saat ini - "
-"untuk semua klien - kami membungkus pengirim LeaseSet saat ini dalam "
-"garlic yang akan dikirim kepada penerima, sehingga ketika mereka "
-"memberikan balasan, mereka akan <i>selalu</i> memiliki LeaseSet yang "
-"tersimpan secara lokal - yang benar-benar menghilangkan kebutuhan untuk "
-"sebuah jaringan database lookup balasan.\n"
-"Ini trade off dari sebagian besar bandwidth pengirim untuk balasan yang "
-"lebih cepat.\n"
-"Jika kita tidak melakukan ini cukup sering, penggunaan bandwidth jaringan"
-" secara keseluruhan akan menurun karena penerima tidak harus melakukan "
-"lookup jaringan database."
+msgstr "Sebelumnya, ketika Alice mengirim pesan kepada Bob, ketika Bob membalas, Bob harus melakukan lookup dalam database jaringan - mengirimkan beberapa permintaan untuk mendapatkan LeaseSet milik Alice saat ini.  Jika Bob sudah memiliki Alice LeaseSet saat ini, ia hanya dapat mengirim balasan nya segera - ini (sebagian) penyebab biasanya dibutuhkan waktu sedikit lebih lama untuk berbicara dengan seseorang saat pertama kalinya nda terhubung, tetapi berikutnya komunikasi dapat lebih cepat.  Saat ini - untuk semua klien - kami membungkus pengirim LeaseSet saat ini dalam garlic yang akan dikirim kepada penerima, sehingga ketika mereka memberikan balasan, mereka akan <i>selalu</i> memiliki LeaseSet yang tersimpan secara lokal - yang benar-benar menghilangkan kebutuhan untuk sebuah jaringan database lookup balasan.\nIni trade off dari sebagian besar bandwidth pengirim untuk balasan yang lebih cepat.\nJika kita tidak melakukan ini cukup sering, penggunaan bandwidth jaringan secara keseluruhan akan menurun karena penerima tidak harus melakukan lookup jaringan database."
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
-msgstr ""
-"Untuk LeaseSets tidak diterbitkan seperti \"shared client\", ini adalah "
-"satu-satunya cara untuk mengirimkan LeaseSet kepada Bob. Sayangnya "
-"bundling ini setiap saat menambahkan hampir 100&#37; overhead untuk "
-"sambungan bandwidth tinggi, dan lebih untuk sambungan dengan pesan yang "
-"lebih kecil."
+msgstr "Untuk LeaseSets tidak diterbitkan seperti \"shared client\", ini adalah satu-satunya cara untuk mengirimkan LeaseSet kepada Bob. Sayangnya bundling ini setiap saat menambahkan hampir 100&#37; overhead untuk sambungan bandwidth tinggi, dan lebih untuk sambungan dengan pesan yang lebih kecil."
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
-msgstr ""
-"Perubahan yang dijadwalkan untuk rilis 0.6.2 akan mem-bundel LeaseSet "
-"hanya bila diperlukan, pada awal koneksi atau ketika perubahan LeaseSet."
-"\n"
-"Ini secara substansial akan mengurangi overhead total dari pesan di I2P."
+msgstr "Perubahan yang dijadwalkan untuk rilis 0.6.2 akan mem-bundel LeaseSet hanya bila diperlukan, pada awal koneksi atau ketika perubahan LeaseSet.\nIni secara substansial akan mengurangi overhead total dari pesan di I2P."
 
 #: i2p2www/pages/site/about/performance/history.html:66
 msgid "More efficient TCP rejection"
@@ -2288,35 +1923,16 @@ msgstr "Penokalan TCP yang lebih efisien"
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
-msgstr ""
-"Saat ini, semua koneksi TCP melakukan semua validasi peer mereka setelah "
-"melalui handshaking Diffie-Hellman (mahal) untuk menegosiasikan sesi "
-"private key.  Ini berarti bahwa jika clock seseorang benar-benar salah, "
-"atau NAT/firewall/etc dikonfigurasi secara tidak benar (atau mereka hanya"
-" menjalankan versi yang tidak kompatibel di router), mereka akan secara "
-"konsisten (meskipun tidak terus-menerus, karena daftar blokir) "
-"menyebabkan operasi kriptografi mahal yang sia-sia pada semua peer yang "
-"mereka ketahui.  Sementara kita akan ingin menyimpan beberapa "
-"verifikasi/validasi dalam batas enkripsi, pertama-tama kita akan ingin "
-"memperbarui protokol untuk melakukan beberapa hal, sehingga kita dapat "
-"menolak mereka secara bersih tanpa membuang-buang banyak CPU atau sumber "
-"daya lainnya."
+msgstr "Saat ini, semua koneksi TCP melakukan semua validasi peer mereka setelah melalui handshaking Diffie-Hellman (mahal) untuk menegosiasikan sesi private key.  Ini berarti bahwa jika clock seseorang benar-benar salah, atau NAT/firewall/etc dikonfigurasi secara tidak benar (atau mereka hanya menjalankan versi yang tidak kompatibel di router), mereka akan secara konsisten (meskipun tidak terus-menerus, karena daftar blokir) menyebabkan operasi kriptografi mahal yang sia-sia pada semua peer yang mereka ketahui.  Sementara kita akan ingin menyimpan beberapa verifikasi/validasi dalam batas enkripsi, pertama-tama kita akan ingin memperbarui protokol untuk melakukan beberapa hal, sehingga kita dapat menolak mereka secara bersih tanpa membuang-buang banyak CPU atau sumber daya lainnya."
 
 #: i2p2www/pages/site/about/performance/history.html:81
 msgid "Adjust the tunnel testing"
@@ -2324,26 +1940,13 @@ msgstr "Adjust the tunnel testing "
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
-msgstr ""
-"Alih-alih menggunakan skema yang cukup acak yang kita miliki sekarang, "
-"kita harus menggunakan algoritma yang lebih sadar konteks untuk menguji "
-"tunnel.  misalnya jika kita sudah tahu data yang lewat yang valid dengan "
-"benar, ada tidak perlu untuk menguji, sementara jika kita belum melihat "
-"data melalui itu baru-baru ini mungkin akan berguna untuk melemparkan "
-"beberapa data sambil jalan.  Ini akan mengurangi tunnel contention karena"
-" kelebihan pesan, serta meningkatkan kecepatan di mana kita mendeteksi - "
-"dan menyelesaikan - tunnel yang gagal."
+msgstr "Alih-alih menggunakan skema yang cukup acak yang kita miliki sekarang, kita harus menggunakan algoritma yang lebih sadar konteks untuk menguji tunnel.  misalnya jika kita sudah tahu data yang lewat yang valid dengan benar, ada tidak perlu untuk menguji, sementara jika kita belum melihat data melalui itu baru-baru ini mungkin akan berguna untuk melemparkan beberapa data sambil jalan.  Ini akan mengurangi tunnel contention karena kelebihan pesan, serta meningkatkan kecepatan di mana kita mendeteksi - dan menyelesaikan - tunnel yang gagal."
 
 #: i2p2www/pages/site/about/performance/history.html:92
 msgid "Persistent Tunnel / Lease Selection"
@@ -2351,26 +1954,17 @@ msgstr "Persistent Tunnel/Lease Selection"
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
-msgstr ""
-"Pemilihan outbound tunnel diterapkan di rilis 0.6.1.30, pemilihan inbound"
-" least diterapkan dalam rilis 0.6.2."
+msgstr "Pemilihan outbound tunnel diterapkan di rilis 0.6.1.30, pemilihan inbound least diterapkan dalam rilis 0.6.2."
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
-msgstr ""
-"Memilih tunnel dan lease secara acak untuk setiap pesan menciptakan "
-"insiden out-of-order pengiriman yang besar, yang mencegah streaming lib "
-"meningkatkan window size sebanyak mungkin. Dengan bertahan di pilihan "
-"sama untuk koneksi tertentu, kecepatan transfer menjadi jauh lebih cepat."
+msgstr "Memilih tunnel dan lease secara acak untuk setiap pesan menciptakan insiden out-of-order pengiriman yang besar, yang mencegah streaming lib meningkatkan window size sebanyak mungkin. Dengan bertahan di pilihan sama untuk koneksi tertentu, kecepatan transfer menjadi jauh lebih cepat."
 
 #: i2p2www/pages/site/about/performance/history.html:104
 msgid "Compress some data structures"
@@ -2378,32 +1972,15 @@ msgstr "Memampatkan beberapa struktur data"
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
-msgstr ""
-"Pesan I2NP dan data yang mereka kandung sudah didefinisikan dalam "
-"struktur cukup padat, meskipun satu atribut RouterInfo struktur tidak "
-"padat - \"option\" adalah nama plain ASCII = value mapping.  Sekarang, "
-"kami sedang mengisinya dengan statistik tersebut - sekitar 3300 byte per "
-"peer.  Menerapkan kompresi GZip akan hampir memotong itu untuk 1/3 "
-"ukuran, dan jika anda mempertimbangkan seberapa sering RouterInfo "
-"struktur lewat di seluruh jaringan, itu penghematan yang signifikan - "
-"setiap kali sebuah router meminta router lain sebuah catatan networkDb "
-"yang tidak memiliki peer, ia akan mengirimkan kembali 3-10 RouterInfo "
-"dari mereka."
+msgstr "Pesan I2NP dan data yang mereka kandung sudah didefinisikan dalam struktur cukup padat, meskipun satu atribut RouterInfo struktur tidak padat - \"option\" adalah nama plain ASCII = value mapping.  Sekarang, kami sedang mengisinya dengan statistik tersebut - sekitar 3300 byte per peer.  Menerapkan kompresi GZip akan hampir memotong itu untuk 1/3 ukuran, dan jika anda mempertimbangkan seberapa sering RouterInfo struktur lewat di seluruh jaringan, itu penghematan yang signifikan - setiap kali sebuah router meminta router lain sebuah catatan networkDb yang tidak memiliki peer, ia akan mengirimkan kembali 3-10 RouterInfo dari mereka."
 
 #: i2p2www/pages/site/about/performance/history.html:117
 msgid "Update the ministreaming protocol"
@@ -2415,39 +1992,17 @@ msgstr "digantikan oleh protokol streaming penuh"
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
-msgstr ""
-"Saat ini mihi's ministreaming library memiliki protokol negosiasi stream "
-"yang cukup sederhana - Alice mengirim Bob sebuah pesan SYN, Bob menjawab "
-"dengan pesan ACK, kemudian Alice dan Bob mengirimkan satu sama lain "
-"beberapa data, sampai salah satu dari mereka mengirim satu pesan CLOSE.  "
-"Untuk koneksi yang tahan lama (ke IRC server, misalnya), overhead "
-"diabaikan, tetapi untuk satu kali permintaan sederhana/tanggapan situasi "
-"(HTTP request/reply, misalnya), itu adalah lebih dari dua kali lebih "
-"banyak pesan yang diperlukan.  Jika, namun, Alice bernama piggybacked "
-"muatan pertamanya dengan pesan SYN, dan Bob piggybacked balasannya dengan"
-" ACK - dan mungkin juga termasuk CLOSE tag - sementara transient stream "
-"seperti HTTP bisa dikurangi menjadi sepasang pesan, bukan SYN + ACK + "
-"request response + CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
+msgstr "Saat ini mihi's ministreaming library memiliki protokol negosiasi stream yang cukup sederhana - Alice mengirim Bob sebuah pesan SYN, Bob menjawab dengan pesan ACK, kemudian Alice dan Bob mengirimkan satu sama lain beberapa data, sampai salah satu dari mereka mengirim satu pesan CLOSE.  Untuk koneksi yang tahan lama (ke IRC server, misalnya), overhead diabaikan, tetapi untuk satu kali permintaan sederhana/tanggapan situasi (HTTP request/reply, misalnya), itu adalah lebih dari dua kali lebih banyak pesan yang diperlukan.  Jika, namun, Alice bernama piggybacked muatan pertamanya dengan pesan SYN, dan Bob piggybacked balasannya dengan ACK - dan mungkin juga termasuk CLOSE tag - sementara transient stream seperti HTTP bisa dikurangi menjadi sepasang pesan, bukan SYN + ACK + request response + CLOSE."
 
 #: i2p2www/pages/site/about/performance/history.html:132
 msgid "Implement full streaming protocol"
@@ -2455,53 +2010,26 @@ msgstr "Menerapkan protokol streaming penuh"
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
-msgstr ""
-"Protokol ministreaming mengambil keuntungan dari keputusan desain yang "
-"buruk dalam protokol klien I2P (I2CP) - pemaparan \"mode=GUARANTEED\", "
-"yang memungkinkan protokol berbasis pesan yang tidak dapat diandalkan, "
-"best-effort, dapat digunakan untuk dapat diandalkan, menghalangi operasi "
-"(di bawah cover, masih semua tidak dapat diandalkan dan berbasis pesan, "
-"dengan router memberikan jaminan pengiriman pesan \"ACK\" oleh garlic "
-"wrapping dengan muatan, jadi begitu data sampai ke sasaran, pesan ACK "
-"diteruskan kembali kepada kami. [Melalui tunnel, tentu saja])."
+msgstr "Protokol ministreaming mengambil keuntungan dari keputusan desain yang buruk dalam protokol klien I2P (I2CP) - pemaparan \"mode=GUARANTEED\", yang memungkinkan protokol berbasis pesan yang tidak dapat diandalkan, best-effort, dapat digunakan untuk dapat diandalkan, menghalangi operasi (di bawah cover, masih semua tidak dapat diandalkan dan berbasis pesan, dengan router memberikan jaminan pengiriman pesan \"ACK\" oleh garlic wrapping dengan muatan, jadi begitu data sampai ke sasaran, pesan ACK diteruskan kembali kepada kami. [Melalui tunnel, tentu saja])."
 
 #: i2p2www/pages/site/about/performance/history.html:143
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
-msgstr ""
-"Seperti yang saya telah <a href=\"%(link)s\">katakan</a>, membuat "
-"I2PTunnel (dan ministreaming lib) melakukan rute ini adalah hal terbaik "
-"yang bisa dilakukan, tapi mekanisme yang lebih efisien telah tersedia.  "
-"Kapan kita rip out fungsi \"mode=GUARANTEED\", kita pada dasarnya "
-"mendapat I2CP yang terlihat seperti layer IP anonim, dan dengan demikian,"
-" kita akan mampu menerapkan streaming library untuk mengambil keuntungan "
-"dari pengalaman desain TCP layer - ACKs selektif, deteksi kemacetan, "
-"nagle, dll."
+msgstr "Seperti yang saya telah <a href=\"%(link)s\">katakan</a>, membuat I2PTunnel (dan ministreaming lib) melakukan rute ini adalah hal terbaik yang bisa dilakukan, tapi mekanisme yang lebih efisien telah tersedia.  Kapan kita rip out fungsi \"mode=GUARANTEED\", kita pada dasarnya mendapat I2CP yang terlihat seperti layer IP anonim, dan dengan demikian, kita akan mampu menerapkan streaming library untuk mengambil keuntungan dari pengalaman desain TCP layer - ACKs selektif, deteksi kemacetan, nagle, dll."
 
 #: i2p2www/pages/site/about/performance/index.html:2
 msgid "Performance"
@@ -2511,98 +2039,44 @@ msgstr "Kinerja"
 msgid ""
 "How does I2P work, why is it slow, and why does it not use my full "
 "bandwidth?"
-msgstr ""
-"Bagaimana cara kerja I2P, mengapa I2P lambat, dan mengapa I2P tidak "
-"menggunakan bandwidth penuh?"
+msgstr "Bagaimana cara kerja I2P, mengapa I2P lambat, dan mengapa I2P tidak menggunakan bandwidth penuh?"
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
-msgstr ""
-"Mungkin salah satu hal yang paling sering ditanya adalah \"seberapa cepat"
-" I2P?\", dan tak seorang pun tampaknya menyukai jawaban - \"tergantung\"."
-"  Setelah mencoba I2P, hal berikutnya yang mereka tanyakan \"akankah "
-"lebih cepat?\", dan jawabannya adalah paling tegas adalah <b>ya</b>."
+msgstr "Mungkin salah satu hal yang paling sering ditanya adalah \"seberapa cepat I2P?\", dan tak seorang pun tampaknya menyukai jawaban - \"tergantung\".  Setelah mencoba I2P, hal berikutnya yang mereka tanyakan \"akankah lebih cepat?\", dan jawabannya adalah paling tegas adalah <b>ya</b>."
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
-msgstr ""
-"I2p adalah jaringan dinamis penuh. Setiap client dikenal oleh node lain "
-"dan menguji lokal known node untuk reachability dan kapasitas.\n"
-"Hanya node yang terjangkau dan mampu, disimpan NetDB lokal (ini adalah "
-"umumnya hanya sebagian dari jaringan, di sekitar 500-1000).\n"
-"Ketika I2P membangun tunnel, I2P memilih sumber daya terbaik dari pool "
-"ini. Sebagai contoh, subset kecil dari 20-50 node hanya tersedia untuk "
-"membangun tunnel.\n"
-"Karena pengujian terjadi setiap menit, pool dari node yang telah "
-"digunakan berubah setiap menit.\n"
-"Setiap node I2P tahu bagian yang berbeda dari internet, berarti bahwa "
-"setiap router memiliki kumpulan I2P node digunakan untuk tunnel.\n"
-"Bahkan jika kedua router memiliki subset known node yang sama, tes untuk "
-"reachability dan kapasitas akan mungkin menunjukkan hasil yang berbeda, "
-"seperti router lain bisa saja di bawah beban hanya sebagai satu router "
-"tes, tetapi menjadi bebas jika router kedua menguji."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
+msgstr "I2p adalah jaringan dinamis penuh. Setiap client dikenal oleh node lain dan menguji lokal known node untuk reachability dan kapasitas.\nHanya node yang terjangkau dan mampu, disimpan NetDB lokal (ini adalah umumnya hanya sebagian dari jaringan, di sekitar 500-1000).\nKetika I2P membangun tunnel, I2P memilih sumber daya terbaik dari pool ini. Sebagai contoh, subset kecil dari 20-50 node hanya tersedia untuk membangun tunnel.\nKarena pengujian terjadi setiap menit, pool dari node yang telah digunakan berubah setiap menit.\nSetiap node I2P tahu bagian yang berbeda dari internet, berarti bahwa setiap router memiliki kumpulan I2P node digunakan untuk tunnel.\nBahkan jika kedua router memiliki subset known node yang sama, tes untuk reachability dan kapasitas akan mungkin menunjukkan hasil yang berbeda, seperti router lain bisa saja di bawah beban hanya sebagai satu router tes, tetapi menjadi bebas jika router kedua menguji."
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
-msgstr ""
-"Di atas menjelaskan mengapa setiap node I2P memiliki node berbeda untuk "
-"membangun tunnel.\n"
-"Karena setiap node I2P memiliki latency dan bandwidth berbeda, tunnel "
-"(yang dibangun melalui node tersebut) memiliki nilai latency dan "
-"bandwidth yang berbeda.\n"
-"Karena setiap node I2P memiliki tunnel berbeda, tidak ada dua node I2P "
-"yang memiliki tunnel set yang sama ."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
+msgstr "Di atas menjelaskan mengapa setiap node I2P memiliki node berbeda untuk membangun tunnel.\nKarena setiap node I2P memiliki latency dan bandwidth berbeda, tunnel (yang dibangun melalui node tersebut) memiliki nilai latency dan bandwidth yang berbeda.\nKarena setiap node I2P memiliki tunnel berbeda, tidak ada dua node I2P yang memiliki tunnel set yang sama ."
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
-msgstr ""
-"Server/klien dikenal sebagai sebuah \"destinasi\" dan setiap destinasi "
-"memiliki setidaknya satu tunnel inbound dan outbound. Defaultnya adalah 3"
-" hop per tunnel.\n"
-"Ini menambahkan hingga 12 hop (alias 12 I2P node berbeda ) untuk ulang-"
-"alik penuh client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
+msgstr "Server/klien dikenal sebagai sebuah \"destinasi\" dan setiap destinasi memiliki setidaknya satu tunnel inbound dan outbound. Defaultnya adalah 3 hop per tunnel.\nIni menambahkan hingga 12 hop (alias 12 I2P node berbeda ) untuk ulang-alik penuh client-server-client."
 
 #: i2p2www/pages/site/about/performance/index.html:34
 msgid ""
 "Each data package is sent through 6 other I2P nodes until it reaches the "
 "server:"
-msgstr ""
-"Setiap paket data dikirim melalui 6 node I2P lainnya sampai mencapai "
-"server:"
+msgstr "Setiap paket data dikirim melalui 6 node I2P lainnya sampai mencapai server:"
 
 #: i2p2www/pages/site/about/performance/index.html:40
 msgid "and on way back 6 different I2P nodes:"
@@ -2610,173 +2084,62 @@ msgstr "dan perjalanan kembali 6 I2P node yang berbeda :"
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
-msgstr ""
-"Karena sebagian besar lalu lintas di I2P (www, torrent,...) memerlukan "
-"ack package sampai data baru dikirim, I2P perlu menunggu sampai ack "
-"package kembali dari server.\n"
-"Pada akhirnya: mengirim data, menunggu ack, mengirim lebih banyak data, "
-"menunggu ack,...\n"
-"Karena RTT (RoundTripTime) menambah latency dari setiap node I2P dan "
-"setiap koneksi pada ulang-alik ini, dibutuhkan biasanya 1-3 detik sampai "
-"ack package kembali ke klien.\n"
-"Dengan beberapa transport TCP dan I2P internal, paket data memiliki "
-"ukuran terbatas dan tidak dapat sebesar seperti yang kita inginkan.\n"
-"Secara bersama-sama, kondisi ini menetapkan batas bandwidth maksimal per "
-"terowongan sebesar 20-50 kbyte/detik.\n"
-"Tetapi jika hanya satu hop di tunel memiliki bandwidth hanya 5 kb/detik, "
-"seluruh tunnel terbatas untuk 5 kb/detik, tidak tergantung latency dan "
-"keterbatasan lain."
+msgstr "Karena sebagian besar lalu lintas di I2P (www, torrent,...) memerlukan ack package sampai data baru dikirim, I2P perlu menunggu sampai ack package kembali dari server.\nPada akhirnya: mengirim data, menunggu ack, mengirim lebih banyak data, menunggu ack,...\nKarena RTT (RoundTripTime) menambah latency dari setiap node I2P dan setiap koneksi pada ulang-alik ini, dibutuhkan biasanya 1-3 detik sampai ack package kembali ke klien.\nDengan beberapa transport TCP dan I2P internal, paket data memiliki ukuran terbatas dan tidak dapat sebesar seperti yang kita inginkan.\nSecara bersama-sama, kondisi ini menetapkan batas bandwidth maksimal per terowongan sebesar 20-50 kbyte/detik.\nTetapi jika hanya satu hop di tunel memiliki bandwidth hanya 5 kb/detik, seluruh tunnel terbatas untuk 5 kb/detik, tidak tergantung latency dan keterbatasan lain."
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
-msgstr ""
-"Karena enkripsi yang digunakan dan setup lainnya di I2P (bagaimana "
-"membangun terowongan, latency, ...) cukup mahal dalam waktu CPU untuk "
-"membangun tunnel. Inilah sebabnya destinasi hanya diperbolehkan untuk "
-"memiliki maks 6 tunnel MASUK dan 6 KELUAR untuk transportasi data. Dengan"
-" max 50 kb/detik per terowongan, destinasi dapat menggunakan kira-kira "
-"total 300 kb/detik lalu lintas (dalam kenyataannya mungkin lebih jika "
-"terowongan lebih pendek digunakan dengan anonimitas tidak tersedia atau "
-"rendah).\n"
-"Tunnel bekas dibuang setiap 10 menit dan yang baru dibangun.\n"
-"Perubahan terowongan ini (dan kadang-kadang klien yang hard shutdown "
-"karena penggunaan \"shut down at once\" atau situasi di mana ada mati "
-"lampu) kadang-kadang break tunnel dan koneksi, seperti yang terlihat pada"
-" jaringan IRC2P kehilangan koneksi (ping timeout) atau pada saat "
-"menggunakan eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
+msgstr "Karena enkripsi yang digunakan dan setup lainnya di I2P (bagaimana membangun terowongan, latency, ...) cukup mahal dalam waktu CPU untuk membangun tunnel. Inilah sebabnya destinasi hanya diperbolehkan untuk memiliki maks 6 tunnel MASUK dan 6 KELUAR untuk transportasi data. Dengan max 50 kb/detik per terowongan, destinasi dapat menggunakan kira-kira total 300 kb/detik lalu lintas (dalam kenyataannya mungkin lebih jika terowongan lebih pendek digunakan dengan anonimitas tidak tersedia atau rendah).\nTunnel bekas dibuang setiap 10 menit dan yang baru dibangun.\nPerubahan terowongan ini (dan kadang-kadang klien yang hard shutdown karena penggunaan \"shut down at once\" atau situasi di mana ada mati lampu) kadang-kadang break tunnel dan koneksi, seperti yang terlihat pada jaringan IRC2P kehilangan koneksi (ping timeout) atau pada saat menggunakan eepget."
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
-msgstr ""
-"Dengan serangkaian destinasi dan serangkaian unnel per tujuan, satu node "
-"I2P hanya menggunakan serangkaian tunnel di node I2P lain.\n"
-"Misalnya, jika node I2P adalah \"hop1\" di dalam contoh kecil di atas, "
-"kita hanya melihat 1 participating tunnel yang berasal dari client.\n"
-"Jika kita menjumlahkan seluruh jaringan I2P, hanya sejumlah tunnel yang "
-"terbatas yang bisa dibangun dengan jumlah bandwidth yang terbatas.\n"
-"Jika salah satu mendistribusikan angka-angka terbatas ini di sejumlah "
-"node I2P, ada hanya sebagian dari kapasitas bandwidth tersedia yang "
-"tersedia untuk digunakan."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
+msgstr "Dengan serangkaian destinasi dan serangkaian unnel per tujuan, satu node I2P hanya menggunakan serangkaian tunnel di node I2P lain.\nMisalnya, jika node I2P adalah \"hop1\" di dalam contoh kecil di atas, kita hanya melihat 1 participating tunnel yang berasal dari client.\nJika kita menjumlahkan seluruh jaringan I2P, hanya sejumlah tunnel yang terbatas yang bisa dibangun dengan jumlah bandwidth yang terbatas.\nJika salah satu mendistribusikan angka-angka terbatas ini di sejumlah node I2P, ada hanya sebagian dari kapasitas bandwidth tersedia yang tersedia untuk digunakan."
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
-msgstr ""
-"Untuk tetap anonim, satu router tidak boleh digunakan oleh seluruh "
-"jaringan untuk membangun tunnel.\n"
-"Jika satu router bertindak sebagai tunnel router untuk semua node I2P, "
-"dia menjadi titik pusat kegagalan dan juga titik sentral untuk mengambil "
-"data dari klien dan IPs. Ini tidak bagus.\n"
-"I2P mencoba menyebarkan beban ke banyak node I2P karena alasan ini."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
+msgstr "Untuk tetap anonim, satu router tidak boleh digunakan oleh seluruh jaringan untuk membangun tunnel.\nJika satu router bertindak sebagai tunnel router untuk semua node I2P, dia menjadi titik pusat kegagalan dan juga titik sentral untuk mengambil data dari klien dan IPs. Ini tidak bagus.\nI2P mencoba menyebarkan beban ke banyak node I2P karena alasan ini."
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
-msgstr ""
-"Hal lain adalah jaringan mesh penuh. Setiap hop-hop koneksi menggunakan "
-"satu koneksi TCP atau UDP pada node I2P. Dengan 1000 koneksi, seseorang "
-"melihat 1000 koneksi TCP. Itu cukup banyak dan router rumah dan kantor "
-"kecil (DSL, kabel, ..) hanya mengizinkan sejumlah kecil koneksi (atau "
-"hanya menjadi gila jika menggunakan lebih dari koneksi X).\n"
-"I2P mencoba untuk membatasi koneksi ini di bawah 1500 per UDP dan per "
-"tipe TCP.\n"
-"Ini membatasi jumlah lalu lintas yang diarahkan ke node I2P milik anda "
-"juga."
+msgstr "Hal lain adalah jaringan mesh penuh. Setiap hop-hop koneksi menggunakan satu koneksi TCP atau UDP pada node I2P. Dengan 1000 koneksi, seseorang melihat 1000 koneksi TCP. Itu cukup banyak dan router rumah dan kantor kecil (DSL, kabel, ..) hanya mengizinkan sejumlah kecil koneksi (atau hanya menjadi gila jika menggunakan lebih dari koneksi X).\nI2P mencoba untuk membatasi koneksi ini di bawah 1500 per UDP dan per tipe TCP.\nIni membatasi jumlah lalu lintas yang diarahkan ke node I2P milik anda juga."
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
-msgstr ""
-"Singkatnya, I2P sangat kompleks dan tidak ada cara mudah untuk menentukan"
-" mengapa node anda tidak digunakan.\n"
-"Jika node anda dapat dijangkau dan memiliki pengaturan bandwidth> 128 "
-"kbyte / detik yang dibagi dan dapat dijangkau 24/7, itu harus digunakan "
-"setelah beberapa waktu untuk participating traffic.\n"
-"Jika berada di tengah-tengah, pengujian simpul I2P anda yang dilakukan "
-"oleh node lain akan memberi tahu: anda tidak dapat dijangkau. Ini "
-"memblokir node anda setidaknya 24 jam pada node lain. Jadi, node lain "
-"yang menganggap anda sebagai tidak aktif tidak akan menggunakan simpul "
-"Andaaselama 24 jam untuk membangun tunnel. Inilah sebabnya mengapa lalu "
-"lintas anda akan menjadi lebih rendah setelah restart / shutdown selama "
-"minimal 24 jam."
+msgstr "Singkatnya, I2P sangat kompleks dan tidak ada cara mudah untuk menentukan mengapa node anda tidak digunakan.\nJika node anda dapat dijangkau dan memiliki pengaturan bandwidth> 128 kbyte / detik yang dibagi dan dapat dijangkau 24/7, itu harus digunakan setelah beberapa waktu untuk participating traffic.\nJika berada di tengah-tengah, pengujian simpul I2P anda yang dilakukan oleh node lain akan memberi tahu: anda tidak dapat dijangkau. Ini memblokir node anda setidaknya 24 jam pada node lain. Jadi, node lain yang menganggap anda sebagai tidak aktif tidak akan menggunakan simpul Andaaselama 24 jam untuk membangun tunnel. Inilah sebabnya mengapa lalu lintas anda akan menjadi lebih rendah setelah restart / shutdown selama minimal 24 jam."
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
-msgstr ""
-"Selain itu: node I2P lainnya perlu mengetahui router I2P Andaauntuk "
-"mengujinya untuk reachability dan kapasitas. Butuh waktu untuk node lain "
-"untuk diketahui node anda. \n"
-"Ini akan lebih cepat jika anda menggunakan I2P dan membangun lebih banyak"
-" tunnel, misalnya menggunakan torrent atau www untuk beberapa lama."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
+msgstr "Selain itu: node I2P lainnya perlu mengetahui router I2P Andaauntuk mengujinya untuk reachability dan kapasitas. Butuh waktu untuk node lain untuk diketahui node anda. \nIni akan lebih cepat jika anda menggunakan I2P dan membangun lebih banyak tunnel, misalnya menggunakan torrent atau www untuk beberapa lama."
 
 #: i2p2www/pages/site/about/performance/index.html:99
 msgid "Performance Improvements"
@@ -2787,7 +2150,4 @@ msgstr "Peningkatan Kinerja"
 msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
-msgstr ""
-"Untuk peningkatan kinerja masa depan, lihat <a "
-"href=\"%(future)s\">Perbaikan Kinerja Masa Depan</a> ."
-
+msgstr "Untuk peningkatan kinerja masa depan, lihat <a href=\"%(future)s\">Perbaikan Kinerja Masa Depan</a> ."
diff --git a/i2p2www/translations/id/LC_MESSAGES/comparison.po b/i2p2www/translations/id/LC_MESSAGES/comparison.po
index bedaa65ab1208c48362a2de2dca8be6c25043275..c547123c69cf4d4e6473194973f5a641583740e6 100644
--- a/i2p2www/translations/id/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/id/LC_MESSAGES/comparison.po
@@ -1,24 +1,24 @@
-# Indonesian translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Khairul Agasta <khairuldroids@gmail.com>, 2014
 # Robert Dafis <robertdafis@gmail.com>, 2017-2018
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2018-10-04 00:21+0000\n"
-"Last-Translator: erinm\n"
-"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)"
-"\n"
-"Plural-Forms: nplurals=1; plural=0\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Robert Dafis <robertdafis@gmail.com>, 2017-2018\n"
+"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: id\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -26,103 +26,39 @@ msgstr "I2P Dibandingkan dengan Freenet"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
-msgstr ""
-"Freenet adalah sepenuhnya didistribusikan, jaringan yang menerbitkan peer"
-" to peer anonim, \n"
-"menawarkan cara aman menyimpan data, serta beberapa pendekatan yang "
-"berusaha\n"
-"mengatasi banjir flash. Sementara Freenet dirancang sebagai sebuah "
-"penyimpanan\n"
-"data terdistribusi, mereka telah membangun aplikasi diatas untuk "
-"melakukan \n"
-"komunikasi anonim yang lebih umum, seperti statistik website dan message "
-"boards."
+msgstr "Freenet adalah sepenuhnya didistribusikan, jaringan yang menerbitkan peer to peer anonim, \nmenawarkan cara aman menyimpan data, serta beberapa pendekatan yang berusaha\nmengatasi banjir flash. Sementara Freenet dirancang sebagai sebuah penyimpanan\ndata terdistribusi, mereka telah membangun aplikasi diatas untuk melakukan \nkomunikasi anonim yang lebih umum, seperti statistik website dan message boards."
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
-msgstr ""
-"Dibandingkan dengan I2P, Freenet menawarkan beberapa keuntungan "
-"substansial - \n"
-"yaitu penyimpanan data terdistribusi, sementara I2P tidak, memungkinkan "
-"masyarkat \n"
-"mendapatkan konten yang diterbitkan oleh pengguna lain bahkan saat "
-"penerbit \n"
-"tidak lagi online. Selain itu, Freenet juga dapat mendistribusikan data "
-"populer cukup \n"
-"efisien. I2P sendiri tidak dan tidak akan menyediakan fungsionalitas ini."
-" Di sisi lain, \n"
-"ada tumpang tindih untuk pengguna yang hanya ingin berkomunikasi dengan "
-"satu \n"
-"sama lain secara anonim melalui website, message boards, program file "
-"sharing, etc.\n"
-"Ada juga beberapa upaya untuk mengembangkan penyimpanan data "
-"terdistribusi \n"
-"untuk berjalan diatas I2P,\n"
-"(yang terakhir port dari <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
-"tetapi saat ini belum siap untuk penggunaan umum."
+msgstr "Dibandingkan dengan I2P, Freenet menawarkan beberapa keuntungan substansial - \nyaitu penyimpanan data terdistribusi, sementara I2P tidak, memungkinkan masyarkat \nmendapatkan konten yang diterbitkan oleh pengguna lain bahkan saat penerbit \ntidak lagi online. Selain itu, Freenet juga dapat mendistribusikan data populer cukup \nefisien. I2P sendiri tidak dan tidak akan menyediakan fungsionalitas ini. Di sisi lain, \nada tumpang tindih untuk pengguna yang hanya ingin berkomunikasi dengan satu \nsama lain secara anonim melalui website, message boards, program file sharing, etc.\nAda juga beberapa upaya untuk mengembangkan penyimpanan data terdistribusi \nuntuk berjalan diatas I2P,\n(yang terakhir port dari <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\ntetapi saat ini belum siap untuk penggunaan umum."
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
-msgstr ""
-"Akan tetapi, meskipun menghiraukan segala masalah implementasi, ada "
-"beberapa \n"
-"kekhawatiran mengenai algoritma Freenet dari kedua perspektif  "
-"skalabilitas dan \n"
-"anonimitas, karena sebagian besar untuk routing pendorongan heuristic "
-"Freenet. \n"
-"Interaksi dari beragam teknik tentu bisa berhasil mencegah berbagai "
-"serangan, dan \n"
-"mungkin beberapa aspek algoritma routing akan memberikan skalabilitas "
-"yang \n"
-"diharapkan. Sayangnya, tidak banyak analisis algoritma yang diikut "
-"sertakan berhasil\n"
-"memberikan hasil yang positif, namun masih ada harapan. Setidaknya, "
-"Freenet tidak\n"
-"menyertakan anonimitas substansial terhadap penyerang yang tidak memiliki"
-"\n"
-"sumber daya yang diperlukan untuk menganalisa lebih jauh."
+msgstr "Akan tetapi, meskipun menghiraukan segala masalah implementasi, ada beberapa \nkekhawatiran mengenai algoritma Freenet dari kedua perspektif  skalabilitas dan \nanonimitas, karena sebagian besar untuk routing pendorongan heuristic Freenet. \nInteraksi dari beragam teknik tentu bisa berhasil mencegah berbagai serangan, dan \nmungkin beberapa aspek algoritma routing akan memberikan skalabilitas yang \ndiharapkan. Sayangnya, tidak banyak analisis algoritma yang diikut sertakan berhasil\nmemberikan hasil yang positif, namun masih ada harapan. Setidaknya, Freenet tidak\nmenyertakan anonimitas substansial terhadap penyerang yang tidak memiliki\nsumber daya yang diperlukan untuk menganalisa lebih jauh."
 
 #: i2p2www/pages/site/comparison/index.html:2
 msgid "Comparing I2P to other projects"
@@ -130,51 +66,28 @@ msgstr "Membandingkan I2P dengan projek lain"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi"
-" \n"
-"anonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah"
-" \n"
-"daftar komprehensif sumber anonimitas - kedua freehaven \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi "
-"Anonimitas</a>\n"
-"dan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\n"
-"melayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\n"
-"untuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan "
-"individu:"
+msgstr "Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi \nanonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah \ndaftar komprehensif sumber anonimitas - kedua freehaven \n<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi Anonimitas</a>\ndan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\nmelayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\nuntuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan individu:"
 
 #: i2p2www/pages/site/comparison/index.html:20
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman "
-"jaringan lain:</a>"
+msgstr "Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman jaringan lain:</a>"
 
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Konten pada laman ini tunduk pada informasi, diskusi dan perdebatan, dan "
-"kami menyambut komentar dan tambahan.\n"
-"Anda dapat mengkontribusikan analisis dengan memasukkan <a "
-"href=\"%(trac)s\">tiket baru di Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
 msgid "I2P Compared to Other Anonymous Networks"
@@ -191,251 +104,116 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Sebagian besar bagian berikut sudah cukup tua dan mungkin tidak akurat. \n"
-"Untuk overview perbandingan yang tersedia, silakan baca <a "
-"href=\"%(comparison)s\">halaman perbandingan jaringan utama</a>. Anda "
-"dapat memberikan kontribusi analisis dengan memasukkan <a "
-"href=\"%(trac)s\">tiket baru di Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
-msgstr ""
-"RetroShare adalah kumpulam aplikasi peer-to-peer yang berjalan di dalam "
-"jaringan\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a>. Setiap peer seperti "
-"jaringan F2F \n"
-"membuat koneksi IP langsung hanya kepada peers (\"friends\") yang "
-"terotentifikasi setelah\n"
-"pertukaran sertifikat secara eksplisit . Ini dapat menemukan peers yang "
-"tidak terotentifikasi (misalnya friends dari friends), \n"
-"tapi koneksi ke mereka dialihkan melalui \"friend\" peers untuk privasi "
-"dan anonimitas."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
+msgstr "RetroShare adalah kumpulam aplikasi peer-to-peer yang berjalan di dalam jaringan\n<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a>. Setiap peer seperti jaringan F2F \nmembuat koneksi IP langsung hanya kepada peers (\"friends\") yang terotentifikasi setelah\npertukaran sertifikat secara eksplisit . Ini dapat menemukan peers yang tidak terotentifikasi (misalnya friends dari friends), \ntapi koneksi ke mereka dialihkan melalui \"friend\" peers untuk privasi dan anonimitas."
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
-msgstr ""
-"RetroShare didesain untuk membangun jaringan pribadi yang berisi peers "
-"terpercaya, sementara I2P didesain \n"
-"sebagai jaringan publik anonim berskala besar. Versi-versi terbaru "
-"RetroShare memiliki opsi untuk berjalan \n"
-"sebagai \"darknet\" publik dengan menggunakan I2P atau Tor sebagai "
-"transport. Dengan itu, semua koneksi \n"
-"menjadi anonim dan kepercayaan tidak diperlukan untuk menambah \"friend\""
-" baru."
+msgstr "RetroShare didesain untuk membangun jaringan pribadi yang berisi peers terpercaya, sementara I2P didesain \nsebagai jaringan publik anonim berskala besar. Versi-versi terbaru RetroShare memiliki opsi untuk berjalan \nsebagai \"darknet\" publik dengan menggunakan I2P atau Tor sebagai transport. Dengan itu, semua koneksi \nmenjadi anonim dan kepercayaan tidak diperlukan untuk menambah \"friend\" baru."
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
-msgstr ""
-"Morphmix dan Tarzan adalah jaringan peer to peer proxi anonim "
-"terdistribusi penuh, yang memungkinkan orang untuk menggunakan tunnel "
-"melalui jaringan rendah latency. Morphmix mencakup beberapa algoritma "
-"deteksi collusion yang sangat menarik dan pertahanan Sybil, sementara "
-"Tarzan memanfaatkan kelangkaan alamat IP untuk mencapai hal yang sama. "
-"Dua perbedaan utama antara keduanya dan I2P ini adalah terkait dengan <a "
-"href=\"%(threatmodel)s\">model ancaman</a> I2P dan desain out-proxy "
-"mereka (berlawanan dengan penyediaan pengirim dan penerima anonimitas). "
-"Ada source code yang tersedia untuk kedua sistem, tapi kami tidak "
-"mengetahui penggunaannya di luar lingkungan akademis."
+msgstr "Morphmix dan Tarzan adalah jaringan peer to peer proxi anonim terdistribusi penuh, yang memungkinkan orang untuk menggunakan tunnel melalui jaringan rendah latency. Morphmix mencakup beberapa algoritma deteksi collusion yang sangat menarik dan pertahanan Sybil, sementara Tarzan memanfaatkan kelangkaan alamat IP untuk mencapai hal yang sama. Dua perbedaan utama antara keduanya dan I2P ini adalah terkait dengan <a href=\"%(threatmodel)s\">model ancaman</a> I2P dan desain out-proxy mereka (berlawanan dengan penyediaan pengirim dan penerima anonimitas). Ada source code yang tersedia untuk kedua sistem, tapi kami tidak mengetahui penggunaannya di luar lingkungan akademis."
 
 #: i2p2www/pages/site/comparison/other-networks.html:172
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
-msgstr ""
-"\n"
-"Mixminion dan Mixmaster adalah jaringan untuk mendukung email anonim "
-"terhadap musuh yang sangat kuat. Aplikasi pesan high-latency yang "
-"berjalan di atas I2P (misalnya <a href=\"%(syndie)s\">Syndie</a> atau "
-"I2PBote) mungkin terbukti cukup untuk memenuhi ancaman model musuh "
-"tersebut, sementara berjalan secara paralel seiring kebutuhan pengguna "
-"low-latency, untuk menyediakan anonimitas yang secara signifikan lebih "
-"besar. Dukungan latency tinggi di dalam router I2P itu sendiri mungkin "
-"atau mungkin tidak ditambahkan dalam rilis di masa depan. Masih terlalu "
-"dini untuk mengatakan apakah I2P akan memenuhi kebutuhan pengguna yang "
-"membutuhkan perlindungan ekstrim untuk email."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
+msgstr "\nMixminion dan Mixmaster adalah jaringan untuk mendukung email anonim terhadap musuh yang sangat kuat. Aplikasi pesan high-latency yang berjalan di atas I2P (misalnya <a href=\"%(syndie)s\">Syndie</a> atau I2PBote) mungkin terbukti cukup untuk memenuhi ancaman model musuh tersebut, sementara berjalan secara paralel seiring kebutuhan pengguna low-latency, untuk menyediakan anonimitas yang secara signifikan lebih besar. Dukungan latency tinggi di dalam router I2P itu sendiri mungkin atau mungkin tidak ditambahkan dalam rilis di masa depan. Masih terlalu dini untuk mengatakan apakah I2P akan memenuhi kebutuhan pengguna yang membutuhkan perlindungan ekstrim untuk email."
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
 msgid ""
 "As with Tor and Onion Routing, \n"
 "both Mixminion and Mixmaster take the directory based approach as well."
-msgstr ""
-"Seperti Tor dan Onion Routing, Mixminion dan Mixmaster juga mengambil "
-"pendekatan berbasis direktori."
+msgstr "Seperti Tor dan Onion Routing, Mixminion dan Mixmaster juga mengambil pendekatan berbasis direktori."
 
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
-msgstr ""
-"JAP (Java Anonymous Proxy) adalah jaringan mix cascades untuk "
-"menganonimkan web requests,Dan karena itu memiliki sedikit node terpusat "
-"(peserta dalam cascade) yang berbaurdan mencampur permintaan dari klien "
-"melalui urutan node (caskade) sebelummenggunakan proxy keluar ke internet"
-" biasa. Jangkauan, model ancaman, dan keamanan secara substansialberbeda "
-"dengan I2P, tapi bagi mereka yang tidak membutuhkan anonimitas yang "
-"signifikan tapi tetap sajatidak puas dengan layanan seperti Anonymizer, "
-"JAP layak untuk dipertimbangkan. Satuhal yang perlu diperhatikan adalah "
-"bahwa siapapun yang berada di bawah yurisdiksi pengadilan Jerman mungkin "
-"berhati-hati karena Biro Investigasi Kriminal Federal Jerman (FBCI) "
-"berhasil <a href=\"%(url)s\">menyerang</a> jaringan tersebut. Meski "
-"metode serangan ini ternyata ilegaldi pengadilan Jerman, faktanya bahwa "
-"data berhasil dikumpulkan. Pengadilan mengubah pikiran mereka berdasarkan"
-" keadaan, dan ini adalah bukti bahwajika badan pemerintah atau badan "
-"intelijen menginginkannya, mereka bisa mengumpulkan datanyawalau kemudian"
-" tidak dapat diterima di pengadilan)"
+msgstr "JAP (Java Anonymous Proxy) adalah jaringan mix cascades untuk menganonimkan web requests,Dan karena itu memiliki sedikit node terpusat (peserta dalam cascade) yang berbaurdan mencampur permintaan dari klien melalui urutan node (caskade) sebelummenggunakan proxy keluar ke internet biasa. Jangkauan, model ancaman, dan keamanan secara substansialberbeda dengan I2P, tapi bagi mereka yang tidak membutuhkan anonimitas yang signifikan tapi tetap sajatidak puas dengan layanan seperti Anonymizer, JAP layak untuk dipertimbangkan. Satuhal yang perlu diperhatikan adalah bahwa siapapun yang berada di bawah yurisdiksi pengadilan Jerman mungkin berhati-hati karena Biro Investigasi Kriminal Federal Jerman (FBCI) berhasil <a href=\"%(url)s\">menyerang</a> jaringan tersebut. Meski metode serangan ini ternyata ilegaldi pengadilan Jerman, faktanya bahwa data berhasil dikumpulkan. Pengadilan mengubah pikiran mereka berdasarkan keadaan, dan ini adalah bukti bahwajika badan pemerintah atau badan intelijen menginginkannya, mereka bisa mengumpulkan datanyawalau kemudian tidak dapat diterima di pengadilan)"
 
 #: i2p2www/pages/site/comparison/other-networks.html:216
 #, python-format
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
-msgstr ""
-"Kedua sistem ini bekerja melalui dasar <a href=\"%(antnet)s\">antnet</a> "
-"routing yang sama, yang memberikan beberapa derajat anonimitas "
-"berdasarkan model ancaman untuk memberikan penolakan yang masuk akal "
-"terhadap musuh sederhanya yang tidak berkolusi. Dengan antnet routing, "
-"mereka terlebih dahulu melakukan random walk atau siaran untuk menemukan "
-"beberapa peer dengan data atau identitas yang diinginkan, lalu gunakan "
-"algoritma umpan balik untuk mengoptimalkan jalur yang ditemukan. Ini "
-"bekerja dengan baik untuk aplikasi yang hanya ingin diketahui Apa yang "
-"orang lain di sekitar mereka tawarkan - \"Bagaimana kabarmu\" vs. \"Hei "
-"Alice, apa kabarmu\" -Anda pada dasarnya mendapatkan sekelompok node "
-"lokal yang dapat berbagi file dengan dan mempertahankan beberapa tingkat "
-"anonimitas (meski Anda tidak memiliki banyak kendali atas siapa yang "
-"berada dalam kelompok peer itu)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
+msgstr "Kedua sistem ini bekerja melalui dasar <a href=\"%(antnet)s\">antnet</a> routing yang sama, yang memberikan beberapa derajat anonimitas berdasarkan model ancaman untuk memberikan penolakan yang masuk akal terhadap musuh sederhanya yang tidak berkolusi. Dengan antnet routing, mereka terlebih dahulu melakukan random walk atau siaran untuk menemukan beberapa peer dengan data atau identitas yang diinginkan, lalu gunakan algoritma umpan balik untuk mengoptimalkan jalur yang ditemukan. Ini bekerja dengan baik untuk aplikasi yang hanya ingin diketahui Apa yang orang lain di sekitar mereka tawarkan - \"Bagaimana kabarmu\" vs. \"Hei Alice, apa kabarmu\" -Anda pada dasarnya mendapatkan sekelompok node lokal yang dapat berbagi file dengan dan mempertahankan beberapa tingkat anonimitas (meski Anda tidak memiliki banyak kendali atas siapa yang berada dalam kelompok peer itu)."
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
-msgstr ""
-"Namun, algoritmanya sama sekali tidak bagus - jika aplikasi ingin "
-"berbicara dengan peer tertentu akhirnya melakukan broadcast search atau "
-"random walk (meski jika mereka cukup beruntung, antnet routing harus "
-"mengoptimalkan koneksi yang ditemukan). Ini berarti sementara jaringan "
-"ini bisa bekerja hebat pada skala kecil, mereka tidak cocok untuk "
-"jaringan besar di mana seseorang ingin berhubungan dengan peer spesifik "
-"lainnya. Itu tidak berarti tidak ada manfaat dalam sistem ini, hanya saja"
-" penerapannya terbatas pada situasi di mana ada masalah tertentu harus "
-"diatasi"
+msgstr "Namun, algoritmanya sama sekali tidak bagus - jika aplikasi ingin berbicara dengan peer tertentu akhirnya melakukan broadcast search atau random walk (meski jika mereka cukup beruntung, antnet routing harus mengoptimalkan koneksi yang ditemukan). Ini berarti sementara jaringan ini bisa bekerja hebat pada skala kecil, mereka tidak cocok untuk jaringan besar di mana seseorang ingin berhubungan dengan peer spesifik lainnya. Itu tidak berarti tidak ada manfaat dalam sistem ini, hanya saja penerapannya terbatas pada situasi di mana ada masalah tertentu harus diatasi"
 
 #: i2p2www/pages/site/comparison/other-networks.html:239
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
-msgstr ""
-"Ini adalah jaringan closed source yang ditujukan untuk pengguna Iran. Tor"
-" <a href=\"%(torpost)s\">menulis dengan baik tentang apa yang harus "
-"dicari dengan alat pengelakan</a>. Cukup dengan mengatakan bahwa menjadi "
-"closed source dan menargetkan secara publik negara tertentu bukanlah ide "
-"bagus. I2P tentu saja open source. Namun, source code-nya dan <a "
-"href=\"%(docs)s\">dokumentasi teknis</a> perlu ditinjau lebih lanjut."
+msgstr "Ini adalah jaringan closed source yang ditujukan untuk pengguna Iran. Tor <a href=\"%(torpost)s\">menulis dengan baik tentang apa yang harus dicari dengan alat pengelakan</a>. Cukup dengan mengatakan bahwa menjadi closed source dan menargetkan secara publik negara tertentu bukanlah ide bagus. I2P tentu saja open source. Namun, source code-nya dan <a href=\"%(docs)s\">dokumentasi teknis</a> perlu ditinjau lebih lanjut."
 
 #: i2p2www/pages/site/comparison/other-networks.html:248
 msgid "Paid VPN Services"
@@ -446,10 +224,8 @@ msgstr "Jasa VPN berbayar"
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Anda dapat memberikan kontribusi analisis dengan memasukkan <a "
-"href=\"%(trac)s\">tiket baru di Trac</a>"
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
 msgid "Others"
@@ -477,17 +253,7 @@ msgid ""
 "network, as well as gather and report statistics, as \n"
 "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
 "database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
-msgstr ""
-"Tor dan Onion Routing keduanya menganonimkan jaringan proxy, memungkinkan"
-" orang untuk menggunakan tunnel melalui campuran jaringan latency rendah."
-" Dua perbedaan utama antara Tor/Onion-Routing dan I2P adalah lagi-lagi "
-"terkait dengan perbedaan model ancaman dan desain out-proxy (meskipun Tor"
-" juga mendukung hidden service). Selain itu, Tor mengambil pendekatan "
-"berbasis direktori - menyediakan titik terpusat untuk mengelola "
-"keseluruhan 'tampilan' dari jaringan, serta mengumpulkan dan melaporkan "
-"statistik, berbeda dengan jaringan I2P di mana <a "
-"href=\"%(netdb)s\">database</a> dan <a href=\"%(peerselection)s\">peer "
-"selection</a> terdistribusi."
+msgstr "Tor dan Onion Routing keduanya menganonimkan jaringan proxy, memungkinkan orang untuk menggunakan tunnel melalui campuran jaringan latency rendah. Dua perbedaan utama antara Tor/Onion-Routing dan I2P adalah lagi-lagi terkait dengan perbedaan model ancaman dan desain out-proxy (meskipun Tor juga mendukung hidden service). Selain itu, Tor mengambil pendekatan berbasis direktori - menyediakan titik terpusat untuk mengelola keseluruhan 'tampilan' dari jaringan, serta mengumpulkan dan melaporkan statistik, berbeda dengan jaringan I2P di mana <a href=\"%(netdb)s\">database</a> dan <a href=\"%(peerselection)s\">peer selection</a> terdistribusi."
 
 #: i2p2www/pages/site/comparison/tor.html:23
 msgid ""
@@ -500,14 +266,7 @@ msgid ""
 "outproxies are prone to abuse, along with all of the \n"
 "other security issues we've come to know and love with \n"
 "normal Internet traffic."
-msgstr ""
-"Fungsi outproxy di I2P/Tor memang memiliki beberapa kelemahan substansial"
-" terhadap penyerang tertentu. Begitu komunikasi meninggalkan mixnet, "
-"global passive adversaries bisa lebih mudah melakukan analisis lalu "
-"lintas. Selain itu, outproxies memiliki akses teks dari data yang "
-"ditransfer kedua arah. Outproxies rentan terhadap penyalahgunaan dan "
-"semua masalah keamanan lainnya yang kita kenal di lalu lintas internet "
-"normal."
+msgstr "Fungsi outproxy di I2P/Tor memang memiliki beberapa kelemahan substansial terhadap penyerang tertentu. Begitu komunikasi meninggalkan mixnet, global passive adversaries bisa lebih mudah melakukan analisis lalu lintas. Selain itu, outproxies memiliki akses teks dari data yang ditransfer kedua arah. Outproxies rentan terhadap penyalahgunaan dan semua masalah keamanan lainnya yang kita kenal di lalu lintas internet normal."
 
 #: i2p2www/pages/site/comparison/tor.html:35
 msgid ""
@@ -517,12 +276,7 @@ msgid ""
 "to build outproxy functionality on top of an anonymous\n"
 "communication layer, they can).  In fact, some I2P users\n"
 "currently take advantage of Tor to outproxy."
-msgstr ""
-"Namun, banyak orang tidak perlu khawatir dengan hal tersebut karena "
-"mereka berada di luar model ancaman mereka. Demikian juga, di luar "
-"lingkup fungsional I2P (formal) (jika orang menginginkan untuk membangun "
-"fungsionalitas di atas Lapisan komunikasi anonim, mereka bisa). Bahkan, "
-"beberapa pengguna I2P saat ini memanfaatkan Tor untuk outproxy."
+msgstr "Namun, banyak orang tidak perlu khawatir dengan hal tersebut karena mereka berada di luar model ancaman mereka. Demikian juga, di luar lingkup fungsional I2P (formal) (jika orang menginginkan untuk membangun fungsionalitas di atas Lapisan komunikasi anonim, mereka bisa). Bahkan, beberapa pengguna I2P saat ini memanfaatkan Tor untuk outproxy."
 
 #: i2p2www/pages/site/comparison/tor.html:49
 msgid "Comparison of Tor and I2P Terminology"
@@ -532,9 +286,7 @@ msgstr "Perbandingan Terminologi di Tor dan I2P"
 msgid ""
 "While Tor and I2P are similar in many ways, much of the terminology is "
 "different."
-msgstr ""
-"Walau Tor dan I2P serupa dalam banyak hal, sebagian terminologinya "
-"berbeda."
+msgstr "Walau Tor dan I2P serupa dalam banyak hal, sebagian terminologinya berbeda."
 
 #: i2p2www/pages/site/comparison/tor.html:55
 msgid "Cell"
@@ -607,8 +359,8 @@ msgstr "Hidden Service"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
-msgstr "Eepsite atau distinasi"
+msgid "I2P Site or Destination"
+msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
 msgid "Hidden Service Descriptor"
@@ -678,21 +430,14 @@ msgstr "Manfaat Tor dibandingkan I2P"
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
-msgstr ""
-"Jumlah pengguna yang jauh lebih besar; Lebih banyak diperhatikan di "
-"komunitas akademis dan hacker; Mendapat manfaat dari studi formal tentang"
-" anonimitas, perlawanan, dan kinerja; Memiliki pemimpin non-anonim, "
-"terlihat, bertempat di universitas"
+msgstr "Jumlah pengguna yang jauh lebih besar; Lebih banyak diperhatikan di komunitas akademis dan hacker; Mendapat manfaat dari studi formal tentang anonimitas, perlawanan, dan kinerja; Memiliki pemimpin non-anonim, terlihat, bertempat di universitas"
 
 #: i2p2www/pages/site/comparison/tor.html:84
 msgid "Has already solved some scaling issues I2P has yet to address"
-msgstr ""
-"Sudah menyelesaikan beberapa masalah penskalaan I2P yang belum sempat "
-"ditangani"
+msgstr "Sudah menyelesaikan beberapa masalah penskalaan I2P yang belum sempat ditangani"
 
 #: i2p2www/pages/site/comparison/tor.html:85
 msgid "Has significant funding"
@@ -700,40 +445,28 @@ msgstr "Memiliki pendanaan yang cukup banyak"
 
 #: i2p2www/pages/site/comparison/tor.html:86
 msgid "Has more developers, including several that are funded"
-msgstr ""
-"Memiliki lebih banyak pengembang, termasuk beberapa yang mendapat "
-"pendanaan"
+msgstr "Memiliki lebih banyak pengembang, termasuk beberapa yang mendapat pendanaan"
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
-msgstr ""
-"Lebih tahan terhadap pemblokiran tingkat negara karena lapisan transport "
-"TLS dan jembatan (I2P memiliki proposal untuk \"full restricted routes\" "
-"tapi ini belum diterapkan)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
+msgstr "Lebih tahan terhadap pemblokiran tingkat negara karena lapisan transport TLS dan jembatan (I2P memiliki proposal untuk \"full restricted routes\" tapi ini belum diterapkan)"
 
 #: i2p2www/pages/site/comparison/tor.html:93
 msgid "Big enough that it has had to adapt to blocking and DOS attempts"
-msgstr ""
-"Cukup besar bahwa ia harus menyesuaikan diri dengan pemblokiran dan usaha"
-" DOS"
+msgstr "Cukup besar bahwa ia harus menyesuaikan diri dengan pemblokiran dan usaha DOS"
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
-msgstr ""
-"Dirancang dan dioptimalkan untuk lalu lintas keluar jaringan, dengan "
-"jumlah exit node yang banyak"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
+msgstr "Dirancang dan dioptimalkan untuk lalu lintas keluar jaringan, dengan jumlah exit node yang banyak"
 
 #: i2p2www/pages/site/comparison/tor.html:96
 msgid ""
 "Better documentation, has formal papers and specifications,\n"
 "better website, many more translations"
-msgstr ""
-"Dokumentasi yang lebih baik, memiliki dokumen dan spesifikasi formal, "
-"situs web yang lebih baik, lebih banyak terjemahan"
+msgstr "Dokumentasi yang lebih baik, memiliki dokumen dan spesifikasi formal, situs web yang lebih baik, lebih banyak terjemahan"
 
 #: i2p2www/pages/site/comparison/tor.html:101
 msgid "More efficient with memory usage"
@@ -747,17 +480,13 @@ msgstr "Tor client node memiliki overhead bandwidth yang sangat rendah"
 msgid ""
 "Centralized control reduces the complexity at each\n"
 "node and can efficiently address Sybil attacks"
-msgstr ""
-"Kontrol terpusat mengurangi kompleksitas pada masing-masing node dan "
-"secara efisien dapat menangani serangan Sybil"
+msgstr "Kontrol terpusat mengurangi kompleksitas pada masing-masing node dan secara efisien dapat menangani serangan Sybil"
 
 #: i2p2www/pages/site/comparison/tor.html:110
 msgid ""
 "A core of high capacity nodes provides higher\n"
 "throughput and lower latency"
-msgstr ""
-"Inti node berkapasitas tinggi memberikan nilai throughput lebih tinggi "
-"dan latency lebih rendah"
+msgstr "Inti node berkapasitas tinggi memberikan nilai throughput lebih tinggi dan latency lebih rendah"
 
 #: i2p2www/pages/site/comparison/tor.html:115
 msgid "C, not Java (ewww)"
@@ -769,11 +498,9 @@ msgstr "Manfaat I2P dibandingkan Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
-msgstr ""
-"Dirancang dan dioptimalkan untuk hidden servie, yang jauh lebih cepat "
-"daripada di Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
+msgstr "Dirancang dan dioptimalkan untuk hidden servie, yang jauh lebih cepat daripada di Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:121
 msgid "Fully distributed and self organizing"
@@ -783,23 +510,17 @@ msgstr "Sepenuhnya terdistribusi dan mengorganisi diri sendiri"
 msgid ""
 "Peers are selected by continuously profiling and ranking performance,\n"
 "rather than trusting claimed capacity"
-msgstr ""
-"Peer dipilih dengan terus melakukan profiling dan memeringkat kinerja, "
-"daripada mempercayai kapasitas yang diklaim"
+msgstr "Peer dipilih dengan terus melakukan profiling dan memeringkat kinerja, daripada mempercayai kapasitas yang diklaim"
 
 #: i2p2www/pages/site/comparison/tor.html:129
 msgid ""
 "Floodfill peers (\"directory servers\") are varying and untrusted,\n"
 "rather than hardcoded"
-msgstr ""
-"Floodfill peer (\"server direktori\") bervariasi dan tidak dipercaya, "
-"bukan hardcoded"
+msgstr "Floodfill peer (\"server direktori\") bervariasi dan tidak dipercaya, bukan hardcoded"
 
 #: i2p2www/pages/site/comparison/tor.html:134
 msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
-msgstr ""
-"Cukup kecil bahwa itu belum pernah diblokir atau banyak di-DOS, atau sama"
-" sekali di-DOS"
+msgstr "Cukup kecil bahwa itu belum pernah diblokir atau banyak di-DOS, atau sama sekali di-DOS"
 
 #: i2p2www/pages/site/comparison/tor.html:135
 msgid "Peer-to-peer friendly"
@@ -813,17 +534,13 @@ msgstr "Packet switched alih-alih circuit switched"
 msgid ""
 "implicit transparent load balancing of messages \n"
 "across multiple peers, rather than a single path"
-msgstr ""
-"Penyeimbangan beban transparan secara implisit terhadap pesan di beberapa"
-" peer, bukan satu jalur tunggal"
+msgstr "Penyeimbangan beban transparan secara implisit terhadap pesan di beberapa peer, bukan satu jalur tunggal"
 
 #: i2p2www/pages/site/comparison/tor.html:145
 msgid ""
 "resilience vs. failures by running multiple \n"
 "tunnels in parallel, plus rotating tunnels"
-msgstr ""
-"Ketahanan vs kegagalan dengan menjalankan beberapa tunnel secara paralel,"
-" ditambah rotating tunnel"
+msgstr "Ketahanan vs kegagalan dengan menjalankan beberapa tunnel secara paralel, ditambah rotating tunnel"
 
 #: i2p2www/pages/site/comparison/tor.html:151
 msgid ""
@@ -831,26 +548,19 @@ msgid ""
 "of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
 "used by all of the peers Alice is talking with, \n"
 "rather than a circuit for each)"
-msgstr ""
-"Skala setiap koneksi klien di O(1) dan bukan O(N) (Alice memiliki 2 "
-"inbound terowongan yang digunakan oleh semua peer yang sedang berbicara "
-"dengan Alice, bukan satu rangkaian untuk masing-masing)"
+msgstr "Skala setiap koneksi klien di O(1) dan bukan O(N) (Alice memiliki 2 inbound terowongan yang digunakan oleh semua peer yang sedang berbicara dengan Alice, bukan satu rangkaian untuk masing-masing)"
 
 #: i2p2www/pages/site/comparison/tor.html:161
 msgid ""
 "Unidirectional tunnels instead of bidirectional\n"
 "circuits, doubling the number of nodes a peer has to\n"
 "compromise to get the same information."
-msgstr ""
-"Tunnel searah dan bukan rangkaian dua arah, menggandakan jumlah node peer"
-" harus berkompromi untuk mendapatkan informasi yang sama."
+msgstr "Tunnel searah dan bukan rangkaian dua arah, menggandakan jumlah node peer harus berkompromi untuk mendapatkan informasi yang sama."
 
 #: i2p2www/pages/site/comparison/tor.html:166
 #, python-format
 msgid "Counter-arguments and further discussion <a href=\"%(netdb)s\">here</a>."
-msgstr ""
-"Argumen yang bertentangan dan pembahasan lebih lanjut ada <a "
-"href=\"%(netdb)s\">di sini</a>."
+msgstr "Argumen yang bertentangan dan pembahasan lebih lanjut ada <a href=\"%(netdb)s\">di sini</a>."
 
 #: i2p2www/pages/site/comparison/tor.html:171
 msgid ""
@@ -859,11 +569,7 @@ msgid ""
 "tunnels are used for more than simply passing end \n"
 "to end messages (e.g. netDb, tunnel management, \n"
 "tunnel testing)"
-msgstr ""
-"Perlindungan terhadap mendeteksi aktivitas klien, bahkan saat penyerang "
-"berpartisipasi dalam terowongan karena terowongan digunakan lebih dari "
-"sekedar menyampaikan pesan end-to-end (misalnya netDb, pengelolaan "
-"tunnel, pengujian tunnel)"
+msgstr "Perlindungan terhadap mendeteksi aktivitas klien, bahkan saat penyerang berpartisipasi dalam terowongan karena terowongan digunakan lebih dari sekedar menyampaikan pesan end-to-end (misalnya netDb, pengelolaan tunnel, pengujian tunnel)"
 
 #: i2p2www/pages/site/comparison/tor.html:180
 msgid ""
@@ -871,18 +577,13 @@ msgid ""
 "of samples that an attacker can use to mount an \n"
 "active attack with, unlike circuits in Tor, which are\n"
 "typically long lived."
-msgstr ""
-"Terowongan di I2P berumur pendek, mengurangi jumlah sampel yang dapat "
-"digunakan penyerang untuk memasang serangan aktif, tidak seperti sirkuit "
-"di Tor, yang biasanya berumur panjang."
+msgstr "Terowongan di I2P berumur pendek, mengurangi jumlah sampel yang dapat digunakan penyerang untuk memasang serangan aktif, tidak seperti sirkuit di Tor, yang biasanya berumur panjang."
 
 #: i2p2www/pages/site/comparison/tor.html:188
 msgid ""
 "I2P APIs are designed specifically for anonymity and\n"
 "security, while SOCKS is designed for functionality."
-msgstr ""
-"API I2P dirancang khusus untuk anonimitas dan keamanan, sementara SOCKS "
-"dirancang untuk fungsionalitas."
+msgstr "API I2P dirancang khusus untuk anonimitas dan keamanan, sementara SOCKS dirancang untuk fungsionalitas."
 
 #: i2p2www/pages/site/comparison/tor.html:193
 msgid "Essentially all peers participate in routing for others"
@@ -893,11 +594,7 @@ msgid ""
 "The bandwidth overhead of being a full peer is low, \n"
 "while in Tor, while client nodes don't require much\n"
 "bandwidth, they don't fully participate in the mixnet."
-msgstr ""
-"Pengeluaran tambahan bandwidth dengan menjadi\n"
-"full peer sangat rendah, sementara Tor, ketika simpul\n"
-"klien tidak memerlukan banyak bandwidth, mereka\n"
-"tidak berpartisipasi penuh dalam mixnet."
+msgstr "Pengeluaran tambahan bandwidth dengan menjadi\nfull peer sangat rendah, sementara Tor, ketika simpul\nklien tidak memerlukan banyak bandwidth, mereka\ntidak berpartisipasi penuh dalam mixnet."
 
 #: i2p2www/pages/site/comparison/tor.html:201
 msgid "Integrated automatic update mechanism"
@@ -917,27 +614,20 @@ msgstr "Potensi keuntungan I2P lainnya namun saat ini belum diimplementasikan"
 
 #: i2p2www/pages/site/comparison/tor.html:207
 msgid "...and may never be implemented, so don't count on them!"
-msgstr ""
-"...dan mungkin tidak pernah diimplementasikan, jadi jangan mengandalkan "
-"mereka!"
+msgstr "...dan mungkin tidak pernah diimplementasikan, jadi jangan mengandalkan mereka!"
 
 #: i2p2www/pages/site/comparison/tor.html:210
 msgid ""
 "Defense vs. message count analysis by garlic wrapping \n"
 "multiple messages"
-msgstr ""
-"Pertahanan vs. analisis penghitung pesan dengan membungkus \n"
-"beberapa pesan seperti bawang"
+msgstr "Pertahanan vs. analisis penghitung pesan dengan membungkus \nbeberapa pesan seperti bawang"
 
 #: i2p2www/pages/site/comparison/tor.html:216
 msgid ""
 "Defense vs. long term intersection by adding delays \n"
 "at various hops (where the delays are not discernible\n"
 "by other hops)"
-msgstr ""
-"Pertahanan vs. persimpangan jangka panjang denga \n"
-"menambahkan delay pada berbagai hop (dimana delay\n"
-"tidak terlihat oleh hop lain)"
+msgstr "Pertahanan vs. persimpangan jangka panjang denga \nmenambahkan delay pada berbagai hop (dimana delay\ntidak terlihat oleh hop lain)"
 
 #: i2p2www/pages/site/comparison/tor.html:223
 msgid ""
@@ -945,9 +635,4 @@ msgid ""
 "create a tunnel that will handle 500 messages / minute,\n"
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
-msgstr ""
-"Berbagai strategi pencampuran pada level saluran\n"
-"(misal, membuat saluran yang akan menangani 500 pesan\n"
-"/ menit, yang mana titik akhir akan menginjek pesan dummy\n"
-"jika ada ketidakcukupan pesan, dll)"
-
+msgstr "Berbagai strategi pencampuran pada level saluran\n(misal, membuat saluran yang akan menangani 500 pesan\n/ menit, yang mana titik akhir akan menginjek pesan dummy\njika ada ketidakcukupan pesan, dll)"
diff --git a/i2p2www/translations/id/LC_MESSAGES/misc.po b/i2p2www/translations/id/LC_MESSAGES/misc.po
index cdfb16f663a317074c404342f30b2a8be8b7f6ad..b2b6b401a17193812f383b710365552d8d71f452 100644
--- a/i2p2www/translations/id/LC_MESSAGES/misc.po
+++ b/i2p2www/translations/id/LC_MESSAGES/misc.po
@@ -1,23 +1,23 @@
-# Indonesian translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Khairul Agasta <khairuldroids@gmail.com>, 2014
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-02-12 00:06+0000\n"
-"PO-Revision-Date: 2018-09-09 03:44+0000\n"
-"Last-Translator: Robert Dafis <robertdafis@gmail.com>\n"
-"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)"
-"\n"
-"Plural-Forms: nplurals=1; plural=0\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Khairul Agasta <khairuldroids@gmail.com>, 2014\n"
+"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: id\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/pages/site/misc/clt.html:2
 msgid "I2P at CLT and PetCon 2009.1"
@@ -26,78 +26,39 @@ msgstr "I2P di CLT dan PetCon 2009.1"
 #: i2p2www/pages/site/misc/clt.html:4
 msgid ""
 "Members of I2P will held a talk at CLT and PetCon 2009.1\n"
-"Two members of the I2P team will be at two forthcoming Linux day and "
-"security convention."
-msgstr ""
-"Para anggota I2P akan melakukan perbincangan di CLT dan PetCon 2009.1\n"
-"Dua anggota dari I2P team akan berada di hari Linux dan konvensi keamanan"
-" yang akan datang."
+"Two members of the I2P team will be at two forthcoming Linux day and security convention."
+msgstr "Para anggota I2P akan melakukan perbincangan di CLT dan PetCon 2009.1\nDua anggota dari I2P team akan berada di hari Linux dan konvensi keamanan yang akan datang."
 
 #: i2p2www/pages/site/misc/clt.html:9
 #, python-format
 msgid ""
-"On 14th march of 2009 there will be a short talk about general "
-"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> hold by echelon.\n"
-"Echelon and some other members of the I2P family will attend to the Linux"
-" meeting the whole two days (Saturday and Sunday) and will be "
-"recognizable as I2P family members. Meet them, ask them your questions, "
-"show them your props! Show your support!"
-msgstr ""
-"Pada tanggal 14 maret 2009 akan ada pembicaraan singkat tentang "
-"pengenalan umum I2P di <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009"
-" yang</a> diadakan oleh Echelon.\n"
-"Eselon dan beberapa anggota keuarga I2P lainnya akan menghadiri pertemuan"
-" Linux tersebut selama penuh dua hari (Sabtu dan Minggu) dan akan "
-"dikenali sebagai anggota keluarga I2P. Temui mereka, tanyakan pertanyaan "
-"anda kepada mereka, tunjukkan alat peraga anda! Tunjukkan dukungan anda!"
+"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n"
+"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!"
+msgstr "Pada tanggal 14 maret 2009 akan ada pembicaraan singkat tentang pengenalan umum I2P di <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009 yang</a> diadakan oleh Echelon.\nEselon dan beberapa anggota keuarga I2P lainnya akan menghadiri pertemuan Linux tersebut selama penuh dua hari (Sabtu dan Minggu) dan akan dikenali sebagai anggota keluarga I2P. Temui mereka, tanyakan pertanyaan anda kepada mereka, tunjukkan alat peraga anda! Tunjukkan dukungan anda!"
 
 #: i2p2www/pages/site/misc/clt.html:14
 #, python-format
 msgid ""
-"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security "
-"convention</a> in Dresden will take place.\n"
-"Again, echelon will attend this event and hold a short talk about general"
-" introduction to I2P. Another talk about the profiling by the I2P clients"
-" will be held."
-msgstr ""
-"Baru 10 hari kemudian <a href=\"%(petcon)s\">konvensi Privacy and Data "
-"Security</a> di Dresden akan berlangsung.\n"
-"Sekali lagi, Echelon akan menghadiri acara ini dan mengadakan pembicaraan"
-" singkat tentang pengenalan umum I2P. Pembicaraan lain tentang profiling "
-"oleh klien I2P akan diadakan."
+"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n"
+"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held."
+msgstr "Baru 10 hari kemudian <a href=\"%(petcon)s\">konvensi Privacy and Data Security</a> di Dresden akan berlangsung.\nSekali lagi, Echelon akan menghadiri acara ini dan mengadakan pembicaraan singkat tentang pengenalan umum I2P. Pembicaraan lain tentang profiling oleh klien I2P akan diadakan."
 
 #: i2p2www/pages/site/misc/cvs.html:4
 #, python-format
 msgid ""
-"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a"
-" <a href=\"%(monotone)s\">Monotone</a> repository.\n"
+"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n"
 "For those who aren't very familiar with CVS, there is a\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> "
-"on the\n"
-"subject (developers only need to deal with the first chapter - \"An "
-"Overview of\n"
-"CVS\", as subsequent chapters go into some nasty details very few ever "
-"need to\n"
+"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n"
+"subject (developers only need to deal with the first chapter - \"An Overview of\n"
+"CVS\", as subsequent chapters go into some nasty details very few ever need to\n"
 "touch)."
-msgstr ""
-"Kode sumber I2P disimpan dalam repository CVS. Sekarang, ini disimpan di "
-"repositori <a href=\"%(monotone)s\">Monotone</a> .\n"
-"Bagi mereka yang tidak begitu mengenal CVS, ada sebuah <a "
-"href=\"http://cvsbook.red-bean.com/cvsbook.html\">buku yang bagus</a> "
-"tentang masalah ini (pengembang hanya perlu berurusan dengan bab pertama "
-"- \"An Overview of CVS\", karena bab-bab berikutnya membahas beberapa "
-"rincian rumit yang sangat sedikit yang perlu dilakukan)."
+msgstr "Kode sumber I2P disimpan dalam repository CVS. Sekarang, ini disimpan di repositori <a href=\"%(monotone)s\">Monotone</a> .\nBagi mereka yang tidak begitu mengenal CVS, ada sebuah <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">buku yang bagus</a> tentang masalah ini (pengembang hanya perlu berurusan dengan bab pertama - \"An Overview of CVS\", karena bab-bab berikutnya membahas beberapa rincian rumit yang sangat sedikit yang perlu dilakukan)."
 
 #: i2p2www/pages/site/misc/cvs.html:31
 msgid ""
-"Humorous quote from WinCVS: \"Did you know...  Never experiment with new "
-"CVS\n"
+"Humorous quote from WinCVS: \"Did you know...  Never experiment with new CVS\n"
 "commands on your working repository.  Create a sample module instead.\""
-msgstr ""
-"Kutipan lucu dari WinCVS: \"Tahukah anda ... Jangan pernah bereksperimen "
-"dengan perintah CVS baru di repositori kerja anda.  Buat contoh modul "
-"sebagai gantinya. \""
+msgstr "Kutipan lucu dari WinCVS: \"Tahukah anda ... Jangan pernah bereksperimen dengan perintah CVS baru di repositori kerja anda.  Buat contoh modul sebagai gantinya. \""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4
@@ -108,14 +69,9 @@ msgstr "Migrasi I2PTunnel"
 msgid ""
 "After upgrading to the new architecture, you'll have to do a \n"
 "little work to get your old I2PTunnel-driven servers running.  \n"
-"Lets walk through a simple example.  For an eepsite with the \n"
+"Lets walk through a simple example.  For an I2P Site with the \n"
 "old clientApp configuration, you had:"
 msgstr ""
-"Setelah melakukan upgrade ke arsitektur baru, anda harus melakukan "
-"sedikit pekerjaan untuk memuat bekerja server lama yang dioperasikan oleh"
-" I2PTunnel.  \n"
-"Mari kita mencoba dengan contoh sederhana.  Untuk eepsite dengan "
-"konfigurasi clientApp yang lama, anda sebaiknya:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16
 msgid "To provide that same functionality on the new web architecture:"
@@ -131,12 +87,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\""
 msgstr "Klik pada Add new: [Server tunnel] \"GO\""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21
-msgid "For the name: <code>\"eepsite\"</code>"
-msgstr "Untuk nama: <code>\"eepsite\"</code>"
+msgid "For the name: <code>\"I2P Site\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22
-msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>"
-msgstr "Untuk deskripsi: <code>\"Eepsite saya, cantik bukan?\"</code>"
+msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23
 msgid ">For the target host:"
@@ -150,10 +106,7 @@ msgstr "Untuk target port:"
 msgid ""
 "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n"
 "(it is recommended to copy that .dat to your new install dir)"
-msgstr ""
-"Untuk file kunci pribadi: <code>jalur ke \"myWebPriv.dat\"</code><br /> \n"
-"(direkomendasikan untuk menyalin .dat file tersebut ke direktori "
-"pemasangan anda)"
+msgstr "Untuk file kunci pribadi: <code>jalur ke \"myWebPriv.dat\"</code><br /> \n(direkomendasikan untuk menyalin .dat file tersebut ke direktori pemasangan anda)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29
 msgid "Check the \"Start automatically?\" checkbox"
@@ -169,22 +122,12 @@ msgstr "Dia akan kembali mengatakan:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39
 msgid ""
-"That's it!  Creating a new I2PTunnel server works the same way too, "
-"except you\n"
-"don't need to \"copy the old file\", obviously.  Behind the scenes, it is"
-" all driven\n"
-"by the <code>i2ptunnel.config</code> file, which you may modify "
-"externally (if you do,\n"
-"hit \"Reload config\" on the I2PTunnel web page, which will tear down all"
-" of your \n"
+"That's it!  Creating a new I2PTunnel server works the same way too, except you\n"
+"don't need to \"copy the old file\", obviously.  Behind the scenes, it is all driven\n"
+"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n"
+"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n"
 "existing tunnels and rebuild new ones)"
-msgstr ""
-"Itu saja!  Membuat server I2PTunnel baru dikerjakan dengan cara yang sama"
-" juga, kecuali tentu saja anda tidak perlu \"menyalin file lama\".  Di "
-"balik layar, semua digerakkan oleh file <code>i2ptunnel.config</code> , "
-"yang dapat anda modifikasi secara eksternal (jika anda melakukannya, "
-"tekan \"Reload config\" di halaman web I2PTunnel, yang akan merobohkan "
-"semua tunnel yang ada dan membangun kembali yang baru)"
+msgstr "Itu saja!  Membuat server I2PTunnel baru dikerjakan dengan cara yang sama juga, kecuali tentu saja anda tidak perlu \"menyalin file lama\".  Di balik layar, semua digerakkan oleh file <code>i2ptunnel.config</code> , yang dapat anda modifikasi secara eksternal (jika anda melakukannya, tekan \"Reload config\" di halaman web I2PTunnel, yang akan merobohkan semua tunnel yang ada dan membangun kembali yang baru)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47
 msgid ""
@@ -193,20 +136,15 @@ msgid ""
 "interface.  It will say \"Please be patient\" if you try to \n"
 "beforehand, which means that it is still trying to build the \n"
 "necessary I2PTunnel sessions it has been configured to create."
-msgstr ""
-"Perhatikan bahwa anda AKAN perlu menunggu sampai router anda terintegrasi"
-" ke dalam jaringan sebelum anda dapat menggunakan antarmuka "
-"/i2ptunnel/web.  Dia akan mengatakan \"Mohon bersabar\" jika anda mencoba"
-" sebelumnya, yang berarti dia masih berusaha membangun sesi I2PTunnel "
-"yang diperlukan yang telah dikonfigurasi untuk dibuat."
+msgstr "Perhatikan bahwa anda AKAN perlu menunggu sampai router anda terintegrasi ke dalam jaringan sebelum anda dapat menggunakan antarmuka /i2ptunnel/web.  Dia akan mengatakan \"Mohon bersabar\" jika anda mencoba sebelumnya, yang berarti dia masih berusaha membangun sesi I2PTunnel yang diperlukan yang telah dikonfigurasi untuk dibuat."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:2
 msgid "I2PTunnel services"
 msgstr "I2PTunnel service"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:4
-msgid "Below is quick copy of aum's eepsite deployment guide."
-msgstr "Berikut adalah salinan cepat panduan penyebaran eepsite Aum."
+msgid "Below is quick copy of aum's I2P Site deployment guide."
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:8
 msgid "1. - Deploy a local server"
@@ -217,68 +155,48 @@ msgid ""
 "For simplicity's sake, we will walk through the setup of a web server; "
 "however, this procedure is the same regardless what protocol of servers "
 "and/or clients you are setting up."
-msgstr ""
-"Demi kesederhanaan, kita akan menjalankan setup server web; namun, "
-"prosedur ini sama terlepas dari protokol server dan/atau klien yang anda "
-"siapkan."
+msgstr "Demi kesederhanaan, kita akan menjalankan setup server web; namun, prosedur ini sama terlepas dari protokol server dan/atau klien yang anda siapkan."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:13
 msgid ""
-"I recommend the Tiny Httpd web server, thttpd, (windows version available"
-" on site) although you can use anything that you feel comfortable with."
-msgstr ""
-"Saya sarankan server web Tiny Httpd, thttpd, (versi windows tersedia di "
-"situs) meskipun anda dapat menggunakan apa pun yang anda merasa nyaman."
+"I recommend the Tiny Httpd web server, thttpd, (windows version available on"
+" site) although you can use anything that you feel comfortable with."
+msgstr "Saya sarankan server web Tiny Httpd, thttpd, (versi windows tersedia di situs) meskipun anda dapat menggunakan apa pun yang anda merasa nyaman."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:16
 msgid ""
 "Another more robust option would be to use EasyPHP, which is also open "
 "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For "
-"newbies who have no experience setting up and hosting content over "
-"servers, see the hosting page for help."
-msgstr ""
-"Pilihan lain yang lebih lengkap adalah menggunakan EasyPHP, yang juga "
-"merupakan open source. Ini berisi PHPmyadmin, PHP, mySQL, dan Apache web "
-"server. Untuk pemula yang tidak memiliki pengalaman pengaturan dan "
-"hosting konten di dalam server, lihat halaman hosting untuk bantuan."
+"newbies who have no experience setting up and hosting content over servers, "
+"see the hosting page for help."
+msgstr "Pilihan lain yang lebih lengkap adalah menggunakan EasyPHP, yang juga merupakan open source. Ini berisi PHPmyadmin, PHP, mySQL, dan Apache web server. Untuk pemula yang tidak memiliki pengalaman pengaturan dan hosting konten di dalam server, lihat halaman hosting untuk bantuan."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:19
 msgid ""
-"With the web server you've chosen, configure it to listen on a port of "
-"your choice, and serve its documents from a directory of your choice. For"
-" this example, we'll assume port 10880."
-msgstr ""
-"Dengan server web yang dipilih, konfigurasinya untuk mendengarkan pada "
-"port pilihan anda, dan melayani dokumennya dari direktori pilihan anda. "
-"Untuk contoh ini, kita berasumsi port yang digunakan adalah 10880."
+"With the web server you've chosen, configure it to listen on a port of your "
+"choice, and serve its documents from a directory of your choice. For this "
+"example, we'll assume port 10880."
+msgstr "Dengan server web yang dipilih, konfigurasinya untuk mendengarkan pada port pilihan anda, dan melayani dokumennya dari direktori pilihan anda. Untuk contoh ini, kita berasumsi port yang digunakan adalah 10880."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:22
 msgid ""
 "Make sure your firewall is set up so that you cannot receive incoming "
 "connections on this port (which would breach your anonymity)."
-msgstr ""
-"Pastikan bahwa firewall anda diatur sehingga anda tidak bisa menerima "
-"koneksi masuk pada port ini (yang akan menghilangkan anonimitas anda)."
+msgstr "Pastikan bahwa firewall anda diatur sehingga anda tidak bisa menerima koneksi masuk pada port ini (yang akan menghilangkan anonimitas anda)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:25
 msgid ""
 "Test the webserver, by pointing your normal browser (the one with the "
 "\"direct connection\") at <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the "
-"port number you have chosen)."
-msgstr ""
-"Uji webserver dengan menunjuk webrowser biasa (yang punya \"direct "
-"connection\") pada <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (ubah 10880 menjadi nomor "
-"port yang anda pilih)."
+"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port"
+" number you have chosen)."
+msgstr "Uji webserver dengan menunjuk webrowser biasa (yang punya \"direct connection\") pada <a href=\"http://localhost:10880\" target=\"_blank\">http://localhost:10880</a> (ubah 10880 menjadi nomor port yang anda pilih)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:28
 msgid ""
 "Once your webserver is working, and you can access it locally with your "
 "browser, continue to the next step."
-msgstr ""
-"Ketika webserver anda berfungsi, dan anda dapat mengaksesnya secara lokal"
-" dengan browser anda, lanjutkan ke langkah berikutnya."
+msgstr "Ketika webserver anda berfungsi, dan anda dapat mengaksesnya secara lokal dengan browser anda, lanjutkan ke langkah berikutnya."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:33
 msgid "2 - Generate an I2P Destination Keypair"
@@ -286,45 +204,29 @@ msgstr "2 - Buat Keypair Destinasi I2P"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:35
 msgid ""
-"I2P does not deal in IP addresses. To protect your anonymity, it deals in"
-" unique addresses called destination keys."
-msgstr ""
-"I2p tidak berurusan dengan alamat IP. Untuk melindungi anonimitas anda, "
-"I2P berhubungan dengan alamat unik yang disebut destination key."
+"I2P does not deal in IP addresses. To protect your anonymity, it deals in "
+"unique addresses called destination keys."
+msgstr "I2p tidak berurusan dengan alamat IP. Untuk melindungi anonimitas anda, I2P berhubungan dengan alamat unik yang disebut destination key."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:38
 msgid ""
 "A destination key works a lot like a regular IP address, except that it "
-"can't be traced to your IP address or physical location. When users place"
-" a request to speak with you, your gateways are the ones that answer for "
-"you. So the requesting user can only know the IP address of your "
-"gateways. However, gateways don't know your IP address, because gateways "
-"are the last nodes on your tunnels, and you anonymously create tunnels by"
-" way of garlic routing. (So gateways are like puppets that can't see "
-"their masters, and everyone communicates through these puppets)"
-msgstr ""
-"Destination key bekerja seperti alamat IP yang biasa, kecuali bahwa itu "
-"tidak dapat ditelusuri ke alamat IP atau lokasi fisik anda. Ketika "
-"pengguna membuat permintaan untuk berbicara dengan anda, gateway adalah "
-"pihak-pihak yang menjawab untuk anda. Jadi pengguna hanya dapat tahu "
-"alamat IP Gateway anda. Namun, aateway tidak tahu alamat IP anda, karena "
-"gateway adalah simpul-simpul terakhir pada terowongan, dan anda secara "
-"anonim membuat tunnel dengan garlic routing. (Jadi Gateway adalah seperti"
-" boneka yang tidak dapat melihat tuan mereka, dan semua orang "
-"berkomunikasi melalui boneka ini)"
+"can't be traced to your IP address or physical location. When users place a "
+"request to speak with you, your gateways are the ones that answer for you. "
+"So the requesting user can only know the IP address of your gateways. "
+"However, gateways don't know your IP address, because gateways are the last "
+"nodes on your tunnels, and you anonymously create tunnels by way of garlic "
+"routing. (So gateways are like puppets that can't see their masters, and "
+"everyone communicates through these puppets)"
+msgstr "Destination key bekerja seperti alamat IP yang biasa, kecuali bahwa itu tidak dapat ditelusuri ke alamat IP atau lokasi fisik anda. Ketika pengguna membuat permintaan untuk berbicara dengan anda, gateway adalah pihak-pihak yang menjawab untuk anda. Jadi pengguna hanya dapat tahu alamat IP Gateway anda. Namun, aateway tidak tahu alamat IP anda, karena gateway adalah simpul-simpul terakhir pada terowongan, dan anda secara anonim membuat tunnel dengan garlic routing. (Jadi Gateway adalah seperti boneka yang tidak dapat melihat tuan mereka, dan semua orang berkomunikasi melalui boneka ini)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:41
 msgid ""
 "To deploy a server on I2P, you create a destination keypair. You use the "
-"private key to authenticate your server when connecting it to I2P, and "
-"you make the public key (aka destination key) known publicly, so others "
-"can connect to your server. (indirectly, through your gateways)"
-msgstr ""
-"Untuk menggunakan server pada I2P, anda membuat destination keypair. Anda"
-" menggunakan private key untuk mengotentikasi server anda saat tersambung"
-" ke I2P, dan anda membuat public key (alias destination key) yang dikenal"
-" publik, sehingga orang lain dapat terhubung ke server anda. (tidak "
-"langsung, melalui gateway)"
+"private key to authenticate your server when connecting it to I2P, and you "
+"make the public key (aka destination key) known publicly, so others can "
+"connect to your server. (indirectly, through your gateways)"
+msgstr "Untuk menggunakan server pada I2P, anda membuat destination keypair. Anda menggunakan private key untuk mengotentikasi server anda saat tersambung ke I2P, dan anda membuat public key (alias destination key) yang dikenal publik, sehingga orang lain dapat terhubung ke server anda. (tidak langsung, melalui gateway)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:44
 msgid "Each service you run on I2P requires a different keypair."
@@ -335,75 +237,52 @@ msgid ""
 "To generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code> (all on one line)"
-msgstr ""
-"Untuk menghasilkan keypair anda, ketik perintah: <code>java -jar "
-"lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
-"myWebPubKey.dat\"</code> (semua pada satu baris)"
+msgstr "Untuk menghasilkan keypair anda, ketik perintah: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code> (semua pada satu baris)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:50
 msgid ""
 "In windows, to generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code>"
-msgstr ""
-"Di Windows, untuk menghasilkan keypair anda, ketik perintah:<code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
-"myWebPubKey.dat\"</code>"
+msgstr "Di Windows, untuk menghasilkan keypair anda, ketik perintah:<code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:53
 msgid ""
-"The filenames <code>myWebPrivKey.dat</code> and "
-"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want "
-"here, as long as you understand your own choices."
-msgstr ""
-"Nama file <code>myWebPrivKey.dat</code> dan <code>myWebPubKey.dat</code> "
-"adalah arbitrary - pilih apapun yang anda inginkan di sini, asalkan anda "
-"memahami pilihan anda sendiri."
+"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>"
+" are arbitrary - choose whatever you want here, as long as you understand "
+"your own choices."
+msgstr "Nama file <code>myWebPrivKey.dat</code> dan <code>myWebPubKey.dat</code> adalah arbitrary - pilih apapun yang anda inginkan di sini, asalkan anda memahami pilihan anda sendiri."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:56
 msgid ""
 "We now need to export your public key into base64 format, which you will "
 "share with others."
-msgstr ""
-"Kita sekarang perlu untuk ekspor kunci publik ke format base64, yang anda"
-" akan bagikan dengan orang lain."
+msgstr "Kita sekarang perlu untuk ekspor kunci publik ke format base64, yang anda akan bagikan dengan orang lain."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:59
 msgid ""
-"To convert your myWebPubKey.dat file into shareable base64, type the "
-"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (all on one line)."
-msgstr ""
-"Untuk mengkonversi myWebPubKey.dat ke dalam shareable base64, ketik "
-"perintah <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat > myWebPubKey.txt</code> (semua pada satu baris)."
+"To convert your myWebPubKey.dat file into shareable base64, type the command"
+" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; "
+"myWebPubKey.txt</code> (all on one line)."
+msgstr "Untuk mengkonversi myWebPubKey.dat ke dalam shareable base64, ketik perintah <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > myWebPubKey.txt</code> (semua pada satu baris)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:62
 msgid ""
-"This file you have just generated, <code>myWebPubKey.txt</code>, contains"
-" a long base64 string (516 chars at last count), which we call a "
-"destination key. All you need to know about this string for now is that "
-"it allows remote clients to uniquely pinpoint and connect to your server,"
-" just the same way as an IP address allows remote machines to pinpoint "
-"and connect to your machine."
-msgstr ""
-"File yang dihasilkan, <code>myWebPubKey.txt</code> , berisi string base64"
-" panjang (516 karakter di hitungan terakhir), yang disebut sebagai "
-"destination key. Anda hanya perlu tahu tentang string ini untuk saat ini "
-"adalah bahwa hal itu memungkinkan remote klien untuk unik menemukan dan "
-"terhubung ke server anda, sama seperti alamat IP memungkinkan mesin "
-"remote untuk mencari dan terhubung ke mesin anda."
+"This file you have just generated, <code>myWebPubKey.txt</code>, contains a "
+"long base64 string (516 chars at last count), which we call a destination "
+"key. All you need to know about this string for now is that it allows remote"
+" clients to uniquely pinpoint and connect to your server, just the same way "
+"as an IP address allows remote machines to pinpoint and connect to your "
+"machine."
+msgstr "File yang dihasilkan, <code>myWebPubKey.txt</code> , berisi string base64 panjang (516 karakter di hitungan terakhir), yang disebut sebagai destination key. Anda hanya perlu tahu tentang string ini untuk saat ini adalah bahwa hal itu memungkinkan remote klien untuk unik menemukan dan terhubung ke server anda, sama seperti alamat IP memungkinkan mesin remote untuk mencari dan terhubung ke mesin anda."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:65
 msgid ""
 "However, in contrast to an IP address, there is no way to trace your "
-"machine's physical location - even though your server can be addressed "
-"via I2P, your IP address cannot be traced or associated with this "
-"destination key."
-msgstr ""
-"Namun, tidak seperti alamat IP, tidak ada cara untuk melacak lokasi fisik"
-" mesin anda - meskipun server anda bisa terhubung via I2P, alamat IP anda"
-" tidak dapat ditelusuri atau terkait dengan destination key ini."
+"machine's physical location - even though your server can be addressed via "
+"I2P, your IP address cannot be traced or associated with this destination "
+"key."
+msgstr "Namun, tidak seperti alamat IP, tidak ada cara untuk melacak lokasi fisik mesin anda - meskipun server anda bisa terhubung via I2P, alamat IP anda tidak dapat ditelusuri atau terkait dengan destination key ini."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:70
 msgid "3 - Open a 'Tunnel' from I2P To Your Server"
@@ -411,52 +290,37 @@ msgstr "3 - buka sebuah 'tunnel' dari I2P ke server anda"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:72
 msgid ""
-"For clients elsewhere in I2P to be able to access your server, you must "
-"run a 'bridge' or 'tunnel', which takes connections from these clients "
-"and forwards them to your local server."
-msgstr ""
-"Supaya klien lain di I2P mampu mengakses server anda, anda harus "
-"menjalankan 'bridge' atau 'tunnel', yang membutuhkan koneksi dari klien "
-"tersebut dan meneruskan mereka ke server lokal anda."
+"For clients elsewhere in I2P to be able to access your server, you must run "
+"a 'bridge' or 'tunnel', which takes connections from these clients and "
+"forwards them to your local server."
+msgstr "Supaya klien lain di I2P mampu mengakses server anda, anda harus menjalankan 'bridge' atau 'tunnel', yang membutuhkan koneksi dari klien tersebut dan meneruskan mereka ke server lokal anda."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:75
 msgid ""
 "To activate such a tunnel, type the command <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code> (all one line)."
-msgstr ""
-"Untuk mengaktifkan tunnel seperti itu, ketik perintah <code>java -jar "
-"lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
-"myWebPrivKey.dat\"</code> (semua satu baris)."
+msgstr "Untuk mengaktifkan tunnel seperti itu, ketik perintah <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code> (semua satu baris)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:78
 msgid ""
 "If you used different filenames or port number earlier on, change these "
 "accordingly"
-msgstr ""
-"Jika Anda menggunakan nama file atau nomor port syang berbeda sebelumnya,"
-" ubah sesuai nama tersebut"
+msgstr "Jika Anda menggunakan nama file atau nomor port syang berbeda sebelumnya, ubah sesuai nama tersebut"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:81
 msgid ""
 "Windows users, remember to replace apostrophes with double quotes. Thus: "
 "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code>"
-msgstr ""
-"Pengguna Windows, ingatlah untuk mengganti tanda kutip tunggal dengan "
-"tanda kutip ganda. Dengan demikian:<code>java -jar lib/i2ptunnel.jar "
-"-nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>"
+msgstr "Pengguna Windows, ingatlah untuk mengganti tanda kutip tunggal dengan tanda kutip ganda. Dengan demikian:<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:84
 msgid ""
-"Within a few seconds, the 'tunnel' should now be active, and remote "
-"clients should be able to reach your server anonymously. Remember to let "
-"your router \"warm up\" before opening clients to it."
-msgstr ""
-"Dalam beberapa detik, 'tunnel' tersebut sekarang seharusnya aktif, dan "
-"remote klien seharusnya dapat mencapai server anda secara anonim. "
-"Ingatlah untuk membiarkan router anda melakukan \"warming up\" sebelum "
-"membuka tunnel kepada klien itu."
+"Within a few seconds, the 'tunnel' should now be active, and remote clients "
+"should be able to reach your server anonymously. Remember to let your router"
+" \"warm up\" before opening clients to it."
+msgstr "Dalam beberapa detik, 'tunnel' tersebut sekarang seharusnya aktif, dan remote klien seharusnya dapat mencapai server anda secara anonim. Ingatlah untuk membiarkan router anda melakukan \"warming up\" sebelum membuka tunnel kepada klien itu."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:89
 msgid "4 - Update Your hosts.txt File "
@@ -468,31 +332,21 @@ msgid ""
 "hosts.txt file, so I2P can translate the simple URL you place in the "
 "browser's address bar into the full public key text needed to find your "
 "server."
-msgstr ""
-"Untuk menguji server anda sendiri secara lokal, anda harus membuat entri "
-"di file hosts.txt anda, sehingga I2P dapat menerjemahkan URL sederhana "
-"yang Andaatempatkan di address bar web browser ke teks public key penuh "
-"yang diperlukan untuk menemukan server anda."
+msgstr "Untuk menguji server anda sendiri secara lokal, anda harus membuat entri di file hosts.txt anda, sehingga I2P dapat menerjemahkan URL sederhana yang Andaatempatkan di address bar web browser ke teks public key penuh yang diperlukan untuk menemukan server anda."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:94
 msgid ""
 "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where "
-"myserver.i2p is an I2P 'domain' you want to associate with your site, and"
-" the blahblahblah is the text of the base64 public key you created "
-"earlier in the file myWebPubKey.txt"
-msgstr ""
-"Edit hosts.txt anda, dan tambahkan baris myserver.i2p=blahblahblah, yang "
-"mana myserver.i2p adalah 'domain' I2P anda yang anda ingin "
-"mengasosiasikan dengan situs anda, dan blablabla adalah teks dari base64 "
-"public key yang anda buat sebelumnya dalam file myWebPubKey.txt"
+"myserver.i2p is an I2P 'domain' you want to associate with your site, and "
+"the blahblahblah is the text of the base64 public key you created earlier in"
+" the file myWebPubKey.txt"
+msgstr "Edit hosts.txt anda, dan tambahkan baris myserver.i2p=blahblahblah, yang mana myserver.i2p adalah 'domain' I2P anda yang anda ingin mengasosiasikan dengan situs anda, dan blablabla adalah teks dari base64 public key yang anda buat sebelumnya dalam file myWebPubKey.txt"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:97
 msgid ""
 "With this in place, you and others can reach your server with the simple "
 "domain name myserver.i2p in the browser's address bar."
-msgstr ""
-"Dengan ini , anda dan orang lain dapat mencapai server anda dengan nama "
-"domain sederhana myserver.i2p di address bar di browser."
+msgstr "Dengan ini , anda dan orang lain dapat mencapai server anda dengan nama domain sederhana myserver.i2p di address bar di browser."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:102
 msgid "5 - Surf Your Site Within I2P"
@@ -503,10 +357,7 @@ msgid ""
 "Using your secondary browser - the one you earlier configured to use "
 "localhost:4444 as a proxy - point this browser to the address <a "
 "href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>"
-msgstr ""
-"Gunakan browser yang lain - yang sebelumnya dikonfigurasi untuk "
-"menggunakan localhost:4444 sebagai proxy - arahkan browser ini ke alamat "
-"<a href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>"
+msgstr "Gunakan browser yang lain - yang sebelumnya dikonfigurasi untuk menggunakan localhost:4444 sebagai proxy - arahkan browser ini ke alamat <a href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:107
 msgid "You should see the main page of your webserver come up."
@@ -522,60 +373,43 @@ msgstr "Kita sekarang harus berpikir di luar web server."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:117
 msgid ""
-"As you grow into I2P and get more of a 'feel' for it, you will want to "
-"use all manner of servers and clients."
-msgstr ""
-"Ketika anda mulai menyukai I2P dan mendapatkan 'feeling' untuk itu, anda "
-"akan ingin untuk menggunakan segala macam server dan klien."
+"As you grow into I2P and get more of a 'feel' for it, you will want to use "
+"all manner of servers and clients."
+msgstr "Ketika anda mulai menyukai I2P dan mendapatkan 'feeling' untuk itu, anda akan ingin untuk menggunakan segala macam server dan klien."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:120
 msgid ""
-"The beauty of I2P is that it allows standard Internet clients and servers"
-" for most protocols to be transparently 'tunneled' through the anonymous "
+"The beauty of I2P is that it allows standard Internet clients and servers "
+"for most protocols to be transparently 'tunneled' through the anonymous "
 "network."
-msgstr ""
-"Keindahan I2P adalah bahwa hal itu memungkinkan Internet klien dan server"
-" standar untuk kebanyakan protokol, untuk menjadi 'tunneled' melalui "
-"jaringan anonim secara transparan."
+msgstr "Keindahan I2P adalah bahwa hal itu memungkinkan Internet klien dan server standar untuk kebanyakan protokol, untuk menjadi 'tunneled' melalui jaringan anonim secara transparan."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:123
 msgid ""
-"You can run mailservers/clients, nameservers/clients, newsservers/clients"
-" - almost anything at all - perhaps even FTP in passive mode."
-msgstr ""
-"Anda dapat menjalankan mailservers / clients, nameserver / clients, "
-"newsservers / clients - hampir semuanya - bahkan mungkin FTP dalam mode "
-"pasif."
+"You can run mailservers/clients, nameservers/clients, newsservers/clients - "
+"almost anything at all - perhaps even FTP in passive mode."
+msgstr "Anda dapat menjalankan mailservers / clients, nameserver / clients, newsservers / clients - hampir semuanya - bahkan mungkin FTP dalam mode pasif."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:126
 msgid ""
-"Now, we'll create a client tunnel. This is like the server tunnel we "
-"created earlier, but works in reverse. It listens to a port on your local"
-" machine; your local client connects to this port; the connection gets "
-"forwarded through I2P to the service on the other end."
-msgstr ""
-"Sekarang, kita akan membuat tunnel klien. Ini seperti tunnel server yang "
-"kita buat tadi, tapi bekerja terbalik. Ini mendengarkan port di komputer "
-"lokal anda; klien lokal anda terhubung ke port ini; koneksi akan "
-"diteruskan melalui I2P ke service di ujung yang lain."
+"Now, we'll create a client tunnel. This is like the server tunnel we created"
+" earlier, but works in reverse. It listens to a port on your local machine; "
+"your local client connects to this port; the connection gets forwarded "
+"through I2P to the service on the other end."
+msgstr "Sekarang, kita akan membuat tunnel klien. Ini seperti tunnel server yang kita buat tadi, tapi bekerja terbalik. Ini mendengarkan port di komputer lokal anda; klien lokal anda terhubung ke port ini; koneksi akan diteruskan melalui I2P ke service di ujung yang lain."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:129
 msgid ""
-"To open your client tunnel for your server, type the command <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (all one line)."
-msgstr ""
-"Untuk membuka tunnel klien anda untuk server anda, ketik perintah "
-"<code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e "
-"\"client 10888 textofbase64key\"</code> (semua satu baris)."
+"To open your client tunnel for your server, type the command <code>java -jar"
+" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 "
+"textofbase64key\"</code> (all one line)."
+msgstr "Untuk membuka tunnel klien anda untuk server anda, ketik perintah <code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 textofbase64key\"</code> (semua satu baris)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:132
 msgid ""
-"The port 10888 is arbitrary - it just needs to be something other than "
-"the physical port your server is listening on."
-msgstr ""
-"Port 10888 dapat diubah - hanya perlu hal selain port fisik yang "
-"didengarkan server anda."
+"The port 10888 is arbitrary - it just needs to be something other than the "
+"physical port your server is listening on."
+msgstr "Port 10888 dapat diubah - hanya perlu hal selain port fisik yang didengarkan server anda."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:135
 msgid ""
@@ -583,30 +417,20 @@ msgid ""
 "myWebPubKey.txt, reproduced fully on one line (alternately, instead of "
 "textofbase64key, you can specify the name from your hosts.txt - e.g. "
 "myserver.i2p)"
-msgstr ""
-"textofbase64key hanyalah isi dari file teks public key untuk "
-"myWebPubKey.txt, direproduksi sepenuhnya pada satu baris (sebaliknya, "
-"alih-alih textofbase64key, anda dapat menentukan namanya dari hosts.txt -"
-" misal myserver.i2p)"
+msgstr "textofbase64key hanyalah isi dari file teks public key untuk myWebPubKey.txt, direproduksi sepenuhnya pada satu baris (sebaliknya, alih-alih textofbase64key, anda dapat menentukan namanya dari hosts.txt - misal myserver.i2p)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:138
 msgid ""
 "Within a minute or two of launching this command, the client tunnel from "
 "your local machine into I2P will be open and ready for use."
-msgstr ""
-"Dalam satu atau dua menit peluncuran perintah ini, tunnel klien akan "
-"terbuka dari mesin lokal anda ke I2P dan siap digunakan."
+msgstr "Dalam satu atau dua menit peluncuran perintah ini, tunnel klien akan terbuka dari mesin lokal anda ke I2P dan siap digunakan."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:141
 msgid ""
 "Point your regular web browser (ie, not the one you configured to use "
 "localhost:4444), and point it to <a href=\"http://localhost:10888\" "
 "target=\"_blank\">http://localhost:10888</a>"
-msgstr ""
-"Arahkan browser web biasa anda (misalnya, bukan yang anda konfigurasikan "
-"untuk menggunakan localhost: 4444), dan arahkan ke <a "
-"href=\"http://localhost:10888\" target=\"_blank\">http: // localhost: "
-"10888</a>"
+msgstr "Arahkan browser web biasa anda (misalnya, bukan yang anda konfigurasikan untuk menggunakan localhost: 4444), dan arahkan ke <a href=\"http://localhost:10888\" target=\"_blank\">http: // localhost: 10888</a>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:144
 msgid ""
@@ -616,17 +440,11 @@ msgstr "Pastikan halaman utama server anda akhirnya muncul di browser anda."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:147
 msgid ""
-"You use the same procedure for using any local client program to access a"
-" remote I2P server - just get the base64 public key (called destination "
-"key) of the remote server, choose a local port to connect to the remote "
-"server, open the tunnel, and just connect with your client to your "
-"heart's content."
-msgstr ""
-"Anda menggunakan prosedur yang sama untuk menggunakan program klien lokal"
-" manapun untuk mengakses server I2P jarak jauh - cukup dapatkan public "
-"key base64 (disebut destinantion key) dari server jarak jauh, pilih port "
-"lokal untuk terhubung ke server jarak jauh, buka tunnel, dan hubungkan "
-"saja dengan klien anda sesuka hati Anda."
+"You use the same procedure for using any local client program to access a "
+"remote I2P server - just get the base64 public key (called destination key) "
+"of the remote server, choose a local port to connect to the remote server, "
+"open the tunnel, and just connect with your client to your heart's content."
+msgstr "Anda menggunakan prosedur yang sama untuk menggunakan program klien lokal manapun untuk mengakses server I2P jarak jauh - cukup dapatkan public key base64 (disebut destinantion key) dari server jarak jauh, pilih port lokal untuk terhubung ke server jarak jauh, buka tunnel, dan hubungkan saja dengan klien anda sesuka hati Anda."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:152
 msgid "7 - Share your server details with others"
@@ -636,46 +454,26 @@ msgstr "7 - Bagikan rincian server anda dengan orang lain"
 msgid ""
 "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's "
 "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. "
-"Others will then be able to reach your server remotely, without either of"
-" you jeopardizing your anonymity."
-msgstr ""
-"Menggunakan media anonim (misalnya server I2P IRC atau wiki ugha), <a "
-"href=\"http://www.mynick.i2p\" target=\"_blank\">kirimkan</a> nama domain"
-" anda (misalnya <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> dan juga destination key anda. Orang"
-" lain kemudian dapat menjangkau server anda dari jarak jauh, tanpa "
-"membahayakan anonimitas anda."
+"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others"
+" will then be able to reach your server remotely, without either of you "
+"jeopardizing your anonymity."
+msgstr "Menggunakan media anonim (misalnya server I2P IRC atau wiki ugha), <a href=\"http://www.mynick.i2p\" target=\"_blank\">kirimkan</a> nama domain anda (misalnya <a href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a> dan juga destination key anda. Orang lain kemudian dapat menjangkau server anda dari jarak jauh, tanpa membahayakan anonimitas anda."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:157
 msgid ""
-"Remember, you can go to What's on I2P and find the latest public keys "
-"linked to their URL. You should also post your own public key and URL "
-"their. However, you will want to do this anonymously, of course. "
-"Drupal.i2p.net is currently, as of this writing, only accessible from the"
-" net. So, to access the outside WWW anonymously from inside of I2P, you "
-"will need to start up your script called startSquid. Do it the same way "
-"you have been doing these other scripts. Reconfigure your browser to "
-"proxy on localhost:5555, as defined in the script, and when the script "
-"has generated it's keys, you can access the squid proxy. Put any WWW URL "
-"(such as Google or this i2p site) into your browser's address bar and you"
-" will be surfing the World Wide Web anonymously. Now you can safely post "
-"your public key, and no one can detect your IP address."
-msgstr ""
-"Ingat, anda bisa masuk ke What's on I2P dan menemukan public key terbaru "
-"yang terkait dengan URL mereka. Anda juga sebaiknya memposting public key"
-" anda sendiri dan URL mereka. Namun, anda pasti ingin melakukan hal ini "
-"secara anonim, tentu saja. Drupal.i2p.net saat ini, seperti tulisan ini, "
-"hanya bisa diakses dari internet. Jadi, untuk mengakses WWW luar secara "
-"anonim dari dalam I2P, anda perlu memulai skrip anda yang disebut "
-"startSquid. Lakukan dengan cara yang sama seperti anda telah menjalainkan"
-" skrip lain. Konfigurasikan ulang browser anda ke proxy di localhost: "
-"5555, seperti yang didefinisikan dalam skrip, dan saat skrip telah "
-"menghasilkan kunci itu, anda dapat mengakses proxy squid. Letakkan URL "
-"WWW (seperti Google atau situs i2p ini) ke bilah alamat browser anda dan "
-"Anda akan berselancar di World Wide Web secara anonim. Sekarang anda "
-"dapat memposting kunci publik anda dengan aman, dan tidak ada yang bisa "
-"mendeteksi alamat IP Anda."
+"Remember, you can go to What's on I2P and find the latest public keys linked"
+" to their URL. You should also post your own public key and URL their. "
+"However, you will want to do this anonymously, of course. Drupal.i2p.net is "
+"currently, as of this writing, only accessible from the net. So, to access "
+"the outside WWW anonymously from inside of I2P, you will need to start up "
+"your script called startSquid. Do it the same way you have been doing these "
+"other scripts. Reconfigure your browser to proxy on localhost:5555, as "
+"defined in the script, and when the script has generated it's keys, you can "
+"access the squid proxy. Put any WWW URL (such as Google or this i2p site) "
+"into your browser's address bar and you will be surfing the World Wide Web "
+"anonymously. Now you can safely post your public key, and no one can detect "
+"your IP address."
+msgstr "Ingat, anda bisa masuk ke What's on I2P dan menemukan public key terbaru yang terkait dengan URL mereka. Anda juga sebaiknya memposting public key anda sendiri dan URL mereka. Namun, anda pasti ingin melakukan hal ini secara anonim, tentu saja. Drupal.i2p.net saat ini, seperti tulisan ini, hanya bisa diakses dari internet. Jadi, untuk mengakses WWW luar secara anonim dari dalam I2P, anda perlu memulai skrip anda yang disebut startSquid. Lakukan dengan cara yang sama seperti anda telah menjalainkan skrip lain. Konfigurasikan ulang browser anda ke proxy di localhost: 5555, seperti yang didefinisikan dalam skrip, dan saat skrip telah menghasilkan kunci itu, anda dapat mengakses proxy squid. Letakkan URL WWW (seperti Google atau situs i2p ini) ke bilah alamat browser anda dan Anda akan berselancar di World Wide Web secara anonim. Sekarang anda dapat memposting kunci publik anda dengan aman, dan tidak ada yang bisa mendeteksi alamat IP Anda."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:162
 msgid "8 - Write Some Scripts To Handle All This Menial Nonsense"
@@ -683,11 +481,9 @@ msgstr "8 - Tuliskan Beberapa Skrip untuk Menangani Semua Hal-hal Sepele Ini"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:164
 msgid ""
-"It would drive most people crazy, going through all these steps every "
-"time one sets up an I2P server, and/or deploys a client."
-msgstr ""
-"Ini akan membuat kebanyakan orang menjadi gila, melakukan semua langkah "
-"ini setiap kali seseorang membuat server I2P, dan / atau membuat klien."
+"It would drive most people crazy, going through all these steps every time "
+"one sets up an I2P server, and/or deploys a client."
+msgstr "Ini akan membuat kebanyakan orang menjadi gila, melakukan semua langkah ini setiap kali seseorang membuat server I2P, dan / atau membuat klien."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:167
 msgid ""
@@ -695,43 +491,28 @@ msgid ""
 "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called "
 "setupServer.py which automates all this nonsense into one simple command "
 "line . But I respect that people's tastes in user interfaces differ, and "
-"trying to write something which satisfies everyone's needs usually "
-"results in something so complex that it turns into newbie-repellent."
-msgstr ""
-"Situs web milik Aum <a href=\"http://www.freenet.org.nz/i2p/\" "
-"target=\"_blank\">http://www.freenet.org.nz/i2p/</a> memiliki skrip yang "
-"disebut setupServer.py yang mengotomatisasi semua omong kosong ini "
-"menjadi satu baris perintah sederhana. Tapi saya menghargai selera "
-"masing-masing orang dalam antarmuka pengguna, dan mencoba menulis sesuatu"
-" yang memenuhi kebutuhan setiap orang biasanya menghasilkan sesuatu yang "
-"sangat kompleks sehingga membuat pemula menjadi takut mencoba."
+"trying to write something which satisfies everyone's needs usually results "
+"in something so complex that it turns into newbie-repellent."
+msgstr "Situs web milik Aum <a href=\"http://www.freenet.org.nz/i2p/\" target=\"_blank\">http://www.freenet.org.nz/i2p/</a> memiliki skrip yang disebut setupServer.py yang mengotomatisasi semua omong kosong ini menjadi satu baris perintah sederhana. Tapi saya menghargai selera masing-masing orang dalam antarmuka pengguna, dan mencoba menulis sesuatu yang memenuhi kebutuhan setiap orang biasanya menghasilkan sesuatu yang sangat kompleks sehingga membuat pemula menjadi takut mencoba."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:170
 msgid ""
 "So please feel free to use and/or customize setupServer.py to taste, or "
 "write your own in Python or another language."
-msgstr ""
-"Jadi, silakan gunakan dan / atau sesuaikan setupServer.py secukupnya, "
-"atau tuliskan sendiri dengan Python atau bahasa pemograman lain."
+msgstr "Jadi, silakan gunakan dan / atau sesuaikan setupServer.py secukupnya, atau tuliskan sendiri dengan Python atau bahasa pemograman lain."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:173
 msgid ""
-"Also, you may want to write a script which handles the startup of the I2P"
-" Router, the eepProxy, plus any and all tunnels you are using. I've got "
-"such a script called startEverything.sh, which gets launched at system "
-"startup. (Be sure to search this site for template scripts to automate "
-"your I2P commands. If I create a page for one, I'll try to remember to "
-"link it here."
-msgstr ""
-"Selain itu, anda mungkin ingin menulis skrip yang menangani startup "
-"Router I2P, eepProxy, ditambah terowongan yang anda gunakan. Saya punya "
-"skrip yang disebut beginEverything.sh, yang diluncurkan pada saat startup"
-" sistem. (Pastikan untuk mencari situs ini untuk template skrip untuk "
-"mengotomatisasi perintah I2P anda. Jika saya membuat halaman untuk itu, "
-"saya akan mencoba mengingat untuk menghubungkannya di sini."
+"Also, you may want to write a script which handles the startup of the I2P "
+"Router, the eepProxy, plus any and all tunnels you are using. I've got such "
+"a script called startEverything.sh, which gets launched at system startup. "
+"(Be sure to search this site for template scripts to automate your I2P "
+"commands. If I create a page for one, I'll try to remember to link it here."
+msgstr "Selain itu, anda mungkin ingin menulis skrip yang menangani startup Router I2P, eepProxy, ditambah terowongan yang anda gunakan. Saya punya skrip yang disebut beginEverything.sh, yang diluncurkan pada saat startup sistem. (Pastikan untuk mencari situs ini untuk template skrip untuk mengotomatisasi perintah I2P anda. Jika saya membuat halaman untuk itu, saya akan mencoba mengingat untuk menghubungkannya di sini."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:176
-msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
+msgid ""
+"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
 msgstr "Latihan untuk pengguna Windows - ubah setupServer.py ke file MS-DOS .BAT."
 
 #: i2p2www/pages/site/misc/invisiblenet.html:2
@@ -740,19 +521,12 @@ msgstr "Dokumen lama"
 
 #: i2p2www/pages/site/misc/invisiblenet.html:5
 msgid ""
-"Following is a list of documents originally on www.invisiblenet.net/i2p/ "
-"and\n"
+"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n"
 "rescued via the\n"
 "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
 "They are quite dated and may or may not be accurate.\n"
-"However, the I2CP and I2NP documents in particular have some good "
-"information."
-msgstr ""
-"Berikut adalah daftar dokumen yang aslinya ada di "
-"www.invisiblenet.net/i2p/ dan diselamatkan melalui <a "
-"href=\"http://www.archive.org/\">Wayback Machine</a> .\n"
-"Mereka cukup lama dan mungkin tidak akurat.\n"
-"Namun, dokumen I2CP dan I2NP khususnya memiliki beberapa informasi bagus."
+"However, the I2CP and I2NP documents in particular have some good information."
+msgstr "Berikut adalah daftar dokumen yang aslinya ada di www.invisiblenet.net/i2p/ dan diselamatkan melalui <a href=\"http://www.archive.org/\">Wayback Machine</a> .\nMereka cukup lama dan mungkin tidak akurat.\nNamun, dokumen I2CP dan I2NP khususnya memiliki beberapa informasi bagus."
 
 #: i2p2www/pages/site/misc/jbigi.html:3
 msgid "August 2011"
@@ -764,14 +538,10 @@ msgstr "Overview "
 
 #: i2p2www/pages/site/misc/jbigi.html:7
 msgid ""
-"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a "
-"little\n"
+"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n"
 "manual work and a piece of chewing gum we have made several\n"
 "cryptography operations quite a bit faster."
-msgstr ""
-"Menggunakan JNI (Java Native Interface), sedikit kode C (terima kasih "
-"ugha!), sedikit kerja manual dan sepotong permen karet kami telah "
-"melakukan beberapa operasi kriptografi sedikit lebih cepat."
+msgstr "Menggunakan JNI (Java Native Interface), sedikit kode C (terima kasih ugha!), sedikit kerja manual dan sepotong permen karet kami telah melakukan beberapa operasi kriptografi sedikit lebih cepat."
 
 #: i2p2www/pages/site/misc/jbigi.html:13
 #, python-format
@@ -782,39 +552,21 @@ msgid ""
 "<a href=\"%(func)s\">mpz_powm()</a>\n"
 "as a replacement for the\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n"
-"As modPow() is a significant computational portion of many crypto "
-"operations, this is of significant benefit."
-msgstr ""
-"Penambahan kecepatan berasal dari\n"
-"<a href=\"%(gmplib)s\">GNU MP Bignum library (libgmp)</a>.\n"
-"Kami menggunakan satu fungsi dari libgmp - <a href=\"%(func)s\">mpz_powm "
-"()</a> sebagai pengganti untuk <a href=\"%(bigint)s\">Java Math library's"
-" BigInteger modPow ()</a> .\n"
-"Karena modPow() adalah bagian komputasi yang signifikan dari banyak "
-"operasi kripto, ini sangat bermanfaat."
+"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit."
+msgstr "Penambahan kecepatan berasal dari\n<a href=\"%(gmplib)s\">GNU MP Bignum library (libgmp)</a>.\nKami menggunakan satu fungsi dari libgmp - <a href=\"%(func)s\">mpz_powm ()</a> sebagai pengganti untuk <a href=\"%(bigint)s\">Java Math library's BigInteger modPow ()</a> .\nKarena modPow() adalah bagian komputasi yang signifikan dari banyak operasi kripto, ini sangat bermanfaat."
 
 #: i2p2www/pages/site/misc/jbigi.html:25
 #, python-format
 msgid ""
-"The standard I2P installation includes about 20 versions of the library "
-"for different platforms,\n"
+"The standard I2P installation includes about 20 versions of the library for different platforms,\n"
 "each about 50KB, inside the jbigi.jar file.\n"
-"The initialization of the JBigI library, including CPU identification, "
-"selection, and extraction\n"
+"The initialization of the JBigI library, including CPU identification, selection, and extraction\n"
 "of the correct loadable module, is handled by the\n"
 "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n"
 "If no module is available for the current platform, the standard\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>\n"
 "is used."
-msgstr ""
-"Instalasi I2P standar mencakup sekitar 20 versi library untuk platform "
-"yang berbeda, masing-masing sekitar 50KB, di dalam file jbigi.jar.\n"
-"Inisialisasi library JBigI, termasuk identifikasi CPU, seleksi, dan "
-"ekstraksi modul loadable yang benar, ditangani oleh <a "
-"href=\"%(nativebigint)s\">NativeBigInteger class</a> .\n"
-"Jika tidak ada modul yang tersedia untuk platform saat ini, <a "
-"href=\"%(bigint)s\">library mod_ower JavaI Java Math</a> standar <a "
-"href=\"%(bigint)s\">()</a> digunakan."
+msgstr "Instalasi I2P standar mencakup sekitar 20 versi library untuk platform yang berbeda, masing-masing sekitar 50KB, di dalam file jbigi.jar.\nInisialisasi library JBigI, termasuk identifikasi CPU, seleksi, dan ekstraksi modul loadable yang benar, ditangani oleh <a href=\"%(nativebigint)s\">NativeBigInteger class</a> .\nJika tidak ada modul yang tersedia untuk platform saat ini, <a href=\"%(bigint)s\">library mod_ower JavaI Java Math</a> standar <a href=\"%(bigint)s\">()</a> digunakan."
 
 #: i2p2www/pages/site/misc/jbigi.html:38
 msgid "Rebuilding and Testing JBigI"
@@ -822,12 +574,9 @@ msgstr "Membangun kembali dan Menguji JBigI"
 
 #: i2p2www/pages/site/misc/jbigi.html:39
 msgid ""
-"Following are the instructions to build a new jbigi library for your own "
-"platform\n"
+"Following are the instructions to build a new jbigi library for your own platform\n"
 "and testing its performance."
-msgstr ""
-"Berikut ini adalah petunjuk untuk membangun library jbigi baru untuk "
-"platform anda dan menguji kinerjanya."
+msgstr "Berikut ini adalah petunjuk untuk membangun library jbigi baru untuk platform anda dan menguji kinerjanya."
 
 #: i2p2www/pages/site/misc/jbigi.html:42
 msgid "Requirements"
@@ -836,49 +585,28 @@ msgstr "Persyaratan"
 #: i2p2www/pages/site/misc/jbigi.html:43
 msgid ""
 "This works on Linux, and with a few changes in build.sh probably also on\n"
-"other platforms. FreeBSD has also been reported to work too. On Kaffee "
-"the\n"
-"speedup is very small, because it already uses native BitInteger "
-"internally.\n"
+"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n"
+"speedup is very small, because it already uses native BitInteger internally.\n"
 "Blackdown seems to cause strange errors. Because you are going to do\n"
 "compilation, you need JDK; JRE won't work."
-msgstr ""
-"Ini berfungsi di Linux, dan dengan beberapa perubahan build.sh mungkin "
-"juga ada pada platform lainnya. Ini dilaporkan juga berfungsi di FreeBSD."
-" Pada Kaffee, peningkatan kecepatan sangat kecil karena sudah menggunakan"
-" native BitInteger secara internal.\n"
-"Blackdown tampaknya menyebabkan kesalahan aneh. Karena anda akan "
-"melakukan kompilasi, anda perlu JDK; JRE tidak akan berfungsi."
+msgstr "Ini berfungsi di Linux, dan dengan beberapa perubahan build.sh mungkin juga ada pada platform lainnya. Ini dilaporkan juga berfungsi di FreeBSD. Pada Kaffee, peningkatan kecepatan sangat kecil karena sudah menggunakan native BitInteger secara internal.\nBlackdown tampaknya menyebabkan kesalahan aneh. Karena anda akan melakukan kompilasi, anda perlu JDK; JRE tidak akan berfungsi."
 
 #: i2p2www/pages/site/misc/jbigi.html:50
 msgid ""
-"The required code is available in monotone database and the latest source"
-" tarball. "
-msgstr ""
-"Kode yang diperlukan tersedia dalam database monoton dan sumber terbaru "
-"tarball . "
+"The required code is available in monotone database and the latest source "
+"tarball. "
+msgstr "Kode yang diperlukan tersedia dalam database monoton dan sumber terbaru tarball . "
 
 #: i2p2www/pages/site/misc/jbigi.html:51
 msgid ""
 "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n"
-"included in your OS / distribution or installed already, it can be "
-"received from\n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Even if you\n"
-"have already installed it as binary, it might still be worth a try to "
-"compile\n"
-"GMP yourself, since then it will be able to use the specific instructions"
-" of\n"
+"included in your OS / distribution or installed already, it can be received from\n"
+"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n"
+"have already installed it as binary, it might still be worth a try to compile\n"
+"GMP yourself, since then it will be able to use the specific instructions of\n"
 "your processor. The latest GMP may also\n"
 "be used instead of GMP 5.0.2, but it hasn't been tested by us."
-msgstr ""
-"Library GNU MP Bignum (libgmp) perlu diinstal, jika itu tidak disertakan "
-"dalam OS / distribusi atau sudah diinstal, itu dapat diambil dari <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Bahkan jika anda telah menginstal itu sebagai file biner, itu masih "
-"mungkin patut dicoba untuk mengkompilasi GMP, setelah itu, ia akan mampu "
-"menggunakan petunjuk khusus prosesor anda. GMP terbaru dapat juga "
-"digunakan sebagai pengganti GMP 5.0.2, tapi ini belum diuji oleh kami."
+msgstr "Library GNU MP Bignum (libgmp) perlu diinstal, jika itu tidak disertakan dalam OS / distribusi atau sudah diinstal, itu dapat diambil dari <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Bahkan jika anda telah menginstal itu sebagai file biner, itu masih mungkin patut dicoba untuk mengkompilasi GMP, setelah itu, ia akan mampu menggunakan petunjuk khusus prosesor anda. GMP terbaru dapat juga digunakan sebagai pengganti GMP 5.0.2, tapi ini belum diuji oleh kami."
 
 #: i2p2www/pages/site/misc/jbigi.html:61
 msgid "Step-by-step instructions"
@@ -886,13 +614,9 @@ msgstr "Petunjuk langkah demi langkah"
 
 #: i2p2www/pages/site/misc/jbigi.html:63
 msgid ""
-"Look at <a href=\"http://localhost:7657/logs.jsp\">your running "
-"environment on the logs.jsp page</a>.\n"
+"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n"
 "There should be one of two status messages for JBigI - either"
-msgstr ""
-"Lihatlah <a href=\"http://localhost:7657/logs.jsp\">running environment "
-"anda di halaman logs.jsp</a>.\n"
-"Harus ada salah satu dari dua status pesan untuk JBigI - bisa"
+msgstr "Lihatlah <a href=\"http://localhost:7657/logs.jsp\">running environment anda di halaman logs.jsp</a>.\nHarus ada salah satu dari dua status pesan untuk JBigI - bisa"
 
 #: i2p2www/pages/site/misc/jbigi.html:66
 msgid "Locally optimized native BigInteger loaded from the library path"
@@ -914,53 +638,26 @@ msgid ""
 "may require you to compile your own library.\n"
 "If the BigInteger library was loaded, do at least the next step to see\n"
 "what your performance is."
-msgstr ""
-"Jika library BitInteger native TIDAK dimuat, anda pasti perlu untuk "
-"mengkompilasi sendiri.\n"
-"Platform tertentu, seperti OS X, OpenSolaris, dan sistem 64-bit, mungkin "
-"mengharuskan anda untuk mengkompilasi library anda sendiri.\n"
-"Jika library BigInteger dimuat, lakukan setidaknya langkah selanjutnya "
-"untuk melihat kinerja anda."
+msgstr "Jika library BitInteger native TIDAK dimuat, anda pasti perlu untuk mengkompilasi sendiri.\nPlatform tertentu, seperti OS X, OpenSolaris, dan sistem 64-bit, mungkin mengharuskan anda untuk mengkompilasi library anda sendiri.\nJika library BigInteger dimuat, lakukan setidaknya langkah selanjutnya untuk melihat kinerja anda."
 
 #: i2p2www/pages/site/misc/jbigi.html:78
 msgid ""
-"Look on <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"to see what the lifetime average values for "
-"<code>crypto.elGamal.decrypt</code> and\n"
-"<code>crypto.elGamal.encrypt</code> are. The numbers are times in "
-"milliseconds. Copy these somewhere so you can compare\n"
+"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n"
+"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n"
 "them later on.\n"
 "The network average for encrypt time is about 20ms.\n"
-"If your encrypt time is less than 50ms for a relatively new processor, or"
-" less than 100ms\n"
-"for an older processor, and the native BigInteger library was loaded, you"
-" are probably fine."
-msgstr ""
-"Lihatlah <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-" untuk melihat nilai rata-rata seumur hidup untuk "
-"<code>crypto.elGamal.decrypt</code> dan "
-"<code>crypto.elGamal.encrypt</code> . Jumlahnya adalah waktu dalam "
-"milidetik. Salin ini ke suatu tempat sehingga anda dapat membandingkannya"
-" nanti.\n"
-"Rata-rata jaringan untuk mengenkripsi adalah sekitar 20ms.\n"
-"Jika waktu enkripsi anda kurang dari 50ms untuk prosesor yang relatif "
-"baru, atau kurang dari 100ms untuk prosesor yang lebih tua, dan library "
-"BigInteger native dimuat, anda mungkin baik-baik saja."
+"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n"
+"for an older processor, and the native BigInteger library was loaded, you are probably fine."
+msgstr "Lihatlah <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> untuk melihat nilai rata-rata seumur hidup untuk <code>crypto.elGamal.decrypt</code> dan <code>crypto.elGamal.encrypt</code> . Jumlahnya adalah waktu dalam milidetik. Salin ini ke suatu tempat sehingga anda dapat membandingkannya nanti.\nRata-rata jaringan untuk mengenkripsi adalah sekitar 20ms.\nJika waktu enkripsi anda kurang dari 50ms untuk prosesor yang relatif baru, atau kurang dari 100ms untuk prosesor yang lebih tua, dan library BigInteger native dimuat, anda mungkin baik-baik saja."
 
 #: i2p2www/pages/site/misc/jbigi.html:87
 #, python-format
 msgid ""
 "Get the latest released source code of I2P from\n"
-"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge "
-"source\n"
+"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n"
 "out of the monotone database mtn.i2p2.de"
-msgstr ""
-"Dapatkan kode sumber I2P terbaru dari <a href=\"%(downloads)s\">halaman "
-"download</a> , atau dapatkan sumber mutakhir dari database monotone "
-"mtn.i2p2.de"
+msgstr "Dapatkan kode sumber I2P terbaru dari <a href=\"%(downloads)s\">halaman download</a> , atau dapatkan sumber mutakhir dari database monotone mtn.i2p2.de"
 
 #: i2p2www/pages/site/misc/jbigi.html:92
 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>"
@@ -972,62 +669,30 @@ msgid ""
 "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n"
 "Use the 'dynamic' argument to build.sh.\n"
 "Otherwise, you must download GMP version 5.0.2 from\n"
-"from <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"saving it to gmp-5.0.2.tar.bz2.\n"
-"If you decide to use a newer version, change the VER= line in "
-"<code>core/c/jbigi/build.sh</code>."
-msgstr ""
-"Baca file README.\n"
-"Jika anda memiliki file /usr/lib/libgmp.so, anda tidak perlu mendownload "
-"GMP.\n"
-"Gunakan argumen 'dinamis' untuk build.sh.\n"
-"Jika tidak, anda harus mendownload GMP versi 5.0.2 dari <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"simpan ke gmp-5.0.2.tar.bz2.\n"
-"Jika anda memutuskan untuk menggunakan versi yang lebih baru, ubahlah "
-"VER=line di <code>core/c/jbigi/build.sh</code> ."
+"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n"
+"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>."
+msgstr "Baca file README.\nJika anda memiliki file /usr/lib/libgmp.so, anda tidak perlu mendownload GMP.\nGunakan argumen 'dinamis' untuk build.sh.\nJika tidak, anda harus mendownload GMP versi 5.0.2 dari <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, simpan ke gmp-5.0.2.tar.bz2.\nJika anda memutuskan untuk menggunakan versi yang lebih baru, ubahlah VER=line di <code>core/c/jbigi/build.sh</code> ."
 
 #: i2p2www/pages/site/misc/jbigi.html:101
 msgid ""
 "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n"
-"environment variable is set and you are using Linux then it might just "
-"work.\n"
+"environment variable is set and you are using Linux then it might just work.\n"
 "Otherwise change the settings. Remember, you need the Java SDK installed."
-msgstr ""
-"Lihatlah <code>build.sh</code> , jika <code>JAVA_HOME</code> variabel "
-"lingkungan <code>JAVA_HOME</code> anda ditetapkan dan anda menggunakan "
-"Linux, maka ini mungkin berfungsi.\n"
-"Jika tidak, ubah pengaturannya. Ingat, anda memerlukan Java SDK."
+msgstr "Lihatlah <code>build.sh</code> , jika <code>JAVA_HOME</code> variabel lingkungan <code>JAVA_HOME</code> anda ditetapkan dan anda menggunakan Linux, maka ini mungkin berfungsi.\nJika tidak, ubah pengaturannya. Ingat, anda memerlukan Java SDK."
 
 #: i2p2www/pages/site/misc/jbigi.html:106
 msgid ""
 "Run <code>build.sh</code> (if you downloaded GMP) or\n"
 "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n"
-"Maybe the build spewed out some errors of missing jni.h and jni_md.h "
-"files.\n"
-"Either copy these files from your java install into the "
-"core/c/jbigi/jbigi/include/ directory,\n"
+"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n"
+"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n"
 "or fix $JAVA_HOME.<br>\n"
-"You can run the <code>build.sh</code> from the <code>core/c/</code> "
-"directory which will\n"
+"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n"
 "build all available jbigi libs into a jbigi.jar.</br>\n"
 "A file named <code>libjbigi.so</code> should be created in the current\n"
-"directory. If this doesn't happen and/or you get errors then please "
-"report\n"
+"directory. If this doesn't happen and/or you get errors then please report\n"
 "them."
-msgstr ""
-"Jalankan <code>build.sh</code> (jika anda mendownload GMP) atau "
-"<code>build.sh dynamic</code> (jika anda memiliki /usr/lib/libgmp.so). "
-"<br/> mungkin build melaporkan beberapa kesalahan file jni.h dan jni_md.h"
-" yang hilang.\n"
-"Salin file-file ini dari java install ke direktori inti "
-"/c/jbigi/jbigi/include/, atau perbaiki $JAVA_HOME. <br> Anda dapat "
-"menjalankan <code>build.sh</code> dari direktori <code>core/c/</code> "
-"yang akan membangun semua jbigi libs yang tersedia ke jbigi.jar. </br> "
-"Sebuah file bernama <code>libjbigi.so</code> harus dibuat di current "
-"directory. Jika ini tidak berfungsi dan/atau anda mendapat pesan error, "
-"mohon laporkan kepada kami."
+msgstr "Jalankan <code>build.sh</code> (jika anda mendownload GMP) atau <code>build.sh dynamic</code> (jika anda memiliki /usr/lib/libgmp.so). <br/> mungkin build melaporkan beberapa kesalahan file jni.h dan jni_md.h yang hilang.\nSalin file-file ini dari java install ke direktori inti /c/jbigi/jbigi/include/, atau perbaiki $JAVA_HOME. <br> Anda dapat menjalankan <code>build.sh</code> dari direktori <code>core/c/</code> yang akan membangun semua jbigi libs yang tersedia ke jbigi.jar. </br> Sebuah file bernama <code>libjbigi.so</code> harus dibuat di current directory. Jika ini tidak berfungsi dan/atau anda mendapat pesan error, mohon laporkan kepada kami."
 
 #: i2p2www/pages/site/misc/jbigi.html:118
 msgid ""
@@ -1035,19 +700,13 @@ msgid ""
 "the speed test.\n"
 "Read the final lines of the speed test's output for some additional\n"
 "info, it will be something like this:"
-msgstr ""
-"Ikuti instruksi di inti /c/README untuk menginstal library dan jalankan "
-"tes kecepatan.\n"
-"Baca baris terakhir dari output tes kecepatan untuk beberapa info "
-"tambahan, ini akan seperti ini:"
+msgstr "Ikuti instruksi di inti /c/README untuk menginstal library dan jalankan tes kecepatan.\nBaca baris terakhir dari output tes kecepatan untuk beberapa info tambahan, ini akan seperti ini:"
 
 #: i2p2www/pages/site/misc/jbigi.html:128
 msgid ""
 "If the native is indeed 5-7x faster (or more) then it looks all good. If "
 "not, please report."
-msgstr ""
-"Jika yang native memang 5-7x lebih cepat (atau lebih) maka kelihatannya "
-"bagus. Jika tidak, mohon laporkan kepada kami."
+msgstr "Jika yang native memang 5-7x lebih cepat (atau lebih) maka kelihatannya bagus. Jika tidak, mohon laporkan kepada kami."
 
 #: i2p2www/pages/site/misc/jbigi.html:129
 msgid "Copy <code>libjbigi.so</code> to your i2p directory"
@@ -1059,17 +718,10 @@ msgstr "Restart program I2P anda."
 
 #: i2p2www/pages/site/misc/jbigi.html:131
 msgid ""
-"On <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"the <code>crypto.elGamal.decrypt</code> and "
-"<code>crypto.elGamal.encrypt</code>\n"
+"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n"
 "should be a lot faster."
-msgstr ""
-"Pada <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-" <code>crypto.elGamal.decrypt</code> dan "
-"<code>crypto.elGamal.encrypt</code> seharusnya jauh lebih cepat."
+msgstr "Pada <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> <code>crypto.elGamal.decrypt</code> dan <code>crypto.elGamal.encrypt</code> seharusnya jauh lebih cepat."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:2
 msgid "Jrandom's Announcement"
@@ -1077,43 +729,28 @@ msgstr "Pengumuman Jrandom"
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:4
 msgid ""
-"The following message was received in mid-November 2007. We have no "
-"further information\n"
+"The following message was received in mid-November 2007. We have no further information\n"
 "on jrandom's status."
-msgstr ""
-"Pesan berikut diterima pada pertengahan November 2007. Kami tidak "
-"memiliki informasi lebih lanjut tentang status jrandom."
+msgstr "Pesan berikut diterima pada pertengahan November 2007. Kami tidak memiliki informasi lebih lanjut tentang status jrandom."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:9
 #, python-format
 msgid ""
 "Subsequently, in an unrelated incident, the hosting company for\n"
 "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n"
-"on January 13, 2008, and the i2p.net servers did not fully return to "
-"service.\n"
+"on January 13, 2008, and the i2p.net servers did not fully return to service.\n"
 "As only jrandom has the credentials required to restore service,\n"
 "and he could not be contacted,\n"
 "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n"
 "and related subdomains."
-msgstr ""
-"Selanjutnya, dalam insiden yang tidak terkait, perusahaan hosting untuk "
-"semua server * .i2p.net (kecuali forum.i2p.net) mengalami pemadaman "
-"listrik pada tanggal 13 Januari 2008, dan server i2p.net tidak sepenuhnya"
-" kembali beroperasi.\n"
-"Karena hanya jrandom yang memiliki kredensial yang diperlukan untuk "
-"memulihkan layanan, dan dia tidak dapat dihubungi, kami memindahkan semua"
-" layanan publik ke <a href=\"%(site)s\">www.i2p2.de</a> dan subdomain "
-"terkait."
+msgstr "Selanjutnya, dalam insiden yang tidak terkait, perusahaan hosting untuk semua server * .i2p.net (kecuali forum.i2p.net) mengalami pemadaman listrik pada tanggal 13 Januari 2008, dan server i2p.net tidak sepenuhnya kembali beroperasi.\nKarena hanya jrandom yang memiliki kredensial yang diperlukan untuk memulihkan layanan, dan dia tidak dapat dihubungi, kami memindahkan semua layanan publik ke <a href=\"%(site)s\">www.i2p2.de</a> dan subdomain terkait."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:19
 #, python-format
 msgid ""
 "Approximately two months later, for unrelated reasons,\n"
 "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>."
-msgstr ""
-"Kira-kira dua bulan kemudian, karena alasan yang tidak terkait, "
-"forum.i2p.net dipindahkan ke <a href=\"http://%(forum)s/\">%(forum)s</a> "
-"."
+msgstr "Kira-kira dua bulan kemudian, karena alasan yang tidak terkait, forum.i2p.net dipindahkan ke <a href=\"http://%(forum)s/\">%(forum)s</a> ."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:2
 #: i2p2www/pages/site/misc/manual-wrapper.html:4
@@ -1123,57 +760,34 @@ msgstr "Instalasi Manual Java Wrapper"
 #: i2p2www/pages/site/misc/manual-wrapper.html:6
 #, python-format
 msgid ""
-"The installation package for the <a href=\"%(downloads)s\">I2P router</a>"
-" comes\n"
-"with a Java wrapper for the most common architectures. If your system is "
-"not\n"
-"supported by our installer&mdash;or if you want to update the wrapper to "
-"a\n"
-"newer version&mdash;the following steps describe installing the wrapper "
-"manually."
-msgstr ""
-"Paket instalasi untuk <a href=\"%(downloads)s\">router I2P</a> hadir "
-"pembungkus Java wrapper untuk arsitektur yang paling umum. Jika sistem "
-"anda tidak didukung oleh installer kami - atau jika anda ingin mengupdate"
-" wrappernya ke versi yang lebih baru - langkah-langkah berikut "
-"menjelaskan instalasi wrappernya secara manual."
+"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n"
+"with a Java wrapper for the most common architectures. If your system is not\n"
+"supported by our installer&mdash;or if you want to update the wrapper to a\n"
+"newer version&mdash;the following steps describe installing the wrapper manually."
+msgstr "Paket instalasi untuk <a href=\"%(downloads)s\">router I2P</a> hadir pembungkus Java wrapper untuk arsitektur yang paling umum. Jika sistem anda tidak didukung oleh installer kami - atau jika anda ingin mengupdate wrappernya ke versi yang lebih baru - langkah-langkah berikut menjelaskan instalasi wrappernya secara manual."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:14
 msgid ""
-"Check Tanuki Software's <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download"
-" page</a>\n"
+"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n"
 "for your platform. Is your platform listed? If so, you're in\n"
-"luck! Download the most recent version of the Community Edition for your "
-"OS and\n"
+"luck! Download the most recent version of the Community Edition for your OS and\n"
 "CPU and move to <a href=\"#packaged\">the next step</a>."
-msgstr ""
-"Periksa perangkat lunak milik Tanuki di <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">halaman"
-" downloadnya</a> untuk platform anda. Apakah platform anda terdaftar? "
-"Jika demikian, anda beruntung! Download Versi Edisi Komunitas terbaru "
-"untuk OS dan CPU anda dan lanjutkan ke <a href=\"#packaged\">langkah "
-"berikutnya</a> ."
+msgstr "Periksa perangkat lunak milik Tanuki di <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">halaman downloadnya</a> untuk platform anda. Apakah platform anda terdaftar? Jika demikian, anda beruntung! Download Versi Edisi Komunitas terbaru untuk OS dan CPU anda dan lanjutkan ke <a href=\"#packaged\">langkah berikutnya</a> ."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:20
 msgid ""
-"If your platform does not have an already compiled wrapper available, you"
-"\n"
-"may be able to compile it yourself. If you are willing to have a go at "
-"it, move\n"
+"If your platform does not have an already compiled wrapper available, you\n"
+"may be able to compile it yourself. If you are willing to have a go at it, move\n"
 "on to <a href=\"#compiling\">compiling</a> the wrapper for your system."
-msgstr ""
-"Jika platform anda tidak memiliki wrapper yang sudah dikompilasi, anda "
-"mungkin bisa mengkompilasinya sendiri. Jika anda bersedia melakukannya, "
-"lanjutkan ke <a href=\"#compiling\">kompilasi</a> wrapper untuk sistem "
-"anda."
+msgstr "Jika platform anda tidak memiliki wrapper yang sudah dikompilasi, anda mungkin bisa mengkompilasinya sendiri. Jika anda bersedia melakukannya, lanjutkan ke <a href=\"#compiling\">kompilasi</a> wrapper untuk sistem anda."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:27
 msgid "Using existing binaries"
 msgstr "Menggunakan file binari yang ada"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:28
-msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>."
+msgid ""
+"In the steps below, $I2P means <em>the location I2P was installed to</em>."
 msgstr "Pada langkah di bawah, $I2P berarti <em>lokasi yang dipasang I2P</em> ."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:36
@@ -1189,11 +803,9 @@ msgstr "<code>tail -f /tmp/wrapper.log</code> dan cari apakah ada masalah."
 #: i2p2www/pages/site/misc/manual-wrapper.html:39
 #: i2p2www/pages/site/misc/manual-wrapper.html:67
 msgid ""
-"If this did not work you'll need to use <code>runplain.sh</code> to start"
-" I2P."
-msgstr ""
-"Jika ini tidak berhasil, anda harus menggunakan <code>runplain.sh</code> "
-"untuk memulai I2P."
+"If this did not work you'll need to use <code>runplain.sh</code> to start "
+"I2P."
+msgstr "Jika ini tidak berhasil, anda harus menggunakan <code>runplain.sh</code> untuk memulai I2P."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:43
 msgid "Compiling from source"
@@ -1201,23 +813,16 @@ msgstr "Kompilasi dari kode sumber"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:44
 msgid ""
-"These steps worked to compile the wrapper for use on a mipsel system "
-"running Debian. The steps <strong>will</strong> need to be altered for "
-"your system."
-msgstr ""
-"Langkah-langkah ini berfungsi untuk mengkompilasi wrappernya agar bisa "
-"digunakan pada sistem mipsel yang menjalankan Debian. Langkah-langkah "
-"yang <strong>perlu</strong> diubah untuk sistem anda."
+"These steps worked to compile the wrapper for use on a mipsel system running"
+" Debian. The steps <strong>will</strong> need to be altered for your system."
+msgstr "Langkah-langkah ini berfungsi untuk mengkompilasi wrappernya agar bisa digunakan pada sistem mipsel yang menjalankan Debian. Langkah-langkah yang <strong>perlu</strong> diubah untuk sistem anda."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:48
 msgid ""
-"Download the source archive for the community version of the wrapper from"
-" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download"
-" page</a>."
-msgstr ""
-"Download arsip sumber kode wrapper untuk versi komunitas dari <a "
-"href=\"http://wrapper.tanukisoftware.com/downloads\"halaman download "
-"wrapper</a>."
+"Download the source archive for the community version of the wrapper from <a"
+" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download "
+"page</a>."
+msgstr "Download arsip sumber kode wrapper untuk versi komunitas dari <a href=\"http://wrapper.tanukisoftware.com/downloads\"halaman download wrapper</a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:49
 msgid "Extract the tarball"
@@ -1225,19 +830,15 @@ msgstr "Ekstrak file tarball-nya"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:51
 msgid ""
-"Set environment variables <code>ANT_HOME</code> and "
-"<code>JAVA_HOME</code>. For example, in Debian:"
-msgstr ""
-"Tetapkan variabel lingkungan <code>ANT_HOME</code> dan "
-"<code>JAVA_HOME</code> . Sebagai contoh, dalam Debian:"
+"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. "
+"For example, in Debian:"
+msgstr "Tetapkan variabel lingkungan <code>ANT_HOME</code> dan <code>JAVA_HOME</code> . Sebagai contoh, dalam Debian:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:54
 msgid ""
 "Since there isn't a Makefile for Mipsel, we'll make a copy of an already "
 "existing makefile:"
-msgstr ""
-"Karena tidak file Makefile untuk Mipsel, kami akan membuat salinan "
-"makefile yang sudah ada:"
+msgstr "Karena tidak file Makefile untuk Mipsel, kami akan membuat salinan makefile yang sudah ada:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:56
 msgid "Now we can attempt to compile the wrapper:"
@@ -1255,9 +856,7 @@ msgstr "Salin wrapper ke tempat yang tepat:"
 msgid ""
 "Here's an outline and rationale for a minimal WWW proxy app for use over "
 "I2P."
-msgstr ""
-"Berikut adalah garis besar dan alasan untuk aplikasi proxy WWW minimal "
-"untuk digunakan di I2P."
+msgstr "Berikut adalah garis besar dan alasan untuk aplikasi proxy WWW minimal untuk digunakan di I2P."
 
 #: i2p2www/pages/site/misc/minwww.html:8
 msgid ""
@@ -1267,254 +866,116 @@ msgid ""
 "in the router (but later versions of the SocketLibrary will be able to\n"
 "use selective ACK and large window sizes, allowing more ACKs to be\n"
 "skipped)"
-msgstr ""
-"Operasi HTTP di I2P menggunakan I2PTunnel.  Ketika base SocketLibrary "
-"keluar, perbedaan signifikan hanya 'wrapRequest' dan 'unwrapRequest' yang"
-" secara fungsional akan ditempatkan di socketLibrary, bukan di router "
-"(tapi versi SocketLibrary akan mampu menggunakan ACK selektif dan ukuran "
-"jendela besar, memungkinkan lebih banyak ACKs yang akan dilewatkan)"
+msgstr "Operasi HTTP di I2P menggunakan I2PTunnel.  Ketika base SocketLibrary keluar, perbedaan signifikan hanya 'wrapRequest' dan 'unwrapRequest' yang secara fungsional akan ditempatkan di socketLibrary, bukan di router (tapi versi SocketLibrary akan mampu menggunakan ACK selektif dan ukuran jendela besar, memungkinkan lebih banyak ACKs yang akan dilewatkan)"
 
 #: i2p2www/pages/site/misc/minwww.html:47
 msgid ""
-"An optimized form, designed to handle only 128KB [1] files and pages, can"
-"\n"
+"An optimized form, designed to handle only 128KB [1] files and pages, can\n"
 "operate significantly faster:"
-msgstr ""
-"Bentuk yang dioptimalkan, yang hanya dirancang untuk menangani file 128KB"
-" [1] dan halaman, dapat beroperasi lebih cepat:"
+msgstr "Bentuk yang dioptimalkan, yang hanya dirancang untuk menangani file 128KB [1] dan halaman, dapat beroperasi lebih cepat:"
 
 #: i2p2www/pages/site/misc/minwww.html:71
 msgid ""
 "The difference in network load and latency is significant - this is\n"
-"essentially a UDP version of HTTP.  On the normal web, we can't really do"
-" that,\n"
-"since most HTTP requests and responses are orders of magnitude larger "
-"than UDP\n"
-"packets functionally support, but in I2P, messages can be large.  The "
-"savings\n"
-"for the network load comes from the fact that we don't need to send any "
-"ACK\n"
+"essentially a UDP version of HTTP.  On the normal web, we can't really do that,\n"
+"since most HTTP requests and responses are orders of magnitude larger than UDP\n"
+"packets functionally support, but in I2P, messages can be large.  The savings\n"
+"for the network load comes from the fact that we don't need to send any ACK\n"
 "messages - rather than the earlier wrap/unwrap request (that bundles a\n"
-"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery),"
-" the\n"
-"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there"
-" are no\n"
+"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n"
+"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n"
 "resends)."
-msgstr ""
-"Ada perbedaan signifikan dalam beban jaringan dan latensi - hal ini pada "
-"dasarnya adalah UDP versi HTTP.  Di web normal, kita tidak bisa benar-"
-"benar melakukannya, karena kebanyakan permintaan HTTP dan tanggapan "
-"berkalo kali lipat lebih besar daripada paket-paket UDP yang didukung, "
-"tetapi dalam I2P, pesan dapat menjadi besar.  Beban jaringan yang dihemat"
-" berasal dari fakta bahwa kita tidak perlu untuk mengirim pesan ACK- "
-"daripada permintaan wrap/unwrap sebelumnya (yang mem-bundle DataMessage "
-"dengan DeliveryStatusMessage untuk memberikan jaminan pengiriman), proxy "
-"MinWWW berkaitan dengan mengirim ulang (jika diperlukan - dalam I2PTunnel"
-" hari ini, ada tidak mengirim ulang)."
+msgstr "Ada perbedaan signifikan dalam beban jaringan dan latensi - hal ini pada dasarnya adalah UDP versi HTTP.  Di web normal, kita tidak bisa benar-benar melakukannya, karena kebanyakan permintaan HTTP dan tanggapan berkalo kali lipat lebih besar daripada paket-paket UDP yang didukung, tetapi dalam I2P, pesan dapat menjadi besar.  Beban jaringan yang dihemat berasal dari fakta bahwa kita tidak perlu untuk mengirim pesan ACK- daripada permintaan wrap/unwrap sebelumnya (yang mem-bundle DataMessage dengan DeliveryStatusMessage untuk memberikan jaminan pengiriman), proxy MinWWW berkaitan dengan mengirim ulang (jika diperlukan - dalam I2PTunnel hari ini, ada tidak mengirim ulang)."
 
 #: i2p2www/pages/site/misc/minwww.html:83
 msgid ""
-"The data that the MinWWW proxy and server need to wrap is trivial - when "
-"the\n"
-"proxy wants to send \"GET /\", it prepends it with the I2P Destination "
-"sending\n"
-"the request, followed by a 4 byte request ID.  The MinWWW server receives"
-" those\n"
-"requests, contacts the appropriate HTTPD, sends the request, waits for "
-"the\n"
+"The data that the MinWWW proxy and server need to wrap is trivial - when the\n"
+"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n"
+"the request, followed by a 4 byte request ID.  The MinWWW server receives those\n"
+"requests, contacts the appropriate HTTPD, sends the request, waits for the\n"
 "response, and sends a reply to the MinWWW proxy containing the response,\n"
-"prefixed with the original request ID.  That response is taken and passed"
-" back\n"
+"prefixed with the original request ID.  That response is taken and passed back\n"
 "to the browser and the connection is closed."
-msgstr ""
-"Data yang dibutuhkan oleh proxy dan server MinWWW untuk membungkus adalah"
-" sangat kecil - ketika proxy ingin mengirim \"GET /\", ia menambahkannya "
-"dengan destinasi I2P yang mengirim permintaan, diikuti oleh ID permintaan"
-" 4 byte.  Server MinWWW menerima permintaan tersebut, mengontak HTTPD "
-"yang sesuai, mengirim permintaan, menunggu respon dan mengirim balasan ke"
-" proxy MinWWW yang mengandung respon, diawali dengan permintaan id yang "
-"asli.  Respon itu diambil dan dilewatkan kembali ke browser lalu koneksi "
-"ditutup."
+msgstr "Data yang dibutuhkan oleh proxy dan server MinWWW untuk membungkus adalah sangat kecil - ketika proxy ingin mengirim \"GET /\", ia menambahkannya dengan destinasi I2P yang mengirim permintaan, diikuti oleh ID permintaan 4 byte.  Server MinWWW menerima permintaan tersebut, mengontak HTTPD yang sesuai, mengirim permintaan, menunggu respon dan mengirim balasan ke proxy MinWWW yang mengandung respon, diawali dengan permintaan id yang asli.  Respon itu diambil dan dilewatkan kembali ke browser lalu koneksi ditutup."
 
 #: i2p2www/pages/site/misc/minwww.html:93
 msgid ""
 "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n"
-"list, going through some round robin or other algorithm, so that there "
-"are\n"
-"multiple outproxies merged transparently.  The bandwidth required for "
-"running\n"
-"one of these outproxies is also greatly reduced, since it will only "
-"handle 128KB\n"
+"list, going through some round robin or other algorithm, so that there are\n"
+"multiple outproxies merged transparently.  The bandwidth required for running\n"
+"one of these outproxies is also greatly reduced, since it will only handle 128KB\n"
 "files (aka no one is going to be downloading porn, warez, etc)."
-msgstr ""
-"Selain itu, proxy MinWWW dapat memilih server MinWWW untuk digunakan dari"
-" sebuah daftar, melalui beberapa robin atau algoritma lainnya, sehingga "
-"ada beberapa outproxies digabungkan secara transparan.  Bandwidth yang "
-"diperlukan untuk menjalankan salah satu outproxies ini juga sangat "
-"berkurang, karena itu hanya akan menangani file 128KB (sehingga tidak ada"
-" yang akan men-download porno, warez, dll)."
+msgstr "Selain itu, proxy MinWWW dapat memilih server MinWWW untuk digunakan dari sebuah daftar, melalui beberapa robin atau algoritma lainnya, sehingga ada beberapa outproxies digabungkan secara transparan.  Bandwidth yang diperlukan untuk menjalankan salah satu outproxies ini juga sangat berkurang, karena itu hanya akan menangani file 128KB (sehingga tidak ada yang akan men-download porno, warez, dll)."
 
 #: i2p2www/pages/site/misc/minwww.html:101
 msgid ""
-"The functionality /is/ limited, but 128KB of data is a lot for a single "
-"HTTP\n"
-"request or response.  The above diagrams are also unrealistic in their "
-"hops -\n"
-"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send "
-"each\n"
-"of the messages through two additional outbound routers, then forwarded "
-"to\n"
-"two additional inbound routers to ROUTERB, so the lag there is "
-"significant -\n"
-"while the above only saves 11 steps, 8 of those steps need to traverse "
-"the\n"
-"entire tunnel path (4+ remote hops each time when tunnels are 2 remote "
-"hops\n"
-"in each stretch), leaving MinWWW with only two full traversals (one for "
-"the\n"
+"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n"
+"request or response.  The above diagrams are also unrealistic in their hops -\n"
+"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send each\n"
+"of the messages through two additional outbound routers, then forwarded to\n"
+"two additional inbound routers to ROUTERB, so the lag there is significant -\n"
+"while the above only saves 11 steps, 8 of those steps need to traverse the\n"
+"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n"
+"in each stretch), leaving MinWWW with only two full traversals (one for the\n"
 "request, one for the response), instead of 10."
-msgstr ""
-"Fungsinya terbatas, tetapi 128KB data adalah banyak untuk satu permintaan"
-" HTTP atau respon.  Diagram di atas juga tidak realistis di hop mereka - "
-"ROUTERA akan benar-benar tidak pernah berbicara langsung ke ROUTERB.  "
-"ROUTERA akan mengirimkan kepada setiap pesan melalui dua router outbound "
-"tambahan, lalu meneruskan ke dua router inbound tambahan ke ROUTERB, "
-"sehingga lag menjadi signifikan - sementara di atas hanya menghemat 11 "
-"langkah, 8 langkah tersebut perlu melintasi seluruh jalur tunnel (4  "
-"remote hop setiap kali ketika tunnel adalah 2 hop jarak jauh di setiap "
-"strecth), meninggalkan MinWWW hanya dengan dua traversals penuh (satu "
-"untuk permintaan, satu untuk tanggapannya), bukan 10."
+msgstr "Fungsinya terbatas, tetapi 128KB data adalah banyak untuk satu permintaan HTTP atau respon.  Diagram di atas juga tidak realistis di hop mereka - ROUTERA akan benar-benar tidak pernah berbicara langsung ke ROUTERB.  ROUTERA akan mengirimkan kepada setiap pesan melalui dua router outbound tambahan, lalu meneruskan ke dua router inbound tambahan ke ROUTERB, sehingga lag menjadi signifikan - sementara di atas hanya menghemat 11 langkah, 8 langkah tersebut perlu melintasi seluruh jalur tunnel (4  remote hop setiap kali ketika tunnel adalah 2 hop jarak jauh di setiap strecth), meninggalkan MinWWW hanya dengan dua traversals penuh (satu untuk permintaan, satu untuk tanggapannya), bukan 10."
 
 #: i2p2www/pages/site/misc/minwww.html:113
 msgid ""
-"Implementing the MinWWW proxy and server should be fairly easy - read an "
-"HTTP\n"
-"request from the client fully (perhaps only start out with HTTP GET, "
-"leaving\n"
-"HTTP POST for later), wrap the message, and wait for the response.  The "
-"server\n"
-"in turn simply needs to parse the request to either open a socket or URL,"
-"\n"
-"send the request, wait for the response, and send it back through the "
-"network.\n"
+"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n"
+"request from the client fully (perhaps only start out with HTTP GET, leaving\n"
+"HTTP POST for later), wrap the message, and wait for the response.  The server\n"
+"in turn simply needs to parse the request to either open a socket or URL,\n"
+"send the request, wait for the response, and send it back through the network.\n"
 "If someone were to implement this, it would be Good :)"
-msgstr ""
-"Menerapkan MinWWW proxy dan server seharusnya cukup mudah - sepenuhnya "
-"membaca permintaan HTTP dari klien (mungkin hanya dimulai dengan method "
-"GET, menyisakan method POST untuk nanti), bungkus pesan, dan menunggu "
-"respon.  Server selanjutnya hanya perlu parsing permintaan untuk membuka "
-"soket atau URL, mengirim permintaan, menunggu jawabannya, dan "
-"mengirimkannya kembali melalui jaringan.\n"
-"Jika seseorang menerapkan ini, itu akan menjadi baik :)"
+msgstr "Menerapkan MinWWW proxy dan server seharusnya cukup mudah - sepenuhnya membaca permintaan HTTP dari klien (mungkin hanya dimulai dengan method GET, menyisakan method POST untuk nanti), bungkus pesan, dan menunggu respon.  Server selanjutnya hanya perlu parsing permintaan untuk membuka soket atau URL, mengirim permintaan, menunggu jawabannya, dan mengirimkannya kembali melalui jaringan.\nJika seseorang menerapkan ini, itu akan menjadi baik :)"
 
 #: i2p2www/pages/site/misc/minwww.html:122
 msgid ""
-"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary "
-"message\n"
-"size, but that's going to be going away since it involves either "
-"excessive memory\n"
-"overhead on intermediary routers, or additional implementation details to"
-"\n"
-"handle.  I2PTunnel is currently limited to 128KB and hasn't been a "
-"burden,\n"
+"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary message\n"
+"size, but that's going to be going away since it involves either excessive memory\n"
+"overhead on intermediary routers, or additional implementation details to\n"
+"handle.  I2PTunnel is currently limited to 128KB and hasn't been a burden,\n"
 "so perhaps it could be increased to 256KB when the I2CP spec is updated)"
-msgstr ""
-"[1] Mengapa file sebesar 128KB?  Saat ini I2CP memungkinkan ukuran pesan "
-"arbitrary secara fungsional, tapi itu akan hilang karena melibatkan "
-"overhead memori yang berlebihan pada router intermediary, atau detail "
-"implementasi tambahan yang harus ditangani.  I2PTunnel saat ini terbatas "
-"pada 128KB dan belum menjadi beban, jadi mungkin bisa ditingkatkan "
-"menjadi 256KB saat spesifikasi I2CP diperbarui)"
+msgstr "[1] Mengapa file sebesar 128KB?  Saat ini I2CP memungkinkan ukuran pesan arbitrary secara fungsional, tapi itu akan hilang karena melibatkan overhead memori yang berlebihan pada router intermediary, atau detail implementasi tambahan yang harus ditangani.  I2PTunnel saat ini terbatas pada 128KB dan belum menjadi beban, jadi mungkin bisa ditingkatkan menjadi 256KB saat spesifikasi I2CP diperbarui)"
 
 #: i2p2www/pages/site/misc/myi2p.html:4
 msgid ""
-"There has been discussion about a distributed blogging application for a "
-"few\n"
-"months now called \"MyI2P\".  While the original discussions were lost, "
-"we were \n"
-"able to retrieve a Google <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
-"of it.  It isn't pretty, but it includes the basic overview and some "
-"discussion\n"
+"There has been discussion about a distributed blogging application for a few\n"
+"months now called \"MyI2P\".  While the original discussions were lost, we were \n"
+"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
+"of it.  It isn't pretty, but it includes the basic overview and some discussion\n"
 "that ensued."
-msgstr ""
-"Telah ada diskusi tentang aplikasi blogging terdistribusi selama beberapa"
-" bulan yang sekarang disebut \"MyI2P\".  Sementara diskusi asli hilang, "
-"kami dapat mengambil <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> Google "
-"dari situ.  Ini tidak terlihat enak dipandang, tapi mencakup gambaran "
-"dasar dan beberapa diskusi yang terjadi."
+msgstr "Telah ada diskusi tentang aplikasi blogging terdistribusi selama beberapa bulan yang sekarang disebut \"MyI2P\".  Sementara diskusi asli hilang, kami dapat mengambil <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> Google dari situ.  Ini tidak terlihat enak dipandang, tapi mencakup gambaran dasar dan beberapa diskusi yang terjadi."
 
 #: i2p2www/pages/site/misc/myi2p.html:12
 #, python-format
 msgid ""
-"The application itself is not yet implemented, and the ideas behind it "
-"have \n"
-"been made less ambitious over time, but they are still valid and the "
-"current \n"
-"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality "
-"available \n"
-"along side the I2P 1.0 release.  That will include a distributed address "
-"book\n"
-"to enable secure, distributed, and human readable naming by sacrificing "
-"the \n"
-"need for global uniqueness - basically everyone has their own local "
-"address book \n"
-"and can 'subscribe' to other people's address books, letting MyI2P "
-"periodically\n"
-"retrieve new name to destination mappings (leaving conflicts up to the "
-"user to\n"
-"resolve).  In addition to the address book, there will be a distributed "
-"blogging\n"
+"The application itself is not yet implemented, and the ideas behind it have \n"
+"been made less ambitious over time, but they are still valid and the current \n"
+"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n"
+"along side the I2P 1.0 release.  That will include a distributed address book\n"
+"to enable secure, distributed, and human readable naming by sacrificing the \n"
+"need for global uniqueness - basically everyone has their own local address book \n"
+"and can 'subscribe' to other people's address books, letting MyI2P periodically\n"
+"retrieve new name to destination mappings (leaving conflicts up to the user to\n"
+"resolve).  In addition to the address book, there will be a distributed blogging\n"
 "system using a reduced and secured subset of \n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to "
-"essentially\n"
-"provide an anonymous <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
-"a 'friends list' and transparent access control (authenticated by the I2P"
-"\n"
-"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the "
-"address book)."
-msgstr ""
-"Aplikasinya sendiri belum diimplementasikan, dan gagasan di baliknya "
-"telah dibuat kurang ambisius seiring berjalannya waktu, namun tetap valid"
-" dan <a href=\"%(roadmap)s\">rencana</a> saat ini adalah memiliki "
-"fungsionalitas MyI2P inti yang tersedia di sepanjang rilis I2P 1.0.  Itu "
-"akan mencakup buku alamat terdistribusi untuk memungkinkan penamaan yang "
-"aman, terdistribusi, dan dapat dibaca manusia dengan mengorbankan "
-"kebutuhan akan keunikan global - pada dasarnya setiap orang memiliki buku"
-" alamat lokal mereka sendiri dan dapat 'berlangganan' ke buku alamat "
-"orang lain, membiarkan MyI2P secara berkala mengambil nama baru ke "
-"pemetaan tujuan (meninggalkan konflik untuk diselesaikan pengguna).  "
-"Selain buku alamat, akan ada sistem blogging terdistribusi yang "
-"menggunakan <a "
-"href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">subkunci bbcode "
-"yang</a> dikurangi dan dijamin untuk memberikan <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> anonim secara "
-"sederhana dengan 'daftar teman' dan kontrol akses transparan (disahkan "
-"oleh <a href=\"%(datagrams)s\">datagram</a> I2P dengan peraturan yang "
-"ditentukan berdasarkan buku alamat)."
+"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n"
+"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
+"a 'friends list' and transparent access control (authenticated by the I2P\n"
+"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)."
+msgstr "Aplikasinya sendiri belum diimplementasikan, dan gagasan di baliknya telah dibuat kurang ambisius seiring berjalannya waktu, namun tetap valid dan <a href=\"%(roadmap)s\">rencana</a> saat ini adalah memiliki fungsionalitas MyI2P inti yang tersedia di sepanjang rilis I2P 1.0.  Itu akan mencakup buku alamat terdistribusi untuk memungkinkan penamaan yang aman, terdistribusi, dan dapat dibaca manusia dengan mengorbankan kebutuhan akan keunikan global - pada dasarnya setiap orang memiliki buku alamat lokal mereka sendiri dan dapat 'berlangganan' ke buku alamat orang lain, membiarkan MyI2P secara berkala mengambil nama baru ke pemetaan tujuan (meninggalkan konflik untuk diselesaikan pengguna).  Selain buku alamat, akan ada sistem blogging terdistribusi yang menggunakan <a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">subkunci bbcode yang</a> dikurangi dan dijamin untuk memberikan <a href=\"http://www.livejournal.com/\">LiveJournal</a> anonim secara sederhana dengan 'daftar teman' dan kontrol akses transparan (disahkan oleh <a href=\"%(datagrams)s\">datagram</a> I2P dengan peraturan yang ditentukan berdasarkan buku alamat)."
 
 #: i2p2www/pages/site/misc/myi2p.html:29
 msgid ""
-"Additional functionality, such as integration with a DHT backing store or"
-" \n"
-"swarming file transfers for 'attachments' can be added later.  Email may "
-"or may\n"
-"not get in the first pass either, though its implementation is "
-"essentially just\n"
-"a blog entry with private access, so perhaps some UI designer can come up"
-" with\n"
-"something.  Exporting the data to RSS or access through ATOM will be an "
-"option \n"
+"Additional functionality, such as integration with a DHT backing store or \n"
+"swarming file transfers for 'attachments' can be added later.  Email may or may\n"
+"not get in the first pass either, though its implementation is essentially just\n"
+"a blog entry with private access, so perhaps some UI designer can come up with\n"
+"something.  Exporting the data to RSS or access through ATOM will be an option \n"
 "down the road as well."
-msgstr ""
-"Fungsi tambahan, seperti integrasi dengan DHT backing store atau transfer"
-" file swarming untuk 'attachment' dapat ditambahkan nanti.  Email mungkin"
-" atau mungkin juga tidak masuk pertama kali, walaupun implementasinya "
-"pada dasarnya hanya entri blog dengan akses pribadi, jadi mungkin "
-"beberapa perancang UI dapat membuat sesuatu.  Mengekspor data ke RSS atau"
-" akses melalui ATOM akan menjadi sebuah pilihan juga."
+msgstr "Fungsi tambahan, seperti integrasi dengan DHT backing store atau transfer file swarming untuk 'attachment' dapat ditambahkan nanti.  Email mungkin atau mungkin juga tidak masuk pertama kali, walaupun implementasinya pada dasarnya hanya entri blog dengan akses pribadi, jadi mungkin beberapa perancang UI dapat membuat sesuatu.  Mengekspor data ke RSS atau akses melalui ATOM akan menjadi sebuah pilihan juga."
 
 #: i2p2www/pages/site/misc/ratestats.html:2
 #: i2p2www/pages/site/misc/ratestats.html:5
@@ -1527,11 +988,9 @@ msgstr "I2P memungkinkan pengumpulan berbagai rate."
 
 #: i2p2www/pages/site/misc/ratestats.html:7
 msgid ""
-"The list was gathered using the following command in the top directory of"
-" the branch i2p.i2p:"
-msgstr ""
-"Daftar itu dikumpulkan dengan menggunakan perintah berikut di direktori "
-"atas cabang i2p.i2p:"
+"The list was gathered using the following command in the top directory of "
+"the branch i2p.i2p:"
+msgstr "Daftar itu dikumpulkan dengan menggunakan perintah berikut di direktori atas cabang i2p.i2p:"
 
 #: i2p2www/pages/site/misc/ratestats.html:10
 msgid "All options aren't needed, but it works."
@@ -1545,32 +1004,17 @@ msgid ""
 "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n"
 "on monotone.\n"
 "See\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p "
-"monotone</a>\n"
-"for more information on how to get started and check out the source "
-"anonymously.\n"
+"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n"
+"for more information on how to get started and check out the source anonymously.\n"
 "There is also a quick-start guide on the\n"
 "<a href=\"%(newdevs)s\">new developer's page</a>."
-msgstr ""
-"Kode sumber I2P disimpan di beberapa repositori monotone yang "
-"terdistribusi.\n"
-"Lihat <a href=\"http://www.monotone.ca/\">situs Monotone</a> untuk "
-"informasi tentang monotone.\n"
-"Lihat <a href=\"http://%(forum)s/viewtopic.php?t=2524\">posting forum ini"
-" di i2p monotone</a> untuk informasi lebih lanjut tentang cara memulai "
-"dan memeriksa sumber kode secara anonim.\n"
-"Ada juga panduan ringkas di <a href=\"%(newdevs)s\">halaman pengembang "
-"baru</a> ."
+msgstr "Kode sumber I2P disimpan di beberapa repositori monotone yang terdistribusi.\nLihat <a href=\"http://www.monotone.ca/\">situs Monotone</a> untuk informasi tentang monotone.\nLihat <a href=\"http://%(forum)s/viewtopic.php?t=2524\">posting forum ini di i2p monotone</a> untuk informasi lebih lanjut tentang cara memulai dan memeriksa sumber kode secara anonim.\nAda juga panduan ringkas di <a href=\"%(newdevs)s\">halaman pengembang baru</a> ."
 
 #: i2p2www/pages/site/misc/transition-guide.html:16
 msgid ""
-"If you want to get the source non-anonymously, pull from the public "
-"server mtn.welterde.de.\n"
+"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n"
 "The i2p source code branch is \"i2p.i2p\"."
-msgstr ""
-"Jika Anda ingin mendapatkan sumber kode secara non-anonim, ambil dari "
-"server publik mtn.welterde.de.\n"
-"Cabang kode sumber i2p adalah \"i2p.i2p\"."
+msgstr "Jika Anda ingin mendapatkan sumber kode secara non-anonim, ambil dari server publik mtn.welterde.de.\nCabang kode sumber i2p adalah \"i2p.i2p\"."
 
 #: i2p2www/pages/site/misc/transition-guide.html:21
 msgid "Guide"
@@ -1580,9 +1024,7 @@ msgstr "Panduan"
 msgid ""
 "\n"
 "The following is a detailed guide by Complication."
-msgstr ""
-"\n"
-"Berikut ini adalah panduan terperinci oleh Complication."
+msgstr "\nBerikut ini adalah panduan terperinci oleh Complication."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2
 msgid "How to Upgrade from 0.6.1.30 and Earlier"
@@ -1599,41 +1041,24 @@ msgid ""
 "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n"
 "we do not have his update signing key or access to\n"
 "www.i2p[.net] or dev.i2p[.net].\n"
-"Complication and zzz have generated new signing keys, and they and Amiga "
-"are providing\n"
-"update file hosting. These changes must be configured in your router to "
-"take effect."
-msgstr ""
-"Karena pengembang utama i2p telah<a href=\"%(jrandom)s\">AWOL</a>, kami "
-"tidak memiliki update signing key miliknya atau akses ke www.i2p [.net] "
-"atau dev.i2p [.net].\n"
-"Complication dan zzz telah menghasilkan signing key baru, dan mereka dan "
-"Amiga menyediakan hosting file update. Perubahan ini harus dikonfigurasi "
-"di router anda agar berlaku."
+"Complication and zzz have generated new signing keys, and they and Amiga are providing\n"
+"update file hosting. These changes must be configured in your router to take effect."
+msgstr "Karena pengembang utama i2p telah<a href=\"%(jrandom)s\">AWOL</a>, kami tidak memiliki update signing key miliknya atau akses ke www.i2p [.net] atau dev.i2p [.net].\nComplication dan zzz telah menghasilkan signing key baru, dan mereka dan Amiga menyediakan hosting file update. Perubahan ini harus dikonfigurasi di router anda agar berlaku."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17
 msgid ""
-"Make the following configuration changes and your router will "
-"automatically install\n"
+"Make the following configuration changes and your router will automatically install\n"
 "the latest release."
-msgstr ""
-"Buat perubahan konfigurasi berikut ini lalu router anda akan secara "
-"otomatis menginstal rilis terbaru."
+msgstr "Buat perubahan konfigurasi berikut ini lalu router anda akan secara otomatis menginstal rilis terbaru."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22
 #, python-format
 msgid ""
-"We recommend the automated process as it will verify the key of the "
-"signed update file.\n"
+"We recommend the automated process as it will verify the key of the signed update file.\n"
 "If you do not make these changes,\n"
 "you may manually download the i2pupdate.zip file from\n"
 "<a href=\"%(downloads)s\">the download page</a>."
-msgstr ""
-"Kami merekomendasikan proses otomatis karena akan memverifikasi kunci "
-"dari file pembaruan yang ditandatangani.\n"
-"Jika anda tidak melakukan perubahan ini, anda dapat mendownload file "
-"i2pupdate.zip secara manual dari <a href=\"%(downloads)s\">halaman "
-"download</a> ."
+msgstr "Kami merekomendasikan proses otomatis karena akan memverifikasi kunci dari file pembaruan yang ditandatangani.\nJika anda tidak melakukan perubahan ini, anda dapat mendownload file i2pupdate.zip secara manual dari <a href=\"%(downloads)s\">halaman download</a> ."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:34
 #, python-format
@@ -1642,11 +1067,9 @@ msgstr "Ubah URL Berita ke: %(url)s"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38
 msgid ""
-"Select ONE of the following new Update URLs at random and enter it into "
-"the Update URL box: "
-msgstr ""
-"Pilih SATU URL Update terbaru berikut ini secara acak dan masukkan ke "
-"dalam kotak Update URL: "
+"Select ONE of the following new Update URLs at random and enter it into the "
+"Update URL box: "
+msgstr "Pilih SATU URL Update terbaru berikut ini secara acak dan masukkan ke dalam kotak Update URL: "
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43
 msgid "Check the box \"Update through the eepProxy?\""
@@ -1667,25 +1090,14 @@ msgstr "Klik \"Apply\""
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58
 msgid ""
 "You are now ready to automatically receive the release update file,\n"
-"either by setting your update policy to \"download and install\" or by "
-"clicking on the\n"
+"either by setting your update policy to \"download and install\" or by clicking on the\n"
 "\"update available\" link when it appears."
-msgstr ""
-"Anda sekarang siap untuk secara otomatis menerima file pembaruan rilis, "
-"baik dengan cara menetapkan kebijakan pembaruan anda untuk \"mendownload "
-"dan menginstal\" atau dengan mengklik link \"update available\" saat "
-"muncul."
+msgstr "Anda sekarang siap untuk secara otomatis menerima file pembaruan rilis, baik dengan cara menetapkan kebijakan pembaruan anda untuk \"mendownload dan menginstal\" atau dengan mengklik link \"update available\" saat muncul."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:65
 #, python-format
 msgid ""
 "If you would like to verify the trusted update keys, they are also\n"
 "<a href=\"%(url)s\">posted and signed here</a>.\n"
-"Thank you for your support during this transition. For help please "
-"contact us on #i2p."
-msgstr ""
-"Jika anda ingin memverifikasi trusted update key, mereka juga <a "
-"href=\"%(url)s\">diposkan dan ditandatangani di sini</a> .\n"
-"Terima kasih atas dukungan anda selama masa transisi ini. Untuk bantuan "
-"silahkan hubungi kami di IRC channel #i2p."
-
+"Thank you for your support during this transition. For help please contact us on #i2p."
+msgstr "Jika anda ingin memverifikasi trusted update key, mereka juga <a href=\"%(url)s\">diposkan dan ditandatangani di sini</a> .\nTerima kasih atas dukungan anda selama masa transisi ini. Untuk bantuan silahkan hubungi kami di IRC channel #i2p."
diff --git a/i2p2www/translations/it/LC_MESSAGES/about.po b/i2p2www/translations/it/LC_MESSAGES/about.po
index 618d7054c2e3e9afcabd57b740c53d48f326a3e2..7fcc2e856016523bee0ac773e5a06dfc4f92aeee 100644
--- a/i2p2www/translations/it/LC_MESSAGES/about.po
+++ b/i2p2www/translations/it/LC_MESSAGES/about.po
@@ -1,26 +1,31 @@
-# Italian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # agge92 <agge92@gmail.com>, 2014
+# agge92 <agge92@gmail.com>, 2014
+# alxbrb <al3xfree@gmail.com>, 2014
+# alamir <christianm@libero.it>, 2014
 # alxbrb <al3xfree@gmail.com>, 2014
 # alamir <christianm@libero.it>, 2014
 # Giuseppe Pignataro <rogepix@gmail.com>, 2014
+# Giuseppe Pignataro <rogepix@gmail.com>, 2014
 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: alamir <christianm@libero.it>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Giuseppe Pignataro <rogepix@gmail.com>, 2014\n"
 "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: it\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -30,14 +35,9 @@ msgstr "Altri client I2P"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
-msgstr ""
-"Le principali implementazioni del client I2P sono state scritte in Java. "
-"Se per qualche motivo non potete eseguire codice Java sui vostri "
-"terminali, ci sono delle implementazioni realizzate in altri linguaggi "
-"dai membri della community."
+msgstr "Le principali implementazioni del client I2P sono state scritte in Java. Se per qualche motivo non potete eseguire codice Java sui vostri terminali, ci sono delle implementazioni realizzate in altri linguaggi dai membri della community."
 
 #: i2p2www/pages/site/about/alternative-clients.html:12
 #, python-format
@@ -45,30 +45,21 @@ msgid ""
 "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n"
 "As of early 2016, i2pd is became stable enough to be used in \n"
 "production, and since summer 2016 it fully implements all I2P APIs."
-msgstr ""
-"<a href=\"%(i2pd)s\">i2pd</a> è un client I2P scritto in C++.\n"
-"Agli inizi del 2016, i2pd è diventato abbastanza stabile da essere usato\n"
-"in produzione, e dall'estate 2016 implementa tutte le API I2P."
+msgstr "<a href=\"%(i2pd)s\">i2pd</a> è un client I2P scritto in C++.\nAgli inizi del 2016, i2pd è diventato abbastanza stabile da essere usato\nin produzione, e dall'estate 2016 implementa tutte le API I2P."
 
 #: i2p2www/pages/site/about/alternative-clients.html:19
 #, python-format
 msgid ""
 "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero "
 "cryptocurrency."
-msgstr ""
-"<a href=\"%(kovri)s\">Kovri</a> è un fork di i2pd attivamente sviluppato "
-"per la criptomoneta Monero."
+msgstr "<a href=\"%(kovri)s\">Kovri</a> è un fork di i2pd attivamente sviluppato per la criptomoneta Monero."
 
 #: i2p2www/pages/site/about/alternative-clients.html:24
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
-msgstr ""
-"<a href=\"%(go_i2p)s\">Go-I2P</a> è un client I2P scritto\n"
-"in\n"
-"<a href=\"%(golang)s\">Go</a>. Il progetto è ancora in fase di sviluppo."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
+msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> è un client I2P scritto\nin\n<a href=\"%(golang)s\">Go</a>. Il progetto è ancora in fase di sviluppo."
 
 #: i2p2www/pages/site/about/browser-config.html:2
 msgid "Web Browser Configuration"
@@ -80,11 +71,147 @@ msgstr "Glossario"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
-"Questa pagina elenca i termini usati frequentemente quando si discute I2P"
-" e la crittografia."
+
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
@@ -92,37 +219,27 @@ msgstr "Hall of Fame"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
 msgid "Big thanks go to the following people who have donated to I2P!"
-msgstr ""
-"Un sentito ringraziamento va a queste persone, che hanno effettuato "
-"donazioni ad I2P!"
+msgstr "Un sentito ringraziamento va a queste persone, che hanno effettuato donazioni ad I2P!"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
-msgstr ""
-"Se hai fatto una donazione, invia una email a <a "
-"href=\"mailto:%(echelon)s\">echelon</a> con il tuo nome o pseudonimo (ed "
-"eventualmente l'homepage): potremo così aggiungerti a questa lista."
+msgstr "Se hai fatto una donazione, invia una email a <a href=\"mailto:%(echelon)s\">echelon</a> con il tuo nome o pseudonimo (ed eventualmente l'homepage): potremo così aggiungerti a questa lista."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -136,12 +253,8 @@ msgstr "Invisible Internet Project"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -151,13 +264,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -166,15 +279,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -183,28 +296,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -213,36 +325,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -251,13 +362,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -266,15 +377,11 @@ msgstr "Confronti"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -284,9 +391,7 @@ msgstr ""
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina"
-" della rete:</a>"
+msgstr "I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina della rete:</a>"
 
 #: i2p2www/pages/site/about/media.html:2
 msgid "Presentations on I2P"
@@ -295,13 +400,9 @@ msgstr "Presentazioni su I2P"
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
-msgstr ""
-"Ecco una selezione di link a presentazioni, video e guide su I2P. I link "
-"alla documentazione approfondita su I2P sono disponibili <a "
-"href=\"%(papers)s\">qui</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
+msgstr "Ecco una selezione di link a presentazioni, video e guide su I2P. I link alla documentazione approfondita su I2P sono disponibili <a href=\"%(papers)s\">qui</a>."
 
 #: i2p2www/pages/site/about/media.html:8
 #, python-format
@@ -312,9 +413,7 @@ msgstr "Per richiedere un'aggiunta a questa pagina, invia una %(email)s."
 msgid ""
 "\n"
 "Newest links are at the bottom of each section."
-msgstr ""
-"\n"
-"I link più recenti sono in fondo ad ogni sezione."
+msgstr "\nI link più recenti sono in fondo ad ogni sezione."
 
 #: i2p2www/pages/site/about/media.html:16
 msgid "Presentations"
@@ -327,11 +426,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(transcript)s\">transcript</a>\n"
 "Lance James (0x90), February 2002."
-msgstr ""
-"Presentazione IIP al CodeCon\n"
-"<a href=\"%(mp3)s\">audio MP3</a>\n"
-"<a href=\"%(transcript)s\">trascrizione</a>\n"
-"Lance James (0x90), Febbraio 2002."
+msgstr "Presentazione IIP al CodeCon\n<a href=\"%(mp3)s\">audio MP3</a>\n<a href=\"%(transcript)s\">trascrizione</a>\nLance James (0x90), Febbraio 2002."
 
 #: i2p2www/pages/site/about/media.html:27
 #, python-format
@@ -340,11 +435,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(slides)s\">slides</a>\n"
 "Lance James (0x90), September 2002."
-msgstr ""
-"Presentazione IIP al ToorCon\n"
-"<a href=\"%(mp3)s\">Audio MP3</a>\n"
-"<a href=\"%(slides)s\">Slide</a>\n"
-"Lance James (0x90), Settembre 2002."
+msgstr "Presentazione IIP al ToorCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(slides)s\">Slide</a>\nLance James (0x90), Settembre 2002."
 
 #: i2p2www/pages/site/about/media.html:35
 #, python-format
@@ -354,12 +445,7 @@ msgid ""
 "An introduction into anonymous communication with I2P.\n"
 "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n"
 "Jens Kubieziel, 24C3 Berlin, December 28, 2007."
-msgstr ""
-"<a href=\"%(video)s\">To Be or I2P</a>\n"
-"(Video Youtube)\n"
-"Una introduzione alla comunicazione anonima con I2P.\n"
-"<a href=\"%(pdf)s\">To Be or I2P (presentazione in PDF)</a>,\n"
-"Jens Kubieziel, 24C3 Berlino, 28 Dicembre 2007."
+msgstr "<a href=\"%(video)s\">To Be or I2P</a>\n(Video Youtube)\nUna introduzione alla comunicazione anonima con I2P.\n<a href=\"%(pdf)s\">To Be or I2P (presentazione in PDF)</a>,\nJens Kubieziel, 24C3 Berlino, 28 Dicembre 2007."
 
 #: i2p2www/pages/site/about/media.html:44
 #, python-format
@@ -367,17 +453,12 @@ msgid ""
 "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n"
 "Lars Schimmer,\n"
 "March 14-15, 2009"
-msgstr ""
-"<a href=\"%(video)s\">Video del discorso su I2P al Chemnitz Linux "
-"Tag</a>,\n"
-"Lars Schimmer,\n"
-"14-15 March 2009"
+msgstr "<a href=\"%(video)s\">Video del discorso su I2P al Chemnitz Linux Tag</a>,\nLars Schimmer,\n14-15 March 2009"
 
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -388,10 +469,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n"
 "Adrian Crenshaw. Schmoocon Firetalk, January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Dentro la darknet I2P: benvenuti nel "
-"cipherspazio</a>\n"
-"Adrian Crenshaw. Schmoocon Firetalk, Gennaio 2011"
+msgstr "<a href=\"%(link)s\">Dentro la darknet I2P: benvenuti nel cipherspazio</a>\nAdrian Crenshaw. Schmoocon Firetalk, Gennaio 2011"
 
 #: i2p2www/pages/site/about/media.html:62
 #, python-format
@@ -399,72 +477,47 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
-msgstr ""
-"<a href=\"%(link)s\">Usare la tecnologia per aumentare la libertà</a>\n"
-"(Video Youtube)\n"
-"Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 Marzo "
-"2011.\n"
-"I riferimenti ad I2P sono a partire da 10:00 fino 20:00 nel video."
+msgstr "<a href=\"%(link)s\">Usare la tecnologia per aumentare la libertà</a>\n(Video Youtube)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 Marzo 2011.\nI riferimenti ad I2P sono a partire da 10:00 fino 20:00 nel video."
 
 #: i2p2www/pages/site/about/media.html:70
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Debolezze comuni delle darknet</a>\n"
-"(Video Youtube)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 "
-"Luglio 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
+msgstr "<a href=\"%(link)s\">Debolezze comuni delle darknet</a>\n(Video Youtube)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 Luglio 2011."
 
 #: i2p2www/pages/site/about/media.html:76
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Corso avanzato di I2P / Tor</a>\n"
-"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 Agosto 2011."
+msgstr "<a href=\"%(link)s\">Corso avanzato di I2P / Tor</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 Agosto 2011."
 
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011."
-msgstr ""
-"<a href=\"%(live)s\">Cipherspazio/Darknets: una rassegna delle strategie "
-"di attacco -\n"
-"DEF CON, versione dal vivo (Video Youtube)</a>,\n"
-"<a href=\"%(studio)s\">Version \"Studio\" (Video Youtube)</a>,\n"
-"<a href=\"%(slides)s\">Slide (ppt)</a>\n"
-"Adrian Crenshaw. DEF CON 19, Las Vegas, 7 Agosto 2011."
+msgstr "<a href=\"%(live)s\">Cipherspazio/Darknets: una rassegna delle strategie di attacco -\nDEF CON, versione dal vivo (Video Youtube)</a>,\n<a href=\"%(studio)s\">Version \"Studio\" (Video Youtube)</a>,\n<a href=\"%(slides)s\">Slide (ppt)</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 7 Agosto 2011."
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
-msgstr ""
-"<a href=\"http://0x375.org/\">Gli ecosistemi moderni del "
-"cipherspazio</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), November "
-"4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
+msgstr "<a href=\"http://0x375.org/\">Gli ecosistemi moderni del cipherspazio</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
 
 #: i2p2www/pages/site/about/media.html:95
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -472,24 +525,20 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2PCon 2015</a>\n"
 "Toronto, August 15-16, 2015"
-msgstr ""
-"<a href=\"%(link)s\">I2PCon 2015</a>\n"
-"Toronto, 15-16 agosto, 2015"
+msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 agosto, 2015"
 
 #: i2p2www/pages/site/about/media.html:106
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -501,8 +550,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -532,11 +580,7 @@ msgid ""
 "(Youtube Video)\n"
 "This guide will show you how to install I2P in Windows XP.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Guida ad I2P su Windows</a>\n"
-"(Video Youtube)\n"
-"Questa guida mostra come installare I2P su Windows XP.\n"
-"Di <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Guida ad I2P su Windows</a>\n(Video Youtube)\nQuesta guida mostra come installare I2P su Windows XP.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:155
 #, python-format
@@ -545,11 +589,7 @@ msgid ""
 "(Youtube Video)\n"
 "This will guide you through how to install I2P on a Debian Linux System.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Guida ad I2P su Debian</a>\n"
-"(Video Youtube)\n"
-"Questa guida mostra come installare I2P su un sistema Linux Debian.\n"
-"Di <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Guida ad I2P su Debian</a>\n(Video Youtube)\nQuesta guida mostra come installare I2P su un sistema Linux Debian.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:162
 #, python-format
@@ -558,55 +598,33 @@ msgid ""
 "(Youtube Video)\n"
 "How to set up an anonymous web site in I2P.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Come creare siti anonimi su I2P</a>\n"
-"(Video Youtube)\n"
-"Guida che mostra come creare siti anonimi su I2P.\n"
-"Di <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Come creare siti anonimi su I2P</a>\n(Video Youtube)\nGuida che mostra come creare siti anonimi su I2P.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:169
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Guida ad I2P su Mac OS X</a>\n"
-"(Video Youtube)\n"
-"Questa guida mostra come installare I2P su Mac OS X e come connettersi a "
-"irc.telecomix.i2p.\n"
-"Di <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Guida ad I2P su Mac OS X</a>\n(Video Youtube)\nQuesta guida mostra come installare I2P su Mac OS X e come connettersi a irc.telecomix.i2p.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Felix Atari spiega i principi di base di I2P</a>\n"
-"(Video Youtube)\n"
-"L'agente Felix Atari del Telecomix Crypto Munitions Bureau.\n"
-"Di <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Felix Atari spiega i principi di base di I2P</a>\n(Video Youtube)\nL'agente Felix Atari del Telecomix Crypto Munitions Bureau.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
-msgstr ""
-"<a href=\"%(link)s\">Essere consapevole su I2P, la darknet anonima basata"
-" su P2P (Installazione Windows)</a>\n"
-"(Video Youtube)\n"
-"Questa guida mostra come installare e configurare il software necessario "
-"per accedere ad I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
+msgstr "<a href=\"%(link)s\">Essere consapevole su I2P, la darknet anonima basata su P2P (Installazione Windows)</a>\n(Video Youtube)\nQuesta guida mostra come installare e configurare il software necessario per accedere ad I2P."
 
 #: i2p2www/pages/site/about/media.html:189
 #, python-format
@@ -614,10 +632,7 @@ msgid ""
 "<a href=\"%(link)s\">How to connect to I2P</a>\n"
 "(Youtube Video)\n"
 "How to install I2P on Ubuntu."
-msgstr ""
-"<a href=\"%(link)s\">Come connettersi ad I2P</a>\n"
-"(Video Youtube)\n"
-"Come installare I2P su Ubuntu."
+msgstr "<a href=\"%(link)s\">Come connettersi ad I2P</a>\n(Video Youtube)\nCome installare I2P su Ubuntu."
 
 #: i2p2www/pages/site/about/media.html:195
 #, python-format
@@ -626,12 +641,7 @@ msgid ""
 "(Video)\n"
 "Adrian Crenshaw.\n"
 "January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Installare la il software della darknet I2P su "
-"Linux</a>\n"
-"(Video)\n"
-"Adrian Crenshaw.\n"
-"Gennaio 2011"
+msgstr "<a href=\"%(link)s\">Installare la il software della darknet I2P su Linux</a>\n(Video)\nAdrian Crenshaw.\nGennaio 2011"
 
 #: i2p2www/pages/site/about/media.html:202
 #, python-format
@@ -639,10 +649,7 @@ msgid ""
 "<a href=\"%(link)s\">Short garlic routing animation</a>\n"
 "(Youtube Video)\n"
 "Adrian Crenshaw.\n"
-msgstr ""
-"<a href=\"%(link)s\">Breve animazione del sistema di routing garlic</a>\n"
-"(Video Youtube)\n"
-"Adrian Crenshaw.\n"
+msgstr "<a href=\"%(link)s\">Breve animazione del sistema di routing garlic</a>\n(Video Youtube)\nAdrian Crenshaw.\n"
 
 #: i2p2www/pages/site/about/media.html:210
 msgid "Articles and Interviews"
@@ -655,11 +662,7 @@ msgid ""
 "<a href=\"%(link1)s\">Part 1</a>\n"
 "<a href=\"%(link2)s\">Part 2</a>\n"
 "July 26, 2002."
-msgstr ""
-"Lance James (0x90) Intervistato da DistributedCity\n"
-"<a href=\"%(link1)s\">Parte 1</a>\n"
-"<a href=\"%(link2)s\">Parte 2</a>\n"
-"26 Luglio, 2002."
+msgstr "Lance James (0x90) Intervistato da DistributedCity\n<a href=\"%(link1)s\">Parte 1</a>\n<a href=\"%(link2)s\">Parte 2</a>\n26 Luglio, 2002."
 
 #: i2p2www/pages/site/about/media.html:221
 #, python-format
@@ -668,32 +671,22 @@ msgid ""
 "(original in Spanish)\n"
 "<a href=\"%(link)s\">English translation</a>\n"
 "October 31, 2002."
-msgstr ""
-"Lance James (0x90) Intervistato da El País\n"
-"(originale in Spagnolo)\n"
-"<a href=\"%(link)s\">Traduzione in Inglese</a>\n"
-"31 Ottobre, 2002."
+msgstr "Lance James (0x90) Intervistato da El País\n(originale in Spagnolo)\n<a href=\"%(link)s\">Traduzione in Inglese</a>\n31 Ottobre, 2002."
 
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
-msgstr ""
-"<a href=\"%(link)s\">Articolo di Netzwelt.de su come essere anonimi su "
-"Internet</a>\n"
-"(In tedesco)\n"
-"Novembre 2007."
+msgstr "<a href=\"%(link)s\">Articolo di Netzwelt.de su come essere anonimi su Internet</a>\n(In tedesco)\nNovembre 2007."
 
 #: i2p2www/pages/site/about/media.html:239
 #, python-format
@@ -701,20 +694,14 @@ msgid ""
 "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n"
 "March 2009\n"
 "<a href=\"%(german)s\">German translation</a>"
-msgstr ""
-"<a href=\"%(link)s\">zzz intervistato da gulli.com</a>\n"
-"Marzo 2009\n"
-"<a href=\"%(german)s\">traduzione in Tedesco</a>"
+msgstr "<a href=\"%(link)s\">zzz intervistato da gulli.com</a>\nMarzo 2009\n<a href=\"%(german)s\">traduzione in Tedesco</a>"
 
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -723,43 +710,34 @@ msgid ""
 "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n"
 "Jonathan Cox,\n"
 "November 11, 2011."
-msgstr ""
-"<a href=\"%(link)s\">I2P - Anonimato per le masse</a>,\n"
-"Jonathan Cox,\n"
-"11 Novembre 2011."
+msgstr "<a href=\"%(link)s\">I2P - Anonimato per le masse</a>,\nJonathan Cox,\n11 Novembre 2011."
 
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -768,16 +746,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -789,19 +765,62 @@ msgstr "Altro"
 msgid ""
 "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n"
 "February 14, 2014"
-msgstr ""
-"I2P è stato menzionato nell' episodio 2 della seconda stagione di \"House"
-" of Cards\" andato in onda su Netflix \n"
-"il 14 Febbraio 2014"
+msgstr "I2P è stato menzionato nell' episodio 2 della seconda stagione di \"House of Cards\" andato in onda su Netflix \nil 14 Febbraio 2014"
 
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -810,18 +829,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -832,84 +848,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -920,8 +913,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -929,27 +921,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -957,26 +945,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -987,10 +966,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -998,18 +975,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -1020,17 +994,11 @@ msgstr "Membri del progetto I2P"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
-msgstr ""
-"Siamo un piccolo gruppo di persone sparse su molti continenti, impegnate "
-"a migliorare diversi aspetti del progetto e discutere l'implementazione "
-"della rete.\n"
-"<a href=\"%(volunteer)s\">Collabora con noi!</a>"
+msgstr "Siamo un piccolo gruppo di persone sparse su molti continenti, impegnate a migliorare diversi aspetti del progetto e discutere l'implementazione della rete.\n<a href=\"%(volunteer)s\">Collabora con noi!</a>"
 
 #: i2p2www/pages/site/about/team.html:14
 msgid "Admin"
@@ -1199,7 +1167,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1208,9 +1177,7 @@ msgstr ""
 
 #: i2p2www/pages/site/about/team.html:122
 msgid "manage the public project website content design"
-msgstr ""
-"gestione della progettazione dei contenuti per il sito web pubblico del "
-"progetto"
+msgstr "gestione della progettazione dei contenuti per il sito web pubblico del progetto"
 
 #: i2p2www/pages/site/about/team.html:125
 #, python-format
@@ -1356,15 +1323,11 @@ msgstr "desktopgui, dijjer port"
 
 #: i2p2www/pages/site/about/team.html:228
 msgid "Debian/Ubuntu Packager and PPA maintainer"
-msgstr ""
-"Assemblatore del pacchetto per Debian/Ubuntu Packager e manutentore della"
-" PPA"
+msgstr "Assemblatore del pacchetto per Debian/Ubuntu Packager e manutentore della PPA"
 
 #: i2p2www/pages/site/about/team.html:232
 msgid "Routerconsole backend and UI work, website revamp, unit tests work"
-msgstr ""
-"Backend del routerconsole, migliorie alla interfaccia utente, rinnovo "
-"sito web, lavoro sul testing d'unità"
+msgstr "Backend del routerconsole, migliorie alla interfaccia utente, rinnovo sito web, lavoro sul testing d'unità"
 
 #: i2p2www/pages/site/about/team.html:237
 msgid "Help needed on many fronts!"
@@ -1445,7 +1408,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "sviluppo jbigi, migrazione wiki, pulizia documentazione"
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr "debugging java, sviluppo del client I2PTunnel e della console del router"
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1495,32 +1459,25 @@ msgstr "&hellip; e molti altri"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1538,8 +1495,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1578,10 +1535,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1595,15 +1550,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1612,11 +1563,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1671,8 +1619,7 @@ msgstr "Secondo giorno"
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1690,24 +1637,13 @@ msgstr "Agosto 2010"
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
-msgstr ""
-"Ci sono alcune tecniche principali che si possono usare per aumentare le "
-"prestazioni percepite di I2P: alcune delle seguenti sono relative alla "
-"CPU, altre alla larghezza di banda, ed altre ancora al protocollo. "
-"Comunque, tutte influiscono sulla latenza, sulla velocità di "
-"trasmissione, e sulla prestazioni percepite della rete, perché riducono "
-"la lotta per le scarse risorse. Questa lista non è ovviamente esaustiva, "
-"ma copre le principali tecniche che si possono usare."
+msgstr "Ci sono alcune tecniche principali che si possono usare per aumentare le prestazioni percepite di I2P: alcune delle seguenti sono relative alla CPU, altre alla larghezza di banda, ed altre ancora al protocollo. Comunque, tutte influiscono sulla latenza, sulla velocità di trasmissione, e sulla prestazioni percepite della rete, perché riducono la lotta per le scarse risorse. Questa lista non è ovviamente esaustiva, ma copre le principali tecniche che si possono usare."
 
 #: i2p2www/pages/site/about/performance/future.html:15
 #: i2p2www/pages/site/about/performance/index.html:106
@@ -1715,9 +1651,7 @@ msgstr ""
 msgid ""
 "For past performance improvements see the <a href=\"%(history)s\">\n"
 "Performance History</a>."
-msgstr ""
-"Per conoscere i miglioramenti alle prestazioni apportati in passato, "
-"consulta lo <a href=\"%(history)s\">Storico delle prestazioni</a>."
+msgstr "Per conoscere i miglioramenti alle prestazioni apportati in passato, consulta lo <a href=\"%(history)s\">Storico delle prestazioni</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:20
 msgid "Better peer profiling and selection"
@@ -1726,24 +1660,13 @@ msgstr "Miglior profilo e selezione dei peer"
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
-msgstr ""
-"Probabilmente una delle strategie più importanti per aumentare le "
-"prestazioni è migliorare come i router scelgono i peer tramite cui "
-"costruire il percorso dei tunnel: assicurati che i router non usino peer "
-"con collegamenti lenti, né quelli che abbiano collegamenti veloci ma "
-"sovraccarichi, ecc. In aggiunta, assicurati di non esporti ai tipi di "
-"attacco <a href=\"%(sybilpdf)s\">Sybil</a> perpetrati da un avversario "
-"potente che ha a disposizione molti elaboratori veloci."
+msgstr "Probabilmente una delle strategie più importanti per aumentare le prestazioni è migliorare come i router scelgono i peer tramite cui costruire il percorso dei tunnel: assicurati che i router non usino peer con collegamenti lenti, né quelli che abbiano collegamenti veloci ma sovraccarichi, ecc. In aggiunta, assicurati di non esporti ai tipi di attacco <a href=\"%(sybilpdf)s\">Sybil</a> perpetrati da un avversario potente che ha a disposizione molti elaboratori veloci."
 
 #: i2p2www/pages/site/about/performance/future.html:30
 msgid "Network database tuning"
@@ -1751,33 +1674,15 @@ msgstr "Affinamento del database di rete"
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
-msgstr ""
-"Vorremmo rendere più efficienti gli algoritmi di manutenzione e salute "
-"del database della rete, invece di esplorare costantemente la keyspace "
-"per nuovi peer: ciò infatti causa incrementa significativamente il numero"
-" di messaggi di rete e il carico del router. Possiamo rallentare o anche "
-"fermare l'esplorazione fino a che ci accorgiamo che c'è qualcosa di nuovo"
-" che val la pena di essere trovato (p. es. diminuire il tasso di "
-"esplorazione, basato sull'ultima occasione in cui qualcuno ci ha indicato"
-" qualcun altro di cui non sappiamo nulla). Possiamo anche affinare quello"
-" che inviamo correntemente: quanti peer rimandiamo indietro (o anche se "
-"rimandiamo indietro una risposta), così come quante ricerche effettuiamo "
-"in contemporanea."
+msgstr "Vorremmo rendere più efficienti gli algoritmi di manutenzione e salute del database della rete, invece di esplorare costantemente la keyspace per nuovi peer: ciò infatti causa incrementa significativamente il numero di messaggi di rete e il carico del router. Possiamo rallentare o anche fermare l'esplorazione fino a che ci accorgiamo che c'è qualcosa di nuovo che val la pena di essere trovato (p. es. diminuire il tasso di esplorazione, basato sull'ultima occasione in cui qualcuno ci ha indicato qualcun altro di cui non sappiamo nulla). Possiamo anche affinare quello che inviamo correntemente: quanti peer rimandiamo indietro (o anche se rimandiamo indietro una risposta), così come quante ricerche effettuiamo in contemporanea."
 
 #: i2p2www/pages/site/about/performance/future.html:42
 msgid "Session Tag Tuning and Improvements"
@@ -1786,48 +1691,24 @@ msgstr "Miglioramenti e affinamento del tag di sessione"
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
-msgstr ""
-"L'algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"funziona gestendo un insieme di array di 32 byte, utilizzabili solo una "
-"volta, eliminandoli se non sono rapidamente usati. Se eliminiamo questi "
-"array troppo presto, siamo costretti a una nuova ricodifica di tipo "
-"ElGamal, che è dispendiosa; d'altra parte, se non li eliminiamo "
-"abbastanza velocemente, dobbiamo ridurre la loro quantità, per non "
-"occupare troppa memoria (ed evitare che, se il destinatario presenta "
-"errori e perde alcune etichette, ulteriori errori di codifica occorrano "
-"primo di essere trovati). Possiamo, in sicurezza e con maggiore "
-"efficienza, migliorare la durata delle etichette, utilizzando rilevazioni"
-" attive e algoritmi di feedback: ciò si ottiene rimpiazzando la codifica "
-"ElGamal con una più banale AES."
+msgstr "L'algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> funziona gestendo un insieme di array di 32 byte, utilizzabili solo una volta, eliminandoli se non sono rapidamente usati. Se eliminiamo questi array troppo presto, siamo costretti a una nuova ricodifica di tipo ElGamal, che è dispendiosa; d'altra parte, se non li eliminiamo abbastanza velocemente, dobbiamo ridurre la loro quantità, per non occupare troppa memoria (ed evitare che, se il destinatario presenta errori e perde alcune etichette, ulteriori errori di codifica occorrano primo di essere trovati). Possiamo, in sicurezza e con maggiore efficienza, migliorare la durata delle etichette, utilizzando rilevazioni attive e algoritmi di feedback: ciò si ottiene rimpiazzando la codifica ElGamal con una più banale AES."
 
 #: i2p2www/pages/site/about/performance/future.html:55
 #, python-format
 msgid ""
 "Additional ideas for improving Session Tag delivery are described on the\n"
 "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>."
-msgstr ""
-"Altre idee su come migliorare la spedizione di etichette di sessione sono"
-" descritte qui:\n"
-"<a href=\"%(elgamalaes)s#future\">Pagina di ElGamal/AES+SessionTag</a>."
+msgstr "Altre idee su come migliorare la spedizione di etichette di sessione sono descritte qui:\n<a href=\"%(elgamalaes)s#future\">Pagina di ElGamal/AES+SessionTag</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:61
 msgid "Migrate sessionTag to synchronized PRNG"
@@ -1838,64 +1719,29 @@ msgstr "Migrare sessionTag per sincronizzare PRNG"
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
-msgstr ""
-"Adesso, il nostro algoritmo <a "
-"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> lavora etichettando "
-"ogni messaggio cifrato con un numero casuale unico di 32, di tipo nonce "
-"(una \"etichetta di sessione\"), che identifica quel messaggio come "
-"codificato con la chiave di sessione AES associata. Questo impedisce ai "
-"peer di distinguere i messaggi che appartengono alla stessa sessione, "
-"visto che ogni messaggio possiede una etichetta casuale completamente "
-"nuova. Per far questo, l'algoritmo impacchetta pochi messaggi alla volta "
-"ed usa un nuovo insieme di etichette di sessione, all'interno dello "
-"stesso messaggio codificato, inviando così, in modo trasparente, un "
-"metodo per identificare i messaggi futuri. In seguito bisogna tener "
-"traccia di quali messaggi sono stati inviati con successo, per sapere "
-"quali etichette possiamo usare."
+msgstr "Adesso, il nostro algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> lavora etichettando ogni messaggio cifrato con un numero casuale unico di 32, di tipo nonce (una \"etichetta di sessione\"), che identifica quel messaggio come codificato con la chiave di sessione AES associata. Questo impedisce ai peer di distinguere i messaggi che appartengono alla stessa sessione, visto che ogni messaggio possiede una etichetta casuale completamente nuova. Per far questo, l'algoritmo impacchetta pochi messaggi alla volta ed usa un nuovo insieme di etichette di sessione, all'interno dello stesso messaggio codificato, inviando così, in modo trasparente, un metodo per identificare i messaggi futuri. In seguito bisogna tener traccia di quali messaggi sono stati inviati con successo, per sapere quali etichette possiamo usare."
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
 "to handle out of order delivery)."
-msgstr ""
-"Questo funziona bene ed è abbastanza robusto, però è inefficiente per "
-"quanto riguarda l'uso della larghezza di banda, perché richiede la "
-"spedizione delle etichette in anticipo (e non tutte le etichette sono "
-"sempre necessarie: alcune possono anche essere sprecate, a causa della "
-"loro breve durata). Comunque, mediamente, la spedizione anticipata "
-"dell'etichetta di sessione costa 32 byte per ogni messaggio (cioè la "
-"dimensione di un'etichetta). Tuttavia, Taral ha suggerito che la "
-"dimensione può essere evitata rimpiazzando la spedizione delle etichette "
-"con un PRNG sincronizzato: quando si stabilisce una nuova sessione "
-"(attraverso un blocco codificato con ElGamal), entrambi i lati diffondono"
-" un PRNG da usare e generano le etichette di sessione su richiesta (con "
-"il ricevente che calcola anticipatamente i possibili valori futuri per "
-"gestire un invio non ordinato)."
+msgstr "Questo funziona bene ed è abbastanza robusto, però è inefficiente per quanto riguarda l'uso della larghezza di banda, perché richiede la spedizione delle etichette in anticipo (e non tutte le etichette sono sempre necessarie: alcune possono anche essere sprecate, a causa della loro breve durata). Comunque, mediamente, la spedizione anticipata dell'etichetta di sessione costa 32 byte per ogni messaggio (cioè la dimensione di un'etichetta). Tuttavia, Taral ha suggerito che la dimensione può essere evitata rimpiazzando la spedizione delle etichette con un PRNG sincronizzato: quando si stabilisce una nuova sessione (attraverso un blocco codificato con ElGamal), entrambi i lati diffondono un PRNG da usare e generano le etichette di sessione su richiesta (con il ricevente che calcola anticipatamente i possibili valori futuri per gestire un invio non ordinato)."
 
 #: i2p2www/pages/site/about/performance/future.html:87
 msgid "Longer lasting tunnels"
@@ -1903,50 +1749,26 @@ msgstr "Tunnel di lunga durata"
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
-msgstr ""
-"La durata attuale predefinita di un tunnel - 10 minuti - è del tutto "
-"arbitraria, anche se \"sembra ok\". una volta che avremo un codice che "
-"risani il tunnel e una rilevazione dei malfunzionamenti più efficace, "
-"saremo in grado di variare questa durata con maggior sicurezza, riducendo"
-" il carico della rete e della CPU (a causa dei messaggi di creazione "
-"tunnel, avidi di risorse)."
+msgstr "La durata attuale predefinita di un tunnel - 10 minuti - è del tutto arbitraria, anche se \"sembra ok\". una volta che avremo un codice che risani il tunnel e una rilevazione dei malfunzionamenti più efficace, saremo in grado di variare questa durata con maggior sicurezza, riducendo il carico della rete e della CPU (a causa dei messaggi di creazione tunnel, avidi di risorse)."
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
-msgstr ""
-"Questo sembra una facile soluzione per elevati carichi su router con "
-"ampia larghezza di banda, ma non possiamo ricorrere a ciò fino a che non "
-"avremo affinato maggiormente gli algoritmi di costruzione del tunnel. "
-"Comunque, il ciclo di vita di 10 minuti del tunnel è codificato in molti "
-"punti, pertanto un notevole impegno sarebbe richiesto per modificare la "
-"durata. Inoltre, sarebbe difficile mantenere la retrocompatibilità con "
-"una tale modifica."
+"Also, it would be difficult to maintain backward compatibility with such a change."
+msgstr "Questo sembra una facile soluzione per elevati carichi su router con ampia larghezza di banda, ma non possiamo ricorrere a ciò fino a che non avremo affinato maggiormente gli algoritmi di costruzione del tunnel. Comunque, il ciclo di vita di 10 minuti del tunnel è codificato in molti punti, pertanto un notevole impegno sarebbe richiesto per modificare la durata. Inoltre, sarebbe difficile mantenere la retrocompatibilità con una tale modifica."
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
-msgstr ""
-"Attualmente, siccome la media delle percentuali di successo nella "
-"creazione di tunnel della rete è piuttosto alta, non abbiamo pianificato "
-"di estendere la durata dei tunnel."
+msgstr "Attualmente, siccome la media delle percentuali di successo nella creazione di tunnel della rete è piuttosto alta, non abbiamo pianificato di estendere la durata dei tunnel."
 
 #: i2p2www/pages/site/about/performance/future.html:108
 msgid "Adjust the timeouts"
@@ -1954,43 +1776,22 @@ msgstr "Impostare i timeout"
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
-msgstr ""
-"I timeout attuali per varie attività sono un altro esempio di "
-"impostazioni abbastanza arbitrarie ma che \"sembrano ok\". Perché abbiamo"
-" un timeout di 60 secondi per il \"peer irraggiungibile\"? Perché "
-"cerchiamo di inviare, dopo 10 secondi, attraverso un tunnel diverso che "
-"ci mostra un LeaseSet? Perché le richieste al database di rete hanno un "
-"limite temporale di 20 o 60 secondi? Perché le destinazioni sono "
-"impostate per richiedere un nuovo insieme di tunnel ogni 10 minuti? "
-"Perché concediamo 60 secondi ad un peer per rispondere alla nostra "
-"richiesta di unirsi al tunnel? Perché consideriamo \"morto\" un tunnel "
-"che non supera i nostri test entro 60 secondi?"
+msgstr "I timeout attuali per varie attività sono un altro esempio di impostazioni abbastanza arbitrarie ma che \"sembrano ok\". Perché abbiamo un timeout di 60 secondi per il \"peer irraggiungibile\"? Perché cerchiamo di inviare, dopo 10 secondi, attraverso un tunnel diverso che ci mostra un LeaseSet? Perché le richieste al database di rete hanno un limite temporale di 20 o 60 secondi? Perché le destinazioni sono impostate per richiedere un nuovo insieme di tunnel ogni 10 minuti? Perché concediamo 60 secondi ad un peer per rispondere alla nostra richiesta di unirsi al tunnel? Perché consideriamo \"morto\" un tunnel che non supera i nostri test entro 60 secondi?"
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
-msgstr ""
-"Ciascuna di queste evenienze può essere risolta con un codice più "
-"adattivo, e anche con parametri di affinamento che permettano un adeguato"
-" compromesso tra larghezza di banda, latenza e uso della CPU."
+msgstr "Ciascuna di queste evenienze può essere risolta con un codice più adattivo, e anche con parametri di affinamento che permettano un adeguato compromesso tra larghezza di banda, latenza e uso della CPU."
 
 #: i2p2www/pages/site/about/performance/future.html:125
 msgid "Full streaming protocol improvements"
@@ -2000,49 +1801,33 @@ msgstr "Miglioramenti al protocollo di Full streaming"
 msgid ""
 "Perhaps re-enable the interactive stream profile (the \n"
 "current implementation only uses the bulk stream profile)."
-msgstr ""
-"Probabilmente riabilitare il profilo interattivo dello stream \n"
-"(l'implementazione corrente usa solo il profilo di stream puro)."
+msgstr "Probabilmente riabilitare il profilo interattivo dello stream \n(l'implementazione corrente usa solo il profilo di stream puro)."
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
-msgstr ""
-"Limitare il livello della larghezza di banda di un client (in una o "
-"entrambe le direzioni di un flusso, o eventualmente condiviso attraverso "
-"flussi paralleli). Questo sarebbe ovviamente in aggiunta al limite medio "
-"di larghezza di banda del router."
+msgstr "Limitare il livello della larghezza di banda di un client (in una o entrambe le direzioni di un flusso, o eventualmente condiviso attraverso flussi paralleli). Questo sarebbe ovviamente in aggiunta al limite medio di larghezza di banda del router."
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
-msgstr ""
-"Liste di controllo accesso (permette lo stream solo da o per alcune "
-"destinazioni conosciute)."
+msgstr "Liste di controllo accesso (permette lo stream solo da o per alcune destinazioni conosciute)."
 
 #: i2p2www/pages/site/about/performance/future.html:147
 msgid ""
 "Web controls and monitoring the health of the various streams, as well \n"
 "as the ability to explicitly close or throttle them."
-msgstr ""
-"Controlli web e salute dei vari flussi, e anche la capacità di chiuderli "
-"esplicitamente oppure troncarli."
+msgstr "Controlli web e salute dei vari flussi, e anche la capacità di chiuderli esplicitamente oppure troncarli."
 
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
-msgstr ""
-"Altre idee per migliorare la libreria di streaming sono descritte nella\n"
-"<a href=\"%(streaming)s#future\">pagina della libreria di streaming</a>."
+msgstr "Altre idee per migliorare la libreria di streaming sono descritte nella\n<a href=\"%(streaming)s#future\">pagina della libreria di streaming</a>."
 
 #: i2p2www/pages/site/about/performance/history.html:2
 msgid "Performance History"
@@ -2051,17 +1836,10 @@ msgstr "Storico delle prestazioni"
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
-msgstr ""
-"Importanti miglioramenti delle prestazioni sono stati ottenuti usando le "
-"tecniche che seguono.\n"
-"C'è ancora altro da fare, consulta la pagina delle <a "
-"href=\"%(performance)s\">Prestazioni</a> per gli attuali problemi e "
-"riflessioni."
+msgstr "Importanti miglioramenti delle prestazioni sono stati ottenuti usando le tecniche che seguono.\nC'è ancora altro da fare, consulta la pagina delle <a href=\"%(performance)s\">Prestazioni</a> per gli attuali problemi e riflessioni."
 
 #: i2p2www/pages/site/about/performance/history.html:10
 msgid "Native math"
@@ -2078,30 +1856,23 @@ msgstr "implementato"
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -2115,79 +1886,42 @@ msgstr "implementato ma necessita affinamenti"
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
-msgstr ""
-"Questo algoritmo di tweak può avere rilievo solo per le applicazioni che "
-"richiedono che i peer rispondano loro (comunque è incluso tutto ciò che "
-"utilizza I2PTunnel o la libreria ministreaming di mihi):"
+msgstr "Questo algoritmo di tweak può avere rilievo solo per le applicazioni che richiedono che i peer rispondano loro (comunque è incluso tutto ciò che utilizza I2PTunnel o la libreria ministreaming di mihi):"
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
-msgstr ""
-"In precedenza, quando Alice invia un messaggio a Bob, quando Bob risponde"
-" deve controllare nel database della rete, spedire alcune richieste per "
-"ottenere il LeaseSet attuale di Alice. Se Bob ha già l'attuale LeaseSet "
-"di Alice, può allora inviare la risposta immediatamente: questo è uno dei"
-" motivi per cui generalmente si impiega più tempo per parlare con "
-"qualcuno la prima volta che ti connetti, mentre le comunicazioni "
-"successive sono più veloci. Attualmente, per tutti i client, incapsuliamo"
-" l'attuale LeaseSet del mittente nel garlic che è spedito al "
-"destinatario: in tal modo, quando si risponderanno, il LeaseSet sarà "
-"<i>sempre</i> memorizzato localmente, eliminando completamente ogni "
-"necessità di controlli nel database di rete quando si risponde. Ciò "
-"impegna un'ampia porzione della larghezza di banda del mittente per "
-"ottenere una risposta veloce. Se non facessimo questo molto spesso, "
-"diminuirebbe l'utilizzo medio della larghezza di banda delle rete, visto "
-"che il destinatario non dovrebbe controllare il database di rete."
+msgstr "In precedenza, quando Alice invia un messaggio a Bob, quando Bob risponde deve controllare nel database della rete, spedire alcune richieste per ottenere il LeaseSet attuale di Alice. Se Bob ha già l'attuale LeaseSet di Alice, può allora inviare la risposta immediatamente: questo è uno dei motivi per cui generalmente si impiega più tempo per parlare con qualcuno la prima volta che ti connetti, mentre le comunicazioni successive sono più veloci. Attualmente, per tutti i client, incapsuliamo l'attuale LeaseSet del mittente nel garlic che è spedito al destinatario: in tal modo, quando si risponderanno, il LeaseSet sarà <i>sempre</i> memorizzato localmente, eliminando completamente ogni necessità di controlli nel database di rete quando si risponde. Ciò impegna un'ampia porzione della larghezza di banda del mittente per ottenere una risposta veloce. Se non facessimo questo molto spesso, diminuirebbe l'utilizzo medio della larghezza di banda delle rete, visto che il destinatario non dovrebbe controllare il database di rete."
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
-msgstr ""
-"Le modifiche previste per la versione 0.6.2 includeranno il LeaseSet solo"
-" quando necessario, all'inizio di una connessione o quando il LeaseSet "
-"cambia. Questo ridurrà sensibilmente il sovraccarico dello scambio "
-"messaggi di I2P."
+msgstr "Le modifiche previste per la versione 0.6.2 includeranno il LeaseSet solo quando necessario, all'inizio di una connessione o quando il LeaseSet cambia. Questo ridurrà sensibilmente il sovraccarico dello scambio messaggi di I2P."
 
 #: i2p2www/pages/site/about/performance/history.html:66
 msgid "More efficient TCP rejection"
@@ -2196,20 +1930,13 @@ msgstr "Sistema di TCP rejection più efficiente"
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -2220,25 +1947,13 @@ msgstr "Impostazione del tunnel di prova"
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
-msgstr ""
-"Al posto di usare lo schema abbastanza casuale che abbiamo ora, potremmo "
-"usare un algoritmo sensibile al contesto per i tunnel di test, ad esempio"
-" se noi stimiamo corretti i dati validi per passare, non c'è bisogno di "
-"testare il tunnel, mentre se recentemente non abbiamo visto passare alcun"
-" dato, forse è meglio inviare qualche dato di prova. Questo ridurrà i "
-"problemi del tunnel causati da troppi messaggi, e potrà migliorare la "
-"velocità con cui vengono rilevati - e indirizzati - i tunnel difettosi."
+msgstr "Al posto di usare lo schema abbastanza casuale che abbiamo ora, potremmo usare un algoritmo sensibile al contesto per i tunnel di test, ad esempio se noi stimiamo corretti i dati validi per passare, non c'è bisogno di testare il tunnel, mentre se recentemente non abbiamo visto passare alcun dato, forse è meglio inviare qualche dato di prova. Questo ridurrà i problemi del tunnel causati da troppi messaggi, e potrà migliorare la velocità con cui vengono rilevati - e indirizzati - i tunnel difettosi."
 
 #: i2p2www/pages/site/about/performance/history.html:92
 msgid "Persistent Tunnel / Lease Selection"
@@ -2246,27 +1961,17 @@ msgstr "Tunnel persistente / Scelta della locazione"
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
-msgstr ""
-"Selezione dei tunnel in uscita implementata nella versione 0.6.1.30, "
-"selezione dei lease in uscita implementata nella versione 0.6.2."
+msgstr "Selezione dei tunnel in uscita implementata nella versione 0.6.1.30, selezione dei lease in uscita implementata nella versione 0.6.2."
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
-msgstr ""
-"Selezionare i tunnel e i lease casualmente per ogni messaggio crea "
-"un'alta incidenza di spedizioni out-of-order: ciò impedisce che la "
-"libreria di streaming incrementi la dimensione della finestra troppo "
-"velocemente. Insistendo con le stesse selezioni per una data connessione,"
-" la velocità di trasferimento è notevolmente più alta."
+msgstr "Selezionare i tunnel e i lease casualmente per ogni messaggio crea un'alta incidenza di spedizioni out-of-order: ciò impedisce che la libreria di streaming incrementi la dimensione della finestra troppo velocemente. Insistendo con le stesse selezioni per una data connessione, la velocità di trasferimento è notevolmente più alta."
 
 #: i2p2www/pages/site/about/performance/history.html:104
 msgid "Compress some data structures"
@@ -2274,20 +1979,13 @@ msgstr "Compressione di alcune strutture di dati"
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2301,26 +1999,16 @@ msgstr "rimpiazzato dal protocollo full streaming"
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2329,18 +2017,12 @@ msgstr "Implementa protocollo \"full streaming\""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2348,16 +2030,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2369,100 +2046,44 @@ msgstr "Prestazioni"
 msgid ""
 "How does I2P work, why is it slow, and why does it not use my full "
 "bandwidth?"
-msgstr ""
-"Come funziona I2P, perché è lenta, e perché non usa tutta la mia "
-"larghezza di banda?"
+msgstr "Come funziona I2P, perché è lenta, e perché non usa tutta la mia larghezza di banda?"
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
-msgstr ""
-"Una delle cose che le persone domandano più spesso è \"quanto è veloce "
-"I2P?\", e nessuno apprezza la risposta: \"dipende\". Dopo aver provato "
-"I2P, ciò che chiedono è \"si può velocizzare?\", e la risposta a ciò è "
-"più empatica: \"<b>sì</b>\"."
+msgstr "Una delle cose che le persone domandano più spesso è \"quanto è veloce I2P?\", e nessuno apprezza la risposta: \"dipende\". Dopo aver provato I2P, ciò che chiedono è \"si può velocizzare?\", e la risposta a ciò è più empatica: \"<b>sì</b>\"."
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
-msgstr ""
-"I2P è una rete completamente dinamica. Ogni client è conosciuto dagli "
-"altri nodi e analizza i nodi locali conosciuti per verificare la "
-"raggiungibilità e la capacità.\n"
-"Solo i nodi raggiungibili e idonei sono salvati nel NetDB locale (Questo "
-"è generalmente solo una porzione della rete, circa 500-1000).\n"
-"Quando I2P costruisce i tunnel, seleziona la risorsa migliore da questo "
-"gruppo. Per esempio, un piccolo sottogruppo di 20-50 nodi sono "
-"disponibili solo per costruire tunnel.\n"
-"Siccome le analisi sono effettuate ogni minuto, il gruppo dei nodi "
-"utilizzati cambia ogni minuto.\n"
-"Ogni nodo I2P conosce una parte differente della rete: ciò significa che "
-"ogni router ha un differente insieme di nodi I2P da essere usati come "
-"tunnel.\n"
-"Anche se due router hanno lo stesso sottogruppo di nodi conosciuti, le "
-"analisi di raggiungibilità e capacità probabilmente mostreranno risultati"
-" differenti, perché gli altri router saranno sotto carico appena un "
-"router analizza, ma saranno liberi se il secondo router analizza."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
+msgstr "I2P è una rete completamente dinamica. Ogni client è conosciuto dagli altri nodi e analizza i nodi locali conosciuti per verificare la raggiungibilità e la capacità.\nSolo i nodi raggiungibili e idonei sono salvati nel NetDB locale (Questo è generalmente solo una porzione della rete, circa 500-1000).\nQuando I2P costruisce i tunnel, seleziona la risorsa migliore da questo gruppo. Per esempio, un piccolo sottogruppo di 20-50 nodi sono disponibili solo per costruire tunnel.\nSiccome le analisi sono effettuate ogni minuto, il gruppo dei nodi utilizzati cambia ogni minuto.\nOgni nodo I2P conosce una parte differente della rete: ciò significa che ogni router ha un differente insieme di nodi I2P da essere usati come tunnel.\nAnche se due router hanno lo stesso sottogruppo di nodi conosciuti, le analisi di raggiungibilità e capacità probabilmente mostreranno risultati differenti, perché gli altri router saranno sotto carico appena un router analizza, ma saranno liberi se il secondo router analizza."
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
-msgstr ""
-"L'immagine sopra descrive perchè ogni nodo I2P ha diversi nodi per "
-"costruire i tunnel. \n"
-"Perchè ogni nodo I2P ha diversa latenza e larghezza di banda, i tunnel (i"
-" quali sono costruiti attraverso quei nodi) hanno valori diversi di "
-"latenza e larghezza di banda. \n"
-"E poichè ogni nodo I2P ha diversi costrutti dei tunnel, due nodi I2P non "
-"hanno le stesse impostazioni dei tunnel."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
+msgstr "L'immagine sopra descrive perchè ogni nodo I2P ha diversi nodi per costruire i tunnel. \nPerchè ogni nodo I2P ha diversa latenza e larghezza di banda, i tunnel (i quali sono costruiti attraverso quei nodi) hanno valori diversi di latenza e larghezza di banda. \nE poichè ogni nodo I2P ha diversi costrutti dei tunnel, due nodi I2P non hanno le stesse impostazioni dei tunnel."
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
-msgstr ""
-"Un server/client è conosciuto come \"destinazione\" e ogni destinazione "
-"possiede almeno un tunnel in entrata e uno in uscita. Sono predefiniti 3 "
-"HOPS per tunnel\n"
-"Vengono così aggiunti fino a 12 HOPS (cioè 12 diversi nodi I2P) per "
-"ottenere un completo percorso client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
+msgstr "Un server/client è conosciuto come \"destinazione\" e ogni destinazione possiede almeno un tunnel in entrata e uno in uscita. Sono predefiniti 3 HOPS per tunnel\nVengono così aggiunti fino a 12 HOPS (cioè 12 diversi nodi I2P) per ottenere un completo percorso client-server-client."
 
 #: i2p2www/pages/site/about/performance/index.html:34
 msgid ""
 "Each data package is sent through 6 other I2P nodes until it reaches the "
 "server:"
-msgstr ""
-"Ogni pacchetto dati è inviato attraverso 6 altri nodi I2P fino a che "
-"raggiunge il server:"
+msgstr "Ogni pacchetto dati è inviato attraverso 6 altri nodi I2P fino a che raggiunge il server:"
 
 #: i2p2www/pages/site/about/performance/index.html:40
 msgid "and on way back 6 different I2P nodes:"
@@ -2470,108 +2091,62 @@ msgstr "e a ritroso attraverso 6 diversi nodi I2P:"
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
-msgstr ""
-"Altro: gli altri nodi I2P hanno bisogno di conoscere il tuo router I2P "
-"per poter effettuare i test di raggiungibilità e capacità. Gli altri nodi"
-" possono impiegare del tempo per analizzare il tuo nodo. \n"
-"Per risparmiare tempo, prova a costruire più tunnels con I2P, ad esempio:"
-" usa un torrent o un sito www per qualche secondo."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
+msgstr "Altro: gli altri nodi I2P hanno bisogno di conoscere il tuo router I2P per poter effettuare i test di raggiungibilità e capacità. Gli altri nodi possono impiegare del tempo per analizzare il tuo nodo. \nPer risparmiare tempo, prova a costruire più tunnels con I2P, ad esempio: usa un torrent o un sito www per qualche secondo."
 
 #: i2p2www/pages/site/about/performance/index.html:99
 msgid "Performance Improvements"
@@ -2582,7 +2157,4 @@ msgstr "Miglioramenti alle prestazioni"
 msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
-msgstr ""
-"Per le possibili migliorie di performance future guarda su\n"
-"<a href=\"%(future)s\">Migliorie di Performance in Arrivo</a>."
-
+msgstr "Per le possibili migliorie di performance future guarda su\n<a href=\"%(future)s\">Migliorie di Performance in Arrivo</a>."
diff --git a/i2p2www/translations/it/LC_MESSAGES/blog.po b/i2p2www/translations/it/LC_MESSAGES/blog.po
index 75567d1c2bd7f8b4ad4da598b8f8261d8e194fce..c96d903ce058fb0ecd32489120659ae9029e98e4 100644
--- a/i2p2www/translations/it/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/it/LC_MESSAGES/blog.po
@@ -1,27 +1,31 @@
-# Italian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Giuseppe Pignataro <rogepix@gmail.com>, 2014
+# Giuseppe Pignataro <rogepix@gmail.com>, 2014
 # Jacopo Tumminello <tummarellox@gmail.com>, 2014
 # khanjant <khanjant@riseup.net>, 2015
+# khanjant <khanjant@riseup.net>, 2015
 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2015-2017
 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2017
 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020
+# Jacopo Tumminello <tummarellox@gmail.com>, 2014
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-05-07 14:22+0000\n"
-"Last-Translator: Fabio Roman <romanfabio@protonmail.com>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020\n"
 "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: it\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/blog/2011/10/11/0.8.9-Release.rst:24
 #: i2p2www/blog/2011/10/20/0.8.10-Release.rst:11
@@ -94,6 +98,8 @@ msgstr "I file sono disponibili nella `Pagina download`__."
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:33
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:33
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:45
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:35
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:34
 msgid "RELEASE DETAILS"
 msgstr "DETTAGLI DELLA RELEASE"
 
@@ -165,6 +171,8 @@ msgstr "Cambiamenti maggiori"
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:49
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:51
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:64
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:51
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:43
 msgid "Bug Fixes"
 msgstr "Bug fix"
 
@@ -226,6 +234,8 @@ msgstr "Bug fix"
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:62
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:65
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:76
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:74
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:52
 msgid "Other"
 msgstr "Altro"
 
@@ -288,6 +298,8 @@ msgstr "Altro"
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:76
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:93
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:97
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:94
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:66
 msgid "SHA256 Checksums:"
 msgstr "Checksum SHA256:"
 
@@ -318,11 +330,11 @@ msgstr "Release 0.9.2"
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:8
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:10
 msgid ""
-"0.9.2 includes extensive low-level changes to improve the performance and"
-" efficiency of the router. We have updated our UPnP library, to hopefully"
-" make UPnP work for more people. I2PSnark now has DHT support, but it is "
-"not yet enabled by default, as we plan to do more testing during the "
-"upcoming 0.9.3 development cycle."
+"0.9.2 includes extensive low-level changes to improve the performance and "
+"efficiency of the router. We have updated our UPnP library, to hopefully "
+"make UPnP work for more people. I2PSnark now has DHT support, but it is not "
+"yet enabled by default, as we plan to do more testing during the upcoming "
+"0.9.3 development cycle."
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:13
@@ -330,14 +342,12 @@ msgstr ""
 msgid ""
 "As usual, there's also lots of bug fixes in this release, so updating is "
 "recommended."
-msgstr ""
-"Come al solito ci sono molti bug risolti in questa release, ed è quindi "
-"raccomandato aggiornare."
+msgstr "Come al solito ci sono molti bug risolti in questa release, ed è quindi raccomandato aggiornare."
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:27
 msgid ""
-"SSU: Fix several problems in our UDP transport, to improve efficiency and"
-" reliability for connection setup. Also improve defenses against various "
+"SSU: Fix several problems in our UDP transport, to improve efficiency and "
+"reliability for connection setup. Also improve defenses against various "
 "types of bad input."
 msgstr ""
 
@@ -345,9 +355,7 @@ msgstr ""
 msgid ""
 "UPnP: Updated our library to fix several issues, should work for more "
 "routers now"
-msgstr ""
-"UPnP: Aggiornata la libreria, ora dovrebbe essere compatibile con molti "
-"più router"
+msgstr "UPnP: Aggiornata la libreria, ora dovrebbe essere compatibile con molti più router"
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:29
 msgid ""
@@ -357,9 +365,9 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:30
 msgid ""
-"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered "
-"are now much more flexible, which should lessen protocol overhead and "
-"reduce stalls caused by dropped tags."
+"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered are "
+"now much more flexible, which should lessen protocol overhead and reduce "
+"stalls caused by dropped tags."
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:31
@@ -370,16 +378,18 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:35
 msgid ""
-"Fix various issues affecting memory usage and performance on high-"
-"bandwidth routers"
+"Fix various issues affecting memory usage and performance on high-bandwidth "
+"routers"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:36
-msgid "Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
+msgid ""
+"Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:37
-msgid "Fix i2psnark bug that prevented a completion announcement to the tracker"
+msgid ""
+"Fix i2psnark bug that prevented a completion announcement to the tracker"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:38
@@ -466,14 +476,14 @@ msgstr "Release 0.9.3"
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:8
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:10
 msgid ""
-"0.9.3 includes extensive low-level changes to the queueing of messages in"
-" the router.  We implement the CoDel Active Queue Management (AQM) "
-"algorithm.  We also unify the queueing and priority mechanisms in the "
-"transports to aid diagnosis and reduce network latency.  Work continues "
-"on fixing UDP transport bugs and making UDP more resistant to attacks.  "
-"There are more changes to improve the performance of the router and "
-"reduce its memory usage.  Also, we enable i2psnark's DHT support, "
-"introduced last release, by default."
+"0.9.3 includes extensive low-level changes to the queueing of messages in "
+"the router.  We implement the CoDel Active Queue Management (AQM) algorithm."
+"  We also unify the queueing and priority mechanisms in the transports to "
+"aid diagnosis and reduce network latency.  Work continues on fixing UDP "
+"transport bugs and making UDP more resistant to attacks.  There are more "
+"changes to improve the performance of the router and reduce its memory "
+"usage.  Also, we enable i2psnark's DHT support, introduced last release, by "
+"default."
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:27
@@ -491,8 +501,8 @@ msgstr ""
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:33
 msgid ""
 "Several SSU fixes including memory leak, and better handling of routers "
-"behind firewalls that change UDP ports; additional defenses for malicious"
-" packets."
+"behind firewalls that change UDP ports; additional defenses for malicious "
+"packets."
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:34
@@ -517,9 +527,8 @@ msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:42
 msgid ""
-"Fix streaming connection timeout back to 1 minute, was inadvertently "
-"changed to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was"
-" unlimited"
+"Fix streaming connection timeout back to 1 minute, was inadvertently changed"
+" to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was unlimited"
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:43
@@ -575,28 +584,24 @@ msgstr "Release 0.9.4"
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:8
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:10
 msgid ""
-"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, "
-"that was reducing network performance and reliability. It also includes "
-"major changes in the in-network update system, and adds the capability to"
-" update via in-network torrents."
+"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, that "
+"was reducing network performance and reliability. It also includes major "
+"changes in the in-network update system, and adds the capability to update "
+"via in-network torrents."
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:14
 msgid ""
-"We fixed several bugs in the i2psnark DHT implementation that was "
-"introduced\n"
+"We fixed several bugs in the i2psnark DHT implementation that was introduced\n"
 "last release. For those of you using console or http proxy passwords,\n"
-"we converted to the more-secure digest method and improved the security "
-"for console forms."
+"we converted to the more-secure digest method and improved the security for console forms."
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:20
 msgid ""
-"For those of you already running development builds, your router should "
-"automatically\n"
+"For those of you already running development builds, your router should automatically\n"
 "update to 0.9.4-0 using the new in-network torrent facility.\n"
-"For those running 0.9.3-0, you will update normally using in-network "
-"HTTP, and\n"
+"For those running 0.9.3-0, you will update normally using in-network HTTP, and\n"
 "we will have more information for you when we release 0.9.5."
 msgstr ""
 
@@ -612,12 +617,13 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:42
 msgid ""
-"Fix major bug that reduced SSU connection limits which reduced tunnel "
-"build success rates"
+"Fix major bug that reduced SSU connection limits which reduced tunnel build "
+"success rates"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:43
-msgid "Fix bug with external I2CP that prevented some external apps from working"
+msgid ""
+"Fix bug with external I2CP that prevented some external apps from working"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:44
@@ -650,8 +656,7 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:54
 msgid ""
-"More performance improvements, memory reduction, and object churn "
-"reduction"
+"More performance improvements, memory reduction, and object churn reduction"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:55
@@ -668,15 +673,15 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:58
 msgid ""
-"Convert http proxy and console from basic to digest authentication for "
-"added security"
+"Convert http proxy and console from basic to digest authentication for added"
+" security"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:59
 msgid ""
 "Improved verification of console form submissions, using jsp sessions. "
-"Cookies may now be required on forms, except when the console password is"
-" enabled"
+"Cookies may now be required on forms, except when the console password is "
+"enabled"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:60
@@ -695,11 +700,9 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:63
 msgid ""
-"Translation updates: Chinese, French, German, Italian, Polish, "
-"Portuguese, Swedish, and Ukrainian"
-msgstr ""
-"Aggiornamento traduzioni in cinese, francese, tedesco, italiano, polacco,"
-" portoghese, svedese ed ucraino"
+"Translation updates: Chinese, French, German, Italian, Polish, Portuguese, "
+"Swedish, and Ukrainian"
+msgstr "Aggiornamento traduzioni in cinese, francese, tedesco, italiano, polacco, portoghese, svedese ed ucraino"
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:65
 msgid "Update wrapper to 3.5.16 (new installs and PPA only)"
@@ -716,24 +719,21 @@ msgstr "Release 0.9.5"
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:8
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:10
 msgid ""
-"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities"
-" that are being investigated by researchers at UCSB. We continue to work "
-"with them on additional improvements. This is a good opportunity to "
-"remind the community that while our network continues to grow rapidly, it"
-" is still relatively small. There may be multiple weaknesses or bugs that"
-" could compromise your anonymity. Help us grow the network by spreading "
-"the word and contributing where you can."
+"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities "
+"that are being investigated by researchers at UCSB. We continue to work with"
+" them on additional improvements. This is a good opportunity to remind the "
+"community that while our network continues to grow rapidly, it is still "
+"relatively small. There may be multiple weaknesses or bugs that could "
+"compromise your anonymity. Help us grow the network by spreading the word "
+"and contributing where you can."
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:14
 #, python-format
 msgid ""
-"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers "
-"running a\n"
-"development build) will attempt to update via the experimental in-network"
-" bittorrent\n"
-"with i2psnark. If this doesn't work, it should fall back to standard in-"
-"network HTTP update."
+"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers running a\n"
+"development build) will attempt to update via the experimental in-network bittorrent\n"
+"with i2psnark. If this doesn't work, it should fall back to standard in-network HTTP update."
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:28
@@ -778,8 +778,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:39
 msgid ""
-"Encrypt database lookup messages end-to-end when sent through exploratory"
-" tunnels"
+"Encrypt database lookup messages end-to-end when sent through exploratory "
+"tunnels"
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:40
@@ -824,11 +824,9 @@ msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53
 msgid ""
-"Translation updates: French, German, Hungarian, Italian, Norwegian, "
-"Polish, Portuguese, Russian, Swedish"
-msgstr ""
-"Aggiornamento traduzioni in francese, tedesco, ungherese, italiano, "
-"norvegese, polacco, portoghese, russo e svedese"
+"Translation updates: French, German, Hungarian, Italian, Norwegian, Polish, "
+"Portuguese, Russian, Swedish"
+msgstr "Aggiornamento traduzioni in francese, tedesco, ungherese, italiano, norvegese, polacco, portoghese, russo e svedese"
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:55
 msgid "Update wrapper to 3.5.17 (new installs and PPA only)"
@@ -842,17 +840,15 @@ msgstr "Release 0.9.6"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:10
 msgid ""
 "0.9.6 includes bug fixes and an update from Jetty 6.1.26 (2010-11-10) to "
-"Jetty 7.6.10 (2013-03-12). See below for important information on the "
-"Jetty update. The Jetty 7 series is actively maintained and we plan to "
-"stay current with it in future I2P releases."
+"Jetty 7.6.10 (2013-03-12). See below for important information on the Jetty "
+"update. The Jetty 7 series is actively maintained and we plan to stay "
+"current with it in future I2P releases."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:14
 msgid ""
-"Most users will update via HTTP. Those running development builds will "
-"attempt to update via the\n"
-"experimental in-network bittorrent with i2psnark. We've fixed some bugs "
-"that will enable more users\n"
+"Most users will update via HTTP. Those running development builds will attempt to update via the\n"
+"experimental in-network bittorrent with i2psnark. We've fixed some bugs that will enable more users\n"
 "to update via torrent in the 0.9.7 update cycle."
 msgstr ""
 
@@ -862,12 +858,9 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:28
 msgid ""
-"If you first installed I2P with version 0.9.5, on Windows only, we "
-"recommend that you follow the\n"
-"following instructions to fix your eepsite location **before** you update"
-" to 0.9.6.\n"
-"Only original installations of 0.9.5-0 on Windows are affected by this "
-"issue. If your router version\n"
+"If you first installed I2P with version 0.9.5, on Windows only, we recommend that you follow the\n"
+"following instructions to fix your eepsite location **before** you update to 0.9.6.\n"
+"Only original installations of 0.9.5-0 on Windows are affected by this issue. If your router version\n"
 "is 0.9.5-0-win1, you already have the fix and need not take any action."
 msgstr ""
 
@@ -881,36 +874,29 @@ msgstr "Dettagli di migrazione per Jetty 7"
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:43
 msgid ""
-"For most people, the update should just work. If you have multiple Jetty "
-"eepsites,\n"
-"OR have made changes to jetty.xml or other Jetty configuration files, "
-"including changing the port\n"
+"For most people, the update should just work. If you have multiple Jetty eepsites,\n"
+"OR have made changes to jetty.xml or other Jetty configuration files, including changing the port\n"
 "from 7658, you MUST take manual action AFTER updating."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:49
 msgid ""
-"After update, the router will migrate your jetty.xml files to the new "
-"Jetty 7 format."
+"After update, the router will migrate your jetty.xml files to the new Jetty "
+"7 format."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:51
 msgid ""
-"The migration resets the port to 7658. If you have more than one Jetty "
-"eepsite, OR your eepsite\n"
-"  is NOT on port 7658, OR you have made other modifications to jetty.xml "
-"(for example changing the\n"
-"  listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml "
-"file for each eepsite to fix them up\n"
+"The migration resets the port to 7658. If you have more than one Jetty eepsite, OR your eepsite\n"
+"  is NOT on port 7658, OR you have made other modifications to jetty.xml (for example changing the\n"
+"  listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml file for each eepsite to fix them up\n"
 "  after updating, and restart again."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:56
 msgid ""
-"**The following files will be backed up with a &quot;.jetty6&quot; suffix"
-" and then migrated.**\n"
-"If you have made local changes, you may have to edit them manually and "
-"restart.\n"
+"**The following files will be backed up with a &quot;.jetty6&quot; suffix and then migrated.**\n"
+"If you have made local changes, you may have to edit them manually and restart.\n"
 "See http://wiki.eclipse.org/Jetty for assistance in configuring Jetty 7."
 msgstr ""
 
@@ -929,7 +915,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:78
-msgid "If a plugin does not work, please contact the maintainer for that plugin."
+msgid ""
+"If a plugin does not work, please contact the maintainer for that plugin."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:84
@@ -958,14 +945,14 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:90
 msgid ""
-"Ignore unsupported IPs in RouterInfos when selecting an address (prep for"
-" IPv6)"
+"Ignore unsupported IPs in RouterInfos when selecting an address (prep for "
+"IPv6)"
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:91
 msgid ""
-"Ignore unused option bits in Database Lookup Message (prep for requesting"
-" encrypted response)"
+"Ignore unused option bits in Database Lookup Message (prep for requesting "
+"encrypted response)"
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:92
@@ -1031,37 +1018,28 @@ msgstr "Release 0.9.7"
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:8
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:10
 msgid "0.9.7 includes significant bug fixes and improvements."
-msgstr ""
-"La versione 0.9.7 include la correzione di gravi bug e importanti "
-"miglioranti."
+msgstr "La versione 0.9.7 include la correzione di gravi bug e importanti miglioranti."
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:12
 msgid ""
-"For the first time, class 'N' routers (those with a minimumum of 128 "
-"KBytes/sec of shared bandwidth)\n"
-"will automatically become floodfill (previously it was only 'O' routers "
-"with 256 KBps). This will\n"
-"increase the floodfill population for additional resistance to certain "
-"attacks (see below). Floodfill routers\n"
-"don't consume much additional bandwidth, but they do tend to use "
-"additional memory and concurrent\n"
-"connections. If you do not wish your router to become floodfill, set the "
-"advanced configuration\n"
+"For the first time, class 'N' routers (those with a minimumum of 128 KBytes/sec of shared bandwidth)\n"
+"will automatically become floodfill (previously it was only 'O' routers with 256 KBps). This will\n"
+"increase the floodfill population for additional resistance to certain attacks (see below). Floodfill routers\n"
+"don't consume much additional bandwidth, but they do tend to use additional memory and concurrent\n"
+"connections. If you do not wish your router to become floodfill, set the advanced configuration\n"
 "router.floodfillParticipant=false ."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:21
 #, python-format
 msgid ""
-"As we think the last release fixed the experimental update-via-torrent "
-"bugs, 3%(pc)s of routers should\n"
+"As we think the last release fixed the experimental update-via-torrent bugs, 3%(pc)s of routers should\n"
 "update over in-network bittorrent this cycle."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:26
 msgid ""
-"Plugin update checks, possibly broken for several releases, are fixed. "
-"Your plugins should once again\n"
+"Plugin update checks, possibly broken for several releases, are fixed. Your plugins should once again\n"
 "auto-update after updating the router."
 msgstr ""
 
@@ -1073,17 +1051,12 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:35
 msgid ""
-"This release contains additional mitigations for the `\"practical "
-"attacks\" paper`__.\n"
-"However, we have a lot more work to do to resist Sybil attacks on the "
-"floodfills, and resist\n"
+"This release contains additional mitigations for the `\"practical attacks\" paper`__.\n"
+"However, we have a lot more work to do to resist Sybil attacks on the floodfills, and resist\n"
 "traffic analysis at the gateways and endpoints of exploratory tunnels.\n"
-"It's a good reminder for everybody that our network is still relatively "
-"small and vulnerable.\n"
-"We don't currently recommend any uses that would put anybody in serious "
-"jeopardy.\n"
-"We'll keep working to improve it... please keep working to spread the "
-"word. A bigger network is a better network."
+"It's a good reminder for everybody that our network is still relatively small and vulnerable.\n"
+"We don't currently recommend any uses that would put anybody in serious jeopardy.\n"
+"We'll keep working to improve it... please keep working to spread the word. A bigger network is a better network."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:48
@@ -1128,8 +1101,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:60
 msgid ""
-"Fix i2psnark bug that changed the infohash of torrents created by Robert "
-"and fetched via magnet link"
+"Fix i2psnark bug that changed the infohash of torrents created by Robert and"
+" fetched via magnet link"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:61
@@ -1164,8 +1137,8 @@ msgstr "Supporto IE 10"
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:71
 msgid ""
-"Individual expiration times in leases, for efficiency on destinations "
-"with a high number of tunnels"
+"Individual expiration times in leases, for efficiency on destinations with a"
+" high number of tunnels"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:72
@@ -1181,10 +1154,9 @@ msgid "Tomcat 6.0.37"
 msgstr "Tomcat 6.0.37"
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:75
-msgid "Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
-msgstr ""
-"Aggiornamento traduzioni: Cinese, Francese, Tedesco, Portoghese, Russo, "
-"Spagnolo"
+msgid ""
+"Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
+msgstr "Aggiornamento traduzioni: Cinese, Francese, Tedesco, Portoghese, Russo, Spagnolo"
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:76
 msgid "New Turkish translation"
@@ -1201,19 +1173,16 @@ msgstr "Reelase 0.9.7.1"
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:8
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:10
 msgid ""
-"This unscheduled release disables the RouterInfo verification messages "
-"that were used in the attack published in the UCSB paper, which should "
-"make correlating a LeaseSet and a Router much more difficult. We have "
-"also included a limited number of other fixes listed below. Our 0.9.8 "
-"release, which will include IPv6 support, is still on-schedule for late "
-"September."
+"This unscheduled release disables the RouterInfo verification messages that "
+"were used in the attack published in the UCSB paper, which should make "
+"correlating a LeaseSet and a Router much more difficult. We have also "
+"included a limited number of other fixes listed below. Our 0.9.8 release, "
+"which will include IPv6 support, is still on-schedule for late September."
 msgstr ""
 
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:12
 msgid "As usual, we recommend that all users update to this release."
-msgstr ""
-"Come sempre consigliamo ad ogni utente di aggiornare il proprio sistema a"
-" questa versione."
+msgstr "Come sempre consigliamo ad ogni utente di aggiornare il proprio sistema a questa versione."
 
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:18
 msgid "Disable RouterInfo verification messages"
@@ -1258,16 +1227,17 @@ msgstr "Release 0.9.8"
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:8
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:10
 msgid ""
-"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
-"default, but of course you need a public IPv6 address to use it. "
-"Configuration is on the 'network' configuration tab in your console. We "
-"also have anonymity improvements including padding of SSU packets and "
-"longer router private keys."
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by default, "
+"but of course you need a public IPv6 address to use it. Configuration is on "
+"the 'network' configuration tab in your console. We also have anonymity "
+"improvements including padding of SSU packets and longer router private "
+"keys."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:12
 #, python-format
-msgid "30%(pc)s of you will update via in-network torrent in this update cycle."
+msgid ""
+"30%(pc)s of you will update via in-network torrent in this update cycle."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:14
@@ -1276,41 +1246,30 @@ msgstr "Dettagli su IPv6"
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:16
 msgid ""
-"IPv6 is enabled and preferred by default. If you have a public IPv6 "
-"address \n"
-"and you are connecting to another router with a published IPv6 address, "
-"it will \n"
-"connect via IPv6. There is a new IPv6 configuration section on /confignet"
-" in \n"
+"IPv6 is enabled and preferred by default. If you have a public IPv6 address \n"
+"and you are connecting to another router with a published IPv6 address, it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet in \n"
 "the router console. If IPv6 is causing problems you may disable it there."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:23
 msgid ""
 "As a part of the IPv6 development effort, I2P now supports multiple \n"
-"published IP addresses. If you have multiple public IP addresses (IPv4, "
-"IPv6, \n"
-"or both), you may enable or disable them individually on /confignet. The"
-" \n"
-"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
-"have \n"
-"multiple addresses you should review the configuration on /confignet and "
-"adjust \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you have \n"
+"multiple addresses you should review the configuration on /confignet and adjust \n"
 "it if necessary.\n"
-"Note that while you may enable multiple IPv4 and IPv6 addresses on "
-"/confignet,\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on /confignet,\n"
 "we recommend that you use only one IPv4 and one IPv6 address. There are\n"
 "bugs still to be fixed with multiple addresses of each type."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:35
 msgid ""
-"While IPv6 support was designed and developed over several years, it has"
-" \n"
-"only been tested by a limited number of users and is still beta. If you "
-"do have \n"
-"a public IPv6 address, please monitor your router and the logs for "
-"problems, \n"
+"While IPv6 support was designed and developed over several years, it has \n"
+"only been tested by a limited number of users and is still beta. If you do have \n"
+"a public IPv6 address, please monitor your router and the logs for problems, \n"
 "and disable it necessary. Please report any bugs on \n"
 "http://trac.i2p2.i2p."
 msgstr ""
@@ -1321,26 +1280,19 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:45
 msgid ""
-"For those of you running I2P on faster hardware (generally, 64-bit x86) "
-"the \n"
-"router will generate a new identity using longer keys. This will "
-"substantially \n"
-"reduce your participating traffic for 48 hours or more, while your router"
-" \n"
-"re-integrates into the network. Due to the new keys, the large number of"
-" \n"
+"For those of you running I2P on faster hardware (generally, 64-bit x86) the \n"
+"router will generate a new identity using longer keys. This will substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router \n"
+"re-integrates into the network. Due to the new keys, the large number of \n"
 "torrent updates, and the recent network growth, we expect substantial \n"
-"disruption to the network for a week or more after the update is "
-"released. \n"
+"disruption to the network for a week or more after the update is released. \n"
 "Please be patient and things should start to improve after a few days."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:55
 msgid ""
-"These changes may result in higher CPU usage for some of you. We're doing"
-" \n"
-"our best to increase efficiency, but stronger security generally requires"
-" more \n"
+"These changes may result in higher CPU usage for some of you. We're doing \n"
+"our best to increase efficiency, but stronger security generally requires more \n"
 "computation. Performance may also be poor during the first week\n"
 "due to the network churn.\n"
 "We will evaluate the network performace before deciding whether to\n"
@@ -1349,10 +1301,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:64
 msgid ""
-"We are experiencing rapid network growth in the last few weeks, which is"
-" \n"
-"causing a bit of a bumpy ride for some, especially on weekends. However, "
-"the \n"
+"We are experiencing rapid network growth in the last few weeks, which is \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, the \n"
 "network is still performing fairly well, so keep spreading the word."
 msgstr ""
 
@@ -1364,14 +1314,10 @@ msgstr ""
 msgid ""
 "We're in the initial stages of desiging major changes to strengthen our \n"
 "crypto. Stronger crypto will use more CPU and it may possibly \n"
-"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
-"on low-power \n"
-"and/or older hardware. We're working hard to minimize the impacts, but "
-"some \n"
-"loss of performance is inevitable. In addition, Java 5 and 6 are no "
-"longer \n"
-"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
-"in \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change in \n"
 "minimum requirements will be announced well in advance."
 msgstr ""
 
@@ -1398,8 +1344,7 @@ msgid ""
 "Last weekend, echelon attended the CTS IV conference in Berlin and\n"
 "psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
 "Several of us will be at 30C3 in Hamburg late this year.\n"
-"It's great to see people participating at these events and representing "
-"I2P."
+"It's great to see people participating at these events and representing I2P."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:106
@@ -1427,7 +1372,8 @@ msgid "Fix occasional runtime exception in NTCP"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
-msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
+msgid ""
+"Big rework of transport code to accommodate multiple addresses and IPv6"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
@@ -1435,16 +1381,15 @@ msgid "Streaming: Improved recovery from lost acks, other fixes"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
-msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgid ""
+"Use Transifex for translation of initial news and HTTP proxy error pages"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
 msgid ""
-"Translation updates: Chinese, French, German, Portuguese, Russian, "
-"Swedish, Turkish"
-msgstr ""
-"Aggiornamento traduzioni: Cinese, Francese, Tedesco, Portoghese, Russo, "
-"Svedese, Turco"
+"Translation updates: Chinese, French, German, Portuguese, Russian, Swedish, "
+"Turkish"
+msgstr "Aggiornamento traduzioni: Cinese, Francese, Tedesco, Portoghese, Russo, Svedese, Turco"
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:125
 msgid "New Romanian translation"
@@ -1461,9 +1406,9 @@ msgstr "Release 0.9.8.1"
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:7
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:9
 msgid ""
-"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some "
-"people. New installs and non-Windows platforms are not affected, however "
-"all platforms will automatically update even if running 0.9.8."
+"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some people. "
+"New installs and non-Windows platforms are not affected, however all "
+"platforms will automatically update even if running 0.9.8."
 msgstr ""
 
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:11
@@ -1474,10 +1419,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:20
 msgid ""
-"Due to recent attacks, logins are disabled on `Trac`_ and new "
-"registrations are\n"
-"disabled on `zzz.i2p`_. Until those services are restored, please report "
-"all\n"
+"Due to recent attacks, logins are disabled on `Trac`_ and new registrations are\n"
+"disabled on `zzz.i2p`_. Until those services are restored, please report all\n"
 "bugs on IRC freenode or IRC2P #i2p-dev."
 msgstr ""
 
@@ -1490,9 +1433,9 @@ msgstr "Release 0.9.9"
 msgid ""
 "0.9.9 fixes a number of bugs in the netdb, streaming, and i2ptunnel, and "
 "starts work on a year-long plan to increase the strength of the "
-"cryptographic signing algorithms used in the router, and support multiple"
-" algorithms and key lengths simultaneously. Automatic update files will "
-"now be signed with 4096-bit RSA keys."
+"cryptographic signing algorithms used in the router, and support multiple "
+"algorithms and key lengths simultaneously. Automatic update files will now "
+"be signed with 4096-bit RSA keys."
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:11
@@ -1504,8 +1447,7 @@ msgstr ""
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:18
 msgid ""
 "As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the "
-"latest release.\n"
+"The best way to maintain security and help the network is to run the latest release.\n"
 "Several members of the I2P team will be at 30C3 in Hamburg this year.\n"
 "Come say hello and ask for an I2P sticker.\n"
 "Thanks to everyone for their support this year."
@@ -1621,8 +1563,7 @@ msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:62
 msgid ""
-"Extend router info expiration and other changes to reduce load on "
-"floodfills"
+"Extend router info expiration and other changes to reduce load on floodfills"
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:63
@@ -1659,11 +1600,9 @@ msgstr "Nuova traduzione in Giapponese (parziale)"
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:71
 msgid ""
-"Translation updates: French, German, Italian, Romanian, Russian, Spanish,"
-" Swedish, and others"
-msgstr ""
-"Aggiornamento traduzioni in Francese, Tedesco, Italiano, Romeno, Russo, "
-"Spagnolo, Svedese ed altre"
+"Translation updates: French, German, Italian, Romanian, Russian, Spanish, "
+"Swedish, and others"
+msgstr "Aggiornamento traduzioni in Francese, Tedesco, Italiano, Romeno, Russo, Spagnolo, Svedese ed altre"
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:73
 msgid "Wrapper 3.5.22 (new installs and PPA only)"
@@ -1674,10 +1613,7 @@ msgid ""
 "=====================\n"
 "Syndie 1.105b Release\n"
 "====================="
-msgstr ""
-"=====================\n"
-"Release di Syndie 1.105b\n"
-"====================="
+msgstr "=====================\nRelease di Syndie 1.105b\n====================="
 
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:10
 msgid "Update to HSQLDB 2.3.1"
@@ -1704,19 +1640,15 @@ msgstr ""
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:26
 msgid ""
 "If you have a large database or an identity you wish to preserve,\n"
-"you may wish to back up your entire ~/.syndie directory before you start."
-"\n"
-"The upgrade process does make its own backup, however you may find it "
-"easier to use your own backup if the upgrade fails."
+"you may wish to back up your entire ~/.syndie directory before you start.\n"
+"The upgrade process does make its own backup, however you may find it easier to use your own backup if the upgrade fails."
 msgstr ""
 
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:32
 msgid ""
-"Upgrades from 1.103b may fail for some people due to database corruption "
-"due to bugs in the old HSQLDB.\n"
+"Upgrades from 1.103b may fail for some people due to database corruption due to bugs in the old HSQLDB.\n"
 "Unfortunately, we don't know how to fix it.\n"
-"Your alternatives are to start over with a clean database, or stay with "
-"1.103b forever.\n"
+"Your alternatives are to start over with a clean database, or stay with 1.103b forever.\n"
 "Sorry about that."
 msgstr ""
 
@@ -1724,8 +1656,7 @@ msgstr ""
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:30
 msgid ""
 "As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the "
-"latest release."
+"The best way to maintain security and help the network is to run the latest release."
 msgstr ""
 
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:57
@@ -1785,6 +1716,8 @@ msgstr "Nuove traduzioni"
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:67
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:83
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:87
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:84
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:58
 msgid "Translation updates"
 msgstr "Aggiornamenti traduzione"
 
@@ -1793,10 +1726,7 @@ msgid ""
 "==============\n"
 "0.9.10 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.10\n"
-"=============="
+msgstr "==============\nRelease 0.9.10\n=============="
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:10
 msgid ""
@@ -1806,19 +1736,15 @@ msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:12
 msgid ""
-"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more "
-"difficult for an attacker\n"
-"to correlate a Destination with a Router. It also fixes character "
-"encoding bugs in susimail,\n"
+"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more difficult for an attacker\n"
+"to correlate a Destination with a Router. It also fixes character encoding bugs in susimail,\n"
 "and includes lots of other bug fixes and translation updates.\n"
-"Most of you will update via torrent, using the new \"su3\" update format "
-"with stronger keys."
+"Most of you will update via torrent, using the new \"su3\" update format with stronger keys."
 msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:19
 msgid ""
-"We recently attended `30C3`__ and `Real World Crypto`__, making several "
-"new\n"
+"We recently attended `30C3`__ and `Real World Crypto`__, making several new\n"
 "connections and formulating `big plans`__ for 2014. Thanks to those who\n"
 "supported our attendance with their `donations`__!"
 msgstr ""
@@ -1829,8 +1755,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:43
 msgid ""
-"Flood netdb stores to new location before midnight to prevent lookup "
-"fails after midnight"
+"Flood netdb stores to new location before midnight to prevent lookup fails "
+"after midnight"
 msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:44
@@ -1896,10 +1822,7 @@ msgid ""
 "==============\n"
 "0.9.11 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.11\n"
-"=============="
+msgstr "==============\nRelease 0.9.11\n=============="
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:10
 msgid ""
@@ -1910,24 +1833,19 @@ msgstr ""
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:12
 #, python-format
 msgid ""
-"0.9.11 continues improving LeaseSet lookup and storage to prevent an "
-"attacker\n"
+"0.9.11 continues improving LeaseSet lookup and storage to prevent an attacker\n"
 "from correlating a Destination with a Router. It adds support for the\n"
 "%(orchid)s outproxy plugin which is available at %(url)s. There is a\n"
-"reduction in memory usage due to fixes in the transports. We have some "
-"I2CP\n"
+"reduction in memory usage due to fixes in the transports. We have some I2CP\n"
 "protocol improvements that will provide better lookup facilities and\n"
-"authorization protection for external clients. Of course, there's also "
-"the\n"
+"authorization protection for external clients. Of course, there's also the\n"
 "usual collection of bug fixes. All users should update."
 msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:22
 msgid ""
-"This may be the last release that works with Java 5, which is very old "
-"and\n"
-"unsupported. If you are using a Java 5 or 6 runtime, we strongly "
-"recommend that\n"
+"This may be the last release that works with Java 5, which is very old and\n"
+"unsupported. If you are using a Java 5 or 6 runtime, we strongly recommend that\n"
 "you upgrade to Java 7."
 msgstr ""
 
@@ -1969,13 +1887,12 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:27
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:27
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:39
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:29
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:28
 msgid ""
 "As usual, we recommend that you update to this release. The best way to\n"
 "maintain security and help the network is to run the latest release."
-msgstr ""
-"Come sempre consigliamo ad ogni utente di aggiornare il proprio sistema a"
-" questa versione. Il modo migliore per essere anonimi ed aiutare gli "
-"altri ad esserlo è eseguire un software aggiornato."
+msgstr "Come sempre consigliamo ad ogni utente di aggiornare il proprio sistema a questa versione. Il modo migliore per essere anonimi ed aiutare gli altri ad esserlo è eseguire un software aggiornato."
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:40
 msgid "More leaseset handling improvements"
@@ -2007,8 +1924,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:53
 msgid ""
-"Stricter I2CP authorization enforcement of external clients (incompatible"
-" change)"
+"Stricter I2CP authorization enforcement of external clients (incompatible "
+"change)"
 msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:54
@@ -2028,30 +1945,25 @@ msgid ""
 "=========================\n"
 "Malware at i2pbrowser.net\n"
 "========================="
-msgstr ""
-"=========================\n"
-"Malware su i2pbrowser.net\n"
-"========================="
+msgstr "=========================\nMalware su i2pbrowser.net\n========================="
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:9
 msgid ""
-"The site i2pbrowser.net is a fake I2P website mirror serving up malware "
-"for Windows."
+"The site i2pbrowser.net is a fake I2P website mirror serving up malware for "
+"Windows."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:11
 msgid ""
-"We have recently been made aware of the existence of i2pbrowser.net. This"
-"\n"
-"website copies our homepage and download page, and attempts to trick "
-"users into\n"
+"We have recently been made aware of the existence of i2pbrowser.net. This\n"
+"website copies our homepage and download page, and attempts to trick users into\n"
 "downloading Windows malware."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:17
 msgid ""
-"There are several indicators that point to i2pbrowser.net being a malware"
-" site:"
+"There are several indicators that point to i2pbrowser.net being a malware "
+"site:"
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21
@@ -2060,29 +1972,26 @@ msgstr "Il dominio è stato registrato il 10 febbraio 2014."
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22
 msgid ""
-"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to "
-"the same .exe file."
+"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to the "
+"same .exe file."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:23
-msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
+msgid ""
+"The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:25
 msgid ""
-"We have not examined the malware ourselves, but it does not appear to be "
-"very\n"
-"sophisticated; it is not integrated into or bundled with the I2P "
-"software.\n"
-"Information security expert `Lance James`__ posted `a tweet`__ labelling "
-"it as\n"
+"We have not examined the malware ourselves, but it does not appear to be very\n"
+"sophisticated; it is not integrated into or bundled with the I2P software.\n"
+"Information security expert `Lance James`__ posted `a tweet`__ labelling it as\n"
 "\"a standard dark comet rat\"."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:35
 msgid ""
-"Spread the word. The only official download locations for I2P are linked "
-"on our\n"
+"Spread the word. The only official download locations for I2P are linked on our\n"
 "`download page`__. All I2P download packages are GPG-signed by the\n"
 "`release signing key`__."
 msgstr ""
@@ -2092,10 +2001,7 @@ msgid ""
 "================================================================\n"
 "Search Engine DuckDuckGo Awards Invisible Internet Project $5000\n"
 "================================================================"
-msgstr ""
-"================================================================\n"
-"Search Engine DuckDuckGo Awards Invisible Internet Project $5000\n"
-"================================================================"
+msgstr "================================================================\nSearch Engine DuckDuckGo Awards Invisible Internet Project $5000\n================================================================"
 
 #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:10
 msgid ""
@@ -2106,31 +2012,21 @@ msgstr ""
 #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:12
 msgid ""
 "**Somewhere, NH** -- Internet search company `DuckDuckGo`__ `donates`__\n"
-"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly"
-" open-source\n"
-"donation program. The award was granted on the basis of `nominations`__ "
-"by members of the public\n"
-"on the DuckDuckGo community portal. With an emphasis on privacy, "
-"DuckDuckGo provides a search\n"
-"engine which does not track its users or store personal data. I2P is an "
-"anonymous network intended to\n"
-"protect individuals from dragnet surveillance regularly performed by ISPs"
-" and governments."
+"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly open-source\n"
+"donation program. The award was granted on the basis of `nominations`__ by members of the public\n"
+"on the DuckDuckGo community portal. With an emphasis on privacy, DuckDuckGo provides a search\n"
+"engine which does not track its users or store personal data. I2P is an anonymous network intended to\n"
+"protect individuals from dragnet surveillance regularly performed by ISPs and governments."
 msgstr ""
 
 #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:26
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:46
 msgid ""
-"This marks the single largest donation ever received by I2P and reflects "
-"a growing interest in\n"
-"privacy and security by the Internet community. The funding will help I2P"
-" to reach more users, expand\n"
-"development, and audit the code. It will also enable I2P developers to "
-"attend conferences, such\n"
-"as the `Real-World Cryptography`__ conference in New York City, where the"
-" developers met and\n"
-"collaborated with cryptography experts pursuant to I2P's goals of "
-"providing anonymity to the\n"
+"This marks the single largest donation ever received by I2P and reflects a growing interest in\n"
+"privacy and security by the Internet community. The funding will help I2P to reach more users, expand\n"
+"development, and audit the code. It will also enable I2P developers to attend conferences, such\n"
+"as the `Real-World Cryptography`__ conference in New York City, where the developers met and\n"
+"collaborated with cryptography experts pursuant to I2P's goals of providing anonymity to the\n"
 "public."
 msgstr ""
 
@@ -2151,10 +2047,7 @@ msgid ""
 "==============\n"
 "0.9.12 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.12\n"
-"=============="
+msgstr "==============\nRelease 0.9.12\n=============="
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:11
 msgid "0.9.12 adds support for ECDSA and updates to Jetty 8"
@@ -2164,34 +2057,28 @@ msgstr ""
 msgid ""
 "I2P now requires Java 6 or higher.\n"
 "We strongly recommend that you upgrade to Java 7.\n"
-"If you are still using Java 5, you must upgrade your Java before "
-"installing I2P 0.9.12."
+"If you are still using Java 5, you must upgrade your Java before installing I2P 0.9.12."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:19
 msgid ""
 "0.9.12 adds preliminary support for ECDSA-signed Destinations.\n"
-"It contains several fixes for the handling of Delivery Status Messages "
-"(acknowledgements)\n"
+"It contains several fixes for the handling of Delivery Status Messages (acknowledgements)\n"
 "and those messages are now end-to-end encrypted for increased security."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:24
 msgid ""
 "We have upgraded to Jetty 8.\n"
-"Jetty 8 is almost identical to Jetty 7, so there are no complex "
-"configuration file conversions as there have been in past Jetty upgrades."
-"\n"
+"Jetty 8 is almost identical to Jetty 7, so there are no complex configuration file conversions as there have been in past Jetty upgrades.\n"
 "No manual changes should be necessary."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:35
 msgid ""
 "In early March, Internet search company `DuckDuckGo`__ `donated`__\n"
-"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly "
-"open-source\n"
-"donation program. The award was granted on the basis of `nominations`__ "
-"by members of the public\n"
+"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly open-source\n"
+"donation program. The award was granted on the basis of `nominations`__ by members of the public\n"
 "on the DuckDuckGo community portal."
 msgstr ""
 
@@ -2246,7 +2133,8 @@ msgid "Jetty 8.1.14.v20131031; Java 6 now required"
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:88
-msgid "Reduce target connection count again to reduce tunnel reject rate further"
+msgid ""
+"Reduce target connection count again to reduce tunnel reject rate further"
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:89
@@ -2286,10 +2174,7 @@ msgid ""
 "==============\n"
 "0.9.13 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.13\n"
-"=============="
+msgstr "==============\nRelease 0.9.13\n=============="
 
 #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:11
 msgid "0.9.13 with SusiMail improvements and fixes for firewalled routers"
@@ -2297,10 +2182,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:13
 msgid ""
-"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, "
-"and a big SusiMail update.\n"
-"Of course, there's also the usual collection of bug fixes and translation"
-" updates."
+"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, and a big SusiMail update.\n"
+"Of course, there's also the usual collection of bug fixes and translation updates."
 msgstr ""
 
 #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:23
@@ -2390,10 +2273,7 @@ msgid ""
 "==============\n"
 "0.9.14 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.14\n"
-"=============="
+msgstr "==============\nRelease 0.9.14\n=============="
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:11
 msgid "0.9.14 includes critical security fixes"
@@ -2401,30 +2281,24 @@ msgstr "La versione 0.9.14 contiene delle correzioni a falle di sicurezza critic
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:13
 msgid ""
-"0.9.14 includes critical fixes for XSS and remote execution "
-"vulnerabilities reported by Exodus Intelligence.\n"
-"As an added precaution, we have disabled several advanced configuration "
-"features in the router console,\n"
+"0.9.14 includes critical fixes for XSS and remote execution vulnerabilities reported by Exodus Intelligence.\n"
+"As an added precaution, we have disabled several advanced configuration features in the router console,\n"
 "including installation of new plugins.\n"
 "We plan to re-enable these in a future release after additional review."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:20
 msgid ""
-"Due to I2P library changes, I2P-Bote users must upgrade their plugin to "
-"version 0.2.10 to work with I2P 0.9.14.\n"
-"Your router should update the plugin automatically after the router "
-"restarts."
+"Due to I2P library changes, I2P-Bote users must upgrade their plugin to version 0.2.10 to work with I2P 0.9.14.\n"
+"Your router should update the plugin automatically after the router restarts."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:25
 msgid ""
-"The release also contains several bug fixes in i2ptunnel, i2psnark, and "
-"other areas,\n"
+"The release also contains several bug fixes in i2ptunnel, i2psnark, and other areas,\n"
 "and updates to the latest Jetty, Tomcat, and Wrapper.\n"
 "We've also implemented a faster and more secure method for reseeding.\n"
-"Of course, there's also the usual collection of minor bug fixes and "
-"translation updates."
+"Of course, there's also the usual collection of minor bug fixes and translation updates."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:32
@@ -2475,14 +2349,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:55
 msgid ""
-"Several i2psnark improvements and fixes (GUI and DHT), including changes "
-"for better compatibility with Vuze"
+"Several i2psnark improvements and fixes (GUI and DHT), including changes for"
+" better compatibility with Vuze"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:60
 msgid ""
-"Reseeding now fetches a signed zip file containing router infos for "
-"security and speed"
+"Reseeding now fetches a signed zip file containing router infos for security"
+" and speed"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:61
@@ -2495,8 +2369,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:63
 msgid ""
-"Per-message reliabilitiy settings in I2CP and error propagation back from"
-" router to client"
+"Per-message reliabilitiy settings in I2CP and error propagation back from "
+"router to client"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:64
@@ -2520,10 +2394,7 @@ msgid ""
 "================\n"
 "0.9.14.1 Release\n"
 "================"
-msgstr ""
-"================\n"
-"Reelase 0.9.14.1\n"
-"================"
+msgstr "================\nReelase 0.9.14.1\n================"
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:11
 msgid "0.9.14.1 includes i2psnark and console fixes"
@@ -2531,33 +2402,23 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:13
 msgid ""
-"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some"
-" other web forms.\n"
-"We've restored the ability to install plugins via the console, but you "
-"must first edit your router.config file\n"
-"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the "
-"line routerconsole.enablePluginInstall=true.\n"
-"Other rarely-used advanced features that were removed in 0.9.14 may be "
-"restored by adding the line routerconsole.advanced=true."
+"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some other web forms.\n"
+"We've restored the ability to install plugins via the console, but you must first edit your router.config file\n"
+"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the line routerconsole.enablePluginInstall=true.\n"
+"Other rarely-used advanced features that were removed in 0.9.14 may be restored by adding the line routerconsole.advanced=true."
 msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:20
 msgid ""
-"As usual, if configured with the default \"Download and Verify\", the "
-"router will automatically download the update and display a button to "
-"restart.\n"
-"However, due to a bug in 0.9.14, if your update is configured for "
-"\"Notify only\", the download button will not be displayed.\n"
-"You must change your configuration to \"Download and Verify\" or "
-"\"Download, Verify, and Restart\" to update."
+"As usual, if configured with the default \"Download and Verify\", the router will automatically download the update and display a button to restart.\n"
+"However, due to a bug in 0.9.14, if your update is configured for \"Notify only\", the download button will not be displayed.\n"
+"You must change your configuration to \"Download and Verify\" or \"Download, Verify, and Restart\" to update."
 msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:26
 msgid ""
-"If you are still running 0.9.13 or older, we recommend that you update to"
-" this release as soon as possible.\n"
-"If you don't often check your router console, please consider changing "
-"your configuration to \"Download, Verify, and Restart\"\n"
+"If you are still running 0.9.13 or older, we recommend that you update to this release as soon as possible.\n"
+"If you don't often check your router console, please consider changing your configuration to \"Download, Verify, and Restart\"\n"
 "to ensure you are always running the latest release."
 msgstr ""
 
@@ -2601,10 +2462,7 @@ msgid ""
 "==============================\n"
 "The birth of Privacy Solutions\n"
 "=============================="
-msgstr ""
-"==============================\n"
-"Nascita di Privacy Solutions\n"
-"=============================="
+msgstr "==============================\nNascita di Privacy Solutions\n=============================="
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:11
 msgid "Organization launch"
@@ -2614,10 +2472,7 @@ msgstr ""
 msgid ""
 "Hello all!\n"
 "\n"
-"Today we announce the Privacy Solutions project, a new organization that "
-"develops and maintains I2P software. Privacy Solutions includes several "
-"new development efforts designed to enhance the privacy, security, and "
-"anonymity for users, based on I2P protocols and technology.\n"
+"Today we announce the Privacy Solutions project, a new organization that develops and maintains I2P software. Privacy Solutions includes several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.\n"
 "\n"
 "These efforts include\n"
 "\n"
@@ -2627,40 +2482,23 @@ msgid ""
 "4) The Anoncoin crypto-coin project.\n"
 "5) The Monero crypto-coin project.\n"
 "\n"
-"Privacy Solutions' initial funding was provided by the supporters of the "
-"Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-"
-"profit type of organization registered within the Norwegian government "
-"registers. ( Kind of like US 501(c)3. )\n"
+"Privacy Solutions' initial funding was provided by the supporters of the Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-profit type of organization registered within the Norwegian government registers. ( Kind of like US 501(c)3. )\n"
 "\n"
-"Privacy Solutions plans to apply for funding from the Norwegian goverment"
-" for network research, because of BigBrother (We'll get back to what that"
-" is) and the coins that are planned to use low-latency networks as "
-"primary transport layer. Our research will support advances in software "
-"technology for anonymity, security, and privacy.\n"
+"Privacy Solutions plans to apply for funding from the Norwegian goverment for network research, because of BigBrother (We'll get back to what that is) and the coins that are planned to use low-latency networks as primary transport layer. Our research will support advances in software technology for anonymity, security, and privacy.\n"
 "\n"
 "\n"
-"First a little bit about the Abscond Browser Bundle. This was first a "
-"one-man project by Meeh, but later on friends started sending patches, "
-"the project is now trying to create the same easy access to I2P as Tor "
-"has with their browser bundle. Our first release isn't far away, it's "
-"just some gitian script tasks left, including setup of the Apple "
-"toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C"
-" struct keeping vital proces information about an process) from the Java "
-"instance to check on I2P before we declare it stable. I2pd will also "
-"switch with the Java version once it's ready, and there is no point in "
-"shipping a JRE in the bundle anymore. You can read more about the Abscond"
-" Browser Bundle at https://hideme.today/dev"
+"First a little bit about the Abscond Browser Bundle. This was first a one-man project by Meeh, but later on friends started sending patches, the project is now trying to create the same easy access to I2P as Tor has with their browser bundle. Our first release isn't far away, it's just some gitian script tasks left, including setup of the Apple toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C struct keeping vital proces information about an process) from the Java instance to check on I2P before we declare it stable. I2pd will also switch with the Java version once it's ready, and there is no point in shipping a JRE in the bundle anymore. You can read more about the Abscond Browser Bundle at https://hideme.today/dev"
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:35
 msgid ""
-"We would also like to inform of the current status of i2pd. I2pd supports"
-" bi-directional streaming now, that allows to use not only HTTP but long-"
-"lived communication channels. Instant IRC support has been added. I2pd "
-"users are able to use it same way as Java I2P for access to I2P IRC "
-"network. I2PTunnel is one of key features of I2P network, allowing non-"
-"I2P applications communicate transparently. That's why it's vital feature"
-" for i2pd and one of key milestones."
+"We would also like to inform of the current status of i2pd. I2pd supports "
+"bi-directional streaming now, that allows to use not only HTTP but long-"
+"lived communication channels. Instant IRC support has been added. I2pd users"
+" are able to use it same way as Java I2P for access to I2P IRC network. "
+"I2PTunnel is one of key features of I2P network, allowing non-I2P "
+"applications communicate transparently. That's why it's vital feature for "
+"i2pd and one of key milestones."
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:39
@@ -2669,18 +2507,17 @@ msgid ""
 "Bigbrother.i2p, which is a metrics system Meeh made over a year back. "
 "Recently we noticed that Meeh actually have 100Gb of non-duplicated data "
 "from nodes reporting in since initial launch. This will also be moved to "
-"Privacy Solutions and be rewritten with a NSPOF backend. With this we "
-"will aslo start using the Graphite ( http://graphite.wikidot.com/screen-"
-"shots ). This will give us a great overview over the network without "
-"privacy issues for our end users. The clients filter all data except "
-"country, router hash and success rate on tunnel buildings. The name of "
-"this service is as always a little joke from Meeh."
+"Privacy Solutions and be rewritten with a NSPOF backend. With this we will "
+"aslo start using the Graphite ( http://graphite.wikidot.com/screen-shots ). "
+"This will give us a great overview over the network without privacy issues "
+"for our end users. The clients filter all data except country, router hash "
+"and success rate on tunnel buildings. The name of this service is as always "
+"a little joke from Meeh."
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:46
 msgid ""
-"We have shorted down a bit of the news here, if you're interested in more"
-" information please visit https://blog.privacysolutions.no/\n"
+"We have shorted down a bit of the news here, if you're interested in more information please visit https://blog.privacysolutions.no/\n"
 "We're still under construction and more content will come!\n"
 "\n"
 "\n"
@@ -2704,67 +2541,50 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:11
 msgid ""
-"I2P Android and Bote have been released on Google Play in Norway, as a "
-"test run for a future worldwide release."
+"I2P Android and Bote have been released on Google Play in Norway, as a test "
+"run for a future worldwide release."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:13
 msgid ""
-"I2P Android has existed for over three years. In that time, it has "
-"evolved from\n"
-"a simple test project into a usable, useful Android port of the I2P "
-"router. Our\n"
-"eventual goal has been to release I2P Android on Google Play, to make it "
-"easier\n"
-"for users to discover, install and use I2P on their Android devices. "
-"After much\n"
-"work improving the user interface, fixing bugs and testing, we think that"
-" I2P\n"
+"I2P Android has existed for over three years. In that time, it has evolved from\n"
+"a simple test project into a usable, useful Android port of the I2P router. Our\n"
+"eventual goal has been to release I2P Android on Google Play, to make it easier\n"
+"for users to discover, install and use I2P on their Android devices. After much\n"
+"work improving the user interface, fixing bugs and testing, we think that I2P\n"
 "Android is finally ready to go where the users are."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:22
 msgid ""
-"Initially, we are only releasing to Android users in Norway, as a test "
-"run. I2P\n"
-"Android will have far more exposure on Google Play than it has ever had "
-"before,\n"
-"and there will be bugs and usability issues that we need to fix. It will "
-"be much\n"
-"easier (and less stressful!) to respond to feedback if we only need to "
-"deal with\n"
-"reports from hundreds of users instead of thousands (already orders of "
-"magnitude\n"
+"Initially, we are only releasing to Android users in Norway, as a test run. I2P\n"
+"Android will have far more exposure on Google Play than it has ever had before,\n"
+"and there will be bugs and usability issues that we need to fix. It will be much\n"
+"easier (and less stressful!) to respond to feedback if we only need to deal with\n"
+"reports from hundreds of users instead of thousands (already orders of magnitude\n"
 "more feedback than we have ever had)."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:31
 msgid ""
-"Simultaneously we are making the first public release of Bote, an Android"
-" port\n"
-"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. "
-"It runs\n"
-"on top of the I2P network, and while it works as a standalone app, it "
-"will use\n"
+"Simultaneously we are making the first public release of Bote, an Android port\n"
+"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. It runs\n"
+"on top of the I2P network, and while it works as a standalone app, it will use\n"
 "the I2P Android app by default if installed. As with I2P Android, we are\n"
 "initially only releasing Bote to Android users in Norway."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:41
 msgid ""
-"The apps are being released on Google Play by `The Privacy Solutions "
-"Project`__.\n"
-"See their `blog post`__ for further information, and links to the Google "
-"Play\n"
+"The apps are being released on Google Play by `The Privacy Solutions Project`__.\n"
+"See their `blog post`__ for further information, and links to the Google Play\n"
 "page for Norway users."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:50
 msgid ""
-"As lead developer for I2P Android and Bote, I look forward to your "
-"comments. You\n"
-"are the people who will be using them, and your perspectives will help me"
-" craft\n"
+"As lead developer for I2P Android and Bote, I look forward to your comments. You\n"
+"are the people who will be using them, and your perspectives will help me craft\n"
 "simple, intuitive apps that make privacy accessible to everyone."
 msgstr ""
 
@@ -2774,28 +2594,22 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:59
 msgid ""
-"We have also updated I2P Android on the website to match the release "
-"candidate\n"
-"deployed in Norway. This version will be updated with changes as we "
-"respond to\n"
+"We have also updated I2P Android on the website to match the release candidate\n"
+"deployed in Norway. This version will be updated with changes as we respond to\n"
 "feedback from Norwegian users, heading towards our next stable release."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:65
 msgid ""
-"Please note that we have upgraded the Android API to 9. This means that "
-"Froyo\n"
-"Android 2.2 will not be supported anymore; the minimum requirement is now"
-"\n"
+"Please note that we have upgraded the Android API to 9. This means that Froyo\n"
+"Android 2.2 will not be supported anymore; the minimum requirement is now\n"
 "Gingerbread Android 2.3."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:71
 msgid ""
-"Also note that if you have an earlier version of I2P Android, you will "
-"need to\n"
-"uninstall and reinstall because we have changed the release keys. Further"
-"\n"
+"Also note that if you have an earlier version of I2P Android, you will need to\n"
+"uninstall and reinstall because we have changed the release keys. Further\n"
 "information about this will be provided in a subsequent blog post."
 msgstr ""
 
@@ -2804,10 +2618,7 @@ msgid ""
 "==============\n"
 "0.9.15 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.15\n"
-"=============="
+msgstr "==============\nRelease 0.9.15\n=============="
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:11
 msgid "0.9.15 includes Ed25519 crypto and many fixes"
@@ -2816,31 +2627,23 @@ msgstr ""
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:13
 msgid ""
 "0.9.15 adds preliminary support for Ed25519 EdDSA signatures.\n"
-"It includes a new persistent configuration backend for i2psnark and fixes"
-" several issues with i2psnark's handling of file names.\n"
+"It includes a new persistent configuration backend for i2psnark and fixes several issues with i2psnark's handling of file names.\n"
 "There are several improvements to speed up SAM.\n"
 "Plugins now support stronger signatures in the su3 file format.\n"
-"Plugin installation via the console, which was disabled in 0.9.14, is re-"
-"enabled."
+"Plugin installation via the console, which was disabled in 0.9.14, is re-enabled."
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:21
 msgid ""
-"We have supported ECDSA signatures since 0.9.12, and we would like to "
-"start using ECDSA by default.\n"
-"Unfortunately, some of you are still running older I2P versions, and for "
-"others,\n"
+"We have supported ECDSA signatures since 0.9.12, and we would like to start using ECDSA by default.\n"
+"Unfortunately, some of you are still running older I2P versions, and for others,\n"
 "their distribution or Java runtime does not support ECDSA. Red Hat\n"
 "(RHEL, Fedora) distributions are reported to be missing ECDSA.\n"
 "Some have fixed the Java issues by upgrading from Java 6 to Java 7;\n"
-"others have had success with installing the \"unlimited strength policy "
-"files\".\n"
-"We've added information about missing crypto to the log file and the "
-"/logs page in the console.\n"
-"After you update to 0.9.15, please check if you are missing ECDSA "
-"support, and attempt to fix it if necessary.\n"
-"This is particularly important for those that run popular eepsites and "
-"services."
+"others have had success with installing the \"unlimited strength policy files\".\n"
+"We've added information about missing crypto to the log file and the /logs page in the console.\n"
+"After you update to 0.9.15, please check if you are missing ECDSA support, and attempt to fix it if necessary.\n"
+"This is particularly important for those that run popular eepsites and services."
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:42
@@ -2877,6 +2680,8 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:35
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:35
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:47
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:37
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:36
 msgid "Changes"
 msgstr "Modifiche"
 
@@ -2948,8 +2753,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:68
 msgid ""
-"i2ptunnel add support for local SSL connections for standard and IRC "
-"client tunnels"
+"i2ptunnel add support for local SSL connections for standard and IRC client "
+"tunnels"
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:69
@@ -2975,10 +2780,7 @@ msgid ""
 "==============\n"
 "0.9.16 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.16\n"
-"=============="
+msgstr "==============\nRelease 0.9.16\n=============="
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:11
 msgid "0.9.16 includes crypto migration and many fixes"
@@ -2989,26 +2791,21 @@ msgid ""
 "0.9.16 is a significant step forward in our plan to migrate\n"
 "from DSA to ECDSA and then EdDSA cryptographic signatures,\n"
 "and makes several other changes to increase your anonymity and security.\n"
-"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures"
-" by default.\n"
-"In addition, we've fixed a large number of serious bugs, including "
-"console lockups."
+"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures by default.\n"
+"In addition, we've fixed a large number of serious bugs, including console lockups."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:21
 msgid ""
-"Changes in router data structures will require i2pcontrol plugin users to"
-" update to version 0.0.9."
+"Changes in router data structures will require i2pcontrol plugin users to "
+"update to version 0.0.9."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:25
 msgid ""
-"If you run an eepsite or a service and you are not running a recent "
-"release,\n"
-"or your Java or OS does not support ECDSA (as noted in the logs and on "
-"the /logs page in the console),\n"
-"please fix the issue as soon as possible or your users will soon be "
-"unable to connect."
+"If you run an eepsite or a service and you are not running a recent release,\n"
+"or your Java or OS does not support ECDSA (as noted in the logs and on the /logs page in the console),\n"
+"please fix the issue as soon as possible or your users will soon be unable to connect."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:42
@@ -3021,8 +2818,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:44
 msgid ""
-"Require I2CP authorization for all messages when enabled (requires 0.9.11"
-" or higher client)"
+"Require I2CP authorization for all messages when enabled (requires 0.9.11 or"
+" higher client)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:45
@@ -3041,8 +2838,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:48
 msgid ""
-"New column sorting, set-all priority buttons, and upload ratio display in"
-" i2psnark"
+"New column sorting, set-all priority buttons, and upload ratio display in "
+"i2psnark"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:49
@@ -3103,14 +2900,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:71
 msgid ""
-"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol"
-" plugin)"
+"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol "
+"plugin)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:72
 msgid ""
-"New router keys now stored in router.keys.dat (eepPriv.dat format) "
-"instead of router.keys"
+"New router keys now stored in router.keys.dat (eepPriv.dat format) instead "
+"of router.keys"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:73
@@ -3145,8 +2942,7 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:80
 msgid ""
-"Change eepsite Jetty threadpool and queue configuration (new installs "
-"only)"
+"Change eepsite Jetty threadpool and queue configuration (new installs only)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:81
@@ -3158,10 +2954,7 @@ msgid ""
 "==============\n"
 "0.9.17 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Reelase 0.9.17\n"
-"=============="
+msgstr "==============\nReelase 0.9.17\n=============="
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:11
 msgid "0.9.17 with more crypto migration and many fixes"
@@ -3169,39 +2962,34 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:13
 msgid ""
-"0.9.17 is primarily a bugfix release, but it also continues our migration"
-" to stronger cryptographic signatures."
+"0.9.17 is primarily a bugfix release, but it also continues our migration to"
+" stronger cryptographic signatures."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:17
 msgid ""
-"We have moved the news feed system used for the news on your console and "
-"the latest router version indication\n"
+"We have moved the news feed system used for the news on your console and the latest router version indication\n"
 "to a signed format using RSA 4096-bit keys for enhanced security."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:22
 msgid ""
-"New eepsites and servers will be ECDSA-signed by default, if ECDSA is "
-"available.\n"
+"New eepsites and servers will be ECDSA-signed by default, if ECDSA is available.\n"
 "There is now a warning in the console sidebar if ECDSA is not available.\n"
-"For RedHat users, we have reports of successful installs of the "
-"BouncyCastle Provider (bcprov) jar to add ECDSA support."
+"For RedHat users, we have reports of successful installs of the BouncyCastle Provider (bcprov) jar to add ECDSA support."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:28
 msgid ""
-"We've fixed several serious bugs, including an SSU packet corruption "
-"problem,\n"
+"We've fixed several serious bugs, including an SSU packet corruption problem,\n"
 "and a SAM bug affecting i2p-messenger and other SAM applications.\n"
-"There are several fixes for the preliminary ECDSA router signatures added"
-" in the last release but not yet enabled."
+"There are several fixes for the preliminary ECDSA router signatures added in the last release but not yet enabled."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:34
 msgid ""
-"Many of us will be attending 31C3 in Hamburg in December. Stop by our "
-"table and say hi!"
+"Many of us will be attending 31C3 in Hamburg in December. Stop by our table "
+"and say hi!"
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:49
@@ -3297,23 +3085,18 @@ msgid ""
 "====================\n"
 "Android app releases\n"
 "===================="
-msgstr ""
-"====================\n"
-"Rilasci della app Android\n"
-"===================="
+msgstr "====================\nRilasci della app Android\n===================="
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:11
 msgid ""
-"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google"
-" Play and F-Droid."
+"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google "
+"Play and F-Droid."
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:13
 msgid ""
-"It has been some time since I last posted updates about our Android "
-"development,\n"
-"and several I2P releases have gone by without any matching Android "
-"releases.\n"
+"It has been some time since I last posted updates about our Android development,\n"
+"and several I2P releases have gone by without any matching Android releases.\n"
 "At last, the wait is over!"
 msgstr ""
 
@@ -3321,53 +3104,35 @@ msgstr ""
 msgid ""
 "New app versions\n"
 "----------------"
-msgstr ""
-"Nuove versioni della app\n"
-"----------------"
+msgstr "Nuove versioni della app\n----------------"
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:24
 msgid ""
-"New versions of I2P Android and Bote have been released! They can be "
-"downloaded\n"
+"New versions of I2P Android and Bote have been released! They can be downloaded\n"
 "from these URLs:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:35
 msgid ""
-"The main change in these releases is the transition to Android's new "
-"Material\n"
-"design system. Material has made it much easier for app developers with, "
-"shall\n"
-"we say, \"minimalist\" design skills (like myself) to create apps that "
-"are nicer\n"
-"to use. I2P Android also updates its underlying I2P router to the just-"
-"released\n"
-"version 0.9.17. Bote brings in several new features along with many "
-"smaller\n"
-"improvements; for example, you can now add new email destinations via QR "
-"codes."
+"The main change in these releases is the transition to Android's new Material\n"
+"design system. Material has made it much easier for app developers with, shall\n"
+"we say, \"minimalist\" design skills (like myself) to create apps that are nicer\n"
+"to use. I2P Android also updates its underlying I2P router to the just-released\n"
+"version 0.9.17. Bote brings in several new features along with many smaller\n"
+"improvements; for example, you can now add new email destinations via QR codes."
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:44
 msgid ""
-"As I mentioned in `my last update`__, the release key that signs the apps"
-" has\n"
-"changed. The reason for this was because we needed to change the package "
-"name\n"
-"of I2P Android. The old package name (``net.i2p.android.router``) had "
-"already\n"
-"been taken on Google Play (we still don't know who was using it), and we "
-"wanted\n"
-"to use the same package name and signing key for all distributions of I2P"
-"\n"
-"Android. Doing so means that a user could initially install the app from "
-"the I2P\n"
-"website, and then later if the website was blocked they could upgrade it "
-"using\n"
-"Google Play. Android OS considers an application to be completely "
-"different when\n"
-"its package name changes, so we took the opportunity to increase the "
-"strength of\n"
+"As I mentioned in `my last update`__, the release key that signs the apps has\n"
+"changed. The reason for this was because we needed to change the package name\n"
+"of I2P Android. The old package name (``net.i2p.android.router``) had already\n"
+"been taken on Google Play (we still don't know who was using it), and we wanted\n"
+"to use the same package name and signing key for all distributions of I2P\n"
+"Android. Doing so means that a user could initially install the app from the I2P\n"
+"website, and then later if the website was blocked they could upgrade it using\n"
+"Google Play. Android OS considers an application to be completely different when\n"
+"its package name changes, so we took the opportunity to increase the strength of\n"
 "the signing key."
 msgstr ""
 
@@ -3379,31 +3144,22 @@ msgstr ""
 msgid ""
 "Google Play\n"
 "-----------"
-msgstr ""
-"Google Play\n"
-"-----------"
+msgstr "Google Play\n-----------"
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:73
 msgid ""
-"A few months ago we `released`__ both I2P Android and Bote on Google Play"
-" in\n"
-"Norway, to test the release process there. We are pleased to announce "
-"that both\n"
-"apps are now being released globally by `Privacy Solutions`__. The apps "
-"can be\n"
+"A few months ago we `released`__ both I2P Android and Bote on Google Play in\n"
+"Norway, to test the release process there. We are pleased to announce that both\n"
+"apps are now being released globally by `Privacy Solutions`__. The apps can be\n"
 "found at these URLs:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:89
 msgid ""
-"The global release is being done in several stages, starting with the "
-"countries\n"
-"for which we have translations. The notable exception to this is France; "
-"due to\n"
-"import regulations on cryptographic code, we are unable yet to distribute"
-" these\n"
-"apps on Google Play France. This is the same issue that has affected "
-"other apps\n"
+"The global release is being done in several stages, starting with the countries\n"
+"for which we have translations. The notable exception to this is France; due to\n"
+"import regulations on cryptographic code, we are unable yet to distribute these\n"
+"apps on Google Play France. This is the same issue that has affected other apps\n"
 "like TextSecure and Orbot."
 msgstr ""
 
@@ -3411,45 +3167,32 @@ msgstr ""
 msgid ""
 "F-Droid\n"
 "-------"
-msgstr ""
-"F-Droid\n"
-"-------"
+msgstr "F-Droid\n-------"
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:103
 msgid ""
-"Don't think we have forgotten about you, F-Droid users! In addition to "
-"the two\n"
-"locations above, we have set up our own F-Droid repository. If you are "
-"reading\n"
-"this post on your phone, `click here`__ to add it to F-Droid (this only "
-"works in\n"
-"some Android browsers). Or, you can manually add the URL below to your "
-"F-Droid\n"
+"Don't think we have forgotten about you, F-Droid users! In addition to the two\n"
+"locations above, we have set up our own F-Droid repository. If you are reading\n"
+"this post on your phone, `click here`__ to add it to F-Droid (this only works in\n"
+"some Android browsers). Or, you can manually add the URL below to your F-Droid\n"
 "repository list:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:115
 msgid ""
-"If you would like to manually verify the fingerprint (SHA-256) of the "
-"repository\n"
+"If you would like to manually verify the fingerprint (SHA-256) of the repository\n"
 "signing key, or type it in when adding the repository, here it is:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:124
 msgid ""
-"Unfortunately the I2P app in the main F-Droid repository has not been "
-"updated\n"
-"because our F-Droid maintainer has disappeared. We hope that by "
-"maintaining this\n"
+"Unfortunately the I2P app in the main F-Droid repository has not been updated\n"
+"because our F-Droid maintainer has disappeared. We hope that by maintaining this\n"
 "binary repository, we can better support our F-Droid users and keep them\n"
-"up-to-date. If you have already installed I2P from the main F-Droid "
-"repository,\n"
-"you will need to uninstall it if you want to upgrade, because the signing"
-" key\n"
-"will be different. The apps in our F-Droid repository are the same APKs "
-"that are\n"
-"provided on our website and on Google Play, so in future you will be able"
-" to\n"
+"up-to-date. If you have already installed I2P from the main F-Droid repository,\n"
+"you will need to uninstall it if you want to upgrade, because the signing key\n"
+"will be different. The apps in our F-Droid repository are the same APKs that are\n"
+"provided on our website and on Google Play, so in future you will be able to\n"
 "upgrade using any of these sources."
 msgstr ""
 
@@ -3468,25 +3211,18 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:21
 msgid ""
-"We were, for the second year in a row, at a great location in the "
-"Congress, in\n"
-"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square "
-"has\n"
-"really increased our visibility and helped many people find us. Thanks to"
-" Noisy\n"
+"We were, for the second year in a row, at a great location in the Congress, in\n"
+"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square has\n"
+"really increased our visibility and helped many people find us. Thanks to Noisy\n"
 "Square and the 31C3 organizers for a great Congress."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:30
 msgid ""
-"We also thank Gabriel Weinberg and his fabulous search engine "
-"`DuckDuckGo`__ for\n"
-"their support of open source anonymity tools and their `generous "
-"contribution`__\n"
-"to I2P in 2014. Funding from DuckDuckGo and others helped support our "
-"attendance\n"
-"at CCC. This is the primary annual meetup for I2P developers and it is "
-"critical\n"
+"We also thank Gabriel Weinberg and his fabulous search engine `DuckDuckGo`__ for\n"
+"their support of open source anonymity tools and their `generous contribution`__\n"
+"to I2P in 2014. Funding from DuckDuckGo and others helped support our attendance\n"
+"at CCC. This is the primary annual meetup for I2P developers and it is critical\n"
 "to our success."
 msgstr ""
 
@@ -3498,127 +3234,88 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:49
 msgid ""
-"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved "
-"himself\n"
-"and the project from TU Munich to `Inria`__ in France. He has a large "
-"number of\n"
-"`open positions`__. This is a great opportunity to get paid to work on "
-"open\n"
+"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved himself\n"
+"and the project from TU Munich to `Inria`__ in France. He has a large number of\n"
+"`open positions`__. This is a great opportunity to get paid to work on open\n"
 "source anonymity tools, we encourage everybody to contact him about it."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:60
 msgid ""
-"The prospect of an invigorated GNUnet with a large amount of new funding "
-"is\n"
-"quite interesting. We discussed more ways to work together. In early "
-"2014, we\n"
-"worked hard to understand the GnuNet DNS replacement, but we were unable "
-"to\n"
-"figure out a good fit for it in I2P. One of his new ideas is a "
-"distributed,\n"
-"anonymous statistics gathering subsystem, for detecting problems or "
-"attacks on\n"
+"The prospect of an invigorated GNUnet with a large amount of new funding is\n"
+"quite interesting. We discussed more ways to work together. In early 2014, we\n"
+"worked hard to understand the GnuNet DNS replacement, but we were unable to\n"
+"figure out a good fit for it in I2P. One of his new ideas is a distributed,\n"
+"anonymous statistics gathering subsystem, for detecting problems or attacks on\n"
 "the network. We'd definitely be interested in that."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:69
 msgid ""
-"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems "
-"draft`__.\n"
-"A new, greatly simplified version 3 was posted in December. The prospects"
-" for\n"
+"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems draft`__.\n"
+"A new, greatly simplified version 3 was posted in December. The prospects for\n"
 "approval remain unclear. The best way to monitor or participate in the\n"
-"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to "
-"do so\n"
+"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to do so\n"
 "on our side, and also give Hellekin a new point-of-contact for this topic."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:80
 msgid ""
-"We apologized to Christian for not being organized enough to have a talk "
-"at his\n"
-"`We Fix The Net assembly`__. One of our biggest failures as a project is "
-"our\n"
-"seeming inability to submit talks at conferences. We'll have to do better"
-" in the\n"
+"We apologized to Christian for not being organized enough to have a talk at his\n"
+"`We Fix The Net assembly`__. One of our biggest failures as a project is our\n"
+"seeming inability to submit talks at conferences. We'll have to do better in the\n"
 "new year."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:92
 msgid ""
-"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in "
-"with\n"
-"other anonymity tools into this new Debian \"superpackage\" of some sort,"
-" and\n"
-"would love to get I2P into Debian in 2015. He claims the process is now "
-"easy,\n"
+"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in with\n"
+"other anonymity tools into this new Debian \"superpackage\" of some sort, and\n"
+"would love to get I2P into Debian in 2015. He claims the process is now easy,\n"
 "just `follow the instructions`__. We said that's funny, we've been\n"
 "`stuck in the process for over 7 years`__."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:103
 msgid ""
-"He said, well, try the new process, it works great, should be no problem "
-"at all\n"
-"if your package is in good shape. The people in Debian that run this "
-"process are\n"
-"eager volunteers who want nothing more than to get more packages in. We "
-"said our\n"
-"package is indeed in fantastic shape, and we would try out the new "
-"process as\n"
-"soon as possible. If all this is true, we will be in the next Debian "
-"release in\n"
+"He said, well, try the new process, it works great, should be no problem at all\n"
+"if your package is in good shape. The people in Debian that run this process are\n"
+"eager volunteers who want nothing more than to get more packages in. We said our\n"
+"package is indeed in fantastic shape, and we would try out the new process as\n"
+"soon as possible. If all this is true, we will be in the next Debian release in\n"
 "late 2015. This would be very very cool."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:115
 msgid ""
-"We had a nice discussion with BitingBird of Tails. They are very happy "
-"with our\n"
-"rapid response to the `vulnerability disclosure`__ last summer, resulting"
-" in our\n"
-"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and "
-"they\n"
-"took `great offense`__ to that and the lack of private notification. We "
-"thanked\n"
+"We had a nice discussion with BitingBird of Tails. They are very happy with our\n"
+"rapid response to the `vulnerability disclosure`__ last summer, resulting in our\n"
+"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and they\n"
+"took `great offense`__ to that and the lack of private notification. We thanked\n"
 "them for taking the heat and fighting back."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:127
 msgid ""
-"BitingBird also handles support, and she tells us the number one issue is"
-" how\n"
-"long I2P takes to start up and be useful for browsing I2P sites. Her "
-"standard\n"
-"answer is \"wait ten more minutes\" and that seems to be effective. I2P "
-"is\n"
-"particularly slow to startup on Tails since it does not persist peer data"
-" by\n"
-"default. It would be nice to change that, but there's also things we can "
-"do on\n"
-"the I2P side to make things start faster. Expect some improvement in our "
-"0.9.18\n"
+"BitingBird also handles support, and she tells us the number one issue is how\n"
+"long I2P takes to start up and be useful for browsing I2P sites. Her standard\n"
+"answer is \"wait ten more minutes\" and that seems to be effective. I2P is\n"
+"particularly slow to startup on Tails since it does not persist peer data by\n"
+"default. It would be nice to change that, but there's also things we can do on\n"
+"the I2P side to make things start faster. Expect some improvement in our 0.9.18\n"
 "release."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:140
 msgid ""
-"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The "
-"upcoming\n"
-"Tor Hidden Services changes mean that their keys will no longer fit into "
-"a\n"
-"portion of an IPv6 address, and he was working on a solution. We reminded"
-" him\n"
-"that this has always been the case for I2P (with \"GarliCat\"), that it's"
-" not a\n"
-"new problem. He pointed us to `a presentation`__ of his proposal. It "
-"involves\n"
+"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The upcoming\n"
+"Tor Hidden Services changes mean that their keys will no longer fit into a\n"
+"portion of an IPv6 address, and he was working on a solution. We reminded him\n"
+"that this has always been the case for I2P (with \"GarliCat\"), that it's not a\n"
+"new problem. He pointed us to `a presentation`__ of his proposal. It involves\n"
 "storing an extra record in the hidden service directory (equivalent of a\n"
-"leaseset I2P's network database). It wasn't completely clear how this "
-"would\n"
-"work, or if we would consider it abuse of the netDb. We'll follow up with"
-" him\n"
+"leaseset I2P's network database). It wasn't completely clear how this would\n"
+"work, or if we would consider it abuse of the netDb. We'll follow up with him\n"
 "as he gets further."
 msgstr ""
 
@@ -3626,29 +3323,19 @@ msgstr ""
 msgid ""
 "New users\n"
 "---------"
-msgstr ""
-"Nuovi utenti\n"
-"---------"
+msgstr "Nuovi utenti\n---------"
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:160
 msgid ""
-"We spent hours and hours explaining I2P to people stopping by our table. "
-"Some\n"
-"had heard of I2P before, some had not; everybody had heard of Tor and had"
-" at\n"
-"least a vague idea of what hidden services are. As usual, introducing "
-"people to\n"
-"I2P was a struggle. By the end of the Congress, we became convinced that "
-"a part\n"
-"of the problem was a difference in terminology. Back 12 years ago, when "
-"I2P and\n"
-"Tor were both getting started, we each came up with terms for the various"
-" parts\n"
+"We spent hours and hours explaining I2P to people stopping by our table. Some\n"
+"had heard of I2P before, some had not; everybody had heard of Tor and had at\n"
+"least a vague idea of what hidden services are. As usual, introducing people to\n"
+"I2P was a struggle. By the end of the Congress, we became convinced that a part\n"
+"of the problem was a difference in terminology. Back 12 years ago, when I2P and\n"
+"Tor were both getting started, we each came up with terms for the various parts\n"
 "of our systems. Today, the Tor terminology such as \"hidden service\" is\n"
-"well-understood and commonplace. The I2P terminology such as \"eepsite\" "
-"is\n"
-"neither. We agreed to review our documentation, router console, and other"
-" places\n"
+"well-understood and commonplace. The I2P terminology such as \"eepsite\" is\n"
+"neither. We agreed to review our documentation, router console, and other places\n"
 "for opportunities to simplify it and use common terms."
 msgstr ""
 
@@ -3667,66 +3354,65 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:182
 msgid ""
-"* *Toronto meetup:* CCC is such a productive time for us, and it seems "
-"that a second meetup in the year would be quite helpful. We have proposed"
-" it for August 2015 in Toronto, Canada, in conjunction with `Toronto "
-"Crypto`__. It would include developer meetings together with "
-"presentations and tutorials, all open to the public. We are attempting to"
-" gauge interest and research possible venues. If you are considering "
-"attending, please let us know by `tweeting @i2p`__ or posting `on the dev"
-" forum thread`__."
+"* *Toronto meetup:* CCC is such a productive time for us, and it seems that "
+"a second meetup in the year would be quite helpful. We have proposed it for "
+"August 2015 in Toronto, Canada, in conjunction with `Toronto Crypto`__. It "
+"would include developer meetings together with presentations and tutorials, "
+"all open to the public. We are attempting to gauge interest and research "
+"possible venues. If you are considering attending, please let us know by "
+"`tweeting @i2p`__ or posting `on the dev forum thread`__."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:190
 msgid ""
-"* We discussed Meeh's workload and the state of the various services he "
-"is running. We made some plans to reduce his load and have some other "
-"people help out."
+"* We discussed Meeh's workload and the state of the various services he is "
+"running. We made some plans to reduce his load and have some other people "
+"help out."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:194
 msgid ""
-"* We reviewed our critieria for placing links to `i2pd`__ on our download"
-" page.  We agreed that the only remaining item is to have a nice page on "
-"the `Privacy Solutions web site`__ or elsewhere with binary packages for "
+"* We reviewed our critieria for placing links to `i2pd`__ on our download "
+"page.  We agreed that the only remaining item is to have a nice page on the "
+"`Privacy Solutions web site`__ or elsewhere with binary packages for "
 "Windows, Linux, and Mac, and source packages. It's not clear who is "
-"responsible for building the packages and where the \"official\" version "
-"is. Once there's an established process for building and signing packages"
-" and an official place to put them, we're ready to link to it. If it is "
-"not feasible to host it on the Privacy Solutions website, we will discuss"
-" alternatives with orignal, including possible migration to our download "
+"responsible for building the packages and where the \"official\" version is."
+" Once there's an established process for building and signing packages and "
+"an official place to put them, we're ready to link to it. If it is not "
+"feasible to host it on the Privacy Solutions website, we will discuss "
+"alternatives with orignal, including possible migration to our download "
 "servers."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:201
 msgid ""
-"* Lots of people coming by the table asked if we had a non-Java version. "
-"It was great to finally answer \"yes\" and we're eager to get the word "
-"out and get more users, testers, and developers on it."
+"* Lots of people coming by the table asked if we had a non-Java version. It "
+"was great to finally answer \"yes\" and we're eager to get the word out and "
+"get more users, testers, and developers on it."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:205
 msgid ""
-"* `Vuze`__ continues to make good progress on their I2P integration. We "
-"look forward to working with them in the new year on a managed rollout to"
-" more users."
+"* `Vuze`__ continues to make good progress on their I2P integration. We look"
+" forward to working with them in the new year on a managed rollout to more "
+"users."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:211
 msgid ""
 "* We discussed the state of Meeh's and Sindu's reseed servers. They made "
-"several improvements while at the congress and are investigating "
-"migration to `Matt Drollette's Go implementation`__. The security and "
-"reliability of our reseed servers is vital to new users and network "
-"operation. `User 'backup'`__ is doing a great job monitoring and managing"
-" the pool of reseed servers."
+"several improvements while at the congress and are investigating migration "
+"to `Matt Drollette's Go implementation`__. The security and reliability of "
+"our reseed servers is vital to new users and network operation. `User "
+"'backup'`__ is doing a great job monitoring and managing the pool of reseed "
+"servers."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:218
 msgid ""
-"* We agreed to purchase a second root server for development, testing, "
-"and services. Echelon will be adminstering it. Contact him if you would "
-"like a VM."
+"* We agreed to purchase a second root server for development, testing, and "
+"services. Echelon will be adminstering it. Contact him if you would like a "
+"VM."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:222
@@ -3737,26 +3423,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:226
 msgid ""
-"* We met with Welterde about the state of his services including his "
-"`open tracker`__. These services are not being adequately maintained and "
-"will soon become inaccessible due to crypto changes if they are not "
-"upgraded. He committed to upgrading them soon."
+"* We met with Welterde about the state of his services including his `open "
+"tracker`__. These services are not being adequately maintained and will soon"
+" become inaccessible due to crypto changes if they are not upgraded. He "
+"committed to upgrading them soon."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:232
 msgid ""
-"* We met lots of people interested in our `Android app`__. We passed "
-"several ideas and bug reports back to str4d. We plan to make a big push "
-"to give the app some development love early in the year."
+"* We met lots of people interested in our `Android app`__. We passed several"
+" ideas and bug reports back to str4d. We plan to make a big push to give the"
+" app some development love early in the year."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:238
 msgid ""
-"* Regrettably, we didn't get to see too many talks at the Congress, as we"
-" were so busy meeting with people. We plan to catch up and `watch them "
-"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and"
-" Jacob's talk was great. We hear that the cryptography talks were good as"
-" well."
+"* Regrettably, we didn't get to see too many talks at the Congress, as we "
+"were so busy meeting with people. We plan to catch up and `watch them "
+"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and "
+"Jacob's talk was great. We hear that the cryptography talks were good as "
+"well."
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:1
@@ -3764,10 +3450,7 @@ msgid ""
 "==============\n"
 "0.9.18 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.18\n"
-"=============="
+msgstr "==============\nRelease 0.9.18\n=============="
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:11
 msgid "0.9.18 with performance improvements and bug fixes"
@@ -3776,13 +3459,11 @@ msgstr ""
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:13
 msgid ""
 "0.9.18 contains several bug fixes and performance improvements.\n"
-"We have shortened the startup time, and reduced latency throughout our "
-"network protocols.\n"
+"We have shortened the startup time, and reduced latency throughout our network protocols.\n"
 "We've increased the default connection limits for the fastest routers,\n"
 "and reduced the thread usage in i2ptunnel.\n"
 "UPnP fixes should improve handling of external device changes.\n"
-"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP "
-"fixes."
+"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP fixes."
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:33
@@ -3790,7 +3471,8 @@ msgid "Fix parsing of ECDSA address helper in HTTP client proxy"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:34
-msgid "Fix news last-modified processing which prevented notification of update"
+msgid ""
+"Fix news last-modified processing which prevented notification of update"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:35
@@ -3827,8 +3509,7 @@ msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:46
 msgid ""
-"Add startup browser configuration with advanced config "
-"routerconsole.browser"
+"Add startup browser configuration with advanced config routerconsole.browser"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:47
@@ -3880,10 +3561,7 @@ msgid ""
 "==============\n"
 "0.9.19 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Reelase 0.9.19\n"
-"=============="
+msgstr "==============\nReelase 0.9.19\n=============="
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:11
 msgid "0.9.19 with performance improvements and bug fixes"
@@ -3893,21 +3571,16 @@ msgstr ""
 msgid ""
 "0.9.19 has several fixes and improvements for floodfill performance.\n"
 "Many of you saw high CPU usage after 0.9.18 was released.\n"
-"This was caused by a combination of increased encryption usage, the big "
-"influx of Vuze users into the network,\n"
-"reduced floodfills due to tighter performance requirements, and some "
-"longstanding bugs.\n"
+"This was caused by a combination of increased encryption usage, the big influx of Vuze users into the network,\n"
+"reduced floodfills due to tighter performance requirements, and some longstanding bugs.\n"
 "Things should be a lot better after most of the network has updated.\n"
-"As always, the best way to reduce CPU usage is to lower your bandwidth "
-"limits."
+"As always, the best way to reduce CPU usage is to lower your bandwidth limits."
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:21
 msgid ""
-"We've also added new ways to reseed manually, and to generate a reseed "
-"file you can easily share with others who need it.\n"
-"See the reseed configuration page in the router console for more "
-"information."
+"We've also added new ways to reseed manually, and to generate a reseed file you can easily share with others who need it.\n"
+"See the reseed configuration page in the router console for more information."
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:35
@@ -3973,7 +3646,8 @@ msgid "Increase min and default bandwidth for i2psnark"
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:58
-msgid "Improved strategies for dropping jobs on high job lag to prevent overload"
+msgid ""
+"Improved strategies for dropping jobs on high job lag to prevent overload"
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:59
@@ -4005,10 +3679,7 @@ msgid ""
 "==============\n"
 "0.9.20 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.20\n"
-"=============="
+msgstr "==============\nRelease 0.9.20\n=============="
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:11
 msgid "0.9.20 with performance improvements and bug fixes"
@@ -4016,35 +3687,28 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:13
 msgid ""
-"0.9.20 contains many important bug fixes, and several changes to increase"
-" floodfill capacity in the network."
+"0.9.20 contains many important bug fixes, and several changes to increase "
+"floodfill capacity in the network."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:17
 msgid ""
-"Routers configured for 32-64 KB of shared bandwidth may now become "
-"floodfill,\n"
-"and routers configured for 512 KB or more of shared bandwidth will have "
-"higher connection limits.\n"
+"Routers configured for 32-64 KB of shared bandwidth may now become floodfill,\n"
+"and routers configured for 512 KB or more of shared bandwidth will have higher connection limits.\n"
 "These changes may cause your router to use more resources.\n"
-"If the router becomes too busy, the best way to reduce usage is to lower "
-"the bandwidth settings in your console.\n"
-"If that doesn't help, you may now disable automatic floodfill on the "
-"advanced configuration page in the console."
+"If the router becomes too busy, the best way to reduce usage is to lower the bandwidth settings in your console.\n"
+"If that doesn't help, you may now disable automatic floodfill on the advanced configuration page in the console."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:25
 msgid ""
-"We're hopeful that these changes will increase network capacity and "
-"performance,\n"
-"and reduce the congestion that's been affecting the network the last "
-"three months."
+"We're hopeful that these changes will increase network capacity and performance,\n"
+"and reduce the congestion that's been affecting the network the last three months."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:35
 msgid ""
-"Finally, we're excited to announce our first-ever I2P meetup, in Toronto "
-"August 15-16.\n"
+"Finally, we're excited to announce our first-ever I2P meetup, in Toronto August 15-16.\n"
 "There will be lots of presentations and tutorials. All are welcome.\n"
 "For more information, see the `announcement`_."
 msgstr ""
@@ -4063,8 +3727,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:53
 msgid ""
-"Raise connection limits for new classes 'P' (512-2000 KBps share "
-"bandwidth) and 'X' (over 2000 KBps)"
+"Raise connection limits for new classes 'P' (512-2000 KBps share bandwidth) "
+"and 'X' (over 2000 KBps)"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:54
@@ -4076,7 +3740,8 @@ msgid "Clock skew fixes"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:62
-msgid "Fixes and configuration for when IPv4 is firewalled but IPv6 still works"
+msgid ""
+"Fixes and configuration for when IPv4 is firewalled but IPv6 still works"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:63
@@ -4149,8 +3814,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:86
 msgid ""
-"Add Bloom filter warning when configured for high bandwidth but not "
-"enough memory"
+"Add Bloom filter warning when configured for high bandwidth but not enough "
+"memory"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:87
@@ -4163,8 +3828,7 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:89
 msgid ""
-"Better error handling and user feedback when HTTP client tunnel is "
-"disabled"
+"Better error handling and user feedback when HTTP client tunnel is disabled"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:90
@@ -4197,19 +3861,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:13
 msgid ""
-"The I2P team is proud to announce that we are going to host a meetup in "
-"Toronto on August 15-16.\n"
-"A number of members of our community will be attending and are going to "
-"host talks, workshops and discussions about and relating to I2P. This "
-"event is not just for I2P people though, it's meant for everyone."
+"The I2P team is proud to announce that we are going to host a meetup in Toronto on August 15-16.\n"
+"A number of members of our community will be attending and are going to host talks, workshops and discussions about and relating to I2P. This event is not just for I2P people though, it's meant for everyone."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:18
 msgid ""
-"If you're curious about I2P, interested in privacy/cryptography/anonymity"
-" or just want to come by and talk to us, please do. This is an event for "
-"everyone. If you're not familiar with any of these topics, come by anyway"
-" and we'll show you how I2P works and what you can do with it.\n"
+"If you're curious about I2P, interested in privacy/cryptography/anonymity or just want to come by and talk to us, please do. This is an event for everyone. If you're not familiar with any of these topics, come by anyway and we'll show you how I2P works and what you can do with it.\n"
 "\n"
 "The event is entirely free, you don't need to sign up or register."
 msgstr ""
@@ -4217,9 +3875,9 @@ msgstr ""
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:24
 msgid ""
 "The meetup couldn't have been arranged without our friends at `Toronto "
-"Crypto <https://torontocrypto.org/>`_ which have been helping us organize"
-" the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are"
-" providing us with a very nice space."
+"Crypto <https://torontocrypto.org/>`_ which have been helping us organize "
+"the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are "
+"providing us with a very nice space."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:28
@@ -4247,9 +3905,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:55
 msgid ""
-"The focus will be on an introduction to topics surrounding I2P, privacy "
-"and anonymity online. People of all backgrounds and knowledge levels are "
-"welcome to attend."
+"The focus will be on an introduction to topics surrounding I2P, privacy and "
+"anonymity online. People of all backgrounds and knowledge levels are welcome"
+" to attend."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:59
@@ -4266,9 +3924,9 @@ msgstr "Crypto party"
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:63
 msgid ""
-"The crypto party will contain a number of stations where "
-"privacy/anonymity software will be demoed. The goal is to provide people "
-"with the tools they need to communicate securely."
+"The crypto party will contain a number of stations where privacy/anonymity "
+"software will be demoed. The goal is to provide people with the tools they "
+"need to communicate securely."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:67
@@ -4289,11 +3947,10 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:72
 msgid ""
-"We're currently looking for help staffing the stations. If you want to "
-"help out, you can! Bring a monitor/laptop and run a station. The station "
-"could be any of the ones listed above, or any other privacy/anonymity "
-"related one you would like to run. Please contact us at `@geti2p`_ if "
-"you're interested."
+"We're currently looking for help staffing the stations. If you want to help "
+"out, you can! Bring a monitor/laptop and run a station. The station could be"
+" any of the ones listed above, or any other privacy/anonymity related one "
+"you would like to run. Please contact us at `@geti2p`_ if you're interested."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:81
@@ -4303,8 +3960,8 @@ msgstr ""
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:86
 msgid ""
 "The focus will be on in-depth topics surrounding I2P, the roadmap and "
-"development. Anyone is welcome to attend, but the content will be "
-"somewhat technical."
+"development. Anyone is welcome to attend, but the content will be somewhat "
+"technical."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:90
@@ -4340,35 +3997,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:14
 msgid ""
-"I2PCon is the first event of its kind. It has two short term goals. Where"
-" the\n"
-"first one is to provide the general public with an event where knowledge "
-"about\n"
-"privacy and privacy concerns can be obtained. The second goal is to "
-"further the\n"
-"I2P project and its community. This will take the shape of technical "
-"discussions\n"
+"I2PCon is the first event of its kind. It has two short term goals. Where the\n"
+"first one is to provide the general public with an event where knowledge about\n"
+"privacy and privacy concerns can be obtained. The second goal is to further the\n"
+"I2P project and its community. This will take the shape of technical discussions\n"
 "about cryptography, anonymity and I2P centric topics."
 msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:22
 msgid ""
-"There is a larger and more long-term goal of this event, and it is to "
-"build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we would like to provide a forum where this "
-"community\n"
+"There is a larger and more long-term goal of this event, and it is to build a\n"
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we would like to provide a forum where this community\n"
 "can grow."
 msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:29
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
-"`Toronto Crypto`_. The venue and everything relating to it is provided by"
-"\n"
-"`Hacklab`_. Without either of them this event would not have been "
-"possible, so\n"
+"`Toronto Crypto`_. The venue and everything relating to it is provided by\n"
+"`Hacklab`_. Without either of them this event would not have been possible, so\n"
 "thank you both."
 msgstr ""
 
@@ -4378,12 +4026,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:49
 msgid ""
-"I2PCon is entirely free to attend! We ask you to register `here`__, to "
-"give us\n"
-"an estimate of how many people will be attending. No identifying "
-"information has\n"
-"to be given in order to register, but if you have any concerns, please "
-"let us\n"
+"I2PCon is entirely free to attend! We ask you to register `here`__, to give us\n"
+"an estimate of how many people will be attending. No identifying information has\n"
+"to be given in order to register, but if you have any concerns, please let us\n"
 "know."
 msgstr ""
 
@@ -4420,10 +4065,7 @@ msgid ""
 "==============\n"
 "0.9.21 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.21\n"
-"=============="
+msgstr "==============\nRelease 0.9.21\n=============="
 
 #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:11
 msgid "0.9.21 with performance improvements and bug fixes"
@@ -4431,19 +4073,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:13
 msgid ""
-"0.9.21 contains several changes to add capacity to the network, increase "
-"the efficiency of the floodfills,\n"
+"0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\n"
 "and use bandwidth more effectively.\n"
-"We have migrated the shared clients tunnels to ECDSA signatures and added"
-" a DSA fallback\n"
-"using the new \"multisession\" capability for those sites that don't "
-"support ECDSA."
+"We have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\n"
+"using the new \"multisession\" capability for those sites that don't support ECDSA."
 msgstr ""
 
 #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:20
 msgid ""
-"The speakers and the schedule of the I2PCon in Toronto 2015 have been "
-"announced.\n"
+"The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.\n"
 "Have a look on the `I2PCon page`_ for details.\n"
 "Reserve your seat on `Eventbrite`_."
 msgstr ""
@@ -4547,10 +4185,7 @@ msgid ""
 "============================\n"
 "I2PCon: Mission Accomplished\n"
 "============================"
-msgstr ""
-"============================\n"
-"I2PCon: Missione completata\n"
-"============================"
+msgstr "============================\nI2PCon: Missione completata\n============================"
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:11
 msgid "I2PCon: Mission Accomplished"
@@ -4558,21 +4193,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:14
 msgid ""
-"I2PCon has been a giant success. For us, the I2P contributors, it "
-"represents a\n"
-"leap forward in terms of what we're capable of pulling off as a "
-"community, how we\n"
-"communicate the usecases of I2P and reach out to privacy conscious "
-"individuals.\n"
+"I2PCon has been a giant success. For us, the I2P contributors, it represents a\n"
+"leap forward in terms of what we're capable of pulling off as a community, how we\n"
+"communicate the usecases of I2P and reach out to privacy conscious individuals.\n"
 "\n"
-"By arranging this event, we've also grown our community. People who've "
-"previously\n"
-"only lurked on our irc channels, or run our software or possibly hadn't "
-"even heard\n"
+"By arranging this event, we've also grown our community. People who've previously\n"
+"only lurked on our irc channels, or run our software or possibly hadn't even heard\n"
 "of I2P are now a part of our comminuty.\n"
 "\n"
-"This event has been our first active step towards building a large and "
-"inclusive\n"
+"This event has been our first active step towards building a large and inclusive\n"
 "community, and as such it's been great success."
 msgstr ""
 
@@ -4580,20 +4209,16 @@ msgstr ""
 msgid ""
 "Minutiae\n"
 "========\n"
-"On day 2 we had two short discussion sessions. A more general discussion "
-"and a roadmapping discussion.\n"
+"On day 2 we had two short discussion sessions. A more general discussion and a roadmapping discussion.\n"
 "\n"
-"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P "
-"Discussion session minutiae`_."
+"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P Discussion session minutiae`_."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:37
 msgid ""
 "Photos\n"
 "======"
-msgstr ""
-"Foto\n"
-"======"
+msgstr "Foto\n======"
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:45
 msgid "The learn how to setup I2P crypto party station"
@@ -4611,38 +4236,29 @@ msgstr ""
 msgid ""
 "Thanks\n"
 "======"
-msgstr ""
-"Ringraziamenti\n"
-"======"
+msgstr "Ringraziamenti\n======"
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:62
 msgid ""
-"We've had some wonderful speakers, from both inside- and outside of our "
-"community.\n"
+"We've had some wonderful speakers, from both inside- and outside of our community.\n"
 "\n"
-"`David Dagon`_ talked to us about the way forward and how I2P could "
-"handle potential abuse.\n"
+"`David Dagon`_ talked to us about the way forward and how I2P could handle potential abuse.\n"
 "\n"
-"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us"
-" his thoughts about how far I2P has come.\n"
+"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us his thoughts about how far I2P has come.\n"
 "\n"
-"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and "
-"why you should care."
+"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and why you should care."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:72
 msgid ""
-"I would also like to thank the speakers from our community. `psi`_, "
-"`@str4d`_ and `zzz`_  who all had\n"
-"wonderful talks. Improving our ability to inform people about I2P is "
-"something that\n"
+"I would also like to thank the speakers from our community. `psi`_, `@str4d`_ and `zzz`_  who all had\n"
+"wonderful talks. Improving our ability to inform people about I2P is something that\n"
 "is going to be important for us going forward."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:78
 msgid ""
-"I would like to thank `Sadie`_ and Siew for helping us out with marketing"
-" and graphics.\n"
+"I would like to thank `Sadie`_ and Siew for helping us out with marketing and graphics.\n"
 "Without you I2PCon would've been a very different event."
 msgstr ""
 
@@ -4654,43 +4270,39 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:87
 msgid ""
-"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto "
-"Crypto`_ for their help during the event."
+"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto Crypto`_ "
+"for their help during the event."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:91
 msgid ""
-"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV "
-"and doing all of the post-production\n"
+"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV and doing all of the post-production\n"
 "work for the videos of all the talks."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:96
 msgid ""
-"I would like to thank `@killyourtv_i2p`_ for hosting a very popular "
-"crypto party station."
+"I would like to thank `@killyourtv_i2p`_ for hosting a very popular crypto "
+"party station."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:100
 msgid ""
-"Thanks to our new favorite journalist `@robinlevinson`_, for showing an "
-"interest in our cause and\n"
+"Thanks to our new favorite journalist `@robinlevinson`_, for showing an interest in our cause and\n"
 "educating yourself about the technologies involved."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:105
 msgid ""
-"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very "
-"much made this event better."
+"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very much "
+"made this event better."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:109
 msgid ""
-"Finally I would like to thank everyone else who just showed up to the "
-"event and helped out in any way\n"
+"Finally I would like to thank everyone else who just showed up to the event and helped out in any way\n"
 "they could.\n"
-"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was "
-"most excellent to hang out\n"
+"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was most excellent to hang out\n"
 "with you."
 msgstr ""
 
@@ -4699,10 +4311,7 @@ msgid ""
 "==============\n"
 "0.9.22 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.22\n"
-"=============="
+msgstr "==============\nRelease 0.9.22\n=============="
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:11
 msgid "0.9.22 with bug fixes and start of Ed25519 migration"
@@ -4710,15 +4319,10 @@ msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:13
 msgid ""
-"0.9.22 contains fixes for i2psnark getting stuck before completion, and "
-"begins the migration of router infos to new, stronger Ed25519 signatures."
-"\n"
-"To reduce network churn, your router will have only a small probability "
-"of converting to Ed25519 at each restart.\n"
-"When it does rekey, expect to see lower bandwidth usage for a couple of "
-"days as it reintegrates into the network with its new identity.\n"
-"If all goes well, we will accelerate the rekeying process in the next "
-"release."
+"0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\n"
+"To reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\n"
+"When it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\n"
+"If all goes well, we will accelerate the rekeying process in the next release."
 msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:20
@@ -4737,14 +4341,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:46
 msgid ""
-"Fix i2psnark getting stuck before download complete, and not deleting "
-"temp files"
+"Fix i2psnark getting stuck before download complete, and not deleting temp "
+"files"
 msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:47
 msgid ""
-"Fix starting of torrents added by copying torrent file to i2psnark "
-"directory"
+"Fix starting of torrents added by copying torrent file to i2psnark directory"
 msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:48
@@ -4773,10 +4376,8 @@ msgstr ""
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:15
 msgid ""
 "Greetings!\n"
-"This is the first in a long series of blogs to help the community see "
-"what is happening in the I2P community.\n"
-"Since many awesome events are happening *inside* the network, we think it"
-" will be worthwhile to talk about some of activities here."
+"This is the first in a long series of blogs to help the community see what is happening in the I2P community.\n"
+"Since many awesome events are happening *inside* the network, we think it will be worthwhile to talk about some of activities here."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:21
@@ -4787,16 +4388,14 @@ msgstr ""
 msgid ""
 "Let's face it -- our console needs improvement.\n"
 "Our site could use an update as well.\n"
-"We are looking for feedback on how to improve the usability of I2P for "
-"new and existing users!"
+"We are looking for feedback on how to improve the usability of I2P for new and existing users!"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:29
 msgid ""
 "Any and all feedback is welcome.\n"
 "Please contact `@GetI2P`_, `@str4d`_, or `@YrB1rd`_.\n"
-"If you don't feel comfortable using Twitter, we are always available via "
-"the in-network IRC channel.\n"
+"If you don't feel comfortable using Twitter, we are always available via the in-network IRC channel.\n"
 "You don't have to be a long time user.\n"
 "We want to hear from all sorts of people!"
 msgstr ""
@@ -4808,36 +4407,27 @@ msgstr ""
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:43
 msgid ""
 "On 03 November there was an I2P developer meeting (`log`_).\n"
-"This meeting focused on adding new links to the router console, "
-"preparation for CCC, finding a replacement for forum.i2p, and website "
-"improvements."
+"This meeting focused on adding new links to the router console, preparation for CCC, finding a replacement for forum.i2p, and website improvements."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:50
 msgid ""
 "The consensus was to not add dogecoindark.i2p.\n"
-"There are concerns about usability due to many images being included on "
-"the page.\n"
-"Exchanged.i2p is conditionally added, as long as the maintainer adds a "
-"disclaimer on the site.\n"
-"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was "
-"lenta.i2p (a russian news site)."
+"There are concerns about usability due to many images being included on the page.\n"
+"Exchanged.i2p is conditionally added, as long as the maintainer adds a disclaimer on the site.\n"
+"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was lenta.i2p (a russian news site)."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:57
 msgid ""
-"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used"
-" for developer's services.\n"
-"He also suggested a more formalized technical proposal system, with more "
-"prominence on the main website."
+"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used for developer's services.\n"
+"He also suggested a more formalized technical proposal system, with more prominence on the main website."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:62
 msgid ""
-"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos "
-"Computer Congress.\n"
-"More details are to come on this, but we can promise there will be "
-"stickers."
+"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos Computer Congress.\n"
+"More details are to come on this, but we can promise there will be stickers."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:67
@@ -4845,13 +4435,14 @@ msgid "General Announcements"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:69
-msgid "Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!"
+msgid ""
+"Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:75
 msgid ""
-"Translation deadline Thursday, 12 November, translators please update. "
-"All translations are done via `Transifex`_ ."
+"Translation deadline Thursday, 12 November, translators please update. All "
+"translations are done via `Transifex`_ ."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:1
@@ -4859,25 +4450,18 @@ msgid ""
 "==============\n"
 "0.9.23 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-" Release 0.9.23\n"
-"=============="
+msgstr "==============\n Release 0.9.23\n=============="
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:11
 msgid ""
 "0.9.23 contains a variety of bug fixes, and some minor improvements in "
 "I2PSnark"
-msgstr ""
-"La versione 0.9.23 risolve diversi bug; inoltre apporta alcuni piccoli "
-"miglioramenti ad I2PSnark"
+msgstr "La versione 0.9.23 risolve diversi bug; inoltre apporta alcuni piccoli miglioramenti ad I2PSnark"
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:13
 msgid ""
-"Hello I2P! This is the first release signed by me (str4d), after 49 "
-"releases\n"
-"signed by zzz. This is an important test of our redundancy for all "
-"things,\n"
+"Hello I2P! This is the first release signed by me (str4d), after 49 releases\n"
+"signed by zzz. This is an important test of our redundancy for all things,\n"
 "including people."
 msgstr ""
 
@@ -4887,25 +4471,18 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:24
 msgid ""
-"My signing key has been in router updates for over two years (since "
-"0.9.9), so\n"
-"if you are on a recent version of I2P this update should be just as easy "
-"as\n"
-"every other update. However, if you are running an older version than "
-"0.9.9, you\n"
-"will first need to manually update to a recent version. Update files for "
-"recent\n"
-"versions `can be downloaded here`__, and instructions on how to manually "
-"update\n"
-"`are provided here`__. Once you have manually updated, your router will "
-"then find\n"
+"My signing key has been in router updates for over two years (since 0.9.9), so\n"
+"if you are on a recent version of I2P this update should be just as easy as\n"
+"every other update. However, if you are running an older version than 0.9.9, you\n"
+"will first need to manually update to a recent version. Update files for recent\n"
+"versions `can be downloaded here`__, and instructions on how to manually update\n"
+"`are provided here`__. Once you have manually updated, your router will then find\n"
 "and download the 0.9.23 update as usual."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:38
 msgid ""
-"If you installed I2P via a package manager, you are not affected by the "
-"change,\n"
+"If you installed I2P via a package manager, you are not affected by the change,\n"
 "and can update as usual."
 msgstr ""
 
@@ -4913,38 +4490,28 @@ msgstr ""
 msgid ""
 "Update details\n"
 "=============="
-msgstr ""
-"Dettagli dell'aggiornamento\n"
-"=============="
+msgstr "Dettagli dell'aggiornamento\n=============="
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:48
 msgid ""
-"The migration of RouterInfos to new, stronger Ed25519 signatures is going"
-" well,\n"
-"with at least half of the network already estimated to have rekeyed. This"
-"\n"
-"release accelerates the rekeying process. To reduce network churn, your "
-"router\n"
-"will have a small probability of converting to Ed25519 at each restart. "
-"When it\n"
-"does rekey, expect to see lower bandwidth usage for a couple of days as "
-"it\n"
+"The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\n"
+"with at least half of the network already estimated to have rekeyed. This\n"
+"release accelerates the rekeying process. To reduce network churn, your router\n"
+"will have a small probability of converting to Ed25519 at each restart. When it\n"
+"does rekey, expect to see lower bandwidth usage for a couple of days as it\n"
 "reintegrates into the network with its new identity."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:57
 msgid ""
-"Note that this will be the last release to support Java 6. Please update "
-"to\n"
-"Java 7 or 8 as soon as possible. We are already working to make I2P "
-"compatible\n"
+"Note that this will be the last release to support Java 6. Please update to\n"
+"Java 7 or 8 as soon as possible. We are already working to make I2P compatible\n"
 "with the upcoming Java 9, and some of that work is in this release."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:63
 msgid ""
-"We have also made some minor improvements in I2PSnark, and added a new "
-"page in\n"
+"We have also made some minor improvements in I2PSnark, and added a new page in\n"
 "the routerconsole for viewing older news items."
 msgstr ""
 
@@ -4954,14 +4521,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:83
 msgid ""
-"Fix some bugs soft restarting after a large clock shift (e.g. resume) "
-"(but more to do)"
+"Fix some bugs soft restarting after a large clock shift (e.g. resume) (but "
+"more to do)"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:84
 msgid ""
-"Fix streaming retransmission timers that were dying, and related timer "
-"bugs"
+"Fix streaming retransmission timers that were dying, and related timer bugs"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:85
@@ -5005,7 +4571,8 @@ msgid "Detect for broken ECDSA support in Gentoo"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:98
-msgid "Console: Add a Java 6 warning, this is the last release to support Java 6"
+msgid ""
+"Console: Add a Java 6 warning, this is the last release to support Java 6"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:99
@@ -5014,8 +4581,8 @@ msgstr "Cambiamenti per preparare compatibilità con Java 9"
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:100
 msgid ""
-"Pass Accept-Encoding header through client and server proxies, to allow "
-"end-to-end compression"
+"Pass Accept-Encoding header through client and server proxies, to allow end-"
+"to-end compression"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:103
@@ -5031,7 +4598,8 @@ msgid "Save magnet parameters across restart"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:106
-msgid "Don't delete .torrent file on errors at startup, rename to .torrent.BAD"
+msgid ""
+"Don't delete .torrent file on errors at startup, rename to .torrent.BAD"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:107
@@ -5063,8 +4631,7 @@ msgstr "CCC!"
 
 #: i2p2www/blog/2016/01/23/32C3.rst:13
 msgid ""
-"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and "
-"eche|on."
+"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and eche|on."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:17
@@ -5072,21 +4639,15 @@ msgid ""
 "Start\n"
 "=====\n"
 "The project has had another successful year at CCC.\n"
-"We would like to thank the volunteers at `32C3`__ for all of their help "
-"in organizing this event and for being accommodating hosts for us.\n"
-"Many I2P contributors were able to attend this year's Congress due to "
-"many of the generous donations from supporters like you to the project.\n"
-"If you would like to fund I2P, please see `our donation page`__ for more "
-"information."
+"We would like to thank the volunteers at `32C3`__ for all of their help in organizing this event and for being accommodating hosts for us.\n"
+"Many I2P contributors were able to attend this year's Congress due to many of the generous donations from supporters like you to the project.\n"
+"If you would like to fund I2P, please see `our donation page`__ for more information."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:29
 msgid ""
-"Just like previous years we were located in Noisy Square, located near "
-"the EFF's table.\n"
-"This proved to be an ideal spot for us as our table was almost always "
-"busy with current and new users who were interested in I2P, many of whom "
-"we wouldn't have otherwise had the ability to talk to."
+"Just like previous years we were located in Noisy Square, located near the EFF's table.\n"
+"This proved to be an ideal spot for us as our table was almost always busy with current and new users who were interested in I2P, many of whom we wouldn't have otherwise had the ability to talk to."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:63
@@ -5101,13 +4662,10 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:72
 msgid ""
-"If you don't know what a reseed server is, it is first the connection new"
-" routers use to find peers.\n"
-"There was a lot of discussion around the current status of the reseed "
-"network right now.\n"
+"If you don't know what a reseed server is, it is first the connection new routers use to find peers.\n"
+"There was a lot of discussion around the current status of the reseed network right now.\n"
 "As always, more reseed operators are needed!\n"
-"If you would like to strengthen the reseed infrastructure, (or if you're "
-"talented with Go) email `backup -at- i2pmail.org`__."
+"If you would like to strengthen the reseed infrastructure, (or if you're talented with Go) email `backup -at- i2pmail.org`__."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:81
@@ -5118,16 +4676,11 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:86
 msgid ""
-"Due to the decentralized nature of I2P detecting Sybil attacks is not as "
-"straight forward as on other networks (i.e. Tor).\n"
-"To mitigate this zzz has been working on a new router-based Sybil "
-"detection tool.\n"
-"To be brief, the tool runs in the router, and collects information on "
-"floodfills your router is currently aware of.\n"
-"Currently the tool is mainly collecting a baseline and does not act on "
-"any of the information it is collecting.\n"
-"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as "
-"it is still in active development"
+"Due to the decentralized nature of I2P detecting Sybil attacks is not as straight forward as on other networks (i.e. Tor).\n"
+"To mitigate this zzz has been working on a new router-based Sybil detection tool.\n"
+"To be brief, the tool runs in the router, and collects information on floodfills your router is currently aware of.\n"
+"Currently the tool is mainly collecting a baseline and does not act on any of the information it is collecting.\n"
+"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as it is still in active development"
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:94
@@ -5139,21 +4692,15 @@ msgstr ""
 #: i2p2www/blog/2016/01/23/32C3.rst:99
 msgid ""
 "On the 30th we held an in person `meeting`__ at our table.\n"
-"The meeting focused on organizationally preparing for more project "
-"management, and public relations (both from Sadie)."
+"The meeting focused on organizationally preparing for more project management, and public relations (both from Sadie)."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:106
 msgid ""
-"We discussed how much of the work done on I2P is lost in the commits and "
-"there is not much to see for our users.\n"
-"To remedy this lazygravy plans on preparing a series of posts explaining "
-"some technical topics in I2P.\n"
-"The initial ideas that we discussed writing posts on are what encrypted "
-"lease sets are, why different tunnel types are needed, and some "
-"observations seen in `I2Spy`__.\n"
-"But these are just the start and we would like to hear feedback on topics"
-" we should write about!"
+"We discussed how much of the work done on I2P is lost in the commits and there is not much to see for our users.\n"
+"To remedy this lazygravy plans on preparing a series of posts explaining some technical topics in I2P.\n"
+"The initial ideas that we discussed writing posts on are what encrypted lease sets are, why different tunnel types are needed, and some observations seen in `I2Spy`__.\n"
+"But these are just the start and we would like to hear feedback on topics we should write about!"
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:115
@@ -5187,10 +4734,7 @@ msgid ""
 "==============\n"
 "0.9.24 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.24\n"
-"=============="
+msgstr "==============\nRelease 0.9.24\n=============="
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:11
 msgid "0.9.24 contains a variety of bug fixes and performance enhancements"
@@ -5223,13 +4767,14 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:11
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:11
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:11
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:11
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:11
 msgid "Update details"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:18
 msgid ""
-"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and "
-"efficiency improvements.\n"
+"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and efficiency improvements.\n"
 "Note that this release is the first to require Java 7.\n"
 "Please update to Java 7 or 8 as soon as possible.\n"
 "Your router will not automatically update if you are using Java 6."
@@ -5237,23 +4782,17 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:25
 msgid ""
-"To prevent the problems caused by the ancient commons-logging library, we"
-" have removed it.\n"
-"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by "
-"HungryHobo) to crash if they have IMAP enabled.\n"
-"The recommended fix is to replace your old I2P-Bote plugin with the "
-"current one signed by str4d.\n"
+"To prevent the problems caused by the ancient commons-logging library, we have removed it.\n"
+"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by HungryHobo) to crash if they have IMAP enabled.\n"
+"The recommended fix is to replace your old I2P-Bote plugin with the current one signed by str4d.\n"
 "For more details, see `this post`__."
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:34
 msgid ""
-"We had a great `32C3 Congress`__ and are making good progress on our 2016"
-" project plans.\n"
-"Echelon gave a talk on I2P's history and current status, and his slides "
-"are `available here`__ (pdf).\n"
-"Str4d attended `Real World Crypto`__ and gave a talk on our crypto "
-"migration, his slides are `here`__ (pdf)."
+"We had a great `32C3 Congress`__ and are making good progress on our 2016 project plans.\n"
+"Echelon gave a talk on I2P's history and current status, and his slides are `available here`__ (pdf).\n"
+"Str4d attended `Real World Crypto`__ and gave a talk on our crypto migration, his slides are `here`__ (pdf)."
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:58
@@ -5262,8 +4801,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:59
 msgid ""
-"SAM 3.2, with several new advanced features, command parser improvements,"
-" and lots of bug fixes"
+"SAM 3.2, with several new advanced features, command parser improvements, "
+"and lots of bug fixes"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:60
@@ -5288,8 +4827,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:69
 msgid ""
-"Don't remove tunnel on next-hop failure indication from transport, it "
-"isn't reliable"
+"Don't remove tunnel on next-hop failure indication from transport, it isn't "
+"reliable"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:70
@@ -5297,13 +4836,13 @@ msgid "Fix formatting in summary bar to prevent overflow"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:71
-msgid "Fix console links in i2ptunnel error pages when on nonstandard host/port"
+msgid ""
+"Fix console links in i2ptunnel error pages when on nonstandard host/port"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:72
 msgid ""
-"Don't query floodfills whose version is too old to support encrypted "
-"replies"
+"Don't query floodfills whose version is too old to support encrypted replies"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:73
@@ -5350,8 +4889,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:87
 msgid ""
-"Don't offer to introduce unless requested, to introduce only those that "
-"need it"
+"Don't offer to introduce unless requested, to introduce only those that need"
+" it"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:88
@@ -5416,6 +4955,8 @@ msgstr "Nuova traduzione in cinese (Taiwan)"
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:71
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:88
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:92
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:89
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:61
 msgid "Full list of fixed bugs"
 msgstr ""
 
@@ -5424,21 +4965,15 @@ msgid ""
 "==============\n"
 "0.9.25 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.25\n"
-"=============="
+msgstr "==============\nRelease 0.9.25\n=============="
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:11
 msgid "0.9.25 contains SAM 3.3, QR codes, and bug fixes"
-msgstr ""
-"0.9.25 contiene SAM 3.3, supporto per i codici QR e diverse correzioni di"
-" bug"
+msgstr "0.9.25 contiene SAM 3.3, supporto per i codici QR e diverse correzioni di bug"
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:18
 msgid ""
-"0.9.25 contains a major new version of SAM, v3.3, to support "
-"sophisticated multiprotocol applications.\n"
+"0.9.25 contains a major new version of SAM, v3.3, to support sophisticated multiprotocol applications.\n"
 "It adds QR codes for sharing hidden service addresses with others,\n"
 "and \"identicon\" images for visually distinguishing addresses."
 msgstr ""
@@ -5446,10 +4981,8 @@ msgstr ""
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:24
 msgid ""
 "We've added a new \"router family\" configuration page in the console,\n"
-"to make it easier to declare that your group of routers is run by a "
-"single person.\n"
-"There are several changes to increase the capacity of the network and "
-"hopefully improve tunnel build success."
+"to make it easier to declare that your group of routers is run by a single person.\n"
+"There are several changes to increase the capacity of the network and hopefully improve tunnel build success."
 msgstr ""
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:40
@@ -5542,34 +5075,26 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:11
 msgid ""
 "We are pleased to announce that this summer, I2P will be embarking on a "
-"development program aimed at improving the privacy software ecosystem for"
-" both developers and users."
+"development program aimed at improving the privacy software ecosystem for "
+"both developers and users."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:13
 msgid ""
-"Over the last few years, the need for users to be in control of their own"
-" data\n"
-"has become increasingly apparent. Some excellent progress had been made "
-"in this\n"
-"regard with the rise of messaging apps like Signal_, and file storage "
-"systems\n"
-"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to "
-"the\n"
+"Over the last few years, the need for users to be in control of their own data\n"
+"has become increasingly apparent. Some excellent progress had been made in this\n"
+"regard with the rise of messaging apps like Signal_, and file storage systems\n"
+"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to the\n"
 "whole world is steadily gaining traction."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:21
 msgid ""
-"But building privacy and anonymity into applications is not trivial. Much"
-" of the\n"
-"software people use every day was not designed to be privacy-preserving, "
-"and the\n"
+"But building privacy and anonymity into applications is not trivial. Much of the\n"
+"software people use every day was not designed to be privacy-preserving, and the\n"
 "tools developers have available are generally not easy to work with. The\n"
-"recently-published OnionScan_ survey gives some insight into just how "
-"easy it is\n"
-"for even technical users to mis-configure their services, completely "
-"undermining\n"
+"recently-published OnionScan_ survey gives some insight into just how easy it is\n"
+"for even technical users to mis-configure their services, completely undermining\n"
 "their intentions."
 msgstr ""
 
@@ -5582,16 +5107,14 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:41
 msgid ""
 "We are pleased to announce that this summer, I2P will be embarking on a\n"
-"development program aimed at improving the privacy software ecosystem. "
-"Our goal\n"
-"is to make life easier both for developers wanting to leverage I2P in "
-"their\n"
-"applications, and for users trying to configure and run their apps "
-"through I2P."
+"development program aimed at improving the privacy software ecosystem. Our goal\n"
+"is to make life easier both for developers wanting to leverage I2P in their\n"
+"applications, and for users trying to configure and run their apps through I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:48
-msgid "We will be focusing our time this summer into three complementary areas:"
+msgid ""
+"We will be focusing our time this summer into three complementary areas:"
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:52
@@ -5602,19 +5125,15 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:57
 msgid ""
-"In June, we will be updating the various libraries that exist for "
-"interfacing\n"
-"with I2P. We have made significant progress this year on extending our "
-"SAM_ API\n"
-"with additional features, such as support for datagrams and ports. We "
-"plan to\n"
+"In June, we will be updating the various libraries that exist for interfacing\n"
+"with I2P. We have made significant progress this year on extending our SAM_ API\n"
+"with additional features, such as support for datagrams and ports. We plan to\n"
 "make these features easily accessible in our C++ and Python libraries."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:64
 msgid ""
-"We will also soon be making it much easier for Java and Android "
-"developers to\n"
+"We will also soon be making it much easier for Java and Android developers to\n"
 "add I2P support to their applications. Stay tuned!"
 msgstr ""
 
@@ -5626,18 +5145,12 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:76
 msgid ""
-"In July we will be working with applications that have expressed interest"
-" in\n"
-"adding support for I2P. There are some really neat ideas being developed "
-"in the\n"
-"privacy space right now, and we want to help their communities leverage "
-"over a\n"
-"decade of research and development on peer-to-peer anonymity. Extending "
-"these\n"
-"applications to work natively over I2P is a good step forward for "
-"usability, and\n"
-"in the process will improve how these applications think about and handle"
-" user\n"
+"In July we will be working with applications that have expressed interest in\n"
+"adding support for I2P. There are some really neat ideas being developed in the\n"
+"privacy space right now, and we want to help their communities leverage over a\n"
+"decade of research and development on peer-to-peer anonymity. Extending these\n"
+"applications to work natively over I2P is a good step forward for usability, and\n"
+"in the process will improve how these applications think about and handle user\n"
 "information."
 msgstr ""
 
@@ -5649,12 +5162,9 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:91
 msgid ""
-"Finally, in August we will turn out attention to the apps we bundle "
-"inside I2P,\n"
-"and the wider array of plugins. Some of these are due for some love, to "
-"make\n"
-"them more user-friendly - as well as fix any outstanding bugs! We hope "
-"that\n"
+"Finally, in August we will turn out attention to the apps we bundle inside I2P,\n"
+"and the wider array of plugins. Some of these are due for some love, to make\n"
+"them more user-friendly - as well as fix any outstanding bugs! We hope that\n"
 "longtime I2P supporters will enjoy the outcome of this work."
 msgstr ""
 
@@ -5669,14 +5179,10 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:104
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:131
 msgid ""
-"We have many more ideas for things we'd like to get done in these areas. "
-"If\n"
-"you're interested in hacking on privacy and anonymity software, designing"
-" usable\n"
-"websites or interfaces, or writing guides for users: come and chat with "
-"us on\n"
-"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our "
-"community, both\n"
+"We have many more ideas for things we'd like to get done in these areas. If\n"
+"you're interested in hacking on privacy and anonymity software, designing usable\n"
+"websites or interfaces, or writing guides for users: come and chat with us on\n"
+"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our community, both\n"
 "inside and outside I2P. We'll be sending I2P stickers out to all new\n"
 "contributors taking part (or possibly other pending I2P goodies)!"
 msgstr ""
@@ -5684,24 +5190,18 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:113
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:140
 msgid ""
-"Likewise, if you are an application developer who wants a hand with "
-"integrating\n"
-"I2P, or even just to chat about the concepts or details: get in touch! If"
-" you\n"
-"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ "
-"or\n"
-"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or "
-"FreeNode."
+"Likewise, if you are an application developer who wants a hand with integrating\n"
+"I2P, or even just to chat about the concepts or details: get in touch! If you\n"
+"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ or\n"
+"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or FreeNode."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:120
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:147
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:131
 msgid ""
-"We'll be posting here as we go, but you can also follow our progress, and"
-" share\n"
-"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring"
-" on the\n"
+"We'll be posting here as we go, but you can also follow our progress, and share\n"
+"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring on the\n"
 "summer!"
 msgstr ""
 
@@ -5710,15 +5210,11 @@ msgid ""
 "==============\n"
 "0.9.26 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.26\n"
-"=============="
+msgstr "==============\nRelease 0.9.26\n=============="
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:11
 msgid ""
-"0.9.26 contains crypto updates, Debian packaging improvements, and bug "
-"fixes"
+"0.9.26 contains crypto updates, Debian packaging improvements, and bug fixes"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:13
@@ -5736,20 +5232,16 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:31
 msgid ""
-"For crypto, we have upgraded to GMP 6.0.0, and added support for newer "
-"processors,\n"
+"For crypto, we have upgraded to GMP 6.0.0, and added support for newer processors,\n"
 "which will speed up crypto operations considerably.\n"
-"Also, we are now using constant-time GMP functions to prevent side-"
-"channel attacks.\n"
-"For caution, the GMP changes are enabled for new installs and "
-"Debian/Ubuntu builds only;\n"
+"Also, we are now using constant-time GMP functions to prevent side-channel attacks.\n"
+"For caution, the GMP changes are enabled for new installs and Debian/Ubuntu builds only;\n"
 "we will include them for in-net updates in the 0.9.27 release."
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:39
 msgid ""
-"For Debian/Ubuntu builds, we have added dependencies on several packages,"
-"\n"
+"For Debian/Ubuntu builds, we have added dependencies on several packages,\n"
 "including Jetty 8 and geoip, and removed the equivalent bundled code."
 msgstr ""
 
@@ -5761,10 +5253,10 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:59
 msgid ""
-"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant "
-"speedups on newer architectures, and constant-time crypto operations  "
-"(new installs and Debian/Ubuntu builds only, will include in the updates "
-"in the next release, 0.9.27)"
+"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant speedups "
+"on newer architectures, and constant-time crypto operations  (new installs "
+"and Debian/Ubuntu builds only, will include in the updates in the next "
+"release, 0.9.27)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:60
@@ -5777,8 +5269,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:62
 msgid ""
-"Enhance hosts blockfile format to allow for multiple destinations per "
-"entry"
+"Enhance hosts blockfile format to allow for multiple destinations per entry"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:63
@@ -5787,8 +5278,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:64
 msgid ""
-"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu "
-"packages"
+"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu packages"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:65
@@ -5806,8 +5296,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:67
 msgid ""
-"Enhancements to the desktopgui system tray feature, to be enabled by "
-"default in next release"
+"Enhancements to the desktopgui system tray feature, to be enabled by default"
+" in next release"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:68
@@ -5822,8 +5312,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:75
 msgid ""
-"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual"
-" fix)"
+"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual "
+"fix)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:76
@@ -5832,8 +5322,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:77
 msgid ""
-"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 "
-"for manual fix)"
+"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 for "
+"manual fix)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:78
@@ -5854,8 +5344,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:87
 msgid ""
-"Rework resource bundle generation for 20x speedup in build time (requires"
-" gettext version 0.19)"
+"Rework resource bundle generation for 20x speedup in build time (requires "
+"gettext version 0.19)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:1
@@ -5871,10 +5361,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:13
 msgid ""
-"We're nearly half-way into the APIs month of Summer Dev, and making great"
-"\n"
-"progress on a number of fronts. I'm happy to announce that the first of "
-"these is\n"
+"We're nearly half-way into the APIs month of Summer Dev, and making great\n"
+"progress on a number of fronts. I'm happy to announce that the first of these is\n"
 "complete: the I2P client libraries are now available on Maven Central!"
 msgstr ""
 
@@ -5882,10 +5370,8 @@ msgstr ""
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:51
 msgid ""
 "This should make it much simpler for Java developers to use I2P in their\n"
-"applications. Instead of needing to obtain the libraries from a current "
-"install,\n"
-"they can simply add I2P to their dependencies. Upgrading to new versions "
-"will\n"
+"applications. Instead of needing to obtain the libraries from a current install,\n"
+"they can simply add I2P to their dependencies. Upgrading to new versions will\n"
 "similarly be much easier."
 msgstr ""
 
@@ -5893,9 +5379,7 @@ msgstr ""
 msgid ""
 "How to use them\n"
 "==============="
-msgstr ""
-"Come si usa\n"
-"==============="
+msgstr "Come si usa\n==============="
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:32
 msgid "There are two libraries that you need to know about:"
@@ -5911,25 +5395,21 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:39
 msgid ""
-"Add one or both of these to your project's dependencies, and you're good "
-"to go!"
+"Add one or both of these to your project's dependencies, and you're good to "
+"go!"
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:67
 msgid ""
-"For other build systems, see the Maven Central pages for the `core`__ and"
-"\n"
+"For other build systems, see the Maven Central pages for the `core`__ and\n"
 "`streaming`__ libraries."
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:72
 msgid ""
-"Android developers should use the `I2P Android client library`__, which "
-"contains\n"
-"the same libraries along with Android-specific helpers. I'll be updating "
-"it soon\n"
-"to depend on the new I2P libraries, so that cross-platform applications "
-"can work\n"
+"Android developers should use the `I2P Android client library`__, which contains\n"
+"the same libraries along with Android-specific helpers. I'll be updating it soon\n"
+"to depend on the new I2P libraries, so that cross-platform applications can work\n"
 "natively with either I2P Android or desktop I2P."
 msgstr ""
 
@@ -5941,10 +5421,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:89
 msgid ""
-"See our `application development`__ guide for help getting started with "
-"these\n"
-"libraries. You can also chat with us about them in #i2p-dev on IRC. And "
-"if you\n"
+"See our `application development`__ guide for help getting started with these\n"
+"libraries. You can also chat with us about them in #i2p-dev on IRC. And if you\n"
 "do start using them, let us know what you're working on with the hashtag\n"
 "`#I2PSummer`__ on Twitter!"
 msgstr ""
@@ -5958,26 +5436,22 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:11
 msgid ""
-"In the first month of Summer Dev, we have improved the usability of our "
-"APIs for Java, Android, and Python developers."
+"In the first month of Summer Dev, we have improved the usability of our APIs"
+" for Java, Android, and Python developers."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:13
 msgid ""
-"Summer Dev is in full swing: we've been busy greasing wheels, sanding "
-"edges, and\n"
-"tidying the place up. Now it's time for our first roundup, where we bring"
-" you up\n"
+"Summer Dev is in full swing: we've been busy greasing wheels, sanding edges, and\n"
+"tidying the place up. Now it's time for our first roundup, where we bring you up\n"
 "to speed on the progress we are making!"
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:19
 msgid ""
 "\n"
-"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us"
-" the\n"
-"fantastic logo you see above. It adds a cheerful personality to our "
-"development\n"
+"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us the\n"
+"fantastic logo you see above. It adds a cheerful personality to our development\n"
 "program (and is going to look great on t-shirts)."
 msgstr ""
 
@@ -5989,48 +5463,37 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:33
 msgid ""
-"Our goal for this month was to \"blend in\" - to make our APIs and "
-"libraries work\n"
-"within the existing infrastructure of various communities, so that "
-"application\n"
-"developers can work with I2P more efficiently, and users don't need to "
-"worry\n"
+"Our goal for this month was to \"blend in\" - to make our APIs and libraries work\n"
+"within the existing infrastructure of various communities, so that application\n"
+"developers can work with I2P more efficiently, and users don't need to worry\n"
 "about the details."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:43
 msgid ""
-"The I2P client libraries are now available on `Maven Central`__ ! See our"
-"\n"
+"The I2P client libraries are now available on `Maven Central`__ ! See our\n"
 "`previous blog post`__ for full details.\n"
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:58
 msgid ""
-"The `I2P Android client library`__ has also been updated to use the new "
-"I2P\n"
-"libraries. This means that cross-platform applications can work natively "
-"with\n"
+"The `I2P Android client library`__ has also been updated to use the new I2P\n"
+"libraries. This means that cross-platform applications can work natively with\n"
 "either I2P Android or desktop I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:71
 msgid ""
-"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work"
-"\n"
+"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work\n"
 "seamlessly over local, remote, and port-forwarded `SAM APIs`__. See its\n"
-"`documentation`__ for usage instructions, and report any issues on "
-"`GitHub`__."
+"`documentation`__ for usage instructions, and report any issues on `GitHub`__."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:84
 msgid ""
-"The first (beta) version of ``i2psocket`` has been released! This is a "
-"direct\n"
-"replacement for the standard Python ``socket`` library that extends it "
-"with I2P\n"
-"support over the SAM API. See its `GitHub page`__ for usage instructions,"
-" and\n"
+"The first (beta) version of ``i2psocket`` has been released! This is a direct\n"
+"replacement for the standard Python ``socket`` library that extends it with I2P\n"
+"support over the SAM API. See its `GitHub page`__ for usage instructions, and\n"
 "to report any issues."
 msgstr ""
 
@@ -6042,15 +5505,15 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:98
 msgid ""
-"zzz has been hard at work on Syndie, getting a headstart on Plugins "
-"month. You can follow his progress on `the development forum thread`__."
+"zzz has been hard at work on Syndie, getting a headstart on Plugins month. "
+"You can follow his progress on `the development forum thread`__."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:100
 msgid ""
-"psi has been creating an I2P test network using i2pd, and in the process "
-"has found and fixed several i2pd bugs that will improve its compatibility"
-" with Java I2P."
+"psi has been creating an I2P test network using i2pd, and in the process has"
+" found and fixed several i2pd bugs that will improve its compatibility with "
+"Java I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:104
@@ -6061,21 +5524,16 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:109
 msgid ""
-"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a "
-"long time\n"
-"been home to one of the `largest public grids`__, using a patched version"
-" of\n"
-"Tahoe-LAFS. During Apps month we will be helping them with their ongoing "
-"work to\n"
-"add native support for I2P and Tor, so that I2P users can benefit from "
-"all of\n"
+"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a long time\n"
+"been home to one of the `largest public grids`__, using a patched version of\n"
+"Tahoe-LAFS. During Apps month we will be helping them with their ongoing work to\n"
+"add native support for I2P and Tor, so that I2P users can benefit from all of\n"
 "the improvements upstream."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:117
 msgid ""
-"There are several other projects that we will be talking with about their"
-" plans\n"
+"There are several other projects that we will be talking with about their plans\n"
 "for I2P integration, and helping with design. Stay tuned!"
 msgstr ""
 
@@ -6084,10 +5542,7 @@ msgid ""
 "==============\n"
 "0.9.27 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.27\n"
-"=============="
+msgstr "==============\nRelease 0.9.27\n=============="
 
 #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:11
 msgid "0.9.27 contains bug fixes"
@@ -6096,11 +5551,8 @@ msgstr "0.9.27 apporta diverse correzioni di errori"
 #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:18
 msgid ""
 "0.9.27 contains a number of bug fixes.\n"
-"The updated GMP library for crypto acceleration, which was bundled in the"
-" 0.9.26 release for new installs and Debian builds only, is now included "
-"in the in-network update for 0.9.27.\n"
-"There are improvements in IPv6 transports, SSU peer testing, and hidden "
-"mode."
+"The updated GMP library for crypto acceleration, which was bundled in the 0.9.26 release for new installs and Debian builds only, is now included in the in-network update for 0.9.27.\n"
+"There are improvements in IPv6 transports, SSU peer testing, and hidden mode."
 msgstr ""
 
 #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:24
@@ -6190,10 +5642,7 @@ msgid ""
 "==============\n"
 "0.9.28 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.28\n"
-"=============="
+msgstr "==============\nRelease 0.9.28\n=============="
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:11
 msgid "0.9.28 contains bug fixes"
@@ -6201,20 +5650,15 @@ msgstr "La versione 0.9.28 corregge diversi errori"
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:18
 msgid ""
-"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number "
-"of bundled software packages including Jetty.\n"
-"There are fixes for the IPv6 peer testing feature introduced last "
-"release.\n"
-"We continue improvements to detect and block peers that are potentially "
-"malicious.\n"
-"There are preliminary fixes for Java 9, although we do not yet recommend "
-"Java 9 for general use."
+"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number of bundled software packages including Jetty.\n"
+"There are fixes for the IPv6 peer testing feature introduced last release.\n"
+"We continue improvements to detect and block peers that are potentially malicious.\n"
+"There are preliminary fixes for Java 9, although we do not yet recommend Java 9 for general use."
 msgstr ""
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:25
 msgid ""
-"I2P will be at 33C3, please stop by our table and give us your ideas on "
-"how to improve the network.\n"
+"I2P will be at 33C3, please stop by our table and give us your ideas on how to improve the network.\n"
 "We will review our 2017 roadmap and priorities 2017 at the Congress."
 msgstr ""
 
@@ -6383,10 +5827,7 @@ msgid ""
 "==============\n"
 "0.9.29 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.29\n"
-"=============="
+msgstr "==============\nRelease 0.9.29\n=============="
 
 #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:11
 msgid "0.9.29 contains bug fixes"
@@ -6394,14 +5835,12 @@ msgstr "La versione 0.9.29 corregge diversi errori"
 
 #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:18
 msgid ""
-"0.9.29 contains fixes for numerous Trac tickets, including workarounds "
-"for corrupt compressed messages.\n"
+"0.9.29 contains fixes for numerous Trac tickets, including workarounds for corrupt compressed messages.\n"
 "We now support NTP over IPv6.\n"
 "We've added preliminary Docker support.\n"
 "We now have translated man pages.\n"
 "We now pass same-origin Referer headers through the HTTP proxy.\n"
-"There are more fixes for Java 9, although we do not yet recommend Java 9 "
-"for general use."
+"There are more fixes for Java 9, although we do not yet recommend Java 9 for general use."
 msgstr ""
 
 #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:37
@@ -6513,11 +5952,9 @@ msgstr "Corretti problemi con l'installer Windows per la versione 0.9.29"
 
 #: i2p2www/blog/2017/03/04/0.9.29-Windows-Installer-Fix.rst:18
 msgid ""
-"The 0.9.29 Windows installer posted on our website two days ago fails "
-"during install with an Exception.\n"
+"The 0.9.29 Windows installer posted on our website two days ago fails during install with an Exception.\n"
 "We have fixed the bug and posted the new installer to our website.\n"
-"This does not affect upgrades from previous releases or non-Windows "
-"installers.\n"
+"This does not affect upgrades from previous releases or non-Windows installers.\n"
 "We apologize for the issue."
 msgstr ""
 
@@ -6526,10 +5963,7 @@ msgid ""
 "==============\n"
 "0.9.30 Release\n"
 "=============="
-msgstr ""
-"==============\n"
-"Release 0.9.30\n"
-"=============="
+msgstr "==============\nRelease 0.9.30\n=============="
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:11
 msgid "0.9.30 with Jetty 9"
@@ -6538,47 +5972,37 @@ msgstr "0.9.30 con Jetty 9"
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:18
 msgid ""
 "0.9.30 contains an upgrade to Jetty 9 and Tomcat 8.\n"
-"The previous versions are no longer supported, and are not available in "
-"the upcoming Debian Stretch and Ubuntu Zesty releases."
+"The previous versions are no longer supported, and are not available in the upcoming Debian Stretch and Ubuntu Zesty releases."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:23
 msgid ""
-"The router will migrate the jetty.xml configuration file for each Jetty "
-"website to the new Jetty 9 setup.\n"
-"This should work for recent, unmodified configurations but may not work "
-"for modified or very old setups.\n"
-"Verify that your Jetty website works after upgrading, and contact us on "
-"IRC if you need assistance."
+"The router will migrate the jetty.xml configuration file for each Jetty website to the new Jetty 9 setup.\n"
+"This should work for recent, unmodified configurations but may not work for modified or very old setups.\n"
+"Verify that your Jetty website works after upgrading, and contact us on IRC if you need assistance."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:29
 msgid ""
 "Several plugins are not compatible with Jetty 9 and must be updated.\n"
-"The following plugins have been updated to work with 0.9.30, and your "
-"router should update them after restart:"
+"The following plugins have been updated to work with 0.9.30, and your router should update them after restart:"
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:35
 msgid ""
-"The following plugins (with current versions listed) will not work with "
-"0.9.30.\n"
+"The following plugins (with current versions listed) will not work with 0.9.30.\n"
 "Contact the appropriate plugin developer for the status of new versions:"
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:41
 msgid ""
-"This release also supports migration of old (2014 and earlier) DSA-SHA1 "
-"hidden services to the more-secure EdDSA signature type.\n"
-"See http://zzz.i2p/topics/2271 for further information, including a guide"
-" and FAQ."
+"This release also supports migration of old (2014 and earlier) DSA-SHA1 hidden services to the more-secure EdDSA signature type.\n"
+"See http://zzz.i2p/topics/2271 for further information, including a guide and FAQ."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:46
 msgid ""
-"Note: On non-Android ARM platforms such as the Raspberry Pi, the "
-"blockfile database will upgrade on restart, which may take several "
-"minutes.\n"
+"Note: On non-Android ARM platforms such as the Raspberry Pi, the blockfile database will upgrade on restart, which may take several minutes.\n"
 "Please be patient."
 msgstr ""
 
@@ -6691,41 +6115,32 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:11
 msgid ""
-"This year's Summer Dev will be focused on metrics collection and "
-"performance improvements for the network."
+"This year's Summer Dev will be focused on metrics collection and performance"
+" improvements for the network."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:13
 msgid ""
 "It's that time of year again! We're embarking on our summer development\n"
-"programme, where we focus on a particular aspect of I2P to push it "
-"forward. For\n"
-"the next three months, we'll be encouraging both new contributors and "
-"existing\n"
+"programme, where we focus on a particular aspect of I2P to push it forward. For\n"
+"the next three months, we'll be encouraging both new contributors and existing\n"
 "community members to pick a task and have fun with it!"
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:20
 msgid ""
-"`Last year`__, we focused on helping users and developers leverage I2P, "
-"by\n"
-"improving API tooling and giving some love to applications that run over "
-"I2P.\n"
-"This year, we want to improve the user experience by working on an aspect"
-" that\n"
+"`Last year`__, we focused on helping users and developers leverage I2P, by\n"
+"improving API tooling and giving some love to applications that run over I2P.\n"
+"This year, we want to improve the user experience by working on an aspect that\n"
 "affects everyone: performance."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:29
 msgid ""
-"Despite onion-routing networks often being called \"low-latency\" "
-"networks, there\n"
-"is significant overhead created by routing traffic through additional "
-"computers.\n"
-"I2P's unidirectional tunnel design means that by default, a round trip "
-"between\n"
-"two Destinations will involve twelve participants! Improving the "
-"performance of\n"
+"Despite onion-routing networks often being called \"low-latency\" networks, there\n"
+"is significant overhead created by routing traffic through additional computers.\n"
+"I2P's unidirectional tunnel design means that by default, a round trip between\n"
+"two Destinations will involve twelve participants! Improving the performance of\n"
 "these participants will help to both reduce the latency of end-to-end\n"
 "connections [1]_, and increase the quality of tunnels network-wide."
 msgstr ""
@@ -6748,11 +6163,9 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:52
 msgid ""
-"We can't tell if we improve performance without a baseline! We'll be "
-"creating a\n"
+"We can't tell if we improve performance without a baseline! We'll be creating a\n"
 "metrics system for collecting usage and performance data about I2P in a\n"
-"privacy-preserving way, as well as porting various benchmarking tools to "
-"run\n"
+"privacy-preserving way, as well as porting various benchmarking tools to run\n"
 "over I2P (e.g. iperf3_)."
 msgstr ""
 
@@ -6764,10 +6177,8 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:66
 msgid ""
-"There's a lot of scope for improving the performance of our existing "
-"code, to\n"
-"e.g. reduce the overhead of participating in tunnels. We will be looking "
-"at\n"
+"There's a lot of scope for improving the performance of our existing code, to\n"
+"e.g. reduce the overhead of participating in tunnels. We will be looking at\n"
 "potential improvements to:"
 msgstr ""
 
@@ -6797,14 +6208,10 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:86
 msgid ""
-"We have several open proposals for improving the scalability of the I2P "
-"network\n"
-"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We "
-"will be\n"
-"working on these proposals, and begin implementing the finalised ones in "
-"the\n"
-"various network routers. The more feedback these proposals receive, the "
-"sooner\n"
+"We have several open proposals for improving the scalability of the I2P network\n"
+"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We will be\n"
+"working on these proposals, and begin implementing the finalised ones in the\n"
+"various network routers. The more feedback these proposals receive, the sooner\n"
 "we can roll them out, and the sooner I2P services can start using them!"
 msgstr ""
 
@@ -6816,46 +6223,36 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:106
 msgid ""
-"I2P is a packet-switched network, like the internet it runs on top of. "
-"This\n"
-"gives us significant flexibility in how we route packets, both for "
-"performance\n"
+"I2P is a packet-switched network, like the internet it runs on top of. This\n"
+"gives us significant flexibility in how we route packets, both for performance\n"
 "and privacy. The majority of this flexibility is unexplored! We want to\n"
-"encourage research into how various clearnet techniques for improving "
-"bandwidth\n"
+"encourage research into how various clearnet techniques for improving bandwidth\n"
 "can be applied to I2P, and how they might affect the privacy of network\n"
 "participants."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:120
 msgid ""
-"We have many more ideas for things we'd like to get done in these areas. "
-"If\n"
-"you're interested in hacking on privacy and anonymity software, designing"
-"\n"
-"protocols (cryptographic or otherwise), or researching future ideas - "
-"come and\n"
-"chat with us on IRC or Twitter! We are always happy to welcome newcomers "
-"into\n"
-"our community, both inside and outside the I2P network. We'll also be "
-"sending\n"
-"I2P stickers out to all new contributors taking part! If you want to chat"
-" about\n"
-"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You"
-" can\n"
+"We have many more ideas for things we'd like to get done in these areas. If\n"
+"you're interested in hacking on privacy and anonymity software, designing\n"
+"protocols (cryptographic or otherwise), or researching future ideas - come and\n"
+"chat with us on IRC or Twitter! We are always happy to welcome newcomers into\n"
+"our community, both inside and outside the I2P network. We'll also be sending\n"
+"I2P stickers out to all new contributors taking part! If you want to chat about\n"
+"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You can\n"
 "also find us in #i2p-dev on OFTC or Freenode."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:142
 msgid ""
-"Low-latency onion-routing networks are vulnerable to traffic confirmation"
-" attacks, so it would be reasonable to ask whether improved performance "
+"Low-latency onion-routing networks are vulnerable to traffic confirmation "
+"attacks, so it would be reasonable to ask whether improved performance "
 "equates to reduced privacy. Some latency can help privacy if applied "
 "correctly via random delays or batching (neither of which are currently "
-"employed by any general-purpose onion-routing network). However, if a "
-"tunnel has uniform overall latency, then traffic confirmation attacks "
-"should be just as viable with or without that latency; thus there should "
-"be little statistical difference when the latency is reduced uniformly."
+"employed by any general-purpose onion-routing network). However, if a tunnel"
+" has uniform overall latency, then traffic confirmation attacks should be "
+"just as viable with or without that latency; thus there should be little "
+"statistical difference when the latency is reduced uniformly."
 msgstr ""
 
 #: i2p2www/blog/2017/08/07/0.9.31-Release.rst:1
@@ -6875,8 +6272,7 @@ msgid ""
 "We have refreshed the router console to make it easier to understand,\n"
 "improve accessibility and cross-browser support,\n"
 "and generally tidy things up.\n"
-"This is the first step in a longer-term plan to make the router console "
-"more user-friendly.\n"
+"This is the first step in a longer-term plan to make the router console more user-friendly.\n"
 "We have also added torrent ratings and comments support to i2psnark."
 msgstr ""
 
@@ -6946,10 +6342,8 @@ msgstr ""
 
 #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:18
 msgid ""
-"0.9.32 contains a number of fixes in the router console and associated "
-"webapps (addressbook, i2psnark, and susimail).\n"
-"We have also changed the way we handle configured hostnames for published"
-" router infos, to eliminate some network enumeration attacks via DNS.\n"
+"0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail).\n"
+"We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS.\n"
 "We have added some checks in the console to resist rebinding attacks."
 msgstr ""
 
@@ -6991,13 +6385,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:17
 msgid ""
-"0.9.33 contains a large number of bug fixes, including i2psnark, "
-"i2ptunnel, streaming, and SusiMail.\n"
-"For those who cannot access the reseed sites directly, we now support "
-"several types of proxies for reseeding.\n"
+"0.9.33 contains a large number of bug fixes, including i2psnark, i2ptunnel, streaming, and SusiMail.\n"
+"For those who cannot access the reseed sites directly, we now support several types of proxies for reseeding.\n"
 "We now set rate limits by default in the hidden services manager.\n"
-"For those that run high-traffic servers, please review and adjust the "
-"limits as necessary."
+"For those that run high-traffic servers, please review and adjust the limits as necessary."
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:34
@@ -7085,7 +6476,8 @@ msgid "SusiMail: Fix several issues when using multiple browser tabs"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:62
-msgid "SusuMail: Fix bugs corrupting text attachments and large message bodies"
+msgid ""
+"SusuMail: Fix bugs corrupting text attachments and large message bodies"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:63
@@ -7152,8 +6544,7 @@ msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:83
 msgid ""
-"Debian: Remove ecj dependency; replace glassfish with libtaglibs where "
-"able"
+"Debian: Remove ecj dependency; replace glassfish with libtaglibs where able"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:84
@@ -7223,12 +6614,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:13
 msgid ""
-"One of the many things we discussed at 34C3 was what we should focus on "
-"for the\n"
-"coming year. In particular, we wanted a roadmap that was clear about what"
-" we\n"
-"want to ensure we get done, vs what would be really nice to have, and be "
-"able to\n"
+"One of the many things we discussed at 34C3 was what we should focus on for the\n"
+"coming year. In particular, we wanted a roadmap that was clear about what we\n"
+"want to ensure we get done, vs what would be really nice to have, and be able to\n"
 "help onboard newcomers to either category. Here is what we came up with:"
 msgstr ""
 
@@ -7240,14 +6628,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:25
 msgid ""
-"Many of the current primitives and protocols still retain their original "
-"designs\n"
-"from circa 2005, and need improvement. We have had a number of open "
-"proposals\n"
-"for several years with ideas, but forward progress has been slow. We all "
-"agreed\n"
-"that this needs to be our top priority for 2018. The core components are:"
-"\n"
+"Many of the current primitives and protocols still retain their original designs\n"
+"from circa 2005, and need improvement. We have had a number of open proposals\n"
+"for several years with ideas, but forward progress has been slow. We all agreed\n"
+"that this needs to be our top priority for 2018. The core components are:\n"
 "\n"
 "- New transport protocols (to replace NTCP and SSU). See Prop111_.\n"
 "- New onion-encryption protocol for building and using tunnels.\n"
@@ -7266,8 +6650,7 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:50
 msgid ""
-"We cannot release new protocol specifications across the entire network "
-"without\n"
+"We cannot release new protocol specifications across the entire network without\n"
 "work on all of these areas."
 msgstr ""
 
@@ -7279,31 +6662,24 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:60
 msgid ""
-"One of the benefits of starting the above work now, is that over the last"
-" few\n"
+"One of the benefits of starting the above work now, is that over the last few\n"
 "years there have been independent efforts to create simple protocols and\n"
-"protocol frameworks that achieve many of the aims we have for our own "
-"protocols,\n"
-"and have gained traction with the wider community. By leveraging this "
-"work, we\n"
+"protocol frameworks that achieve many of the aims we have for our own protocols,\n"
+"and have gained traction with the wider community. By leveraging this work, we\n"
 "get a \"force multiplier\" effect:\n"
 "\n"
-"- We benefit from protocol designs, security proofs, and code written by "
-"others,\n"
+"- We benefit from protocol designs, security proofs, and code written by others,\n"
 "  reducing the amount of work we need to do for the same level of\n"
 "  feature-completeness and security assurances.\n"
 "\n"
-"- Work we do can be leveraged by other communities, increasing their "
-"interest in\n"
+"- Work we do can be leveraged by other communities, increasing their interest in\n"
 "  collaborating with us, and thinking about I2P as a whole."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:76
 msgid ""
-"My proposals in particular will be leveraging the `Noise Protocol "
-"Framework`_,\n"
-"and the `SPHINX packet format`_. I have collaborations lined up with "
-"several\n"
+"My proposals in particular will be leveraging the `Noise Protocol Framework`_,\n"
+"and the `SPHINX packet format`_. I have collaborations lined up with several\n"
 "people outside I2P for these!"
 msgstr ""
 
@@ -7315,16 +6691,11 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:90
 msgid ""
-"On that topic, we've been slowly building interest over the last six "
-"months or\n"
-"so. Across PETS2017, 34C3, and RWC2018, I've had some very good "
-"discussions\n"
-"about ways in which we can improve collaboration with the wider "
-"community. This\n"
-"is really important to ensure we can garner as much review as possible "
-"for new\n"
-"protocols. The biggest blocker I've seen is the fact that the majority of"
-" I2P\n"
+"On that topic, we've been slowly building interest over the last six months or\n"
+"so. Across PETS2017, 34C3, and RWC2018, I've had some very good discussions\n"
+"about ways in which we can improve collaboration with the wider community. This\n"
+"is really important to ensure we can garner as much review as possible for new\n"
+"protocols. The biggest blocker I've seen is the fact that the majority of I2P\n"
 "development collaboration currently happens inside I2P itself, which\n"
 "significantly increases the effort required to contribute."
 msgstr ""
@@ -7333,8 +6704,7 @@ msgstr ""
 msgid ""
 "The two priorities in this area are:\n"
 "\n"
-"- Set up a project-run development forum that is accessible both inside "
-"and\n"
+"- Set up a project-run development forum that is accessible both inside and\n"
 "  outside I2P.\n"
 "\n"
 "- Set up mailing lists for review and discussion of proposals (possibly\n"
@@ -7345,21 +6715,17 @@ msgstr ""
 msgid ""
 "Other goals which are classed as nice-to-have:\n"
 "\n"
-"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit"
-"\n"
-"  clearnet contributions on GitHub while keeping the canonical dev "
-"environment\n"
+"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit\n"
+"  clearnet contributions on GitHub while keeping the canonical dev environment\n"
 "  on Monotone.\n"
 "\n"
-"- Write a \"position paper\" that accurately explains I2P to academic "
-"audiences,\n"
+"- Write a \"position paper\" that accurately explains I2P to academic audiences,\n"
 "  and puts it in context with existing literature."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:123
 msgid ""
-"I expect that collaborations with people outside I2P will be done "
-"entirely on\n"
+"I expect that collaborations with people outside I2P will be done entirely on\n"
 "GitHub, for minimal friction."
 msgstr ""
 
@@ -7371,24 +6737,18 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:133
 msgid ""
-"I2P is now in Debian Sid (their unstable repo) which will stablilise in "
-"around a\n"
+"I2P is now in Debian Sid (their unstable repo) which will stablilise in around a\n"
 "year and a half, and has also been pulled into the Ubuntu repository for\n"
-"inclusion in the next LTS release in April. We are going to start having "
-"I2P\n"
-"versions that end up hanging around for years, and we need to ensure we "
-"can\n"
+"inclusion in the next LTS release in April. We are going to start having I2P\n"
+"versions that end up hanging around for years, and we need to ensure we can\n"
 "handle their presence in the network."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:141
 msgid ""
-"The primary goal here is to roll out as many of the new protocols as we "
-"feasibly\n"
-"can in the next year, to hit the next Debian stable release. For those "
-"that\n"
-"require multi-year rollouts, we should incorporate the forward-"
-"compatability\n"
+"The primary goal here is to roll out as many of the new protocols as we feasibly\n"
+"can in the next year, to hit the next Debian stable release. For those that\n"
+"require multi-year rollouts, we should incorporate the forward-compatability\n"
 "changes as early as we can."
 msgstr ""
 
@@ -7400,32 +6760,24 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:153
 msgid ""
-"The Debian model encourages having separate packages for separate "
-"components. We\n"
-"agreed that decoupling the currently-bundled Java applications from the "
-"core\n"
+"The Debian model encourages having separate packages for separate components. We\n"
+"agreed that decoupling the currently-bundled Java applications from the core\n"
 "Java router would be beneficial for several reasons:\n"
 "\n"
 "- It codifies the boundary between the applications and the router.\n"
 "\n"
-"- It should make it easier to get these apps running with non-Java "
-"routers.\n"
+"- It should make it easier to get these apps running with non-Java routers.\n"
 "\n"
-"- It would enable third parties to create \"I2P bundles\" containing just"
-" the\n"
+"- It would enable third parties to create \"I2P bundles\" containing just the\n"
 "  applications they want."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:167
 msgid ""
-"In combination with the earlier priorities, this moves the main I2P "
-"project more\n"
-"in the direction of e.g. the Linux kernel. We will spend more time "
-"focusing on\n"
-"the network itself, leaving third-party developers to focus on "
-"applications that\n"
-"use the network (something that is significantly easier to do after our "
-"work in\n"
+"In combination with the earlier priorities, this moves the main I2P project more\n"
+"in the direction of e.g. the Linux kernel. We will spend more time focusing on\n"
+"the network itself, leaving third-party developers to focus on applications that\n"
+"use the network (something that is significantly easier to do after our work in\n"
 "the last few years on APIs and libraries)."
 msgstr ""
 
@@ -7437,25 +6789,18 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:180
 msgid ""
-"There are a bunch of app-level improvements that we want to work on, but "
-"do not\n"
-"currently have the developer time to do so, given our other priorities. "
-"This is\n"
-"an area we would love to see new contributors for! Once the above "
-"decoupling is\n"
-"complete, it will be significantly easier for someone to work on a "
-"specific\n"
+"There are a bunch of app-level improvements that we want to work on, but do not\n"
+"currently have the developer time to do so, given our other priorities. This is\n"
+"an area we would love to see new contributors for! Once the above decoupling is\n"
+"complete, it will be significantly easier for someone to work on a specific\n"
 "application independently of the main Java router."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:188
 msgid ""
-"One such application we would love to have help with is I2P Android. We "
-"will be\n"
-"keeping it up-to-date with the core I2P releases, and fixing bugs as we "
-"can, but\n"
-"there is much that could be done to improve the underlying code as well "
-"as the\n"
+"One such application we would love to have help with is I2P Android. We will be\n"
+"keeping it up-to-date with the core I2P releases, and fixing bugs as we can, but\n"
+"there is much that could be done to improve the underlying code as well as the\n"
 "usability."
 msgstr ""
 
@@ -7467,14 +6812,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:200
 msgid ""
-"Having said that, we do want to work specifically on Susimail and I2P-"
-"Bote fixes\n"
-"in the near term (some of which have landed in 0.9.33). They have had "
-"less work\n"
-"over the last few years than other I2P apps, and so we want to spend some"
-" time\n"
-"bringing their codebases up to par, and making them easier for new "
-"contributors\n"
+"Having said that, we do want to work specifically on Susimail and I2P-Bote fixes\n"
+"in the near term (some of which have landed in 0.9.33). They have had less work\n"
+"over the last few years than other I2P apps, and so we want to spend some time\n"
+"bringing their codebases up to par, and making them easier for new contributors\n"
 "to jump into!"
 msgstr ""
 
@@ -7486,14 +6827,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:213
 msgid ""
-"We have a large backlog of tickets in a number of I2P subsystems and "
-"apps. As\n"
-"part of the above stabilisation effort, we would love to clean up some of"
-" our\n"
-"older long-standing issues. More importantly, we want to ensure that our "
-"tickets\n"
-"are correctly organised, so that new contributors can find good tickets "
-"to work\n"
+"We have a large backlog of tickets in a number of I2P subsystems and apps. As\n"
+"part of the above stabilisation effort, we would love to clean up some of our\n"
+"older long-standing issues. More importantly, we want to ensure that our tickets\n"
+"are correctly organised, so that new contributors can find good tickets to work\n"
 "on."
 msgstr ""
 
@@ -7505,12 +6842,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:226
 msgid ""
-"One aspect of the above we will be focusing on is keeping in touch with "
-"users\n"
-"who take the time to report issues. Thank you! The smaller we can make "
-"the\n"
-"feedback loop, the quicker we can resolve problems that new users face, "
-"and the\n"
+"One aspect of the above we will be focusing on is keeping in touch with users\n"
+"who take the time to report issues. Thank you! The smaller we can make the\n"
+"feedback loop, the quicker we can resolve problems that new users face, and the\n"
 "more likely it is that they keep participating in the community."
 msgstr ""
 
@@ -7522,15 +6856,13 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:238
 msgid ""
-"That all looks very ambitious, and it is! But many of the items above "
-"overlap,\n"
+"That all looks very ambitious, and it is! But many of the items above overlap,\n"
 "and with careful planning we can make a serious dent in them."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:243
 msgid ""
-"If you are interested in helping with any of the goals above, come chat "
-"to us!\n"
+"If you are interested in helping with any of the goals above, come chat to us!\n"
 "You can find us on OFTC and Freenode (#i2p-dev), and Twitter (@GetI2P)."
 msgstr ""
 
@@ -7556,11 +6888,9 @@ msgstr ""
 #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:17
 msgid ""
 "0.9.34 contains a lot of bug fixes!\n"
-"It also has improvements in SusiMail, IPv6 handling, and tunnel peer "
-"selection.\n"
+"It also has improvements in SusiMail, IPv6 handling, and tunnel peer selection.\n"
 "We add support for IGD2 schemas in UPnP.\n"
-"There's also preparation for more improvements you will see in future "
-"releases."
+"There's also preparation for more improvements you will see in future releases."
 msgstr ""
 
 #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:34
@@ -7623,8 +6953,7 @@ msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:16
 msgid ""
-"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for "
-"setting up HTTPS on your Hidden Service website.\n"
+"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.\n"
 "We also have the usual collection of bug fixes, especially in SusiMail."
 msgstr ""
 
@@ -7635,7 +6964,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:25
-msgid "I2P will be at HOPE in New York City, July 20-22. Find us and say hello!"
+msgid ""
+"I2P will be at HOPE in New York City, July 20-22. Find us and say hello!"
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:39
@@ -7655,7 +6985,8 @@ msgid "CPUID: Fix TBM detection"
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:48
-msgid "i2psnark: Fix torrents ignoring priority settings when autostart enabled"
+msgid ""
+"i2psnark: Fix torrents ignoring priority settings when autostart enabled"
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:49
@@ -7731,25 +7062,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:20
 msgid ""
-"I2P's transport protocols were originally developed around 15 years ago. "
-"Back \n"
-"then, the main goal was to hide the transferred data, not to hide the "
-"fact that \n"
-"one was using the protocol itself. Nobody thought seriously about "
-"protecting \n"
-"against DPI (deep packets inspection) and protocols censorship. Times "
-"change, \n"
-"and even though original transport protocols are still providing strong "
-"security, \n"
-"there was a demand for a new transport protocol. NTCP2 is designed to "
-"resist \n"
-"current censorship threats. Mainly, DPI analysis of packets length. Plus,"
-" the new \n"
-"protocol uses the most modern cryptography developments. NTCP2 is based "
-"on the \n"
+"I2P's transport protocols were originally developed around 15 years ago. Back \n"
+"then, the main goal was to hide the transferred data, not to hide the fact that \n"
+"one was using the protocol itself. Nobody thought seriously about protecting \n"
+"against DPI (deep packets inspection) and protocols censorship. Times change, \n"
+"and even though original transport protocols are still providing strong security, \n"
+"there was a demand for a new transport protocol. NTCP2 is designed to resist \n"
+"current censorship threats. Mainly, DPI analysis of packets length. Plus, the new \n"
+"protocol uses the most modern cryptography developments. NTCP2 is based on the \n"
 "`Noise Protocol Framework`_, with SHA256 \n"
-"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) "
-"key \n"
+"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) key \n"
 "exchange."
 msgstr ""
 
@@ -7771,23 +7093,17 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:59
 msgid ""
-"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of "
-"ElGamal \n"
-"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, "
-"and uses \n"
-"SipHash for obfuscating the packet's length information. The key "
-"derivation \n"
+"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of ElGamal \n"
+"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, and uses \n"
+"SipHash for obfuscating the packet's length information. The key derivation \n"
 "function used in NTCP2 is more complex, now using many HMAC-SHA256 calls."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:66
 msgid ""
-"i2pd (C++) implementation note: All of the algorithms mentioned above, "
-"except \n"
-"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the "
-"coming \n"
-"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is "
-"used in \n"
+"i2pd (C++) implementation note: All of the algorithms mentioned above, except \n"
+"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the coming \n"
+"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is used in \n"
 "most of the current systems, core i2pd developer \n"
 "`Jeff Becker`_ has contributed standalone \n"
 "implementations of missing cryptographic algorithms."
@@ -7801,40 +7117,28 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:82
 msgid ""
-"NTCP2 requires having a third (x25519) key in addition to existing two "
-"(the \n"
-"encryption and signature keys). It is called a static key and it has to "
-"be added \n"
-"to any of RouterInfo addresses as an \"s\" parameter. It is required for "
-"both \n"
-"NTCP2 initiator (Alice) and responder (Bob). If more than one address "
-"supports \n"
-"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for "
-"all of \n"
-"them. Alice's address is allowed to have just the \"s\" parameter without"
-" \"host\" \n"
-"and \"port\" set. Also, a \"v\" parameter is required, that is currently "
-"always set \n"
+"NTCP2 requires having a third (x25519) key in addition to existing two (the \n"
+"encryption and signature keys). It is called a static key and it has to be added \n"
+"to any of RouterInfo addresses as an \"s\" parameter. It is required for both \n"
+"NTCP2 initiator (Alice) and responder (Bob). If more than one address supports \n"
+"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for all of \n"
+"them. Alice's address is allowed to have just the \"s\" parameter without \"host\" \n"
+"and \"port\" set. Also, a \"v\" parameter is required, that is currently always set \n"
 "to \"2\"."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:93
 msgid ""
-"NTCP2 address can be declared as a separate NTCP2 address or as an old-"
-"style \n"
-"NTCP address with additional parameters, in which case it will accept "
-"both \n"
-"NTCP and NTCP2 connections. Java I2P implementation uses the second "
-"approach, \n"
+"NTCP2 address can be declared as a separate NTCP2 address or as an old-style \n"
+"NTCP address with additional parameters, in which case it will accept both \n"
+"NTCP and NTCP2 connections. Java I2P implementation uses the second approach, \n"
 "i2pd (C++ implementation) uses the first."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:100
 msgid ""
-"If a node accepts NTCP2 connections, it has to publish its RouterInfo "
-"with the \n"
-"\"i\" parameter, which is used as an initialization vector (IV) for the "
-"public \n"
+"If a node accepts NTCP2 connections, it has to publish its RouterInfo with the \n"
+"\"i\" parameter, which is used as an initialization vector (IV) for the public \n"
 "encryption key when that node establishes new connections."
 msgstr ""
 
@@ -7846,14 +7150,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:111
 msgid ""
-"To establish a connection both sides need to generate pairs of ephemeral "
-"x25519 \n"
-"keys. Based on those keys and \"static\" keys they derive a set of keys "
-"for data \n"
-"transferring. Both parties must verify that the other side actually has a"
-" \n"
-"private key for that static key, and that static key is the same as in "
-"RouterInfo."
+"To establish a connection both sides need to generate pairs of ephemeral x25519 \n"
+"keys. Based on those keys and \"static\" keys they derive a set of keys for data \n"
+"transferring. Both parties must verify that the other side actually has a \n"
+"private key for that static key, and that static key is the same as in RouterInfo."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:118
@@ -7862,29 +7162,23 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:131
 msgid ""
-"A common x25519 key, called «input key material», is computed for each "
-"message, \n"
-"after which message encryption key is generated with a MixKey function. A"
-" value \n"
+"A common x25519 key, called «input key material», is computed for each message, \n"
+"after which message encryption key is generated with a MixKey function. A value \n"
 "ck (chaining key) is kept while messages are being exchanged. \n"
-"That value is used as a final input when generating keys for data "
-"transferring."
+"That value is used as a final input when generating keys for data transferring."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:138
 msgid ""
-"MixKey function looks something like this in the C++ implementation of "
-"I2P:"
+"MixKey function looks something like this in the C++ implementation of I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:159
 msgid ""
-"**SessionRequest** message is made of a public x25519 Alice key (32 "
-"bytes), a \n"
+"**SessionRequest** message is made of a public x25519 Alice key (32 bytes), a \n"
 "block of data encrypted with AEAD/Chacha20/Poly1305 (16 bytes), a hash \n"
 "(16 bytes) and some random data in the end (padding). Padding length is \n"
-"defined in the encrypted block of data. Encrypted block also contains "
-"length of \n"
+"defined in the encrypted block of data. Encrypted block also contains length of \n"
 "the second part of the **SessionConfirmed** message. A block of data is \n"
 "encrypted and signed with a key derived from Alice's ephemeral key and \n"
 "Bob's static key. Initial ck value for MixKey function is set to SHA256 \n"
@@ -7893,38 +7187,28 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:170
 msgid ""
-"Since 32 bytes of public x25519 key can be detected by DPI, it is "
-"encrypted with \n"
-"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" "
-"parameter \n"
+"Since 32 bytes of public x25519 key can be detected by DPI, it is encrypted with \n"
+"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" parameter \n"
 "from RouterInfo as an initialization vector (IV)."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:176
 msgid ""
-"**SessionCreated** message has the same structure as **SessionRequest**, "
-"except \n"
-"the key is computed based on ephemeral keys of both sides. IV generated "
-"after \n"
-"encrypting/decrypting public key from **SessionRequest** message is used "
-"as IV \n"
+"**SessionCreated** message has the same structure as **SessionRequest**, except \n"
+"the key is computed based on ephemeral keys of both sides. IV generated after \n"
+"encrypting/decrypting public key from **SessionRequest** message is used as IV \n"
 "for encrypting/decrypting ephemeral public key."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:183
 msgid ""
 "**SessionConfirmed** message has 2 parts: public static key and Alice's \n"
-"RouterInfo. The difference from previous messages is that ephemeral "
-"public key \n"
-"is encrypted with AEAD/Chaha20/Poly1305 using the same key as "
-"**SessionCreated**. \n"
+"RouterInfo. The difference from previous messages is that ephemeral public key \n"
+"is encrypted with AEAD/Chaha20/Poly1305 using the same key as **SessionCreated**. \n"
 "It leads to increasing first part of the message from 32 to 48 bytes. \n"
-"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a"
-" new \n"
-"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo"
-" part \n"
-"can also be appended with random data padding, but it is not required, "
-"since \n"
+"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a new \n"
+"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo part \n"
+"can also be appended with random data padding, but it is not required, since \n"
 "RouterInfo usually has various length."
 msgstr ""
 
@@ -7936,29 +7220,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:199
 msgid ""
-"If every hash and key verification has succeeded, a common ck value must "
-"be \n"
-"present after the last MixKey operation on both sides. This value is used"
-" to \n"
-"generate two sets of keys <k, sipk, sipiv> for each side of a connection."
-" \"k\" is \n"
-"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an "
-"initial \n"
+"If every hash and key verification has succeeded, a common ck value must be \n"
+"present after the last MixKey operation on both sides. This value is used to \n"
+"generate two sets of keys <k, sipk, sipiv> for each side of a connection. \"k\" is \n"
+"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an initial \n"
 "value for SipHash IV, that is changed after each use."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:207
 msgid ""
-"Code used to generate keys looks like this in the C++ implementation of "
-"I2P:"
+"Code used to generate keys looks like this in the C++ implementation of I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:246
 msgid ""
-"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array "
-"are a \n"
-"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, "
-"but i2pd \n"
+"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array are a \n"
+"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, but i2pd \n"
 "handles them as a single 16 bytes key."
 msgstr ""
 
@@ -7985,28 +7262,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:271
 msgid ""
-"Message length is obfuscated by applying the XOR function with two first "
-"bytes \n"
+"Message length is obfuscated by applying the XOR function with two first bytes \n"
 "of the current SipHash IV."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:276
 msgid ""
-"Encrypted data part contains blocks of data. Each block is prepended with"
-" 3 \n"
-"bytes header, that defines block type and block length. Generally, I2NP "
-"type \n"
-"blocks are transferred, that are I2NP messages with an altered header. "
-"One NTCP2 \n"
+"Encrypted data part contains blocks of data. Each block is prepended with 3 \n"
+"bytes header, that defines block type and block length. Generally, I2NP type \n"
+"blocks are transferred, that are I2NP messages with an altered header. One NTCP2 \n"
 "frame can transfer multiple I2NP blocks."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:283
 msgid ""
-"The other important data block type is a random data block. It is "
-"recommended to \n"
-"add a random data block to every NTCP2 frame. Only one random data block "
-"can be \n"
+"The other important data block type is a random data block. It is recommended to \n"
+"add a random data block to every NTCP2 frame. Only one random data block can be \n"
 "added and it must be the last block."
 msgstr ""
 
@@ -8016,12 +7287,8 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:293
 msgid ""
-"- RouterInfo  — usually contains Bob's RouterInfo after the connection "
-"has been established, but it can also contain RouterInfo of a random node"
-" for the purpose of speeding up floodfills (there is a flags field for "
-"that case). \n"
-"- Termination  — is used when a host explicitly terminates a connection "
-"and specifies a reason for that.\n"
+"- RouterInfo  — usually contains Bob's RouterInfo after the connection has been established, but it can also contain RouterInfo of a random node for the purpose of speeding up floodfills (there is a flags field for that case). \n"
+"- Termination  — is used when a host explicitly terminates a connection and specifies a reason for that.\n"
 "- DateTime — a current time in seconds."
 msgstr ""
 
@@ -8033,14 +7300,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:305
 msgid ""
-"The new I2P transport protocol NTCP2 provides effective resistance "
-"against DPI \n"
-"censorship. It also results in reduced CPU load because of the faster, "
-"modern \n"
-"cryptography used. It makes I2P more likely to run on low-end devices, "
-"such as \n"
-"smartphones and home routers. Both major I2P implementations have full "
-"support \n"
+"The new I2P transport protocol NTCP2 provides effective resistance against DPI \n"
+"censorship. It also results in reduced CPU load because of the faster, modern \n"
+"cryptography used. It makes I2P more likely to run on low-end devices, such as \n"
+"smartphones and home routers. Both major I2P implementations have full support \n"
 "for NTCP2 and it make NTCP2 available for use starting with version \n"
 "0.9.36 (Java) and 2.20 (i2pd, C++)."
 msgstr ""
@@ -8126,7 +7389,8 @@ msgid "i2psnark: Add icon for comments"
 msgstr ""
 
 #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:60
-msgid "i2ptunnel: Change read timeout defaults to account for streaming changes"
+msgid ""
+"i2ptunnel: Change read timeout defaults to account for streaming changes"
 msgstr ""
 
 #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:61
@@ -8151,7 +7415,8 @@ msgid "0.9.37 with NTCP2 enabled"
 msgstr ""
 
 #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:16
-msgid "0.9.37 enables the faster, more secure transport protocol called NTCP2."
+msgid ""
+"0.9.37 enables the faster, more secure transport protocol called NTCP2."
 msgstr ""
 
 #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:30
@@ -8192,27 +7457,19 @@ msgstr ""
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:18
 msgid ""
 "`Invisible Internet Project`_ (I2P) provides a framework for\n"
-"developing privacy-aware applications. It is a virtual network working on"
-" top of\n"
-"the regular Internet, in which hosts can exchange data without disclosing"
-" their\n"
-"\"real\" IP addresses. Connections inside I2P network are established "
-"between \n"
-"virtual addresses called *I2P destinations*. It's possible to have as "
-"many\n"
-"of destinations as one needs, even use a new destination for each "
-"connection,\n"
-"they don't disclose any information about the real IP address to the "
-"other\n"
+"developing privacy-aware applications. It is a virtual network working on top of\n"
+"the regular Internet, in which hosts can exchange data without disclosing their\n"
+"\"real\" IP addresses. Connections inside I2P network are established between \n"
+"virtual addresses called *I2P destinations*. It's possible to have as many\n"
+"of destinations as one needs, even use a new destination for each connection,\n"
+"they don't disclose any information about the real IP address to the other\n"
 "side."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:31
 msgid ""
-"This article describes basic concepts one needs to know when developing "
-"I2P\n"
-"applications. Code samples are written in Python with the use of built-in"
-"\n"
+"This article describes basic concepts one needs to know when developing I2P\n"
+"applications. Code samples are written in Python with the use of built-in\n"
 "asynchronous framework asyncio."
 msgstr ""
 
@@ -8225,15 +7482,11 @@ msgstr ""
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:42
 msgid ""
 "I2P provides many different APIs to the client applications. Regular\n"
-"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java "
-"applications \n"
-"usually use I2CP. For developing with other languages, like Python, the "
-"best \n"
+"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java applications \n"
+"usually use I2CP. For developing with other languages, like Python, the best \n"
 "option is `SAM`_. SAM is disabled by \n"
-"default in the original Java client implementation, so we need to enable "
-"it. \n"
-"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run "
-"at Startup\" \n"
+"default in the original Java client implementation, so we need to enable it. \n"
+"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run at Startup\" \n"
 "and press \"Start\", then \"Save Client Configuration\"."
 msgstr ""
 
@@ -8254,12 +7507,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:79
 msgid ""
-"This library works with the Python's built-in `asynchronous framework "
-"asyncio`_,\n"
-"so please note that code samples are taken from async functions "
-"(coroutines)\n"
-"which are running inside the event loop. Additional examples of i2plib "
-"usage can\n"
+"This library works with the Python's built-in `asynchronous framework asyncio`_,\n"
+"so please note that code samples are taken from async functions (coroutines)\n"
+"which are running inside the event loop. Additional examples of i2plib usage can\n"
 "be found in the `source code repository`_."
 msgstr ""
 
@@ -8271,10 +7521,8 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:94
 msgid ""
-"I2P destination is literally a set of encryption and cryptographic "
-"signature\n"
-"keys. Public keys from this set are published to the I2P network and are "
-"used to\n"
+"I2P destination is literally a set of encryption and cryptographic signature\n"
+"keys. Public keys from this set are published to the I2P network and are used to\n"
 "make connections instead of IP addresses."
 msgstr ""
 
@@ -8284,28 +7532,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:112
 msgid ""
-"base32 address is a hash which is used by other peers to discover your "
-"full\n"
-"Destination in the network. If you plan to use this destination as a "
-"permanent\n"
-"address in your program, save the binary data from "
-"*dest.private\\_key.data* \n"
+"base32 address is a hash which is used by other peers to discover your full\n"
+"Destination in the network. If you plan to use this destination as a permanent\n"
+"address in your program, save the binary data from *dest.private\\_key.data* \n"
 "to a local file."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:119
 msgid ""
-"Now you can create a SAM session, which literally means to make the "
-"Destination\n"
+"Now you can create a SAM session, which literally means to make the Destination\n"
 "online in I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:130
 msgid ""
-"Important note here: Destination will remain online while "
-"*session\\_writer* socket\n"
-"is kept open. If you wish to switch it off, you can call "
-"*session\\_writer.close()*."
+"Important note here: Destination will remain online while *session\\_writer* socket\n"
+"is kept open. If you wish to switch it off, you can call *session\\_writer.close()*."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:135
@@ -8316,11 +7558,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:140
 msgid ""
-"Now when the Destination is online, you can use it to connect to other "
-"peers.\n"
+"Now when the Destination is online, you can use it to connect to other peers.\n"
 "For example, this is how you connect to\n"
-"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send "
-"HTTP GET\n"
+"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send HTTP GET\n"
 "request and read the response (it is \"i2p-projekt.i2p\" web server):"
 msgstr ""
 
@@ -8332,20 +7572,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:171
 msgid ""
-"While making outgoing connections is trivial, when you accept connections"
-" there\n"
-"is one important detail. After a new client is connected, SAM API sends "
-"an ASCII\n"
-"string with base64-encoded client's Destination to the socket. Since "
-"Destination \n"
+"While making outgoing connections is trivial, when you accept connections there\n"
+"is one important detail. After a new client is connected, SAM API sends an ASCII\n"
+"string with base64-encoded client's Destination to the socket. Since Destination \n"
 "and data can come in one chunk, you should be aware of it."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:178
 msgid ""
 "This is how a simple PING-PONG server looks like. It accepts incoming\n"
-"connection, saves client's Destination to a *remote\\_destination* "
-"variable and\n"
+"connection, saves client's Destination to a *remote\\_destination* variable and\n"
 "sends back \"PONG\" string:"
 msgstr ""
 
@@ -8357,21 +7593,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:208
 msgid ""
-"This article describes the usage of a TCP-like Streaming protocol. SAM "
-"API also\n"
-"provides a UDP-like protocol to send and receive datagrams. This feature "
-"will\n"
+"This article describes the usage of a TCP-like Streaming protocol. SAM API also\n"
+"provides a UDP-like protocol to send and receive datagrams. This feature will\n"
 "be added to i2plib later."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:214
 msgid ""
-"This is just a basic information, but it's enough to start your own "
-"project with\n"
-"the use of I2P. Invisible Internet is a great tool to develop all kinds "
-"of\n"
-"privacy-aware applications. There are no design constraints by the "
-"network,\n"
+"This is just a basic information, but it's enough to start your own project with\n"
+"the use of I2P. Invisible Internet is a great tool to develop all kinds of\n"
+"privacy-aware applications. There are no design constraints by the network,\n"
 "those applications can be client-server as well as P2P."
 msgstr ""
 
@@ -8387,8 +7618,7 @@ msgstr ""
 msgid ""
 "0.9.38 includes a new first-install wizard with a bandwidth tester.\n"
 "We've added support for the latest GeoIP database format.\n"
-"There's a new Firefox profile installer and a new, native Mac OSX "
-"installer on our website.\n"
+"There's a new Firefox profile installer and a new, native Mac OSX installer on our website.\n"
 "Work continues on supporting the new \"LS2\" netdb format."
 msgstr ""
 
@@ -8480,25 +7710,25 @@ msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:16
 msgid ""
-"There are many projects in the I2P world that we are excited about, but "
-"not all of them are ready for prime-time.  We decided to create a place "
-"where we can make those available for anyone interested in trying them "
-"out, that will serve as proving grounds for projects that may one day "
-"become official I2P products.  This place is the `I2P Laboratory`_."
+"There are many projects in the I2P world that we are excited about, but not "
+"all of them are ready for prime-time.  We decided to create a place where we"
+" can make those available for anyone interested in trying them out, that "
+"will serve as proving grounds for projects that may one day become official "
+"I2P products.  This place is the `I2P Laboratory`_."
 msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:22
 msgid ""
-"In the lab we will be offering downoads ready for you to try.  Keep in "
-"mind that they are not going to be \"release\" quality, and some may not "
-"even be \"beta\" quality.  We do not offer official support for them.  "
-"Any of the lab projects may get discontinued at any time."
+"In the lab we will be offering downoads ready for you to try.  Keep in mind "
+"that they are not going to be \"release\" quality, and some may not even be "
+"\"beta\" quality.  We do not offer official support for them.  Any of the "
+"lab projects may get discontinued at any time."
 msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:26
 msgid ""
-"If you are feeling adventurous we invite you to try our ideas.  We "
-"welcome your feedback at the `I2P Lab Forum`_."
+"If you are feeling adventurous we invite you to try our ideas.  We welcome "
+"your feedback at the `I2P Lab Forum`_."
 msgstr ""
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:2
@@ -8511,17 +7741,14 @@ msgstr ""
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:16
 msgid ""
-"0.9.39 includes extensive changes for the new network database types "
-"(proposal 123).\n"
-"We've bundled the i2pcontrol plugin as a webapp to support development of"
-" RPC applications.\n"
+"0.9.39 includes extensive changes for the new network database types (proposal 123).\n"
+"We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications.\n"
 "There are numerous performance improvements and bug fixes."
 msgstr ""
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:22
 msgid ""
-"We've removed the midnight and classic themes to reduce the maintenance "
-"burden;\n"
+"We've removed the midnight and classic themes to reduce the maintenance burden;\n"
 "previous users of those themes will now see the dark or light theme.\n"
 "There's also new home page icons, a first step in updating the console."
 msgstr ""
@@ -8598,14 +7825,12 @@ msgstr ""
 msgid ""
 "0.9.40 includes support for the new encrypted leaseset format.\n"
 "We disabled the old NTCP 1 transport protocol.\n"
-"There's a new SusiDNS import feature, and a new scripted filtering "
-"mechanism for incoming connections."
+"There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections."
 msgstr ""
 
 #: i2p2www/blog/2019/05/07/0.9.40-Release.rst:22
 msgid ""
-"We've made a lot of improvements to the OSX native installer, and we've "
-"updated the IzPack installer as well.\n"
+"We've made a lot of improvements to the OSX native installer, and we've updated the IzPack installer as well.\n"
 "The work continues on refreshing the console with new icons.\n"
 "As usual, we've fixed lots of bugs as well!"
 msgstr ""
@@ -8708,24 +7933,16 @@ msgid ""
 "::\n"
 "\n"
 "       What is I2P-bote?\n"
-"          I2P-bote is a private messaging system built on i2p, which has "
-"additional\n"
-"          features to make it even more difficult to discern information "
-"about the\n"
-"          messages that are transmitted. Because of this, it can be used "
-"to transmit\n"
-"          private messages securely while tolerating high latency and not"
-" relying on\n"
-"          a centralized relay to send messages when the sender goes "
-"offline. This is\n"
-"          in contrast to almost every other popular private messaging "
-"system, which\n"
-"          either require both parties to be online or rely on a semi-"
-"trusted service\n"
+"          I2P-bote is a private messaging system built on i2p, which has additional\n"
+"          features to make it even more difficult to discern information about the\n"
+"          messages that are transmitted. Because of this, it can be used to transmit\n"
+"          private messages securely while tolerating high latency and not relying on\n"
+"          a centralized relay to send messages when the sender goes offline. This is\n"
+"          in contrast to almost every other popular private messaging system, which\n"
+"          either require both parties to be online or rely on a semi-trusted service\n"
 "          which transmits messages on behalf of senders who go offline.\n"
 "\n"
-"          or, ELI5: It's used similarly to e-mail, but it suffers from "
-"none of e-mail's\n"
+"          or, ELI5: It's used similarly to e-mail, but it suffers from none of e-mail's\n"
 "          privacy defects."
 msgstr ""
 
@@ -8807,11 +8024,9 @@ msgid ""
 "   character set into binary.\n"
 "2. Second, take bytes 386 and 387 and convert them to a single\n"
 "   Big-Endian integer.\n"
-"3. Add the number you computed from the two bytes in step two to 387. "
-"This is\n"
+"3. Add the number you computed from the two bytes in step two to 387. This is\n"
 "   the length of the base64 destination.\n"
-"4. Take that nummber of bytes from the front of the full destination to "
-"get\n"
+"4. Take that nummber of bytes from the front of the full destination to get\n"
 "   the destination as a range of bytes.\n"
 "5. Convert back to a base64 representation using i2p's base64 character\n"
 "   set."
@@ -8862,8 +8077,7 @@ msgid ""
 "\n"
 "::\n"
 "\n"
-"       sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-"
-"config/i2pbote/local_dest.key"
+"       sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-config/i2pbote/local_dest.key"
 msgstr ""
 
 #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:149
@@ -8918,8 +8132,7 @@ msgid ""
 "\n"
 "Now that you've got the correct destination for your I2P-Bote node, the\n"
 "final step is to add yourself to the default peers list for `I2P-Bote\n"
-"here <https://github.com/i2p/i2p.i2p-"
-"bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n"
+"here <https://github.com/i2p/i2p.i2p-bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n"
 "here. You can do this by forking the repository, adding yourself to the\n"
 "list with your name commented out, and your 516-char destination\n"
 "directly below it, like this:"
@@ -8932,12 +8145,7 @@ msgid ""
 "::\n"
 "\n"
 "       # idk\n"
-"       QuabT3H5ljZyd-PXCQjvDzdfCec-"
-"2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-"
-"bkSo0gEhB-"
-"GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA"
-"~z0Nus-"
-"VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA"
+"       QuabT3H5ljZyd-PXCQjvDzdfCec-2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-bkSo0gEhB-GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA~z0Nus-VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA"
 msgstr ""
 
 #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:205
@@ -8958,38 +8166,25 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:10
 msgid ""
-"Although the Java I2P router comes pre-configured with a static web "
-"server,\n"
-"jetty, to provide the user's first eepSite, many require more "
-"sophisticated\n"
-"functionality from their web server and would rather create an eepSite "
-"with a\n"
-"different server. This is of course possible, and actually is really easy"
-" once\n"
+"Although the Java I2P router comes pre-configured with a static web server,\n"
+"jetty, to provide the user's first eepSite, many require more sophisticated\n"
+"functionality from their web server and would rather create an eepSite with a\n"
+"different server. This is of course possible, and actually is really easy once\n"
 "you've done it one time."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:18
 msgid ""
-"Although it is easy to do, there are a few things you should consider "
-"before\n"
-"doing it. You will want to remove identifying characteristics from your "
-"web\n"
-"server, like potentially identifying headers and default error pages that"
-"\n"
-"report the server/distro type. More information about threats to "
-"anonymity\n"
+"Although it is easy to do, there are a few things you should consider before\n"
+"doing it. You will want to remove identifying characteristics from your web\n"
+"server, like potentially identifying headers and default error pages that\n"
+"report the server/distro type. More information about threats to anonymity\n"
 "posed by improperly configured applications see:\n"
-"`Riseup here: <https://riseup.net/en/security/network-security/tor"
-"/onionservices-best-practices>`__,\n"
+"`Riseup here: <https://riseup.net/en/security/network-security/tor/onionservices-best-practices>`__,\n"
 "`Whonix Here: <https://www.whonix.org/wiki/Onion_Services>`__,\n"
-"`This blog article for some opsec fails: "
-"<https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,"
-"\n"
-"`and the I2P applications page here "
-"<https://geti2p.net/en/docs/applications/supported>`__.\n"
-"Although much of this information is expressed for Tor Onion Services, "
-"the same\n"
+"`This blog article for some opsec fails: <https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,\n"
+"`and the I2P applications page here <https://geti2p.net/en/docs/applications/supported>`__.\n"
+"Although much of this information is expressed for Tor Onion Services, the same\n"
 "procedures and principles apply to hosting applications over I2P."
 msgstr ""
 
@@ -9000,8 +8195,7 @@ msgstr ""
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:35
 msgid ""
 "Go to the I2P web interface at 127.0.0.1:7657 and open the\n"
-"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links"
-" to\n"
+"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links to\n"
 "localhost). Click the button that says \"Tunnel Wizard\" to begin."
 msgstr ""
 
@@ -9011,8 +8205,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:48
 msgid ""
-"The tunnel wizard is very simple. Since we're setting up an http "
-"*server*, all\n"
+"The tunnel wizard is very simple. Since we're setting up an http *server*, all\n"
 "we need to do is select a *server* tunnel."
 msgstr ""
 
@@ -9022,15 +8215,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:60
 msgid ""
-"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP "
-"services.\n"
+"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP services.\n"
 "It has filtering and rate-limiting features enabled that are tailored\n"
-"specifically to that purpose. A standard tunnel may work as well, but if "
-"you\n"
-"select a atandard tunnel you'll need to take care of those security "
-"features\n"
-"yourself. A more in-depth dive into the HTTP Tunnel configuration is "
-"available\n"
+"specifically to that purpose. A standard tunnel may work as well, but if you\n"
+"select a atandard tunnel you'll need to take care of those security features\n"
+"yourself. A more in-depth dive into the HTTP Tunnel configuration is available\n"
 "in the next tutorial."
 msgstr ""
 
@@ -9040,12 +8229,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:76
 msgid ""
-"For your own benefit and ability to remeber and distinguish the what you "
-"are\n"
-"using the tunnel for, give it a good nickname and description. If you "
-"need to\n"
-"come back and do more management later, then this is how you will "
-"identify the\n"
+"For your own benefit and ability to remeber and distinguish the what you are\n"
+"using the tunnel for, give it a good nickname and description. If you need to\n"
+"come back and do more management later, then this is how you will identify the\n"
 "tunnel in the hidden services manager."
 msgstr ""
 
@@ -9055,12 +8241,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:90
 msgid ""
-"In this step, you point the web server at the TCP port where your web "
-"server is\n"
-"listening. Since most web servers listen on port 80 or port 8080, the "
-"example\n"
-"shows that. If you use alternate ports or virtual machines or containers "
-"to\n"
+"In this step, you point the web server at the TCP port where your web server is\n"
+"listening. Since most web servers listen on port 80 or port 8080, the example\n"
+"shows that. If you use alternate ports or virtual machines or containers to\n"
 "isolate your web services, you may need to adjust the host, port, or both."
 msgstr ""
 
@@ -9078,12 +8261,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:115
 msgid ""
-"Finally, take a look at the settings you have selected. If you approve, "
-"save\n"
-"them. If you did not choose to start the tunnel automatically, go to the "
-"hidden\n"
-"services manager and start it manually when you wish to make your service"
-"\n"
+"Finally, take a look at the settings you have selected. If you approve, save\n"
+"them. If you did not choose to start the tunnel automatically, go to the hidden\n"
+"services manager and start it manually when you wish to make your service\n"
 "available."
 msgstr ""
 
@@ -9093,10 +8273,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:129
 msgid ""
-"I2P provides a detailed panel for configuring the http server tunnel in "
-"custom\n"
-"ways. I'll finish this tutorial by walking through all of them. "
-"Eventually."
+"I2P provides a detailed panel for configuring the http server tunnel in custom\n"
+"ways. I'll finish this tutorial by walking through all of them. Eventually."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:4
@@ -9109,38 +8287,28 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:10
 msgid ""
-"This blog post is intended as a general guide to running a mirror of a "
-"clear-net\n"
-"service as an eepSite. It elaborates on the previous blog post about "
-"basic\n"
+"This blog post is intended as a general guide to running a mirror of a clear-net\n"
+"service as an eepSite. It elaborates on the previous blog post about basic\n"
 "I2PTunnel tunnels."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:16
 msgid ""
-"Unfortunately, it's probably impossible to *completely* cover all "
-"possible cases\n"
-"of making an existing web site available as an eepSite, there's simply "
-"too\n"
+"Unfortunately, it's probably impossible to *completely* cover all possible cases\n"
+"of making an existing web site available as an eepSite, there's simply too\n"
 "diverse an array of server-side software, not to mention the in-practice\n"
-"peculiarities of any particular deployment of software. Instead, I'm "
-"going to\n"
-"try and convey, as specifically as possible, the general process "
-"preparing a\n"
+"peculiarities of any particular deployment of software. Instead, I'm going to\n"
+"try and convey, as specifically as possible, the general process preparing a\n"
 "service for deployment to the eepWeb or other hidden services."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:25
 msgid ""
-"Much of this guide will be treating the reader as a conversational "
-"participant,\n"
-"in particular If I really mean it I will address the reader directly(i.e."
-" using\n"
-"\"you\" instead of \"one\") and I'll frequently head sections with "
-"questions I think\n"
+"Much of this guide will be treating the reader as a conversational participant,\n"
+"in particular If I really mean it I will address the reader directly(i.e. using\n"
+"\"you\" instead of \"one\") and I'll frequently head sections with questions I think\n"
 "the reader might be asking. This is, after all, a \"process\" that an\n"
-"administrator must consider themselves \"involved\" in just like hosting "
-"any other\n"
+"administrator must consider themselves \"involved\" in just like hosting any other\n"
 "service."
 msgstr ""
 
@@ -9150,16 +8318,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:37
 msgid ""
-"While it would be wonderful, it's probably impossible for me to put "
-"specific\n"
-"instructions for every single kind of software that one might use to host"
-" web\n"
-"sites. As such, this tutorial requires some assumptions on the part of "
-"the\n"
-"writer and some critical thinking and common sense on the part of the "
-"reader.\n"
-"To be clear, **I have assumed that the person following this tutorial "
-"is**\n"
+"While it would be wonderful, it's probably impossible for me to put specific\n"
+"instructions for every single kind of software that one might use to host web\n"
+"sites. As such, this tutorial requires some assumptions on the part of the\n"
+"writer and some critical thinking and common sense on the part of the reader.\n"
+"To be clear, **I have assumed that the person following this tutorial is**\n"
 "**already operating a clear-web service linkable to a real identity or**\n"
 "**organization** and thus is simply offering anonymous access and not\n"
 "anonymizing themselves."
@@ -9167,22 +8330,17 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:48
 msgid ""
-"Thus, **it makes no attempt whatsoever to anonymize** a connection from "
-"one\n"
-"server to another. If you want to run a new, un-linkable hidden service "
-"that\n"
-"makes server-to-server connections, additional steps will be required and"
-" will\n"
+"Thus, **it makes no attempt whatsoever to anonymize** a connection from one\n"
+"server to another. If you want to run a new, un-linkable hidden service that\n"
+"makes server-to-server connections, additional steps will be required and will\n"
 "be covered in another tutorial."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:55
 msgid ""
 "That said: If you can be sure that a *brand new service* which is *not*\n"
-"*available to the clear-web* will never make a server-to-server "
-"connection and\n"
-"will not leak server metadata in responses to clients, then services "
-"configured\n"
+"*available to the clear-web* will never make a server-to-server connection and\n"
+"will not leak server metadata in responses to clients, then services configured\n"
 "in this way will be anonymous."
 msgstr ""
 
@@ -9196,16 +8354,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:68
 msgid ""
-"In practice, your web service probably uses a number of things to enhance"
-" it's\n"
-"reliability and security. These things could be proxies, reverse proxies,"
-"\n"
-"containers, tunnels, Intrusion Detection Systems, rate-limiters, load "
-"balancers,\n"
-"among many other things. When you get started, you should go through your"
-"\n"
-"deployment and determine which software you are using, and what you are "
-"using it\n"
+"In practice, your web service probably uses a number of things to enhance it's\n"
+"reliability and security. These things could be proxies, reverse proxies,\n"
+"containers, tunnels, Intrusion Detection Systems, rate-limiters, load balancers,\n"
+"among many other things. When you get started, you should go through your\n"
+"deployment and determine which software you are using, and what you are using it\n"
 "for."
 msgstr ""
 
@@ -9215,8 +8368,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:80
 msgid ""
-"These questions should help you evaluate what parts of your software "
-"stack are\n"
+"These questions should help you evaluate what parts of your software stack are\n"
 "relevant to your I2P eepSite."
 msgstr ""
 
@@ -9226,16 +8378,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:88
 msgid ""
-"If you are using software which alters the behavior of traffic based on "
-"the IP\n"
-"address of the sender, these things will probably not work with I2P, or "
-"may work\n"
-"in complicated or unexpected ways. This is because the address will "
-"usually be\n"
-"the localhost, or at least the host where your I2P router is running. "
-"Software\n"
-"which sometimes does things based on IP addresses could be Fail2Ban, "
-"iptables,\n"
+"If you are using software which alters the behavior of traffic based on the IP\n"
+"address of the sender, these things will probably not work with I2P, or may work\n"
+"in complicated or unexpected ways. This is because the address will usually be\n"
+"the localhost, or at least the host where your I2P router is running. Software\n"
+"which sometimes does things based on IP addresses could be Fail2Ban, iptables,\n"
 "and similar applications."
 msgstr ""
 
@@ -9245,10 +8392,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:100
 msgid ""
-"Some software may be configured to add information to the traffic it "
-"handles.\n"
-"Obviously, if this information is identifying it should not be part of "
-"the chain\n"
+"Some software may be configured to add information to the traffic it handles.\n"
+"Obviously, if this information is identifying it should not be part of the chain\n"
 "of services that is exposed to the I2P network."
 msgstr ""
 
@@ -9260,37 +8405,27 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:109
 msgid ""
-"Some software may also draw from remote resources, to find up-to-date "
-"rules and\n"
-"block lists which can be used to prevent attacks. Some of these might be "
-"useful\n"
-"as part of the service that is exposed to I2P, but you should make sure "
-"that the\n"
-"rules are applicable and that a rules update cannot be triggered as a "
-"result of\n"
-"a normal client request. This would create a server-to-server "
-"communication\n"
+"Some software may also draw from remote resources, to find up-to-date rules and\n"
+"block lists which can be used to prevent attacks. Some of these might be useful\n"
+"as part of the service that is exposed to I2P, but you should make sure that the\n"
+"rules are applicable and that a rules update cannot be triggered as a result of\n"
+"a normal client request. This would create a server-to-server communication\n"
 "which could reveal the timing of an I2P communication to a third party."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:118
 msgid ""
-"Step two: Determine which port to Forward to I2P and Optionally locate "
-"your TLS certificate"
+"Step two: Determine which port to Forward to I2P and Optionally locate your "
+"TLS certificate"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:121
 msgid ""
-"Now you've gathered all the information that you will require to forward "
-"your\n"
-"service to I2P. Once you've selected the point at which you would like to"
-" make\n"
-"your site available to I2P, you will need to note the port you wish to "
-"foward.\n"
-"In simple scenarios, this will probably just be port 80 or port 8080. In "
-"more\n"
-"sophisticated scenarios, this might be a reverse proxy or something like "
-"that.\n"
+"Now you've gathered all the information that you will require to forward your\n"
+"service to I2P. Once you've selected the point at which you would like to make\n"
+"your site available to I2P, you will need to note the port you wish to foward.\n"
+"In simple scenarios, this will probably just be port 80 or port 8080. In more\n"
+"sophisticated scenarios, this might be a reverse proxy or something like that.\n"
 "Make a note of the port."
 msgstr ""
 
@@ -9300,18 +8435,12 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:133
 msgid ""
-"Should you be a non-anonymous organization that wishes to provide "
-"enhanced\n"
-"privacy to your users by providing a hidden service, you may wish to "
-"establish\n"
-"a common identity between versions of your site. However, since we can't "
-"add\n"
-"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we "
-"have to do\n"
-"this in another way. To do this, **even if you are forwarding the HTTP "
-"port**\n"
-"**and not HTTPS**, make a note of the location of your TLS certificate "
-"for use\n"
+"Should you be a non-anonymous organization that wishes to provide enhanced\n"
+"privacy to your users by providing a hidden service, you may wish to establish\n"
+"a common identity between versions of your site. However, since we can't add\n"
+"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we have to do\n"
+"this in another way. To do this, **even if you are forwarding the HTTP port**\n"
+"**and not HTTPS**, make a note of the location of your TLS certificate for use\n"
 "in the final step."
 msgstr ""
 
@@ -9321,10 +8450,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:146
 msgid ""
-"Congratulations! You've completed the most difficult part. From here on, "
-"the\n"
-"decisions you must make, and the consequences that they will have, are "
-"much\n"
+"Congratulations! You've completed the most difficult part. From here on, the\n"
+"decisions you must make, and the consequences that they will have, are much\n"
 "more straightforward and easy to enumerate. Such is the beauty of a\n"
 "cryptographically secure network layer like I2P!"
 msgstr ""
@@ -9336,20 +8463,13 @@ msgstr ""
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:158
 msgid ""
 "For eepSites, you will need to create an HTTP Server Tunnel. This is\n"
-"an I2P destination with a few special features for hosting HTTP services "
-"to\n"
-"enable things like rate-limiting, filtering, and the inclusion of headers"
-" to\n"
-"identify the destination of the client to the server. These enable "
-"flexibility\n"
-"in how you handle connections in terms of load-balancing and rate-"
-"limiting on\n"
-"a case-by-case basis, among other things. Explore these options and how "
-"they\n"
-"relate to the applications which you considered in step one, even though "
-"a very\n"
-"simple setup is easy, larger sites may benefit from taking advantage of "
-"these\n"
+"an I2P destination with a few special features for hosting HTTP services to\n"
+"enable things like rate-limiting, filtering, and the inclusion of headers to\n"
+"identify the destination of the client to the server. These enable flexibility\n"
+"in how you handle connections in terms of load-balancing and rate-limiting on\n"
+"a case-by-case basis, among other things. Explore these options and how they\n"
+"relate to the applications which you considered in step one, even though a very\n"
+"simple setup is easy, larger sites may benefit from taking advantage of these\n"
 "features."
 msgstr ""
 
@@ -9359,98 +8479,70 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:173
 msgid ""
-"If you've configured a reverse proxy or an SSH tunnel before, then the "
-"general\n"
+"If you've configured a reverse proxy or an SSH tunnel before, then the general\n"
 "idea here should be very familiar to you. I2PTunnel, in essence, is just\n"
-"forwarding ports from the host to the I2P Network. To set this up using "
-"the web\n"
+"forwarding ports from the host to the I2P Network. To set this up using the web\n"
 "interface, go to the I2PTunnel configuration page."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:180
 msgid ""
-"At the bottom of the \"I2P Hidden Services\" section of the page, select "
-"an HTTP\n"
+"At the bottom of the \"I2P Hidden Services\" section of the page, select an HTTP\n"
 "Service from the drop-down and click \"Create.\""
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:189
 msgid ""
-"It will immediately drop you into the granular tunnel configuration page,"
-" which\n"
-"we're about to explore from top-to-bottom. The first, most essential "
-"settings\n"
-"are the tunnel name and the target host:port. **The target host:port is**"
-"\n"
-"**the place where you input the address of the service you are forwarding"
-" to**\n"
-"**I2P**. Once you've configured that, your web site will become available"
-" over\n"
+"It will immediately drop you into the granular tunnel configuration page, which\n"
+"we're about to explore from top-to-bottom. The first, most essential settings\n"
+"are the tunnel name and the target host:port. **The target host:port is**\n"
+"**the place where you input the address of the service you are forwarding to**\n"
+"**I2P**. Once you've configured that, your web site will become available over\n"
 "i2p. However, there are probably a few things that we can improve."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:202
 msgid ""
-"Next, you may want to pick a hostname to use for your eepSite. This "
-"hostname\n"
-"doesn't need to be universally unique, for now, it will only be used "
-"locally.\n"
-"We'll publish it to an address helper later. **If** the *Local "
-"Destination*\n"
-"field isn't populated with your Base64 Destination yet, you should scroll"
-" down\n"
+"Next, you may want to pick a hostname to use for your eepSite. This hostname\n"
+"doesn't need to be universally unique, for now, it will only be used locally.\n"
+"We'll publish it to an address helper later. **If** the *Local Destination*\n"
+"field isn't populated with your Base64 Destination yet, you should scroll down\n"
 "to the bottom, save the tunnel configuration, and return to the tunnel\n"
 "configuration."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:215
 msgid ""
-"A little further down the configuration page, the tunnel options are "
-"available.\n"
-"Since you've got a site which is not intended to be anonymous, but rather"
-" to\n"
-"provide anonymous access to others by an alternate gateway, it may be "
-"good to\n"
+"A little further down the configuration page, the tunnel options are available.\n"
+"Since you've got a site which is not intended to be anonymous, but rather to\n"
+"provide anonymous access to others by an alternate gateway, it may be good to\n"
 "reduce the number of hops the tunnel takes on the I2P network."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:226
 msgid ""
-"Next are the encrypted leaseset options. You can probably leave these as "
-"the\n"
-"defaults, since your site isn't anonymous it probably doesn't need "
-"features like\n"
-"blinding or encrypted leasesets. If you were to choose encrypted "
-"leasesets, you\n"
-"would not be accessible to anyone unless you shared a key with them in "
-"advance."
+"Next are the encrypted leaseset options. You can probably leave these as the\n"
+"defaults, since your site isn't anonymous it probably doesn't need features like\n"
+"blinding or encrypted leasesets. If you were to choose encrypted leasesets, you\n"
+"would not be accessible to anyone unless you shared a key with them in advance."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:237
 msgid ""
-"The next few parts may be especially useful to you if you run a high-"
-"traffic\n"
-"site or find yourself subject to DDOS attacks. Here you can configure "
-"various\n"
+"The next few parts may be especially useful to you if you run a high-traffic\n"
+"site or find yourself subject to DDOS attacks. Here you can configure various\n"
 "kinds of connection limits."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:247
 msgid ""
-"After that, there are a few other ways of filtering connections by client"
-"\n"
-"characteristics. First, you can block access via inproxies like I2P.to "
-"and\n"
-"similar. Since you have a clearnet presence already, changing this may be"
-" better\n"
-"if you want to encourage I2P users to only use your eepSite. You can also"
-" block\n"
-"accesses via specific user-agents, for instance blocking wget may be "
-"helpful if\n"
-"you want to prevent spidering. Finally, and of particular interest to "
-"Fail2Ban\n"
-"users, the \"Unique local address per client\" will give each client it's"
-" own\n"
+"After that, there are a few other ways of filtering connections by client\n"
+"characteristics. First, you can block access via inproxies like I2P.to and\n"
+"similar. Since you have a clearnet presence already, changing this may be better\n"
+"if you want to encourage I2P users to only use your eepSite. You can also block\n"
+"accesses via specific user-agents, for instance blocking wget may be helpful if\n"
+"you want to prevent spidering. Finally, and of particular interest to Fail2Ban\n"
+"users, the \"Unique local address per client\" will give each client it's own\n"
 "local IP address instead of them all appearing to the server to be from\n"
 "127.0.0.1."
 msgstr ""
@@ -9461,10 +8553,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:271
 msgid ""
-"Lastly, you can set up an advanced filter definition. Writing filters is "
-"beyond\n"
-"what I'm prepared to do in this document, for more information see the "
-"format\n"
+"Lastly, you can set up an advanced filter definition. Writing filters is beyond\n"
+"what I'm prepared to do in this document, for more information see the format\n"
 "specification for now."
 msgstr ""
 
@@ -9474,22 +8564,16 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:284
 msgid ""
-"One interesting thing that I2P can do is host the same site on multiple "
-"servers\n"
-"at the same time transparently, which is referred to as \"Multihoming.\" "
-"In order\n"
-"to multihome your application, you will need to return to the tunnel menu"
-" and\n"
-"change the location of your private key file to it's own, non-shared "
-"location."
+"One interesting thing that I2P can do is host the same site on multiple servers\n"
+"at the same time transparently, which is referred to as \"Multihoming.\" In order\n"
+"to multihome your application, you will need to return to the tunnel menu and\n"
+"change the location of your private key file to it's own, non-shared location."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:295
 msgid ""
-"When you're done, copy the new key file for your new multihomed service "
-"to a\n"
-"storage device. Now, you can re-produce your service/tunnel configuration"
-" with\n"
+"When you're done, copy the new key file for your new multihomed service to a\n"
+"storage device. Now, you can re-produce your service/tunnel configuration with\n"
 "those same keys on any I2P router and increase your service's redundancy."
 msgstr ""
 
@@ -9499,11 +8583,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:304
 msgid ""
-"Since you're running an anonymously accessible instance of an existing "
-"clear-net\n"
+"Since you're running an anonymously accessible instance of an existing clear-net\n"
 "service, you'll probably want to leverage some existing form of trust to\n"
-"distribute your eepSite URL, like a TLS Certificate signed by a "
-"recognized and\n"
+"distribute your eepSite URL, like a TLS Certificate signed by a recognized and\n"
 "reputable authority. What can I say we live in an imperfect world."
 msgstr ""
 
@@ -9513,29 +8595,23 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:316
 msgid ""
-"The simplest way to provide a link to your eepSite using an existing site"
-" to\n"
-"distribute the link is to distribute a so-called \"Base32\" address. The "
-"Base32\n"
-"address is the hash of the public key of your I2P destination, so it "
-"cannot be\n"
-"forged if it is provided by a reliable source. In the case of a clear-net"
-" site\n"
+"The simplest way to provide a link to your eepSite using an existing site to\n"
+"distribute the link is to distribute a so-called \"Base32\" address. The Base32\n"
+"address is the hash of the public key of your I2P destination, so it cannot be\n"
+"forged if it is provided by a reliable source. In the case of a clear-net site\n"
 "with a hidden service presence, one of those places is likely to be that\n"
 "clear-net site."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:325
 msgid ""
-"Your base32 address is visible on the main i2ptunnel configuration page "
-"and it\n"
+"Your base32 address is visible on the main i2ptunnel configuration page and it\n"
 "looks like this:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:334
 msgid ""
-"Your users can copy-and-paste this link directly into their I2P browsers "
-"and\n"
+"Your users can copy-and-paste this link directly into their I2P browsers and\n"
 "it will just work, no additional configuration required."
 msgstr ""
 
@@ -9545,17 +8621,12 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:342
 msgid ""
-"You can also distribute a human-readable link to suggest to your "
-"potential users\n"
-"by taking advantage of I2P's \"Address Book\" feature, which allows the "
-"users to\n"
+"You can also distribute a human-readable link to suggest to your potential users\n"
+"by taking advantage of I2P's \"Address Book\" feature, which allows the users to\n"
 "decide to assign a human-readable domain name to your cryptographically\n"
-"assured identity. You can do this by distributing a specially crafted "
-"link\n"
-"containing the domain name that you want to suggest, followed by a slash,"
-"\n"
-"followed by ?i2paddresshelper=, followed by the Local Destination of the "
-"tunnel\n"
+"assured identity. You can do this by distributing a specially crafted link\n"
+"containing the domain name that you want to suggest, followed by a slash,\n"
+"followed by ?i2paddresshelper=, followed by the Local Destination of the tunnel\n"
 "you just created, which you can see here:"
 msgstr ""
 
@@ -9565,14 +8636,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:364
 msgid ""
-"I keep saying suggest because when the such a link is visited, I2P asks "
-"for the\n"
-"user's consent to add this human-readable name to the user's local "
-"address book.\n"
-"That means there is no expectation that this domain be universally agreed"
-" upon\n"
-"by all visitors on the I2P network, whereas in the case of base32 "
-"addresses,\n"
+"I keep saying suggest because when the such a link is visited, I2P asks for the\n"
+"user's consent to add this human-readable name to the user's local address book.\n"
+"That means there is no expectation that this domain be universally agreed upon\n"
+"by all visitors on the I2P network, whereas in the case of base32 addresses,\n"
 "the opposite is true."
 msgstr ""
 
@@ -9582,16 +8649,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:375
 msgid ""
-"Nonetheless, there do exist publicly available address subscription "
-"feeds, and\n"
-"special services for discovering new human-readable addresses, such as "
-"no.i2p,\n"
-"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or "
-"Jump\n"
-"Services, and can also be subscribed to automatically. This may be "
-"espescially\n"
-"helpful to users of your service who wish to acquire the address without "
-"leaving\n"
+"Nonetheless, there do exist publicly available address subscription feeds, and\n"
+"special services for discovering new human-readable addresses, such as no.i2p,\n"
+"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or Jump\n"
+"Services, and can also be subscribed to automatically. This may be espescially\n"
+"helpful to users of your service who wish to acquire the address without leaving\n"
 "I2P or visiting your clearnet service."
 msgstr ""
 
@@ -9609,10 +8671,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:405
 msgid ""
-"Most of the security issues of hosting Tor hidden services also apply to "
-"I2P. It\n"
-"would be advisable to take advantage of their resources as well as this "
-"one:"
+"Most of the security issues of hosting Tor hidden services also apply to I2P. It\n"
+"would be advisable to take advantage of their resources as well as this one:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:410
@@ -9665,27 +8725,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:10
 msgid ""
-"This is a tutorial on how to set up and tweak an I2P tunnel in order to "
-"use it\n"
-"to access an SSH server remotely, using either I2P or i2pd. For now, it "
-"assumes\n"
-"you will install your SSH server from a package manager and that it's "
-"running\n"
+"This is a tutorial on how to set up and tweak an I2P tunnel in order to use it\n"
+"to access an SSH server remotely, using either I2P or i2pd. For now, it assumes\n"
+"you will install your SSH server from a package manager and that it's running\n"
 "as a service."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:17
 msgid ""
-"Considerations: In this guide, I'm assuming a few things. They will need "
-"to be\n"
-"adjusted depending on the complications that arise in your particular "
-"setup,\n"
-"especially if you use VM's or containers for isolation. This assumes that"
-" the\n"
-"I2P router and the ssh server are running on the same localhost. You "
-"should be\n"
-"using newly-generated SSH host keys, either by using a freshly installed "
-"sshd,\n"
+"Considerations: In this guide, I'm assuming a few things. They will need to be\n"
+"adjusted depending on the complications that arise in your particular setup,\n"
+"especially if you use VM's or containers for isolation. This assumes that the\n"
+"I2P router and the ssh server are running on the same localhost. You should be\n"
+"using newly-generated SSH host keys, either by using a freshly installed sshd,\n"
 "or by deleting old keys and forcing their re-generation. For example:"
 msgstr ""
 
@@ -9700,9 +8752,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:41
 msgid ""
-"Using java I2P's web interface, navigate to the (Links to your Router "
-"Console)\\ `Hidden Services Manager "
-"<http://127.0.0.1:7657/i2ptunnelmgr>`__\n"
+"Using java I2P's web interface, navigate to the (Links to your Router Console)\\ `Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\n"
 "and start the tunnel wizard."
 msgstr ""
 
@@ -9713,15 +8763,13 @@ msgstr "Creazione guidata tunnel"
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:49
 msgid ""
-"Since you are setting up this tunnel for the SSH server, you need to "
-"select the\n"
+"Since you are setting up this tunnel for the SSH server, you need to select the\n"
 "\"Server\" tunnel type."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:58
 msgid ""
-"You should fine-tune it later, but the Standard tunnel type is easiest to"
-" start\n"
+"You should fine-tune it later, but the Standard tunnel type is easiest to start\n"
 "with."
 msgstr ""
 
@@ -9744,23 +8792,17 @@ msgstr "Impostazioni Avanzate"
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:92
 msgid ""
-"Now head back over the the Hidden Services Manager, and look over the "
-"available\n"
-"advanced settings. One thing you'll definitely want to change is to set "
-"it up\n"
+"Now head back over the the Hidden Services Manager, and look over the available\n"
+"advanced settings. One thing you'll definitely want to change is to set it up\n"
 "for interactive connections intstead of bulk connections."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:102
 msgid ""
-"Besides that, these other options can affect performance when accessing "
-"your SSH\n"
-"server. If you aren't that concerned about your anonymity, then you could"
-" reduce\n"
-"the number of hops you take. If you have trouble with speed, a higher "
-"tunnel\n"
-"count might help. A few backup tunnels are probably a good idea. You "
-"might have\n"
+"Besides that, these other options can affect performance when accessing your SSH\n"
+"server. If you aren't that concerned about your anonymity, then you could reduce\n"
+"the number of hops you take. If you have trouble with speed, a higher tunnel\n"
+"count might help. A few backup tunnels are probably a good idea. You might have\n"
 "to dial-it-in a bit."
 msgstr ""
 
@@ -9770,10 +8812,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:118
 msgid ""
-"Another interesting setting, especially if you choose to run a high "
-"number of\n"
-"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels "
-"that run\n"
+"Another interesting setting, especially if you choose to run a high number of\n"
+"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels that run\n"
 "when the serve has experienced extended inactivity."
 msgstr ""
 
@@ -9784,12 +8824,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:131
 msgid ""
-"With i2pd, all configuration is done with files instead of via a web "
-"interface.\n"
-"In order to configure an SSH Service tunnel for i2pd, tweak the following"
-"\n"
-"example settings to your anonymity and performance needs and copy them "
-"into\n"
+"With i2pd, all configuration is done with files instead of via a web interface.\n"
+"In order to configure an SSH Service tunnel for i2pd, tweak the following\n"
+"example settings to your anonymity and performance needs and copy them into\n"
 "tunnels.conf"
 msgstr ""
 
@@ -9803,21 +8840,16 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:158
 msgid ""
-"Depending on how you want to access your SSH Server, you may want to make"
-" a few\n"
-"changes to the settings. Besides the obvious SSH hardening stuff you "
-"should do\n"
-"on all SSH servers(Public-Key Authentication, no login as root, etc), if "
-"you\n"
-"don't want your SSH server to listen on any addresses except your server "
-"tunnel,\n"
+"Depending on how you want to access your SSH Server, you may want to make a few\n"
+"changes to the settings. Besides the obvious SSH hardening stuff you should do\n"
+"on all SSH servers(Public-Key Authentication, no login as root, etc), if you\n"
+"don't want your SSH server to listen on any addresses except your server tunnel,\n"
 "you should change AddressFamily to inet and ListenAddress to 127.0.0.1."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:171
 msgid ""
-"If you choose to use a port other than 22 for your SSH server, you will "
-"need to\n"
+"If you choose to use a port other than 22 for your SSH server, you will need to\n"
 "change the port in your I2P tunnel configuration."
 msgstr ""
 
@@ -9827,27 +8859,22 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:179
 msgid ""
-"You will need to be able to see the I2P router console of the SSH server "
-"in\n"
-"order to configure your client connection. One neat thing about this "
-"setup is\n"
+"You will need to be able to see the I2P router console of the SSH server in\n"
+"order to configure your client connection. One neat thing about this setup is\n"
 "that the initial connection to the I2P tunnel is authenticated, somewhat\n"
-"reducing the risk of your initial connection to the SSH server being "
-"MITM'ed,\n"
+"reducing the risk of your initial connection to the SSH server being MITM'ed,\n"
 "as is a risk in Trust-On-First-Use scenarios."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:197
 msgid ""
-"First, start the tunnel configuration wizard from the hidden services "
-"manager\n"
+"First, start the tunnel configuration wizard from the hidden services manager\n"
 "and select a client tunnel."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:206
 msgid ""
-"Next, select the standard tunnel type. You will fine-tune this "
-"configuration\n"
+"Next, select the standard tunnel type. You will fine-tune this configuration\n"
 "later."
 msgstr ""
 
@@ -9857,27 +8884,22 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:223
 msgid ""
-"This is the only slightly tricky part. Go to the hidden services manager "
-"of the\n"
-"I2P router console and find the base64 \"local destination\" of the SSH "
-"server\n"
-"tunnel. You'll need to find a way to copy this information into the next "
-"step.\n"
+"This is the only slightly tricky part. Go to the hidden services manager of the\n"
+"I2P router console and find the base64 \"local destination\" of the SSH server\n"
+"tunnel. You'll need to find a way to copy this information into the next step.\n"
 "I generally `Tox <https://tox.chat>`__ it to myself, any off-the-record\n"
 "should be sufficient for most people."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:235
 msgid ""
-"Once you've found the base64 destination you want to connect to "
-"transmitted to\n"
+"Once you've found the base64 destination you want to connect to transmitted to\n"
 "your client device, then paste it into the client destination field."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:244
 msgid ""
-"Lastly, set a local port to connect your ssh client to. This will local "
-"port\n"
+"Lastly, set a local port to connect your ssh client to. This will local port\n"
 "will be connected to the base64 destination and thus the SSH server."
 msgstr ""
 
@@ -9887,19 +8909,15 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:266
 msgid ""
-"Like before, you'll want to change the settings to be optimized for "
-"interactive\n"
-"connections. Additionally, if you want to set up client whiteliting on "
-"the\n"
-"server, you should check the \"Generate key to enable persistent client "
-"tunnel\n"
+"Like before, you'll want to change the settings to be optimized for interactive\n"
+"connections. Additionally, if you want to set up client whiteliting on the\n"
+"server, you should check the \"Generate key to enable persistent client tunnel\n"
 "identity\" radial button."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:282
 msgid ""
-"You can set this up by adding the following lines to your tunnels.conf "
-"and\n"
+"You can set this up by adding the following lines to your tunnels.conf and\n"
 "adjust it for your performance/anonymity needs."
 msgstr ""
 
@@ -9913,14 +8931,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:309
 msgid ""
-"There are lots of ways to set up an SSH client to connect to your server "
-"on I2P,\n"
-"but there are a few things you should do to secure your SSH client for "
-"anonymous\n"
-"use. First, you should configure it to only identify itself to SSH server"
-" with\n"
-"a single, specific key so that you don't risk contaminating your "
-"anonymous and\n"
+"There are lots of ways to set up an SSH client to connect to your server on I2P,\n"
+"but there are a few things you should do to secure your SSH client for anonymous\n"
+"use. First, you should configure it to only identify itself to SSH server with\n"
+"a single, specific key so that you don't risk contaminating your anonymous and\n"
 "non-anonymous SSH connections."
 msgstr ""
 
@@ -9930,8 +8944,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:328
 msgid ""
-"Alternatively, you could make a .bash_alias entry to enforce your options"
-" and\n"
+"Alternatively, you could make a .bash_alias entry to enforce your options and\n"
 "automatically connect to I2P. You get the idea, you need to enforce\n"
 "IdentitiesOnly and provide an identity file."
 msgstr ""
@@ -9942,26 +8955,21 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:343
 msgid ""
-"This is more-or-less optional, but it's pretty cool and will prevent "
-"anyone who\n"
-"happens to come across your destination from being able to tell you are "
-"hosting\n"
+"This is more-or-less optional, but it's pretty cool and will prevent anyone who\n"
+"happens to come across your destination from being able to tell you are hosting\n"
 "an SSH service."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:349
 msgid ""
-"First, retrieve the persistent client tunnel destination and transmit it "
-"to the\n"
+"First, retrieve the persistent client tunnel destination and transmit it to the\n"
 "server."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:358
 msgid ""
-"Add the client's base64 destination to the server's destination "
-"whitelist. Now\n"
-"you'll only be able to connect to the server tunnel from that specific "
-"client\n"
+"Add the client's base64 destination to the server's destination whitelist. Now\n"
+"you'll only be able to connect to the server tunnel from that specific client\n"
 "tunnel and no one else will be able to connect to that destination."
 msgstr ""
 
@@ -9979,28 +8987,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:12
 msgid ""
-"One of the best features of I2P, in my opinion, is it's SAM API, which "
-"can be\n"
-"used to build a bridge between I2P and your application or language of "
-"choice.\n"
-"Currently, dozens of SAM libraries exist for a variety of languages, "
-"including:"
+"One of the best features of I2P, in my opinion, is it's SAM API, which can be\n"
+"used to build a bridge between I2P and your application or language of choice.\n"
+"Currently, dozens of SAM libraries exist for a variety of languages, including:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:32
 msgid ""
-"If you're using any of these languages, you may be able to port your "
-"application\n"
-"to I2P already, using an existing library. That's not what this tutorial "
-"is\n"
-"about, though. This tutorial is about what to do if you want to create a "
-"SAM\n"
-"library in a new language. In this tutorial, I will implement a new SAM "
-"library\n"
-"in Java. I chose Java because there isn't a Java library that connects "
-"you to\n"
-"SAM yet, because of Java's use in Android, and because it's a language "
-"almost\n"
+"If you're using any of these languages, you may be able to port your application\n"
+"to I2P already, using an existing library. That's not what this tutorial is\n"
+"about, though. This tutorial is about what to do if you want to create a SAM\n"
+"library in a new language. In this tutorial, I will implement a new SAM library\n"
+"in Java. I chose Java because there isn't a Java library that connects you to\n"
+"SAM yet, because of Java's use in Android, and because it's a language almost\n"
 "everybody has at least a *little* experience with, so hopefully you can\n"
 "translate it into a language of your choice."
 msgstr ""
@@ -10011,10 +9010,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:46
 msgid ""
-"How you set up your own library will vary depending on the language you "
-"wish\n"
-"to use. For this example library, we'll be using java so we can create a "
-"library\n"
+"How you set up your own library will vary depending on the language you wish\n"
+"to use. For this example library, we'll be using java so we can create a library\n"
 "like this:"
 msgstr ""
 
@@ -10028,10 +9025,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:69
 msgid ""
-"There are a few pieces of data that almost any SAM library should "
-"probably\n"
-"manage. It will at least need to store the address of the SAM Bridge you "
-"intend\n"
+"There are a few pieces of data that almost any SAM library should probably\n"
+"manage. It will at least need to store the address of the SAM Bridge you intend\n"
 "to use and the signature type you wish to use."
 msgstr ""
 
@@ -10041,8 +9036,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:78
 msgid ""
-"I prefer to store the SAM address as a String and an Integer, and re-"
-"combine\n"
+"I prefer to store the SAM address as a String and an Integer, and re-combine\n"
 "them in a function at runtime."
 msgstr ""
 
@@ -10052,15 +9046,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:94
 msgid ""
-"The valid signature types for an I2P Tunnel are DSA_SHA1, "
-"ECDSA_SHA256_P256,\n"
+"The valid signature types for an I2P Tunnel are DSA_SHA1, ECDSA_SHA256_P256,\n"
 "ECDSA_SHA384_P384, ECDSA_SHA512_P521, EdDSA_SHA512_Ed25519, but it is\n"
-"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if "
-"you\n"
-"implement at least SAM 3.1. In java, the 'enum' datastructure lends "
-"itself to\n"
-"this task, as it is intended to contain a group of constants. Add the "
-"enum, and\n"
+"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if you\n"
+"implement at least SAM 3.1. In java, the 'enum' datastructure lends itself to\n"
+"this task, as it is intended to contain a group of constants. Add the enum, and\n"
 "an instance of the enum, to your java class definition."
 msgstr ""
 
@@ -10071,8 +9061,7 @@ msgstr ""
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:117
 msgid ""
 "That takes care of reliably storing the signature type in use by the SAM\n"
-"connection, but you've still got to retrieve it as a string to "
-"communicate it\n"
+"connection, but you've still got to retrieve it as a string to communicate it\n"
 "to the bridge."
 msgstr ""
 
@@ -10082,10 +9071,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:156
 msgid ""
-"Once that's done, begin creating your constructor. Note that we've given "
-"our\n"
-"library defaults which will be useful in default situations on all "
-"existing I2P\n"
+"Once that's done, begin creating your constructor. Note that we've given our\n"
+"library defaults which will be useful in default situations on all existing I2P\n"
 "routers so far."
 msgstr ""
 
@@ -10095,14 +9082,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:173
 msgid ""
-"Finally, the good part. Interaction with the SAM bridge is done by "
-"sending a\n"
-"\"command\" to the address of the SAM bridge, and you can parse the "
-"result of the\n"
-"command as a set of string-based key-value pairs. So bearing that in "
-"mind, let's\n"
-"estabish a read-write connection to the SAM Address we defined before, "
-"then\n"
+"Finally, the good part. Interaction with the SAM bridge is done by sending a\n"
+"\"command\" to the address of the SAM bridge, and you can parse the result of the\n"
+"command as a set of string-based key-value pairs. So bearing that in mind, let's\n"
+"estabish a read-write connection to the SAM Address we defined before, then\n"
 "write a \"CommandSAM\" Function and a reply parser."
 msgstr ""
 
@@ -10112,17 +9095,14 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:184
 msgid ""
-"We're communicating with SAM via a Socket, so in order to connect to, "
-"read from,\n"
-"and write to the socket, you'll need to create the following private "
-"variables\n"
+"We're communicating with SAM via a Socket, so in order to connect to, read from,\n"
+"and write to the socket, you'll need to create the following private variables\n"
 "in the Jsam class:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:196
 msgid ""
-"You will also want to instantiate those variables in your Constructors by"
-"\n"
+"You will also want to instantiate those variables in your Constructors by\n"
 "creating a function to do so."
 msgstr ""
 
@@ -10132,23 +9112,17 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:222
 msgid ""
-"Now you're all set up to finally start talking to SAM. In order to keep "
-"things\n"
-"nicely organized, let's create a function which sends a single command to"
-" SAM,\n"
-"terminated by a newline, and which returns a Reply object, which we will "
-"create\n"
+"Now you're all set up to finally start talking to SAM. In order to keep things\n"
+"nicely organized, let's create a function which sends a single command to SAM,\n"
+"terminated by a newline, and which returns a Reply object, which we will create\n"
 "in the next step:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:241
 msgid ""
-"Note that we are using the writer and reader we created from the socket "
-"in the\n"
-"previous step as our inputs and outputs to the socket. When we get a "
-"reply from\n"
-"the reader, we pass the string to the Reply constructor, which parses it "
-"and\n"
+"Note that we are using the writer and reader we created from the socket in the\n"
+"previous step as our inputs and outputs to the socket. When we get a reply from\n"
+"the reader, we pass the string to the Reply constructor, which parses it and\n"
 "returns the Reply object."
 msgstr ""
 
@@ -10159,37 +9133,29 @@ msgstr ""
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:253
 msgid ""
 "In order to more easily handle replies, we'll use a Reply object to\n"
-"automatically parse the results we get from the SAM bridge. A reply has "
-"at least\n"
-"a topic, a type, and a result, as well as an arbitrary number of key-"
-"value\n"
+"automatically parse the results we get from the SAM bridge. A reply has at least\n"
+"a topic, a type, and a result, as well as an arbitrary number of key-value\n"
 "pairs."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:268
 msgid ""
-"As you can see, we will be storing the \"result\" as an enum, "
-"REPLY_TYPES. This\n"
-"enum contains all the possible reply results which the SAM bridge might "
-"respond\n"
+"As you can see, we will be storing the \"result\" as an enum, REPLY_TYPES. This\n"
+"enum contains all the possible reply results which the SAM bridge might respond\n"
 "with."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:335
 msgid ""
-"Now let's create our constructor, which takes the reply string recieved "
-"from the\n"
-"socket as a parameter, parses it, and uses the information to set up the "
-"reply\n"
-"object. The reply is space-delimited, with key-value pairs joined by an "
-"equal\n"
+"Now let's create our constructor, which takes the reply string recieved from the\n"
+"socket as a parameter, parses it, and uses the information to set up the reply\n"
+"object. The reply is space-delimited, with key-value pairs joined by an equal\n"
 "sign and terminated by a newline."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:364
 msgid ""
-"Lastly, for the sake of convenience, let's give the reply object a "
-"toString()\n"
+"Lastly, for the sake of convenience, let's give the reply object a toString()\n"
 "function which returns a string representation of the Reply object."
 msgstr ""
 
@@ -10199,30 +9165,21 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:379
 msgid ""
-"Now we're ready to establish communication with SAM by sending a "
-"\"Hello\"\n"
-"message. If you're writing a new SAM library, you should probably target "
-"at\n"
-"least SAM 3.1, since it's available in both I2P and i2pd and introduces "
-"support\n"
+"Now we're ready to establish communication with SAM by sending a \"Hello\"\n"
+"message. If you're writing a new SAM library, you should probably target at\n"
+"least SAM 3.1, since it's available in both I2P and i2pd and introduces support\n"
 "for the SIGNATURE_TYPE parameter."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:397
 msgid ""
-"As you can see, we use the CommandSAM function we created before to send "
-"the\n"
-"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This "
-"tells\n"
-"SAM that you want to start communicating with the API, and that you know "
-"how\n"
+"As you can see, we use the CommandSAM function we created before to send the\n"
+"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This tells\n"
+"SAM that you want to start communicating with the API, and that you know how\n"
 "to speak SAM version 3.0 and 3.1. The router, in turn, will respond with\n"
-"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass"
-" to\n"
-"the Reply constructor to get a valid Reply object. From now on, we can "
-"use our\n"
-"CommandSAM function and Reply object to deal with all our communication "
-"across\n"
+"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass to\n"
+"the Reply constructor to get a valid Reply object. From now on, we can use our\n"
+"CommandSAM function and Reply object to deal with all our communication across\n"
 "the SAM bridge."
 msgstr ""
 
@@ -10232,66 +9189,46 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:423
 msgid ""
-"Now that you've negotiated your connection to SAM and agreed on a SAM "
-"version\n"
-"you both speak, you can set up peer-to-peer connections for your "
-"application\n"
-"to connect to other i2p applications. You do this by sending a \"SESSION "
-"CREATE\"\n"
-"command to the SAM Bridge. To do that, we'll use a CreateSession function"
-" that\n"
+"Now that you've negotiated your connection to SAM and agreed on a SAM version\n"
+"you both speak, you can set up peer-to-peer connections for your application\n"
+"to connect to other i2p applications. You do this by sending a \"SESSION CREATE\"\n"
+"command to the SAM Bridge. To do that, we'll use a CreateSession function that\n"
 "accepts a session ID and a destination type parameter."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:444
 msgid ""
-"That was easy, right? All we had to do was adapt the pattern we used in "
-"our\n"
-"HelloSAM function to the ``SESSION CREATE`` command. A good reply from "
-"the\n"
-"bridge will still return OK, and in that case we return the ID of the "
-"newly\n"
-"created SAM connection. Otherwise, we return an empty string because "
-"that's an\n"
-"invalid ID anyway and it failed, so it's easy to check. Let's see if this"
-"\n"
+"That was easy, right? All we had to do was adapt the pattern we used in our\n"
+"HelloSAM function to the ``SESSION CREATE`` command. A good reply from the\n"
+"bridge will still return OK, and in that case we return the ID of the newly\n"
+"created SAM connection. Otherwise, we return an empty string because that's an\n"
+"invalid ID anyway and it failed, so it's easy to check. Let's see if this\n"
 "function works by writing a test for it:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:461
 msgid ""
-"Note that in this test, we *must* call HelloSAM first to establish "
-"communication\n"
-"with SAM before starting our session. If not, the bridge will reply with "
-"an\n"
+"Note that in this test, we *must* call HelloSAM first to establish communication\n"
+"with SAM before starting our session. If not, the bridge will reply with an\n"
 "error and the test will fail."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:472
 msgid ""
-"Now you have your session established and your local destination, and "
-"need to\n"
-"decide what you want to do with them. Your session can now be commanded "
-"to\n"
-"connect to a remote service over I2P, or to wait for incoming connections"
-" to\n"
-"respond to. However, before you can connect to a remote destination, you "
-"may\n"
-"need to obtain the base64 of the destination, which is what the API "
-"expects. In\n"
-"order to do this, we'll create a LookupName function, which will return "
-"the\n"
+"Now you have your session established and your local destination, and need to\n"
+"decide what you want to do with them. Your session can now be commanded to\n"
+"connect to a remote service over I2P, or to wait for incoming connections to\n"
+"respond to. However, before you can connect to a remote destination, you may\n"
+"need to obtain the base64 of the destination, which is what the API expects. In\n"
+"order to do this, we'll create a LookupName function, which will return the\n"
 "base64 in a usable form."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:494
 msgid ""
-"Again, this is almost the same as our HelloSAM and CreateSession "
-"functions,\n"
-"with one difference. Since we're looking for the VALUE specifically and "
-"the NAME\n"
-"field will be the same as the ``name`` argument, it simply returns the "
-"base64\n"
+"Again, this is almost the same as our HelloSAM and CreateSession functions,\n"
+"with one difference. Since we're looking for the VALUE specifically and the NAME\n"
+"field will be the same as the ``name`` argument, it simply returns the base64\n"
 "string of the destination requested."
 msgstr ""
 
@@ -10301,50 +9238,39 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:516
 msgid ""
-"At last, we are going to establish a connection to another service with "
-"our new\n"
+"At last, we are going to establish a connection to another service with our new\n"
 "library. This part confused me a bit at first, but the most astute Java\n"
 "developers were probably wondering why we didn't extend the socket class\n"
-"instead of creating a Socket variable inside of the Jsam class. That's "
-"because\n"
-"until now, we've been communicating with the \"Control Socket\" and we "
-"need to\n"
-"create a new socket to do the actual communication. So we've waited to "
-"extend\n"
+"instead of creating a Socket variable inside of the Jsam class. That's because\n"
+"until now, we've been communicating with the \"Control Socket\" and we need to\n"
+"create a new socket to do the actual communication. So we've waited to extend\n"
 "the the Socket class with the Jsam class until now:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:530
 msgid ""
-"Also, let's alter our startConnection function so that we can use it to "
-"switch\n"
-"over from the control socket to the socket we'll be using in our "
-"application. It\n"
+"Also, let's alter our startConnection function so that we can use it to switch\n"
+"over from the control socket to the socket we'll be using in our application. It\n"
 "will now take a Socket argument."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:556
 msgid ""
-"This allows us to quickly and easily open a new socket to communicate "
-"over,\n"
+"This allows us to quickly and easily open a new socket to communicate over,\n"
 "perform the \"Hello SAM\" handshake over again, and connect the stream."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:579
 msgid ""
-"And now you have a new Socket for communicating over SAM! Let's do the "
-"same\n"
+"And now you have a new Socket for communicating over SAM! Let's do the same\n"
 "thing for Accepting remote connections:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:599
 msgid ""
-"There you have it. That's how you build a SAM library, step-by-step. In "
-"the\n"
-"future, I will cross-reference this with the working version of the "
-"library,\n"
-"Jsam, and the SAM v3 specification but for now I've got to get some other"
-" stuff\n"
+"There you have it. That's how you build a SAM library, step-by-step. In the\n"
+"future, I will cross-reference this with the working version of the library,\n"
+"Jsam, and the SAM v3 specification but for now I've got to get some other stuff\n"
 "done."
 msgstr ""
 
@@ -10367,8 +9293,7 @@ msgstr ""
 #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:23
 msgid ""
 "Startup should be faster on platforms such as Raspberry Pi.\n"
-"We've fixed several bugs, including some serious ones affecting low-level"
-" network messages."
+"We've fixed several bugs, including some serious ones affecting low-level network messages."
 msgstr ""
 
 #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:38
@@ -10462,58 +9387,39 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:11
 msgid ""
-"*This post is adapted directly from material originally created for "
-"mhatta's*\n"
-"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-"
-"c08ec9de225d>`__\\ *.*\n"
-"*He deserves the credit for the OP. It has been updated in certain places"
-" where*\n"
-"*it refers to old versions of I2P as current and has undergone some "
-"light*\n"
+"*This post is adapted directly from material originally created for mhatta's*\n"
+"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-c08ec9de225d>`__\\ *.*\n"
+"*He deserves the credit for the OP. It has been updated in certain places where*\n"
+"*it refers to old versions of I2P as current and has undergone some light*\n"
 "*editing. -idk*"
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:17
 msgid ""
-"Right after it starts up, I2P is often seen as a little bit slow. It's "
-"true, and\n"
-"we all know why, by nature, `garlic routing "
-"<https://en.wikipedia.org/wiki/Garlic_routing>`__\n"
-"adds overhead to the familiar experience of using the internet so that "
-"you can\n"
-"have privacy, but this means that for many or most I2P services, your "
-"data will\n"
+"Right after it starts up, I2P is often seen as a little bit slow. It's true, and\n"
+"we all know why, by nature, `garlic routing <https://en.wikipedia.org/wiki/Garlic_routing>`__\n"
+"adds overhead to the familiar experience of using the internet so that you can\n"
+"have privacy, but this means that for many or most I2P services, your data will\n"
 "need to go through 12 hops by default."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:28
 msgid ""
-"Also, unlike Tor, I2P was primarily designed as a closed network. You can"
-"\n"
-"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-"
-"untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources "
-"inside I2P, but you are not supposed\n"
-"to access `clearnet "
-"<https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n"
+"Also, unlike Tor, I2P was primarily designed as a closed network. You can\n"
+"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources inside I2P, but you are not supposed\n"
+"to access `clearnet <https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n"
 "websites through I2P. There exist a few I2P “outproxies” similar to\n"
-"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit"
-" nodes to\n"
-"access clearnet, but most of them are very slow to use as going to the "
-"clearnet\n"
-"is effectively *another* hop in the already 6 hops in, six hops out "
-"connection."
+"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit nodes to\n"
+"access clearnet, but most of them are very slow to use as going to the clearnet\n"
+"is effectively *another* hop in the already 6 hops in, six hops out connection."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:36
 msgid ""
-"Until a few versions ago, this problem was even harder to deal with "
-"because many\n"
-"I2P router users were having difficulties configuring the bandwidth "
-"settings for\n"
-"their routers. If everyone who can takes the time to adjust their "
-"bandwidth\n"
-"settings properly, they will improve not only your connection but also "
-"the I2P\n"
+"Until a few versions ago, this problem was even harder to deal with because many\n"
+"I2P router users were having difficulties configuring the bandwidth settings for\n"
+"their routers. If everyone who can takes the time to adjust their bandwidth\n"
+"settings properly, they will improve not only your connection but also the I2P\n"
 "network as a whole."
 msgstr ""
 
@@ -10523,8 +9429,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:45
 msgid ""
-"Since I2P is a peer-to-peer network, you have to share some of your "
-"network\n"
+"Since I2P is a peer-to-peer network, you have to share some of your network\n"
 "bandwidth with other peers. You see choose how much in “I2P Bandwidth\n"
 "Configuration” (“Configure Bandwidth” button in the “Applications and\n"
 "Configuration” section of I2P Router Console, or\n"
@@ -10533,47 +9438,34 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:55
 msgid ""
-"If you see a shared bandwidth limit of 48 KBps, which is very low, then "
-"you\n"
-"may not have adjusted your shared bandwidth from the default. As the "
-"original\n"
-"author of the material this blog post is adapted from noted, I2P has a "
-"default\n"
-"shared bandwidth limit that is very low until the user adjusts it to "
-"avoid\n"
+"If you see a shared bandwidth limit of 48 KBps, which is very low, then you\n"
+"may not have adjusted your shared bandwidth from the default. As the original\n"
+"author of the material this blog post is adapted from noted, I2P has a default\n"
+"shared bandwidth limit that is very low until the user adjusts it to avoid\n"
 "causing issues with the user's connection."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:61
 msgid ""
-"However, since many users may not know exactly which bandwidth settings "
-"to\n"
-"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ "
-"introduced a\n"
-"New Install Wizard. It contains a Bandwidth Test, which automatically "
-"detects\n"
-"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) "
-"and adjusts\n"
+"However, since many users may not know exactly which bandwidth settings to\n"
+"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ introduced a\n"
+"New Install Wizard. It contains a Bandwidth Test, which automatically detects\n"
+"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) and adjusts\n"
 "I2P’s bandwidth settings accordingly."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:67
 msgid ""
-"If you want to re-run the wizard, for instance following a change in your"
-"\n"
-"service provider or bcause you installed I2P before version 0.9.38, you "
-"can\n"
-"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply "
-"access\n"
+"If you want to re-run the wizard, for instance following a change in your\n"
+"service provider or bcause you installed I2P before version 0.9.38, you can\n"
+"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply access\n"
 "the wizard directly at http://localhost:7657/welcome"
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:76
 msgid ""
-"Using the Wizard is straightforward, simply keep clicking “Next”. "
-"Sometimes\n"
-"M-Lab’s chosen measurement servers are down and the test fails. In such "
-"case,\n"
+"Using the Wizard is straightforward, simply keep clicking “Next”. Sometimes\n"
+"M-Lab’s chosen measurement servers are down and the test fails. In such case,\n"
 "click “Previous” (do not use your web browser’s “back” button), then\n"
 "try it again."
 msgstr ""
@@ -10584,27 +9476,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:88
 msgid ""
-"Even after adjusted the bandwidth, your connection might still be slow As"
-" I\n"
-"said, I2P is a P2P network. It will take some time for your I2P router to"
-" be\n"
-"discovered by other peers and integrated into the I2P network. If your "
-"router\n"
-"not up long enough to become well integrated, or if you shut down un-"
-"gracefully\n"
-"too often, the network will remain fairly slow. On the other hand, the "
-"longer\n"
-"you run your I2P router continuously, the faster and more stable your "
-"connection\n"
+"Even after adjusted the bandwidth, your connection might still be slow As I\n"
+"said, I2P is a P2P network. It will take some time for your I2P router to be\n"
+"discovered by other peers and integrated into the I2P network. If your router\n"
+"not up long enough to become well integrated, or if you shut down un-gracefully\n"
+"too often, the network will remain fairly slow. On the other hand, the longer\n"
+"you run your I2P router continuously, the faster and more stable your connection\n"
 "becomes, and more of your bandwidth share will be used in the network."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:96
 msgid ""
-"However, many people might not be able to stay your I2P router up. In "
-"such\n"
-"case, you can still run the I2P router on a remote server such as VPS, "
-"then use\n"
+"However, many people might not be able to stay your I2P router up. In such\n"
+"case, you can still run the I2P router on a remote server such as VPS, then use\n"
 "SSH port forwarding."
 msgstr ""
 
@@ -10620,10 +9504,8 @@ msgstr ""
 msgid ""
 "0.9.42 continues the work to make I2P faster and more reliable.\n"
 "It includes several changes to speed up our UDP transport.\n"
-"We have split up the configuration files to enable future work for more "
-"modular packaging.\n"
-"We continue work to implement new proposals for faster and more secure "
-"encryption.\n"
+"We have split up the configuration files to enable future work for more modular packaging.\n"
+"We continue work to implement new proposals for faster and more secure encryption.\n"
 "There are, of course, a lot of bug fixes also."
 msgstr ""
 
@@ -10652,7 +9534,8 @@ msgid "JBigI: GMP 6.1.2 (Linux 64-bit only)"
 msgstr ""
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:40
-msgid "NetDB: Choose alternate gateway for store replies to reduce connections"
+msgid ""
+"NetDB: Choose alternate gateway for store replies to reduce connections"
 msgstr ""
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:41
@@ -10699,134 +9582,91 @@ msgstr ""
 msgid "Def Con Trip Report- zzz"
 msgstr ""
 
-#: i2p2www/blog/2019/08/30/defcon.rst:11 i2p2www/blog/2019/08/30/defcon2.rst:11
+#: i2p2www/blog/2019/08/30/defcon.rst:11
+#: i2p2www/blog/2019/08/30/defcon2.rst:11
 msgid "Def Con Trip Report"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:14
 msgid ""
-"idk and I attended DEFCON 27 and presented two workshops on I2P for "
-"application\n"
-"developers, with support from mhatta and Alex. I gave the workshop at "
-"Monero\n"
-"Village and idk gave the one at Crypto/Privacy Village. Here, I will "
-"summarize\n"
-"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will"
-" post a\n"
+"idk and I attended DEFCON 27 and presented two workshops on I2P for application\n"
+"developers, with support from mhatta and Alex. I gave the workshop at Monero\n"
+"Village and idk gave the one at Crypto/Privacy Village. Here, I will summarize\n"
+"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will post a\n"
 "trip report covering his workshop."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:22
 msgid ""
-"We had about 8 attendees for the Monero Village workshop, entitled \"I2P "
-"for\n"
-"Cryptocurrency Developers\". We planned to discuss the particular "
-"networking\n"
-"needs for each application and work through the various i2ptunnel and SAM"
-"\n"
-"options available. However, all attendees were relatively unfamiliar with"
-" I2P,\n"
-"so we pivoted and gave an overview of I2P. As none of the attendees had a"
-" laptop\n"
-"with them, we helped several of them install I2P on their Android phone "
-"and\n"
-"walked through some of the features of the app. For all users, the app "
-"appeared\n"
+"We had about 8 attendees for the Monero Village workshop, entitled \"I2P for\n"
+"Cryptocurrency Developers\". We planned to discuss the particular networking\n"
+"needs for each application and work through the various i2ptunnel and SAM\n"
+"options available. However, all attendees were relatively unfamiliar with I2P,\n"
+"so we pivoted and gave an overview of I2P. As none of the attendees had a laptop\n"
+"with them, we helped several of them install I2P on their Android phone and\n"
+"walked through some of the features of the app. For all users, the app appeared\n"
 "to reseed and build tunnels fairly quickly."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:33
 msgid ""
-"One common question after installing the app was \"what do I do now?\". "
-"The app\n"
-"doesn't have a 'hidden services of interest' section or first-run wizard "
-"like\n"
-"our desktop application does, and most of the default addressbook entries"
-" are\n"
-"long-dead. There's improvements we could make to the first-run "
-"experience.\n"
+"One common question after installing the app was \"what do I do now?\". The app\n"
+"doesn't have a 'hidden services of interest' section or first-run wizard like\n"
+"our desktop application does, and most of the default addressbook entries are\n"
+"long-dead. There's improvements we could make to the first-run experience.\n"
 "Also, some of the more interesting parts of the app are hidden behind an\n"
-"advanced setting; we should review those items and consider un-hiding "
-"some of\n"
+"advanced setting; we should review those items and consider un-hiding some of\n"
 "them."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:43
 msgid ""
-"It's always useful to go to Tor talks, not so much to find out what "
-"they're\n"
-"doing, but to hear how they explain things to people, and what "
-"terminology they\n"
-"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large "
-"room\n"
-"attended by about two thousand people. He gave a very brief overview of "
-"Tor\n"
-"with only three or four slides. He says they now have \"two to eight "
-"million\n"
-"users a day\". Most of the talk was a review of national blocking "
-"attempts over\n"
-"the years, starting with Thailand and Iran in '06-'07 through Tunisia, "
-"china,\n"
-"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He "
-"showed a\n"
-"new form to be showed to new users, with a checkbox \"Tor is censored in "
-"my\n"
+"It's always useful to go to Tor talks, not so much to find out what they're\n"
+"doing, but to hear how they explain things to people, and what terminology they\n"
+"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large room\n"
+"attended by about two thousand people. He gave a very brief overview of Tor\n"
+"with only three or four slides. He says they now have \"two to eight million\n"
+"users a day\". Most of the talk was a review of national blocking attempts over\n"
+"the years, starting with Thailand and Iran in '06-'07 through Tunisia, china,\n"
+"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He showed a\n"
+"new form to be showed to new users, with a checkbox \"Tor is censored in my\n"
 "country\"."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:56
 msgid ""
 "Their new pluggable transport \"snowflake\" uses a combination of domain\n"
-"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. "
-"Roger\n"
-"only had one slide on it, and I wasn't familiar with it, so we should do "
-"more\n"
-"research on what it's all about. He briefly mentioned some things they "
-"may be\n"
-"working on next, including \"salmon\" distribution of bridges, "
-"FTE/Marionette,\n"
-"decoy routing, and \"cupcake\" which is an extension of snowflake. While "
-"I don't\n"
-"have any further information about them, they may be good buzzwords to "
-"keep an\n"
+"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. Roger\n"
+"only had one slide on it, and I wasn't familiar with it, so we should do more\n"
+"research on what it's all about. He briefly mentioned some things they may be\n"
+"working on next, including \"salmon\" distribution of bridges, FTE/Marionette,\n"
+"decoy routing, and \"cupcake\" which is an extension of snowflake. While I don't\n"
+"have any further information about them, they may be good buzzwords to keep an\n"
 "eye out for on their mailing lists."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:67
 msgid ""
 "Much of Tor's censorship woes is due to Tor's popularity, but their TLS\n"
-"handshake is a particular issue and it's been the focus of much of the "
-"\"arms\n"
-"race\" over the years. In some ways we're in better shape, as we've taken"
-"\n"
-"several features of their current-best obfs4 pluggable transport and "
-"build them\n"
-"into NTCP2. However, we do have issues with our website and reseeds being"
-"\n"
+"handshake is a particular issue and it's been the focus of much of the \"arms\n"
+"race\" over the years. In some ways we're in better shape, as we've taken\n"
+"several features of their current-best obfs4 pluggable transport and build them\n"
+"into NTCP2. However, we do have issues with our website and reseeds being\n"
 "blocked, as Sadie and Phong will be presenting at USENIX FOCI this week."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:76
 msgid ""
-"Notes for next time: I do recommend DEFCON, as long as we find a village "
-"to\n"
-"call our home. It's an enormous conference and the limited general "
-"hangout\n"
+"Notes for next time: I do recommend DEFCON, as long as we find a village to\n"
+"call our home. It's an enormous conference and the limited general hangout\n"
 "spaces are massively overcrowded. Both Monero Village and Crypto/Privacy\n"
-"Village were fantastic hosts and we had several hours at each spot to "
-"meet with\n"
-"people. We should find more opportunities to work with both "
-"organizations.\n"
-"There were also ZCash people at the Monero Village and we should work "
-"with them\n"
-"also. Any future workshop should be targeted at a more general audience. "
-"We do\n"
-"need a standard \"Intro to I2P\" slide deck; it would have been helpful "
-"at the\n"
-"workshops. Don't expect attendees to have laptops with them, focus on "
-"Android\n"
-"for any hands-on exercises. There's several improvements to be made in "
-"our\n"
+"Village were fantastic hosts and we had several hours at each spot to meet with\n"
+"people. We should find more opportunities to work with both organizations.\n"
+"There were also ZCash people at the Monero Village and we should work with them\n"
+"also. Any future workshop should be targeted at a more general audience. We do\n"
+"need a standard \"Intro to I2P\" slide deck; it would have been helpful at the\n"
+"workshops. Don't expect attendees to have laptops with them, focus on Android\n"
+"for any hands-on exercises. There's several improvements to be made in our\n"
 "Android app. Drink lots of water in Vegas... and stay away from the slot\n"
 "machines."
 msgstr ""
@@ -10843,95 +9683,67 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:19
 msgid ""
-"My workshop went well, we even had a few application developers attend! "
-"In\n"
-"particular I had a pretty lengthy conversation with a person named Mary "
-"about\n"
+"My workshop went well, we even had a few application developers attend! In\n"
+"particular I had a pretty lengthy conversation with a person named Mary about\n"
 "how I2P could be used to eliminate centralization and enhance privacy in\n"
-"a \"Magic Wormhole\" type of application. While I wasn't totally familiar"
-" with\n"
-"Magic Wormhole at the time, I think most of my advice was usable. I think"
-" Mary\n"
-"had some very interesting and workable ideas about sharing information in"
-" more\n"
-"human-centric ways that could be interesting in I2P applications, and am "
-"looking\n"
+"a \"Magic Wormhole\" type of application. While I wasn't totally familiar with\n"
+"Magic Wormhole at the time, I think most of my advice was usable. I think Mary\n"
+"had some very interesting and workable ideas about sharing information in more\n"
+"human-centric ways that could be interesting in I2P applications, and am looking\n"
 "forward to experimenting with some of those."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:30
 msgid ""
-"The materials I made for the application development workshop are "
-"available on\n"
-"Github! https://github.com/eyedeekay/defcon Please consider it a living "
-"document,\n"
-"your input is desired! As it is licensed permissively, you are free to "
-"fork it\n"
-"and make it your own as well. Share your examples, your hacks, or correct"
-" my\n"
-"comma use, complain about my document preparation style, or just print "
-"off your\n"
+"The materials I made for the application development workshop are available on\n"
+"Github! https://github.com/eyedeekay/defcon Please consider it a living document,\n"
+"your input is desired! As it is licensed permissively, you are free to fork it\n"
+"and make it your own as well. Share your examples, your hacks, or correct my\n"
+"comma use, complain about my document preparation style, or just print off your\n"
 "own copy in booklet form!"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:39
 msgid ""
-"I also talked to a guy who gives advice to the government about the "
-"differences\n"
-"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in "
-"which\n"
-"peers in a P2P application might want to have enhanced privacy from each-"
-"other,\n"
+"I also talked to a guy who gives advice to the government about the differences\n"
+"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in which\n"
+"peers in a P2P application might want to have enhanced privacy from each-other,\n"
 "and why I2P is perhaps uniquely suited to accomplish that."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:46
 msgid ""
-"In general, both the application development workshops went well, even "
-"though\n"
-"they didn't go entirely according to plan in that only a small proportion"
-" of the\n"
-"audience were application developers. The impression I got was that many "
-"people\n"
-"are very interested in I2P, but also many people are confused by how "
-"interacting\n"
-"with I2P works. By re-focusing on their questions and by teaming off with"
-" zzz,\n"
-"mhatta, and Alex we were fairly successful at dealing with our audience, "
-"which\n"
+"In general, both the application development workshops went well, even though\n"
+"they didn't go entirely according to plan in that only a small proportion of the\n"
+"audience were application developers. The impression I got was that many people\n"
+"are very interested in I2P, but also many people are confused by how interacting\n"
+"with I2P works. By re-focusing on their questions and by teaming off with zzz,\n"
+"mhatta, and Alex we were fairly successful at dealing with our audience, which\n"
 "was more varied in terms of occupation, interest, and I2P knowledge than\n"
 "expected."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:57
 msgid ""
-"Besides that, I also talked to Alex about my experimental contextual-"
-"identity\n"
-"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to"
-" talk\n"
-"a little about bundling, but not too much, as it was a very busy "
-"convention. I'm\n"
+"Besides that, I also talked to Alex about my experimental contextual-identity\n"
+"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to talk\n"
+"a little about bundling, but not too much, as it was a very busy convention. I'm\n"
 "looking forward to following up with him on that soon."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:64
 msgid ""
 "mhatta and I almost won a lobster from a claw machine, but it was a real\n"
-"fighter and got away at the last second. Really thought I had it for a "
-"moment\n"
+"fighter and got away at the last second. Really thought I had it for a moment\n"
 "though. :)"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:70
 msgid ""
-"To add to zzz's notes for next time, aside from being more general I "
-"believe our\n"
-"workshops would not have been as able to adapt to the needs of the "
-"audience\n"
-"without the support of mhatta and Alex. Having people who can help "
-"particpants\n"
-"individually or in small groups was immensely helpful, many, many thanks "
-"to both\n"
+"To add to zzz's notes for next time, aside from being more general I believe our\n"
+"workshops would not have been as able to adapt to the needs of the audience\n"
+"without the support of mhatta and Alex. Having people who can help particpants\n"
+"individually or in small groups was immensely helpful, many, many thanks to both\n"
 "of them for helping us out."
 msgstr ""
 
@@ -10942,95 +9754,71 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:14
 msgid ""
-"Over the past year I have had the good fortune to participate in the "
-"research\n"
-"Nguyen Phong Hoang from Stony Brook University has been doing regarding "
-"I2P\n"
-"censorship. The infrastructure used for this research provided numerous "
-"and\n"
-"geographically diverse vantage points, and also the ability to conduct "
-"in-depth\n"
-"measurements across all levels of the network stack. I2P services which "
-"were\n"
-"measured for availability included official homepage, mirror site, reseed"
-"\n"
+"Over the past year I have had the good fortune to participate in the research\n"
+"Nguyen Phong Hoang from Stony Brook University has been doing regarding I2P\n"
+"censorship. The infrastructure used for this research provided numerous and\n"
+"geographically diverse vantage points, and also the ability to conduct in-depth\n"
+"measurements across all levels of the network stack. I2P services which were\n"
+"measured for availability included official homepage, mirror site, reseed\n"
 "servers and active relays."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:24
 msgid ""
-"The presentation on Tuesday went very well, and Phong was very busy "
-"afterwards\n"
-"answering questions about his work. I was busy too answering questions "
-"about\n"
-"I2P and what it does. The new stickers featuring the updated logo by Ura "
-"Design\n"
-"got rave reviews! It was a very positive experience and I will be looking"
-"\n"
-"forward to continuing to work with Phong and monitoring I2P censorship. I"
-" would\n"
-"encourage anyone who has encountered blocking, or has had success using "
-"I2P to\n"
+"The presentation on Tuesday went very well, and Phong was very busy afterwards\n"
+"answering questions about his work. I was busy too answering questions about\n"
+"I2P and what it does. The new stickers featuring the updated logo by Ura Design\n"
+"got rave reviews! It was a very positive experience and I will be looking\n"
+"forward to continuing to work with Phong and monitoring I2P censorship. I would\n"
+"encourage anyone who has encountered blocking, or has had success using I2P to\n"
 "communicate in restricted environments to reach out if you can. I2P is\n"
-"currently working on new solutions to circumvent internet blocking. "
-"Having met\n"
+"currently working on new solutions to circumvent internet blocking. Having met\n"
 "people this year who have given me first hand accounts of the effects of\n"
-"censorship and the need to stay connected, makes the need for I2P to be "
-"more\n"
-"resilient where it needs to be and for the team to be creating guides for"
-" using\n"
+"censorship and the need to stay connected, makes the need for I2P to be more\n"
+"resilient where it needs to be and for the team to be creating guides for using\n"
 "I2P in these situations."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:39
 msgid ""
-"I will be putting together better resources for researchers interested in"
-" I2P,\n"
+"I will be putting together better resources for researchers interested in I2P,\n"
 "as well."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:44
 msgid ""
 "I also had the good fortune to spend time with Mhatta, who is an I2P\n"
-"contributor, and to make connections for future funding. A huge thank you"
-" to\n"
-"the community builders I met in Tunis who I met again and who are "
-"offering so\n"
-"much support to the project. This has been an exciting year so far, and "
-"I2P has\n"
-"so much work to do. Please consider donating your time or funding the "
-"project\n"
+"contributor, and to make connections for future funding. A huge thank you to\n"
+"the community builders I met in Tunis who I met again and who are offering so\n"
+"much support to the project. This has been an exciting year so far, and I2P has\n"
+"so much work to do. Please consider donating your time or funding the project\n"
 "as it needs to scale quickly to new challenges."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:53
 msgid ""
-"If you have an opportunity to, you can read the full report Measuring I2P"
-"\n"
+"If you have an opportunity to, you can read the full report Measuring I2P\n"
 "Censorship at a Global Scale here\n"
 "https://www.usenix.org/conference/foci19/presentation/hoang"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:59
 msgid ""
-"Another great workshop in the measurements workshop was On the Importance"
-" of\n"
+"Another great workshop in the measurements workshop was On the Importance of\n"
 "Encrypted-SNI (ESNI) to Censorship Circumvention\n"
 "https://www.usenix.org/conference/foci19/presentation/chai"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:65
 msgid ""
-"There are so many great workshops that I attended - anyone who would like"
-" too\n"
+"There are so many great workshops that I attended - anyone who would like too\n"
 "can access the program and related materials here:\n"
 "https://www.usenix.org/conference/foci19/workshop-program"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:71
 msgid ""
-"I will be attending Our Networks in Toronto next month "
-"https://ournetworks.ca/\n"
+"I will be attending Our Networks in Toronto next month https://ournetworks.ca/\n"
 "- and so should you! The program can be viewed here\n"
 "https://ournetworks.ca/program/"
 msgstr ""
@@ -11042,63 +9830,43 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:14
 msgid ""
-"This was my first time attending IFF, and what a great experience for I2P"
-" this\n"
-"was! I met with human rights defenders, people who work on censorship "
-"metrics,\n"
+"This was my first time attending IFF, and what a great experience for I2P this\n"
+"was! I met with human rights defenders, people who work on censorship metrics,\n"
 "and of course UX and security professionals."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:20
 msgid ""
 "My goal was to connect with people to further support I2P’s UX overhaul,\n"
-"keeping in mind security and UX considerations for frontline workers. As "
-"it was\n"
-"pointed out to me, people see I2P as a very important and powerful "
-"resource to\n"
-"circumvent censorship and support safe communication, however the "
-"interface\n"
-"suffers from some usability concerns. People were happy with our initial "
-"steps\n"
-"to make first time users have a better experience, such as our set up "
-"wizard\n"
-"and bandwidth detection tool. I also received positive reviews on our "
-"changes\n"
-"to the website and /home icons. It was very encouraging to hear directly "
-"from\n"
+"keeping in mind security and UX considerations for frontline workers. As it was\n"
+"pointed out to me, people see I2P as a very important and powerful resource to\n"
+"circumvent censorship and support safe communication, however the interface\n"
+"suffers from some usability concerns. People were happy with our initial steps\n"
+"to make first time users have a better experience, such as our set up wizard\n"
+"and bandwidth detection tool. I also received positive reviews on our changes\n"
+"to the website and /home icons. It was very encouraging to hear directly from\n"
 "the community that small changes we have made are in the right direction."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:32
 msgid ""
-"Things like having configuration happen out of the box and not having to "
-"put\n"
-"people in the position where they need to rely on reading so much "
-"documentation\n"
-"or chasing documentation were discussed. Also, improved documentation for"
-"\n"
-"setting up outproxies and and site mirroring were requested and "
-"suggested.\n"
-"Please see Mikal’s very good instructions on setting up an I2P outproxy "
-"that\n"
+"Things like having configuration happen out of the box and not having to put\n"
+"people in the position where they need to rely on reading so much documentation\n"
+"or chasing documentation were discussed. Also, improved documentation for\n"
+"setting up outproxies and and site mirroring were requested and suggested.\n"
+"Please see Mikal’s very good instructions on setting up an I2P outproxy that\n"
 "came out of the suggestions this week —\n"
-"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to "
-"make\n"
+"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to make\n"
 "bug reporting easier."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:43
 msgid ""
-"To this point, I truly hope that the project will secure resources to "
-"continue\n"
-"the improvements to its usability that it requires to meet the growing "
-"demand\n"
-"for I2P services. It is humbling to to be working with such talented "
-"people and\n"
-"to be able to work together with our community during a time when people "
-"all\n"
-"over the globe need all of the privacy protecting resources we as people "
-"who\n"
+"To this point, I truly hope that the project will secure resources to continue\n"
+"the improvements to its usability that it requires to meet the growing demand\n"
+"for I2P services. It is humbling to to be working with such talented people and\n"
+"to be able to work together with our community during a time when people all\n"
+"over the globe need all of the privacy protecting resources we as people who\n"
 "develop, design and educate can offer."
 msgstr ""
 
@@ -11109,58 +9877,40 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:14
 msgid ""
-"The messages from activists in Syria during the Access No\\_! session on "
-"the\n"
+"The messages from activists in Syria during the Access No\\_! session on the\n"
 "first day were deeply moving and really drove home why I work in digital\n"
-"rights. We listened to the experiences of activists who are unable to "
-"travel\n"
-"due to lack of status, documentation and active conflict. For these "
-"people\n"
+"rights. We listened to the experiences of activists who are unable to travel\n"
+"due to lack of status, documentation and active conflict. For these people\n"
 "“the internet is the only passport (they) carry.” Human rights defenders\n"
-"spoke of the importance of  digital training to keep people protected "
-"when they\n"
-"are communicating with family inside of the country, as well as with "
-"family and\n"
-"friends who have left. They had created digital clinics to show people "
-"how to\n"
+"spoke of the importance of  digital training to keep people protected when they\n"
+"are communicating with family inside of the country, as well as with family and\n"
+"friends who have left. They had created digital clinics to show people how to\n"
 "use services securely, for instance, how to use features like Signal’s\n"
-"disappearing messages so that those messages could not be used against "
-"them\n"
+"disappearing messages so that those messages could not be used against them\n"
 "when devices are searched at security check points. Continuing to pursue\n"
-"education was also very important, the internet being relied on to access"
-"\n"
+"education was also very important, the internet being relied on to access\n"
 "resources."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:30
 msgid ""
-"The following days we met with people who had both questions about I2P "
-"and\n"
-"suggestions for potential use cases. We also discussed overhauling the "
-"project\n"
+"The following days we met with people who had both questions about I2P and\n"
+"suggestions for potential use cases. We also discussed overhauling the project\n"
 "documentation for threat models, improving guides for users with little\n"
-"technical background, and ensuring that these guides are easily "
-"translatable. I\n"
-"made a note that I should go through the proposals and connect then to "
-"human\n"
-"use cases and solutions. This will be part of the projects’ continued "
-"effort\n"
+"technical background, and ensuring that these guides are easily translatable. I\n"
+"made a note that I should go through the proposals and connect then to human\n"
+"use cases and solutions. This will be part of the projects’ continued effort\n"
 "to improve its user guides and onboarding."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:40
 msgid ""
-"The opportunity to meet face to face with people who are using I2P and "
-"have\n"
-"successfully used it to circumvent internet blockages was inspiring. As "
-"the\n"
+"The opportunity to meet face to face with people who are using I2P and have\n"
+"successfully used it to circumvent internet blockages was inspiring. As the\n"
 "project has began working on its own browser and is examining outproxy\n"
-"packaging, it needs as much feedback and testing as possible to create "
-"secure\n"
-"and frictionless experiences for people. Also, the I2P network needs more"
-"\n"
-"hosted content and mirrored sites in order to expand resources for its "
-"users."
+"packaging, it needs as much feedback and testing as possible to create secure\n"
+"and frictionless experiences for people. Also, the I2P network needs more\n"
+"hosted content and mirrored sites in order to expand resources for its users."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:2
@@ -11174,47 +9924,35 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:14
 msgid ""
-"The weekend of September 20th I traveled to Toronto to meet with Sadie to"
-" take\n"
-"part in the Our Networks conference. The Our Networks conference "
-"encompasses a\n"
-"wide variety of topic including many peer-to-peer technologies with an "
-"eye\n"
+"The weekend of September 20th I traveled to Toronto to meet with Sadie to take\n"
+"part in the Our Networks conference. The Our Networks conference encompasses a\n"
+"wide variety of topic including many peer-to-peer technologies with an eye\n"
 "toward their potential to make the world a better place."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:21
 msgid ""
-"The conference was fascinating, full of very smart people working on "
-"everything\n"
-"from physical mesh networks to the distributed web to, of course, "
-"anonymity. We\n"
-"got to talk to some great people from Tor, Protocol Labs, Parity Labs, "
-"the Dat\n"
-"Project, as well as a variety of artists and social scientists. Lots of "
-"fun too,\n"
+"The conference was fascinating, full of very smart people working on everything\n"
+"from physical mesh networks to the distributed web to, of course, anonymity. We\n"
+"got to talk to some great people from Tor, Protocol Labs, Parity Labs, the Dat\n"
+"Project, as well as a variety of artists and social scientists. Lots of fun too,\n"
 "and a great environment. Dat in particular presents some pretty cool\n"
 "opportunities for future co-operation I think."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:30
 msgid ""
-"I hadn't planned on giving a talk, but we were having so much fun that "
-"when\n"
-"we were asked, Sadie and I put something together and I gave a quick "
-"lightning\n"
+"I hadn't planned on giving a talk, but we were having so much fun that when\n"
+"we were asked, Sadie and I put something together and I gave a quick lightning\n"
 "talk about I2P and how it's design choices are relevant to Peer-to-Peer\n"
-"application development. The talk was recorded and when the video becomes"
-"\n"
-"available, I'll make sure to add it to this blog. Next year, I'll have "
-"some\n"
+"application development. The talk was recorded and when the video becomes\n"
+"available, I'll make sure to add it to this blog. Next year, I'll have some\n"
 "submissions for their Zine Library about I2P."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:39
 msgid ""
-"Besides that, I really enjoyed my time visiting Toronto, it was a great "
-"place\n"
+"Besides that, I really enjoyed my time visiting Toronto, it was a great place\n"
 "to visit."
 msgstr ""
 
@@ -11228,14 +9966,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:16
 msgid ""
-"In the 0.9.43 release, we continue work on stronger security and privacy "
-"features and performance improvements.\n"
-"Our implementation of the new leaseset specification (LS2) is now "
-"complete.\n"
-"We are beginning our implementation of stronger and faster end-to-end "
-"encryption (proposal 144) for a future release.\n"
-"Several IPv6 address detection issues have been fixed, and there of "
-"course are several other bug fixes."
+"In the 0.9.43 release, we continue work on stronger security and privacy features and performance improvements.\n"
+"Our implementation of the new leaseset specification (LS2) is now complete.\n"
+"We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release.\n"
+"Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes."
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:33
@@ -11279,7 +10013,8 @@ msgid "i2ptunnel support for quoted custom options"
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:51
-msgid "i2psnark now starts with reduced tunnel count then increases as necessary"
+msgid ""
+"i2psnark now starts with reduced tunnel count then increases as necessary"
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:52
@@ -11310,47 +10045,33 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:11
 msgid ""
-"Highlighting Research - An Empirical Study of the I2P Anonymity Network "
-"and its Censorship Resistance"
+"Highlighting Research - An Empirical Study of the I2P Anonymity Network and "
+"its Censorship Resistance"
 msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:16
 msgid ""
-"The following blog post is authored by Information Controls Fellow Hoàng "
-"Nguyên\n"
-"Phong. As an ICFP fellow, Phong's research focused on analyzing different"
-"\n"
-"aspects of the I2P network, a privacy-enhancing Internet tool that can be"
-" used\n"
+"The following blog post is authored by Information Controls Fellow Hoàng Nguyên\n"
+"Phong. As an ICFP fellow, Phong's research focused on analyzing different\n"
+"aspects of the I2P network, a privacy-enhancing Internet tool that can be used\n"
 "to access online content over an anonymity-enhancing network helpful in\n"
-"circumventing state-imposed censorship. Working with his host "
-"organization, the\n"
-"University of Massachusetts Amherst, Phong studied the I2P network's "
-"censorship\n"
-"resilience, including identifying what blocking methods a state censor "
-"might use\n"
-"to inhibit access to I2P and investigating potential solutions to make "
-"I2P more\n"
+"circumventing state-imposed censorship. Working with his host organization, the\n"
+"University of Massachusetts Amherst, Phong studied the I2P network's censorship\n"
+"resilience, including identifying what blocking methods a state censor might use\n"
+"to inhibit access to I2P and investigating potential solutions to make I2P more\n"
 "resistant to such blockage."
 msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:28
 msgid ""
 "Phong found blocking attempts on the I2P network (specifically via DNS\n"
-"poisoning, SNI-based blocking, TCP packet injection, and page-specific "
-"blocks)\n"
-"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. "
-"Phong\n"
-"posits that because the blocks are usually imposed on the I2P download "
-"page and\n"
-"reseed servers, such blocking could be mitigated by hosting download "
-"links to\n"
-"this content on large cloud service providers - raising the collateral "
-"cost of\n"
-"blocking. Phong also built a metrics portal for the platform so that "
-"researchers\n"
-"and others can better understand who is using I2P, finding that there are"
-" about\n"
+"poisoning, SNI-based blocking, TCP packet injection, and page-specific blocks)\n"
+"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. Phong\n"
+"posits that because the blocks are usually imposed on the I2P download page and\n"
+"reseed servers, such blocking could be mitigated by hosting download links to\n"
+"this content on large cloud service providers - raising the collateral cost of\n"
+"blocking. Phong also built a metrics portal for the platform so that researchers\n"
+"and others can better understand who is using I2P, finding that there are about\n"
 "20,000 relays in the network on a daily basis."
 msgstr ""
 
@@ -11364,10 +10085,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:55
 msgid ""
-"We thank Phong and his collaborators for their excellent study as we move"
-" to\n"
-"address the issues that were identified. It's exciting to see more "
-"academic\n"
+"We thank Phong and his collaborators for their excellent study as we move to\n"
+"address the issues that were identified. It's exciting to see more academic\n"
 "study of I2P and are excited to keep working with him."
 msgstr ""
 
@@ -11381,34 +10100,18 @@ msgstr "Versione 0.9.44 con correzioni di bug"
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:16
 msgid ""
-"0.9.44 contains an important fix for a denial of service issue in hidden "
-"services handling of new encryption types.\n"
+"0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.\n"
 "All users should update as soon as possible."
-msgstr ""
-"La versione 0.9.44 contiene una correzione per un problema di denial of "
-"service riguardante i servizi nascosti che utilizzano i nuovi tipi di "
-"cifratura.\n"
-"Tutti gli utenti dovrebbero aggiornare il prima possibile."
+msgstr "La versione 0.9.44 contiene una correzione per un problema di denial of service riguardante i servizi nascosti che utilizzano i nuovi tipi di cifratura.\nTutti gli utenti dovrebbero aggiornare il prima possibile."
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:21
 msgid ""
-"The release includes initial support for new end-to-end encryption "
-"(proposal 144).\n"
+"The release includes initial support for new end-to-end encryption (proposal 144).\n"
 "Work continues on this project, and it is not yet ready for use.\n"
-"There are changes to the console home page, and new embedded HTML5 media "
-"players in i2psnark.\n"
+"There are changes to the console home page, and new embedded HTML5 media players in i2psnark.\n"
 "Additional fixes for firewalled IPv6 networks are included.\n"
 "Tunnel build fixes should result in faster startup for some users."
-msgstr ""
-"Il rilascio include il supporto iniziale per la nuova cifratura end-to-"
-"end (proposta 144).\n"
-"I lavori continuano su questo progetto e non è ancora pronto per "
-"l'utilizzo.\n"
-"Ci sono modifiche alla pagina principale della console e ai riproduttori "
-"multimediali HTML5 integrati in i2psnark.\n"
-"Sono incluse correzioni aggiuntive per le reti IPv6 dietro firewall.\n"
-"Le correzioni riguardo la creazione dei tunnel dovrebbero risultare in "
-"una maggiore velocità di avvio per alcuni utenti."
+msgstr "Il rilascio include il supporto iniziale per la nuova cifratura end-to-end (proposta 144).\nI lavori continuano su questo progetto e non è ancora pronto per l'utilizzo.\nCi sono modifiche alla pagina principale della console e ai riproduttori multimediali HTML5 integrati in i2psnark.\nSono incluse correzioni aggiuntive per le reti IPv6 dietro firewall.\nLe correzioni riguardo la creazione dei tunnel dovrebbero risultare in una maggiore velocità di avvio per alcuni utenti."
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:39
 msgid "Console home page changes"
@@ -11488,17 +10191,10 @@ msgstr "Versione 0.9.45 con correzioni di bug"
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:16
 msgid ""
-"0.9.45 contains important fixes for hidden mode and the bandwidth tester."
-"\n"
+"0.9.45 contains important fixes for hidden mode and the bandwidth tester.\n"
 "There's an update to the console dark theme.\n"
-"We continue work on improving performance and the development of new end-"
-"to-end encryption (proposal 144)."
-msgstr ""
-"La versione 0.9.45 contiene importanti correzioni per la modalità hidden "
-"e per il tester di larghezza di banda.\n"
-"C'è un aggiornamento per il tema scuro della console.\n"
-"Continuiamo a lavorare sull'aumento delle prestazioni e a sviluppare la "
-"nuova cifratura end-to-end (proposta 144)."
+"We continue work on improving performance and the development of new end-to-end encryption (proposal 144)."
+msgstr "La versione 0.9.45 contiene importanti correzioni per la modalità hidden e per il tester di larghezza di banda.\nC'è un aggiornamento per il tema scuro della console.\nContinuiamo a lavorare sull'aumento delle prestazioni e a sviluppare la nuova cifratura end-to-end (proposta 144)."
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:32
 msgid "Dark theme improvements"
@@ -11509,7 +10205,8 @@ msgid "Console icon changes"
 msgstr ""
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:34
-msgid "Move some translations from console to router and core for embedded uses"
+msgid ""
+"Move some translations from console to router and core for embedded uses"
 msgstr ""
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:37
@@ -11563,24 +10260,20 @@ msgstr ""
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:10
 msgid ""
 "Tutorial for setting up git access through an I2P Tunnel. This tunnel\n"
-"will act as your access point to a single git service on I2P. It is part "
-"of the\n"
+"will act as your access point to a single git service on I2P. It is part of the\n"
 "overall effort to transition I2P from monotone to Git."
 msgstr ""
 
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:16
 msgid ""
-"Before anything else: Know the capabilities the service offers to the "
-"public"
+"Before anything else: Know the capabilities the service offers to the public"
 msgstr ""
 
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:19
 msgid ""
 "Depending on how the git service is configured, it may or may not offer\n"
 "all services on the same address. In the case of git.idk.i2p, there is a\n"
-"public HTTP URL, and an SSH "
-"URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to "
-"configure for your Git SSH client. Either\n"
+"public HTTP URL, and an SSH URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to configure for your Git SSH client. Either\n"
 "can be used to push or pull, but SSH is recommended."
 msgstr ""
 
@@ -11631,10 +10324,8 @@ msgid ""
 "Then, add the address you will be pushing and pulling from. Note that\n"
 "this example address is for Read-Only HTTP-over-I2P clones, if your\n"
 "admin does not allow the git HTTP(Smart HTTP) protocol, then you will\n"
-"need to get the SSH clone base32 from them. Use this Base32 to connect "
-"the\n"
-"client tunnel to the Git SSH service: "
-"**g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**"
+"need to get the SSH clone base32 from them. Use this Base32 to connect the\n"
+"client tunnel to the Git SSH service: **g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**"
 msgstr ""
 
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:109
@@ -11762,7 +10453,8 @@ msgid "Gitlab over I2P Setup"
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:7
-msgid "Mirror I2P Git repositories and Bridge Clearnet repositories for others."
+msgid ""
+"Mirror I2P Git repositories and Bridge Clearnet repositories for others."
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:9
@@ -11817,14 +10509,13 @@ msgid ""
 "images. Since there are no third-party images involved here, updates\n"
 "should come as soon as they are available in the host images. To review\n"
 "the Dockerfile for yourself, visit the `Gitlab source\n"
-"code <https://gitlab.com/gitlab-org/omnibus-"
-"gitlab/-/blob/master/docker/Dockerfile>`__."
+"code <https://gitlab.com/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile>`__."
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:70
 msgid ""
-"Set up an I2P HTTP Proxy for Gitlab to use(Important information, "
-"optional steps)"
+"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional "
+"steps)"
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:73
@@ -12053,21 +10744,10 @@ msgid ""
 "generated for you. A recent, correctly-generated bundle of the mainline\n"
 "i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside\n"
 "of I2P at my pastebin\n"
-"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also "
-"use a\n"
-"`magnet link "
-"<magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,"
-"\n"
+"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also use a\n"
+"`magnet link <magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,\n"
 "and if you're a BiglyBT user who wants to bridge the torrent, use \n"
-"`this magnet link instead "
-"<magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker"
-".leechers-"
-"paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker"
-".lanta-"
-"net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker"
-".tiny-"
-"vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__"
-"\n"
+"`this magnet link instead <magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__\n"
 "to announce to clearnet trackers as well."
 msgstr ""
 
@@ -12161,41 +10841,29 @@ msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:16
 msgid ""
-"0.9.46 contains significant performance improvements in the streaming "
-"library.\n"
-"We have completed development of ECIES encryption (proposal 144) and "
-"there is now an option to enable it for testing."
-msgstr ""
-"La versione 0.9.46 contiene miglioramenti significanti delle prestazioni "
-"nella libreria streaming.\n"
-"Abbiamo completato lo sviluppo della cifratura ECIES (proposta 144) ed è "
-"ora disponibile un'opzione per abilitarla per il testing."
+"0.9.46 contains significant performance improvements in the streaming library.\n"
+"We have completed development of ECIES encryption (proposal 144) and there is now an option to enable it for testing."
+msgstr "La versione 0.9.46 contiene miglioramenti significanti delle prestazioni nella libreria streaming.\nAbbiamo completato lo sviluppo della cifratura ECIES (proposta 144) ed è ora disponibile un'opzione per abilitarla per il testing."
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:21
 msgid ""
 "Windows users only:\n"
 "This release fixes a local privilege escalation vulnerability\n"
-"which could be exploited by a local user that has the ability to run "
-"programs.\n"
+"which could be exploited by a local user that has the ability to run programs.\n"
 "Please apply the update as soon as possible.\n"
 "Thanks to Blaze Infosec for their responsible disclosure of the issue."
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:29
 msgid ""
-"This is the last release to support Java 7, Debian packages Wheezy and "
-"Stretch, and Ubuntu packages Precise and Trusty.\n"
+"This is the last release to support Java 7, Debian packages Wheezy and Stretch, and Ubuntu packages Precise and Trusty.\n"
 "Users on those platforms must upgrade to receive future I2P updates."
-msgstr ""
-"Questo è l'ultimo rilascio che supporta Java 7, i pacchetti Debian Wheezy"
-" e Stretch, e i pacchetti Ubuntu Precise e Trusty.\n"
-"Gli utenti di quelle piattaforme dovrebbero eseguire l'aggiornamento per "
-"continuare a ricevere gli aggiornamenti I2P."
+msgstr "Questo è l'ultimo rilascio che supporta Java 7, i pacchetti Debian Wheezy e Stretch, e i pacchetti Ubuntu Precise e Trusty.\nGli utenti di quelle piattaforme dovrebbero eseguire l'aggiornamento per continuare a ricevere gli aggiornamenti I2P."
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:44
 msgid ""
-"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing "
-"(proposal 144)"
+"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing (proposal "
+"144)"
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:45
@@ -12220,8 +10888,8 @@ msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:54
 msgid ""
-"Hidden Services Manager: Fixes for changing shared client options, "
-"prevent changing certain options while tunnel is running"
+"Hidden Services Manager: Fixes for changing shared client options, prevent "
+"changing certain options while tunnel is running"
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:55
@@ -12382,27 +11050,16 @@ msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:16
 msgid ""
-"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by "
-"default for some services.\n"
+"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by default for some services.\n"
 "The Sybil analysis and blocking tool is now enabled by default."
-msgstr ""
-"La versione 0.9.47 abilita di default il nostro nuovo protocollo di "
-"cifratura end-to-end (proposta 144) per alcuni servizi.\n"
-"Lo strumento per il blocco e l'analisi Sybil è ora abilitato di default."
+msgstr "La versione 0.9.47 abilita di default il nostro nuovo protocollo di cifratura end-to-end (proposta 144) per alcuni servizi.\nLo strumento per il blocco e l'analisi Sybil è ora abilitato di default."
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:21
 msgid ""
 "Java 8 or higher is now required.\n"
-"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and "
-"Precise, are no longer supported.\n"
-"Users on those platforms should upgrade so you may continue to receive "
-"I2P updates."
-msgstr ""
-"È ora necessario Java 8 o superiori.\n"
-"I pacchetti Debian per Wheezy e Stretch, e per Ubuntu Trusty e Precise, "
-"non sono più supportati.\n"
-"Gli utenti di queste piattaforme dovrebbero eseguire l'aggiornamento per "
-"continuare a ricevere gli aggiornamenti I2P."
+"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and Precise, are no longer supported.\n"
+"Users on those platforms should upgrade so you may continue to receive I2P updates."
+msgstr "È ora necessario Java 8 o superiori.\nI pacchetti Debian per Wheezy e Stretch, e per Ubuntu Trusty e Precise, non sono più supportati.\nGli utenti di queste piattaforme dovrebbero eseguire l'aggiornamento per continuare a ricevere gli aggiornamenti I2P."
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:37
 msgid "Java 8 now required"
@@ -12410,8 +11067,8 @@ msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:42
 msgid ""
-"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared "
-"clients, HTTP proxy, and new tunnels"
+"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared clients, "
+"HTTP proxy, and new tunnels"
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:43
@@ -12423,7 +11080,8 @@ msgid "Enable Sybil analysis and blocking tool by default"
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:51
-msgid "Hidden Services Manager: Fix missing server tunnel length configuration"
+msgid ""
+"Hidden Services Manager: Fix missing server tunnel length configuration"
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:52
@@ -12472,27 +11130,16 @@ msgstr "Versione 0.9.48 con miglioramenti delle prestazioni"
 
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:16
 msgid ""
-"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for "
-"most services.\n"
-"We have added preliminary support for new tunnel build message encryption"
-" (proposal 152).\n"
+"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for most services.\n"
+"We have added preliminary support for new tunnel build message encryption (proposal 152).\n"
 "There are significant performance improvements throughout the router."
-msgstr ""
-"La versione 0.9.48 abilita il nostro nuovo protocollo di crittografia "
-"end-to-end (proposta 144) per la maggior parte dei servizi.\n"
-"Abbiamo aggiunto un supporto preliminare per la nuova cifratura dei "
-"tunnel build message.\n"
-"Ci sono miglioramenti significativi delle prestazioni in tutto il router."
+msgstr "La versione 0.9.48 abilita il nostro nuovo protocollo di crittografia end-to-end (proposta 144) per la maggior parte dei servizi.\nAbbiamo aggiunto un supporto preliminare per la nuova cifratura dei tunnel build message.\nCi sono miglioramenti significativi delle prestazioni in tutto il router."
 
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:22
 msgid ""
 "Packages for Ubuntu Xenial (16.04 LTS) are no longer supported.\n"
-"Users on that platform should upgrade so you may continue to receive I2P "
-"updates."
-msgstr ""
-"I pacchetti per Ubuntu Xenial (16.04 LTS) non sono più supportati.\n"
-"Gli utenti di quella piattaforma dovrebbero eseguire l'aggiornamento per "
-"continuare a ricevere gli aggiornamenti I2P."
+"Users on that platform should upgrade so you may continue to receive I2P updates."
+msgstr "I pacchetti per Ubuntu Xenial (16.04 LTS) non sono più supportati.\nGli utenti di quella piattaforma dovrebbero eseguire l'aggiornamento per continuare a ricevere gli aggiornamenti I2P."
 
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:37
 msgid "Avoid old DSA-SHA1 routers for lookups, stores, and tunnel peers"
@@ -12641,33 +11288,25 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:21
 msgid ""
-"For over a decade, I2P has relied on the venerable Monotone service to "
-"support\n"
-"its version control needs, but during the past few years, most of the "
-"world has\n"
+"For over a decade, I2P has relied on the venerable Monotone service to support\n"
+"its version control needs, but during the past few years, most of the world has\n"
 "moved on to the now-universal Git version control system. In that same\n"
-"time, the I2P Network has become faster and more reliable, and accessible"
-"\n"
+"time, the I2P Network has become faster and more reliable, and accessible\n"
 "workarounds to Git's non-resumability have been developed."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:29
 msgid ""
-"Today marks a significant occasion for I2P, as we switched off the old "
-"mtn\n"
-"i2p.i2p branch, and moved the development of the core Java I2P libraries "
-"from\n"
+"Today marks a significant occasion for I2P, as we switched off the old mtn\n"
+"i2p.i2p branch, and moved the development of the core Java I2P libraries from\n"
 "Monotone to Git officially."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:35
 msgid ""
-"While our use of mtn has been questioned in the past, and it's not always"
-" been a\n"
-"popular choice, I'd like to take this moment, as perhaps the very last "
-"project to use\n"
-"Monotone to thank the Monotone developers, current and former, wherever "
-"they are,\n"
+"While our use of mtn has been questioned in the past, and it's not always been a\n"
+"popular choice, I'd like to take this moment, as perhaps the very last project to use\n"
+"Monotone to thank the Monotone developers, current and former, wherever they are,\n"
 "for the software they created."
 msgstr ""
 
@@ -12677,12 +11316,9 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:49
 msgid ""
-"Checkins to the I2P Project repositories require you to configure GPG "
-"signing for\n"
-"your git commits, including Merge Requests and Pull Requests. Please "
-"configure\n"
-"your git client for GPG signing before you fork i2p.i2p and check "
-"anything in."
+"Checkins to the I2P Project repositories require you to configure GPG signing for\n"
+"your git commits, including Merge Requests and Pull Requests. Please configure\n"
+"your git client for GPG signing before you fork i2p.i2p and check anything in."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:55
@@ -12691,32 +11327,24 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:60
 msgid ""
-"The official repository is the one hosted at https://i2pgit.org/i2p-"
-"hackers/i2p.i2p\n"
-"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\""
-" available\n"
+"The official repository is the one hosted at https://i2pgit.org/i2p-hackers/i2p.i2p\n"
+"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\" available\n"
 "at Github at https://github.com/i2p/i2p.i2p."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:66
 msgid ""
-"Now that we're on git, we can synchronize repositories from our own self-"
-"hosted Gitlab\n"
-"instance, to Github, and back again. This means that it is possible to "
-"create and submit\n"
-"a merge request on Gitlab and when it is merged, the result will be "
-"synced with Github,\n"
+"Now that we're on git, we can synchronize repositories from our own self-hosted Gitlab\n"
+"instance, to Github, and back again. This means that it is possible to create and submit\n"
+"a merge request on Gitlab and when it is merged, the result will be synced with Github,\n"
 "and a Pull Request on Github, when merged, will appear on Gitlab."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:73
 msgid ""
-"This means that it's possible to submit code to us through our Gitlab "
-"instance or through\n"
-"Github depending on what you prefer, however, more of the I2P developers "
-"are regularly\n"
-"monitoring Gitlab than Github. MR's to Gitlab are more likely to be "
-"merged sooner\n"
+"This means that it's possible to submit code to us through our Gitlab instance or through\n"
+"Github depending on what you prefer, however, more of the I2P developers are regularly\n"
+"monitoring Gitlab than Github. MR's to Gitlab are more likely to be merged sooner\n"
 "than PR's to Github."
 msgstr ""
 
@@ -12726,14 +11354,10 @@ msgstr "Grazie"
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:85
 msgid ""
-"Congratulations and thanks to everyone who helped in the git migration, "
-"especially\n"
-"zzz, eche|on, nextloop, and our site mirror operators! While some of us "
-"will miss\n"
-"Monotone, it has become a barrier for new and existing participants in "
-"I2P development\n"
-"and we're excited to join the world of developers using Git to manage "
-"their distributed\n"
+"Congratulations and thanks to everyone who helped in the git migration, especially\n"
+"zzz, eche|on, nextloop, and our site mirror operators! While some of us will miss\n"
+"Monotone, it has become a barrier for new and existing participants in I2P development\n"
+"and we're excited to join the world of developers using Git to manage their distributed\n"
 "projects."
 msgstr ""
 
@@ -12748,62 +11372,28 @@ msgstr "Versione 0.9.49 con correzioni SSU e crittografia velocizzata"
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:16
 msgid ""
 "0.9.49 continues the work to make I2P faster and more secure.\n"
-"We have several improvements and fixes for the SSU (UDP) transport that "
-"should result in faster speeds.\n"
-"This release also starts the migration to new, faster ECIES-X25519 "
-"encryption for routers.\n"
+"We have several improvements and fixes for the SSU (UDP) transport that should result in faster speeds.\n"
+"This release also starts the migration to new, faster ECIES-X25519 encryption for routers.\n"
 "(Destinations have been using this encryption for a few releases now)\n"
-"We've been working on the specifications and protocols for new encryption"
-" for several years,\n"
-"and we are getting close to the end of it! The migration will take "
-"several releases to complete."
-msgstr ""
-"La versione 0.9.49 continua il lavoro per rendere I2P più veloce e "
-"sicuro.\n"
-"Abbiamo diversi miglioramenti e correzioni per il trasporto SSU (UDP), il"
-" che dovrebbe risultare in una maggiore velocità.\n"
-"Con questo rilascio inizia inoltre la migrazione per i router verso la "
-"nuova e performante cifratura X25519.\n"
-"(Le destinazioni utilizzano questa cifratura già da qualche rilascio "
-"oramai)\n"
-"Per anni abbiamo lavorato sulle specifiche e sui protocolli per la nuova "
-"cifratura e oramai siamo vicinissimi alla fine! La migrazione richiederà "
-"diversi rilasci per essere completata."
+"We've been working on the specifications and protocols for new encryption for several years,\n"
+"and we are getting close to the end of it! The migration will take several releases to complete."
+msgstr "La versione 0.9.49 continua il lavoro per rendere I2P più veloce e sicuro.\nAbbiamo diversi miglioramenti e correzioni per il trasporto SSU (UDP), il che dovrebbe risultare in una maggiore velocità.\nCon questo rilascio inizia inoltre la migrazione per i router verso la nuova e performante cifratura X25519.\n(Le destinazioni utilizzano questa cifratura già da qualche rilascio oramai)\nPer anni abbiamo lavorato sulle specifiche e sui protocolli per la nuova cifratura e oramai siamo vicinissimi alla fine! La migrazione richiederà diversi rilasci per essere completata."
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:25
 msgid ""
-"For this release, to minimize disruption, only new installs and a very "
-"small percentage of existing installs\n"
+"For this release, to minimize disruption, only new installs and a very small percentage of existing installs\n"
 "(randomly selected at restart) will be using the new encryption.\n"
-"If your router does \"rekey\" to use the new encryption, it may have "
-"lower traffic or less reliability than usual for several days after you "
-"restart.\n"
+"If your router does \"rekey\" to use the new encryption, it may have lower traffic or less reliability than usual for several days after you restart.\n"
 "This is normal, because your router has generated a new identity.\n"
 "Your performance should recover after a while."
-msgstr ""
-"Per questo rilascio, al fine di minimizzare le interruzioni, solo le "
-"nuove installazioni e una piccola percentuale di quelle esistenti "
-"(selezionate randomicamente al riavvio) utilizzeranno la nuova cifratura."
-"\n"
-"Se il tuo router si \"riconfigura\" per utilizzare la nuova cifratura, "
-"potrebbe avere meno traffico o meno affidabilità del normale per diversi "
-"giorni dopo il riavvio.\n"
-"Questa è una situazione normale poichè il tuo router ha generato una "
-"nuova identità.\n"
-"Le tue prestazioni dovrebbero ristabilirsi dopo un certo periodo."
+msgstr "Per questo rilascio, al fine di minimizzare le interruzioni, solo le nuove installazioni e una piccola percentuale di quelle esistenti (selezionate randomicamente al riavvio) utilizzeranno la nuova cifratura.\nSe il tuo router si \"riconfigura\" per utilizzare la nuova cifratura, potrebbe avere meno traffico o meno affidabilità del normale per diversi giorni dopo il riavvio.\nQuesta è una situazione normale poichè il tuo router ha generato una nuova identità.\nLe tue prestazioni dovrebbero ristabilirsi dopo un certo periodo."
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:33
 msgid ""
-"We have \"rekeyed\" the network twice before, when changing the default "
-"signature type,\n"
+"We have \"rekeyed\" the network twice before, when changing the default signature type,\n"
 "but this is the first time we've changed the default encryption type.\n"
 "Hopefully it will all go smoothly, but we're starting slowly to be sure."
-msgstr ""
-"In passato abbiamo già \"riconfigurato\" due volte la rete per cambiare "
-"il tipo di firma di default, ma questa è la prima volta che modifichiamo "
-"il tipo di cifratura di default.\n"
-"Fortunatamente tutto andrà bene, ma stiamo iniziando lentamente per "
-"esserne sicuri."
+msgstr "In passato abbiamo già \"riconfigurato\" due volte la rete per cambiare il tipo di firma di default, ma questa è la prima volta che modifichiamo il tipo di cifratura di default.\nFortunatamente tutto andrà bene, ma stiamo iniziando lentamente per esserne sicuri."
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:49
 msgid "Build: Git migration"
@@ -12866,7 +11456,8 @@ msgid "Crypto: Increase ratchet tag window to prevent message loss"
 msgstr ""
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:68
-msgid "I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys"
+msgid ""
+"I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys"
 msgstr ""
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:69
@@ -12925,3 +11516,1442 @@ msgstr ""
 msgid "Util: New unit tests"
 msgstr ""
 
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:2
+msgid "0.9.50 Release"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:9
+msgid "0.9.50 with IPv6 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:16
+msgid ""
+"0.9.50 continues the transition to ECIES-X25519 for router encryption keys.\n"
+"We have enabled DNS over HTTPS for reseeding to protect users from passive DNS snooping.\n"
+"There are numerous fixes and improvements for IPv6 addresses, including new UPnP support."
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:22
+msgid ""
+"We have finally fixed some longstanding SusiMail corruption bugs.\n"
+"Changes to the bandwidth limiter should improve network tunnel performance.\n"
+"There are several improvements in our Docker containers.\n"
+"We have improved our defenses for possible malicious and buggy routers in the network."
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:39
+msgid "Docker improvements"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:40
+msgid "NTCP: Remove support for version 1"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:41
+msgid "Reseed: Use DNSOverHTTPS"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:42
+msgid "Router: Increase ECIES rekey probability"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:43
+msgid "Router: Persist Sybil blocklist"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:44
+msgid "SSU: Enable introducers and introductions via IPv6 (proposal 158)"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:46
+msgid "Transports: Publish support for outbound IPv4/v6 (proposal 158)"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:47
+msgid "UPnP: Add support for IPv6"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:53
+msgid "Debian: Fix link to compiler jar"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:54
+msgid "i2psnark: Fix theme selection"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:55
+msgid "Jetty: Fix detection of SSL connector"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:56
+msgid "NetDB: Fix NPE when validating expired blinded leaseset"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:57
+msgid "NTP: Year 2036 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:58
+msgid "Router: Fix rekeying every restart on ARM"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:59
+msgid "Router: Fix decryption of encrypted leasesets"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:60
+msgid "SAM: Fix removal of subsessions"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:61
+msgid "SSU: Fix excessive dropping by the bandwidth limiter"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:62
+msgid "SSU: Fix publishing 'C' capability when not an introducer"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:63
+msgid "SSU: Fixes for firewalled/not firewalled state transitions"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:64
+msgid "SSU: IPv6 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:65
+msgid "SSU: Peer test fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:66
+msgid "SusiMail: Fix theme selection"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:67
+msgid "SusiMail: Fix stream closed errors"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:68
+msgid "SusiMail: Fix corruption in display of large, new messages"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:69
+msgid "Tunnels: Several fixes in the participating tunnel bandwidth limiter"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:70
+msgid "UPnP: Fix leases not being renewed before expiration"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:76
+msgid "Build: Remove empty jars and wars from installers"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:77
+msgid "Build: Prep for different release and API versions"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:78
+msgid "Build: Remove launcher code"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:79
+msgid "Gradle build fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:80
+msgid "Profiles: Disable tunnel peer test"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:81
+msgid "Profiles: Remove unused tunnel test response time stat"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:82
+msgid "SSU: Avoid outbound connections to buggy routers"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:83
+msgid "Transports: Increase connection limits for some platforms"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:2
+msgid "1.5.0 Release"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:9
+msgid "1.5.0 with new tunnel build messages"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:16
+msgid ""
+"Yes, that's right, after 9 years of 0.9.x releases, we are going straight from 0.9.50 to 1.5.0.\n"
+"This does not signify a major API change, or a claim that development is now complete.\n"
+"It is simply a recognition of almost 20 years of work to provide anonymity and security for our users."
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:22
+msgid ""
+"This release finishes implementation of smaller tunnel build messages to reduce bandwidth.\n"
+"We continue the transition of the network's routers to X25519 encryption.\n"
+"Of course there are also numerous bug fixes and performance improvements."
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:39
+msgid "Tunnels: Finish support for new build messages (proposal 157)"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:40
+msgid "Updates: Support for .dmg and .exe updates"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:45
+msgid "Console: Fix generation of SSL keys on Java 17"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:46
+msgid "i2psnark: Fix autostart for magnets"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:47
+msgid "Router: Fix rare deadlock in publishing our RI"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:48
+msgid "SSU: Fix handling of bad peer test responses"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:49
+msgid "UPnP: IPv6 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:54
+msgid "Jetty: Improve sort in directory listings"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:55
+msgid "Jetty: Add X-I2P-Location header"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:56
+msgid "Router: Increase probability to rekey to ECIES"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:57
+msgid "Streaming: Performance improvements for low-latency connections"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:2
+msgid "I2P Celebrates its 20th Year"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:9
+msgid "I2P has been around for 20 years, let's take a look back"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:11
+msgid "20 Years of I2P"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:16
+msgid ""
+"It's hard to believe, but I2P has been around for nearly 20 years! From its\n"
+"beginning as a C project which provided anonymous access to IRC, we've had\n"
+"hundreds of contributors, accepted checkins from dozens of coders, used 2\n"
+"main languages, 3 version control systems, experienced a migration of its\n"
+"crypography, and multiple soft-forks. There have been around 500 registered\n"
+"sites on the Invisible Web, and countless unregistered I2P sites that were only\n"
+"accessible via their cryptographic hostnames."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:26
+msgid ""
+"Thanks to the participation of users like you, the network has grown from a tiny\n"
+"group of power users to over 75,000 nodes operated from all over the world,\n"
+"made of I2P routers bundled in perhaps dozens of applications. Today I2P is\n"
+"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, OpenBSD, and\n"
+"many other systems. I2P can run on phones and even in SOHO routers (thanks to the\n"
+"independent C++ implementation of the protocol, i2pd)."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:35
+msgid "A Routing Protocol with Flagship Applications"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:40
+msgid ""
+"Even before other anonymity projects were providing their own application\n"
+"bundles, I2P was a tool for building applications that were configured for\n"
+"anonymity. Over the years, we've leaned on this strength, by expanding our\n"
+"APIs to support more and more versatile applications. Today, we're still\n"
+"developing new ways of building I2P into applications."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:48
+msgid ""
+"Using the power of the Hidden Services Manager or the SAM API, developers of all\n"
+"kinds of applications can empower their users with anonymity using I2P. Exciting\n"
+"downstream projects like Monero's I2P-Zero have made it very easy for developers\n"
+"to help their users get connected to I2P. Today, I2P helps provide anonymity to\n"
+"dozens of applications including Bitcoin, IRC, email and multiple file-sharing\n"
+"protocols."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:57
+msgid "An Anonymous Network By Everyone, For Everyone"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:62
+msgid ""
+"I2P has always been a decentralized network, because its obvious that providing\n"
+"an anonymity network is an intrinsically collaborative process. To illustrate\n"
+"with the most extreme example, a single computer cannot provide itself\n"
+"with anonymity, nor can it be a useful network, by definiton. However, building\n"
+"I2P in this fully-decentralized manner hasn't always been easy."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:70
+msgid ""
+"From the beginning, I2P would need to be scalable, and be able to balance itself\n"
+"so that  high-bandwidth nodes wouldn't be able to easily take over the network.\n"
+"Sybil attacks would leave the realm of academia and we would need to develop\n"
+"new defenses against them."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:77
+msgid ""
+"We've worked very hard to never compromise on this stance, and today every I2P\n"
+"router helps participate in providing the network with bandwidth resources and\n"
+"providing the users with anonymity. In doing so, we've learned incredible things\n"
+"and produced a network which at times has seemed inconceivable."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:84
+msgid "Celebrating I2P"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:89
+msgid ""
+"Over the next 2 weeks, we've planned some blog posts where we'll explore the past,\n"
+"present, and future of I2P, highlight applications and tools that build on\n"
+"and enhance I2P, and showcase the best of our community. Check back here for\n"
+"more in the coming days!"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:96
+msgid ""
+"`The History of I2P\n"
+"  </en/blog/post/2021/08/28/History-of-I2P>`_"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:98
+msgid ""
+"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from Monero)\n"
+"  </en/blog/post/2021/09/08/I2P-Jpackage-Bundles-and-Zero>`_"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:100
+msgid ""
+"`Level-Up your I2P use with Encrypted LeaseSets\n"
+"  </en/blog/post/2021/09/07/Level-Up-Encrypted-Leasesets>`_"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:102
+msgid ""
+"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for "
+"End-Users"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:103
+msgid "I2P's Usability Journey"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:104
+msgid "Building Bridges - Making Connections with Other Privacy Projects"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:2
+msgid "20 Years of Privacy: A brief History of I2P"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:9
+msgid "A history of I2P As We Know It"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:11
+msgid ""
+"Invisibility is the best defense: building an internet within an internet"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:16
+msgid ""
+"I believe most people want this technology so they can express\n"
+"    themselves freely. It’s a comfortable feeling when you know you can\n"
+"    do that. At the same time we can conquer some of the problems seen\n"
+"    within the Internet by changing the way security and privacy is\n"
+"    viewed, as well as the extent to what it is valued."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:23
+msgid ""
+"In October 2001, 0x90 ( Lance James) had a dream. It started as a\n"
+"“desire for instant communication with other Freenet users to talk about\n"
+"Freenet issues, and exchange Freenet keys while still maintaining\n"
+"anonymity, privacy and security.” It was called IIP — the Invisible IRC\n"
+"Project."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:35
+msgid ""
+"The Invisible IRC Project was based on an ideal and framework behind The\n"
+"InvisibleNet:"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:38
+msgid "In an interview from 2002, 0x90 described the project:"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:40
+msgid ""
+"“InvisibleNet is a research & development driven organization whose main\n"
+"    focus is the innovation of intelligent network technology. Our goal is\n"
+"    to provide the highest standards in security and privacy on the widely\n"
+"    used, yet notoriously insecure Internet.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:45
+msgid ""
+"\"The InvisibleNet team is comprised of a talented group of developers and\n"
+"    architects entirely dedicated to providing its users with both\n"
+"    convenience and the very best in secure communication.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:49
+msgid ""
+"\"Our technological ideals are reflected in the implementation of a\n"
+"    framework that is solid in design, and transparent in its application.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:52
+msgid ""
+"\"Here at InvisibleNet we strive towards the greatest level of quality\n"
+"    possible by keeping all areas of our research & development open and\n"
+"    available to the public for peer review, feedback, suggestions and new\n"
+"    ideas.”"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:57
+msgid ""
+"\"The Invisible Internet Project: Defined as the “New Internet”.\n"
+"    Peer 2 Peer Internet. Using your peers to protect you. It is a\n"
+"    similar concept to the Invisible IRC Project, with its design as our\n"
+"    test model. We plan to re-design the Internet by taking it a step\n"
+"    further and having security and privacy be first priority.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:63
+msgid ""
+"\"The Invisible Internet Project or Protocol will be utilizing the\n"
+"    tests and research/development concepts of the Invisible IRC Project\n"
+"    to give us the scalability that we need and leverage this to take it\n"
+"    to the next level.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:68
+msgid ""
+"\"This, in essence will be an impenetrable neural-network, that is\n"
+"    self-driven, self-defensed, and completely seamless to already\n"
+"    applied protocols, specifically client to server (or agents as I call\n"
+"    them). It will be THE next transport layer, a layer on top of the\n"
+"    notoriously insecure Internet, to deliver full anonymity, privacy,\n"
+"    and security at the highest level possible. Decentralized and peer to\n"
+"    peer Internet, by the way, means no more worrying about your ISP\n"
+"    controlling your traffic. This will allow you to do seamless\n"
+"    activities and change the way we look at security and even the\n"
+"    Internet, utilizing public key cryptography, IP steganography, and\n"
+"    message authentication. The Internet that should have been, will be\n"
+"    soon.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:85
+msgid "All citations and quotes are from the interviews found here:"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:90
+msgid ""
+"By 2003, several other similar projects had started, the largest being\n"
+"Freenet, GNUNet, and Tor. All of these projects had broad goals to\n"
+"encrypt and anonymize a variety of traffic. For IIP, it became clear\n"
+"that IRC alone was not a big-enough target. What was needed was an\n"
+"anonymizing layer for all protocols. IIP by now was also being called\n"
+"“InvisibleNet”."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:97
+msgid ""
+"In early 2003, a new anonymous developer, “jrandom” joined the project.\n"
+"His explicit goal was to broaden the charter of IIP."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:100
+msgid ""
+"jrandom wished to rewrite the IIP code base in Java, a language he was\n"
+"familiar with, and the same language Freenet was using. He also wished\n"
+"to redesign the IIP protocols based on recent papers and the early\n"
+"design decisions that Tor and Freenet were making. Some of these\n"
+"concepts and naming conventions, such as “onion routing”, were modified\n"
+"to become “garlic routing”. For several of the design decisions, jrandom\n"
+"made different choices than Tor did, including selecting different\n"
+"cryptographic primitives in a number of places. Many (but not all) of\n"
+"these choices turned out quite well. For some others, such as using\n"
+"unidirectional tunnels rather than Tor’s bidirectional tunnels, the\n"
+"benefits and trade-offs are still not well-studied."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:112
+msgid ""
+"jrandom also set out a clear vision for the architecture of the code. It\n"
+"would be a client/server model, with the server (i.e. the router)\n"
+"isolated from any “client” protocols. Clients such as web browsers, web\n"
+"servers, IRC clients and servers, and others, would communicate through\n"
+"the router using I2CP, the I2P Client Protocol."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:118
+msgid ""
+"jrandom also had strong opinions on the direction of the project and its\n"
+"philosophy. He was strongly committed to open source and free software.\n"
+"He explicitly set a goal of protection from organizations with\n"
+"“unlimited financial and political resources.”"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:123
+msgid ""
+"By late summer 2003, jrandom had taken control of the project, and\n"
+"renamed it the Invisible Internet Project or “I2P”. He published a\n"
+"document outlining the philosophy of the project, and placed its\n"
+"technical goals and design in the context of mixnets and anonymizing\n"
+"layers. He also published the specification of two protocols (I2CP and\n"
+"I2NP) and their underlying data structures, that formed the basis of the\n"
+"network I2P uses today. Lance (“nop”) was last seen in a project meeting\n"
+"on November 11, 2003."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:138
+msgid ""
+"By fall 2003, I2P, Freenet, and Tor were rapidly developing. Business\n"
+"Week published an article on “The Underground Internet” which referenced\n"
+"InvisibleNet and discussed “darknets” extensively. jrandom released I2P\n"
+"version 0.2 on November 1, 2003, and continued rapid releases for the\n"
+"next 3 years. He maintained regular weekly meetings and status notes\n"
+"during this time. Several popular services and “respites” emerged during\n"
+"this time. Auto updates via clearnet HTTP became available in 2004."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:146
+msgid ""
+"Through 2004 and 2005, router development continued, and several\n"
+"“clients” or applications were added to the I2P package. “Mihi” wrote\n"
+"the first streaming protocol implementation and the i2ptunnel interface\n"
+"for configuring and starting client tunnels. “Susi” wrote the web mail\n"
+"and address book applications SusiMail and SusiDNS. Many people worked\n"
+"on the router console web interface. A bridge to make it easier for\n"
+"non-I2P clients to communicate over I2P, called “SAM” (Simple Anonymous\n"
+"Messaging) was added."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:155
+msgid "In February 2005, zzz installed I2P for the first time."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:156
+msgid ""
+"Anonymity projects were in the news. After surveying the field, he\n"
+"  installed Freenet, and found it ambiguous, and difficult to explore.\n"
+"  Not only that, it was very resource heavy and it was difficult to get\n"
+"  anything to load. Tor and I2P were the other options, and he tried\n"
+"  I2P."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:162
+msgid ""
+"zzz had no preconceived plans to contribute to the project, and had\n"
+"never written a line of Java. He had maybe used IRC once. At this time,\n"
+"I2P was at version 0.5, with maybe a thousand users and three hard-coded\n"
+"floodfills. Forum.i2p and postman’s tracker were up and running at the\n"
+"time, and weekly meetings and status notes, and releases every couple of\n"
+"week were happening."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:169
+msgid ""
+"By summer 2005, zzz had set up two websites. The first was zzz.i2p,\n"
+"which over the years became a central resource for I2P development, and\n"
+"still is. The second was stats.i2p, the first site to gather statistics\n"
+"on I2P network performance and present graphs on both the network and\n"
+"individual routers. While the individual router statistics eventually\n"
+"had to be shut down due to the tremendous growth of the network, the\n"
+"overall performance graphs remain. We are not sure that he ever planned\n"
+"to become the release manger for almost 2 decades, but we are happy he\n"
+"did. The project has not only stayed active, it has thrived and scaled\n"
+"to the demands of its growth."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:184
+msgid ""
+"On July 27, 2005, jrandom released I2P version 0.6, including an\n"
+"innovative new UDP transport protocol he designed called “SSU”, for\n"
+"Secure Semi-reliable UDP. It contained features for IP discovery and\n"
+"firewall traversal."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:189
+msgid ""
+"In September 2005, jrandom bundled “Syndie”, his new high-latency\n"
+"anonymous messaging system. In October 2005, jrandom ported Snark, a\n"
+"Java BitTorrent client, to become an I2P application and bundled it with\n"
+"the I2P package. This completed the collection of client applications\n"
+"that are still bundled with I2P today."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:195
+msgid ""
+"In late 2005 and early 2006, jrandom redesigned the way that I2P built\n"
+"tunnels. This was a major effort that was done to increase the security\n"
+"of the tunnel building, which is crucial to maintain anonymity and\n"
+"resist attacks. He worked closely with the Freenet developers, including\n"
+"“Toad”, on this design. The new build protocol required new I2NP\n"
+"messages and a hard cut-over or “flag day”. These changes were released\n"
+"in version 0.6.1.10 on February 16, 2006. This is significant as it is\n"
+"the last flag day I2P has had. While, in practice, an 0.6.1.10 router\n"
+"would not work well, if at all, in today’s network, we are, technically\n"
+"speaking, backwards-compatible with this ten-year-old version today."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:206
+msgid ""
+"By early 2006, the I2P software was at least feature-complete, but it\n"
+"was still not widely-known. jrandom’s view was that it shouldn’t be\n"
+"marketed publicly until it was near-perfect, and labeled as version 1.0.\n"
+"The network had perhaps a thousand users at the time. Project members\n"
+"were discouraged from talking about it online, and the website\n"
+"(`i2p.net <http://i2p.net>`__) was unpolished and incomplete."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:213
+msgid ""
+"On July 27, 2006, jrandom released I2P version 0.6.1.23, including an\n"
+"innovative new TCP transport protocol he designed called “NTCP”, for\n"
+"new-IO-based TCP. It used Java’s new IO library for efficient handling\n"
+"of large numbers of TCP connections."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:218
+msgid ""
+"In late 2006, jrandom turned his focus to Syndie. He came to see it as\n"
+"his top priority, and the “killer application” for I2P. Highly secure\n"
+"and almost unusable, it delayed messages for up to two days before\n"
+"delivery to resist traffic analysis. Later in 2006, he stopped work on\n"
+"the bundled Syndie application and started a new, incompatible,\n"
+"standalone messaging application. This application was, confusingly,\n"
+"also called “Syndie”. The new Syndie was a large and complex\n"
+"development, and it was essentially a one-man project."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:227
+msgid ""
+"From late 2006 into 2007, core I2P development and releases slowed\n"
+"dramatically. From almost 30 releases in 2005 and 13 in the first half\n"
+"of 2006, there were only 5 in the second half of 2006 and only 4 in all\n"
+"of 2007. During this time, zzz and a developer named Complication had\n"
+"source code commit privileges and were making changes, but their\n"
+"understanding of the code base was limited. zzz worked, for example, on\n"
+"improving i2psnark, fixing bugs, and redesigning the strategy for\n"
+"anticipatory tunnel building. But there was a lot more that needed to be\n"
+"done. Complication and zzz did what they could, and they wrote the code\n"
+"for almost all the changes in the four 2007 releases\n"
+"(0.6.1.27–0.6.1.30). By this time, jrandom was providing very little\n"
+"guidance, code review, or direction for the project."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:240
+msgid "It wasn’t apparent at the time, but the project was in trouble."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:242
+msgid ""
+"jrandom had almost stopped working on the core I2P router and\n"
+"applications. Even the new Syndie, which he had declared as far more\n"
+"important than I2P itself, languished. After regular releases through\n"
+"March 2007, his next Syndie release, 1.100a, was August 25, 2007. All\n"
+"I2P releases were required to be signed by jrandom’s key, and he built\n"
+"and signed his last release, 0.6.1.30, on October 7, 2007."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:249
+msgid ""
+"In November 2007, disaster struck. Complication and zzz received a\n"
+"cryptic message from jrandom, that he would have to take time off from\n"
+"both Syndie and I2P development for a year or more. He expected that he\n"
+"would still be available to sign releases, but was willing to pass the\n"
+"release signing key to somebody else. Complication and zzz immediately\n"
+"replied with a request for the release key and other credentials, such\n"
+"as access to the website, mailing list, CVS administration, and others.\n"
+"Unfortunately, they never heard from jrandom again."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:258
+msgid ""
+"Late 2007 and early 2008, they awaited jrandom’s response, and wondered\n"
+"what to do next. However, all of the project infrastructure remained\n"
+"active, so it didn’t seem to be an immediate crisis. They knew, however,\n"
+"that without the release key or website access, they would have to sign\n"
+"with new keys, host the files on a new website, and require everybody to\n"
+"manually update since their keys wouldn’t be recognized."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:265
+msgid ""
+"The second stage of the disaster happened on January 13, 2008. The\n"
+"hosting company for almost all `i2p.net <http://i2p.net>`__ servers\n"
+"suffered a power outage, and they did not fully return to service. Only\n"
+"jrandom had the credentials required to restore service. In addition,\n"
+"the centralized CVS source control appeared to be down, so five years of\n"
+"source control history appeared to be lost. Luckily, the CVS server was\n"
+"up, only the name server for it was down. The full contents of the CVS\n"
+"archive was quickly downloaded."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:274
+msgid ""
+"Complication, welterde, and zzz quickly made a number of decisions to\n"
+"  get the project back up and running. Welterde started a new website at\n"
+"  `i2p2.de <http://i2p2.de>`__. I2P needed to move to a decentralized\n"
+"  source code control system. They tested bazaar and that did not work\n"
+"  well over I2P. Git was just getting started. jrandom had used monotone\n"
+"  for Syndie and liked its security properties, and it worked well over\n"
+"  I2P, so it was selected."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:281
+msgid ""
+"Several people set up new services. The next release, 0.6.1.31, was\n"
+"  signed by Complication and required a manual upgrade. It was released\n"
+"  on February 10, 2008."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:285
+msgid ""
+"The project realized that even though it claimed to be totally\n"
+"decentralized, it actually depended on a number of centralized\n"
+"resources, above all, on jrandom. Work was done throughout 2008 to\n"
+"decentralize the project, and distribute roles to a number of people.\n"
+"Additionally, it was realized that development had essentially stalled\n"
+"in 2007, because jrandom had stopped working on it, but had not\n"
+"delegated to other developers. Nobody had an overall understanding of\n"
+"the code base."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:294
+msgid ""
+"Complication continued to sign the releases through mid-2009, but his\n"
+"contributions declined as he focused on activism and other projects.\n"
+"Starting with release 0.7.6 on July 31, 2009, zzz would sign the next 49\n"
+"releases."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:299
+msgid ""
+"In December 2008, zzz attended his first CCC, 25C3 in Berlin, and met\n"
+"other I2P project team members for the first time, including hottuna and\n"
+"welterde. The experience was overwhelming, and also humbling, as he\n"
+"struggled to explain I2P to others or answer even basic questions about\n"
+"its design and use of cryptography."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:305
+msgid ""
+"By mid-2009, zzz had come to understand the code base much better. Far\n"
+"from being complete or perfect, it was filled with problems and\n"
+"scalability issues. In 2009 the project experienced more network growth\n"
+"due to its anonymizing properties as well as its circumvention\n"
+"abilities. Participants appeared who were beginning to adopt the network\n"
+"for reasons like censorship and clearnet issues like blocking of popular\n"
+"services. For development gains, in-net auto updates became available\n"
+"for the software."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:316
+msgid ""
+"July 2010 zzz briefly presented I2P at the end of Adrian Hong’s\n"
+"presentation at HOPE XXXX. Adrian talked about how tech has helped\n"
+"expose human rights violations, and the need for defensive tools for\n"
+"activists. He urged that we all be ambassadors for all tech, stay on top\n"
+"of new tech, and keep the barrier low and educate people about how to\n"
+"use the tool we create."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:323
+msgid ""
+"He also talked about how we need many options for people to use, and\n"
+"asked how do we make it easier to support human rights, freedom of\n"
+"expression?"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:327
+msgid ""
+"At the end of the talk, zzz was invited on stage to introduce I2P and\n"
+"give an overview of what the project was about. The same weekend, it was\n"
+"pointed out that the I2P documentation was not in great shape."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:331
+msgid ""
+"In Fall 2010, zzz declared a moratorium on I2P development until the\n"
+"website documentation was complete and accurate. It took 3 months to get\n"
+"it done."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:335
+msgid ""
+"Beginning in 2010, until COVID restrictions were put in place, zzz, ech,\n"
+"hottuna, and other I2P contributors have attended CCC ( Chaos\n"
+"Communications Congress) every year. Over the years, meeh, Zab, Sadie,\n"
+"LazyGravy, KYTV, IDK and others have made the trip to Germany to share\n"
+"tables with other projects and celebrate the end of a year of releases.\n"
+"The project looks forward to one day being able to meet up again and\n"
+"have an in-person yearly roadmap meeting."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:343
+msgid ""
+"Anoncoin, a digital cryptocurrency that focuses on privacy and anonymity\n"
+"for its users was created in 2013. It was the first coin that provided\n"
+"built-in support for I2P, as well as Tor that makes it impossible to\n"
+"determine the IP address of the user. The developers, including meeh,\n"
+"also ran organizations like Privacy Solutions, and provided infrastructure\n"
+"support to the I2P network by running services like outproxies and\n"
+"reseed servers."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:351
+msgid ""
+"I2PBote development started to take off again in 2014 when str4d began\n"
+"contributing to the project. Bote is a server-less email client — it\n"
+"stores email in a `distributed hash\n"
+"table <http://en.wikipedia.org/wiki/Distributed_hash_table>`__. Email is\n"
+"“automatically encrypted and digitally signed, which ensures no one but\n"
+"the intended recipient can read the email, and third parties cannot\n"
+"forge them.” ( https://i2pbote.xyz/). The project has existed since\n"
+"2009."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:366
+msgid ""
+"At Real World Crypto that year, zzz, psi and str4d began to talk about\n"
+"and review the plan to update I2P’s cryptography. The same year, the\n"
+"project was awarded a $5k donation from Duck Duck Go. Lavabit,\n"
+"SecureDrop, RiseUp and Mailpile also received donations for supporting\n"
+"better trust and privacy online."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:372
+msgid ""
+"By late 2014 most new signing crypto was complete, including ECDSA and\n"
+"EdDSA. New destination crypto was available; but new router info crypto\n"
+"needed to wait a year for the network to upgrade sufficiently."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:376
+msgid ""
+"During the early part of 2015, zzz posted to Twitter that it would be\n"
+"great to have a mini conference for I2P. In Spring, it was decided that\n"
+"I2PCon would take place that August over the course of a weekend."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:380
+msgid ""
+"Hottuna and Sadie organized most of the details, getting graphic assets\n"
+"created, posters printed and a banner made for the podium. Nick at\n"
+"Hacklab, where the event would take place, helped with making sure the\n"
+"space was ready for the event. Sadie reached out to the local infosec\n"
+"community and helped secure guest speakers as well. The event happened\n"
+"on one of the hottest weekends of the Summer, with attendees arriving\n"
+"from America and Europe. The I2P community did an amazing job of\n"
+"supporting the event by postering, giving talks, and spreading the word\n"
+"in forums and on social media. The talks can be viewed on KYTV’s YouTube\n"
+"Channel https://www.youtube.com/channel/UCZfD2Dk6POE-VU8DOqW7VVw"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:395
+msgid ""
+"In January 2016 at Real World Crypto Stanford — str4d gave a talk on the\n"
+"crypto migration progress and future plans for the project. zzz and\n"
+"others would continue weekly meetings to plan the migration over the\n"
+"next few years."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:400
+msgid ""
+"NTCP2 was implemented in 2018, in release 0.9.36. It was disabled by\n"
+"default so that it could be tested. It was enabled in 0.9.37. NTCP1 was\n"
+"disabled in 0.9.40."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:404
+msgid ""
+"The new I2P transport protocol provides effective resistance against\n"
+"    DPI censorship. It also results in reduced CPU load because of the\n"
+"    faster, modern cryptography used. It makes I2P more likely to run on\n"
+"    low-end devices, such as smartphones and home routers. Both major I2P\n"
+"    implementations have full support for NTCP2 and it make NTCP2\n"
+"    available for use starting with version 0.9.36 (Java) and 2.20 (i2pd,\n"
+"    C++)."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:412
+msgid ""
+"The complete implementation details can be read here\n"
+"https://geti2p.net/en/blog/post/2018/08/20/NTCP2"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:415
+msgid ""
+"0.9.39 included extensive changes for new network database types\n"
+"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support\n"
+"development of RPC applications."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:419
+msgid ""
+"In 2019, the team decided to attend more conferences. That year IDK and\n"
+"zzz attended DefCon, and IDK gave a workshop on I2P application\n"
+"development. At Monero Village, zzz gave a talk called I2P for\n"
+"Cryptocurrency Developers."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:424
+msgid ""
+"Late that year, Sadie and IDK attended Our Networks in Toronto, where\n"
+"IDK gave a lightning talk about I2P."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:427
+msgid ""
+"Sadie attended RightsCon in Tunis and the Internet Freedom Festival in\n"
+"Valencia to meet with NGO’s and Human Right Defenders. Thanks to the the\n"
+"connections we made, the project received grants for usability and\n"
+"accessibility support from Open Tech Fund, and most recently Internews.\n"
+"This will ensure more user friendly onboarding, UX, and information\n"
+"architecture improvements to support the growing interest in the\n"
+"network. It will also support specific tooling to help in-need users\n"
+"with specific risk surfaces through user research."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:438
+msgid ""
+"That Summer, Hoàng Nguyên Phong had his research into I2P censorship\n"
+"accepted too FOCI at USENIX in Santa Clara. Sadie had supported the\n"
+"research and they attended together. I2P Metrics was created during this\n"
+"time https://i2p-metrics.np-tokumei.net/, and well as research into more\n"
+"resistant reseed servers for the I2P network\n"
+"https://homepage.np-tokumei.net/post/notes-i2p-reseed-over-cloudflare/.\n"
+"You can read the research report here\n"
+"https://homepage.np-tokumei.net/post/notes-otf-wrapup-blogpost/."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:447
+msgid ""
+"At CCC that year, the decision was made to migrate from Monotone too\n"
+"GitLab. The project was one of the last to use Monotone, and it was time\n"
+"to prepare to move on. IDK would spend 2020 ensuring the process was as\n"
+"smooth as it could be. The pandemic would result in the team not being\n"
+"able to see each other that year to celebrate the ( mostly) smooth move\n"
+"to Gitlab. On December 10. 2020, the project switched off the old mtn\n"
+"i2p.i2p branch, and moved the development of the core Java I2P libraries\n"
+"from Monotone to Git officially."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:456
+msgid ""
+"Congratulations and thanks to everyone who helped in the git\n"
+"    migration, especially zzz, eche|on, nextloop, and our site mirror\n"
+"    operators! While some of us will miss Monotone, it has become a\n"
+"    barrier for new and existing participants in I2P development and\n"
+"    we’re excited to join the world of developers using Git to manage\n"
+"    their distributed projects."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:465
+msgid ""
+"0.9.47 enabled the new end-to-end encryption protocol (proposal 144) by\n"
+"default for some services. A Sybil analysis and blocking tool was also\n"
+"now enabled by default. 0.9.48 enabled the new end-to-end encryption\n"
+"protocol (proposal 144) for most services. Preliminary support was added\n"
+"for new tunnel build message encryption (proposal 152). There were\n"
+"significant performance improvements throughout the router."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:472
+msgid ""
+"0.9.49 was the release that brought faster crypto. The I2P network\n"
+"became faster and more secure. Improvements and fixes for the SSU (UDP)\n"
+"transport resulted in faster speeds. The release also started the\n"
+"migration to new, faster ECIES-X25519 encryption for routers. The\n"
+"project had been working on the specifications and protocols for new\n"
+"encryption for several years, and was getting close to the end of it.\n"
+"The migration would take several releases to complete."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:480
+msgid ""
+"To minimize disruption, only new installs and a very small percentage of\n"
+"existing installs (randomly selected at restart) would be using the new\n"
+"encryption."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:484
+msgid ""
+"The project had “rekeyed” the network twice before, when changing the\n"
+"default signature type, but this was the first time it had changed the\n"
+"default encryption type. 0.9.50 enabled DNS over HTTPS for reseeding to\n"
+"protect users from passive DNS snooping. There were numerous fixes and\n"
+"improvements for IPv6 addresses, including new UPnP support."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:492
+msgid "1.5.0 — The early anniversary release because it is so good!"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:495
+msgid ""
+"Yes, that’s right, after 9 years of 0.9.x releases, we are going\n"
+"    straight from 0.9.50 to 1.5.0. This does not signify a major API\n"
+"    change, or a claim that development is now complete. It is simply a\n"
+"    recognition of almost 20 years of work to provide anonymity and\n"
+"    security for our users."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:501
+msgid ""
+"This release finishes implementation of smaller tunnel build messages\n"
+"    to reduce bandwidth. We continue the transition of the network’s\n"
+"    routers to X25519 encryption. Of course there are also numerous bug\n"
+"    fixes and performance improvements."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:506
+msgid ""
+"As usual, we recommend that you update to this release. The best way\n"
+"    to maintain security and help the network is to run the latest\n"
+"    release."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:510
+msgid "Congratulations team. Let’s do another 20."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:2
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:11
+msgid "Level up your I2P Skills with Encrypted LeaseSets"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:9
+msgid ""
+"It has been said that I2P emphasizes Hidden Services, we examine one "
+"interpretation of this"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:16
+msgid ""
+"It has been said in the past that I2P emphasizes support for Hidden Services,\n"
+"which is true in many ways. However, what this means to users, developers, and\n"
+"hidden service administrators isn't always the same. Encrypted LeaseSets and\n"
+"their use-cases provide a unique, practical window into how I2P makes hidden\n"
+"services more versatile, easier to administer, and how I2P extends on the\n"
+"Hidden Service concept to provide security benefits for potentially interesting\n"
+"use-cases."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:26
+msgid ""
+"What is a LeaseSet?\n"
+"-------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:31
+msgid ""
+"When you create a hidden service, you publish something called a \"LeaseSet\" to\n"
+"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P users\n"
+"need to discover \"where\" your hidden service is on the I2P Network. It contains\n"
+"\"Leases\" which identify tunnels that can be used to reach your hidden service,\n"
+"and the public key of your destination, which clients will encrypt messages to.\n"
+"This type of hidden service is reachable by anyone who has the address, which\n"
+"is probably the most common use case for now."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:41
+msgid ""
+"Sometimes, you might not want to allow your hidden services to be accessible by\n"
+"anyone, though. Some people use hidden services as a way of accessing an SSH\n"
+"server on a home PC, or to stitch together a network of IOT Devices. In these\n"
+"cases it's not necessary, and may be counter-productive, to make your hidden\n"
+"service accessible to everyone one the I2P Network. This is where \"Encrypted\n"
+"LeaseSets\" come into play."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:50
+msgid ""
+"Encrypted LeaseSets: VERY Hidden Services\n"
+"------------------------------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:55
+msgid ""
+"Encrypted LeaseSets are LeaseSets which are published to the NetDB in an\n"
+"encrypted form, where none of the Leases or public keys are visible unless\n"
+"the client has the keys required to decrypt the LeaseSet inside of it. Only\n"
+"clients you share keys with(For PSK Encrypted LeaseSets), or who share their\n"
+"keys with you(For DH Encrypted LeaseSets), will be able to see the destination\n"
+"and no one else."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:64
+msgid ""
+"I2P Supports several strategies for Encrypted LeaseSets. The key characteristics\n"
+"of each strategy are important to understand when deciding which one to use. If\n"
+"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the server\n"
+"will generate a key(or keys) which the server operator then shares with each\n"
+"client. Of course, this exchange must happen out-of-band, possibly via an\n"
+"exchange on IRC for example. This version of Encrypted LeaseSets is sort of\n"
+"like logging into Wi-Fi with a password. Except, what you're logging into is\n"
+"a Hidden Service."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:75
+msgid ""
+"If an Encrypted LeaseSet uses a \"Diffie-Hellman(DH)\n"
+"strategy, then they keys are generated on the client instead. When a\n"
+"Diffie-Hellman client connects to a destination with an Encrypted LeaseSet, they\n"
+"must first share their keys with the server operator. The server operator then\n"
+"decides whether to authorize the DH client. This version of Encrypted LeaseSets\n"
+"is sort of like SSH with an `authorized_keys` file. Except, what you're logging\n"
+"into is a Hidden Service."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:85
+msgid ""
+"By Encrypting your LeaseSet, you not only make it impossible for unauthorized\n"
+"users to connect to your destination, you make it impossible for unauthorized\n"
+"visitors to even discover the real destination of the I2P Hidden Service. Some\n"
+"readers have probably already considered a use-case for their own Encrypted\n"
+"LeaseSet."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:93
+msgid ""
+"Using Encrypted LeaseSets to Safely Access a Router Console\n"
+"-----------------------------------------------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:98
+msgid ""
+"As a general rule, the more complex information a service has access to about\n"
+"your device, the more dangerous it is to expose that service to the Internet or\n"
+"indeed, to a Hidden Service network like I2P. If you want to expose such a\n"
+"service, you need to protect it with something like a password, or, in the case\n"
+"of I2P, a much more thorough and secure option could be an Encrypted LeaseSet."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:106
+msgid ""
+"**Before continuing, please read and understand that if you do the following**\n"
+"**procedure without an Encrypted LeaseSet, you will be defeating the security of**\n"
+"**your I2P router. Do not configure access to your router console over I2P without**\n"
+"**an Encrypted LeaseSet. Additionally, do not share your Encrypted LeaseSet PSK's**\n"
+"**with any devices you do not control.**"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:114
+msgid ""
+"One such service which is useful to share over I2P, but ONLY with an Encrypted\n"
+"LeaseSet, is the I2P router console itself. Exposing the I2P router console on\n"
+"one machine to I2P with an Encrypted LeaseSet allows another machine with a\n"
+"browser to administer the remote I2P instance. I find this useful for remotely\n"
+"monitoring my regular I2P Services. It could also be used to monitor a server\n"
+"which is used to seed a torrent long-term as a way to access I2PSnark."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:123
+msgid ""
+"For as long as it takes to explain them, setting up an Encrypted LeaseSet is\n"
+"straightforward to configure via the Hidden Services Manager UI."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:128
+msgid ""
+"On the \"Server\"\n"
+"---------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:137
+msgid ""
+"Start by opening the Hidden Services Manager at http://127.0.0.1:7657/i2ptunnelmgr\n"
+"and scroll to the bottom of the section that says \"I2P Hidden Services.\" Create\n"
+"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" with these\n"
+"\"Tunnel Cryptography Options\" and save the hidden service."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:148
+msgid ""
+"Then, select your new tunnel from the Hidden Services Manager main page. The\n"
+"Tunnel Cryptography Options should now include your first Pre-Shared Key. Copy\n"
+"this down for the next step, along with the Encrypted Base32 Address of your\n"
+"tunnel."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:159
+msgid ""
+"On the \"Client\"\n"
+"---------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:164
+msgid ""
+"Now switch computers to the client which will connect to the hidden service,\n"
+"and visit the Keyring Configuration at http://127.0.0.1:7657/configkeyring to\n"
+"add the keys from earlier. Start by pasting the Base32 from the Server into\n"
+"the field labeled: \"Full destination, name, Base32, or hash.\" Next, paste the\n"
+"Pre-Shared Key from the server into the \"Encryption Key\" field. Click save,\n"
+"and you're ready to securely visit the Hidden Service using an Encrypted\n"
+"LeaseSet."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:178
+msgid ""
+"Now You're Ready to Remotely Administer I2P\n"
+"-------------------------------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:183
+msgid ""
+"As you can see, I2P offers unique capabilities to Hidden Service Administrators\n"
+"which empower them to securely manage their I2P connections from anywhere in the\n"
+"world. Other Encrypted LeaseSets I keep on the same device for the same reason\n"
+"point to the SSH server, the Portainer instance I user to manage my service\n"
+"containers, and my personal NextCloud instance. With I2P, truly private, always\n"
+"reachable Self-Hosting is an achievable goal, in fact I think it's one of the\n"
+"things we're uniquely suited to, because of Encrypted LeaseSets. With them, I2P\n"
+"could become the key to securing self-hosted home automation or simply become\n"
+"the backbone of a new more private peer-to-peer web."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:2
+msgid "Improving I2P Adoption and Onboarding using Jpackage, I2P-Zero"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:9
+msgid ""
+"Versatile and emerging ways of installing and embedding I2P in your "
+"application"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:11
+msgid ""
+"For the majority of I2P's existence, it's been an application that runs with the\n"
+"help of a Java Virtual Machine that is already installed on the platform. This\n"
+"has always been the normal way to distribute Java applications, but it leads to\n"
+"a complicated installation procedure for many people. To make things even more\n"
+"complicated, the \"right answer\" to making I2P easy to install on any given\n"
+"platform might not be the same as any other platform. For example, I2P is quite\n"
+"simple to install with standard tools on Debian and Ubuntu based operating\n"
+"systems, because we can simply list the required Java components as \"Required\"\n"
+"by our package, however on Windows or OSX, there is no such system allowing us to make\n"
+"sure that a compatible Java is installed."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:24
+msgid ""
+"The obvious solution would be to manage the Java installation ourselves, but\n"
+"this used to a problem in-and-of-itself, outside of the scope of I2P. However,\n"
+"in recent Java versions, a new set of options has emerged which has the\n"
+"potential to solve this problem for many Java software. This exciting tool is\n"
+"called **\"Jpackage.\"**"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:32
+msgid "I2P-Zero and Dependency-Free I2P Installation"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:37
+msgid ""
+"The first very successful effort at building a dependency-free I2P Package was\n"
+"I2P-Zero, which was created by the Monero project originally for use with the\n"
+"Monero cryptocurrency. This project got us very excited because of it's success\n"
+"in creating a general-purpose I2P router which could easily packaged with an\n"
+"I2P application. Especially on Reddit, many people express their preference for\n"
+"the simplicity of setting up an I2P-Zero router."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:46
+msgid ""
+"This really proved to us that a dependency-free I2P Package which was easy to\n"
+"install was possible using modern Java tools, but I2P-Zero's use case was a\n"
+"little bit different than ours. It is best for embedded apps that need an I2P\n"
+"router that they can easily control using it's convenient control port on port\n"
+"\"8051\". Our next step would be to adapt the technology to the general-purpose\n"
+"I2P Application."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:55
+msgid "OSX Application Security Changes affect I2P IzPack Installer"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:60
+msgid ""
+"The issue became more pressing in recent versions of Mac OSX, where it is no\n"
+"longer straightforward to use the \"Classic\" installer which comes in the .jar\n"
+"format. This is because the application is not \"Notarized\" by Apple authorities\n"
+"and it is deemed a security risk. **However**, Jpackage can produce a .dmg file,\n"
+"which can be notarized by Apple authorities, conveniently solving our problem."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:68
+msgid ""
+"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to install on\n"
+"OSX than ever, no longer requiring users to install Java themselves and using\n"
+"standard OSX installation tools in their prescribed ways. The new .dmg installer\n"
+"makes setting up I2P on Mac OSX easier than it's ever been."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:79
+msgid "The I2P of the future is Easy to Install"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:84
+msgid ""
+"One of the things I hear from users the most is that if I2P wants adoption, it\n"
+"needs to be easy to use for people. Many of them want a \"Tor Browser Like\" user\n"
+"experience, to quote or paraphrase many familiar Redditors. Installation should\n"
+"not require complicated and error-prone \"post-installation\" steps. Many new\n"
+"users are not prepared to deal with their browser configuration in a thorough\n"
+"and complete way. To address this problem, we created the I2P Profile Bundle\n"
+"which configured Firefox so that it would automatically \"Just Work\" for I2P.\n"
+"As it's developed, it's added security features and improved integration with\n"
+"I2P itself. In it's latest version, it **also** bundles a complete, Jpackage\n"
+"powered I2P Router. The I2P Firefox Profile is now a fully-fledged distribution\n"
+"of I2P for Windows, with the only remaining dependency being Firefox itself.\n"
+"This should provide an unprecedented level of convenience for I2P users on\n"
+"Windows."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:2
+msgid "Bitcoin Core adds support for I2P!"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:9
+msgid "A new use case and a signal of growing acceptance"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:11
+msgid ""
+"An event months in the making, Bitcoin Core has added official support for I2P!\n"
+"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin nodes,\n"
+"using the help of nodes that operate within both I2P and the clearnet, making\n"
+"them first-class participants in the Bitcoin network. It's exciting to see\n"
+"large communities like Bitcoin taking notice of the advantages I2P can bring\n"
+"to them providing privacy and reachability to people all over the world."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:20
+msgid "How it Works"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:25
+msgid ""
+"I2P support is automatic, via the SAM API. This is also exciting news, because\n"
+"it highlights some of the things I2P is singularly good at, like empowering \n"
+"application developers to build I2P connections programmatically and\n"
+"conveniently. Bitcoin-over-I2P users can use I2P with no manual configuration by\n"
+"enabling the SAM API and running Bitcoin with I2P enabled."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:33
+msgid "Configuring your I2P Router"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:38
+msgid ""
+"In order to set up an I2P Router to provide anonymous connectivity to bitcoin,\n"
+"the SAM API needs to be enabled. In Java I2P, you should go to `http://127.0.0.1:7657/configclients\n"
+"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application Bridge\n"
+"with the \"Start\" button. You may also want to enable the SAM Application Bridge\n"
+"by default by checking the \"Run at Startup\" box and clicking \"Save Client\n"
+"Configuration.\""
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:47
+msgid ""
+"On i2pd, the SAM API is normally enabled by default, but if it isn't, you should\n"
+"set::\n"
+"\n"
+"  sam.enabled=true\n"
+"\n"
+"in your i2pd.conf file."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:56
+msgid "Configuring your Bitcoin Node for Anonymity and Connectivity"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:61
+msgid ""
+"Getting Bitcoin itself launched in an anonymous mode still requires editing some\n"
+"configuration files in the Bitcoin Data Directory, which is %APPDATA%\\Bitcoin on\n"
+"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ on Mac\n"
+"OSX. It also requires at least version 22.0.0 for I2P support to be present."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:68
+msgid ""
+"After following these instructions, you should have a private Bitcoin\n"
+"node which uses I2P for I2P connections, and Tor for .onion and clearnet\n"
+"connections, so that all your connections are anonymous. For convenience,\n"
+"Windows users should open their Bitcoin Data Directory by opening the start menu\n"
+"and searching for \"Run.\" Inside the run prompt, type \"%APPDATA%\\Bitcoin\" and\n"
+"press enter."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:77
+msgid ""
+"In that directory create a file called \"i2p.conf.\" On Windows, you should make\n"
+"sure that you've add quotes around the file when you save it, in order to\n"
+"prevent Windows from adding a default file extension to the file. The file\n"
+"should contain the following I2P-Related Bitcoin configuration options::\n"
+"\n"
+"  i2psam=127.0.0.1:7656\n"
+"  i2pacceptincoming=true\n"
+"  onlynet=i2p\n"
+"\n"
+"Next, you should create another file called \"tor.conf.\" The file should contain\n"
+"the following Tor related configuration options::\n"
+"\n"
+"  proxy=127.0.0.1:9050\n"
+"  onion=127.0.0.1:9050\n"
+"  onlynet=tor\n"
+"\n"
+"Finally, you'll need to \"include\" these configuration options in your Bitcoin\n"
+"configuration file, called \"bitcoin.conf\" in the Data Directory. Add these two\n"
+"lines to your bitcoin.conf file::\n"
+"\n"
+"  includeconf=i2p.conf\n"
+"  includeconf=tor.conf\n"
+"\n"
+"Now your Bitcoin node is configured to only use anonymous connections. In order\n"
+"to enable direct connections to remote nodes, remove the lines beginning in::\n"
+"\n"
+"  onlynet=\n"
+"\n"
+"You can do this if you do not require your Bitcoin node to be anonymous, and\n"
+"it helps anonymous users connect to the rest of the Bitcoin network."
+msgstr ""
diff --git a/i2p2www/translations/it/LC_MESSAGES/comparison.po b/i2p2www/translations/it/LC_MESSAGES/comparison.po
index dafee516d60934e3724cdb968f166dfc4baaa4cb..cc2b41f6533225a201c89dc86e46624faaec9b7d 100644
--- a/i2p2www/translations/it/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/it/LC_MESSAGES/comparison.po
@@ -1,24 +1,27 @@
-# Italian translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # alamir <christianm@libero.it>, 2014,2016
-# Giuseppe Pignataro (Fastbyte01) <rogepix@gmail.com>, 2014
-# Sebastiano Pistore <SebastianoPistore.info@protonmail.ch>, 2016-2017
+# alamir <christianm@libero.it>, 2014,2016
+# Giuseppe Pignataro <rogepix@gmail.com>, 2014
+# Giuseppe Pignataro <rogepix@gmail.com>, 2014
+# SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2018-08-24 11:51+0000\n"
-"Last-Translator: zzzi2p\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Giuseppe Pignataro <rogepix@gmail.com>, 2014\n"
 "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: it\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -26,34 +29,23 @@ msgstr "Confronto tra I2P e Freenet"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
@@ -61,20 +53,13 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
 msgstr ""
 
@@ -84,15 +69,11 @@ msgstr "Confronto tra I2P e gli altri progetti"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -102,17 +83,13 @@ msgstr ""
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina"
-" della rete:</a>"
+msgstr "I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina della rete:</a>"
 
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
@@ -130,52 +107,38 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
 msgstr ""
 
@@ -183,19 +146,15 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
@@ -207,32 +166,20 @@ msgstr ""
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
 msgstr ""
 
@@ -241,36 +188,23 @@ msgstr ""
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
 msgstr ""
 
@@ -278,10 +212,8 @@ msgstr ""
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
 msgstr ""
@@ -295,7 +227,7 @@ msgstr "Servizi VPN a pagamento"
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
@@ -357,9 +289,7 @@ msgstr "Confronto tra la la terminologia di I2P e quella di Tor"
 msgid ""
 "While Tor and I2P are similar in many ways, much of the terminology is "
 "different."
-msgstr ""
-"Anche se Tor e I2P sono simili sotto molti aspetti, molta della "
-"terminologia usata è diversa."
+msgstr "Anche se Tor e I2P sono simili sotto molti aspetti, molta della terminologia usata è diversa."
 
 #: i2p2www/pages/site/comparison/tor.html:55
 msgid "Cell"
@@ -432,8 +362,8 @@ msgstr "Servizio nascosto"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
-msgstr "Eepsite o destinazione"
+msgid "I2P Site or Destination"
+msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
 msgid "Hidden Service Descriptor"
@@ -503,8 +433,7 @@ msgstr "Benefici ottenuti usando Tor su rete I2P"
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
 msgstr ""
@@ -523,10 +452,8 @@ msgstr "Ha più sviluppatori, includendone diversi che sono sovvenzionati"
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:93
@@ -534,18 +461,15 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
-msgstr ""
-"Concepito e ottimizzato per il traffico in uscita, con un alto numero di "
-"nodi d'uscita"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
+msgstr "Concepito e ottimizzato per il traffico in uscita, con un alto numero di nodi d'uscita"
 
 #: i2p2www/pages/site/comparison/tor.html:96
 msgid ""
 "Better documentation, has formal papers and specifications,\n"
 "better website, many more translations"
-msgstr ""
-"Ha una migliore documentazione, specifiche formali e paper,\n"
-"un migliore sito web, e molte più traduzioni dell'interfaccia."
+msgstr "Ha una migliore documentazione, specifiche formali e paper,\nun migliore sito web, e molte più traduzioni dell'interfaccia."
 
 #: i2p2www/pages/site/comparison/tor.html:101
 msgid "More efficient with memory usage"
@@ -559,9 +483,7 @@ msgstr "I nodi del client Tor hanno un richiesta di banda accessoria molto bassa
 msgid ""
 "Centralized control reduces the complexity at each\n"
 "node and can efficiently address Sybil attacks"
-msgstr ""
-"Un controllo centrale riduce la complessità di ogni\n"
-"nodo e più resistere efficacemente ad attacchi di tipo Sybil"
+msgstr "Un controllo centrale riduce la complessità di ogni\nnodo e più resistere efficacemente ad attacchi di tipo Sybil"
 
 #: i2p2www/pages/site/comparison/tor.html:110
 msgid ""
@@ -579,11 +501,9 @@ msgstr "Benefici ottenuti usando I2P sopra a Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
-msgstr ""
-"Progettato e ottimizzato per servizi nascosti, che sono molto più veloci "
-"che in Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
+msgstr "Progettato e ottimizzato per servizi nascosti, che sono molto più veloci che in Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:121
 msgid "Fully distributed and self organizing"
@@ -593,10 +513,7 @@ msgstr "Completamente distribuito e auto-organizzante"
 msgid ""
 "Peers are selected by continuously profiling and ranking performance,\n"
 "rather than trusting claimed capacity"
-msgstr ""
-"I peer sono selezionati registrando e classificando continuamente le "
-"prestazioni,\n"
-"invece che confidando nella capacità dichiarata."
+msgstr "I peer sono selezionati registrando e classificando continuamente le prestazioni,\ninvece che confidando nella capacità dichiarata."
 
 #: i2p2www/pages/site/comparison/tor.html:129
 msgid ""
@@ -722,4 +639,3 @@ msgid ""
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
 msgstr ""
-
diff --git a/i2p2www/translations/it/LC_MESSAGES/docs.po b/i2p2www/translations/it/LC_MESSAGES/docs.po
index d87505d26a4115408770624945eaf1c911166a7b..0559457e4b443fbfce0fe06b1e829cfe3e3ac61b 100644
--- a/i2p2www/translations/it/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/it/LC_MESSAGES/docs.po
@@ -1,27 +1,31 @@
-# Italian translations for I2P.
-# Copyright (C) 2020 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # alamir <christianm@libero.it>, 2014
+# alamir <christianm@libero.it>, 2014
+# Giuseppe Pignataro <rogepix@gmail.com>, 2014
 # Giuseppe Pignataro <rogepix@gmail.com>, 2014
 # Jacopo Tumminello <tummarellox@gmail.com>, 2014
 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017
 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020
 # Tristano Ajmone <tajmone@gmail.com>, 2015
+# Jacopo Tumminello <tummarellox@gmail.com>, 2014
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2020-11-16 17:04+0000\n"
-"PO-Revision-Date: 2020-11-16 17:09+0000\n"
-"Last-Translator: Valentina <valentina.stagnaro@hotmail.it>\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020\n"
 "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: it\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/docs/index.html:2 i2p2www/pages/site/docs/index.html:24
 msgid "Index to Technical Documentation"
@@ -36,16 +40,14 @@ msgid ""
 "This index is ordered from the highest to lowest layers.\n"
 "The higher layers are for \"clients\" or applications;\n"
 "the lower layers are inside the router itself.\n"
-"The interface between applications and the router is the I2CP (I2P "
-"Control\n"
+"The interface between applications and the router is the I2CP (I2P Control\n"
 "Protocol) API."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:18
 #, python-format
 msgid ""
-"The I2P Project is committed to maintaining accurate, current "
-"documentation.\n"
+"The I2P Project is committed to maintaining accurate, current documentation.\n"
 "If you find any inaccuracies in the documents linked below, please\n"
 "<a href=\"%(trac)s\">enter a ticket identifying the problem</a>."
 msgstr ""
@@ -102,22 +104,20 @@ msgstr "Presentazioni, articoli, guide, filmati ed interviste"
 #: i2p2www/pages/site/docs/index.html:36
 #, python-format
 msgid ""
-"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a>"
-" August 28, 2003 (pdf)"
-msgstr ""
-"<a href=\"%(pdf)s\">Panoramica del progetto Invisible Internet Project "
-"(I2P)</a> 28 Agosto 2003 (pdf)"
+"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a> "
+"August 28, 2003 (pdf)"
+msgstr "<a href=\"%(pdf)s\">Panoramica del progetto Invisible Internet Project (I2P)</a> 28 Agosto 2003 (pdf)"
 
 #: i2p2www/pages/site/docs/index.html:39
 msgid "Application-Layer Topics"
 msgstr "Topic sul Livello applicazione"
 
 #: i2p2www/pages/site/docs/index.html:42 i2p2www/pages/site/docs/naming.html:2
-msgid "Naming and Addressbook"
-msgstr "Nominativi e rubrica"
+msgid "Naming and Address Book"
+msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:43
-msgid "Addressbook Subscription Feed Commands"
+msgid "Address Book Subscription Feed Commands"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:44
@@ -134,7 +134,8 @@ msgstr "Specifiche del Plugin"
 msgid "Managed Clients"
 msgstr "Client gestiti"
 
-#: i2p2www/pages/site/docs/index.html:47 i2p2www/pages/site/docs/index.html:239
+#: i2p2www/pages/site/docs/index.html:47
+#: i2p2www/pages/site/docs/index.html:240
 msgid "Embedding the router in your application"
 msgstr "Incorporare il router in un programma"
 
@@ -151,7 +152,8 @@ msgstr "API del Plugin I2PControl"
 msgid "hostsdb.blockfile Format"
 msgstr "formato di hostsdb.blockfile"
 
-#: i2p2www/pages/site/docs/index.html:51 i2p2www/pages/site/docs/index.html:205
+#: i2p2www/pages/site/docs/index.html:51
+#: i2p2www/pages/site/docs/index.html:206
 msgid "Configuration File Format"
 msgstr "Formato del File di Configurazione"
 
@@ -228,8 +230,7 @@ msgstr "API e protocollo di interfaccia Client-Router"
 
 #: i2p2www/pages/site/docs/index.html:101
 msgid ""
-"The lowest-level API used for clients (applications) to send and receive "
-"traffic to a router.\n"
+"The lowest-level API used for clients (applications) to send and receive traffic to a router.\n"
 "Traditionally used only by Java applications and higher-level APIs."
 msgstr ""
 
@@ -246,12 +247,12 @@ msgid "I2CP API Javadoc"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:112
-#: i2p2www/pages/site/docs/index.html:145
+#: i2p2www/pages/site/docs/index.html:146
 msgid "Common data structures specification"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:114
-#: i2p2www/pages/site/docs/index.html:149
+#: i2p2www/pages/site/docs/index.html:150
 msgid "Data Structures Javadoc"
 msgstr ""
 
@@ -264,308 +265,308 @@ msgid "How client messages are end-to-end encrypted by the router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:120
-msgid "ECIES-X25519-AEAD-Ratchet encryption"
+msgid "ECIES-X25519-AEAD-Ratchet encryption for destinations"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:121
-msgid "ElGamal/AES+SessionTag encryption"
+msgid "ECIES-X25519 encryption for routers"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:122
-#: i2p2www/pages/site/docs/index.html:160
+msgid "ElGamal/AES+SessionTag encryption"
+msgstr ""
+
+#: i2p2www/pages/site/docs/index.html:123
+#: i2p2www/pages/site/docs/index.html:161
 msgid "ElGamal and AES cryptography details"
 msgstr "Dettagli sulla crittografia AES ed ElGamal"
 
-#: i2p2www/pages/site/docs/index.html:125
+#: i2p2www/pages/site/docs/index.html:126
 #: i2p2www/pages/site/docs/how/tech-intro.html:11
 #: i2p2www/pages/site/docs/how/tech-intro.html:325
 msgid "Network Database"
 msgstr "Database della Rete"
 
-#: i2p2www/pages/site/docs/index.html:126
+#: i2p2www/pages/site/docs/index.html:127
 msgid ""
-"Distributed storage and retrieval of information about routers and "
-"clients."
+"Distributed storage and retrieval of information about routers and clients."
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:128
+#: i2p2www/pages/site/docs/index.html:129
 msgid "Network database overview, details, and threat analysis"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:129
+#: i2p2www/pages/site/docs/index.html:130
 msgid "Cryptographic hashes"
 msgstr "Hash crittografici"
 
-#: i2p2www/pages/site/docs/index.html:130
+#: i2p2www/pages/site/docs/index.html:131
 msgid "Cryptographic signatures"
 msgstr "Firme crittografiche"
 
-#: i2p2www/pages/site/docs/index.html:131
+#: i2p2www/pages/site/docs/index.html:132
 msgid "Red25519 signatures"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:132
-#: i2p2www/pages/site/docs/index.html:197
+#: i2p2www/pages/site/docs/index.html:133
+#: i2p2www/pages/site/docs/index.html:198
 msgid "Router reseed specification"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:133
+#: i2p2www/pages/site/docs/index.html:134
 msgid "Base32 Addresses for Encrypted Leasesets"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:136
+#: i2p2www/pages/site/docs/index.html:137
 msgid "Router Message Protocol"
 msgstr "Protocollo Messaggi dei Router"
 
-#: i2p2www/pages/site/docs/index.html:137
+#: i2p2www/pages/site/docs/index.html:138
 msgid ""
 "I2P is a message-oriented router. The messages sent between routers are "
 "defined by the I2NP protocol."
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:139
+#: i2p2www/pages/site/docs/index.html:140
 msgid "I2NP - I2P Network Protocol Overview"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:141
+#: i2p2www/pages/site/docs/index.html:142
 msgid "I2NP Specification"
 msgstr "Specifiche I2NP"
 
-#: i2p2www/pages/site/docs/index.html:143
+#: i2p2www/pages/site/docs/index.html:144
 msgid "I2NP Javadoc"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:147
+#: i2p2www/pages/site/docs/index.html:148
 msgid "Encrypted Leaseset specification"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:152
+#: i2p2www/pages/site/docs/index.html:153
 #: i2p2www/pages/site/docs/how/tech-intro.html:10
 #: i2p2www/pages/site/docs/how/tech-intro.html:224
 msgid "Tunnels"
 msgstr "Tunnel"
 
-#: i2p2www/pages/site/docs/index.html:153
+#: i2p2www/pages/site/docs/index.html:154
 msgid ""
-"Selecting peers, requesting tunnels through those peers, and encrypting "
-"and routing messages through these tunnels."
+"Selecting peers, requesting tunnels through those peers, and encrypting and "
+"routing messages through these tunnels."
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:155
+#: i2p2www/pages/site/docs/index.html:156
 msgid "Peer profiling and selection"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:156
+#: i2p2www/pages/site/docs/index.html:157
 msgid "Tunnel routing overview"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:157
+#: i2p2www/pages/site/docs/index.html:158
 msgid "Garlic routing and \"garlic\" terminology"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:158
+#: i2p2www/pages/site/docs/index.html:159
 msgid "Tunnel building and encryption"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:159
+#: i2p2www/pages/site/docs/index.html:160
 msgid "ElGamal/AES"
 msgstr "ElGamal/AES"
 
-#: i2p2www/pages/site/docs/index.html:159
+#: i2p2www/pages/site/docs/index.html:160
 msgid "for build request encryption"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:161
 #: i2p2www/pages/site/docs/index.html:162
+#: i2p2www/pages/site/docs/index.html:163
 msgid "Tunnel building specification"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:163
+#: i2p2www/pages/site/docs/index.html:164
 msgid "Low-level tunnel message specification"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:164
+#: i2p2www/pages/site/docs/index.html:165
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:2
 msgid "Unidirectional Tunnels"
 msgstr "Tunnel unidirezionali"
 
-#: i2p2www/pages/site/docs/index.html:165
+#: i2p2www/pages/site/docs/index.html:166
 #: i2p2www/pages/site/docs/how/peer-selection.html:299
 msgid "Peer Profiling and Selection in the I2P Anonymous Network"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:166
+#: i2p2www/pages/site/docs/index.html:167
 msgid "2009 paper (pdf), not current but still generally accurate"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:169
+#: i2p2www/pages/site/docs/index.html:170
 msgid "Transport Layer"
 msgstr "Livello di trasporto"
 
-#: i2p2www/pages/site/docs/index.html:170
-msgid "The protocols for direct (point-to-point) router to router communication."
+#: i2p2www/pages/site/docs/index.html:171
+msgid ""
+"The protocols for direct (point-to-point) router to router communication."
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:172
+#: i2p2www/pages/site/docs/index.html:173
 msgid "Transport layer overview"
 msgstr "Panoramica sul livello di trasporto"
 
-#: i2p2www/pages/site/docs/index.html:174
+#: i2p2www/pages/site/docs/index.html:175
 msgid "TCP-based transport overview and specification"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:176
+#: i2p2www/pages/site/docs/index.html:177
 msgid "NTCP2 specification"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:178
+#: i2p2www/pages/site/docs/index.html:179
 msgid "UDP-based transport overview"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:180
+#: i2p2www/pages/site/docs/index.html:181
 msgid "SSU specification"
 msgstr "Specificge di SSU"
 
-#: i2p2www/pages/site/docs/index.html:182
+#: i2p2www/pages/site/docs/index.html:183
 msgid "NTCP transport encryption"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:184
+#: i2p2www/pages/site/docs/index.html:185
 msgid "SSU transport encryption"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:186
+#: i2p2www/pages/site/docs/index.html:187
 msgid "Transport Javadoc"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:188
+#: i2p2www/pages/site/docs/index.html:189
 msgid "NTCP Javadoc"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:190
+#: i2p2www/pages/site/docs/index.html:191
 msgid "SSU Javadoc"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:193
+#: i2p2www/pages/site/docs/index.html:194
 msgid "Other Router Topics"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:195
+#: i2p2www/pages/site/docs/index.html:196
 msgid "Router software updates"
 msgstr "Aggiornamenti software del router"
 
-#: i2p2www/pages/site/docs/index.html:199
+#: i2p2www/pages/site/docs/index.html:200
 msgid "Native BigInteger Library"
 msgstr "Libreria nativa BigInteger"
 
-#: i2p2www/pages/site/docs/index.html:201
+#: i2p2www/pages/site/docs/index.html:202
 msgid "Time synchronization and NTP"
 msgstr "Sincronizzazione ora di sistema e NTP"
 
-#: i2p2www/pages/site/docs/index.html:203
+#: i2p2www/pages/site/docs/index.html:204
 msgid "Performance"
 msgstr "Prestazioni"
 
-#: i2p2www/pages/site/docs/index.html:210
+#: i2p2www/pages/site/docs/index.html:211
 msgid "Developer's Guides and Resources"
 msgstr "Guida dello sviluppatore ed altre risorse"
 
-#: i2p2www/pages/site/docs/index.html:212
+#: i2p2www/pages/site/docs/index.html:213
 msgid "New Developer's Guide"
 msgstr "Nuova guida per gli sviluppatori"
 
-#: i2p2www/pages/site/docs/index.html:214
+#: i2p2www/pages/site/docs/index.html:215
 msgid "New Translator's Guide"
 msgstr "Nuova guida per i traduttori"
 
-#: i2p2www/pages/site/docs/index.html:216
+#: i2p2www/pages/site/docs/index.html:217
 msgid "Monotone Guide"
 msgstr "Guida di Monotone"
 
-#: i2p2www/pages/site/docs/index.html:218
+#: i2p2www/pages/site/docs/index.html:219
 msgid "Developer Guidelines"
 msgstr "Linee guide per gli sviluppatori"
 
-#: i2p2www/pages/site/docs/index.html:220
+#: i2p2www/pages/site/docs/index.html:221
 msgid "Javadocs on the standard internet:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:221
-#: i2p2www/pages/site/docs/index.html:227
-#: i2p2www/pages/site/docs/index.html:229
-#: i2p2www/pages/site/docs/index.html:231
+#: i2p2www/pages/site/docs/index.html:222
+#: i2p2www/pages/site/docs/index.html:228
+#: i2p2www/pages/site/docs/index.html:230
+#: i2p2www/pages/site/docs/index.html:232
 #, python-format
 msgid "Server %(num)s"
 msgstr "Server %(num)s"
 
-#: i2p2www/pages/site/docs/index.html:222
-#: i2p2www/pages/site/docs/index.html:235
+#: i2p2www/pages/site/docs/index.html:223
+#: i2p2www/pages/site/docs/index.html:236
 msgid ""
 "Note: always verify that javadocs are current by checking the release "
 "number."
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:224
+#: i2p2www/pages/site/docs/index.html:225
 msgid "Javadocs inside I2P:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:237
+#: i2p2www/pages/site/docs/index.html:238
 msgid "Proposals"
 msgstr "Proposte"
 
-#: i2p2www/pages/site/docs/index.html:241
+#: i2p2www/pages/site/docs/index.html:242
 msgid "How to Set up a Reseed Server"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:243
+#: i2p2www/pages/site/docs/index.html:244
 msgid "Ports used by I2P"
 msgstr "Porte usate da I2P"
 
-#: i2p2www/pages/site/docs/index.html:245
+#: i2p2www/pages/site/docs/index.html:246
 msgid "Automatic updates to development builds inside I2P"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:247
+#: i2p2www/pages/site/docs/index.html:248
 msgid "Updating the wrapper manually"
 msgstr "Aggiornare il wrapper manualmente"
 
-#: i2p2www/pages/site/docs/index.html:249
+#: i2p2www/pages/site/docs/index.html:250
 msgid "User forum"
 msgstr "Forum degli utenti"
 
-#: i2p2www/pages/site/docs/index.html:251
+#: i2p2www/pages/site/docs/index.html:252
 msgid "Developer forum inside I2P"
 msgstr "Forum di sviluppo interno a I2P"
 
-#: i2p2www/pages/site/docs/index.html:253
+#: i2p2www/pages/site/docs/index.html:254
 msgid "Bug tracker"
 msgstr "Bug tracker"
 
 #: i2p2www/pages/site/docs/index.html:256
-msgid "Viewmtn inside I2P"
-msgstr ""
-
-#: i2p2www/pages/site/docs/index.html:259
 msgid "I2P Source exported to GitHub"
 msgstr "Sorgenti I2P esportati in GitHub"
 
-#: i2p2www/pages/site/docs/index.html:261
+#: i2p2www/pages/site/docs/index.html:258
 msgid "I2P Source Git Repo inside I2P"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:263
+#: i2p2www/pages/site/docs/index.html:260
 msgid "Source translation at Transifex"
 msgstr "Traduzione linguistica via Transifex"
 
-#: i2p2www/pages/site/docs/index.html:265
+#: i2p2www/pages/site/docs/index.html:262
 msgid "Roadmap"
 msgstr "Roadmap"
 
-#: i2p2www/pages/site/docs/index.html:267
+#: i2p2www/pages/site/docs/index.html:264
 msgid "To Do List"
 msgstr "Cose da fare"
 
-#: i2p2www/pages/site/docs/index.html:267
+#: i2p2www/pages/site/docs/index.html:264
 msgid "not current"
 msgstr "non attuale"
 
@@ -573,42 +574,30 @@ msgstr "non attuale"
 msgid ""
 "I2P ships with a generic naming library and a base implementation \n"
 "designed to work off a local name to destination mapping, as well as an\n"
-"add-on application called the <a href=\"#addressbook\">addressbook</a>. \n"
-"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to "
-"Tor's .onion addresses."
+"add-on application called the <a href=\"#addressbook\">address book</a>. \n"
+"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to Tor's .onion addresses."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:15
 msgid ""
-"The addressbook is a web-of-trust\n"
-"driven secure, distributed, and human readable naming system, sacrificing"
-" only\n"
-"the call for all human readable names to be globally unique by mandating "
-"only\n"
-"local uniqueness.  While all messages in I2P are cryptographically "
-"addressed\n"
-"by their destination, different people can have local addressbook entries"
-" for\n"
-"\"Alice\" which refer to different destinations.  People can still "
-"discover new\n"
-"names by importing published addressbooks of peers specified in their web"
-" of trust,\n"
-"by adding in the entries provided through a third party, or (if some "
-"people organize\n"
-"a series of published addressbooks using a first come first serve "
-"registration\n"
-"system) people can choose to treat these addressbooks as name servers, "
-"emulating\n"
+"The address book is a web-of-trust\n"
+"driven secure, distributed, and human readable naming system, sacrificing only\n"
+"the call for all human readable names to be globally unique by mandating only\n"
+"local uniqueness.  While all messages in I2P are cryptographically addressed\n"
+"by their destination, different people can have local address book entries for\n"
+"\"Alice\" which refer to different destinations.  People can still discover new\n"
+"names by importing published address books of peers specified in their web of trust,\n"
+"by adding in the entries provided through a third party, or (if some people organize\n"
+"a series of published address books using a first come first serve registration\n"
+"system) people can choose to treat these address books as name servers, emulating\n"
 "traditional DNS."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:29
 #, python-format
 msgid ""
-"NOTE: For the reasoning behind the I2P naming system, common arguments "
-"against it\n"
-"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming"
-" discussion</a>\n"
+"NOTE: For the reasoning behind the I2P naming system, common arguments against it\n"
+"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming discussion</a>\n"
 "page."
 msgstr ""
 
@@ -638,35 +627,32 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:55
 msgid ""
-"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for "
-"lookups and points\n"
+"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for lookups and points\n"
 "the user to remote jump services to assist with failed lookups."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:59
 msgid ""
-"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to "
-"add hosts to their local hosts.txt"
+"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to add "
+"hosts to their local hosts.txt"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:62
 msgid ""
-"HTTP <a href=\"#jump-services\">jump services</a> which provide their own"
-" lookups and redirection."
+"HTTP <a href=\"#jump-services\">jump services</a> which provide their own "
+"lookups and redirection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:65
 msgid ""
-"The <a href=\"#addressbook\">addressbook</a> application which merges "
-"external\n"
+"The <a href=\"#addressbook\">address book</a> application which merges external\n"
 "host lists, retrieved via HTTP, with the local list."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:69
 msgid ""
-"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web "
-"front-end\n"
-"for addressbook configuration and viewing of the local host lists."
+"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web front-end\n"
+"for address book configuration and viewing of the local host lists."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:76
@@ -677,15 +663,11 @@ msgstr ""
 #, python-format
 msgid ""
 "All destinations in I2P are 516-byte (or longer) keys.\n"
-"(To be more precise, it is a 256-byte public key plus a 128-byte signing "
-"key\n"
-"plus a 3-or-more byte certificate, which in Base64 representation is 516 "
-"or more bytes.\n"
-"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> "
-"are in use now\n"
+"(To be more precise, it is a 256-byte public key plus a 128-byte signing key\n"
+"plus a 3-or-more byte certificate, which in Base64 representation is 516 or more bytes.\n"
+"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> are in use now\n"
 "for signature type indication.\n"
-"Therefore, certificates in recently-generated destinations are more than "
-"3 bytes."
+"Therefore, certificates in recently-generated destinations are more than 3 bytes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:87
@@ -704,8 +686,7 @@ msgid ""
 "The hosts.txt Naming Service does a simple linear search through\n"
 "text files. This naming service was the default until\n"
 "release 0.8.8 when it was replaced by the Blockfile Naming Service.\n"
-"The hosts.txt format had become too slow after the file grew to thousands"
-" of entries."
+"The hosts.txt format had become too slow after the file grew to thousands of entries."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:102
@@ -713,8 +694,7 @@ msgstr ""
 msgid ""
 "It does a linear search through three local files, in order, to\n"
 "look up host names and convert them to a 516-byte destination key.\n"
-"Each file is in a simple <a href=\"%(configuration)s\">configuration file"
-" format</a>, with hostname=base64, one per line.\n"
+"Each file is in a simple <a href=\"%(configuration)s\">configuration file format</a>, with hostname=base64, one per line.\n"
 "The files are:"
 msgstr ""
 
@@ -724,8 +704,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:116
 msgid ""
-"The Blockfile Naming Service stores multiple \"addressbooks\" in a single"
-"\n"
+"The Blockfile Naming Service stores multiple \"address books\" in a single\n"
 "database file named hostsdb.blockfile.\n"
 "This Naming Service is the default since release 0.8.8."
 msgstr ""
@@ -733,32 +712,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:122
 #, python-format
 msgid ""
-"A blockfile is simply on-disk storage of multiple sorted maps (key-value "
-"pairs),\n"
+"A blockfile is simply on-disk storage of multiple sorted maps (key-value pairs),\n"
 "implemented as skiplists.\n"
-"The blockfile format is specified on the <a "
-"href=\"%(blockfile)s\">Blockfile page</a>.\n"
-"It provides fast Destination lookup in a compact format. While the "
-"blockfile overhead is substantial,\n"
-"the destinations are stored in binary rather than in Base 64 as in the "
-"hosts.txt format.\n"
-"In addition, the blockfile provides the capability of arbitrary metadata "
-"storage\n"
-"(such as added date, source, and comments) for each entry to implement "
-"advanced addressbook features.\n"
-"The blockfile storage requirement is a modest increase over the hosts.txt"
-" format, and the blockfile provides\n"
+"The blockfile format is specified on the <a href=\"%(blockfile)s\">Blockfile page</a>.\n"
+"It provides fast Destination lookup in a compact format. While the blockfile overhead is substantial,\n"
+"the destinations are stored in binary rather than in Base 64 as in the hosts.txt format.\n"
+"In addition, the blockfile provides the capability of arbitrary metadata storage\n"
+"(such as added date, source, and comments) for each entry to implement advanced address book features.\n"
+"The blockfile storage requirement is a modest increase over the hosts.txt format, and the blockfile provides\n"
 "approximately 10x reduction in lookup times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:134
 msgid ""
-"On creation, the naming service imports entries from the three files used"
-" by the hosts.txt Naming Service.\n"
-"The blockfile mimics the previous implementation by maintaining three "
-"maps that\n"
-"are searched in-order, named privatehosts.txt, userhosts.txt, and "
-"hosts.txt.\n"
+"On creation, the naming service imports entries from the three files used by the hosts.txt Naming Service.\n"
+"The blockfile mimics the previous implementation by maintaining three maps that\n"
+"are searched in-order, named privatehosts.txt, userhosts.txt, and hosts.txt.\n"
 "It also maintains a reverse-lookup map to implement rapid reverse lookups."
 msgstr ""
 
@@ -788,31 +757,24 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:158
 #, python-format
 msgid ""
-"The naming service is specified with the configuration property "
-"<tt>i2p.naming.impl=class</tt>.\n"
+"The naming service is specified with the configuration property <tt>i2p.naming.impl=class</tt>.\n"
 "Other implementations are possible. For example,\n"
-"there is an experimental facility for real-time lookups (a la DNS) over "
-"the network within the router.\n"
-"For more information see the <a "
-"href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion"
-" page</a>."
+"there is an experimental facility for real-time lookups (a la DNS) over the network within the router.\n"
+"For more information see the <a href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:165
 msgid ""
-"The HTTP proxy does a lookup via the router for all hostnames ending in "
-"'.i2p'.\n"
+"The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'.\n"
 "Otherwise, it forwards the request to a configured HTTP outproxy.\n"
-"Thus, in practice, all HTTP (eepsite) hostnames must end in the pseudo-"
-"Top Level Domain '.i2p'."
+"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:171
 #, python-format
 msgid ""
 "We have <a href=\"%(i2ptld)s\">applied to reserve the .i2p TLD</a>\n"
-"following the procedures specified in <a href=\"%(rfc6761)s\">RFC "
-"6761</a>."
+"following the procedures specified in <a href=\"%(rfc6761)s\">RFC 6761</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:177
@@ -823,7 +785,7 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:183
-msgid "Addressbook"
+msgid "Address Book"
 msgstr "Rubrica"
 
 #: i2p2www/pages/site/docs/naming.html:184
@@ -832,7 +794,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:186
 msgid ""
-"The addressbook application periodically\n"
+"The address book application periodically\n"
 "retrieves other users' hosts.txt files and merges\n"
 "them with the local hosts.txt, after several checks.\n"
 "Naming conflicts are resolved on a first-come first-served\n"
@@ -851,24 +813,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:202
 msgid ""
 "For this reason, the only subscription configured by\n"
-"default is <code>http://i2p-projekt.i2p/hosts.txt "
-"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>,"
-" \n"
+"default is <code>http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>, \n"
 "which contains a copy of the hosts.txt included\n"
 "in the I2P release.\n"
 "Users must configure additional subscriptions in their\n"
-"local addressbook application (via subscriptions.txt or <a "
-"href=\"#susidns\">SusiDNS</a>)."
+"local address book application (via subscriptions.txt or <a href=\"#susidns\">SusiDNS</a>)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:211
-msgid "Some other public addressbook subscription links:"
+msgid "Some other public address book subscription links:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:218
 msgid ""
-"The operators of these services may have various policies for listing "
-"hosts.\n"
+"The operators of these services may have various policies for listing hosts.\n"
 "Presence on this list does not imply endorsement."
 msgstr ""
 
@@ -879,12 +837,10 @@ msgstr "Convenzioni sui nomi"
 
 #: i2p2www/pages/site/docs/naming.html:224
 msgid ""
-"While there are hopefully not any technical limitations within I2P on "
-"host names,\n"
-"the addressbook enforces several restrictions on host names\n"
+"While there are hopefully not any technical limitations within I2P on host names,\n"
+"the address book enforces several restrictions on host names\n"
 "imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with "
-"browsers,\n"
+"It does this for basic typographical sanity and compatibility with browsers,\n"
 "and for security.\n"
 "The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
 "Any hostnames violating these rules may not be propagated\n"
@@ -897,13 +853,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:243
 msgid ""
-"Names are checked for conflict with existing names in the existing "
-"userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
 "(but not privatehosts.txt) after conversion to lower case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:248
-msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgid ""
+"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:252
@@ -939,8 +895,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:280
 msgid ""
 "Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
-"*.console.i2p, and others)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:285
@@ -959,14 +914,12 @@ msgstr "Lunghezza minima della chiave: 516 byte."
 
 #: i2p2www/pages/site/docs/naming.html:297
 msgid "Maximum key length 616 bytes (to account for certs up to 100 bytes)."
-msgstr ""
-"Lunghezza massima della chiave: 616 byte (tenendo conto di certificati "
-"fino a 100 byte)."
+msgstr "Lunghezza massima della chiave: 616 byte (tenendo conto di certificati fino a 100 byte)."
 
 #: i2p2www/pages/site/docs/naming.html:302
 msgid ""
-"Any name received via subscription that passes all the checks is added "
-"via the local naming service."
+"Any name received via subscription that passes all the checks is added via "
+"the local naming service."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:306
@@ -975,7 +928,7 @@ msgid ""
 "and do not denote any actual naming or trust hierarchy.\n"
 "If the name 'host.i2p' already exists, there is nothing\n"
 "to prevent anybody from adding a name 'a.host.i2p' to their hosts.txt,\n"
-"and this name can be imported by others' addressbook.\n"
+"and this name can be imported by others' address book.\n"
 "Methods to deny subdomains to non-domain 'owners' (certificates?),\n"
 "and the desirability and feasibility of these methods,\n"
 "are topics for future discussion."
@@ -983,19 +936,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:317
 msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
-"form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location "
-"bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
 "add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:323
 msgid ""
-"As the addressbook application does not use privatehosts.txt at all, in "
-"practice\n"
-"this file is the only place where it is appropriate to place private "
-"aliases or\n"
+"As the address book application does not use privatehosts.txt at all, in practice\n"
+"this file is the only place where it is appropriate to place private aliases or\n"
 "\"pet names\" for sites already in hosts.txt."
 msgstr ""
 
@@ -1009,17 +958,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:338
 msgid ""
-"Addressbook will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local eepsite's home directory) to be "
-"accessed by others\n"
+"Address Book will publish the merged hosts.txt to a location\n"
+"(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others\n"
 "for their subscriptions.\n"
 "This step is optional and is disabled by default."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:346
 msgid ""
-"The addressbook application, together with eepget, saves the Etag and/or "
-"Last-Modified\n"
+"The address book application, together with eepget, saves the Etag and/or Last-Modified\n"
 "information returned by the web server of the subscription.\n"
 "This greatly reduces the bandwidth required, as the web server will\n"
 "return a '304 Not Modified' on the next fetch if nothing has changed."
@@ -1036,8 +983,7 @@ msgid ""
 "Hosts serving a static hosts.txt or an equivalent CGI application\n"
 "are strongly encouraged to deliver\n"
 "a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when "
-"appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
 "This will dramatically reduce the network bandwidth, and\n"
 "reduce chances of corruption."
 msgstr ""
@@ -1048,8 +994,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:368
 msgid ""
-"A host add service is a simple CGI application that takes a hostname and "
-"a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
 "and adds that to its local hosts.txt.\n"
 "If other routers subscribe to that hosts.txt, the new hostname/key\n"
 "will be propagated through the network."
@@ -1057,10 +1002,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:375
 msgid ""
-"It is recommended that host add services impose, at a minimum, the "
-"restrictions imposed by the addressbook application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and "
-"keys, for example:"
+"It is recommended that host add services impose, at a minimum, the restrictions imposed by the address book application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and keys, for example:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:380
@@ -1113,10 +1056,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:426
 msgid ""
-"A jump service is a simple CGI application that takes a hostname as a "
-"parameter\n"
-"and returns a 301 redirect to the proper URL with a "
-"<code>?i2paddresshelper=key</code>\n"
+"A jump service is a simple CGI application that takes a hostname as a parameter\n"
+"and returns a 301 redirect to the proper URL with a <code>?i2paddresshelper=key</code>\n"
 "string appended.\n"
 "The HTTP proxy will interpret the appended string and\n"
 "use that key as the actual destination.\n"
@@ -1139,18 +1080,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:448
 msgid ""
-"SusiDNS is simply a web interface front-end to configuring addressbook "
-"subscriptions\n"
-"and accessing the four addressbook files.\n"
-"All the real work is done by the 'addressbook' application."
+"SusiDNS is simply a web interface front-end to configuring address book subscriptions\n"
+"and accessing the four address book files.\n"
+"All the real work is done by the 'address book' application."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:454
 msgid ""
-"Currently, there is little enforcement of addressbook naming rules within"
-" SusiDNS,\n"
+"Currently, there is little enforcement of address book naming rules within SusiDNS,\n"
 "so a user may enter hostnames locally that would be rejected by\n"
-"the addressbook subscription rules."
+"the address book subscription rules."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:460
@@ -1162,36 +1101,29 @@ msgid ""
 "I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
 "Base32 addresses are much shorter and easier to handle than the\n"
 "full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: "
-"<code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>"
+"Example: <code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:468
 #, python-format
 msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
-"hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
 "I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
 "The form is {52 chars}.b32.i2p.\n"
 "Tor has a\n"
-"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94"
-"-december-4th-2013\">proposal</a>\n"
-"to convert to an identical format of {52 chars}.onion for their hidden "
-"services.\n"
+"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-december-4th-2013\">proposal</a>\n"
+"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
 "Base32 is implemented in the naming service, which queries the\n"
 "router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and "
-"publishing\n"
+"Base32 lookups will only be successful when the Destination is up and publishing\n"
 "a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take "
-"significantly\n"
+"Because resolution may require a network database lookup, it may take significantly\n"
 "longer than a local address book lookup."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:483
 msgid ""
-"Base32 addresses can be used in most places where hostnames or full "
-"destinations\n"
+"Base32 addresses can be used in most places where hostnames or full destinations\n"
 "are used, however there are some exceptions where they may fail if the\n"
 "name does not immediately resolve. I2PTunnel will fail, for example, if\n"
 "the name does not resolve to a destination."
@@ -1217,8 +1149,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:12
 msgid ""
-"There are now plugins available that support distributed email, blogs, "
-"IRC\n"
+"There are now plugins available that support distributed email, blogs, IRC\n"
 "clients, distributed file storage, wikis, and more."
 msgstr ""
 
@@ -1238,8 +1169,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:31
 msgid ""
-"Support large or special-purpose applications that would never be bundled"
-"\n"
+"Support large or special-purpose applications that would never be bundled\n"
 "with the I2P installation"
 msgstr ""
 
@@ -1253,8 +1183,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:44
 msgid ""
-"Separate initial install and update packages, if desired, for smaller "
-"update downloads"
+"Separate initial install and update packages, if desired, for smaller update"
+" downloads"
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:48
@@ -1284,7 +1214,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:70
-msgid "Automatic integration and startup of webapps into console Jetty instance"
+msgid ""
+"Automatic integration and startup of webapps into console Jetty instance"
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:74
@@ -1324,32 +1255,21 @@ msgstr "Installazione"
 
 #: i2p2www/pages/site/docs/plugins.html:101
 msgid ""
-"To install and start a plugin, copy the <code>.xpi2p</code> install link "
-"to\n"
+"To install and start a plugin, copy the <code>.xpi2p</code> install link to\n"
 "the form at the bottom of\n"
-"<a "
-"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp"
-" in\n"
-"your router console</a> and click the \"install plugin\" button.  After a"
-"\n"
-"plugin is installed and started, a link to the plugin will usually appear"
-" at\n"
+"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp in\n"
+"your router console</a> and click the \"install plugin\" button.  After a\n"
+"plugin is installed and started, a link to the plugin will usually appear at\n"
 "the top of your summary bar."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:110
 msgid ""
-"To update a plugin to the latest version, just click the update button on"
-"\n"
-"<a "
-"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>."
-"\n"
-"There is also a button to check if the plugin has a more recent version, "
-"as\n"
-"well as a button to check for updates for all plugins.  Plugins will be "
-"checked\n"
-"for updates automatically when updating to a new I2P release (not "
-"including dev\n"
+"To update a plugin to the latest version, just click the update button on\n"
+"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>.\n"
+"There is also a button to check if the plugin has a more recent version, as\n"
+"well as a button to check for updates for all plugins.  Plugins will be checked\n"
+"for updates automatically when updating to a new I2P release (not including dev\n"
 "builds)."
 msgstr ""
 
@@ -1360,25 +1280,21 @@ msgstr "Sviluppo"
 #: i2p2www/pages/site/docs/plugins.html:121
 #, python-format
 msgid ""
-"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and "
-"the\n"
+"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and the\n"
 "<a href=\"http://%(zzz)s/forums/16\">plugin forum</a> on %(zzz)s."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:126
 #, python-format
 msgid ""
-"See also the sources for plugins developed by various people.  Some "
-"plugins, such\n"
-"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were "
-"developed\n"
+"See also the sources for plugins developed by various people.  Some plugins, such\n"
+"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were developed\n"
 "specifically as examples."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:132
 msgid ""
-"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P"
-"\n"
+"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P\n"
 "or easily add some feature."
 msgstr ""
 
@@ -1390,8 +1306,7 @@ msgstr "Come Iniziare"
 #, python-format
 msgid ""
 "To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in "
-"monotone</a>."
+"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in monotone</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:144
@@ -1407,8 +1322,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/plugins.html:151
 msgid ""
 "Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush"
-" the\n"
+"the plugin was already run, as it requires class loader trickery to flush the\n"
 "class cache; a full router restart is required."
 msgstr ""
 
@@ -1418,32 +1332,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:161
 msgid ""
-"Plugins running in a separate JVM create a <code>logs/</code> directory "
-"in\n"
+"Plugins running in a separate JVM create a <code>logs/</code> directory in\n"
 "<code>$CWD</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:166
 msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using "
-"the\n"
+"No initial keys are present, except for those of jrandom and zzz (using the\n"
 "same keys as for router update), so the first key seen for a signer is\n"
 "automatically accepted&mdash;there is no signing key authority."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:172
 msgid ""
-"When deleting a plugin, the directory is not always deleted, especially "
-"on\n"
+"When deleting a plugin, the directory is not always deleted, especially on\n"
 "Windows."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:177
 msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
-"in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file "
-"is used."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:182
@@ -1460,8 +1369,7 @@ msgstr "Porte usate da I2P"
 
 #: i2p2www/pages/site/docs/ports.html:7
 msgid ""
-"These are the ports used or reserved by I2P, including those for known "
-"plugins,\n"
+"These are the ports used or reserved by I2P, including those for known plugins,\n"
 "common alternates,\n"
 "and some typical related applications."
 msgstr ""
@@ -1486,8 +1394,8 @@ msgid "Reseed Hosts"
 msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:3
-msgid "January 2016"
-msgstr "Gennaio 2016"
+msgid "September 2021"
+msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:8
 msgid "About Reseed hosts"
@@ -1495,49 +1403,57 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:10
 msgid ""
-"Reseed hosts are needed to for bootstrapping, that is, providing the "
-"initial set of I2P nodes for your I2P node to talk to. Depending on the "
-"status of your node it may need to bootstrap every now and then if many "
-"of the nodes it knows of aren't contactable."
+"Reseed hosts are needed to for bootstrapping, that is, providing the initial set\n"
+"of I2P nodes for your I2P node to talk to. Depending on the status of your node\n"
+"it may need to bootstrap every now and then if many of the nodes it knows of\n"
+"aren't contactable."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:14
+#: i2p2www/pages/site/docs/reseed.html:17
 msgid ""
-"Reseeding is done over an encrypted connection and all of the bootstrap "
-"information is signed by the reseed host you connect to, making it "
-"impossible for an unauthenticated source to provide you with false "
-"information."
+"Reseeding is done over an encrypted connection and all of the bootstrap\n"
+"information is signed by the reseed host you connect to, making it impossible\n"
+"for an unauthenticated source to provide you with false information."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:19
+#: i2p2www/pages/site/docs/reseed.html:24
 msgid "Running a Reseed host"
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:21
+#: i2p2www/pages/site/docs/reseed.html:26
 msgid ""
-"The more reseed hosts that are run, the more resilient the I2P network "
-"becomes, and the harder it is to prevent users of I2P from connecting to "
-"the network."
+"Operating a reseed server can be accessible to any sysadmin familiar\n"
+"with I2P, and we encourage new reseed operators to get in contact with us at\n"
+"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed hosts that\n"
+"are run, the more resilient the I2P network becomes, and the harder it is to\n"
+"prevent users of I2P from connecting to the network."
+msgstr ""
+
+#: i2p2www/pages/site/docs/reseed.html:39
+msgid "Other ways of Reseeding"
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:25
+#: i2p2www/pages/site/docs/reseed.html:42
 msgid ""
-"There have also been cases where the reseed hosts we had, have been under"
-" heavy load due to botnet activities."
+"In order to make I2P more reslient, other kinds of reseeding are possible. One\n"
+"important way of carrying out a reseed is the file-based reseed, where a user\n"
+"with a running I2P router generates a reseed file for a friend and transfers it\n"
+"to them as a .zip file. Others use cloud-based infrastructure to resist\n"
+"censorship. These reseed methods provide functionality which aids people in\n"
+"situations where reseeds are restricted."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:33
-msgid "Thank you"
-msgstr "Grazie"
+#: i2p2www/pages/site/docs/reseed.html:58
+msgid "Thank you Reseed Operators"
+msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:35
+#: i2p2www/pages/site/docs/reseed.html:60
 msgid ""
-"If you are running a reseed server, We would like to thank you for "
-"helping to\n"
+"If you are running a reseed server, We would like to thank you for helping to\n"
 "make the I2P network stronger and more resilient than ever."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:41
+#: i2p2www/pages/site/docs/reseed.html:66
 msgid "Thank you."
 msgstr "Grazie."
 
@@ -1547,12 +1463,9 @@ msgstr "BOB - Basic Open Bridge"
 
 #: i2p2www/pages/site/docs/api/bob.html:12
 msgid ""
-"At this point, most of the good ideas from BOB have been incorporated "
-"into\n"
-"SAMv3, which has more features and more real-world use. BOB still works, "
-"but it\n"
-"is not gaining the advanced features available to SAMv3 and is "
-"essentially\n"
+"At this point, most of the good ideas from BOB have been incorporated into\n"
+"SAMv3, which has more features and more real-world use. BOB still works, but it\n"
+"is not gaining the advanced features available to SAMv3 and is essentially\n"
 "unsupported at this time."
 msgstr ""
 
@@ -1567,27 +1480,25 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/bob.html:35
 msgid ""
 "<code>ERROR</code> as is implied returns the message <code>\"ERROR "
-"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what"
-" went wrong."
+"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what "
+"went wrong."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:38
 msgid ""
-"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be "
-"returned, it is on the same line. <code>OK</code> means the command is "
-"finished."
+"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be returned, "
+"it is on the same line. <code>OK</code> means the command is finished."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:41
 msgid ""
-"<code>DATA</code> lines contain information that you requested. There may"
-" be multiple <code>DATA</code> lines per request."
+"<code>DATA</code> lines contain information that you requested. There may be"
+" multiple <code>DATA</code> lines per request."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:45
 msgid ""
-"<b>NOTE:</b> The help command is the ONLY command that has an exception "
-"to\n"
+"<b>NOTE:</b> The help command is the ONLY command that has an exception to\n"
 "the rules... it can actually return nothing! This is intentional, since\n"
 "help is a HUMAN and not an APPLICATION command."
 msgstr ""
@@ -1598,8 +1509,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:53
 msgid ""
-"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated,"
-" depending on the system.\n"
+"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated, depending on the system.\n"
 "On connection, BOB outputs two lines:"
 msgstr ""
 
@@ -1609,8 +1519,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:67
 msgid ""
-"Note that previous versions used upper-case hex digits and did not "
-"conform to I2P versioning standards.\n"
+"Note that previous versions used upper-case hex digits and did not conform to I2P versioning standards.\n"
 "It is recommended that subsequent versions use digits 0-9 only."
 msgstr ""
 
@@ -1619,7 +1528,7 @@ msgid "Version history"
 msgstr "Cronologia versione"
 
 #: i2p2www/pages/site/docs/api/bob.html:77
-#: i2p2www/pages/site/docs/api/samv3.html:32
+#: i2p2www/pages/site/docs/api/samv3.html:41
 msgid "Version"
 msgstr "Versione"
 
@@ -1646,16 +1555,14 @@ msgstr "Comandi"
 #: i2p2www/pages/site/docs/api/bob.html:91
 msgid ""
 "<b>PLEASE NOTE:</b>\n"
-"For CURRENT details on the commands PLEASE use the built-in help command."
-"\n"
-"Just telnet to localhost 2827 and type help and you can get full "
-"documentation on each command."
+"For CURRENT details on the commands PLEASE use the built-in help command.\n"
+"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:97
 msgid ""
-"Commands never get obsoleted or changed, however new commands do get "
-"added from time to time."
+"Commands never get obsoleted or changed, however new commands do get added "
+"from time to time."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:102
@@ -1672,36 +1579,23 @@ msgstr "RESTITUISCE"
 
 #: i2p2www/pages/site/docs/api/bob.html:130
 msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is "
-"no need for any\n"
-"additional messages to/from the command channel. This allows the router "
-"to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on "
-"attempting to shove\n"
-"many streams in or out one socket -- that can't scale when you have alot "
-"of connections!"
+"Once set up, all TCP sockets can and will block as needed, and there is no need for any\n"
+"additional messages to/from the command channel. This allows the router to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on attempting to shove\n"
+"many streams in or out one socket -- that can't scale when you have alot of connections!"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:137
 msgid ""
-"What is also nice about this particular interface is that writing "
-"anything to interface\n"
-"to it, is much much easier than SAM. There is no other processing to do "
-"after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc "
-"(netcat) can be used\n"
-"to point to some application. The value there is that one could schedule "
-"up and down times\n"
-"for an application, and not have to change the application to do that, or"
-" to even have\n"
-"to stop that application. Instead, you can literally \"unplug\" the "
-"destination, and\n"
-"\"plug it in\" again. As long as the same IP/port addresses and "
-"destination keys are used\n"
-"when bringing the bridge up, the normal TCP application won't care, and "
-"won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that "
-"nothing is coming in."
+"What is also nice about this particular interface is that writing anything to interface\n"
+"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used\n"
+"to point to some application. The value there is that one could schedule up and down times\n"
+"for an application, and not have to change the application to do that, or to even have\n"
+"to stop that application. Instead, you can literally \"unplug\" the destination, and\n"
+"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used\n"
+"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:149
@@ -1710,12 +1604,9 @@ msgstr "Esempi"
 
 #: i2p2www/pages/site/docs/api/bob.html:151
 msgid ""
-"For the following example, we'll setup a very simple local loopback "
-"connection,\n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service "
-"from\n"
-"the INET superserver daemon. Destination \"ear\" will be a local port "
-"that you\n"
+"For the following example, we'll setup a very simple local loopback connection,\n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service from\n"
+"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
 "can telnet into, and watch the pretty ASCII test puke forth."
 msgstr ""
 
@@ -1764,30 +1655,28 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:186
 msgid ""
-"At this point, there was no error, a destination with a nickname of "
-"\"mouth\"\n"
-"is set up. When you contact the destination provided, you actually "
-"connect\n"
+"At this point, there was no error, a destination with a nickname of \"mouth\"\n"
+"is set up. When you contact the destination provided, you actually connect\n"
 "to the <code>CHARGEN</code> service on <code>19/TCP</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:192
-msgid "Now for the other half, so that we can actually contact this destination."
+msgid ""
+"Now for the other half, so that we can actually contact this destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:214
 msgid ""
 "Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from addressbook we want to "
-"contact.\n"
+"send the destination key or host address from address book we want to contact.\n"
 "In this case, we want to contact \"mouth\", all we do is paste in the\n"
 "key and it goes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:221
 msgid ""
-"<b>NOTE:</b> The \"quit\" command in the command channel does NOT "
-"disconnect the tunnels like SAM."
+"<b>NOTE:</b> The \"quit\" command in the command channel does NOT disconnect"
+" the tunnels like SAM."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:238
@@ -1799,19 +1688,15 @@ msgid "Here is what happened..."
 msgstr "Ecco cosa è successo..."
 
 #: i2p2www/pages/site/docs/api/bob.html:258
-msgid "You can connect to EEPSITES too!"
+msgid "You can connect to I2P SITES too!"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:291
 msgid ""
-"Pretty cool isn't it? Try some other well known EEPSITES if you like, "
-"nonexistent ones,\n"
-"etc, to get a feel for what kind of output to expect in different "
-"situations.\n"
-"For the most part, it is suggested that you ignore any of the error "
-"messages.\n"
-"They would be meaningless to the application, and are only presented for "
-"human debugging."
+"Pretty cool isn't it? Try some other well known I2P SITES if you like, nonexistent ones,\n"
+"etc, to get a feel for what kind of output to expect in different situations.\n"
+"For the most part, it is suggested that you ignore any of the error messages.\n"
+"They would be meaningless to the application, and are only presented for human debugging."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:298
@@ -1828,8 +1713,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:328
 msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too "
-"fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
 "and shows you what typical ERROR messages looks like."
 msgstr ""
 
@@ -1884,16 +1768,11 @@ msgstr "Panoramica dei Datagrammi"
 #: i2p2www/pages/site/docs/api/datagrams.html:7
 #, python-format
 msgid ""
-"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide "
-"authenticated\n"
-"and repliable messages in a standard format.  This lets applications "
-"reliably read\n"
-"the \"from\" address out of a datagram and know that the address really "
-"sent the\n"
-"message.  This is necessary for some applications since the base I2P "
-"message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets).  In "
-"addition, the\n"
+"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide authenticated\n"
+"and repliable messages in a standard format.  This lets applications reliably read\n"
+"the \"from\" address out of a datagram and know that the address really sent the\n"
+"message.  This is necessary for some applications since the base I2P message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets).  In addition, the\n"
 "message and sender are authenticated by signing the payload."
 msgstr ""
 
@@ -1902,8 +1781,7 @@ msgstr ""
 msgid ""
 "Datagrams, like <a href=\"%(streaming)s\">streaming library packets</a>,\n"
 "are an application-level construct.\n"
-"These protocols are independent of the low-level <a "
-"href=\"%(transports)s\">transports</a>;\n"
+"These protocols are independent of the low-level <a href=\"%(transports)s\">transports</a>;\n"
 "the protocols are converted to I2NP messages by the router, and\n"
 "either protocol may be carried by either transport."
 msgstr ""
@@ -1919,8 +1797,7 @@ msgid ""
 "<a href=\"%(url)s\">datagram API</a>,\n"
 "while applications in other languages \n"
 "can use <a href=\"%(sam)s\">SAM</a>'s datagram support.\n"
-"There is also limited support in i2ptunnel in the <a "
-"href=\"%(socks)s\">SOCKS proxy</a>,\n"
+"There is also limited support in i2ptunnel in the <a href=\"%(socks)s\">SOCKS proxy</a>,\n"
 "the 'streamr' tunnel types, and udpTunnel classes."
 msgstr ""
 
@@ -1930,34 +1807,23 @@ msgstr "Lunghezza del datagramma"
 
 #: i2p2www/pages/site/docs/api/datagrams.html:38
 msgid ""
-"The application designer should carefully consider the tradeoff of "
-"repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel"
-" fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of "
-"them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not "
-"recommended.\n"
+"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
 "Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
-"chances even more."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:47
 #, python-format
 msgid ""
-"Also note that the various overheads added by lower layers, in particular"
-" asymmetric\n"
-"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on "
-"intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are "
-"currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number"
-"\n"
-"of session tags delivered, and a short session tag lifetime, for example."
-"\n"
-"There are currently no configuration parameters available within I2CP to "
-"tune\n"
+"Also note that the various overheads added by lower layers, in particular asymmetric\n"
+"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number\n"
+"of session tags delivered, and a short session tag lifetime, for example.\n"
+"There are currently no configuration parameters available within I2CP to tune\n"
 "the ElGamal Session Tag parameters."
 msgstr ""
 
@@ -1970,38 +1836,30 @@ msgid ""
 "The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
 "Applications may or may not choose to set the\n"
 "protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on "
-"the same Destination."
+"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:65
 #, python-format
 msgid ""
 "As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or "
-"communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or communications sessions,\n"
 "as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
-"described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
 "the <a href=\"%(i2cp)s#format\">I2CP page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:73
 #, python-format
 msgid ""
-"There is no method within the datagram API to specify whether it is non-"
-"repliable (raw)\n"
-"or repliable. The application should be designed to expect the "
-"appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
+"or repliable. The application should be designed to expect the appropriate type.\n"
 "The I2CP protocol number or port should be used by the application to\n"
 "indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
-"are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
 "<a href=\"%(i2psession)s\">I2PSession API</a>\n"
-"for this purpose. A common design pattern in client/server datagram "
-"applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw "
-"datagram\n"
+"for this purpose. A common design pattern in client/server datagram applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
 "for the reply, returning the nonce from the request."
 msgstr ""
 
@@ -2035,19 +1893,17 @@ msgstr "Incapsulamento dei pacchetti"
 #: i2p2www/pages/site/docs/api/datagrams.html:107
 #, python-format
 msgid ""
-"Each datagram is sent through I2P as a single message (or as an "
-"individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
 "<a href=\"%(garlicrouting)s\">Garlic Message</a>).\n"
 "Message encapsulation is implemented in the underlying\n"
 "<a href=\"%(i2cp)s\">I2CP</a>,\n"
 "<a href=\"%(i2np)s\">I2NP</a>, and\n"
 "<a href=\"%(tunnelmessage)s\">tunnel message</a> layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram "
-"protocol."
+"There is no packet delimiter mechanism or length field in the datagram protocol."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:120
-#: i2p2www/pages/site/docs/transport/ssu.html:652
+#: i2p2www/pages/site/docs/transport/ssu.html:680
 msgid "Specification"
 msgstr "Specifiche"
 
@@ -2062,17 +1918,10 @@ msgstr "I2PControl - Servizio di controllo remoto"
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:5
 #, python-format
 msgid ""
-"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-"
-"RPC\">JSONRPC2</a> interface via the plugin <a "
-"href=\"%(itoopie)s\">I2PControl</a>.\n"
-"The aim of the interface is to provide simple way to interface with a "
-"running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is "
-"provided by the java libraries <a href=\"http://software.dzhuvinov.com"
-"/json-rpc-2.0.html\">JSON-RPC 2.0</a>.  \n"
-"A list of implementations of JSON-RPC for various languages can be found "
-"at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC "
-"wiki</a>."
+"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-RPC\">JSONRPC2</a> interface via the plugin <a href=\"%(itoopie)s\">I2PControl</a>.\n"
+"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries <a href=\"http://software.dzhuvinov.com/json-rpc-2.0.html\">JSON-RPC 2.0</a>.  \n"
+"A list of implementations of JSON-RPC for various languages can be found at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC wiki</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:12
@@ -2127,8 +1976,8 @@ msgstr "Descrizione"
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:48
 msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate'"
-" RPC method)"
+"Token used for authenticating every request (excluding the 'Authenticate' "
+"RPC method)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:56
@@ -2137,8 +1986,7 @@ msgstr "Metodi implementati"
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:57
 msgid ""
-"Creates and returns an authentication token used for further "
-"communication."
+"Creates and returns an authentication token used for further communication."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:59
@@ -2171,8 +2019,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:117
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:163
 msgid ""
-"Token used for authenticating the client. Is provided by the server via "
-"the 'Authenticate' RPC method."
+"Token used for authenticating the client. Is provided by the server via the "
+"'Authenticate' RPC method."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:73
@@ -2234,7 +2082,8 @@ msgid "Returns true if any changes were made."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:98
-msgid "Returns true if any changes requiring a restart to take effect were made."
+msgid ""
+"Returns true if any changes requiring a restart to take effect were made."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:101
@@ -2307,8 +2156,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:157
 msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote "
-"host."
+"Initiates a router reseed, fetching peers into our NetDB from a remote host."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:158
@@ -2317,8 +2165,7 @@ msgstr "Riavvia il router."
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:159
 msgid ""
-"Restarts the router gracefully (waits for participating tunnels to "
-"expire)."
+"Restarts the router gracefully (waits for participating tunnels to expire)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:160
@@ -2364,7 +2211,8 @@ msgid "<b>Blocking</b>. If requested, returns the status of the the update"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:175
-msgid "Fetches or sets various network related settings. Ports, addresses etc."
+msgid ""
+"Fetches or sets various network related settings. Ports, addresses etc."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:177
@@ -2375,8 +2223,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:178
 msgid ""
-"What hostname is used for the TCP transport. If null is submitted, "
-"current setting will be returned."
+"What hostname is used for the TCP transport. If null is submitted, current "
+"setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:179
@@ -2393,8 +2241,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:181
 msgid ""
-"What hostname is used for the UDP transport. If null is submitted, "
-"current setting will be returned."
+"What hostname is used for the UDP transport. If null is submitted, current "
+"setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:182
@@ -2408,19 +2256,20 @@ msgid "What ip has been detected by the UDP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:184
-msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
+msgid ""
+"Is UPnP enabled. If null is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:185
 msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If "
-"null is submitted, current setting will be returned."
+"How many percent of bandwidth is usable for participating tunnels. If null "
+"is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:186
 msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
-"current setting will be returned."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
+" setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:187
@@ -2431,15 +2280,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:188
 msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP "
-"changes ). If null is submitted, current setting will be returned."
+"Is laptop mode enabled (change router identity and UDP port when IP changes "
+"). If null is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:189
 msgid ""
-"Token used for authenticating the client. Is provided by the server via "
-"the 'Authenticate' RPC method. If null is submitted, current setting will"
-" be returned."
+"Token used for authenticating the client. Is provided by the server via the "
+"'Authenticate' RPC method. If null is submitted, current setting will be "
+"returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:192
@@ -2452,8 +2301,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:194
 msgid ""
-"If requested, returns the method used for automatically detecting ip for "
-"the TCP transport."
+"If requested, returns the method used for automatically detecting ip for the"
+" TCP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:195
@@ -2466,8 +2315,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:197
 msgid ""
-"If requested, returns methods used for detecting the ip address of the "
-"UDP transport."
+"If requested, returns methods used for detecting the ip address of the UDP "
+"transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:198
@@ -2598,34 +2447,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:237
 msgid ""
-"The version of the I2PControl API used wasn't specified, but is required "
-"to be specified."
+"The version of the I2PControl API used wasn't specified, but is required to "
+"be specified."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:238
 msgid ""
-"The version of the I2PControl API specified is not supported by "
-"I2PControl."
+"The version of the I2PControl API specified is not supported by I2PControl."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:8
 #, python-format
 msgid ""
 "I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a <a "
-"href=\"%(naming)s\">hostname</a>,\n"
-"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination "
-"key.\n"
-"An established I2PTunnel will be available on your client machine as "
-"localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create "
-"I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key "
-"will be generated\n"
+"Destination of an I2PTunnel can be defined using a <a href=\"%(naming)s\">hostname</a>,\n"
+"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination key.\n"
+"An established I2PTunnel will be available on your client machine as localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
 "for the service and it will become avaliable throughout I2P.\n"
 "A web interface for I2PTunnel management is avaliable on\n"
-"<a "
-"href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>."
+"<a href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:20
@@ -2639,8 +2481,7 @@ msgstr "I tunnel del server"
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:23
 msgid ""
 "<b>I2P Webserver</b> - A tunnel pointed to a Jetty webserver run\n"
-"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient "
-"and quick hosting on I2P.\n"
+"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient and quick hosting on I2P.\n"
 "<br>The document root is:"
 msgstr ""
 
@@ -2650,10 +2491,8 @@ msgstr "I tunnel del client"
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:33
 msgid ""
-"A HTTP proxy used for browsing I2P and the regular internet anonymously "
-"through I2P. \n"
-"Browsing internet through I2P uses a random proxy specified by the "
-"\"Outproxies:\" option."
+"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n"
+"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:37
@@ -2696,31 +2535,26 @@ msgstr "Standard"
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:56
 msgid ""
-"Opens a local TCP port that connects to a service (like HTTP, FTP or "
-"SMTP) on a destination inside of I2P.\n"
-"The tunnel is directed to a random host from the comma seperated (\", \")"
-" list of destinations."
+"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n"
+"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:62
 msgid ""
-"A HTTP-client tunnel. The tunnel connects to the destination specified by"
-" the URL\n"
-"in a HTTP request. Supports proxying onto internet if an outproxy is "
-"provided. Strips HTTP connections of the following headers:"
+"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n"
+"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:67
 msgid ""
 "<b>Accept, Accept-Charset, Accept-Language\n"
-" and Accept-Ranges</b> as they vary greatly between browsers and can be "
-"used as an identifier."
+" and Accept-Ranges</b> as they vary greatly between browsers and can be used as an identifier."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:90
 msgid ""
-"Depending on if the tunnel is using an outproxy or not it will append the"
-" following User-Agent:"
+"Depending on if the tunnel is using an outproxy or not it will append the "
+"following User-Agent:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:94
@@ -2733,10 +2567,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:100
 msgid ""
-"Creates a connection to a random IRC server specified by the comma "
-"seprated (\", \") \n"
-"list of destinations. Only a whitelisted subset of IRC commands are "
-"allowed due to anonymity concerns."
+"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n"
+"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:105
@@ -2749,8 +2581,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:144
 msgid ""
-"Enables using the I2P router as a SOCKS proxy with the command whitelist "
-"specified by\n"
+"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n"
 "<a href=\"#client-mode-irc\">IRC</a> client mode."
 msgstr ""
 
@@ -2762,8 +2593,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:156
 msgid ""
-"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr "
-"client tunnel will \n"
+"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n"
 "subscribe to a streamr server tunnel."
 msgstr ""
 
@@ -2777,32 +2607,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:171
 msgid ""
-"Creates a destination to a local HTTP server ip:port. Supports gzip for "
-"requests with \n"
-"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in"
-" such a request."
+"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n"
+"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:177
 msgid ""
-"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client "
-"with no outproxying\n"
-"capabilities. An example application would be a web application that does"
-" client-type\n"
-"requests, or loopback-testing an eepsite as a diagnostic tool."
+"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n"
+"capabilities. An example application would be a web application that does client-type\n"
+"requests, or loopback-testing an I2P Site as a diagnostic tool."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:184
 msgid ""
-"Creates a destination that filters the reqistration sequence of a client "
-"and passes \n"
+"Creates a destination that filters the reqistration sequence of a client and passes \n"
 "the clients destination key as a hostname to the IRC-server."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:190
 msgid ""
-"A UDP-client that connects to a media server is created. The UDP-Client "
-"is coupled with a Streamr server I2PTunnel."
+"A UDP-client that connects to a media server is created. The UDP-Client is "
+"coupled with a Streamr server I2PTunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:2
@@ -2819,14 +2644,11 @@ msgstr "Nota"
 msgid ""
 "The ministreaming library has been enhanced and extended by the\n"
 "\"full\" <a href=\"%(streaming)s\">streaming library</a>.\n"
-"Ministreaming is deprecated and is incompatible with today's "
-"applications.\n"
+"Ministreaming is deprecated and is incompatible with today's applications.\n"
 "The following documentation is old.\n"
-"Also note that streaming extends ministreaming in the same Java package "
-"(net.i2p.client.streaming),\n"
+"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n"
 "so the current <a href=\"%(api)s\">API documentation</a> contains both.\n"
-"Obsolete ministreaming classes and methods are clearly marked as "
-"deprecated in the Javadocs."
+"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:19
@@ -2834,17 +2656,12 @@ msgstr ""
 msgid ""
 "\n"
 "The ministreaming library is a layer on top of the core \n"
-"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and "
-"authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and "
-"unauthenticated \n"
+"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and unauthenticated \n"
 "message layer.  Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations "
-"available, but\n"
-"rather than embed that functionality into the base I2P code, it has been "
-"factored\n"
-"off into its own library both to keep the TCP-esque complexities separate"
-" and to\n"
+"functionality has a whole series of tradeoffs and optimizations available, but\n"
+"rather than embed that functionality into the base I2P code, it has been factored\n"
+"off into its own library both to keep the TCP-esque complexities separate and to\n"
 "allow alternative optimized implementations."
 msgstr ""
 
@@ -2852,70 +2669,57 @@ msgstr ""
 #, python-format
 msgid ""
 "The ministreaming library was written by mihi as a part of his \n"
-"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out"
-" and released\n"
-"under the BSD license.  It is called the \"mini\"streaming library "
-"because it makes\n"
-"some simplifications in the implementation, while a more robust streaming"
-" library\n"
-"could be further optimized for operation over I2P.  The two main issues "
-"with \n"
+"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out and released\n"
+"under the BSD license.  It is called the \"mini\"streaming library because it makes\n"
+"some simplifications in the implementation, while a more robust streaming library\n"
+"could be further optimized for operation over I2P.  The two main issues with \n"
 "the ministreaming library are its use of the traditional TCP two phase \n"
-"establishment protocol and the current fixed window size of 1.  The "
-"establishment\n"
-"issue is minor for long lived streams, but for short ones, such as quick "
-"HTTP\n"
-"requests, the impact can be <a href=\"%(minwww)s\">significant</a>.  As "
-"for the window\n"
-"size, the ministreaming library doesn't maintain any ID or ordering "
-"within the \n"
-"messages sent (or include any application level ACK or SACK), so it must "
-"wait \n"
-"on average twice the time it takes to send a message before sending "
-"another."
+"establishment protocol and the current fixed window size of 1.  The establishment\n"
+"issue is minor for long lived streams, but for short ones, such as quick HTTP\n"
+"requests, the impact can be <a href=\"%(minwww)s\">significant</a>.  As for the window\n"
+"size, the ministreaming library doesn't maintain any ID or ordering within the \n"
+"messages sent (or include any application level ACK or SACK), so it must wait \n"
+"on average twice the time it takes to send a message before sending another."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:45
 #, python-format
 msgid ""
-"Even with those issues, the ministreaming library performs quite well in "
-"many\n"
+"Even with those issues, the ministreaming library performs quite well in many\n"
 "situations, and its <a href=\"%(api)s\">API</a>\n"
-"is both quite simple and capable of remaining unchanged as different "
-"streaming\n"
+"is both quite simple and capable of remaining unchanged as different streaming\n"
 "implementations are introduced.  The library is deployed in its own \n"
 "ministreaming.jar.\n"
 "Developers in Java who would like to use it can\n"
-"access the API directly, while developers in other languages can use it "
-"through\n"
+"access the API directly, while developers in other languages can use it through\n"
 "<a href=\"%(samv3)s\">SAM</a>'s streaming support."
 msgstr ""
 
-#: i2p2www/pages/site/docs/api/samv3.html:30
+#: i2p2www/pages/site/docs/api/samv3.html:39
 msgid "Library Name"
 msgstr ""
 
-#: i2p2www/pages/site/docs/api/samv3.html:31
+#: i2p2www/pages/site/docs/api/samv3.html:40
 msgid "Language"
 msgstr "Lingua"
 
-#: i2p2www/pages/site/docs/api/samv3.html:33
+#: i2p2www/pages/site/docs/api/samv3.html:42
 msgid "STREAM"
 msgstr ""
 
-#: i2p2www/pages/site/docs/api/samv3.html:34
+#: i2p2www/pages/site/docs/api/samv3.html:43
 msgid "DGRAM"
 msgstr ""
 
-#: i2p2www/pages/site/docs/api/samv3.html:35
+#: i2p2www/pages/site/docs/api/samv3.html:44
 msgid "RAW"
 msgstr ""
 
-#: i2p2www/pages/site/docs/api/samv3.html:36
+#: i2p2www/pages/site/docs/api/samv3.html:45
 msgid "Site"
 msgstr "Sito"
 
-#: i2p2www/pages/site/docs/api/samv3.html:42
+#: i2p2www/pages/site/docs/api/samv3.html:51
 msgid "wrapper"
 msgstr "wrapper"
 
@@ -2926,8 +2730,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/socks.html:5
 msgid ""
 "\n"
-"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are "
-"supported.\n"
+"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n"
 "Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n"
 "Both shared-clients and non-shared are supported.\n"
 "There is no SOCKS outproxy so it is of limited use."
@@ -2948,8 +2751,7 @@ msgid ""
 "information as content, I2P has no way to protect your anonymity.  For\n"
 "example, some mail applications will send the IP address of the machine\n"
 "they are running on to a mail server. There is no way for I2P to filter\n"
-"this, thus using I2P to 'socksify' existing applications is possible, but"
-"\n"
+"this, thus using I2P to 'socksify' existing applications is possible, but\n"
 "extremely dangerous."
 msgstr ""
 
@@ -2982,7 +2784,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/socks.html:48
 msgid ""
 "The SOCKS proxy\n"
-"supports standard addressbook names, but not Base64 destinations.\n"
+"supports standard address book names, but not Base64 destinations.\n"
 "Base32 hashes should work as of release 0.7.\n"
 "It supports outgoing connections only, i.e. an I2PTunnel Client.\n"
 "UDP support is stubbed out but not working yet.\n"
@@ -3028,47 +2830,34 @@ msgstr ""
 #, python-format
 msgid ""
 "The streaming library is a layer on top of the core \n"
-"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and "
-"authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and "
-"unauthenticated \n"
+"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and unauthenticated \n"
 "message layer.  Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations "
-"available, but\n"
-"rather than embed that functionality into the base I2P code, it has been "
-"factored\n"
-"off into its own library both to keep the TCP-esque complexities separate"
-" and to\n"
+"functionality has a whole series of tradeoffs and optimizations available, but\n"
+"rather than embed that functionality into the base I2P code, it has been factored\n"
+"off into its own library both to keep the TCP-esque complexities separate and to\n"
 "allow alternative optimized implementations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:29
 msgid ""
 "In consideration of the relatively high cost of messages, \n"
-"the streaming library's protocol for scheduling and delivering those "
-"messages has been optimized to\n"
-"allow individual messages passed to contain as much information as is "
-"available.\n"
-"For instance, a small HTTP transaction proxied through the streaming "
-"library can\n"
-"be completed in a single round trip - the first messages bundle a SYN, "
-"FIN, and\n"
+"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n"
+"allow individual messages passed to contain as much information as is available.\n"
+"For instance, a small HTTP transaction proxied through the streaming library can\n"
+"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n"
 "the small HTTP request payload, and the reply bundles the SYN,\n"
 "FIN, ACK, and the HTTP response payload.  While an additional\n"
-"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has "
-"been\n"
-"received, the local HTTP proxy can often deliver the full response to the"
-" browser \n"
+"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n"
+"received, the local HTTP proxy can often deliver the full response to the browser \n"
 "immediately."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:42
 msgid ""
 "The streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control "
-"algorithms\n"
-"(both slow start and congestion avoidance), and general packet behavior "
-"(ACK,\n"
+"abstraction of TCP, with its sliding windows, congestion control algorithms\n"
+"(both slow start and congestion avoidance), and general packet behavior (ACK,\n"
 "SYN, FIN, RST, rto calculation, etc)."
 msgstr ""
 
@@ -3088,29 +2877,21 @@ msgstr "API"
 #: i2p2www/pages/site/docs/api/streaming.html:60
 #, python-format
 msgid ""
-"The streaming library API provides a standard socket paradigm to Java "
-"applications.\n"
-"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, "
-"except that\n"
-"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> "
-"through the\n"
+"The streaming library API provides a standard socket paradigm to Java applications.\n"
+"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, except that\n"
+"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> through the\n"
 "streaming library, to be interpreted by I2CP."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:67
 #, python-format
 msgid ""
-"The standard interface to the streaming lib is for the application to use"
-" the\n"
+"The standard interface to the streaming lib is for the application to use the\n"
 "<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a> to create an\n"
-"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks "
-"the\n"
-"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will "
-"cause\n"
-"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The "
-"application\n"
-"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> "
-"or\n"
+"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks the\n"
+"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will cause\n"
+"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The application\n"
+"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> or\n"
 "receive connections with an <a href=\"%(i2psskt)s\">I2PServerSocket</a>."
 msgstr ""
 
@@ -3131,17 +2912,12 @@ msgstr ""
 #, python-format
 msgid ""
 "The options and current default values are listed below.\n"
-"Options are case-sensitive and may be set for the whole router, for a "
-"particular client, or for an individual socket on a\n"
+"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n"
 "per-connection basis.\n"
-"Many values are tuned for HTTP performance over typical I2P conditions. "
-"Other applications such\n"
+"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n"
 "as peer-to-peer services are strongly encouraged to\n"
-"modify as necessary, by setting the options and passing them via the call"
-" to\n"
-"<a "
-"href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost,"
-" _i2cpPort, opts).\n"
+"modify as necessary, by setting the options and passing them via the call to\n"
+"<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost, _i2cpPort, opts).\n"
 "Time values are in ms."
 msgstr ""
 
@@ -3149,17 +2925,14 @@ msgstr ""
 #, python-format
 msgid ""
 "Note that higher-layer APIs, such as <a href=\"%(samv3)s\">SAM</a>,\n"
-"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,"
-"\n"
+"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
 "may override these defaults with their own defaults.\n"
-"Also note that many options only apply to servers listening for incoming "
-"connections."
+"Also note that many options only apply to servers listening for incoming connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:110
 msgid ""
-"As of release 0.9.1, most, but not all, options may be changed on an "
-"active socket manager or session.\n"
+"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n"
 "See the javadocs for details."
 msgstr ""
 
@@ -3183,8 +2956,8 @@ msgstr "Note"
 
 #: i2p2www/pages/site/docs/api/streaming.html:119
 msgid ""
-"Comma- or space-separated list of Base64 peer Hashes used for either "
-"access list or blacklist."
+"Comma- or space-separated list of Base64 peer Hashes used for either access "
+"list or blacklist."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:121
@@ -3234,24 +3007,21 @@ msgstr ""
 msgid ""
 "Comma- or space-separated list of Base64 peer Hashes to be\n"
 "blacklisted for incoming connections to ALL destinations in the context.\n"
-"This option must be set in the context properties, NOT in the "
-"createManager() options argument.\n"
-"Note that setting this in the router context will not affect clients "
-"outside the\n"
+"This option must be set in the context properties, NOT in the createManager() options argument.\n"
+"Note that setting this in the router context will not affect clients outside the\n"
 "router in a separate JVM and context."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:175
 msgid ""
-"How much transmit data (in bytes) will be accepted that hasn't been "
-"written out yet."
+"How much transmit data (in bytes) will be accepted that hasn't been written "
+"out yet."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:179
 msgid ""
 "When we're in congestion avoidance, we grow the window size at the rate\n"
-"of <code>1/(windowSize*factor)</code>.  In standard TCP, window sizes are"
-" in bytes,\n"
+"of <code>1/(windowSize*factor)</code>.  In standard TCP, window sizes are in bytes,\n"
 "while in I2P, window sizes are in messages.\n"
 "A higher number means slower growth."
 msgstr ""
@@ -3260,16 +3030,15 @@ msgstr ""
 msgid ""
 "How long to wait after instantiating a new con \n"
 "before actually attempting to connect.  If this is\n"
-"&lt;= 0, connect immediately with no initial data.  If greater than 0, "
-"wait\n"
+"&lt;= 0, connect immediately with no initial data.  If greater than 0, wait\n"
 "until the output stream is flushed, the buffer fills, \n"
 "or that many milliseconds pass, and include any initial data with the SYN."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:194
 msgid ""
-"How long to block on connect, in milliseconds. Negative means "
-"indefinitely. Default is 5 minutes."
+"How long to block on connect, in milliseconds. Negative means indefinitely. "
+"Default is 5 minutes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:198
@@ -3282,30 +3051,24 @@ msgstr ""
 msgid ""
 "Comma- or space-separated list of Base64 peer Hashes or host names to be\n"
 "contacted using an alternate DSA destination.\n"
-"Only applies if multisession is enabled and the primary session is non-"
-"DSA\n"
+"Only applies if multisession is enabled and the primary session is non-DSA\n"
 "(generally for shared clients only).\n"
-"This option must be set in the context properties, NOT in the "
-"createManager() options argument.\n"
-"Note that setting this in the router context will not affect clients "
-"outside the\n"
+"This option must be set in the context properties, NOT in the createManager() options argument.\n"
+"Note that setting this in the router context will not affect clients outside the\n"
 "router in a separate JVM and context."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:216
 msgid ""
 "Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier "
-"than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this "
-"Destination."
+"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this Destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:226
 msgid ""
 "(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a "
-"duplicate ack."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:232
@@ -3318,8 +3081,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:237
 msgid ""
-"The initial value of the resend delay field in the packet header, times "
-"1000.\n"
+"The initial value of the resend delay field in the packet header, times 1000.\n"
 "Not fully implemented; see below."
 msgstr ""
 
@@ -3342,8 +3104,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:255
 msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
-"are in messages."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
+"in messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:279
@@ -3385,12 +3147,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:333
 msgid ""
 "(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than "
-"1 will cause an error."
+"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:338
-msgid "How long to block on read, in milliseconds. Negative means indefinitely."
+msgid ""
+"How long to block on read, in milliseconds. Negative means indefinitely."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:342
@@ -3433,19 +3195,15 @@ msgstr "Impostazioni"
 
 #: i2p2www/pages/site/docs/api/streaming.html:387
 msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
-"may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
-" may contain the initial response data as well."
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:392
 msgid ""
-"The initiator may send additional data packets, up to the initial window "
-"size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
 "These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short "
-"period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
 "arrive out of order, in advance of the SYNCHRONIZE packet."
 msgstr ""
 
@@ -3455,33 +3213,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:400
 msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the"
-" lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
-" will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
 "a large amount of overhead.\n"
 "The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K "
-"I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
 "including overhead for the typical case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:417
 msgid ""
-"The first message in a connection includes a 387 byte (typical) "
-"Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
-"the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
-"was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
-"I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation "
-"of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important "
-"factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived "
-"connections."
+"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:428
@@ -3495,14 +3243,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:436
 #, python-format
 msgid ""
-"Each packet is sent through I2P as a single message (or as an individual "
-"clove in a\n"
-"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation "
-"is implemented\n"
-"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a "
-"href=\"%(i2np)s\">I2NP</a>, and\n"
-"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no "
-"packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
+"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation is implemented\n"
+"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a href=\"%(i2np)s\">I2NP</a>, and\n"
+"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no packet delimiter\n"
 "mechanism or payload length field in the streaming protocol."
 msgstr ""
 
@@ -3512,17 +3256,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:447
 msgid ""
-"Data packets may include an optional delay field specifying the requested"
-" delay,\n"
+"Data packets may include an optional delay field specifying the requested delay,\n"
 "in ms, before the receiver should ack the packet.\n"
 "Valid values are 0 to 60000 inclusive.\n"
 "A value of 0 requests an immediate ack.\n"
 "This is advisory only, and receivers should delay slightly so that\n"
 "additional packets may be acknowledged with a single ack.\n"
-"Some implementations may include an advisory value of (measured RTT / 2) "
-"in this field.\n"
-"For nonzero optional delay values, receivers should limit the maximum "
-"delay\n"
+"Some implementations may include an advisory value of (measured RTT / 2) in this field.\n"
+"For nonzero optional delay values, receivers should limit the maximum delay\n"
 "before sending an ack to a few seconds at most.\n"
 "Optional delay values greater than 60000 indicate choking, see below."
 msgstr ""
@@ -3534,46 +3275,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:462
 msgid ""
 "TCP headers include the receive window in bytes.\n"
-"The streaming protocol does not contain a receive window, it uses only a "
-"simple choke/unchoke indication.\n"
-"Each endpoint must maintain its own estimate of the far-end receive "
-"window, in either bytes or packets.\n"
-"The recommended minimum buffer size for receiver implementations is 128 "
-"packets or 217 KB (approximately 128x1730).\n"
-"Because of I2P netowrk latency, packet drops, and the resulting "
-"congestion control,\n"
+"The streaming protocol does not contain a receive window, it uses only a simple choke/unchoke indication.\n"
+"Each endpoint must maintain its own estimate of the far-end receive window, in either bytes or packets.\n"
+"The recommended minimum buffer size for receiver implementations is 128 packets or 217 KB (approximately 128x1730).\n"
+"Because of I2P netowrk latency, packet drops, and the resulting congestion control,\n"
 "a buffer of this size is rarely filled.\n"
-"Overflow is, however, likely to occur on high-bandwidth \"local "
-"loopback\" (same-router) connections."
+"Overflow is, however, likely to occur on high-bandwidth \"local loopback\" (same-router) connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:471
 msgid ""
 "To quickly indicate and smoothly recover from overflow conditions,\n"
 "there is a simple mechanism for pushback in the streaming protocol.\n"
-"If a packet is received with an optional delay field of value of 60001 or"
-" higher,\n"
+"If a packet is received with an optional delay field of value of 60001 or higher,\n"
 "that indicates \"choking\" or a receive window of zero.\n"
-"A packet with an optional delay field of value of 60000 or less indicates"
-" \"unchoking\".\n"
-"Packets without an optional delay field do not affect the choke/unchoke "
-"state."
+"A packet with an optional delay field of value of 60000 or less indicates \"unchoking\".\n"
+"Packets without an optional delay field do not affect the choke/unchoke state."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:479
 msgid ""
-"After being choked, no more packets with data should be sent until the "
-"transmitter is unchoked,\n"
-"except for occasional \"probe\" data packets to compensate for possible "
-"lost unchoke packets.\n"
-"The choked endpoint should start a \"persist timer\" to control the "
-"probing, as in TCP.\n"
+"After being choked, no more packets with data should be sent until the transmitter is unchoked,\n"
+"except for occasional \"probe\" data packets to compensate for possible lost unchoke packets.\n"
+"The choked endpoint should start a \"persist timer\" to control the probing, as in TCP.\n"
 "The unchoking endpoint should send several packets with this field set,\n"
-"or continue sending them periodically until data packets are received "
-"again.\n"
+"or continue sending them periodically until data packets are received again.\n"
 "Maximum time to wait for unchoking is implementation-dependent.\n"
-"Transmitter window size and congestion control strategy after being "
-"unchoked is implementation-dependent."
+"Transmitter window size and congestion control strategy after being unchoked is implementation-dependent."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:490
@@ -3582,8 +3310,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:491
 msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) "
-"and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
 "phases, with exponential backoff.\n"
 "Windowing and acknowledgments use packet count, not byte count."
 msgstr ""
@@ -3594,53 +3321,44 @@ msgstr "Chiudi"
 
 #: i2p2www/pages/site/docs/api/streaming.html:499
 msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the "
-"CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag."
-"\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag.\n"
 "CLOSE packets may contain data as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:507
 msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
-"in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
 "This function is provided in streaming.\n"
 "Pings and pongs may not be combined with a standard streaming packet;\n"
 "if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are "
-"ignored."
+"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are ignored."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:515
 msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
-"flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is "
-"ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
 "The sendStreamId may or may not correspond to an existing connection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:521
 msgid ""
 "A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the "
-"sendStreamId from the ping.\n"
-"Prior to release 0.9.18, the pong packet does not include any payload "
-"that was contained in the ping."
+"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
+"Prior to release 0.9.18, the pong packet does not include any payload that was contained in the ping."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:527
 msgid ""
 "As of release 0.9.18, pings and pongs may contain a payload.\n"
-"The payload in the ping, up to a maximum of 32 bytes, is returned in the "
-"pong."
+"The payload in the ping, up to a maximum of 32 bytes, is returned in the pong."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:532
 msgid ""
-"Streaming may be configured to disable sending pongs with the "
-"configuration i2p.streaming.answerPings=false."
+"Streaming may be configured to disable sending pongs with the configuration "
+"i2p.streaming.answerPings=false."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:537
@@ -3656,8 +3374,7 @@ msgid ""
 "This is used for \"temporal\" sharing at connection open/close time,\n"
 "not \"ensemble\" sharing during a connection (See\n"
 "<a href=\"http://www.ietf.org/rfc/rfc2140.txt\">RFC 2140</a>).\n"
-"There is a separate share per ConnectionManager (i.e. per local "
-"Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
 "so that there is no information leakage to other Destinations on the\n"
 "same router.\n"
 "The share data for a given peer expires after a few minutes.\n"
@@ -3670,8 +3387,7 @@ msgstr "Altri Parametri"
 
 #: i2p2www/pages/site/docs/api/streaming.html:560
 msgid ""
-"The following parameters are hardcoded, but may be of interest for "
-"analysis:"
+"The following parameters are hardcoded, but may be of interest for analysis:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:579
@@ -3681,25 +3397,16 @@ msgstr "Cronologia"
 
 #: i2p2www/pages/site/docs/api/streaming.html:580
 msgid ""
-"The streaming library has grown organically for I2P - first mihi "
-"implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
-"window\n"
-"size of 1 message (requiring an ACK before sending the next one), and "
-"then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets)"
-" and the\n"
-"full streaming implementation was deployed with a sliding window protocol"
-" and \n"
-"optimizations to take into account the high bandwidth x delay product.  "
-"Individual\n"
-"streams may adjust the maximum packet size and other options. The default"
-"\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
-"\n"
+"The streaming library has grown organically for I2P - first mihi implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
+"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
+"full streaming implementation was deployed with a sliding window protocol and \n"
+"optimizations to take into account the high bandwidth x delay product.  Individual\n"
+"streams may adjust the maximum packet size and other options. The default\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
 "and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple "
-"messages."
+"retransmitting lost messages, and the latency and overhead of multiple messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:594
@@ -3711,7 +3418,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:975
 #: i2p2www/pages/site/docs/protocol/i2np.html:233
 #: i2p2www/pages/site/docs/transport/ntcp.html:544
-#: i2p2www/pages/site/docs/transport/ssu.html:587
+#: i2p2www/pages/site/docs/transport/ssu.html:615
 #: i2p2www/pages/site/docs/tunnels/implementation.html:506
 msgid "Future Work"
 msgstr ""
@@ -3730,20 +3437,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:604
 #, python-format
 msgid ""
-"Another area for research is the interaction of the streaming lib with "
-"the\n"
+"Another area for research is the interaction of the streaming lib with the\n"
 "NTCP and SSU transport layers.\n"
 "See <a href=\"%(ntcpdisc)s\">the NTCP discussion page</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:609
 msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly"
-" affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a "
-"pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller "
-"window\n"
+"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller window\n"
 "sizes than would otherwise be the case. The router currently routes \n"
 "messages for a single from/to destination pair through a consistent set \n"
 "of tunnels, until tunnel expiration or delivery failure. The router's \n"
@@ -3778,11 +3481,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:636
 msgid ""
-"zzz has added debug code to the streaming library to log packets in a "
-"wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
 "(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters "
-"to TCP fields."
+"The format may require enhancement to map more streaming lib parameters to TCP fields."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:641
@@ -3801,18 +3502,15 @@ msgstr "Gennaio 2017"
 msgid ""
 "There are several bittorrent clients and trackers on I2P.\n"
 "As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P."
-"\n"
+"changes are required to tracker and client software for operation on I2P.\n"
 "These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients "
-"and trackers."
+"Note carefully the guidelines for compatibility with older I2P clients and trackers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:15
 msgid ""
 "This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or "
-"protocols."
+"Specific clients and trackers may implement other unique features or protocols."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:20
@@ -3825,8 +3523,7 @@ msgstr "Annunci"
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:27
 msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for"
-" compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
 "Trackers may ignore the port parameter, and should not require it."
 msgstr ""
 
@@ -3838,8 +3535,7 @@ msgid ""
 "using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for "
-"compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
 "Trackers should not require an appended \".i2p\"."
 msgstr ""
 
@@ -3849,18 +3545,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:46
 msgid ""
-"Current Destinations for clients are 387 or more bytes (516 or more in "
-"Base 64 encoding).\n"
+"Current Destinations for clients are 387 or more bytes (516 or more in Base 64 encoding).\n"
 "A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see "
-"below),\n"
+"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
 "the tracker should probably decode and reject bad Base64 when announced."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:53
 msgid ""
-"The default response type is non-compact. Clients may request a compact "
-"response with\n"
+"The default response type is non-compact. Clients may request a compact response with\n"
 "the parameter compact=1. A tracker may, but is not required to, return\n"
 "a compact response when requested."
 msgstr ""
@@ -3868,10 +3561,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:59
 msgid ""
 "Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel "
-"rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and "
-"it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
 "destination enforcement by the tracker (see below)."
 msgstr ""
 
@@ -3893,8 +3584,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:76
 msgid ""
-"Trackers generally include a fake port key, or use the port from the "
-"announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
 "Clients must ignore the port parameter, and should not require it."
 msgstr ""
 
@@ -3902,10 +3592,8 @@ msgstr ""
 #, python-format
 msgid ""
 "The value of the ip key is the base 64 of the client's\n"
-"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as "
-"described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it "
-"wasn't in the announce ip, for compatibility with older clients.\n"
+"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
 "Clients should not require an appended \".i2p\" in the responses."
 msgstr ""
 
@@ -3920,26 +3608,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:95
 #, python-format
 msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a "
-"single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
 "whose length is a multiple of 32 bytes.\n"
 "This string contains the concatenated\n"
 "<a href=\"%(commonstructures)s#type_Hash\">32-byte SHA-256 Hashes</a>\n"
 "of the binary\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement"
-"\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-"
-"DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
 "or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
 "The peers key may be absent, or the peers value may be zero-length."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:109
 msgid ""
-"While compact response support is optional for both clients and trackers,"
-" it is highly\n"
+"While compact response support is optional for both clients and trackers, it is highly\n"
 "recommended as it reduces the nominal response size by over 90&#37;."
 msgstr ""
 
@@ -3950,34 +3634,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:117
 #, python-format
 msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own "
-"tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying "
-"the\n"
+"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
 "client's\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n"
 "using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
-"are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
 "different formats for the same information.\n"
 "These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce "
-"parameter at all."
+"A tracker enforcing destinations need not require the ip announce parameter at all."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:129
 msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for "
-"announces,\n"
-"destination enforcement will prevent usage by those clients unless or "
-"until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
+"destination enforcement will prevent usage by those clients unless or until\n"
 "those clients are converted to announcing over their own tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:135
 msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,"
-"\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
 "so we expect that all trackers will eventually enforce destinations.\n"
 "Both tracker and client developers should anticipate it."
 msgstr ""
@@ -3991,12 +3668,9 @@ msgstr ""
 msgid ""
 "Announce URL host names in torrent files generally follow the\n"
 "<a href=\"%(naming)s\">I2P naming standards</a>.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 "
-"hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
-"should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these "
-"formats."
+"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these formats."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:152
@@ -4018,27 +3692,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:165
 #, python-format
 msgid ""
-"I2P uses 387+ byte <a "
-"href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
+"I2P uses 387+ byte <a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "for addresses, as explained above."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:170
 msgid ""
-"If the client has only the hash of the destination (such as from a "
-"compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
-"Naming Service,\n"
+"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
 "which will return the full Destination if available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:176
 msgid ""
-"If the client has a peer's full Destination it received in a non-compact "
-"response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
 "directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is "
-"quite inefficient."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:183
@@ -4048,40 +3717,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:184
 msgid ""
 "To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer"
-" connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
 "I2P HTTP outproxies often block announces.\n"
 "There are no known SOCKS outproxies supporting bittorrent traffic."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:191
 msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
-"often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
 "block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
-"and not deliver them in responses."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:200
 #, python-format
 msgid ""
 "I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex "
-"available,\n"
+"As there does not appear to be a formal specification of ut_pex available,\n"
 "it may be necessary to review the libtorrent source for assistance.\n"
 "It is an extension message, identified as \"i2p_pex\" in\n"
-"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension "
-"handshake</a>.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", "
-"\"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length "
-"is a multiple of 32 bytes.\n"
+"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
 "These byte strings are the concatenated SHA-256 Hashes of the binary\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact "
-"response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
 "The added.f value, if present, is the same as in ut_pex."
 msgstr ""
 
@@ -4096,13 +3757,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:226
 msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
-" or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
 "It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension "
-"handshake</a>.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
-"both integers."
+"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:235
@@ -4136,14 +3794,12 @@ msgstr ""
 msgid ""
 "Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
 "instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a"
-" single compact peer info."
+"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:264
 msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
-"2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
 "instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
 "In a response, the \"nodes\" key is a\n"
 "single byte string with concatenated compact node info."
@@ -4152,10 +3808,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:271
 msgid ""
 "Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the "
-"destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of "
-"the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of the\n"
 "destination hash exclusive-ORed with the port."
 msgstr ""
 
@@ -4180,51 +3834,38 @@ msgid ""
 "Preliminary differences from\n"
 "<a href=\"http://www.bittorrent.org/beps/bep_0015.html\">BEP 15</a>\n"
 "are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker "
-"supporting datagram announces."
+"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:299
 msgid ""
 "A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive "
-"repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
-" the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
 "The response port is arbitrary.\n"
 "A client sends and receives on a single port only.\n"
 "It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they "
-"contain tokens sent in the query, and need not be signed."
+"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:309
 msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
-" the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
 "although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
-" 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source "
-"port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, "
-"and error response are the same as in BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:317
 msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a "
-"simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
 "with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to "
-"the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
 "and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an "
-"existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
-"prefix.\n"
-"The URL for a modified 2-packet-mode tracker would require a different "
-"prefix if both modes are supported in I2P."
+"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix.\n"
+"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:330
@@ -4264,23 +3905,15 @@ msgstr "Incorporare I2P nella vostra Applicazione"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:8
 msgid ""
-"This page is about bundling the entire I2P router binary with your "
-"application.\n"
-"It is not about writing an application to work with I2P (either bundled "
-"or external)."
-msgstr ""
-"Questa pagina tratta dell'inclusione dell'intero router I2P, in binario, "
-"assieme alla vostra applicazione.\n"
-"Non riguarda la realizzazione di un applicazione che interagisca con I2P "
-"(sia essa abbinata a I2P o esterna)."
+"This page is about bundling the entire I2P router binary with your application.\n"
+"It is not about writing an application to work with I2P (either bundled or external)."
+msgstr "Questa pagina tratta dell'inclusione dell'intero router I2P, in binario, assieme alla vostra applicazione.\nNon riguarda la realizzazione di un applicazione che interagisca con I2P (sia essa abbinata a I2P o esterna)."
 
 #: i2p2www/pages/site/docs/applications/embedding.html:13
 msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's "
-"great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
 "If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the "
-"complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
 "This page discusses some general guidelines."
 msgstr ""
 
@@ -4290,10 +3923,8 @@ msgstr "Parlaci"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:24
 msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the "
-"most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for "
-"everyone."
+"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for everyone."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:30
@@ -4302,11 +3933,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:31
 msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the "
-"Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
 "If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
-"the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
 "Some of the following only applies to the Java router."
 msgstr ""
 
@@ -4315,7 +3944,8 @@ msgid "Licensing"
 msgstr "Licenze"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid "Ensure you meet the license requirements of the software you are bundling."
+msgid ""
+"Ensure you meet the license requirements of the software you are bundling."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:45
@@ -4324,29 +3954,22 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:46
 msgid ""
-"A correct default configuration is crucial. Most users will not change "
-"the defaults.\n"
-"The defaults for your application may need to be different than the "
-"defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change the defaults.\n"
+"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
 "Override the router defaults if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:51
 msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and "
-"length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of "
-"your app."
+"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of your app."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:55
 msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute "
-"to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it "
-"would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for "
-"example."
+"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:62
@@ -4356,32 +3979,25 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:63
 msgid ""
 "It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, "
-"setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful "
-"shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful shutdown,\n"
 "your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating "
-"tunnels."
+"However, there's lots of reasons why you should allow participating tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:70
 msgid ""
-"First of all, the router doesn't work that well if it doesn't have a "
-"chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
 "which is helped tremendously by others building tunnels through you."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:74
 msgid ""
-"Secondly, over 90&#37; of the routers in the current network allow "
-"participating traffic.\n"
+"Secondly, over 90&#37; of the routers in the current network allow participating traffic.\n"
 "It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, "
-"then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
 "and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for"
-" people to enable relaying."
+"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:81
@@ -4392,10 +4008,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:84
 msgid ""
-"We strongly discourage you from disabling participating traffic by "
-"default.\n"
-"If you do this and your application gets hugely popular, it could break "
-"the network."
+"We strongly discourage you from disabling participating traffic by default.\n"
+"If you do this and your application gets hugely popular, it could break the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:90
@@ -4404,12 +4018,9 @@ msgstr "Persistenza"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:91
 msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs"
-" of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge"
-" load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best "
-"performance."
+"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:99
@@ -4418,12 +4029,9 @@ msgstr "Configurabilità"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:100
 msgid ""
-"Give your users a way to change the configuration of the important "
-"settings.\n"
-"We understand that you will probably want to hide most of I2P's "
-"complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, "
-"IP/port may be helpful."
+"Give your users a way to change the configuration of the important settings.\n"
+"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:108
@@ -4432,12 +4040,9 @@ msgstr "Considerazioni sul Floodfill"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:109
 msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, "
-"your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at "
-"least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your "
-"fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
 "It also depends on the typical uptime for your application."
 msgstr ""
 
@@ -4448,8 +4053,7 @@ msgstr "Reseeding"
 #: i2p2www/pages/site/docs/applications/embedding.html:120
 msgid ""
 "Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your "
-"source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
 "Be aware of possible blocking by hostile governments."
 msgstr ""
 
@@ -4459,12 +4063,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:130
 msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle "
-"and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement "
-"some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the "
-"tunnel, even in the presence of some background DHT activity."
+"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:138
@@ -4473,16 +4074,11 @@ msgstr "Aggiornabilità"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:139
 msgid ""
-"Have an auto-update feature if at all possible, or at least auto-"
-"notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be "
-"updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical "
-"to the health of the network that the users keep up.\n"
-"We usually have over 80&#37; of the network on the latest release within "
-"6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update"
-" function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
+"We usually have over 80&#37; of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
 "which you presumably are not bundling."
 msgstr ""
 
@@ -4493,17 +4089,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:151
 msgid ""
 "Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques "
-"per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much "
-"issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth "
-"distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is "
-"significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
 "we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this "
-"checklist is."
+"The bigger your growth plans, the more important everthing else in this checklist is."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:163
@@ -4513,10 +4104,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:164
 msgid ""
 "Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even "
-"more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong "
-"solution."
+"It may be several minutes after startup before it works well, and even more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong solution."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:172
@@ -4525,8 +4114,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:173
 msgid ""
-"Provide some indication to the user that the application tunnels are "
-"ready. Encourage patience."
+"Provide some indication to the user that the application tunnels are ready. "
+"Encourage patience."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:178
@@ -4536,8 +4125,7 @@ msgstr "Spegnimento Elegante"
 #: i2p2www/pages/site/docs/applications/embedding.html:179
 msgid ""
 "If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to "
-"confirm."
+"Don't let your users break tunnels easily, or at least ask them to confirm."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:185
@@ -4546,8 +4134,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:186
 msgid ""
-"It would be nice if you give your users links to learn more about I2P and"
-" to donate."
+"It would be nice if you give your users links to learn more about I2P and to"
+" donate."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:192
@@ -4557,8 +4145,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:193
 msgid ""
 "Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an "
-"external router."
+"it may be helpful to provide an option or a separate package to use an external router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:200
@@ -4567,8 +4154,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:201
 msgid ""
-"If you plan to use or link to other common I2P services (news feeds, "
-"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
 "make sure you aren't overloading them,\n"
 "and talk to the people who are running them to make sure it's ok."
 msgstr ""
@@ -4580,10 +4166,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:210
 msgid ""
 "I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. "
-"You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system "
-"clock is correct."
+"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system clock is correct."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:218
@@ -4592,41 +4176,30 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:219
 msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
-"mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
 "You may omit the two streaming jars for a datagram-only app.\n"
 "Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
-"to make the crypto much faster.\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
 "Java 7 or higher is required to build.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P "
-"package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, "
-"and i2psnark, for example."
+"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:228
 msgid ""
-"The following files should be included in the I2P installation directory,"
-" specified with the \"i2p.dir.base\" property.\n"
-"Don't forget the certificates/ directory, which is required for "
-"reseeding, and blocklist.txt for IP validation.\n"
-"The geoip directory is optional, but recommended so the router can make "
-"decisions based on location.\n"
-"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that"
-" directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz)."
-"\n"
-"The hosts.txt file may be necessary, you may modify it to include any "
-"hosts your application uses.\n"
-"You may add a router.config file to the base directory to override "
-"initial defaults.\n"
+"The following files should be included in the I2P installation directory, specified with the \"i2p.dir.base\" property.\n"
+"Don't forget the certificates/ directory, which is required for reseeding, and blocklist.txt for IP validation.\n"
+"The geoip directory is optional, but recommended so the router can make decisions based on location.\n"
+"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz).\n"
+"The hosts.txt file may be necessary, you may modify it to include any hosts your application uses.\n"
+"You may add a router.config file to the base directory to override initial defaults.\n"
 "Review and edit or remove the clients.config and i2ptunnel.config files."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:237
 msgid ""
-"License requirements may require you to include the LICENSES.txt file and"
-" the licenses directory."
+"License requirements may require you to include the LICENSES.txt file and "
+"the licenses directory."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:243
@@ -4644,17 +4217,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:255
 msgid ""
 "Our Android router app may be shared by multiple clients.\n"
-"If it is not installed, the user will be prompted when he starts a client"
-" app."
+"If it is not installed, the user will be prompted when he starts a client app."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:259
 msgid ""
-"Some developers have expressed concern that this is a poor user "
-"experience,\n"
+"Some developers have expressed concern that this is a poor user experience,\n"
 "and they wish to embed the router in their app.\n"
-"We do have an Android router service library on our roadmap, which could "
-"make embedding easier.\n"
+"We do have an Android router service library on our roadmap, which could make embedding easier.\n"
 "More information needed."
 msgstr ""
 
@@ -4669,11 +4239,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:272
 msgid ""
-"We have a limited number of our jars on <a "
-"href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven"
-" Central</a>.\n"
-"There are numerous trac tickets for us to address that will improve and "
-"expand the released jars on Maven Central."
+"We have a limited number of our jars on <a href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven Central</a>.\n"
+"There are numerous trac tickets for us to address that will improve and expand the released jars on Maven Central."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:282
@@ -4683,17 +4250,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:283
 msgid ""
 "If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and "
-"increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and increase reliability.\n"
 "This may take some time and experimentation to get working well.\n"
 "Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the "
-"same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
 "Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs "
-"(iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you "
-"have several."
+"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:296
@@ -4703,8 +4266,7 @@ msgstr "Comarketing"
 #: i2p2www/pages/site/docs/applications/embedding.html:297
 msgid ""
 "Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return "
-"the favor."
+"Give us your Twitter handle and start tweeting about it, we will return the favor."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:303
@@ -4723,8 +4285,7 @@ msgstr "Unisciti a Noi"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:311
 msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an "
-"eepsite about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project.\n"
 "Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
 "We can help get you users, testers, translators, or even coders."
 msgstr ""
@@ -4735,12 +4296,10 @@ msgstr "Esempi d'uso"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:320
 msgid ""
-"You may wish to install and play with the I2P Android app, and look at "
-"its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
 "See what we expose to the user and what we hide.\n"
 "Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
-" and Monero."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:328
@@ -4755,10 +4314,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:359
 msgid ""
-"This code is for the case where your application starts the router, as in"
-" our Android app.\n"
-"You could also have the router start the application via the "
-"clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in our Android app.\n"
+"You could also have the router start the application via the clients.config and i2ptunnel.config files,\n"
 "together with Jetty webapps,\n"
 "as is done in our Java packages.\n"
 "As always, state management is the difficult part."
@@ -4776,13 +4333,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:7
 msgid ""
-"Cloning large software repositories over I2P can be difficult, and using "
-"git can sometimes make this harder. Fortunately, it can also sometimes "
-"make it easier. Git has a <code>git bundle</code> command which can be "
-"used to turn a git repository into a file which git can then clone, "
-"fetch, or import from a location on your local disk. By combining this "
-"capability with bittorrent downloads, we can solve our remaining problems"
-" with <code>git clone</code>."
+"Cloning large software repositories over I2P can be difficult, and using git"
+" can sometimes make this harder. Fortunately, it can also sometimes make it "
+"easier. Git has a <code>git bundle</code> command which can be used to turn "
+"a git repository into a file which git can then clone, fetch, or import from"
+" a location on your local disk. By combining this capability with bittorrent"
+" downloads, we can solve our remaining problems with <code>git clone</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:8
@@ -4791,13 +4347,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:9
 msgid ""
-"If you intend to generate a git bundle, you <strong>must</strong> already"
-" possess a full copy of the <strong>git</strong> repository, not the mtn "
-"repository. You can get it from github or from git.idk.i2p, but a shallow"
-" clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will"
-" fail silently, creating what looks like a bundle, but when you try to "
-"clone it it will fail. If you are just retrieving a pre-generated git "
-"bundle, then this section does not apply to you."
+"If you intend to generate a git bundle, you <strong>must</strong> already "
+"possess a full copy of the <strong>git</strong> repository, not the mtn "
+"repository. You can get it from github or from git.idk.i2p, but a shallow "
+"clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will "
+"fail silently, creating what looks like a bundle, but when you try to clone "
+"it it will fail. If you are just retrieving a pre-generated git bundle, then"
+" this section does not apply to you."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:10
@@ -4807,23 +4363,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git-bundle.html:11
 msgid ""
 "Someone will need to supply you with a torrent file or a magnet link "
-"corresponding to an existing <code>git bundle</code> that they have "
-"already generated for you. A recent, correctly-generated bundle of the "
-"mainline i2p.i2p source code as-of Wednesday, March 18, 2020, can be "
-"found inside of I2P at my pastebin <a "
+"corresponding to an existing <code>git bundle</code> that they have already "
+"generated for you. A recent, correctly-generated bundle of the mainline "
+"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside of "
+"I2P at my pastebin <a "
 "href=\"http://paste.idk.i2p/f/4h137i\">paste.idk.i2p/f/4hq37i</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:12
 msgid ""
 "Once you have a bundle, you will need to use git to create a working "
-"repository from it. If you’re using GNU/Linux and i2psnark, the git "
-"bundle should be located in $HOME/.i2p/i2psnark or, as a service on "
-"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on "
-"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/” instead. The "
-"examples here assume I2PSnark on GNU/Linux, if you use something else, "
-"replace the path to the bundle with the download directory preferred by "
-"your client and platform."
+"repository from it. If you’re using GNU/Linux and i2psnark, the git bundle "
+"should be located in $HOME/.i2p/i2psnark or, as a service on Debian, "
+"/var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on GNU/Linux, it "
+"is probably at “$HOME/BiglyBT Downloads/” instead. The examples here assume "
+"I2PSnark on GNU/Linux, if you use something else, replace the path to the "
+"bundle with the download directory preferred by your client and platform."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:13
@@ -4836,8 +4391,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:16
 msgid ""
-"If you get the following error, try using git init and git fetch manually"
-" instead."
+"If you get the following error, try using git init and git fetch manually "
+"instead."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:18
@@ -4872,10 +4427,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:29
 msgid ""
-"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you "
-"have a successfully <code>--unshallow</code>ed clone of clone of the "
-"i2p.i2p repository. If you already have a clone, make sure you run "
-"<code>git fetch --unshallow</code> before you generate a torrent bundle."
+"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you have "
+"a successfully <code>--unshallow</code>ed clone of clone of the i2p.i2p "
+"repository. If you already have a clone, make sure you run <code>git fetch "
+"--unshallow</code> before you generate a torrent bundle."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:30
@@ -4884,8 +4439,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:32
 msgid ""
-"and copy the resulting bundle into your I2PSnark downloads directory. For"
-" instance:"
+"and copy the resulting bundle into your I2PSnark downloads directory. For "
+"instance:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:34
@@ -4894,117 +4449,152 @@ msgid ""
 "“Start” button to begin seeding the torrent."
 msgstr ""
 
+#: i2p2www/pages/site/docs/applications/git.html:7
+msgid ""
+"Tutorial for setting up git access through an I2P Tunnel. This tunnel will "
+"act as your access point to a single git service on I2P."
+msgstr ""
+
 #: i2p2www/pages/site/docs/applications/git.html:8
 msgid ""
-"Tutorial for setting up git access through an I2P Tunnel. This tunnel "
-"will act as your access point to a single git service on I2P."
+"If you intend to use the service at i2pgit.org/git.idk.i2p, then you probably already have a tunnel configured and much of this\n"
+"tutorial will not apply to you."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:10
+msgid "First: Set up an account at a Git service"
+msgstr ""
+
+#: i2p2www/pages/site/docs/applications/git.html:11
 msgid ""
-"Depending on how the git service is configured, it may or may not offer "
-"all services on the same address. In the case of gittest.i2p, there is a "
-"public HTTP URL, but this URL is read-only and cannot be used to make "
-"changes. To do that, you must also know the SSH base32, which isn’t "
-"public at this time. Unless I’ve told you the SSH base32 to gittest.i2p, "
-"head over to the <a href=\"GITLAB.md\">Server</a> tutorial to set up your"
-" own."
+"To create your repositories on a remote git service, sign up for a user "
+"account at that service. Of course it’s also possible to create repositories"
+" locally and push them to a remote git service, but most will require an "
+"account and for you to create a space for the repository on the server. "
+"Gitlab has a very simple sign-up form:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:12
 msgid ""
-"To create your repositories on a remote git service, sign up for a user "
-"account at that service. Of course it’s also possible to create "
-"repositories locally and push them to a remote git service, but most will"
-" require an account and for you to create a space for the repository on "
-"the server. Gitlab has a very simple sign-up form:"
+"These are generic instructions for any in-i2p Git instance with HTTP and SSH gateways.\n"
+"If you intend to contribute to I2P, you should create an account at the I2P gitlab, which is open to the\n"
+"community. Account registration may take a few days to complete, as the admin needs to sort through a large\n"
+"number of spam registrations. You can help this by getting in touch with the admin to confirm you are human\n"
+"using the instructions on the home page."
+msgstr ""
+
+#: i2p2www/pages/site/docs/applications/git.html:18
+msgid "Inside I2P - (http://git.idk.i2p)"
+msgstr ""
+
+#: i2p2www/pages/site/docs/applications/git.html:20
+msgid "Outside I2P - (https://i2pgit.org)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:17
+#: i2p2www/pages/site/docs/applications/git.html:27
 msgid ""
-"To make sure the setup process works, it helps to make a repository to "
-"test with from the server, and for the sake of this tutorial, we’re going"
-" to use a fork of the I2P router. First, browse to the i2p-"
-"hackers/i2p.i2p repository:"
+"To make sure the setup process works, it helps to make a repository to test "
+"with from the server, and for the sake of this tutorial, we’re going to use "
+"a fork of the I2P router. First, browse to the i2p-hackers/i2p.i2p "
+"repository:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:24
+#: i2p2www/pages/site/docs/applications/git.html:34
 msgid "Then, fork it to your account."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:32
+#: i2p2www/pages/site/docs/applications/git.html:42
 msgid ""
-"To have read-write access to my server, you’ll need to set up a tunnel "
-"for your SSH client. As an example, we’re going to use the HTTP tunnel "
-"instead, but if all you need is read-only, HTTP/S cloning, then you can "
-"skip all this and just use the http_proxy environment variable to "
-"configure git to use the pre-configured I2P HTTP Proxy. For example:"
+"To have read-write access to my server, you’ll need to set up a tunnel for "
+"your SSH client. As an example, we’re going to use the HTTP tunnel instead, "
+"but if all you need is read-only, HTTP/S cloning, then you can skip all this"
+" and just use the http_proxy environment variable to configure git to use "
+"the pre-configured I2P HTTP Proxy. For example:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:40
+#: i2p2www/pages/site/docs/applications/git.html:50
 msgid ""
-"Then, add the address you will be pushing and pulling from. Note that "
-"this example address is for Read-Only HTTP-over-I2P clones, if your admin"
-" does not allow the git HTTP(Smart HTTP) protocol, then you will need to "
-"get the SSH clone base32 from them. If you have an SSH clone base32, "
-"substitute it for the base32 in this step, which will fail."
+"Then, add the address you will be pushing and pulling from. Note that this "
+"example address is for Read-Only HTTP-over-I2P clones, if your admin does "
+"not allow the git HTTP(Smart HTTP) protocol, then you will need to get the "
+"SSH clone base32 from them. If you have an SSH clone base32, substitute it "
+"for the base32 in this step, which will fail."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:44
+#: i2p2www/pages/site/docs/applications/git.html:54
 msgid "Pick a port to forward the I2P service to locally."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:48
+#: i2p2www/pages/site/docs/applications/git.html:58
 msgid ""
 "I use it alot, so I start my client tunnel automatically, but it’s up to "
 "you."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:52
+#: i2p2www/pages/site/docs/applications/git.html:62
 msgid "When you’re all done, it should look alot like this."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:56
+#: i2p2www/pages/site/docs/applications/git.html:66
 msgid "Fourth: Attempt a clone"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:57
+#: i2p2www/pages/site/docs/applications/git.html:67
 msgid "Now your tunnel is all set up, you can attempt a clone over SSH."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:60
+#: i2p2www/pages/site/docs/applications/git.html:68
+msgid ""
+"Git Privacy: Committing to git adds a timestamp to git commit messages, "
+"which may be configured to reflect your local time zone. To enforce the use "
+"of UTC for all commits, you are advised to use a git alias, such as:"
+msgstr ""
+
+#: i2p2www/pages/site/docs/applications/git.html:70
+msgid "which will allow you to substitute"
+msgstr ""
+
+#: i2p2www/pages/site/docs/applications/git.html:72
+msgid "for"
+msgstr ""
+
+#: i2p2www/pages/site/docs/applications/git.html:74
+msgid "in order to obscure your local time zone."
+msgstr ""
+
+#: i2p2www/pages/site/docs/applications/git.html:78
 msgid ""
 "You might get an error where the remote end hangs up unexpectedly. "
-"Unfortunately git still doesn’t support resumable cloning. Until it does,"
-" there are a couple fairly easy ways to handle this. The first and "
-"easiest is to try and clone to a shallow depth:"
+"Unfortunately git still doesn’t support resumable cloning. Until it does, "
+"there are a couple fairly easy ways to handle this. The first and easiest is"
+" to try and clone to a shallow depth:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:63
+#: i2p2www/pages/site/docs/applications/git.html:81
 msgid ""
-"Once you’ve performed a shallow clone, you can fetch the rest resumably "
-"by changing to the repo directory and running:"
+"Once you’ve performed a shallow clone, you can fetch the rest resumably by "
+"changing to the repo directory and running:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:65
+#: i2p2www/pages/site/docs/applications/git.html:83
 msgid ""
-"At this point, you still don’t have all your branches yet. You can get "
-"them by running the following commands:"
+"At this point, you still don’t have all your branches yet. You can get them "
+"by running the following commands:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:68
+#: i2p2www/pages/site/docs/applications/git.html:86
 msgid ""
-"Which tells git to alter the repository configuration so that fetching "
-"from origin fetches all branches."
+"Which tells git to alter the repository configuration so that fetching from "
+"origin fetches all branches."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:69
+#: i2p2www/pages/site/docs/applications/git.html:87
 msgid ""
-"If that doesn’t work, you can try opening the tunnel configuration menu "
-"and adding some backup tunnels."
+"If that doesn’t work, you can try opening the tunnel configuration menu and "
+"adding some backup tunnels."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:73
+#: i2p2www/pages/site/docs/applications/git.html:91
 msgid ""
 "If that doesn’t work, then the next easy thing to try is to decrease the "
 "tunnel length. Don’t do this if you believe you are at risk of your code-"
@@ -5013,61 +4603,65 @@ msgid ""
 "sounds unlikely to you then you can probably do it safely."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:77
+#: i2p2www/pages/site/docs/applications/git.html:95
 msgid "<em>Suggested Workflow for Developers!</em>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:78
+#: i2p2www/pages/site/docs/applications/git.html:96
 msgid ""
-"Revision control can make your life easier, but it works best if you use "
-"it well! In light of this, we strongly suggest a fork-first, feature-"
-"branch workflow as many are familiar with from Github. In such a "
-"workflow, the master branch is used as a sort of “Trunk” for updates and "
-"is never touched by the programmmer, instead, all changes to the master "
-"are merged from branches. In order to do set up your workspace for this, "
-"take the following steps:"
+"Revision control can make your life easier, but it works best if you use it "
+"well! In light of this, we strongly suggest a fork-first, feature-branch "
+"workflow as many are familiar with from Github. In such a workflow, the "
+"master branch is used as a sort of “Trunk” for updates and is never touched "
+"by the programmmer, instead, all changes to the master are merged from "
+"branches. In order to do set up your workspace for this, take the following "
+"steps:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:80
+#: i2p2www/pages/site/docs/applications/git.html:98
 msgid ""
-"<strong>Never make changes to the Master Branch</strong>. You will be "
-"using the master branch to periodially obtain updates to the official "
-"source code. All changes should be made in feature branches."
+"<strong>Never make changes to the Master Branch</strong>. You will be using "
+"the master branch to periodially obtain updates to the official source code."
+" All changes should be made in feature branches."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:83
+#: i2p2www/pages/site/docs/applications/git.html:101
 msgid ""
-"Set up a second remote in your local repository using the upstream source"
-" code."
+"Set up a second remote in your local repository using the upstream source "
+"code."
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:85
+#: i2p2www/pages/site/docs/applications/git.html:103
 msgid "Pull in any upstream changes on your current master:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:87
+#: i2p2www/pages/site/docs/applications/git.html:105
 msgid ""
-"Before making any changes to the source code, check out a new feature "
-"branch to develop on:"
+"Before making any changes to the source code, check out a new feature branch"
+" to develop on:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:89
+#: i2p2www/pages/site/docs/applications/git.html:107
 msgid ""
-"When you’re done with your changes, commit them and push them to your "
-"branch"
+"When you’re done with your changes, commit them and push them to your branch"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:92
+#: i2p2www/pages/site/docs/applications/git.html:110
 msgid ""
-"Submit a merge request. When the merge request is approved and brought "
-"into the upstream master, check out the master locally and pull in the "
-"changes:"
+"Submit a merge request. When the merge request is approved and brought into "
+"the upstream master, check out the master locally and pull in the changes:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/applications/git.html:95
+#: i2p2www/pages/site/docs/applications/git.html:113
 msgid ""
-"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, "
-"you can update your master code using this procedure as well."
+"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, you "
+"can update your master code using this procedure as well."
+msgstr ""
+
+#: i2p2www/pages/site/docs/applications/git.html:117
+msgid ""
+"The git utccommit alias solution to git timestamp issue was arrived at from "
+"the information first published here"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:6
@@ -5075,21 +4669,22 @@ msgid "Gitlab over I2P Setup"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:7
-msgid "Mirror I2P Git repositories and Bridge Clearnet repositories for others."
+msgid ""
+"Mirror I2P Git repositories and Bridge Non-private internet.repositories for"
+" others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:10
 msgid ""
-"This is the setup process I use for configuring Gitlab and I2P, with "
-"Docker in place to manage the service itself. Gitlab is very easy to host"
-" on I2P in this fashion, it can be administered by one person without "
-"much difficulty. In my configuration, I use a Debian VM to host docker "
-"containers and an I2P router, on a Debian Host system, however, this may "
-"be more than necessary for some people. These instructions should work on"
-" any Debian-based system, regardless of whether it is in a VM or not, and"
-" should easily translate to any system where Docker and an I2P router are"
-" available. This guide starts at Docker and does not assume any VM "
-"underneath."
+"This is the setup process I use for configuring Gitlab and I2P, with Docker "
+"in place to manage the service itself. Gitlab is very easy to host on I2P in"
+" this fashion, it can be administered by one person without much difficulty."
+" In my configuration, I use a Debian VM to host docker containers and an I2P"
+" router, on a Debian Host system, however, this may be more than necessary "
+"for some people. These instructions should work on any Debian-based system, "
+"regardless of whether it is in a VM or not, and should easily translate to "
+"any system where Docker and an I2P router are available. This guide starts "
+"at Docker and does not assume any VM underneath."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:11
@@ -5098,15 +4693,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:12
 msgid ""
-"Because Gitlab runs in a container, we only need to install the "
-"dependencies required for the container on our main system. Conveniently,"
-" you can install everything you need with:"
+"Because Gitlab runs in a container, we only need to install the dependencies"
+" required for the container on our main system. Conveniently, you can "
+"install everything you need with:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:14
 msgid ""
-"on an otherwise unmodified Debian system, or if you have added Docker’s "
-"own “Community” Debian repository, you may use:"
+"on an otherwise unmodified Debian system, or if you have added Docker’s own "
+"“Community” Debian repository, you may use:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:16
@@ -5119,62 +4714,61 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:18
 msgid ""
-"Once you have docker installed, you can fetch the docker containers "
-"required for gitlab. <em>Don’t run them yet.</em>"
+"Once you have docker installed, you can fetch the docker containers required"
+" for gitlab. <em>Don’t run them yet.</em>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:20
 msgid ""
-"For those who are concerned, the gitlab-ce Docker image is built using "
-"only Ubuntu Docker images as a parent, which are built from scratch "
-"images. Since there are no third-party images involved here, updates "
-"should come as soon as they are available in the host images. To review "
-"the Dockerfile for yourself, visit the <a href=\"https://gitlab.com"
-"/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile\">Gitlab "
-"source code</a>."
+"For those who are concerned, the gitlab-ce Docker image is built using only "
+"Ubuntu Docker images as a parent, which are built from scratch images. Since"
+" there are no third-party images involved here, updates should come as soon "
+"as they are available in the host images. To review the Dockerfile for "
+"yourself, visit the <a href=\"https://gitlab.com/gitlab-org/omnibus-"
+"gitlab/-/blob/master/docker/Dockerfile\">Gitlab source code</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:21
 msgid ""
-"Set up an I2P HTTP Proxy for Gitlab to use(Important information, "
-"optional steps)"
+"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional "
+"steps)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:22
 msgid ""
 "Gitlab servers inside of I2P can be run with or without the ability to "
-"interact with servers on the internet outside of I2P. In the case where "
-"the Gitlab server is <em>not allowed</em> to interact with servers "
-"outside of I2P, they cannot be de-anonymized by cloning a git repository "
-"from a git server on the internet outside of I2P. They can, however, "
-"export and mirror repositories from other git services inside of I2P."
+"interact with servers on the internet outside of I2P. In the case where the "
+"Gitlab server is <em>not allowed</em> to interact with servers outside of "
+"I2P, they cannot be de-anonymized by cloning a git repository from a git "
+"server on the internet outside of I2P. They can, however, export and mirror "
+"repositories from other git services inside of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:23
 msgid ""
 "In the case where the Gitlab server is <em>allowed</em> to interact with "
-"servers outside of I2P, it can act as a “Bridge” for the users, who can "
-"use it to mirror content outside I2P to an I2P-accessible source, however"
-" it <em>is not anonymous</em> in this case. Git services on the non-"
-"anonymous internet will be connected to directly."
+"servers outside of I2P, it can act as a “Bridge” for the users, who can use "
+"it to mirror content outside I2P to an I2P-accessible source, however it "
+"<em>is not anonymous</em> in this case. Git services on the non-anonymous "
+"internet will be connected to directly."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:24
 msgid ""
-"<strong>If you want to have a bridged, non-anonymous Gitlab instance with"
-" access to</strong> <strong>web repositories,</strong> no further "
+"<strong>If you want to have a bridged, non-anonymous Gitlab instance with "
+"access to</strong> <strong>web repositories,</strong> no further "
 "modification is necessary."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:25
 msgid ""
-"<strong>If you want to have an I2P-Only Gitlab instance with no access to"
-" Web-Only</strong> <strong>Repositories</strong>, you will need to "
-"configure Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP "
-"proxy only listens on <code>127.0.0.1</code>, you will need to set up a "
-"new one for Docker that listens on the Host/Gateway address of the Docker"
-" network, which is usually <code>172.17.0.1</code>. I configure mine on "
-"port <code>4446</code>."
+"<strong>If you want to have an I2P-Only Gitlab instance with no access to "
+"Web-Only</strong> <strong>Repositories</strong>, you will need to configure "
+"Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP proxy only "
+"listens on <code>127.0.0.1</code>, you will need to set up a new one for "
+"Docker that listens on the Host/Gateway address of the Docker network, which"
+" is usually <code>172.17.0.1</code>. I configure mine on port "
+"<code>4446</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:26
@@ -5190,8 +4784,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/gitlab.html:37
 msgid ""
 "Visit your Local Gitlab instance and set up your admin account. Choose a "
-"strong password, and configure user account limits to match your "
-"resources."
+"strong password, and configure user account limits to match your resources."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:38
@@ -5202,21 +4795,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:39
 msgid ""
-"It’s also possible to apply your HTTP Proxy settings in a more granular "
-"way, so that you can only allow users to mirror repositories from the "
-"domains that you choose. Since the domain is presumably operated by an "
-"organization, you can use this to ensure that repositories that are "
-"mirrorable follow a reasonable set of policies. After all, there is far "
-"more abusive content on the non-anonymous internet than there is on I2P, "
-"we wouldn’t want to make it too easy to introduce abusive content from "
-"such a nefarious place."
+"It’s also possible to apply your HTTP Proxy settings in a more granular way,"
+" so that you can only allow users to mirror repositories from the domains "
+"that you choose. Since the domain is presumably operated by an organization,"
+" you can use this to ensure that repositories that are mirrorable follow a "
+"reasonable set of policies. After all, there is far more abusive content on "
+"the non-anonymous internet than there is on I2P, we wouldn’t want to make it"
+" too easy to introduce abusive content from such a nefarious place."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:40
 msgid ""
-"Add the following lines to your gitlab.rb file inside the "
-"/src/gitlab/config container. These settings will take effect when you "
-"restart in a moment."
+"Add the following lines to your gitlab.rb file inside the /src/gitlab/config"
+" container. These settings will take effect when you restart in a moment."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:56
@@ -5225,10 +4816,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:57
 msgid ""
-"Once you have Gitlab set up locally, go to the I2P Router console. You "
-"will need to set up two server tunnels, one leading to the Gitlab "
-"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH interface"
-" on TCP Port 8022."
+"Once you have Gitlab set up locally, go to the I2P Router console. You will "
+"need to set up two server tunnels, one leading to the Gitlab web(HTTP) "
+"interface on TCP port 8080, and one to the Gitlab SSH interface on TCP Port "
+"8022."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:58
@@ -5239,8 +4830,7 @@ msgstr ""
 msgid ""
 "For the Web interface, use an “HTTP” server tunnel. From <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" launch the “New Tunnel Wizard” and enter the following values at each "
-"step:"
+" launch the “New Tunnel Wizard” and enter the following values at each step:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:61
@@ -5258,8 +4848,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:64
 msgid ""
-"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the"
-" port."
+"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the "
+"port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:65
@@ -5278,19 +4868,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:69
 msgid ""
-"Web services on I2P can register hostnames for themselves by providing an"
-" authentication string to a jump service provider like <a "
+"Web services on I2P can register hostnames for themselves by providing an "
+"authentication string to a jump service provider like <a "
 "href=\"http://stats.i2p\">stats.i2p</a>. To do this, open the <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" again and click on the “Gitlab Web Service” item you just set up. Scroll"
-" to the bottom of the “Edit Server Settings” section and click "
-"Registration Authentication. Copy the field that says “Authentication for"
-" adding Hostname” and visit <a "
+" again and click on the “Gitlab Web Service” item you just set up. Scroll to"
+" the bottom of the “Edit Server Settings” section and click Registration "
+"Authentication. Copy the field that says “Authentication for adding "
+"Hostname” and visit <a "
 "href=\"http://stats.i2p/i2p/addkey.html\">stats.i2p</a> to add your "
-"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then"
-" you will have to use the correct authentication string for your "
-"subdomain, which is a little bit more complicated and merits it’s own "
-"instructions."
+"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then "
+"you will have to use the correct authentication string for your subdomain, "
+"which is a little bit more complicated and merits it’s own instructions."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:70
@@ -5301,8 +4890,7 @@ msgstr ""
 msgid ""
 "For the SSH interface, use a “Standard” server tunnel. From <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" launch the “New Tunnel Wizard” and enter the following values at each "
-"step:"
+" launch the “New Tunnel Wizard” and enter the following values at each step:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:74
@@ -5315,8 +4903,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:76
 msgid ""
-"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the"
-" port."
+"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the "
+"port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:80
@@ -5325,9 +4913,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:81
 msgid ""
-"Finally, if you either modified <code>gitlab.rb</code> or you registered "
-"a hostname, you will need to re-start the gitlab service for the settings"
-" to take effect."
+"Finally, if you either modified <code>gitlab.rb</code> or you registered a "
+"hostname, you will need to re-start the gitlab service for the settings to "
+"take effect."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:2
@@ -5345,20 +4933,16 @@ msgstr "Client"
 #: i2p2www/pages/site/docs/applications/irc.html:15
 msgid ""
 " There are many IRC clients that can be used with I2P. In\n"
-"fact, all IRC clients can be connected to the Irc2P Service by connecting"
-"\n"
+"fact, all IRC clients can be connected to the Irc2P Service by connecting\n"
 "them to the IRC Tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:28
 msgid ""
 "To configure any IRC client to chat on Irc2P, first, make sure that\n"
-"your IRC tunnel is available. Visit the <a "
-"href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n"
-"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" "
-"indicator on\n"
-"the right-hand side is yellow or green, your Irc2P tunnel is ready and "
-"you should \n"
+"your IRC tunnel is available. Visit the <a href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n"
+"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" indicator on\n"
+"the right-hand side is yellow or green, your Irc2P tunnel is ready and you should \n"
 "proceed to the next step."
 msgstr ""
 
@@ -5375,12 +4959,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:42
 msgid ""
 "Pidgin is a very popular Instant Messaging client with built-in IRC\n"
-"support. It is also possible to use it with many other kinds of chat "
-"service, and\n"
-"it supports using multiple accounts at once and has a variety of plugin-"
-"ins. There\n"
-"is a similar application for OSX called \"Adium.\" The instructions for "
-"Pidgin are\n"
+"support. It is also possible to use it with many other kinds of chat service, and\n"
+"it supports using multiple accounts at once and has a variety of plugin-ins. There\n"
+"is a similar application for OSX called \"Adium.\" The instructions for Pidgin are\n"
 "similar in Adium.\n"
 msgstr ""
 
@@ -5396,8 +4977,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:52
 msgid ""
 "After launching Pidgin, you should see a \"Buddy List\" window. From\n"
-"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage"
-" Accounts\" to\n"
+"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage Accounts\" to\n"
 "begin configuring your I2P account."
 msgstr ""
 
@@ -5412,10 +4992,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:59
 msgid ""
 "Click the \"Add\" button. In the window that opens, select \"IRC\" under\n"
-"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and"
-" password. IRC\n"
-"does not require you to register a nickname to join, but you may if you "
-"wish, after\n"
+"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and password. IRC\n"
+"does not require you to register a nickname to join, but you may if you wish, after\n"
 "you connect to Irc2P."
 msgstr ""
 
@@ -5430,8 +5008,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:67
 msgid ""
 "Navigate to the \"Advanced\" tab and set the \"Port\" field to 6668 and\n"
-"make sure that SSL is <em>disabled</em>, since your tunnel has encryption"
-" provided\n"
+"make sure that SSL is <em>disabled</em>, since your tunnel has encryption provided\n"
 "by I2P."
 msgstr ""
 
@@ -5475,8 +5052,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:87
 msgid ""
 "Change the value in \"Servers\" from the default to `localhost/6669`,\n"
-"and configure the default channels you want to join. I suggest #i2p and "
-"#i2p-dev\n"
+"and configure the default channels you want to join. I suggest #i2p and #i2p-dev\n"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:92
@@ -5576,8 +5152,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:143
 msgid ""
 "Revolution IRC is an easy to use IRC client for Android. It's able to\n"
-"handle multiple accounts on multiple services, so you can use it for "
-"Irc2P and for\n"
+"handle multiple accounts on multiple services, so you can use it for Irc2P and for\n"
 "your non-I2P IRC networks as well."
 msgstr ""
 
@@ -5638,15 +5213,13 @@ msgstr "Servers"
 #: i2p2www/pages/site/docs/applications/irc.html:196
 msgid ""
 "Eris is an easy-to-configure IRC server with self-configuring support\n"
-"for I2P. If you want to run a private IRC server it's one of the easiest "
-"ways."
+"for I2P. If you want to run a private IRC server it's one of the easiest ways."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:199
 msgid ""
 " This is a valid configuration of the Eris IRC server, but it uses a\n"
-"default password for the admin account(admin). You should change the "
-"operator.admin.password\n"
+"default password for the admin account(admin). You should change the operator.admin.password\n"
 "and account.admin.password before deploying to a real service."
 msgstr ""
 
@@ -5671,24 +5244,18 @@ msgstr ""
 msgid ""
 "As of release 0.9.4, the router supports managed clients.\n"
 "Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives "
-"updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state "
-"tracking\n"
-"and to start and stop a client. It also is much easier to avoid static "
-"references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state tracking\n"
+"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
 "which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router "
-"console,\n"
+"Managed clients may be started and stopped by the user in the router console,\n"
 "and are stopped at router shutdown."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:31
 msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or "
-"net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following "
-"constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following constructor:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:38
@@ -5707,12 +5274,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:49
 msgid ""
-"If the main class specified in the clients.config file does not implement"
-" a managed interface,\n"
+"If the main class specified in the clients.config file does not implement a managed interface,\n"
 "it will be started with main() with the arguments specified,\n"
 "and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via "
-"the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via the static main() method.\n"
 "The console cannot provide accurate state information to the user."
 msgstr ""
 
@@ -5722,8 +5287,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:58
 msgid ""
-"Clients, whether managed or unmanaged, may register with the "
-"ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
 "so that other clients may retrieve a reference to them.\n"
 "Registration is by name.\n"
 "Known registered clients are:"
@@ -5735,675 +5299,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:69
 msgid ""
-"The router also provides a simple mechanism for clients to find an "
-"internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an internal socket service,\n"
 "such as the HTTP proxy. This is provided by the Port Mapper.\n"
 "Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on "
-"that port."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:2
-msgid "Supported Applications"
-msgstr "Applicazioni Supportate"
-
-#: i2p2www/pages/site/docs/applications/supported.html:5
-#: i2p2www/pages/site/docs/applications/supported.html:188
-msgid "Blogging, Forums, and Wikis"
-msgstr "Blog, Forum e Wiki"
-
-#: i2p2www/pages/site/docs/applications/supported.html:7
-#: i2p2www/pages/site/docs/applications/supported.html:234
-msgid "Decentralized File Storage"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:10
-#: i2p2www/pages/site/docs/applications/supported.html:246
-msgid "Development Tools"
-msgstr "Strumenti di Sviluppo"
-
-#: i2p2www/pages/site/docs/applications/supported.html:13
-#: i2p2www/pages/site/docs/applications/supported.html:248
-msgid "Version control"
-msgstr "Controllo versione"
-
-#: i2p2www/pages/site/docs/applications/supported.html:17
-#: i2p2www/pages/site/docs/applications/supported.html:267
-msgid "Domain Naming"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:19
-#: i2p2www/pages/site/docs/applications/supported.html:285
-msgid "Email"
-msgstr "Email"
-
-#: i2p2www/pages/site/docs/applications/supported.html:22
-#: i2p2www/pages/site/docs/applications/supported.html:330
-msgid "File Sharing"
-msgstr "File sharing"
-
-#: i2p2www/pages/site/docs/applications/supported.html:25
-#: i2p2www/pages/site/docs/applications/supported.html:332
-msgid "BitTorrent clients"
-msgstr "Client BitTorrent"
-
-#: i2p2www/pages/site/docs/applications/supported.html:27
-#: i2p2www/pages/site/docs/applications/supported.html:375
-msgid "BitTorrent trackers and indexers"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:36
-#: i2p2www/pages/site/docs/applications/supported.html:442
-msgid "Network Administration"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:39
-#: i2p2www/pages/site/docs/applications/supported.html:444
-msgid "General-purpose socket utilities"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:46
-#: i2p2www/pages/site/docs/applications/supported.html:485
-msgid "Real-time Chat"
-msgstr "Chat in tempo reale"
-
-#: i2p2www/pages/site/docs/applications/supported.html:49
-#: i2p2www/pages/site/docs/applications/supported.html:487
-msgid "Instant messaging clients"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:51
-#: i2p2www/pages/site/docs/applications/supported.html:497
-msgid "IRC clients"
-msgstr "Client IRC"
-
-#: i2p2www/pages/site/docs/applications/supported.html:53
-#: i2p2www/pages/site/docs/applications/supported.html:548
-msgid "IRC servers"
-msgstr "Server IRC"
-
-#: i2p2www/pages/site/docs/applications/supported.html:58
-#: i2p2www/pages/site/docs/applications/supported.html:564
-msgid "Web Browsing"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:61
-#: i2p2www/pages/site/docs/applications/supported.html:566
-msgid "Anonymous websites"
-msgstr "Siti anonimi"
-
-#: i2p2www/pages/site/docs/applications/supported.html:63
-#: i2p2www/pages/site/docs/applications/supported.html:615
-msgid "Proxy software"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:65
-#: i2p2www/pages/site/docs/applications/supported.html:640
-msgid "Inproxies"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:67
-#: i2p2www/pages/site/docs/applications/supported.html:681
-msgid "Outproxies"
-msgstr "Outproxy"
-
-#: i2p2www/pages/site/docs/applications/supported.html:72
-#: i2p2www/pages/site/docs/applications/supported.html:695
-msgid "Website Hosting"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:75
-#: i2p2www/pages/site/docs/applications/supported.html:710
-msgid "Web servers"
-msgstr "Web server"
-
-#: i2p2www/pages/site/docs/applications/supported.html:82
-#, python-format
-msgid ""
-"This is intended to be a comprehensive listing of applications used with\n"
-"I2P. If you know of something that's missing please submit a ticket on\n"
-"<a href=\"%(trac)s\">Trac</a>, and be sure to select the\n"
-"“www” component in the submission form."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:89
-msgid ""
-"\n"
-"Supported applications are tagged with one or more of the following:"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:94
-#: i2p2www/pages/site/docs/applications/supported.html:281
-#: i2p2www/pages/site/docs/applications/supported.html:313
-#: i2p2www/pages/site/docs/applications/supported.html:338
-#: i2p2www/pages/site/docs/applications/supported.html:707
-msgid "bundled"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:97
-msgid ""
-"<em>Bundled application</em> — I2P ships with a few officially\n"
-"supported applications that let new users take immediate advantage of\n"
-"some of I2P's more useful capabilities."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:105
-#: i2p2www/pages/site/docs/applications/supported.html:197
-#: i2p2www/pages/site/docs/applications/supported.html:210
-#: i2p2www/pages/site/docs/applications/supported.html:222
-#: i2p2www/pages/site/docs/applications/supported.html:230
-#: i2p2www/pages/site/docs/applications/supported.html:243
-#: i2p2www/pages/site/docs/applications/supported.html:294
-#: i2p2www/pages/site/docs/applications/supported.html:407
-#: i2p2www/pages/site/docs/applications/supported.html:429
-#: i2p2www/pages/site/docs/applications/supported.html:438
-#: i2p2www/pages/site/docs/applications/supported.html:526
-msgid "plugin"
-msgstr "plugin"
-
-#: i2p2www/pages/site/docs/applications/supported.html:108
-#, python-format
-msgid ""
-"<em>Third-party plugin</em> — I2P's plugin system provides convenient\n"
-"deployment of I2P-enabled applications and allows tighter integration\n"
-"with the router. Plugins are [reviewed by the community](<a href=\n"
-"\"http://%(plugins)s\">http://%(plugins)s</a>) to identify security and\n"
-"anonymity issues."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:119
-#: i2p2www/pages/site/docs/applications/supported.html:222
-#: i2p2www/pages/site/docs/applications/supported.html:230
-#: i2p2www/pages/site/docs/applications/supported.html:243
-#: i2p2www/pages/site/docs/applications/supported.html:254
-#: i2p2www/pages/site/docs/applications/supported.html:263
-#: i2p2www/pages/site/docs/applications/supported.html:326
-#: i2p2www/pages/site/docs/applications/supported.html:345
-#: i2p2www/pages/site/docs/applications/supported.html:356
-#: i2p2www/pages/site/docs/applications/supported.html:371
-#: i2p2www/pages/site/docs/applications/supported.html:417
-#: i2p2www/pages/site/docs/applications/supported.html:429
-#: i2p2www/pages/site/docs/applications/supported.html:438
-#: i2p2www/pages/site/docs/applications/supported.html:453
-#: i2p2www/pages/site/docs/applications/supported.html:459
-#: i2p2www/pages/site/docs/applications/supported.html:465
-#: i2p2www/pages/site/docs/applications/supported.html:475
-#: i2p2www/pages/site/docs/applications/supported.html:481
-#: i2p2www/pages/site/docs/applications/supported.html:493
-#: i2p2www/pages/site/docs/applications/supported.html:526
-#: i2p2www/pages/site/docs/applications/supported.html:532
-#: i2p2www/pages/site/docs/applications/supported.html:538
-#: i2p2www/pages/site/docs/applications/supported.html:544
-#: i2p2www/pages/site/docs/applications/supported.html:621
-#: i2p2www/pages/site/docs/applications/supported.html:630
-#: i2p2www/pages/site/docs/applications/supported.html:636
-#: i2p2www/pages/site/docs/applications/supported.html:707
-#: i2p2www/pages/site/docs/applications/supported.html:722
-#: i2p2www/pages/site/docs/applications/supported.html:728
-#: i2p2www/pages/site/docs/applications/supported.html:734
-#: i2p2www/pages/site/docs/applications/supported.html:740
-msgid "standalone"
-msgstr "standalone"
-
-#: i2p2www/pages/site/docs/applications/supported.html:119
-#: i2p2www/pages/site/docs/applications/supported.html:197
-#: i2p2www/pages/site/docs/applications/supported.html:204
-#: i2p2www/pages/site/docs/applications/supported.html:210
-#: i2p2www/pages/site/docs/applications/supported.html:216
-#: i2p2www/pages/site/docs/applications/supported.html:365
-#: i2p2www/pages/site/docs/applications/supported.html:389
-#: i2p2www/pages/site/docs/applications/supported.html:398
-#: i2p2www/pages/site/docs/applications/supported.html:554
-#: i2p2www/pages/site/docs/applications/supported.html:560
-msgid "standalone/mod"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:122
-msgid ""
-"<em>Third-party standalone application</em> — Many standard network\n"
-"applications only require careful setup and configuration to communicate\n"
-"anonymously over I2P. These are tagged with <em>standalone</em>. Some\n"
-"applications, tagged with <em>standalone/mod</em>, require patching to\n"
-"function properly over I2P or to prevent inadvertent disclosure of\n"
-"identifying information such as the user's hostname or external IP\n"
-"address."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:135
-#: i2p2www/pages/site/docs/applications/supported.html:304
-#: i2p2www/pages/site/docs/applications/supported.html:574
-#: i2p2www/pages/site/docs/applications/supported.html:584
-#: i2p2www/pages/site/docs/applications/supported.html:593
-#: i2p2www/pages/site/docs/applications/supported.html:599
-#: i2p2www/pages/site/docs/applications/supported.html:605
-#: i2p2www/pages/site/docs/applications/supported.html:611
-#: i2p2www/pages/site/docs/applications/supported.html:653
-#: i2p2www/pages/site/docs/applications/supported.html:661
-#: i2p2www/pages/site/docs/applications/supported.html:670
-#: i2p2www/pages/site/docs/applications/supported.html:677
-#: i2p2www/pages/site/docs/applications/supported.html:691
-msgid "service"
-msgstr "servizio"
-
-#: i2p2www/pages/site/docs/applications/supported.html:138
-msgid ""
-"<em>Third-party essential network service</em> — Services which on\n"
-"the I2P network are analogous to those provided on the public Internet\n"
-"by hosting providers, ISPs, and Google: eepsite indexes and jump\n"
-"services, search engines, email, DNS-style name services, hosting,\n"
-"proxies, etc. These services focus on boosting the usefulness of the\n"
-"network as a whole, and making network content more discoverable."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:150
-#: i2p2www/pages/site/docs/applications/supported.html:222
-msgid "unmaintained"
-msgstr "non mantenuto"
-
-#: i2p2www/pages/site/docs/applications/supported.html:153
-msgid ""
-"<em>Unmaintained</em> — This is used to tag plugins, applications,\n"
-"and services which appear to be unmaintained and may be removed from\n"
-"this listing in the future."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:161
-#, python-format
-msgid ""
-"Warning: Using an application, plugin, or service with I2P\n"
-"doesn't automatically protect your anonymity. I2P is merely a set of "
-"tools\n"
-"which can help you mitigate certain <a "
-"href=\"%(threatmodel)s\">identified\n"
-"threats to anonymity</a>. We do not and cannot make any guarantees about "
-"the\n"
-"safety of the applications, plugins, and services listed below. Most\n"
-"applications and plugins must be properly configured, and some will need "
-"to\n"
-"be patched — and even then your anonymity might not be assured. "
-"Similarly,\n"
-"services could put your anonymity at risk, either by design or through\n"
-"carelessness on their part or your own."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:173
-msgid ""
-"If you have doubts about the suitability of an application,\n"
-"plugin, or service for use with I2P, you are urged to inquire about "
-"privacy\n"
-"issues with its maintainers, to search its mailing lists and bug tracker "
-"if\n"
-"one exists, and consult trusted, knowledgeable members of the I2P\n"
-"community."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:181
-msgid ""
-"Take responsibility for your own anonymity and safety — always\n"
-"seek expert advice, educate yourself, practice good judgment, be mindful "
-"of\n"
-"disclosing personally identifying information, and don't take\n"
-"shortcuts."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:203
-msgid "Lightweight forum software."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:209
-msgid "Another lightweight blogging platform."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:215
-msgid "Most popular open source forum software."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:221
-msgid "Distributed forums software, originally developed by jrandom."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:226
-#, python-format
-msgid ""
-"A Java-based MediaWiki clone. No external database needed.\n"
-"Plugin available <a href=\"http://%(plugins)s/plugins/jamwiki\">here</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:238
-#, python-format
-msgid ""
-"Port of the <a href=\"http://tahoe-lafs.org/\"><strong>Tahoe-"
-"LAFS</strong></a>\n"
-"distributed file system to the I2P network. Controller plugin <a href=\n"
-"\"http://%(stats)s/i2p/plugins/\">here</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:253
-msgid "Most popular distributed version control system."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:259
-#, python-format
-msgid ""
-"Another distributed version control system. Currently\n"
-"<a href=\"%(monotone)s\">used in I2P development</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:271
-#, python-format
-msgid ""
-"Provides management of addressbooks, which are part of a simple,\n"
-"user-controlled <a href=\"%(naming)s\">I2P naming system</a> somewhat\n"
-"analogous to the Internet's Domain Name System (DNS). Addressbooks map\n"
-"Base64 destinations to short, usually human-readable “domain” names "
-"ending\n"
-"with a .i2p suffix which the I2P router's HTTP client can resolve back to"
-"\n"
-"Base64 addresses. (<em>Note:</em> While Base64 destinations are globally\n"
-"unique, addressbook “domain” names only resolve to unique destinations\n"
-"locally.)"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:290
-msgid ""
-"Serverless peer-to-peer email application using a distributed hash table\n"
-"(DHT) for secure mail storage."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:299
-msgid ""
-"Provides email service within the I2P network via @mail.i2p addresses,\n"
-"and email gateway service between the I2P network and the public Internet"
-"\n"
-"via @i2pmail.org addresses. One of the oldest continuous services on I2P."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:309
-msgid ""
-"Simple web browser-based email interface. Configured to use Postman's\n"
-"email service by default."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:318
-#, python-format
-msgid ""
-"Can be configured to use Postman's email service. See\n"
-"<a href=\"%(reviews)s\">this comparison of MUAs</a>,\n"
-"and configuration settings for\n"
-"<a href=\"%(smtp)s\">SMTP</a> and <a href=\"%(pop3)s\">POP3</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:337
-msgid "I2P's integrated BitTorrent client."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:343
-msgid ""
-"Modified version of I2PSnark, no more supported neither\n"
-"    functional."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:350
-msgid ""
-"\n"
-"A fork of rufus that uses the Basic Open Bridge (BOB) and has many\n"
-"improvements, including using the latest wxwidgets and python. It also\n"
-"supports use of seedless if installed for trackerless torrents and\n"
-"magnet-link like fetching of torrents within I2P.\n"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:361
-msgid ""
-"Clean, full-featured cross-platform BitTorrent client with official\n"
-"ports for several GUI toolkits."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:370
-msgid "Has a plugin providing I2P support."
-msgstr "Supporta I2P tramite un plugin."
-
-#: i2p2www/pages/site/docs/applications/supported.html:377
-#, python-format
-msgid ""
-"For a detailed feature comparison of I2P-enabled trackers/indexers, see\n"
-"<a href=\"http://%(zzz)s/files/trackers.html\">here</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:385
-msgid ""
-"The code that powered one of the first major tracker/indexer sites on the"
-"\n"
-"Internet. Patched for I2P."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:394
-#, python-format
-msgid ""
-"Lightweight tracker/indexer. I2P mod available in the i2p.opentracker\n"
-"branch of the <a href=\"%(newdevs)s\">I2P Monotone repository</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:403
-#, python-format
-msgid ""
-"<a href=\"http://%(zzz)s/\">zzz's</a> Java-based open tracker. More info\n"
-"<a href=\"http://%(zzz)s/topics/598?page=1#p2085\">here</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:416
-msgid "I2P port of the aMule ED2K client."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:425
-#, python-format
-msgid ""
-"Port of the <a href=\"http://www.phex.org/mambo/\">Phex</a> Gnutella "
-"client. Website\n"
-"for plugin version <a href=\"http://%(stats)s/i2p/plugins/\">here</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:434
-#, python-format
-msgid ""
-"Cache for Gnutella peers on I2P. Website for plugin version\n"
-"<a href=\"http://%(stats)s/i2p/plugins/\">here</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:449
-msgid ""
-"OpenBSD's rewrite of the Unix standard tool, netcat, for socket relaying."
-"\n"
-"Several clones, ports, and forks have appeared over the years."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:458
-msgid "Like netcat but more powerful."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:464
-msgid ""
-"Proxy providing simple, transparent SOCKS-ification of network "
-"applications."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:474
-msgid ""
-"Most popular implementation of the Secure Shell (SSH) protocol and "
-"related tools."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:480
-msgid "Open source Secure Shell (SSH) client for Windows."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:492
-msgid "IM client with multiple incarnations, unsuported."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:499
-msgid ""
-"Many IRC clients leak identifying information to servers or other\n"
-"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound"
-"\n"
-"and outbound messages to scrub data such as LAN IP addresses, external IP"
-"\n"
-"addresses, local hostnames, and the name and version of the IRC client. "
-"Two\n"
-"message types in particular, DCC and CTCP, can't be sufficiently "
-"anonymized\n"
-"without changes to the protocols or to IRC client/server code, so they "
-"are\n"
-"completely blocked, except for CTCP ACTION (the message emitted by the\n"
-"<code>/me</code> command) which isn't inherently dangerous."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:510
-msgid ""
-"I2P's IRC filtering may not cover every possible leak — users should also"
-"\n"
-"check if their client is sending their real name or local username. "
-"Packet\n"
-"sniffers such as <a href=\"http://www.wireshark.org/\">Wireshark</a> are\n"
-"useful here. Eliminating remaining leaks may be as simple as changing the"
-"\n"
-"client's default configuration. If that doesn't help, inform the I2P\n"
-"developers; they may be able to solve it via additional filtering."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:522
-#, python-format
-msgid ""
-"Small Java-based IRC client. Plugin available <a href=\n"
-"\"http://%(stats)s/i2p/plugins/\">here</a>."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:531
-msgid "Cross-platform graphical IRC client based on XChat."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:537
-msgid "Unixy terminal-based IRC client."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:543
-msgid "Another Unixy terminal-based IRC client."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:553
-msgid "IRC server developed from scratch."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:559
-msgid "Most popular IRC server."
-msgstr "Un server IRC molto diffuso."
-
-#: i2p2www/pages/site/docs/applications/supported.html:571
-msgid ""
-"Any website hosted anonymously on I2P, reachable through the I2P router's"
-" HTTP proxy."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:579
-msgid ""
-"Distributed anonymous websites hosted\n"
-"using Tahoe-LAFS-I2P, currently only reachable with Tahoe-LAFS-I2P\n"
-"clients or through the Tahoe-LAFS-I2P HTTP proxy."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:589
-#, python-format
-msgid ""
-"Website for <a href=\"http://%(sponge)s/\">sponge's</a> jump service.\n"
-"Source code available."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:598
-msgid "Another jump service."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:604
-msgid "Dynamically updated eepsite index."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:610
-#, python-format
-msgid "Website for <a href=\"http://%(zzz)s/\">zzz's</a> jump service."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:620
-msgid "SOCKS-enabled caching web proxy with basic filtering capabilities."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:626
-msgid ""
-"Privacy-focused non-caching web proxy with advanced filtering\n"
-"capabilities. Excels at removing ads and other junk."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:635
-msgid "Venerable caching web proxy."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:642
-msgid "Gateways allowing users on the public Internet to access eepsites."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:649
-#, python-format
-msgid ""
-"<a href=\"http://%(tino)s/\">tino's</a> inproxy on the public Internet,\n"
-"currently out of service,"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:658
-#: i2p2www/pages/site/docs/applications/supported.html:667
-#: i2p2www/pages/site/docs/applications/supported.html:674
-msgid "Another inproxy on the public Internet."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:683
-msgid ""
-"Gateways allowing I2P users to access content hosted on the public "
-"Internet."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:690
-msgid "Publicly advertised outproxy running Squid, located in Europe."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:700
-msgid ""
-"Lightweight web server and Java servlet container. I2P is tightly\n"
-"integrated with a bundled copy of Jetty which by default is configured to"
-"\n"
-"host the <a href=\"http://127.0.0.1:7658/\">user's eepsite</a>. The "
-"bundled\n"
-"Jetty also serves the I2P router console and web applications bundled "
-"with\n"
-"I2P."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:712
-msgid ""
-"In addition to Jetty, any web server should function over I2P without\n"
-"modification so long as it's HTTP-compliant. Some web servers known to\n"
-"currently serve content on the I2P network are:"
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:721
-msgid "Most popular web server on the public WWW."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:727
-msgid "Web server and Java servlet container. More features than Jetty."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:733
-msgid "Fast lightweight web server."
-msgstr ""
-
-#: i2p2www/pages/site/docs/applications/supported.html:739
-msgid "High-performance lightweight web server."
+"Clients that register generally provide an internal emulated socket on that port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:2
@@ -6413,8 +5312,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:4
 #, python-format
 msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming "
-"system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
 "common arguments and possible alternatives.\n"
 "See <a href=\"%(naming)s\">the naming page</a> for current documentation."
 msgstr ""
@@ -6425,72 +5323,49 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:12
 msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning "
-"with\n"
-"advocates across the spectrum of possibilities.  However, given I2P's "
-"inherent\n"
-"demand for secure communication and decentralized operation, the "
-"traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting "
-"systems."
+"Naming within I2P has been an oft-debated topic since the very beginning with\n"
+"advocates across the spectrum of possibilities.  However, given I2P's inherent\n"
+"demand for secure communication and decentralized operation, the traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:19
 msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage "
-"done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no"
-"\n"
-"value.  DNSsec itself still falls back on registrars and certificate "
-"authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or "
-"the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a "
-"destination\n"
-"itself is just a pair of public keys and a certificate.  DNS-style "
-"systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount "
-"simple denial\n"
-"of service and spoofing attacks.  Adding on a certificate authenticating "
-"the\n"
-"responses as signed by some centralized certificate authority would "
-"address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well"
-" as \n"
+"I2P does not promote the use of DNS-like services though, as the damage done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no\n"
+"value.  DNSsec itself still falls back on registrars and certificate authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
+"itself is just a pair of public keys and a certificate.  DNS-style systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount simple denial\n"
+"of service and spoofing attacks.  Adding on a certificate authenticating the\n"
+"responses as signed by some centralized certificate authority would address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well as \n"
 "hostile certificate authority attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:33
 msgid ""
-"Voting style naming is dangerous as well, especially given the "
-"effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an "
-"arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name.  "
-"Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows "
-"the load\n"
-"required to contact everyone to conduct online voting is implausible, or "
-"if the\n"
+"Voting style naming is dangerous as well, especially given the effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name.  Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows the load\n"
+"required to contact everyone to conduct online voting is implausible, or if the\n"
 "full network is not queried, different sets of answers may be reachable."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:42
 msgid ""
-"As with the Internet however, I2P is keeping the design and operation of "
-"a \n"
-"naming system out of the (IP-like) communication layer.  The bundled "
-"naming library\n"
-"includes a simple service provider interface which <a "
-"href=\"#alternatives\">alternate naming systems</a> can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they"
-" prefer."
+"As with the Internet however, I2P is keeping the design and operation of a \n"
+"naming system out of the (IP-like) communication layer.  The bundled naming library\n"
+"includes a simple service provider interface which <a href=\"#alternatives\">alternate naming systems</a> can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:50
 msgid ""
-"See also <a href=\"https://zooko.com/distnames.html\">Names: "
-"Decentralized, Secure, Human-Meaningful: Choose Two</a>."
+"See also <a href=\"https://zooko.com/distnames.html\">Names: Decentralized, "
+"Secure, Human-Meaningful: Choose Two</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:55
@@ -6501,36 +5376,26 @@ msgstr ""
 msgid ""
 "Q:\n"
 "What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are"
-" not? \n"
+"do not agree on one address and if some addresses are working, others are not? \n"
 "Who is the right source of a name?"
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:64
 msgid ""
 "A:\n"
-"You don't. This is actually a critical difference between names on I2P "
-"and how \n"
-"DNS works - names in I2P are human readable, secure, but <b>not globally"
-" \n"
-"unique</b>.  This is by design, and an inherent part of our need for "
-"security."
+"You don't. This is actually a critical difference between names on I2P and how \n"
+"DNS works - names in I2P are human readable, secure, but <b>not globally \n"
+"unique</b>.  This is by design, and an inherent part of our need for security."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:70
 msgid ""
-"If I could somehow convince you to change the destination associated with"
-" some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances"
-" is that \n"
-"acceptable.  Instead, what we do is make names <b>locally unique</b>: "
-"they are \n"
-"what <i>you</i> use to call a site, just as how you can call things "
-"whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM "
-"client's \n"
-"buddy list.  Who you call \"Boss\" may be who someone else calls "
-"\"Sally\"."
+"If I could somehow convince you to change the destination associated with some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
+"acceptable.  Instead, what we do is make names <b>locally unique</b>: they are \n"
+"what <i>you</i> use to call a site, just as how you can call things whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM client's \n"
+"buddy list.  Who you call \"Boss\" may be who someone else calls \"Sally\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:78
@@ -6546,44 +5411,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:89
 msgid ""
 "<b>Inefficiency:</b>\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
-"the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
 "It's about 400K right now for almost 800 hosts."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:94
 msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is "
-"itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic "
-"routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it "
-"averages out to about 10 bytes/sec."
+"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:99
 msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here "
-"between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous"
-" because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
 "last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump"
-" services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
 "in a more automated fashion), possibly at a further cost in anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:106
 #, python-format
 msgid ""
-"Possible improvements would be a replacement or supplement to addressbook"
-" (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n"
-"or something simple like subscribing to http://example.i2p/cgi-"
-"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
-"hours, for example,\n"
-"that could be both more efficient and more anonymous than the current "
-"hosts.txt with last-modified and etag."
+"Possible improvements would be a replacement or supplement to address book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n"
+"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
+"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:112
@@ -6593,17 +5447,14 @@ msgid ""
 "<a href=\"%(url)s\">%(url)s</a>.\n"
 "This script returns an Etag with a timestamp.\n"
 "When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not "
-"Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber"
-"\n"
-"does not know about, in an addressbook-compatible manner."
+"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber\n"
+"does not know about, in an address book-compatible manner."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:121
 msgid ""
-"So the inefficiency is not a big issue and there are several ways to "
-"improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to improve things without\n"
 "radical change."
 msgstr ""
 
@@ -6617,37 +5468,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:132
 msgid ""
 "As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for"
-"\n"
-"a key, you need to have the whole set of keys stored locally, at a cost "
-"of about 500 bytes per key."
+"But unless you're going to do a slow real-time query over the network for\n"
+"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:139
 msgid ""
 "<b>Requires configuration and \"trust\":</b>\n"
-"Out-of-the-box addressbook is only subscribed to "
-"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box address book is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
 "leading to poor new-user experience."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:144
 msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a "
-"hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
 "provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of "
-"trust in an anonymous network."
+"The configuration step attempts to force users to think about issues of trust in an anonymous network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:149
 msgid ""
-"As another example, the \"Eepsite Unknown\" error page in the HTTP Proxy\n"
-"lists some jump services, but doesn't \"recommend\" any one in "
-"particular,\n"
+"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy\n"
+"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
 "and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but "
-"not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but not enough to\n"
 "automatically go fetch the key from them."
 msgstr ""
 
@@ -6664,14 +5508,13 @@ msgstr "<b>Non è DNS</b>"
 
 #: i2p2www/pages/site/docs/discussions/naming.html:166
 msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down "
-"web browsing."
+"Unfortunately real-time lookups over i2p would significantly slow down web "
+"browsing."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:169
 msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, "
-"while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
 "keys are permanent."
 msgstr ""
 
@@ -6682,7 +5525,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:178
 msgid ""
 "<b>Not reliable:</b>\n"
-"It depends on specific servers for addressbook subscriptions."
+"It depends on specific servers for address book subscriptions."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:182
@@ -6690,27 +5533,22 @@ msgid ""
 "Yes it depends on a few servers that you have configured.\n"
 "Within i2p, servers and services come and go.\n"
 "Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is "
-"authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" "
-"solution, or by\n"
-"something even simpler, like a script that adds everybody in your "
-"hosts.txt to your addressbook."
+"have the same problem. A completely decentralized system (everybody is authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
+"something even simpler, like a script that adds everybody in your hosts.txt to your address book."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:190
 msgid ""
-"People advocating all-authoritative solutions generally haven't thought "
-"through\n"
+"People advocating all-authoritative solutions generally haven't thought through\n"
 "the issues of conflicts and hijacking, however."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:196
 msgid ""
 "<b>Awkward, not real-time:</b>\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
-" service providers,\n"
-"eepsite status reporters.\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
+"I2P Site status reporters.\n"
 "Jump servers and subscriptions are a pain, it should just work like DNS."
 msgstr ""
 
@@ -6720,8 +5558,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:207
 msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, "
-"or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
 "and proposals to \"just use DNS\" aren't well thought-through."
 msgstr ""
 
@@ -6731,8 +5568,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:213
 msgid ""
-"The I2P source contains several pluggable naming systems and supports "
-"configuration options\n"
+"The I2P source contains several pluggable naming systems and supports configuration options\n"
 "to enable experimentation with naming systems."
 msgstr ""
 
@@ -6754,8 +5590,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:234
 msgid ""
-"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/"
-" directory."
+"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/ "
+"directory."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:237
@@ -6780,8 +5616,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:253
 msgid ""
-"The current naming system can be changed with the advanced config option "
-"'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
 "(restart required).\n"
 "See core/java/src/net/i2p/client/naming for details."
 msgstr ""
@@ -6789,8 +5624,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:258
 msgid ""
 "Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the addressbook subscription functions, "
-"since addressbook\n"
+"implement local storage and/or the address book subscription functions, since address book\n"
 "only knows about the hosts.txt files and format."
 msgstr ""
 
@@ -6800,50 +5634,40 @@ msgstr "Certificati"
 
 #: i2p2www/pages/site/docs/discussions/naming.html:265
 msgid ""
-"I2P destinations contain a certificate, however at the moment that "
-"certificate\n"
+"I2P destinations contain a certificate, however at the moment that certificate\n"
 "is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending "
-"in \"AAAA\",\n"
-"and this is checked in the addressbook merge mechanism, and possibly "
-"other places.\n"
-"Also, there is no method available to generate a certificate or add it to"
-" a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
+"and this is checked in the address book merge mechanism, and possibly other places.\n"
+"Also, there is no method available to generate a certificate or add it to a\n"
 "destination. So these will have to be updated to implement certificates."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:273
 #, python-format
 msgid ""
-"One possible use of certificates is for <a "
-"href=\"%(todo)s#hashcash\">proof of work</a>."
+"One possible use of certificates is for <a href=\"%(todo)s#hashcash\">proof "
+"of work</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:276
 msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such "
-"thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's "
-"keys."
+"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:280
 msgid ""
-"With any certificate implementation must come the method for verifying "
-"the\n"
+"With any certificate implementation must come the method for verifying the\n"
 "certificates.\n"
-"Presumably this would happen in the addressbook merge code.\n"
-"Is there a method for multiple types of certificates, or multiple "
-"certificates?"
+"Presumably this would happen in the address book merge code.\n"
+"Is there a method for multiple types of certificates, or multiple certificates?"
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:286
 msgid ""
 "Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would "
-"address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well"
-" as \n"
+"responses as signed by some centralized certificate authority would address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well as \n"
 "hostile certificate authority attacks."
 msgstr ""
 
@@ -6862,91 +5686,58 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:11
 msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple "
-"combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data "
-"confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred"
-" \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
-"describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
 "the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:19
 #: i2p2www/pages/site/docs/how/tech-intro.html:508
 msgid ""
-"The first time a router wants to encrypt a garlic message to another "
-"router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal "
-"and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal "
-"block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains "
-"the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a "
-"number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender "
-"wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal "
-"encrypt \n"
-"a new session key they simply pick one of the previously delivered "
-"session \n"
-"tags and AES encrypt the payload like before, using the session key used "
-"with \n"
-"that session tag, prepended with the session tag itself. When a router "
-"receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it "
-"matches \n"
-"an available session tag - if it does, they simply AES decrypt the "
-"message, \n"
+"The first time a router wants to encrypt a garlic message to another router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
+"a new session key they simply pick one of the previously delivered session \n"
+"tags and AES encrypt the payload like before, using the session key used with \n"
+"that session tag, prepended with the session tag itself. When a router receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
+"an available session tag - if it does, they simply AES decrypt the message, \n"
 "but if it does not, they ElGamal decrypt the first block."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:35
 #: i2p2www/pages/site/docs/how/tech-intro.html:524
 msgid ""
-"Each session tag can be used only once so as to prevent internal "
-"adversaries \n"
-"from unnecessarily correlating different messages as being between the "
-"same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
-"chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough "
-"tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful "
-"tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery "
-"status \n"
-"message\") - when the garlic message arrives at the intended recipient "
-"and \n"
-"is decrypted successfully, this small delivery status message is one of "
-"the \n"
-"cloves exposed and has instructions for the recipient to send the clove "
-"back \n"
-"to the original sender (through an inbound tunnel, of course). When the "
-"original \n"
-"sender receives this delivery status message, they know that the session "
-"tags \n"
+"Each session tag can be used only once so as to prevent internal adversaries \n"
+"from unnecessarily correlating different messages as being between the same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery status \n"
+"message\") - when the garlic message arrives at the intended recipient and \n"
+"is decrypted successfully, this small delivery status message is one of the \n"
+"cloves exposed and has instructions for the recipient to send the clove back \n"
+"to the original sender (through an inbound tunnel, of course). When the original \n"
+"sender receives this delivery status message, they know that the session tags \n"
 "bundled in the garlic message were successfully delivered."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:50
 msgid ""
 "Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is "
-"limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or "
-"old \n"
-"messages may be dropped. The sender keeps track whether messages using "
-"session \n"
-"tags are getting through, and if there isn't sufficient communication it "
-"may \n"
-"drop the ones previously assumed to be properly delivered, reverting back"
-" \n"
+"discarded if not used. In addition, the quantity stored for each key is limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or old \n"
+"messages may be dropped. The sender keeps track whether messages using session \n"
+"tags are getting through, and if there isn't sufficient communication it may \n"
+"drop the ones previously assumed to be properly delivered, reverting back \n"
 "to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or "
-"expire."
+"A session will continue to exist until all its tags are exhausted or expire."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:61
@@ -6961,8 +5752,7 @@ msgid ""
 "between a Router and a Destination.\n"
 "Each Router and Destination maintains its own Session Key Manager to\n"
 "keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple "
-"Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple Destinations\n"
 "to each other or a Router by adversaries."
 msgstr ""
 
@@ -6983,14 +5773,14 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgid ""
+"It is for a new session and contains both ElGamal and AES encrypted blocks"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:88
 msgid ""
 "When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt "
-"the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
 "If that fails, it will assume it is for a new session and attempt to\n"
 "decrypt it using ElGamal."
 msgstr ""
@@ -7001,8 +5791,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:98
 msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
-"block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
 "and an encrypted AES block."
 msgstr ""
 
@@ -7028,8 +5817,7 @@ msgid ""
 "The 32-byte\n"
 "<a href=\"%(commonstructures)s#type_SessionKey\">Session Key</a>\n"
 "is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
-" follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
 "the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
 msgstr ""
 
@@ -7058,18 +5846,16 @@ msgstr ""
 #, python-format
 msgid ""
 "The data is then <a href=\"%(cryptography)s\">AES Encrypted</a>,\n"
-"using the session key and IV (calculated from the pre-IV) from the "
-"ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16"
-" bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
 "</p>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:266
 #, python-format
 msgid ""
-"Actual max payload length, and max block length, is less than 64 KB; see "
-"the <a href=\"%(i2np)s\">I2NP Overview</a>."
+"Actual max payload length, and max block length, is less than 64 KB; see the"
+" <a href=\"%(i2np)s\">I2NP Overview</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:269
@@ -7098,18 +5884,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:318
 msgid ""
 "The session tag also serves as\n"
-"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the "
-"sessionTag."
+"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:323
 msgid ""
-"To decode a message from an existing session, a router looks up the "
-"Session Tag to find an\n"
-"associated Session Key. If the Session Tag is found, the AES block is "
-"decrypted using the associated Session Key.\n"
-"If the tag is not found, the message is assumed to be a <a "
-"href=\"#new\">New Session Message</a>."
+"To decode a message from an existing session, a router looks up the Session Tag to find an\n"
+"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n"
+"If the tag is not found, the message is assumed to be a <a href=\"#new\">New Session Message</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:331
@@ -7119,38 +5901,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:332
 #, python-format
 msgid ""
-"As of release 0.9.2, the client may configure the default number of "
-"Session Tags to send\n"
+"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
 "and the low tag threshold for the current session.\n"
-"For brief streaming connections or datagrams, these options may be used "
-"to significantly reduce bandwidth.\n"
-"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for "
-"details.\n"
+"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n"
+"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n"
 "The session settings may also be overridden on a per-message basis.\n"
-"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message"
-" Expires specification</a> for details."
+"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:353
 msgid ""
-"There are many possible areas to tune the Session Key Manager's "
-"algorithms;\n"
-"some may interact with the streaming library behavior, or have "
-"significant\n"
+"There are many possible areas to tune the Session Key Manager's algorithms;\n"
+"some may interact with the streaming library behavior, or have significant\n"
 "impact on overall performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:360
 msgid ""
-"The number of tags delivered could depend on message size, keeping in "
-"mind\n"
+"The number of tags delivered could depend on message size, keeping in mind\n"
 "the eventual padding to 1KB at the tunnel message layer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:365
 msgid ""
-"Clients could send an estimate of session lifetime to the router, as an "
-"advisory\n"
+"Clients could send an estimate of session lifetime to the router, as an advisory\n"
 "on the number of tags required."
 msgstr ""
 
@@ -7162,15 +5936,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:374
 msgid ""
-"The router may assume delivery of Session Tags, or await acknowledgement "
-"before using them;\n"
+"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n"
 "there are tradeoffs for each strategy."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:379
 msgid ""
-"For very brief messages, almost the full 222 bytes of the pre-IV and "
-"padding fields in the ElGamal block\n"
+"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n"
 "could be used for the entire message, instead of establishing a session."
 msgstr ""
 
@@ -7182,10 +5954,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:389
 msgid ""
-"Perhaps things could be more efficient if the Session Tag system was "
-"bidirectional,\n"
-"so tags delivered in the 'forward' path could be used in the 'reverse' "
-"path,\n"
+"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n"
+"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n"
 "thus avoiding ElGamal in the initial response.\n"
 "The router currently plays some tricks like this when sending\n"
 "tunnel test messages to itself."
@@ -7203,12 +5973,9 @@ msgstr ""
 msgid ""
 "Several of these ideas may require a new I2NP message type, or\n"
 "set a flag in the\n"
-"<a "
-"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery"
-" Instructions</a>,\n"
+"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery Instructions</a>,\n"
 "or set a magic number in the first few bytes of the Session Key field\n"
-"and accept a small risk of the random Session Key matching the magic "
-"number."
+"and accept a small risk of the random Session Key matching the magic number."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:2
@@ -7225,8 +5992,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:7
 msgid ""
-"The terms \"garlic routing\" and \"garlic encryption\" are often used "
-"rather loosely when referring to I2P's technology.\n"
+"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n"
 "Here, we explain the history of the terms, the various meanings, and\n"
 "the usage of \"garlic\" methods in I2P."
 msgstr ""
@@ -7236,20 +6002,16 @@ msgid ""
 "\"Garlic routing\" was first coined by\n"
 "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>\n"
 "in Roger Dingledine's Free Haven \n"
-"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> "
-"Section 8.1.1 (June 2000), as derived from \n"
+"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> Section 8.1.1 (June 2000), as derived from \n"
 "<a href=\"http://www.onion-router.net/\">Onion Routing</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:21
 msgid ""
-"\"Garlic\" may have been used originally by I2P developers because I2P "
-"implements a form of\n"
-"bundling as Freedman describes, or simply to emphasize general "
-"differences from Tor.\n"
+"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n"
+"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n"
 "The specific reasoning may be lost to history.\n"
-"Generally, when referring to I2P, the term \"garlic\" may mean one of "
-"three things:"
+"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:28
@@ -7268,54 +6030,39 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:33
 msgid ""
-"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven "
-"years has not always been precise; therefore the reader is\n"
+"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n"
 "cautioned when encountering the term.\n"
 "Hopefully, the explanation below will make things clear."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:40
 msgid ""
-"Onion routing is a technique for building paths, or tunnels, through a "
-"series of peers,\n"
+"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n"
 "and then using that tunnel.\n"
-"Messages are repeatedly encrypted by the originator, and then decrypted "
-"by each hop.\n"
-"During the building phase, only the routing instructions for the next hop"
-" are exposed to each peer.\n"
-"During the operating phase, messages are passed through the tunnel, and "
-"the\n"
-"message and its routing instructions are only exposed to the endpoint of "
-"the tunnel."
+"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n"
+"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n"
+"During the operating phase, messages are passed through the tunnel, and the\n"
+"message and its routing instructions are only exposed to the endpoint of the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:49
 #, python-format
 msgid ""
 "This is similar to the way Mixmaster\n"
-"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages "
-"- taking a message, encrypting it\n"
-"to the recipient's public key, taking that encrypted message and "
-"encrypting\n"
-"it (along with instructions specifying the next hop), and then taking "
-"that\n"
-"resulting encrypted message and so on, until it has one layer of "
-"encryption\n"
+"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages - taking a message, encrypting it\n"
+"to the recipient's public key, taking that encrypted message and encrypting\n"
+"it (along with instructions specifying the next hop), and then taking that\n"
+"resulting encrypted message and so on, until it has one layer of encryption\n"
 "per hop along the path."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:58
 msgid ""
-"In this sense, \"garlic routing\" as a general concept is identical to "
-"\"onion routing\".\n"
-"As implemented in I2P, of course, there are several differences from the "
-"implementation in Tor; see below.\n"
-"Even so, there are substantial similarities such that I2P benefits from a"
-"\n"
-"<a href=\"http://www.onion-router.net/Publications.html\">large amount of"
-" academic research on onion routing</a>,\n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar "
-"mixnets</a>."
+"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n"
+"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n"
+"Even so, there are substantial similarities such that I2P benefits from a\n"
+"<a href=\"http://www.onion-router.net/Publications.html\">large amount of academic research on onion routing</a>,\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar mixnets</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:67
@@ -7324,15 +6071,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:68
 msgid ""
-"Michael Freedman defined \"garlic routing\" as an extension to onion "
-"routing,\n"
+"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n"
 "in which multiple messages are bundled together.\n"
 "He called each message a \"bulb\".\n"
-"All the messages, each with its own delivery instructions, are exposed at"
-" the\n"
+"All the messages, each with its own delivery instructions, are exposed at the\n"
 "endpoint.\n"
-"This allows the efficient bundling of an onion routing \"reply block\" "
-"with the original message."
+"This allows the efficient bundling of an onion routing \"reply block\" with the original message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:77
@@ -7341,10 +6085,8 @@ msgid ""
 "Our term for garlic \"bulbs\" is \"cloves\".\n"
 "Any number of messages can be\n"
 "contained, instead of just a single message.\n"
-"This is a significant distinction from the onion routing implemented in "
-"Tor.\n"
-"However, it is only one of many major architectural differences between "
-"I2P and Tor;\n"
+"This is a significant distinction from the onion routing implemented in Tor.\n"
+"However, it is only one of many major architectural differences between I2P and Tor;\n"
 "perhaps it is not, by itself, enough to justify a change in terminology."
 msgstr ""
 
@@ -7352,10 +6094,8 @@ msgstr ""
 msgid ""
 "Another difference\n"
 "from the method described by Freedman\n"
-"is that the path is unidirectional - there is no \"turning point\" as "
-"seen in onion routing\n"
-"or mixmaster reply blocks, which greatly simplifies the algorithm and "
-"allows for more flexible\n"
+"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n"
+"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n"
 "and reliable delivery."
 msgstr ""
 
@@ -7389,16 +6129,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:113
 msgid ""
-"For publishing some network database entries (dampening the probability "
-"of a successful traffic analysis attack) (ElGamal/AES)"
+"For publishing some network database entries (dampening the probability of a"
+" successful traffic analysis attack) (ElGamal/AES)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:116
 msgid ""
-"There are also significant ways that this technique can be used to "
-"improve the performance of the network, \n"
-"exploiting transport latency/throughput tradeoffs, and branching data "
-"through redundant paths to increase reliability."
+"There are also significant ways that this technique can be used to improve the performance of the network, \n"
+"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:122
@@ -7409,8 +6147,7 @@ msgstr ""
 msgid ""
 "In I2P, tunnels are unidirectional. Each party builds two tunnels,\n"
 "one for outbound and one for inbound traffic.\n"
-"Therefore, four tunnels are required for a single round-trip message and "
-"reply."
+"Therefore, four tunnels are required for a single round-trip message and reply."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:129
@@ -7430,12 +6167,10 @@ msgstr ""
 msgid ""
 "Tunnels are a general-purpose mechanism to transport all\n"
 "<a href=\"%(i2np)s\">I2NP messages</a>, and\n"
-"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to "
-"build tunnels.\n"
+"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to build tunnels.\n"
 "We do not bundle multiple\n"
 "<a href=\"%(i2np)s\">I2NP messages</a> into a single\n"
-"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at "
-"the outbound tunnel endpoint;\n"
+"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at the outbound tunnel endpoint;\n"
 "the tunnel encryption is sufficient."
 msgstr ""
 
@@ -7449,14 +6184,12 @@ msgid ""
 "At the layer above tunnels, I2P delivers end-to-end messages between\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>.\n"
 "Just as within a single tunnel, we use\n"
-"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption."
-"\n"
+"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption.\n"
 "Each client message as delivered to the router through the\n"
 "<a href=\"%(i2cp)s\">I2CP interface</a> becomes a single\n"
 "<a href=\"%(i2npspec)s#struct_GarlicClove\">Garlic Clove</a>\n"
 "with its own\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>,\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>,\n"
 "inside a\n"
 "<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a>.\n"
 "Delivery Instructions may specify a Destination, Router, or Tunnel."
@@ -7479,18 +6212,13 @@ msgid ""
 "A\n"
 "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">Delivery Status Message</a>,\n"
 "with\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>\n"
-"specifying that it be sent back to the originating router as an "
-"acknowledgment.\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n"
+"specifying that it be sent back to the originating router as an acknowledgment.\n"
 "This is similar to the \"reply block\" or \"reply onion\"\n"
 "described in the references.\n"
-"It is used for determining the success or failure of end to end message "
-"delivery.\n"
-"The originating router may, upon failure to receive the Delivery Status "
-"Message\n"
-"within the expected time period, modify the routing to the far-end "
-"Destination,\n"
+"It is used for determining the success or failure of end to end message delivery.\n"
+"The originating router may, upon failure to receive the Delivery Status Message\n"
+"within the expected time period, modify the routing to the far-end Destination,\n"
 "or take other actions."
 msgstr ""
 
@@ -7502,16 +6230,12 @@ msgid ""
 "containing a\n"
 "<a href=\"%(commonstructures)s#struct_LeaseSet\">LeaseSet</a>\n"
 "for the originating Destination, with\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n"
 "specifying the far-end destination's router.\n"
-"By periodically bundling a LeaseSet, the router ensures that the far-end "
-"will be able\n"
+"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n"
 "to maintain communications.\n"
-"Otherwise the far-end would have to query a floodfill router for the "
-"network database entry,\n"
-"and all LeaseSets would have to be published to the network database, as "
-"explained on the\n"
+"Otherwise the far-end would have to query a floodfill router for the network database entry,\n"
+"and all LeaseSets would have to be published to the network database, as explained on the\n"
 "<a href=\"%(netdb)s\">network database page</a>."
 msgstr ""
 
@@ -7521,31 +6245,24 @@ msgid ""
 "By default, the Delivery Status and Database Store Messages\n"
 "are bundled when the local LeaseSet changes, when additional\n"
 "<a href=\"%(commonstructures)s#type_SessionTag\">Session Tags</a>\n"
-"are delivered, or if the messages have not been bundled in the previous "
-"minute.\n"
-"As of release 0.9.2, the client may configure the default number of "
-"Session Tags to send\n"
+"are delivered, or if the messages have not been bundled in the previous minute.\n"
+"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
 "and the low tag threshold for the current session.\n"
-"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for "
-"details.\n"
+"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n"
 "The session settings may also be overridden on a per-message basis.\n"
-"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message"
-" Expires specification</a> for details."
+"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:224
 msgid ""
-"Obviously, the additional messages are currently bundled for specific "
-"purposes,\n"
+"Obviously, the additional messages are currently bundled for specific purposes,\n"
 "and not part of a general-purpose routing scheme."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:229
 msgid ""
-"As of release 0.9.12, the Delivery Status Message is wrapped in another "
-"Garlic Message\n"
-"by the originator so that the contents are encrypted and not visible to "
-"routers on the return path."
+"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n"
+"by the originator so that the contents are encrypted and not visible to routers on the return path."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:235
@@ -7569,35 +6286,26 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/garlic-routing.html:252
 #, python-format
 msgid ""
-"The Garlic Message mechanism is very flexible and provides a structure "
-"for\n"
+"The Garlic Message mechanism is very flexible and provides a structure for\n"
 "implementing many types of mixnet delivery methods.\n"
 "Together with the unused delay option in the\n"
-"<a "
-"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel"
-" message Delivery Instructions</a>,\n"
-"a wide spectrum of batching, delay, mixing, and routing strategies are "
-"possible."
+"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel message Delivery Instructions</a>,\n"
+"a wide spectrum of batching, delay, mixing, and routing strategies are possible."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:260
 msgid ""
-"In particular, there is potential for much more flexibility at the "
-"outbound tunnel endpoint.\n"
+"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n"
 "Messages could possibly be routed from there to one of several tunnels\n"
-"(thus minimizing point-to-point connections), or multicast to several "
-"tunnels\n"
+"(thus minimizing point-to-point connections), or multicast to several tunnels\n"
 "for redundancy, or streaming audio and video."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:267
 msgid ""
-"Such experiments may conflict with the need to ensure security and "
-"anonymity, such\n"
-"as limiting certain routing paths, restricting the types of I2NP messages"
-" that may\n"
-"be forwarded along various paths, and enforcing certain message "
-"expiration times."
+"Such experiments may conflict with the need to ensure security and anonymity, such\n"
+"as limiting certain routing paths, restricting the types of I2NP messages that may\n"
+"be forwarded along various paths, and enforcing certain message expiration times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:273
@@ -7606,11 +6314,9 @@ msgid ""
 "As a part of\n"
 "<a href=\"%(elgamalaes)s\">ElGamal/AES encryption</a>,\n"
 "a garlic message contains a sender\n"
-"specified amount of padding data, allowing the sender to take active "
-"countermeasures \n"
+"specified amount of padding data, allowing the sender to take active countermeasures \n"
 "against traffic analysis.\n"
-"This is not currently used, beyond the requirement to pad to a multiple "
-"of 16 bytes."
+"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:282
@@ -7627,10 +6333,8 @@ msgstr "Riferimenti"
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:292
 msgid ""
-"The term garlic routing was first coined in Roger Dingledine's Free Haven"
-" \n"
-"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> "
-"(June 2000),\n"
+"The term garlic routing was first coined in Roger Dingledine's Free Haven \n"
+"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> (June 2000),\n"
 "see Section 8.1.1 authored by\n"
 "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>."
 msgstr ""
@@ -7660,8 +6364,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:313
 msgid ""
-"Onion routing was first described in <a href=\"http://www.onion-"
-"router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n"
+"Onion routing was first described in <a href=\"http://www.onion-router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n"
 "by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996."
 msgstr ""
 
@@ -7671,79 +6374,51 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:4
 msgid ""
-"I2P is a project to build, deploy, and maintain a network supporting "
-"secure and anonymous\n"
-"communication. People using I2P are in control of the tradeoffs between "
-"anonymity, reliability,\n"
-"bandwidth usage, and latency. There is no central point in the network on"
-" which pressure can be\n"
-"exerted to compromise the integrity, security, or anonymity of the "
-"system. The network supports\n"
-"dynamic reconfiguration in response to various attacks, and has been "
-"designed to make use of\n"
-"additional resources as they become available. Of course, all aspects of "
-"the network are open and\n"
+"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n"
+"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n"
+"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n"
+"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n"
+"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n"
+"additional resources as they become available. Of course, all aspects of the network are open and\n"
 "freely available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:14
 msgid ""
-"Unlike many other anonymizing networks, I2P doesn't try to provide "
-"anonymity by hiding the\n"
-"originator of some communication and not the recipient, or the other way "
-"around. I2P is designed to\n"
-"allow peers using I2P to communicate with each other anonymously &mdash; "
-"both sender and recipient\n"
-"are unidentifiable to each other as well as to third parties. For "
-"example, today there are both\n"
-"in-I2P web sites (allowing anonymous publishing / hosting) as well as "
-"HTTP proxies to the normal web\n"
-"(allowing anonymous web browsing). Having the ability to run servers "
-"within I2P is essential, as it\n"
-"is quite likely that any outbound proxies to the normal Internet will be "
-"monitored, disabled, or\n"
+"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n"
+"originator of some communication and not the recipient, or the other way around. I2P is designed to\n"
+"allow peers using I2P to communicate with each other anonymously &mdash; both sender and recipient\n"
+"are unidentifiable to each other as well as to third parties. For example, today there are both\n"
+"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n"
+"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n"
+"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n"
 "even taken over to attempt more malicious attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:25
 #, python-format
 msgid ""
-"The network itself is message oriented - it is essentially a secure and "
-"anonymous IP layer, where\n"
-"messages are addressed to cryptographic keys (Destinations) and can be "
-"significantly larger than IP\n"
-"packets. Some example uses of the network include \"eepsites\" "
-"(webservers hosting normal web\n"
-"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a "
-"distributed data store. With the\n"
-"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are "
-"able to stream traditional\n"
-"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even "
-"streaming audio. Most people\n"
-"will not use I2P directly, or even need to know they're using it. Instead"
-" their view will be of one\n"
-"of the I2P enabled applications, or perhaps as a little controller app to"
-" turn on and off various\n"
+"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n"
+"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n"
+"packets. Some example uses of the network include \"I2P Sites\" (webservers hosting normal web\n"
+"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n"
+"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are able to stream traditional\n"
+"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n"
+"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n"
+"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n"
 "proxies to enable the anonymizing functionality."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:37
 #, python-format
 msgid ""
-"An essential part of designing, developing, and testing an anonymizing "
-"network is to define the <a\n"
-"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing "
-"as \"true\" anonymity, just\n"
-"increasingly expensive costs to identify someone. Briefly, I2P's intent "
-"is to allow people to\n"
-"communicate in arbitrarily hostile environments by providing good "
-"anonymity, mixed in with\n"
-"sufficient cover traffic provided by the activity of people who require "
-"less anonymity. This way,\n"
-"some users can avoid detection by a very powerful adversary, while others"
-" will try to evade a weaker\n"
-"entity, <i>all on the same network</i>, where each one's messages are "
-"essentially indistinguishable\n"
+"An essential part of designing, developing, and testing an anonymizing network is to define the <a\n"
+"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing as \"true\" anonymity, just\n"
+"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n"
+"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n"
+"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n"
+"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n"
+"entity, <i>all on the same network</i>, where each one's messages are essentially indistinguishable\n"
 "from the others."
 msgstr ""
 
@@ -7754,12 +6429,9 @@ msgstr "Perché?"
 #: i2p2www/pages/site/docs/how/intro.html:49
 #, python-format
 msgid ""
-"There are a multitude of reasons why we need a system to support "
-"anonymous communication, and\n"
-"everyone has their own personal rationale. There are many <a "
-"href=\"%(comparisons)s\">other\n"
-"efforts</a> working on finding ways to provide varying degrees of "
-"anonymity to people through the\n"
+"There are a multitude of reasons why we need a system to support anonymous communication, and\n"
+"everyone has their own personal rationale. There are many <a href=\"%(comparisons)s\">other\n"
+"efforts</a> working on finding ways to provide varying degrees of anonymity to people through the\n"
 "Internet, but we could not find any that met our needs or threat model."
 msgstr ""
 
@@ -7770,23 +6442,14 @@ msgstr "Come?"
 #: i2p2www/pages/site/docs/how/intro.html:58
 #, python-format
 msgid ""
-"The network at a glance is made up of a set of nodes (\"routers\") with a"
-" number of unidirectional\n"
-"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a "
-"href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is "
-"identified by a cryptographic RouterIdentity which is\n"
-"typically long lived. These routers communicate with each other through "
-"existing transport\n"
-"mechanisms (TCP, UDP, etc), passing various messages. Client applications"
-" have their own\n"
-"cryptographic identifier (\"Destination\") which enables it to send and "
-"receive messages. These\n"
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels\n"
-"that will be used for sending and receiving messages through the network."
-" I2P has its own internal\n"
-"<a href=\"%(netdb)s\">network database</a> (using a modification of the "
-"Kademlia algorithm) for\n"
+"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n"
+"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is identified by a cryptographic RouterIdentity which is\n"
+"typically long lived. These routers communicate with each other through existing transport\n"
+"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n"
+"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n"
+"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n"
+"that will be used for sending and receiving messages through the network. I2P has its own internal\n"
+"<a href=\"%(netdb)s\">network database</a> (using a modification of the Kademlia algorithm) for\n"
 "distributing routing and contact information securely."
 msgstr ""
 
@@ -7796,91 +6459,62 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:73
 msgid ""
-"In the above, Alice, Bob, Charlie, and Dave are all running routers with "
-"a single Destination on\n"
-"their local router. They each have a pair of 2-hop inbound tunnels per "
-"destination (labeled 1, 2, 3,\n"
-"4, 5 and 6), and a small subset of each of those router's outbound tunnel"
-" pool is shown with 2-hop\n"
-"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's "
-"outbound tunnels are not\n"
-"shown, nor are the rest of each router's outbound tunnel pool (typically "
-"stocked with a few tunnels\n"
-"at a time). When Alice and Bob talk to each other, Alice sends a message "
-"out one of her (pink)\n"
-"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3"
-" or 4). She knows to send\n"
-"to those tunnels on the correct router by querying the network database, "
-"which is constantly updated\n"
+"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n"
+"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n"
+"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n"
+"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n"
+"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n"
+"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n"
+"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n"
+"to those tunnels on the correct router by querying the network database, which is constantly updated\n"
 "as new leases are authorized and old ones expire."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:85
 #, python-format
 msgid ""
-"If Bob wants to reply to Alice, he simply goes through the same process -"
-" send a message out one of\n"
-"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 "
-"or 2). To make things\n"
-"easier, most messages sent between Alice and Bob are <a "
-"href=\"%(garlicrouting)s\">garlic</a>\n"
-"wrapped, bundling the sender's own current lease information so that the "
-"recipient can reply\n"
-"immediately without having to look in the network database for the "
-"current data."
+"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n"
+"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n"
+"easier, most messages sent between Alice and Bob are <a href=\"%(garlicrouting)s\">garlic</a>\n"
+"wrapped, bundling the sender's own current lease information so that the recipient can reply\n"
+"immediately without having to look in the network database for the current data."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:93
 #, python-format
 msgid ""
-"To deal with a wide range of attacks, I2P is fully distributed with no "
-"centralized resources - and\n"
-"hence there are no directory servers keeping statistics regarding the "
-"performance and reliability of\n"
-"routers within the network. As such, each router must keep and maintain "
-"profiles of various routers\n"
-"and is responsible for selecting appropriate peers to meet the anonymity,"
-" performance, and\n"
-"reliability needs of the users, as described in the <a "
-"href=\"%(peerselection)s\">peer selection</a>\n"
+"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n"
+"hence there are no directory servers keeping statistics regarding the performance and reliability of\n"
+"routers within the network. As such, each router must keep and maintain profiles of various routers\n"
+"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n"
+"reliability needs of the users, as described in the <a href=\"%(peerselection)s\">peer selection</a>\n"
 "page."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:102
 #, python-format
 msgid ""
-"The network itself makes use of a significant number of <a "
-"href=\"%(cryptography)s\">cryptographic\n"
-"techniques and algorithms</a> - a full laundry list includes 2048bit "
-"ElGamal encryption, 256bit AES\n"
-"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, "
-"2048bit Diffie-Hellman\n"
-"negotiated connections with station to station authentication, and <a "
-"href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>."
+"The network itself makes use of a significant number of <a href=\"%(cryptography)s\">cryptographic\n"
+"techniques and algorithms</a> - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n"
+"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n"
+"negotiated connections with station to station authentication, and <a href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:110
 msgid ""
-"Content sent over I2P is encrypted through three layers garlic encryption"
-" (used to verify the\n"
-"delivery of the message to the recipient), tunnel encryption (all "
-"messages passing through a tunnel\n"
-"is encrypted by the tunnel gateway to the tunnel endpoint), and inter "
-"router transport layer\n"
+"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n"
+"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n"
+"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n"
 "encryption (e.g. the TCP transport uses AES256 with ephemeral keys)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:117
 msgid ""
 "End-to-end (I2CP) encryption (client application to\n"
-"server application) was disabled in I2P release 0.6; end-to-end (garlic) "
-"encryption (I2P client router\n"
-"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" "
-"remains. Notice the different use of\n"
-"terms! All data from a to h is end-to-end encrypted, but the I2CP "
-"connection between the I2P router and\n"
-"the applications is not end-to-end encrypted! A and h are the routers of "
-"Alice and Bob, while Alice and\n"
+"server application) was disabled in I2P release 0.6; end-to-end (garlic) encryption (I2P client router\n"
+"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" remains. Notice the different use of\n"
+"terms! All data from a to h is end-to-end encrypted, but the I2CP connection between the I2P router and\n"
+"the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and\n"
 "Bob in following chart are the applications running atop of I2P."
 msgstr ""
 
@@ -7897,32 +6531,22 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:132
 msgid ""
-"The two main mechanisms for allowing people who need strong anonymity to "
-"use the network are\n"
-"explicitly delayed garlic routed messages and more comprehensive tunnels "
-"to include support for\n"
-"pooling and mixing messages. These are currently planned for release 3.0,"
-" but garlic routed messages\n"
-"with no delays and FIFO tunnels are currently in place. Additionally, the"
-" 2.0 release will allow\n"
-"people to set up and operate behind restricted routes (perhaps with "
-"trusted peers), as well as the\n"
+"The two main mechanisms for allowing people who need strong anonymity to use the network are\n"
+"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n"
+"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n"
+"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n"
+"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n"
 "deployment of more flexible and anonymous transports."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:141
 #, python-format
 msgid ""
-"Some questions have been raised with regards to the scalability of I2P, "
-"and reasonably so. There\n"
-"will certainly be more analysis over time, but peer lookup and "
-"integration should be bounded by\n"
-"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network "
-"database</a>'s algorithm, while end\n"
-"to end messages should be <code>O(1)</code> (scale free), since messages "
-"go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no "
-"longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n"
+"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network database</a>'s algorithm, while end\n"
+"to end messages should be <code>O(1)</code> (scale free), since messages go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
 "the network (N) bears no impact."
 msgstr ""
 
@@ -7934,13 +6558,10 @@ msgstr "Quando?"
 #, python-format
 msgid ""
 "I2P initially began in Feb 2003 as a proposed modification to <a\n"
-"href=\"http://freenetproject.org\">Freenet</a> to allow it to use "
-"alternate transports, such as <a\n"
+"href=\"http://freenetproject.org\">Freenet</a> to allow it to use alternate transports, such as <a\n"
 "href=\"%(jms)s\">JMS</a>, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code "
-"being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the"
-" <a href=\"%(roadmap)s\">roadmap</a>."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the <a href=\"%(roadmap)s\">roadmap</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:161
@@ -7950,22 +6571,14 @@ msgstr "Chi?"
 #: i2p2www/pages/site/docs/how/intro.html:162
 #, python-format
 msgid ""
-"We have a small <a href=\"%(team)s\">team</a> spread around several "
-"continents, working to advance\n"
-"different aspects of the project. We are very open to other developers "
-"who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as "
-"critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is "
-"open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix "
-"licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
-"written in Java (1.5+),\n"
-"though some third party applications are being written in Python and "
-"other languages. The code works\n"
-"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual"
-" Machines."
+"We have a small <a href=\"%(team)s\">team</a> spread around several continents, working to advance\n"
+"different aspects of the project. We are very open to other developers who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
+"though some third party applications are being written in Python and other languages. The code works\n"
+"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual Machines."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:173
@@ -7975,12 +6588,9 @@ msgstr "Dove?"
 #: i2p2www/pages/site/docs/how/intro.html:174
 #, python-format
 msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
-"concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
-" currently no\n"
-"scheduled development meetings, however <a href=\"%(meetings)s\">archives"
-" are available</a>."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
+"scheduled development meetings, however <a href=\"%(meetings)s\">archives are available</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:180
@@ -8004,39 +6614,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:8
 msgid ""
 "I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (<b>RouterInfos</b>) "
-"and destination contact\n"
-"information (<b>LeaseSets</b>). Each piece of data is signed by the "
-"appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness "
-"information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to "
-"replace\n"
+"just two types of data - router contact information (<b>RouterInfos</b>) and destination contact\n"
+"information (<b>LeaseSets</b>). Each piece of data is signed by the appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
 "older ones, and protection against certain classes of attack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:17
 msgid ""
 "The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains "
-"the distributed database."
+"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:25
 msgid ""
-"When an I2P router wants to contact another router, they need to know "
-"some \n"
-"key pieces of data - all of which are bundled up and signed by the router"
-" into\n"
-"a structure called the \"RouterInfo\", which is distributed with the "
-"SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know some \n"
+"key pieces of data - all of which are bundled up and signed by the router into\n"
+"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
 "as the key. The structure itself contains:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:32
 msgid ""
-"The router's identity (an encryption key, a signing key, and a "
-"certificate)"
+"The router's identity (an encryption key, a signing key, and a certificate)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:33
@@ -8067,8 +6668,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:47
 msgid ""
-"Capabilities flags - used to indicate floodfill participation, "
-"approximate bandwidth, and perceived reachability"
+"Capabilities flags - used to indicate floodfill participation, approximate "
+"bandwidth, and perceived reachability"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:49
@@ -8127,23 +6728,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:76
 msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers "
-"published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
 "and only sent tunnel requests to peers whose uptime was more than 60m"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:82
 msgid ""
 "These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel "
-"through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine "
-"whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine whether\n"
 "the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or "
-"trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging"
-" and network analysis."
+"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging and network analysis."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:102
@@ -8154,13 +6750,11 @@ msgstr "Opzioni Aggiuntive"
 #, python-format
 msgid ""
 "Additional text options include\n"
-"a small number of statistics about the router's health, which are "
-"aggregated by\n"
+"a small number of statistics about the router's health, which are aggregated by\n"
 "sites such as <a href=\"http://%(stats)s/\">%(stats)s</a>\n"
 "for network performance analysis and debugging.\n"
 "These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such "
-"data\n"
+"such as tunnel build success rates, while balancing the need for such data\n"
 "with the side-effects that could result from revealing this data.\n"
 "Current statistics are limited to:"
 msgstr ""
@@ -8175,18 +6769,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:119
 msgid ""
-"Floodfill routers publish additional data on the number of entries in "
-"their network database."
+"Floodfill routers publish additional data on the number of entries in their "
+"network database."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:123
 msgid ""
 "The data published can be seen in the router's user interface,\n"
 "but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the "
-"published\n"
-"statistics to improve anonymity, and we plan to remove more in future "
-"releases."
+"As the network has matured, we have gradually removed most of the published\n"
+"statistics to improve anonymity, and we plan to remove more in future releases."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:130
@@ -8195,8 +6787,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:132
 msgid ""
-"As of release 0.9.24, routers may declare that they are part of a "
-"\"family\", operated by the same entity.\n"
+"As of release 0.9.24, routers may declare that they are part of a \"family\", operated by the same entity.\n"
 "Multiple routers in the same family will not be used in a single tunnel."
 msgstr ""
 
@@ -8215,16 +6806,15 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:159
 msgid ""
 "RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the "
-"frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
 "with memory or disk usage.\n"
 "In the current implementation, there are the following general policies:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:166
 msgid ""
-"There is no expiration during the first hour of uptime, as the persistent"
-" stored data may be old."
+"There is no expiration during the first hour of uptime, as the persistent "
+"stored data may be old."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:169
@@ -8233,25 +6823,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:172
 msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in"
-" an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 "
-"routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
 "while expiration time with 300 routers is around 30 hours."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:177
 #, python-format
 msgid ""
-"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in "
-"about an hour, as\n"
+"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in about an hour, as\n"
 "the introducer list expires in about that time."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:181
 msgid ""
-"Floodfills use a short expiration time (1 hour) for all local "
-"RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
 "be frequently republished to them."
 msgstr ""
 
@@ -8267,8 +6853,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:192
 msgid ""
-"It may be desirable to persistently store Meta LeaseSets with long "
-"expirations.\n"
+"It may be desirable to persistently store Meta LeaseSets with long expirations.\n"
 "This is implementation-dependent."
 msgstr ""
 
@@ -8282,10 +6867,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:212
 msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
-"documenting\n"
-"a group of <b>tunnel entry points (leases)</b> for a particular client "
-"destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
+"a group of <b>tunnel entry points (leases)</b> for a particular client destination.\n"
 "Each of these leases specify the following information:"
 msgstr ""
 
@@ -8311,8 +6894,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:454
 msgid ""
 "One exception is for Encrypted LeaseSets (LS2), as of release 0.9.38.\n"
-"The SHA256 of the type byte (3) followed by the blinded public key is "
-"used for the DHT key,\n"
+"The SHA256 of the type byte (3) followed by the blinded public key is used for the DHT key,\n"
 "and then rotated as usual."
 msgstr ""
 
@@ -8326,14 +6908,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:239
 msgid ""
-"The destination itself (an encryption key, a signing key and a "
-"certificate)"
+"The destination itself (an encryption key, a signing key and a certificate)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:240
 msgid ""
-"Additional encryption public key: used for end-to-end encryption of "
-"garlic messages"
+"Additional encryption public key: used for end-to-end encryption of garlic "
+"messages"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:241
@@ -8344,8 +6925,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:242
 msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination "
-"published the LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination published "
+"the LeaseSet."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:246
@@ -8376,13 +6957,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:263
 msgid ""
-"A LeaseSet for a destination used only for outgoing connections is "
-"<i>unpublished</i>.\n"
+"A LeaseSet for a destination used only for outgoing connections is <i>unpublished</i>.\n"
 "It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
-"unpublished.\n"
-"Servers will still be able to send messages back to those unpublished "
-"destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
+"Servers will still be able to send messages back to those unpublished destinations,\n"
 "because of <a href=\"#lsp\">I2NP storage messages</a>."
 msgstr ""
 
@@ -8392,24 +6970,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:274
 msgid ""
-"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero "
-"leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet."
-"\n"
-"Revocations are not fully implemented, and it is unclear if they have any"
-" practical use.\n"
-"This is the only planned use for that signing key, so it is currently "
-"unused."
+"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet.\n"
+"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
+"This is the only planned use for that signing key, so it is currently unused."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:283
 msgid ""
 "As of release 0.9.38, floodfills support a new LeaseSet2 structure.\n"
-"This structure is very similar to the old LeaseSet structure, and serves "
-"the same purpose.\n"
+"This structure is very similar to the old LeaseSet structure, and serves the same purpose.\n"
 "The new structure provides the flexibility required to support new\n"
-"encryption types, multiple encryption types, options, offline signing "
-"keys,\n"
+"encryption types, multiple encryption types, options, offline signing keys,\n"
 "and other features.\n"
 "See proposal 123 for details."
 msgstr ""
@@ -8418,15 +6990,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:715
 msgid ""
 "As of release 0.9.38, floodfills support a new Meta LeaseSet structure.\n"
-"This structure provides a tree-like structure in the DHT, to refer to "
-"other LeaseSets.\n"
-"Using Meta LeaseSets, a site may implement large multihomed services, "
-"where several\n"
+"This structure provides a tree-like structure in the DHT, to refer to other LeaseSets.\n"
+"Using Meta LeaseSets, a site may implement large multihomed services, where several\n"
 "different Destinations are used to provide a common service.\n"
 "The entries in a Meta LeaseSet are Destinations or other Meta LeaseSets,\n"
 "and may have long expirations, up to 18.2 hours.\n"
-"Using this facility, it should be possible to run hundreds or thousands "
-"of Destinations hosting a common service.\n"
+"Using this facility, it should be possible to run hundreds or thousands of Destinations hosting a common service.\n"
 "See proposal 123 for details."
 msgstr ""
 
@@ -8444,29 +7013,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:313
 msgid ""
-"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate"
-" key.\n"
-"The leases may only be decoded, and thus the destination may only be "
-"contacted,\n"
+"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate key.\n"
+"The leases may only be decoded, and thus the destination may only be contacted,\n"
 "by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is "
-"encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future "
-"work to\n"
-"research whether the user interface and implementation of encrypted "
-"LeaseSets could be improved."
+"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
+"research whether the user interface and implementation of encrypted LeaseSets could be improved."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:324
 msgid ""
-"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet "
-"structure.\n"
-"The Destination is hidden, and only a blinded public key and an "
-"expiration\n"
+"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet structure.\n"
+"The Destination is hidden, and only a blinded public key and an expiration\n"
 "are visible to the floodfill.\n"
 "Only those that have the full Destination may decrypt the structure.\n"
-"The structure is stored at a DHT location based on the hash of the "
-"blinded public key,\n"
+"The structure is stored at a DHT location based on the hash of the blinded public key,\n"
 "not the hash of the Destination.\n"
 "See proposal 123 for details."
 msgstr ""
@@ -8477,12 +7038,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:336
 msgid ""
-"For regular LeaseSets, the expiration is the time of the latest "
-"expiration of its leases.\n"
-"For the new LeaseSet2 data structures, the expiration is specified in the"
-" header.\n"
-"For LeaseSet2, the expiration should match the latest expiration of its "
-"leases.\n"
+"For regular LeaseSets, the expiration is the time of the latest expiration of its leases.\n"
+"For the new LeaseSet2 data structures, the expiration is specified in the header.\n"
+"For LeaseSet2, the expiration should match the latest expiration of its leases.\n"
 "For EncryptedLeaseSet and MetaLeaseSet, the expiration may vary,\n"
 "and maximum expiration may be enforced, to be determined."
 msgstr ""
@@ -8493,8 +7051,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:346
 msgid ""
-"No persistent storage of LeaseSet data is required, since they expire so "
-"quickly.\n"
+"No persistent storage of LeaseSet data is required, since they expire so quickly.\n"
 "Howewver, persistent storage of EncryptedLeaseSet and MetaLeaseSet data\n"
 "with long expirations may be advisable."
 msgstr ""
@@ -8520,42 +7077,30 @@ msgstr ""
 msgid ""
 "The netDb is decentralized, however you do need at\n"
 "least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the "
-"RouterInfo\n"
-"of an active peer - specifically, by retrieving their "
-"<code>routerInfo-$hash.dat</code>\n"
-"file and storing it in your <code>netDb/</code> directory. Anyone can "
-"provide\n"
-"you with those files - you can even provide them to others by exposing "
-"your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
+"of an active peer - specifically, by retrieving their <code>routerInfo-$hash.dat</code>\n"
+"file and storing it in your <code>netDb/</code> directory. Anyone can provide\n"
+"you with those files - you can even provide them to others by exposing your own\n"
 "netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular "
-"(non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
 "and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches "
-"from\n"
+"When the router starts up for the first time, it automatically fetches from\n"
 "one of these URLs, selected at random."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:379
 msgid ""
-"The floodfill netDb is a simple distributed storage mechanism.  The "
-"storage\n"
-"algorithm is simple: send the data to the closest peer that has "
-"advertised\n"
-"itself as a floodfill router. When the peer in the floodfill netDb "
-"receives a\n"
-"netDb store from a peer not in the floodfill netDb, they send it to a "
-"subset of\n"
-"the floodfill netDb-peers. The peers selected are the ones closest "
-"(according\n"
+"The floodfill netDb is a simple distributed storage mechanism.  The storage\n"
+"algorithm is simple: send the data to the closest peer that has advertised\n"
+"itself as a floodfill router. When the peer in the floodfill netDb receives a\n"
+"netDb store from a peer not in the floodfill netDb, they send it to a subset of\n"
+"the floodfill netDb-peers. The peers selected are the ones closest (according\n"
 "to the <a href=\"#kad\">XOR-metric</a>) to a specific key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:388
 msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed"
-" in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
 "router's published routerInfo as a capability."
 msgstr ""
 
@@ -8585,15 +7130,13 @@ msgid ""
 "Routers with high bandwidth limits (which must be manually configured,\n"
 "as the default is much lower) are presumed to be on lower-latency\n"
 "connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 "
-"KBytes/sec."
+"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:419
 msgid ""
 "In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation "
-"is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
 "automatically enabled."
 msgstr ""
 
@@ -8620,13 +7163,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:441
 msgid ""
-"A floodfill router's only services that are in addition to those of non-"
-"floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
 "are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to "
-"participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to "
-"their distributed database services."
+"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:449
@@ -8635,33 +7175,24 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:450
 msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
-"\n"
-"To create a Kademlia key, the SHA256 hash of the RouterIdentity or "
-"Destination is computed."
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"To create a Kademlia key, the SHA256 hash of the RouterIdentity or Destination is computed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:459
 msgid ""
-"A modification to this algorithm is done to increase the costs of <a href"
-"=\"#sybil-partial\">Sybil attacks</a>.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the "
-"SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented "
-"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight "
-"UTC.\n"
-"Only the search key is modified in this way, not the floodfill router "
-"hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace "
-"rotation\",\n"
+"A modification to this algorithm is done to increase the costs of <a href=\"#sybil-partial\">Sybil attacks</a>.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
+"Only the search key is modified in this way, not the floodfill router hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
 "although it isn't strictly a rotation."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:469
 msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are "
-"only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
 "determination of distance."
 msgstr ""
 
@@ -8676,8 +7207,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:479
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local "
-"RouterInfo are exchanged with peers\n"
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
 "as a part of the initialization of a <a href=\"%(ntcp)s\">NTCP</a>\n"
 "or <a href=\"%(ssu)s\">SSU</a> transport connection."
 msgstr ""
@@ -8689,46 +7219,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:487
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local "
-"LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the "
-"related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an "
-"appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating "
-"Destinations to have published LeaseSets at all."
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:495
 msgid ""
 "The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
 "to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local "
-"database.\n"
-"Even if that floodfill is not actually closest, it will flood it "
-"\"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local database.\n"
+"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
 "sending it to multiple other floodfills.\n"
 "This provides a high degree of fault-tolerance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:504
 msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before"
-" inserting\n"
-"an item in the DHT to the closest target. As the verify operation will "
-"tend to\n"
-"discover closer floodfills if they are present, a router will quickly "
-"improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
-"LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes "
-"necessary,\n"
-"a router may simply do an iterative search for a key with the least "
-"significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the "
-"DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-"
-"distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
+"an item in the DHT to the closest target. As the verify operation will tend to\n"
+"discover closer floodfills if they are present, a router will quickly improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
+"a router may simply do an iterative search for a key with the least significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-distant peer had\n"
 "the netdb item."
 msgstr ""
 
@@ -8739,11 +7255,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:518
 #, python-format
 msgid ""
-"A router publishes its own RouterInfo by directly connecting to a "
-"floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
 "and sending it a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic "
-"encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
 "as this is a direct connection, so there are no intervening routers\n"
 "(and no need to hide this data anyway).\n"
 "The floodfill router replies with a\n"
@@ -8757,8 +7271,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:533
 msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
-"router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
 "must take care that the LeaseSet cannot be associated with the router."
 msgstr ""
 
@@ -8767,10 +7280,8 @@ msgstr ""
 msgid ""
 "A router publishes a local LeaseSet by\n"
 "sending a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that "
-"Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's "
-"Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
 "to hide the message from the tunnel's outbound endpoint.\n"
 "The floodfill router replies with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DeliveryStatusMessage,\n"
@@ -8786,17 +7297,12 @@ msgstr "Flooding"
 #, python-format
 msgid ""
 "After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored "
-"in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
 "local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
-"floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the "
-"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the "
-"floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good "
-"knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good knowledge of the\n"
 "DHT \"neighborhood\" for the routing key."
 msgstr ""
 
@@ -8818,17 +7324,15 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:574
 #, python-format
 msgid ""
-"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to "
-"request a netdb entry from a floodfill router.\n"
+"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
 "Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound "
-"exploratory tunnels."
+"The replies are specified to return via one of the router's inbound exploratory tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:580
 msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't "
-"fail) floodfill routers closest to the requested key, in parallel."
+"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
+" floodfill routers closest to the requested key, in parallel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:584
@@ -8836,8 +7340,7 @@ msgstr ""
 msgid ""
 "If the key is found locally by the floodfill router, it responds with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with"
-" a\n"
+"If the key is not found locally by the floodfill router, it responds with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n"
 "containing a list of other floodfill routers close to the key."
 msgstr ""
@@ -8845,22 +7348,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:592
 msgid ""
 "LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
-"by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
-"encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
 "RouterInfo lookup encryption may be enabled in a future release."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:599
 msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
-" or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
 "will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
-"\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
-" encryption."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:606
@@ -8874,41 +7372,31 @@ msgstr ""
 msgid ""
 "Due to the relatively small size of the network and flooding redundancy,\n"
 "lookups are usually O(1) rather than O(log n).\n"
-"A router is highly likely to know a floodfill router close enough to the "
-"key to get the answer on the first try.\n"
+"A router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
 "In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and"
-"\n"
-"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was "
-"implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and\n"
+"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was implemented.\n"
 "Queries were sent through <i>multiple routes simultaneously</i>\n"
 "to <i>reduce the chance of query failure</i>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:621
 msgid ""
-"As of release 0.8.9, <i>iterative lookups</i> are implemented with no "
-"lookup redundancy.\n"
+"As of release 0.8.9, <i>iterative lookups</i> are implemented with no lookup redundancy.\n"
 "This is a more efficient and reliable lookup that will work much better\n"
 "when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows "
-"only a small\n"
+"limitation to network growth. As the network grows and each router knows only a small\n"
 "subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup"
-" continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious "
-"floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total "
-"lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
 "or the maximum number of peers is queried."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:633
 msgid ""
-"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash "
-"directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally "
-"ignored.\n"
+"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally ignored.\n"
 "Given the current size of the network, a router has\n"
 "<i>detailed knowledge of the neighborhood of the destination ID space</i>."
 msgstr ""
@@ -8920,8 +7408,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:643
 #, python-format
 msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
-"prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
 "the attack described in the paper\n"
 "<a href=\"%(egger2013)s\">Practical Attacks Against the I2P Network</a>.\n"
 "It is not clear if verification can be redesigned to be done safely."
@@ -8929,13 +7416,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:650
 msgid ""
-"To verify a storage was successful, a router simply waits about 10 "
-"seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 seconds,\n"
 "then sends a lookup to another floodfill router close to the key\n"
 "(but not the one the store was sent to).\n"
 "Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the "
-"outbound endpoint(OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:658
@@ -8944,22 +7429,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:659
 msgid ""
-"To verify a storage was successful, a router simply waits about 10 "
-"seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 seconds,\n"
 "then sends a lookup to another floodfill router close to the key\n"
 "(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination "
-"of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
 "To prevent snooping by the OBEP of the outbound tunnel,\n"
 "lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound "
-"tunnels."
+"The replies are specified to return via one of the client's inbound tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:669
 msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
-"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
 "will be encrypted,\n"
 "to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
 msgstr ""
@@ -8971,23 +7452,16 @@ msgstr "Esplorazione"
 #: i2p2www/pages/site/docs/how/network-database.html:678
 #, python-format
 msgid ""
-"<i>Exploration</i> is a special form of netdb lookup, where a router "
-"attempts to learn about\n"
+"<i>Exploration</i> is a special form of netdb lookup, where a router attempts to learn about\n"
 "new routers.\n"
-"It does this by sending a floodfill router a <a "
-"href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random "
-"key.\n"
+"It does this by sending a floodfill router a <a href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random key.\n"
 "As this lookup will fail, the floodfill would normally respond with a\n"
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing "
-"hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already "
-"knows those floodfills,\n"
-"and it would be impractical to add all floodfill routers to the \"don't "
-"include\" field of the DatabaseLookup Message.\n"
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
+"and it would be impractical to add all floodfill routers to the \"don't include\" field of the DatabaseLookup Message.\n"
 "For an exploration query, the requesting router sets a special flag in\n"
 "the DatabaseLookup Message.\n"
-"The floodfill will then respond only with non-floodfill routers close to "
-"the requested key."
+"The floodfill will then respond only with non-floodfill routers close to the requested key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:692
@@ -8996,14 +7470,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:693
 msgid ""
-"The response to a lookup request is either a Database Store Message (on "
-"success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' "
-"router hash field\n"
+"The response to a lookup request is either a Database Store Message (on success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
 "to indicate the source of the reply; the DSM does not.\n"
 "The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple "
-"requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
 "difficult to monitor the performance of the various floodfill routers."
 msgstr ""
 
@@ -9013,19 +7484,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:705
 msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using "
-"the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
 "private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the"
-" floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer "
-"requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
-"instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that."
-"\n"
-"The multihoming function has been verified and is in use by several "
-"services on the network."
+"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that.\n"
+"The multihoming function has been verified and is in use by several services on the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:727
@@ -9055,8 +7520,7 @@ msgstr ""
 #, python-format
 msgid ""
 "There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less "
-"impact,\n"
+"Most of the following attacks will become more difficult, or have less impact,\n"
 "as the network size and number of floodfill routers increase."
 msgstr ""
 
@@ -9067,8 +7531,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:748
 #, python-format
 msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
-" routers closest to the key."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
+"routers closest to the key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:753
@@ -9089,8 +7553,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Each router maintains an expanded set of statistics in the\n"
-"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,"
-"\n"
+"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,\n"
 "covering various quality metrics for that peer.\n"
 "The set includes:"
 msgstr ""
@@ -9121,14 +7584,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:775
 msgid ""
-"Each time a router needs to make a determination on which floodfill "
-"router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
 "it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are "
-"relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
 "are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and "
-"avoided,\n"
+"While a completely unresponsive router will quickly be identified and avoided,\n"
 "routers that are only sometimes malicious may be much harder to deal with."
 msgstr ""
 
@@ -9140,8 +7600,7 @@ msgstr ""
 #, python-format
 msgid ""
 "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n"
-"by creating a large number of floodfill routers spread throughout the "
-"keyspace."
+"by creating a large number of floodfill routers spread throughout the keyspace."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:791
@@ -9149,35 +7608,29 @@ msgstr ""
 msgid ""
 "(In a related example, a researcher recently created a\n"
 "<a href=\"%(url)s\">large number of Tor relays</a>.)\n"
-"If successful, this could be an effective DOS attack on the entire "
-"network."
+"If successful, this could be an effective DOS attack on the entire network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:797
 msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as "
-"\"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
 "metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the "
-"suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
 "can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however "
-"none of them is completely satisfactory:"
+"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:805
 msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through"
-" various means\n"
-"(console news, website, forum, etc.); users would have to manually "
-"download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
+"(console news, website, forum, etc.); users would have to manually download the list and\n"
 "add it to their local \"blacklist\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:810
 msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil "
-"with more Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil with "
+"more Sybil)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:811
@@ -9186,8 +7639,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:812
 msgid ""
-"Release a new software version that improves the peer profile metrics and"
-" thresholds,\n"
+"Release a new software version that improves the peer profile metrics and thresholds,\n"
 "in an attempt to automatically identify the \"bad\" peers."
 msgstr ""
 
@@ -9199,12 +7651,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:817
 msgid ""
-"Implement an automatic subscription-based blacklist controlled by a "
-"single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" "
-"model.\n"
-"Unfortunately it would also give a single individual or group the power "
-"to\n"
+"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" model.\n"
+"Unfortunately it would also give a single individual or group the power to\n"
 "block participation of any particular router or IP in the network,\n"
 "or even to completely shutdown or destroy the entire network."
 msgstr ""
@@ -9221,25 +7670,19 @@ msgstr ""
 #, python-format
 msgid ""
 "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n"
-"by creating a small number (8-15) of floodfill routers clustered closely "
-"in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
 "and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed"
-"\n"
+"Then, all lookups and stores for a key in that keyspace would be directed\n"
 "to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular "
-"eepsite, for example."
+"If successful, this could be an effective DOS attack on a particular I2P Site, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:842
 msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
-"\n"
-"an attacker must use a brute-force method to repeatedly generate router "
-"hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
+"an attacker must use a brute-force method to repeatedly generate router hashes\n"
 "until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent "
-"on network\n"
+"The amount of computational power required for this, which is dependent on network\n"
 "size, is unknown."
 msgstr ""
 
@@ -9247,14 +7690,10 @@ msgstr ""
 msgid ""
 "As a partial defense against this attack,\n"
 "the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
-"\n"
-"we use the Hash of the key appended with the current date string, i.e. "
-"H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which "
-"transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
-"midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
+"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
 "Any partial-keyspace attack would have to be regenerated every day, for\n"
 "after the rotation, the attacking routers would no longer be close\n"
 "to the target key, or to each other."
@@ -9263,8 +7702,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:862
 msgid ""
 "This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not "
-"particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
 "An attacker can precompute numerous router hashes in advance,\n"
 "and only a few routers are sufficient to \"eclipse\" a portion\n"
 "of the keyspace within a half hour after rotation."
@@ -9272,11 +7710,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:870
 msgid ""
-"One consequence of daily keyspace rotation is that the distributed "
-"network database\n"
+"One consequence of daily keyspace rotation is that the distributed network database\n"
 "may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a "
-"store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a store yet.\n"
 "The extent of the issue, and methods for mitigation\n"
 "(for example netdb \"handoffs\" at midnight)\n"
 "are a topic for further study."
@@ -9339,24 +7775,19 @@ msgstr ""
 #, python-format
 msgid ""
 "See also <a href=\"#lookup\">lookup</a>\n"
-"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections "
-"2.2-2.3 for terms below in italics)"
+"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections 2.2-2.3 for terms below in italics)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:926
 msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could"
-" attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their "
-"references."
+"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their references."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:931
 msgid ""
-"This is unlikely to work via exploration, because exploration is a low-"
-"frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel"
-" building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
 "Exploration results are generally limited to a few router hashes,\n"
 "and each exploration query is directed to a random floodfill router."
 msgstr ""
@@ -9368,18 +7799,13 @@ msgid ""
 "For floodfill router references returned in a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n"
 "response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to"
-" the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to the lookup key.\n"
 "The requesting router does not trust that the references are\n"
 "closer to the key (i.e. they are <i>verifiably correct</i>.\n"
-"The lookup also does not stop when no closer key is found, but continues "
-"by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is "
-"reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key "
-"space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a "
-"router info\n"
+"The lookup also does not stop when no closer key is found, but continues by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
 "within the desired key space region.\n"
 "This design ensures that the query capture attack described in\n"
 "<a href=\"%(pdf)s\">Hashing it out in Public</a>\n"
@@ -9417,43 +7843,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:973
 #, python-format
 msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
-"by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of "
-"DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network "
-"database lookups are only\n"
-"loosely correlated to the <a href=\"%(peerselection)s\">peer "
-"selection</a> and\n"
-"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only "
-"previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
+"loosely correlated to the <a href=\"%(peerselection)s\">peer selection</a> and\n"
+"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only previously-known peers\n"
 "are used for tunnels.\n"
 "Also, peer selection is unrelated to any notion of DHT key-closeness."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:984
 msgid ""
-"Some of this may actually be more interesting when the I2P network gets "
-"much larger.\n"
-"Right now, each router knows a large proportion of the network, so "
-"looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a "
-"future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, "
-"the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that "
-"much harder."
+"Some of this may actually be more interesting when the I2P network gets much larger.\n"
+"Right now, each router knows a large proportion of the network, so looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that much harder."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:992
 #, python-format
 msgid ""
-"However, the general issue of DHT information leakage in I2P needs "
-"further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather "
-"information.\n"
-"Certainly, at a level of <i>f</i> = 0.2 (20&#37; malicious nodes, as "
-"specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather information.\n"
+"Certainly, at a level of <i>f</i> = 0.2 (20&#37; malicious nodes, as specifed in the paper)\n"
 "we expect that many of the Sybil threats we describe\n"
 "(<a href=\"%(threatmodel)s#sybil\">here</a>,\n"
 "<a href=\"#sybil\">here</a> and\n"
@@ -9488,11 +7901,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:10
 #, python-format
 msgid ""
-"<b>Peer profiling</b> is the process of collecting data based on the "
-"<b>observed</b> performance\n"
+"<b>Peer profiling</b> is the process of collecting data based on the <b>observed</b> performance\n"
 "of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does <b>not</b> use any claimed performance data published by "
-"the peer itself\n"
+"Profiling does <b>not</b> use any claimed performance data published by the peer itself\n"
 "in the <a href=\"%(netdb)s\">network database</a>."
 msgstr ""
 
@@ -9507,8 +7918,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:20
 #, python-format
 msgid ""
-"Choosing peers from the set of floodfill routers to use for network "
-"database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
 "which is discussed on the <a href=\"%(netdb)s\">network database</a> page"
 msgstr ""
 
@@ -9521,11 +7931,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:28
 msgid ""
 "<b>Peer selection</b> is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers "
-"will we \n"
+"on the network we want to relay our messages to go through (which peers will we \n"
 "ask to join our tunnels).  To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how"
-" \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how \n"
 "fast they are, how often they will be able to accept our requests, and \n"
 "whether they seem to be overloaded or otherwise unable to perform what\n"
 "they agree to reliably."
@@ -9535,8 +7943,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is <b>only</b> used to avoid those "
-"peers\n"
+"claimed bandwidth is untrusted and is <b>only</b> used to avoid those peers\n"
 "advertising very low bandwidth insufficient for routing tunnels.\n"
 "All peer selection is done through profiling.\n"
 "This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -9548,10 +7955,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:50
 msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large"
-" number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
-"minutes."
+"Peer selection is done quite frequently, as a router may maintain a large number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:56
@@ -9562,11 +7967,9 @@ msgstr ""
 #, python-format
 msgid ""
 "For more information see the paper\n"
-"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous "
-"Network</a>\n"
+"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>\n"
 "presented at <a href=\"%(url)s\">PET-CON 2009.1</a>.\n"
-"See <a href=\"#notes\">below</a> for notes on minor changes since the "
-"paper was published."
+"See <a href=\"#notes\">below</a> for notes on minor changes since the paper was published."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:65
@@ -9576,30 +7979,21 @@ msgstr "Profili"
 #: i2p2www/pages/site/docs/how/peer-selection.html:66
 #, python-format
 msgid ""
-"Each peer has a set of data points collected about them, including "
-"statistics \n"
-"about how long it takes for them to reply to a network database query, "
-"how \n"
-"often their tunnels fail, and how many new peers they are able to "
-"introduce \n"
-"us to, as well as simple data points such as when we last heard from them"
-" or\n"
-"when the last communication error occurred.  The specific data points "
-"gathered\n"
+"Each peer has a set of data points collected about them, including statistics \n"
+"about how long it takes for them to reply to a network database query, how \n"
+"often their tunnels fail, and how many new peers they are able to introduce \n"
+"us to, as well as simple data points such as when we last heard from them or\n"
+"when the last communication error occurred.  The specific data points gathered\n"
 "can be found in the <a href=\"%(url)s\">code</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:75
 msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile"
-" expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
 "lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written "
-"to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all"
-" profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after "
-"startup."
+"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after startup."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:85
@@ -9609,10 +8003,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:86
 msgid ""
 "While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary "
-"down \n"
-"into four simple values, representing the peer's speed, its capacity, how"
-" well \n"
+"performance, to allow for effective peer selection we break each summary down \n"
+"into four simple values, representing the peer's speed, its capacity, how well \n"
 "integrated into the network it is, and whether it is failing."
 msgstr ""
 
@@ -9624,8 +8016,7 @@ msgstr "Velocità"
 msgid ""
 "The speed calculation\n"
 "simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute.  For "
-"this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute.  For this estimate it just looks at\n"
 "performance in the previous minute."
 msgstr ""
 
@@ -9637,13 +8028,11 @@ msgstr "Capacità"
 msgid ""
 "The capacity calculation\n"
 "simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period.  For this "
-"estimate it looks at \n"
+"would agree to participate in over a given time period.  For this estimate it looks at \n"
 "how many tunnel build requests\n"
 "the peer has accepted, rejected, and dropped, and how many\n"
 "of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts "
-"more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
 "statistics up to 48 hours old may be included."
 msgstr ""
 
@@ -9651,10 +8040,8 @@ msgstr ""
 msgid ""
 "Recognizing and avoiding unreliable and unreachable\n"
 "peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the "
-"participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build "
-"request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
 "The router assigns a probability of failure to each of the\n"
 "peers, and uses that probability in the capacity calculation.\n"
 "Drops and test failures are weighted much higher than rejections."
@@ -9666,10 +8053,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:124
 msgid ""
-"As mentioned above, we drill through each peer's profile to come up with "
-"a \n"
-"few key calculations, and based upon those, we organize each peer into "
-"three\n"
+"As mentioned above, we drill through each peer's profile to come up with a \n"
+"few key calculations, and based upon those, we organize each peer into three\n"
 "groups - fast, high capacity, and standard."
 msgstr ""
 
@@ -9679,15 +8064,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:134
 msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets "
-"or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
 "exceeds the median of all peers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:138
 msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and "
-"their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
 "speed calculation meets or exceeds the median of all peers."
 msgstr ""
 
@@ -9713,25 +8096,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:156
 msgid ""
 "The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are "
-"placed in the group."
+"If there would be more, only the ones with the highest speed rating are placed in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:160
 msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)"
-"\n"
-"If there would be more, only the ones with the highest capacity rating "
-"are placed in the group."
+"The high capacity group is limited to 75 peers (including the fast group)\n"
+"If there would be more, only the ones with the highest capacity rating are placed in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:164
 msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the "
-"number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
 "stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 "
-"RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
 "(including those in the fast and high capacity groups)"
 msgstr ""
 
@@ -9747,16 +8125,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:177
 msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\""
-" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
 "at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through"
-" them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
 "which reinforces their presence in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid "The router selects peers from the above groups to build tunnels through."
+msgid ""
+"The router selects peers from the above groups to build tunnels through."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:193
@@ -9765,19 +8142,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:194
 msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies"
-" and web servers."
+"Client tunnels are used for application traffic, such as for HTTP proxies "
+"and web servers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:198
 msgid ""
-"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog"
-"/one-cell-enough\">some attacks</a>,\n"
+"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog/one-cell-enough\">some attacks</a>,\n"
 "and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest "
-"group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants"
-" in a tunnel for the same client."
+"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:206
@@ -9786,35 +8160,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:207
 msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as "
-"network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
 "and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected "
-"routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
 "they are called \"exploratory\".\n"
 "These tunnels are usually low-bandwidth."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:215
 msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from"
-" the standard group.\n"
-"If the success rate of these build attempts is low compared to the client"
-" tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high"
-" capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network "
-"performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants"
-" in an exploratory tunnel."
+"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
+"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:223
 msgid ""
-"As the standard group includes a very large subset of all peers the "
-"router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of "
-"all peers,\n"
+"As the standard group includes a very large subset of all peers the router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of all peers,\n"
 "until the build success rate becomes too low."
 msgstr ""
 
@@ -9824,8 +8189,8 @@ msgstr "Restrizioni "
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:232
 msgid ""
-"To prevent some simple attacks, and for performance, there are the "
-"following restrictions:"
+"To prevent some simple attacks, and for performance, there are the following"
+" restrictions:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:236
@@ -9834,8 +8199,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:239
 msgid ""
-"A peer may participate in a maximum of 33&#37; of all tunnels created by "
-"the router."
+"A peer may participate in a maximum of 33&#37; of all tunnels created by the"
+" router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:242
@@ -9856,18 +8221,18 @@ msgid ""
 "Peers are ordered within tunnels to\n"
 "to deal with the <a href=\"%(pdf)s\">predecessor attack</a>\n"
 "<a href=\"%(pdf2008)s\">(2008 update)</a>.\n"
-"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel "
-"page</a>."
+"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid "Continue to analyze an tune speed and capacity calculations as necessary"
+msgid ""
+"Continue to analyze an tune speed and capacity calculations as necessary"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:271
 msgid ""
-"Implement a more aggressive ejection strategy if necessary to control "
-"memory usage as the network grows"
+"Implement a more aggressive ejection strategy if necessary to control memory"
+" usage as the network grows"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:274
@@ -9882,10 +8247,8 @@ msgstr ""
 #, python-format
 msgid ""
 "For those reading the paper\n"
-"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous "
-"Network</a>,\n"
-"please keep in mind the following minor changes in I2P since the paper's "
-"publication:"
+"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>,\n"
+"please keep in mind the following minor changes in I2P since the paper's publication:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:289
@@ -9951,24 +8314,18 @@ msgstr "Crittografia"
 #: i2p2www/pages/site/docs/how/tech-intro.html:21
 msgid ""
 "I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security "
-"conscious \n"
-"applications can operate. Each of these applications may make their own "
-"anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper "
-"implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the "
-"larger \n"
+"network layer, upon which any number of different anonymity or security conscious \n"
+"applications can operate. Each of these applications may make their own anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the larger \n"
 "anonymity set of users already running on top of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:30
 msgid ""
-"Applications available already provide the full range of typical Internet"
-" activities -\n"
+"Applications available already provide the full range of typical Internet activities -\n"
 "<b>anonymous</b> web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other "
-"applications under development."
+"blogging and content syndication, newsgroups, as well as several other applications under development."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:36
@@ -9981,29 +8338,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:38
 msgid ""
-"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a "
-"href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n"
-"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a "
-"href=\"#app.i2pbt\">I2P-bt</a>\n"
+"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n"
+"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a href=\"#app.i2pbt\">I2P-bt</a>\n"
 "and others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:43
 msgid ""
-"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a href=\"#app.i2pbote"
-"\">I2P-Bote</a>."
+"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a "
+"href=\"#app.i2pbote\">I2P-Bote</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:44
 msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software "
-"<a href=\"#app.syndie\">Syndie</a>."
+"Blog: using e.g. the pebble plugin or the distributed blogging software <a "
+"href=\"#app.syndie\">Syndie</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:45
 msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
-"cloud over I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
+"over I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:46
@@ -10012,77 +8367,47 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:49
 msgid ""
-"Unlike web sites hosted within content distribution networks like <a "
-"href=\"#similar.freenet\">Freenet</a> \n"
-"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services "
-"hosted on \n"
-"I2P are fully interactive - there are traditional web-style search "
-"engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and "
-"bridges \n"
-"to query static systems like Freenet without needing to install it "
-"locally."
+"Unlike web sites hosted within content distribution networks like <a href=\"#similar.freenet\">Freenet</a> \n"
+"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services hosted on \n"
+"I2P are fully interactive - there are traditional web-style search engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
+"to query static systems like Freenet without needing to install it locally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:57
 msgid ""
 "With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to "
-"send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes"
-" care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a"
-" \n"
-"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's "
-"anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, "
-"transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high "
-"bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS "
-"proxies \n"
-"available to tie existing applications into the network, their value has "
-"been \n"
-"limited as nearly every application routinely exposes what, in an "
-"anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully "
-"audit \n"
-"an application to ensure proper operation and to assist in that we "
-"provide \n"
-"a series of APIs in various languages which can be used to make the most "
-"out \n"
+"of the message oriented middleware - applications say that they want to send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a \n"
+"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS proxies \n"
+"available to tie existing applications into the network, their value has been \n"
+"limited as nearly every application routinely exposes what, in an anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully audit \n"
+"an application to ensure proper operation and to assist in that we provide \n"
+"a series of APIs in various languages which can be used to make the most out \n"
 "of the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:74
 #, python-format
 msgid ""
-"I2P is not a research project - academic, commercial, or governmental, "
-"but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to "
-"provide \n"
-"a sufficient level of anonymity to those who need it. It has been in "
-"active \n"
-"development since early 2003 with one full time developer and a dedicated"
-" \n"
-"group of part time contributors from all over the world. All of the work "
-"done \n"
-"on I2P is open source and freely available on the <a "
-"href=\"%(site)s\">website</a>, \n"
-"with the majority of the code released outright into the public domain, "
-"though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The "
-"people \n"
-"working on I2P do not control what people release client applications "
-"under, \n"
-"and there are several GPL'ed applications available (<a "
-"href=\"#app.i2ptunnel\">I2PTunnel</a>, \n"
-"<a href=\"#app.i2pmail\">susimail</a>, <a "
-"href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-"
-"Bote</a>, \n"
+"I2P is not a research project - academic, commercial, or governmental, but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
+"a sufficient level of anonymity to those who need it. It has been in active \n"
+"development since early 2003 with one full time developer and a dedicated \n"
+"group of part time contributors from all over the world. All of the work done \n"
+"on I2P is open source and freely available on the <a href=\"%(site)s\">website</a>, \n"
+"with the majority of the code released outright into the public domain, though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The people \n"
+"working on I2P do not control what people release client applications under, \n"
+"and there are several GPL'ed applications available (<a href=\"#app.i2ptunnel\">I2PTunnel</a>, \n"
+"<a href=\"#app.i2pmail\">susimail</a>, <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-Bote</a>, \n"
 "<a href=\"#app.i2phex\">I2Phex</a> and others.).\n"
-"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from "
-"donations,\n"
+"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from donations,\n"
 "and does not receive any tax breaks in any jurisdiction at this time,\n"
 "as many of the developers are themselves anonymous."
 msgstr ""
@@ -10093,40 +8418,27 @@ msgstr "Operazione"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:94
 msgid ""
-"To understand I2P's operation, it is essential to understand a few key "
-"concepts. \n"
-"First, I2P makes a strict separation between the software participating "
-"in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
-" associated \n"
-"with individual applications. The fact that someone is running I2P is not"
-" \n"
-"usually a secret. What is hidden is information on what the user is "
-"doing, \n"
-"if anything at all, as well as what router a particular destination is "
-"connected \n"
-"to. End users will typically have several local destinations on their "
-"router \n"
-"- for instance, one proxying in to IRC servers, another supporting the "
-"user's \n"
-"anonymous webserver (\"eepsite\"), another for an I2Phex instance, "
-"another for \n"
+"To understand I2P's operation, it is essential to understand a few key concepts. \n"
+"First, I2P makes a strict separation between the software participating in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
+"with individual applications. The fact that someone is running I2P is not \n"
+"usually a secret. What is hidden is information on what the user is doing, \n"
+"if anything at all, as well as what router a particular destination is connected \n"
+"to. End users will typically have several local destinations on their router \n"
+"- for instance, one proxying in to IRC servers, another supporting the user's \n"
+"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, another for \n"
 "torrents, etc."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:107
 msgid ""
 "Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of "
-"routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a "
-"single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
 "The decrypted information contains the IP of the next router, along with\n"
 "the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as "
-"\"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages "
-"back,\n"
+"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages back,\n"
 "another tunnel is required."
 msgstr ""
 
@@ -10146,15 +8458,12 @@ msgid ""
 "while <b>\"inbound\" tunnels</b> bring messages to the tunnel creator.\n"
 "Combining these two tunnels allows users to send messages to each other.\n"
 "The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound "
-"tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user"
-"\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user\n"
 "and will send them on until the endpoint (\"Bob\").\n"
 "The endpoint of the outbound tunnel will need to send the message\n"
 "on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted "
-"message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
 "Once the endpoint of the outbound tunnel decrypts the message,\n"
 "it will have instructions to forward the message to the correct\n"
 "inbound gateway (the gateway to \"Bob\")."
@@ -10162,25 +8471,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:140
 msgid ""
-"A third critical concept to understand is I2P's <b>\"network "
-"database\"</b> (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of "
-"metadata \n"
-"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the "
-"routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, "
-"transport \n"
-"addresses, etc), while the leaseSet gives routers the information "
-"necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of "
-"\"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a "
-"specific destination.\n"
+"A third critical concept to understand is I2P's <b>\"network database\"</b> (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of metadata \n"
+"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, transport \n"
+"addresses, etc), while the leaseSet gives routers the information necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
 "The full information contained in a lease:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:151
-msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
+msgid ""
+"Inbound gateway for a tunnel that allows reaching a specific destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:152
@@ -10195,10 +8498,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:155
 msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while "
-"leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router "
-"with his leaseSets)."
+"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:160
@@ -10209,13 +8510,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:164
 msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in "
-"the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
 "This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the "
-"construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has"
-" been constructed."
+"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has been constructed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:171
@@ -10232,30 +8530,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:178
 msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the"
-" \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
-"gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it "
-"with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on"
-" \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
-"endpoint \n"
-"receives those instructions, it forwards the message as requested, and "
-"when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
-" \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, "
-"she \n"
-"needs to transmit her own destination explicitly as part of the message "
-"itself.\n"
-"This can be done by introducing a higher-level layer, which is done in "
-"the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
+"receives those instructions, it forwards the message as requested, and when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
+"needs to transmit her own destination explicitly as part of the message itself.\n"
+"This can be done by introducing a higher-level layer, which is done in the\n"
 "<a href=\"#app.streaming\">streaming</a> library.\n"
 "Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
-"lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
 "for it when he wants to reply, but this is optional."
 msgstr ""
 
@@ -10273,208 +8560,126 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:200
 msgid ""
-"While the tunnels themselves have layered encryption to prevent "
-"unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself "
-"does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is "
-"necessary \n"
-"to add an additional end to end layer of encryption to hide the message "
-"from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a "
-"href=\"#op.garlic\">garlic \n"
-"encryption</a>\" lets Alice's router wrap up multiple messages into a "
-"single \n"
-"\"garlic message\", encrypted to a particular public key so that "
-"intermediary \n"
-"peers cannot determine either how many messages are within the garlic, "
-"what \n"
-"those messages say, or where those individual cloves are destined. For "
-"typical \n"
-"end to end communication between Alice and Bob, the garlic will be "
-"encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be"
-" \n"
+"While the tunnels themselves have layered encryption to prevent unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
+"to add an additional end to end layer of encryption to hide the message from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a href=\"#op.garlic\">garlic \n"
+"encryption</a>\" lets Alice's router wrap up multiple messages into a single \n"
+"\"garlic message\", encrypted to a particular public key so that intermediary \n"
+"peers cannot determine either how many messages are within the garlic, what \n"
+"those messages say, or where those individual cloves are destined. For typical \n"
+"end to end communication between Alice and Bob, the garlic will be encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be \n"
 "encrypted without giving out the public key to Bob's own router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:215
 msgid ""
-"Another important fact to keep in mind is that I2P is entirely message "
-"based \n"
-"and that some messages may be lost along the way. Applications using I2P "
-"can \n"
-"use the message oriented interfaces and take care of their own congestion"
-" \n"
-"control and reliability needs, but most would be best served by reusing "
-"the \n"
-"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as "
-"a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message based \n"
+"and that some messages may be lost along the way. Applications using I2P can \n"
+"use the message oriented interfaces and take care of their own congestion \n"
+"control and reliability needs, but most would be best served by reusing the \n"
+"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n"
 "based network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:225
 msgid ""
 "Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually "
-"preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that "
-"preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel "
-"participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate "
-"before \n"
-"forward it on to the next peer. Eventually, the message arrives at the "
-"endpoint \n"
-"where the messages are split out again and forwarded on as requested. The"
-" \n"
-"difference arises in what the tunnel's creator does - for inbound "
-"tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers "
-"added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-"
-"decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption "
-"are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate before \n"
+"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
+"where the messages are split out again and forwarded on as requested. The \n"
+"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption are \n"
 "added, the message arrives in the clear at the tunnel endpoint."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:240
 msgid ""
-"The choice of specific peers to pass on messages as well as their "
-"particular \n"
-"ordering is important to understanding both I2P's anonymity and "
-"performance \n"
-"characteristics. While the network database (below) has its own criteria "
-"for \n"
-"picking what peers to query and store entries on, tunnel creators may use"
-" any peers \n"
-"in the network in any order (and even any number of times) in a single "
-"tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and "
-"ordering \n"
-"would be driven by the particular needs of the client in tandem with "
-"their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to "
-"gather \n"
-"anonymously, and depending upon untrusted peers to provide this "
-"information \n"
+"The choice of specific peers to pass on messages as well as their particular \n"
+"ordering is important to understanding both I2P's anonymity and performance \n"
+"characteristics. While the network database (below) has its own criteria for \n"
+"picking what peers to query and store entries on, tunnel creators may use any peers \n"
+"in the network in any order (and even any number of times) in a single tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and ordering \n"
+"would be driven by the particular needs of the client in tandem with their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
+"anonymously, and depending upon untrusted peers to provide this information \n"
 "has its own serious anonymity implications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:253
 msgid ""
-"From an anonymity perspective, the simplest technique would be to pick "
-"peers \n"
-"randomly from the entire network, order them randomly and use those peers"
-" \n"
-"in that order for all eternity. From a performance perspective, the "
-"simplest \n"
-"technique would be to pick the fastest peers with the necessary spare "
-"capacity, \n"
-"spreading the load across different peers to handle transparent failover,"
-" \n"
-"and to rebuild the tunnel whenever capacity information changes. While "
-"the \n"
-"former is both brittle and inefficient, the later requires inaccessible "
-"information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a "
-"range \n"
-"of peer selection strategies, coupled with anonymity aware measurement "
-"code \n"
+"From an anonymity perspective, the simplest technique would be to pick peers \n"
+"randomly from the entire network, order them randomly and use those peers \n"
+"in that order for all eternity. From a performance perspective, the simplest \n"
+"technique would be to pick the fastest peers with the necessary spare capacity, \n"
+"spreading the load across different peers to handle transparent failover, \n"
+"and to rebuild the tunnel whenever capacity information changes. While the \n"
+"former is both brittle and inefficient, the later requires inaccessible information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a range \n"
+"of peer selection strategies, coupled with anonymity aware measurement code \n"
 "to organize the peers by their profiles."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:266
 msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts"
-" \n"
-"with by measuring their indirect behavior - for instance, when a peer "
-"responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
-"the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and "
-"outbound) \n"
-"through which the request and response passed, as well as the queried "
-"peer's \n"
-"profile. Direct measurement, such as transport layer latency or "
-"congestion, \n"
-"is not used as part of the profile, as it can be manipulated and "
-"associated \n"
-"with the measuring router, exposing them to trivial attacks. While "
-"gathering \n"
-"these profiles, a series of calculations are run on each to summarize its"
-" \n"
-"performance - its latency, capacity to handle lots of activity, whether "
-"they \n"
-"are currently overloaded, and how well integrated into the network they "
-"seem \n"
-"to be. These calculations are then compared for active peers to organize "
-"the \n"
-"routers into four tiers - fast and high capacity, high capacity, not "
-"failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, "
-"and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts \n"
+"with by measuring their indirect behavior - for instance, when a peer responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
+"through which the request and response passed, as well as the queried peer's \n"
+"profile. Direct measurement, such as transport layer latency or congestion, \n"
+"is not used as part of the profile, as it can be manipulated and associated \n"
+"with the measuring router, exposing them to trivial attacks. While gathering \n"
+"these profiles, a series of calculations are run on each to summarize its \n"
+"performance - its latency, capacity to handle lots of activity, whether they \n"
+"are currently overloaded, and how well integrated into the network they seem \n"
+"to be. These calculations are then compared for active peers to organize the \n"
+"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, and \n"
 "while they currently use fairly simple algorithms, alternatives exist."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:284
 msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy "
-"is to\n"
-"pick peers randomly from the top tier (fast and high capacity), and this "
-"is\n"
-"currently deployed for client tunnels. Exploratory tunnels (used for "
-"netDb and\n"
-"tunnel management) pick peers randomly from the \"not failing\" tier "
-"(which\n"
+"Using this profile data, the simplest reasonable peer selection strategy is to\n"
+"pick peers randomly from the top tier (fast and high capacity), and this is\n"
+"currently deployed for client tunnels. Exploratory tunnels (used for netDb and\n"
+"tunnel management) pick peers randomly from the \"not failing\" tier (which\n"
 "includes routers in 'better' tiers as well), allowing the peer to sample\n"
-"routers more widely, in effect optimizing the peer selection through "
-"randomized\n"
-"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill "
-"climbing</a>. These\n"
+"routers more widely, in effect optimizing the peer selection through randomized\n"
+"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill climbing</a>. These\n"
 "strategies alone do however leak information regarding the peers in the\n"
-"router's top tier through predecessor and netDb harvesting attacks. In "
-"turn,\n"
-"several alternatives exist which, while not balancing the load as evenly,"
-" will\n"
+"router's top tier through predecessor and netDb harvesting attacks. In turn,\n"
+"several alternatives exist which, while not balancing the load as evenly, will\n"
 "address the attacks mounted by particular classes of adversaries."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:298
 msgid ""
-"By picking a random key and ordering the peers according to their XOR "
-"distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting "
-"attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple"
-" \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the "
-"inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
-"deal \n"
-"with predecessor attacks for adversaries which the client contacts, the "
-"outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to "
-"fix \n"
-"on the most exposed point would of course need to have a limit to the "
-"duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted "
-"or \n"
-"proactively avoided to mimic a measured mean time between failures of "
-"other \n"
-"routers. These two strategies can in turn be combined, using a fixed "
-"exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more "
-"rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, "
-"only \n"
-"using individual peers if all of them agree to participate in the same "
-"way \n"
-"each time. This varies from the XOR based ordering in that the "
-"predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes "
-"sure \n"
+"By picking a random key and ordering the peers according to their XOR distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
+"with predecessor attacks for adversaries which the client contacts, the outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
+"on the most exposed point would of course need to have a limit to the duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted or \n"
+"proactively avoided to mimic a measured mean time between failures of other \n"
+"routers. These two strategies can in turn be combined, using a fixed exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
+"using individual peers if all of them agree to participate in the same way \n"
+"each time. This varies from the XOR based ordering in that the predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes sure \n"
 "their order doesn't change."
 msgstr ""
 
@@ -10483,10 +8688,8 @@ msgstr ""
 msgid ""
 "As mentioned before, I2P currently (release 0.8) includes the tiered \n"
 "random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, "
-"management, \n"
-"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel "
-"spec</a>."
+"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
+"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:326
@@ -10500,27 +8703,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:332
 msgid ""
 "A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast "
-"enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing "
-"floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
 "drops too low."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:339
 #, python-format
 msgid ""
-"Other I2P routers will store their data and lookup data by sending simple"
-" 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the "
-"information to other floodfill routers\n"
-"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia "
-"algorithm</a>.\n"
-"The 'lookup' queries currently function differently, to avoid an "
-"important\n"
+"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
+"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algorithm</a>.\n"
+"The 'lookup' queries currently function differently, to avoid an important\n"
 "<a href=\"%(netdb)s#lookup\">security issue</a>.\n"
-"When a lookup is done, the floodfill router will not forward the lookup "
-"to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
 "but will always answer by itself (if it has the requested data)."
 msgstr ""
 
@@ -10530,8 +8726,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:353
 msgid ""
-"A <b>RouterInfo</b> stores information on a specific I2P router and how "
-"to contact it"
+"A <b>RouterInfo</b> stores information on a specific I2P router and how to "
+"contact it"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:354
@@ -10542,14 +8738,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:356
 msgid ""
-"All of this information is signed by the publishing party and verified by"
-" any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of "
-"old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the "
-"correct time, occasionally querying some SNTP servers \n"
-"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by"
-" default)\n"
+"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
+"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n"
 "and detecting skew between routers at the transport layer."
 msgstr ""
 
@@ -10564,10 +8756,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:370
 msgid ""
 "One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will"
-" however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
-" decoded by people with access to the decryption key."
+"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:377
@@ -10576,13 +8766,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:378
 msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive"
-" a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
 "it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to "
-"make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo "
-"files and bootstrap."
+"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:386
@@ -10592,26 +8779,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:387
 msgid ""
 "Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very "
-"large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will"
-" be present\n"
-"on each netDb router. This will cause a deterioration of the percentage "
-"of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next "
-"releases."
+"Currently, this is not a major problem, since the network is not very large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
+"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next releases."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:398
 msgid ""
-"Communication between routers needs to provide confidentiality and "
-"integrity \n"
-"against external adversaries while authenticating that the router "
-"contacted \n"
-"is the one who should receive a given message. The particulars of how "
-"routers \n"
-"communicate with other routers aren't critical - three separate protocols"
-" \n"
+"Communication between routers needs to provide confidentiality and integrity \n"
+"against external adversaries while authenticating that the router contacted \n"
+"is the one who should receive a given message. The particulars of how routers \n"
+"communicate with other routers aren't critical - three separate protocols \n"
 "have been used at different points to provide those bare necessities."
 msgstr ""
 
@@ -10619,12 +8798,9 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree "
-"communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved"
-" \n"
-"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - "
-"\"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved \n"
+"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n"
 "Semireliable UDP\", or \"SSU\"."
 msgstr ""
 
@@ -10636,46 +8812,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:418
 msgid ""
 "The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal "
-"amount \n"
-"of data easily discernible to third parties. It should support high "
-"degree \n"
-"communication as well as TCP-friendly congestion control and may include"
-" \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at "
-"rates \n"
-"sufficient for home users. In addition, it should support techniques for "
-"addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal amount \n"
+"of data easily discernible to third parties. It should support high degree \n"
+"communication as well as TCP-friendly congestion control and may include \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
+"sufficient for home users. In addition, it should support techniques for addressing \n"
 "network obstacles, like most NATs or firewalls."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:428
 #, python-format
 msgid ""
-"Following the introduction of SSU, after issues with congestion collapse"
-" \n"
-"appeared, a new NIO-based TCP transport called <a "
-"href=\"%(ntcp)s\">NTCP</a> \n"
-"was implemented. It is enabled by default for outbound connections only. "
-"Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify"
-" \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
-"inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
-" \n"
+"Following the introduction of SSU, after issues with congestion collapse \n"
+"appeared, a new NIO-based TCP transport called <a href=\"%(ntcp)s\">NTCP</a> \n"
+"was implemented. It is enabled by default for outbound connections only. Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
 "per connection issues of the old TCP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:438
 msgid ""
 "I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids"
-" for \n"
-"the connection and the relative value of these bids assigns the priority."
-" \n"
-"Transports may reply with different bids, depending on whether there is "
-"already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids for \n"
+"the connection and the relative value of these bids assigns the priority. \n"
+"Transports may reply with different bids, depending on whether there is already \n"
 "an established connection to the peer."
 msgstr ""
 
@@ -10683,38 +8845,25 @@ msgstr ""
 #, python-format
 msgid ""
 "The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both "
-"outbound \n"
-"and inbound connections. Your firewall and your I2P router must be "
-"configured \n"
-"to allow inbound NTCP connections. For further information see the <a "
-"href=\"%(ntcp)s\">NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both outbound \n"
+"and inbound connections. Your firewall and your I2P router must be configured \n"
+"to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n"
 "page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:455
 msgid ""
 "A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the "
-"lowest \n"
-"level, inter router communication is protected by the transport layer "
-"security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
-"MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
-"2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other"
-" \n"
-"router's DSA key, plus each network message has their own hash for local "
-"integrity \n"
-"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the "
-"transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and "
-"verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other "
-"messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with "
-"ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
+"level, inter router communication is protected by the transport layer security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other \n"
+"router's DSA key, plus each network message has their own hash for local integrity \n"
+"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
 "(explained below)."
 msgstr ""
 
@@ -10724,51 +8873,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:471
 msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, "
-"allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully "
-"formed \n"
-"messages alongside their own instructions for delivery. Messages are "
-"wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in "
-"cleartext \n"
-"through a peer who should not have access to the information - for "
-"instance, \n"
-"when a router wants to ask another router to participate in a tunnel, "
-"they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving "
-"router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another "
-"example \n"
-"is when a client wants to send a message to a destination - the sender's "
-"router \n"
-"will wrap up that data message (alongside some other messages) into a "
-"garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the "
-"recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
+"messages alongside their own instructions for delivery. Messages are wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in cleartext \n"
+"through a peer who should not have access to the information - for instance, \n"
+"when a router wants to ask another router to participate in a tunnel, they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
+"is when a client wants to send a message to a destination - the sender's router \n"
+"will wrap up that data message (alongside some other messages) into a garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
 "leaseSet, and forward it through the appropriate tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:486
 msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer "
-"includes \n"
-"the ability to request that the clove be forwarded locally, to a remote "
-"router, \n"
-"or to a remote tunnel on a remote router. There are fields in those "
-"instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain "
-"time \n"
-"or condition has been met, though they won't be honored until the <a "
-"href=\"#future.variablelatency\">nontrivial \n"
-"delays</a> are deployed. It is possible to explicitly route garlic "
-"messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel "
-"messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops "
-"prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques "
-"are \n"
+"The \"instructions\" attached to each clove inside the encryption layer includes \n"
+"the ability to request that the clove be forwarded locally, to a remote router, \n"
+"or to a remote tunnel on a remote router. There are fields in those instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain time \n"
+"or condition has been met, though they won't be honored until the <a href=\"#future.variablelatency\">nontrivial \n"
+"delays</a> are deployed. It is possible to explicitly route garlic messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques are \n"
 "not currently used in the existing implementation."
 msgstr ""
 
@@ -10778,54 +8907,35 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:500
 msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple "
-"combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data "
-"confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred"
-" \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
-"describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
 "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:539
 msgid ""
-"Session tags themselves have a very short lifetime, after which they are"
-" \n"
-"discarded if not used. In addition, the quantity stored for each key is "
-"limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or "
-"old \n"
-"messages may be dropped. The sender keeps track whether messages using "
-"session \n"
-"tags are getting through, and if there isn't sufficient communication it "
-"may \n"
-"drop the ones previously assumed to be properly delivered, reverting back"
-" \n"
+"Session tags themselves have a very short lifetime, after which they are \n"
+"discarded if not used. In addition, the quantity stored for each key is limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or old \n"
+"messages may be dropped. The sender keeps track whether messages using session \n"
+"tags are getting through, and if there isn't sufficient communication it may \n"
+"drop the ones previously assumed to be properly delivered, reverting back \n"
 "to the full expensive ElGamal encryption."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:549
 msgid ""
-"One alternative is to transmit only a single session tag, and from that,"
-" \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By "
-"keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the "
-"recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of "
-"periodically \n"
-"bundling a large number of tags is removed, allowing more options in the "
-"space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions "
-"necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the "
-"necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount"
-" \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the "
-"moment, \n"
+"One alternative is to transmit only a single session tag, and from that, \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
+"bundling a large number of tags is removed, allowing more options in the space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
 "there are no immediate plans to move towards these synchronized PRNGs."
 msgstr ""
 
@@ -10835,12 +8945,9 @@ msgstr "Futuro"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:563
 msgid ""
-"While I2P is currently functional and sufficient for many scenarios, "
-"there \n"
-"are several areas which require further improvement to meet the needs of "
-"those \n"
-"facing more powerful adversaries as well as substantial user experience "
-"optimization."
+"While I2P is currently functional and sufficient for many scenarios, there \n"
+"are several areas which require further improvement to meet the needs of those \n"
+"facing more powerful adversaries as well as substantial user experience optimization."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:569
@@ -10849,106 +8956,64 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:570
 msgid ""
-"I2P is an overlay network designed to be run on top of a functional "
-"packet \n"
-"switched network, exploiting the end to end principle to offer anonymity "
-"and \n"
-"security. While the Internet no longer fully embraces the end to end "
-"principle\n"
+"I2P is an overlay network designed to be run on top of a functional packet \n"
+"switched network, exploiting the end to end principle to offer anonymity and \n"
+"security. While the Internet no longer fully embraces the end to end principle\n"
 "(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - "
-"there \n"
-"may be a number of peers along the edges running using restricted routes,"
-" \n"
-"but I2P does not include an appropriate routing algorithm for the "
-"degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a"
-" \n"
+"I2P does require a substantial portion of the network to be reachable - there \n"
+"may be a number of peers along the edges running using restricted routes, \n"
+"but I2P does not include an appropriate routing algorithm for the degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a \n"
 "network employing such an algorithm."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:582
 msgid ""
-"Restricted route operation, where there are limits to what peers are "
-"reachable \n"
-"directly, has several different functional and anonymity implications, "
-"dependent \n"
-"upon how the restricted routes are handled. At the most basic level, "
-"restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow"
-" \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
-"integrating \n"
-"distributed hole punching into the transport layer, allowing people "
-"behind \n"
-"most NATs and firewalls to receive unsolicited connections without any "
-"configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to "
-"routers \n"
-"inside the network, as they can simply get introduced to the peer through"
-" \n"
+"Restricted route operation, where there are limits to what peers are reachable \n"
+"directly, has several different functional and anonymity implications, dependent \n"
+"upon how the restricted routes are handled. At the most basic level, restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
+"distributed hole punching into the transport layer, allowing people behind \n"
+"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to routers \n"
+"inside the network, as they can simply get introduced to the peer through \n"
 "the published introducer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:595
 msgid ""
-"Beyond the functional handling of restricted routes, there are two levels"
-" \n"
-"of restricted operation that can be used to limit the exposure of one's "
-"IP \n"
-"address - using router-specific tunnels for communication, and offering "
-"'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels "
-"or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of "
-"them \n"
-"as part of their routerInfo in place of their transport addresses. When a"
-" \n"
-"peer wants to get in touch with them, they see those tunnel gateways in "
-"the \n"
-"netDb and simply send the relevant message to them through one of the "
-"published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may "
-"do \n"
-"so either directly (if they are willing to expose their IP to the peer) "
-"or \n"
-"indirectly through their outbound tunnels. When the routers that the peer"
-" \n"
-"has direct connections to want to reach it (to forward tunnel messages, "
-"for \n"
-"instance), they simply prioritize their direct connection over the "
-"published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the "
-"restricted \n"
-"route by not publishing any router addresses. Such a router would not "
-"even \n"
-"need to publish their routerInfo in the netDb, merely providing their "
-"self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the "
-"router's \n"
-"public keys). Both levels of restricted route operation are planned for "
-"I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels \n"
+"of restricted operation that can be used to limit the exposure of one's IP \n"
+"address - using router-specific tunnels for communication, and offering 'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
+"as part of their routerInfo in place of their transport addresses. When a \n"
+"peer wants to get in touch with them, they see those tunnel gateways in the \n"
+"netDb and simply send the relevant message to them through one of the published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
+"so either directly (if they are willing to expose their IP to the peer) or \n"
+"indirectly through their outbound tunnels. When the routers that the peer \n"
+"has direct connections to want to reach it (to forward tunnel messages, for \n"
+"instance), they simply prioritize their direct connection over the published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
+"route by not publishing any router addresses. Such a router would not even \n"
+"need to publish their routerInfo in the netDb, merely providing their self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
+"public keys). Both levels of restricted route operation are planned for I2P \n"
 "2.0."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:617
 msgid ""
-"There are tradeoffs for those behind restricted routes, as they would "
-"likely \n"
-"participate in other people's tunnels less frequently, and the routers "
-"which \n"
-"they are connected to would be able to infer traffic patterns that would "
-"not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is "
-"less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, "
-"of \n"
-"course, assumes that the peers that the router behind a restricted route "
-"contacts \n"
-"are not hostile - either the network is large enough that the probability"
-" \n"
-"of using a hostile peer to get connected is small enough, or trusted (and"
-" \n"
+"There are tradeoffs for those behind restricted routes, as they would likely \n"
+"participate in other people's tunnels less frequently, and the routers which \n"
+"they are connected to would be able to infer traffic patterns that would not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, of \n"
+"course, assumes that the peers that the router behind a restricted route contacts \n"
+"are not hostile - either the network is large enough that the probability \n"
+"of using a hostile peer to get connected is small enough, or trusted (and \n"
 "perhaps temporary) peers are used instead."
 msgstr ""
 
@@ -10958,45 +9023,28 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:630
 msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency "
-"communication, \n"
-"it was designed with variable latency services in mind from the "
-"beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the"
-" \n"
-"anonymity of medium and high latency communication while still blending "
-"their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can "
-"offer \n"
-"its own medium and high latency communication through the garlic "
-"encryption \n"
-"- specifying that the message should be sent after a certain delay, at a "
-"certain \n"
-"time, after a certain number of messages have passed, or another mix "
-"strategy. \n"
-"With the layered encryption, only the router that the clove exposed the "
-"delay \n"
-"request would know that the message requires high latency, allowing the "
-"traffic \n"
-"to blend in further with the low latency traffic. Once the transmission "
-"precondition \n"
-"is met, the router holding on to the clove (which itself would likely be "
-"a \n"
-"garlic message) simply forwards it as requested - to a router, to a "
-"tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
+"it was designed with variable latency services in mind from the beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the \n"
+"anonymity of medium and high latency communication while still blending their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
+"its own medium and high latency communication through the garlic encryption \n"
+"- specifying that the message should be sent after a certain delay, at a certain \n"
+"time, after a certain number of messages have passed, or another mix strategy. \n"
+"With the layered encryption, only the router that the clove exposed the delay \n"
+"request would know that the message requires high latency, allowing the traffic \n"
+"to blend in further with the low latency traffic. Once the transmission precondition \n"
+"is met, the router holding on to the clove (which itself would likely be a \n"
+"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
 "or, most likely, to a remote client destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:647
 msgid ""
-"There are a substantial number of ways to exploit this capacity for high"
-" \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for "
-"the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
-" \n"
-"latency comm can offer should look towards the application layer to "
-"provide \n"
+"There are a substantial number of ways to exploit this capacity for high \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
+"latency comm can offer should look towards the application layer to provide \n"
 "it."
 msgstr ""
 
@@ -11030,18 +9078,12 @@ msgstr "Sistemi similari"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:665
 msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware,"
-" \n"
-"the topology of DHTs, the anonymity and cryptography of free route "
-"mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not "
-"from \n"
-"novel concepts of algorithms though, but from careful engineering "
-"combining \n"
-"the research results of existing systems and papers. While there are a "
-"few \n"
-"similar efforts worth reviewing, both for technical and functional "
-"comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware, \n"
+"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not from \n"
+"novel concepts of algorithms though, but from careful engineering combining \n"
+"the research results of existing systems and papers. While there are a few \n"
+"similar efforts worth reviewing, both for technical and functional comparisons, \n"
 "two in particular are pulled out here - Tor and Freenet."
 msgstr ""
 
@@ -11058,209 +9100,127 @@ msgstr "sito web"
 #: i2p2www/pages/site/docs/how/tech-intro.html:682
 msgid ""
 "At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the "
-"early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing "
-"and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an "
-"essentially \n"
-"trusted, centralized system with directory servers, I2P has a self "
-"organizing \n"
-"network database with each peer taking on the responsibility of profiling"
-" \n"
-"other routers to determine how best to exploit available resources. "
-"Another \n"
-"key difference is that while both I2P and Tor use layered and ordered "
-"paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
-"network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to "
-"transparently \n"
-"route around congestion or other network failures, operate redundant "
-"pathways, \n"
-"and load balance the data across available resources. While Tor offers "
-"the \n"
-"useful outproxy functionality by offering integrated outproxy discovery "
-"and \n"
-"selection, I2P leaves such application layer decisions up to applications"
-" \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like "
-"streaming \n"
-"library itself to the application layer, allowing developers to "
-"experiment \n"
-"with different strategies, exploiting their domain specific knowledge to "
-"offer \n"
+"similarities. While I2P's development began before we were aware of the early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
+"trusted, centralized system with directory servers, I2P has a self organizing \n"
+"network database with each peer taking on the responsibility of profiling \n"
+"other routers to determine how best to exploit available resources. Another \n"
+"key difference is that while both I2P and Tor use layered and ordered paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
+"route around congestion or other network failures, operate redundant pathways, \n"
+"and load balance the data across available resources. While Tor offers the \n"
+"useful outproxy functionality by offering integrated outproxy discovery and \n"
+"selection, I2P leaves such application layer decisions up to applications \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
+"library itself to the application layer, allowing developers to experiment \n"
+"with different strategies, exploiting their domain specific knowledge to offer \n"
 "better performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:703
 msgid ""
-"From an anonymity perspective, there is much similarity when the core "
-"networks \n"
-"are compared. However, there are a few key differences. When dealing with"
-" \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels"
-" \n"
-"expose half as much traffic data than would be exposed with Tor's duplex "
-"circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response "
-"would \n"
-"follow the same path in Tor, while in I2P the packets making up the "
-"request \n"
-"would go out through one or more outbound tunnels and the packets making "
-"up \n"
-"the response would come back through one or more different inbound "
-"tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently "
-"address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be "
-"necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same "
-"routers."
+"From an anonymity perspective, there is much similarity when the core networks \n"
+"are compared. However, there are a few key differences. When dealing with \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
+"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response would \n"
+"follow the same path in Tor, while in I2P the packets making up the request \n"
+"would go out through one or more outbound tunnels and the packets making up \n"
+"the response would come back through one or more different inbound tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same routers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:717
 msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel "
-"creation, \n"
-"as simple packet counting and timing measurements as the cells in a "
-"circuit \n"
-"pass through an adversary's node exposes statistical information "
-"regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel "
-"creation \n"
-"with a single message so that this data is not exposed. Protecting the "
-"position \n"
-"in a tunnel is important, as an adversary would otherwise be able to "
-"mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation "
-"attacks."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
+"as simple packet counting and timing measurements as the cells in a circuit \n"
+"pass through an adversary's node exposes statistical information regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
+"with a single message so that this data is not exposed. Protecting the position \n"
+"in a tunnel is important, as an adversary would otherwise be able to mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:727
 msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-"
-"trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will "
-"not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
 "offer this topology until <a href=\"#future.restricted\">2.0</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:733
 msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor "
-"works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P "
-"works \n"
-"towards offering a decentralized resilient network in itself. In theory, "
-"both \n"
-"can be used to achieve both purposes, but given limited development "
-"resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have "
-"considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but "
-"concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet "
-"switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P works \n"
+"towards offering a decentralized resilient network in itself. In theory, both \n"
+"can be used to achieve both purposes, but given limited development resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
 "architecture will be able to exploit scarce resources more effectively."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:747
 msgid ""
-"Freenet played a large part in the initial stages of I2P's design - "
-"giving \n"
-"proof to the viability of a vibrant pseudonymous community completely "
-"contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies"
-" \n"
-"could be avoided. The first seed of I2P began as a replacement "
-"communication \n"
-"layer for Freenet, attempting to factor out the complexities of a "
-"scalable, \n"
-"anonymous and secure point to point communication from the complexities "
-"of \n"
-"a censorship resistant distributed data store. Over time however, some of"
-" \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms "
-"made \n"
-"it clear that I2P's focus should stay strictly on providing a generic "
-"anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the "
-"years, \n"
-"the Freenet developers have come to see the weaknesses in the older "
-"design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to "
-"offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a "
-"mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
-"through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data "
-"according \n"
+"Freenet played a large part in the initial stages of I2P's design - giving \n"
+"proof to the viability of a vibrant pseudonymous community completely contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies \n"
+"could be avoided. The first seed of I2P began as a replacement communication \n"
+"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
+"anonymous and secure point to point communication from the complexities of \n"
+"a censorship resistant distributed data store. Over time however, some of \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
+"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the years, \n"
+"the Freenet developers have come to see the weaknesses in the older design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
 "to Freenet's heuristic distributed data storage algorithms."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:766
 msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet "
-"natively \n"
-"provides many of the tools for operating medium and high latency systems,"
-" \n"
-"while I2P natively provides the low latency mix network suitable for "
-"offering \n"
-"adequate anonymity. The logic of separating the mixnet from the "
-"censorship-\n"
-"resistant distributed data store still seems self-evident from an "
-"engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully "
-"the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing"
-" \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
+"provides many of the tools for operating medium and high latency systems, \n"
+"while I2P natively provides the low latency mix network suitable for offering \n"
+"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
+"resistant distributed data store still seems self-evident from an engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing \n"
 "(or helping to improve, as necessary) existing mixnets like I2P or Tor."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:777
 msgid ""
 "It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using "
-"restricted \n"
-"routes between peers of various trust. While insufficient information has"
-" \n"
-"been made publicly available regarding how such a system would operate "
-"for \n"
-"a full review, from what has been said the anonymity and scalability "
-"claims \n"
-"seem highly dubious. In particular, the appropriateness for use in "
-"hostile \n"
-"regimes against state level adversaries has been tremendously overstated,"
-" \n"
-"and any analysis on the implications of resource scarcity upon the "
-"scalability \n"
-"of the network has seemingly been avoided. Further questions regarding "
-"susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth"
-" \n"
-"review of this \"globally scalable darknet\" will have to wait until the "
-"Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
+"routes between peers of various trust. While insufficient information has \n"
+"been made publicly available regarding how such a system would operate for \n"
+"a full review, from what has been said the anonymity and scalability claims \n"
+"seem highly dubious. In particular, the appropriateness for use in hostile \n"
+"regimes against state level adversaries has been tremendously overstated, \n"
+"and any analysis on the implications of resource scarcity upon the scalability \n"
+"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
+"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
 "team makes more information available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:793
 msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote "
-"destinations \n"
-"and receives messages targeting local destinations - most of the "
-"interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an "
-"anonymous \n"
-"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming"
-" library</a> \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. "
-"Beyond \n"
-"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP "
-"proxying \n"
-"system for either getting into or out of the I2P network, plus a variety "
-"of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
+"and receives messages targeting local destinations - most of the interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
+"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming library</a> \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
+"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP proxying \n"
+"system for either getting into or out of the I2P network, plus a variety of \n"
 "network applications provide further functionality for end users."
 msgstr ""
 
@@ -11270,63 +9230,46 @@ msgstr "Libreria di streaming"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:805
 msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface "
-"(mirroring TCP sockets),\n"
-"and the implementation supports a <a "
-"href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding "
-"window protocol</a>\n"
-"with several optimizations, to take into account the high delay over I2P."
-"\n"
+"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
+"and the implementation supports a <a href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding window protocol</a>\n"
+"with several optimizations, to take into account the high delay over I2P.\n"
 "Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable "
-"tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the "
-"latency \n"
+"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the latency \n"
 "of multiple messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:815
 msgid ""
 "In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering "
-"messages \n"
-"has been optimized to allow individual messages passed to contain as much"
-" \n"
-"information as is available. For instance, a small HTTP transaction "
-"proxied \n"
-"through the streaming library can be completed in a single round trip - "
-"the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request "
-"typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
-" \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell "
-"the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
-"can \n"
+"messages, the streaming library's protocol for scheduling and delivering messages \n"
+"has been optimized to allow individual messages passed to contain as much \n"
+"information as is available. For instance, a small HTTP transaction proxied \n"
+"through the streaming library can be completed in a single round trip - the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
 "deliver the full response to the browser immediately."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:828
 msgid ""
-"On the whole, however, the streaming library bears much resemblance to an"
-" \n"
-"abstraction of TCP, with its sliding windows, congestion control "
-"algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior "
-"(ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an \n"
+"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
 "SYN, FIN, RST, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:835
-msgid "Naming library and addressbook"
+msgid "Naming library and address book"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:836
 #, python-format
 msgid ""
-"For more information see the <a href=\"%(naming)s\">Naming and "
-"Addressbook</a> page."
+"For more information see the <a href=\"%(naming)s\">Naming and Address "
+"Book</a> page."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:840
@@ -11344,227 +9287,142 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:842
 msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning"
-" \n"
-"with advocates across the spectrum of possibilities. However, given I2P's"
-" \n"
-"inherent demand for secure communication and decentralized operation, the"
-" \n"
-"traditional DNS-style naming system is clearly out, as are \"majority "
-"rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a "
-"base \n"
-"implementation designed to work off a local name to destination mapping, "
-"as \n"
-"well as an optional add-on application called the \"addressbook\". The "
-"addressbook \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming "
-"system, \n"
-"sacrificing only the call for all human readable names to be globally "
-"unique \n"
-"by mandating only local uniqueness. While all messages in I2P are "
-"cryptographically \n"
-"addressed by their destination, different people can have local "
-"addressbook \n"
-"entries for \"Alice\" which refer to different destinations. People can "
-"still \n"
-"discover new names by importing published addressbooks of peers specified"
-" \n"
-"in their web of trust, by adding in the entries provided through a third "
-"party, \n"
-"or (if some people organize a series of published addressbooks using a "
-"first \n"
-"come first serve registration system) people can choose to treat these "
-"addressbooks \n"
+"Naming within I2P has been an oft-debated topic since the very beginning \n"
+"with advocates across the spectrum of possibilities. However, given I2P's \n"
+"inherent demand for secure communication and decentralized operation, the \n"
+"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a base \n"
+"implementation designed to work off a local name to destination mapping, as \n"
+"well as an optional add-on application called the \"Address Book\". The address book \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
+"sacrificing only the call for all human readable names to be globally unique \n"
+"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
+"addressed by their destination, different people can have local address book \n"
+"entries for \"Alice\" which refer to different destinations. People can still \n"
+"discover new names by importing published address books of peers specified \n"
+"in their web of trust, by adding in the entries provided through a third party, \n"
+"or (if some people organize a series of published address books using a first \n"
+"come first serve registration system) people can choose to treat these address books \n"
 "as name servers, emulating traditional DNS."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:862
 msgid ""
 "I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations "
-"have \n"
-"no value. DNSsec itself still falls back on registrars and certificate "
-"authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or "
-"the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, "
-"and \n"
-"a destination itself is just a pair of public keys and a certificate. "
-"DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup "
-"path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a "
-"certificate \n"
-"authenticating the responses as signed by some centralized certificate "
-"authority \n"
-"would address many of the hostile nameserver issues but would leave open "
-"replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations have \n"
+"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, and \n"
+"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
+"authenticating the responses as signed by some centralized certificate authority \n"
+"would address many of the hostile nameserver issues but would leave open replay \n"
 "attacks as well as hostile certificate authority attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:876
 msgid ""
-"Voting style naming is dangerous as well, especially given the "
-"effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an"
-" \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a "
-"given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as"
-" \n"
-"the network grows the load required to contact everyone to conduct online"
-" \n"
-"voting is implausible, or if the full network is not queried, different "
-"sets \n"
+"Voting style naming is dangerous as well, especially given the effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as \n"
+"the network grows the load required to contact everyone to conduct online \n"
+"voting is implausible, or if the full network is not queried, different sets \n"
 "of answers may be reachable."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:886
 msgid ""
-"As with the Internet however, I2P is keeping the design and operation of"
-" \n"
-"a naming system out of the (IP-like) communication layer. The bundled "
-"naming \n"
-"library includes a simple service provider interface which alternate "
-"naming \n"
-"systems can plug into, allowing end users to drive what sort of naming "
-"tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of \n"
+"a naming system out of the (IP-like) communication layer. The bundled naming \n"
+"library includes a simple service provider interface which alternate naming \n"
+"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
 "they prefer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:895
 msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which"
-"\n"
-"is distributed separately. For more information see the <a "
-"href=\"http://syndie.i2p2.de/\">Syndie</a>\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
+"is distributed separately. For more information see the <a href=\"http://syndie.i2p2.de/\">Syndie</a>\n"
 "pages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:901
 msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content "
-"aggregation \n"
-"system. It lets you create information, share it with others, and read "
-"posts \n"
-"from those you're interested in, all while taking into consideration your"
-" \n"
-"needs for security and anonymity. Rather than building its own content "
-"distribution \n"
-"network, Syndie is designed to run on top of existing networks, "
-"syndicating \n"
-"content through eepsites, Tor hidden services, Freenet freesites, normal "
-"websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
-"Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or "
-"archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
+"system. It lets you create information, share it with others, and read posts \n"
+"from those you're interested in, all while taking into consideration your \n"
+"needs for security and anonymity. Rather than building its own content distribution \n"
+"network, Syndie is designed to run on top of existing networks, syndicating \n"
+"content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
 "it."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:916
 msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client "
-"application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel"
-" \n"
-"can be viewed as four separate proxying applications - a \"client\" which"
-" receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an "
-"\"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
-"requests to \n"
-"the appropriate I2P destination (after querying the naming service if "
-"necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a "
-"destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which "
-"extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer "
-"operation. \n"
-"There is an additional \"socksclient\" application, but its use is not "
-"encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
+"can be viewed as four separate proxying applications - a \"client\" which receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
+"the appropriate I2P destination (after querying the naming service if necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
+"There is an additional \"socksclient\" application, but its use is not encouraged \n"
 "for reasons previously mentioned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:930
 msgid ""
-"I2P itself is not an outproxy network - the anonymity and security "
-"concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have "
-"kept \n"
-"I2P's design focused on providing an anonymous network which capable of "
-"meeting \n"
-"the user's needs without requiring external resources. However, the "
-"I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the "
-"hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-"
-"provided \n"
-"set of outproxies and forwards the request to them. These destinations "
-"are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have "
-"explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running "
-"an \n"
-"outproxy doesn't automatically tell other people to proxy through you. "
-"While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of "
-"concept \n"
-"for using I2P and provide some functionality under a threat model which "
-"may \n"
+"I2P itself is not an outproxy network - the anonymity and security concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have kept \n"
+"I2P's design focused on providing an anonymous network which capable of meeting \n"
+"the user's needs without requiring external resources. However, the I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
+"set of outproxies and forwards the request to them. These destinations are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running an \n"
+"outproxy doesn't automatically tell other people to proxy through you. While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
+"for using I2P and provide some functionality under a threat model which may \n"
 "be sufficient for some users."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:946
 msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" "
-"pointing \n"
-"at a webserver lets anyone run their own anonymous website (or "
-"\"eepsite\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can"
-" \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously "
-"hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their "
-"local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. "
-"End \n"
-"users also have \"client\" tunnels pointing at <a "
-"href=\"#app.i2pmail\">I2Pmail's</a> \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
-" pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
-"I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run "
-"\"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
+"at a webserver lets anyone run their own anonymous website (or \"I2P Site\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
+"users also have \"client\" tunnels pointing at <a href=\"#app.i2pmail\">I2Pmail's</a> \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run \"client\" \n"
 "proxies to access the \"server\" instances pointing at an NNTP server."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:963
 msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the"
-" \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded "
-"through \n"
-"the eepproxy to eepsites specified in the torrent file while tracker "
-"responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open "
-"up \n"
-"a <a href=\"#app.streaming\">streaming lib</a> connection to query them "
-"for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
+"the eepproxy to I2P Sites specified in the torrent file while tracker responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
+"a <a href=\"#app.streaming\">streaming lib</a> connection to query them for \n"
 "blocks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:972
 msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
-" \n"
-"a few modifications as necessary to strip any anonymity-compromising "
-"information \n"
-"from the application and to take into consideration the fact that IPs "
-"cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
+"a few modifications as necessary to strip any anonymity-compromising information \n"
+"from the application and to take into consideration the fact that IPs cannot \n"
 "be used for identifying peers."
 msgstr ""
 
@@ -11577,10 +9435,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:986
 msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous "
-"BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality "
-"through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality through \n"
 "a plain HTML web interface."
 msgstr ""
 
@@ -11588,9 +9444,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Robert is a Bittorrent client written in Python.\n"
-"It is hosted on <a "
-"href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- "
-"TODO: expand -->"
+"It is hosted on <a href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- TODO: expand -->"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1003
@@ -11602,12 +9456,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1011
 msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
-" \n"
-"run entirely on top of I2P. While it has disabled some of Phex's "
-"functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and "
-"chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
+"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
 "system is fully functional."
 msgstr ""
 
@@ -11620,62 +9471,39 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:1029
 #, python-format
 msgid ""
-"I2Pmail is more a service than an application - postman offers both "
-"internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances"
-" \n"
-"accessing a series of components developed with mastiejaner, allowing "
-"people \n"
-"to use their preferred mail clients to send and receive mail "
-"pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information,"
-" \n"
-"I2P bundles susi23's web based susimail client which has been built "
-"specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
-"transparent \n"
-"virus filtering as well as denial of service prevention with hashcash "
-"augmented \n"
-"quotas. In addition, each user has control of their batching strategy "
-"prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the "
-"mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate "
-"with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
-"those \n"
-"non-anonymous locations does not give access to the mail accounts or "
-"activity \n"
-"patterns of the user. At the moment the developers work on a "
-"decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the "
-"eepsite \n"
+"I2Pmail is more a service than an application - postman offers both internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances \n"
+"accessing a series of components developed with mastiejaner, allowing people \n"
+"to use their preferred mail clients to send and receive mail pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information, \n"
+"I2P bundles susi23's web based susimail client which has been built specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
+"virus filtering as well as denial of service prevention with hashcash augmented \n"
+"quotas. In addition, each user has control of their batching strategy prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
+"non-anonymous locations does not give access to the mail accounts or activity \n"
+"patterns of the user. At the moment the developers work on a decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the I2P Site \n"
 "<a href=\"http://%(postman)s/\">%(postman)s</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1051
 msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the "
-"traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a "
-"server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
 "Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the "
-"e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically "
-"encrypted end-to-end. <br>\n"
-"Furthermore, I2P-Bote offers a remailer function on top of I2P, for "
-"increased high-latency anonymity."
+"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
+"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. <br>\n"
+"Furthermore, I2P-Bote offers a remailer function on top of I2P, for increased high-latency anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1061
 msgid ""
-"I2P-Messenger is an end-to-end encrypted serverless communication "
-"application.\n"
-"For communication between two users, they need to give each other their "
-"destination keys, to allow the other to connect.\n"
-"It supports file transfer and has a search for other users, based on "
-"Seedless."
+"I2P-Messenger is an end-to-end encrypted serverless communication application.\n"
+"For communication between two users, they need to give each other their destination keys, to allow the other to connect.\n"
+"It supports file transfer and has a search for other users, based on Seedless."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:2
@@ -11825,18 +9653,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:71
 msgid ""
 "Your level of anonymity can be described as \"how hard it is for someone\n"
-"to find out information you don't want them to know?\" - who you are, "
-"where\n"
-"you are located, who you communicate with, or even when you communicate."
-"  \n"
-"\"Perfect\" anonymity is not a useful concept here - software will not "
-"make \n"
-"you indistinguishable from people that don't use computers or who are not"
-" on\n"
-"the Internet.  Instead, we are working to provide sufficient anonymity to"
-" meet the\n"
-"real needs of whomever we can - from those simply browsing websites, to "
-"those exchanging\n"
+"to find out information you don't want them to know?\" - who you are, where\n"
+"you are located, who you communicate with, or even when you communicate.  \n"
+"\"Perfect\" anonymity is not a useful concept here - software will not make \n"
+"you indistinguishable from people that don't use computers or who are not on\n"
+"the Internet.  Instead, we are working to provide sufficient anonymity to meet the\n"
+"real needs of whomever we can - from those simply browsing websites, to those exchanging\n"
 "data, to those fearful of discovery by powerful organizations or states."
 msgstr ""
 
@@ -11844,17 +9666,14 @@ msgstr ""
 msgid ""
 "The question of whether I2P provides sufficient anonymity for your \n"
 "particular needs is a hard one, but this page will hopefully assist in \n"
-"answering that question by exploring how I2P operates under various "
-"attacks\n"
+"answering that question by exploring how I2P operates under various attacks\n"
 "so that you may decide whether it meets your needs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:89
 msgid ""
-"We welcome further research and analysis on I2P's resistance to the "
-"threats described below.\n"
-"More review of existing literature (much of it focused on Tor) and "
-"original\n"
+"We welcome further research and analysis on I2P's resistance to the threats described below.\n"
+"More review of existing literature (much of it focused on Tor) and original\n"
 "work focused on I2P is needed."
 msgstr ""
 
@@ -11866,69 +9685,52 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n"
-"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in"
-" mind when \n"
+"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in mind when \n"
 "reviewing related literature:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:102
 msgid ""
-"<b>I2P is a free route mixnet</b> - the message creator explicitly "
-"defines the\n"
-"path that messages will be sent out (the outbound tunnel), and the "
-"message \n"
-"recipient explicitly defines the path that messages will be received on "
-"(the\n"
+"<b>I2P is a free route mixnet</b> - the message creator explicitly defines the\n"
+"path that messages will be sent out (the outbound tunnel), and the message \n"
+"recipient explicitly defines the path that messages will be received on (the\n"
 "inbound tunnel)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:108
 msgid ""
-"<b>I2P has no official entry and exit points</b> - all peers fully "
-"participate in the \n"
+"<b>I2P has no official entry and exit points</b> - all peers fully participate in the \n"
 "mix, and there are no network layer in- or out-proxies (however, at the \n"
 "application layer, a few proxies do exist)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:113
 msgid ""
-"<b>I2P is fully distributed</b> - there are no central controls or "
-"authorities.\n"
-"One could modify some routers to operate mix cascades (building tunnels "
-"and giving\n"
-"out the keys necessary to control the forwarding at the tunnel endpoint) "
-"or directory \n"
-"based profiling and selection, all without breaking compatibility with "
-"the rest of \n"
-"the network, but doing so is of course not necessary (and may even harm "
-"one's\n"
+"<b>I2P is fully distributed</b> - there are no central controls or authorities.\n"
+"One could modify some routers to operate mix cascades (building tunnels and giving\n"
+"out the keys necessary to control the forwarding at the tunnel endpoint) or directory \n"
+"based profiling and selection, all without breaking compatibility with the rest of \n"
+"the network, but doing so is of course not necessary (and may even harm one's\n"
 "anonymity)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:123
 #, python-format
 msgid ""
-"We have documented plans to implement <a "
-"href=\"%(todo)s#stop\">nontrivial delays</a>\n"
+"We have documented plans to implement <a href=\"%(todo)s#stop\">nontrivial delays</a>\n"
 "and <a href=\"%(todo)s#batching\">batching strategies</a> \n"
-"whose existence is only known to the particular hop or tunnel gateway "
-"that \n"
-"receives the message, allowing a mostly low latency mixnet to provide "
-"cover \n"
+"whose existence is only known to the particular hop or tunnel gateway that \n"
+"receives the message, allowing a mostly low latency mixnet to provide cover \n"
 "traffic for higher latency communication (e.g. email).\n"
-"However we are aware that significant delays are required to provide "
-"meaningful\n"
-"protection, and that implementation of such delays will be a significant "
-"challenge.\n"
-"It is not clear at this time whether we will actually implement these "
-"delay features."
+"However we are aware that significant delays are required to provide meaningful\n"
+"protection, and that implementation of such delays will be a significant challenge.\n"
+"It is not clear at this time whether we will actually implement these delay features."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:134
 msgid ""
 "In theory, routers along the message path may inject an \n"
-"arbitrary number of hops before forwarding the message to the next peer, "
-"though\n"
+"arbitrary number of hops before forwarding the message to the next peer, though\n"
 "the current implementation does not."
 msgstr ""
 
@@ -11942,8 +9744,7 @@ msgid ""
 "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n"
 "<a href=\"http://freenetproject.org/\">[Freenet]</a>, and\n"
 "<a href=\"https://www.torproject.org/\">[Tor]</a>.\n"
-"Our design benefits substantially from the research published around that"
-" time.\n"
+"Our design benefits substantially from the research published around that time.\n"
 "I2P uses several onion routing techniques, so we continue to benefit\n"
 "from the significant academic interest in Tor."
 msgstr ""
@@ -11951,12 +9752,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:152
 msgid ""
 "Taking from the attacks and analysis put forth in the \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity "
-"literature</a> (largely \n"
-"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: "
-"Protocols, Attacks, Design \n"
-"Issues and Open Problems</a>), the following briefly describes a wide "
-"variety \n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity literature</a> (largely \n"
+"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: Protocols, Attacks, Design \n"
+"Issues and Open Problems</a>), the following briefly describes a wide variety \n"
 "of attacks as well as many of I2Ps defenses.  We update\n"
 "this list to include new attacks as they are identified."
 msgstr ""
@@ -11984,66 +9782,46 @@ msgstr ""
 msgid ""
 "The\n"
 "<a href=\"%(comparisons)s\">network comparisons</a> and\n"
-"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also "
-"be helpful\n"
+"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also be helpful\n"
 "to review."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:210
 msgid ""
-"A brute force attack can be mounted by a global passive or active "
-"adversary, \n"
-"watching all the messages pass between all of the nodes and attempting to"
-" correlate\n"
-"which message follows which path.  Mounting this attack against I2P "
-"should be \n"
-"nontrivial, as all peers in the network are frequently sending messages "
-"(both\n"
-"end to end and network maintenance messages), plus an end to end message "
-"changes\n"
-"size and data along its path.  In addition, the external adversary does "
-"not have\n"
-"access to the messages either, as inter-router communication is both "
-"encrypted\n"
-"and streamed (making two 1024 byte messages indistinguishable from one "
-"2048 byte\n"
+"A brute force attack can be mounted by a global passive or active adversary, \n"
+"watching all the messages pass between all of the nodes and attempting to correlate\n"
+"which message follows which path.  Mounting this attack against I2P should be \n"
+"nontrivial, as all peers in the network are frequently sending messages (both\n"
+"end to end and network maintenance messages), plus an end to end message changes\n"
+"size and data along its path.  In addition, the external adversary does not have\n"
+"access to the messages either, as inter-router communication is both encrypted\n"
+"and streamed (making two 1024 byte messages indistinguishable from one 2048 byte\n"
 "message)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:222
 msgid ""
-"However, a powerful attacker can use brute force to detect trends - if "
-"they \n"
-"can send 5GB to an I2P destination and monitor everyone's network "
-"connection,\n"
-"they can eliminate all peers who did not receive 5GB of data.  Techniques"
-" to \n"
+"However, a powerful attacker can use brute force to detect trends - if they \n"
+"can send 5GB to an I2P destination and monitor everyone's network connection,\n"
+"they can eliminate all peers who did not receive 5GB of data.  Techniques to \n"
 "defeat this attack exist, but may be prohibitively expensive (see: \n"
-"<a "
-"href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s "
-"mimics\n"
-"or constant rate traffic).  Most users are not concerned with this "
-"attack, as \n"
-"the cost of mounting it are extreme (and often require illegal activity)."
-"  \n"
+"<a href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s mimics\n"
+"or constant rate traffic).  Most users are not concerned with this attack, as \n"
+"the cost of mounting it are extreme (and often require illegal activity).  \n"
 "However, the attack is still possible, for example by an observer at\n"
 "a large ISP or an Internet exchange point.\n"
 "Those who want to defend against it \n"
 "would want to take appropriate countermeasures, such as\n"
-"setting low bandwidth limits, and using unpublished or encrypted "
-"leasesets for eepsites.\n"
-"Other countermeasures, such as nontrivial delays and restricted routes, "
-"are\n"
+"setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites.\n"
+"Other countermeasures, such as nontrivial delays and restricted routes, are\n"
 "not currently implemented."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:239
 #, python-format
 msgid ""
-"As a partial defense against a single router or group of routers trying "
-"to route all the network's traffic,\n"
-"routers contain limits as to how many tunnels can be routed through a "
-"single peer.\n"
+"As a partial defense against a single router or group of routers trying to route all the network's traffic,\n"
+"routers contain limits as to how many tunnels can be routed through a single peer.\n"
 "As the network grows, these limits are subject to further adjustment.\n"
 "Other mechanisms for peer rating, selection and avoidance\n"
 "are discussed on the\n"
@@ -12052,51 +9830,34 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:254
 msgid ""
-"I2P's messages are unidirectional and do not necessarily imply that a "
-"reply\n"
+"I2P's messages are unidirectional and do not necessarily imply that a reply\n"
 "will be sent.  However, applications on top of I2P will most likely have\n"
-"recognizable patterns within the frequency of their messages - for "
-"instance, an \n"
-"HTTP request will be a small message with a large sequence of reply "
-"messages \n"
-"containing the HTTP response.  Using this data as well as a broad view of"
-" the \n"
-"network topology, an attacker may be able to disqualify some links as "
-"being too \n"
+"recognizable patterns within the frequency of their messages - for instance, an \n"
+"HTTP request will be a small message with a large sequence of reply messages \n"
+"containing the HTTP response.  Using this data as well as a broad view of the \n"
+"network topology, an attacker may be able to disqualify some links as being too \n"
 "slow to have passed the message along."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:264
 msgid ""
-"This sort of attack is powerful, but its applicability to I2P is non "
-"obvious,\n"
-"as the variation on message delays due to queuing, message processing, "
-"and \n"
-"throttling will often meet or exceed the time of passing a message along "
-"a \n"
-"single link - even when the attacker knows that a reply will be sent as "
-"soon as\n"
-"the message is received.  There are some scenarios which will expose "
-"fairly \n"
-"automatic replies though - the streaming library does (with the SYN+ACK) "
-"as does the \n"
-"message mode of guaranteed delivery (with the "
-"DataMessage+DeliveryStatusMessage)."
+"This sort of attack is powerful, but its applicability to I2P is non obvious,\n"
+"as the variation on message delays due to queuing, message processing, and \n"
+"throttling will often meet or exceed the time of passing a message along a \n"
+"single link - even when the attacker knows that a reply will be sent as soon as\n"
+"the message is received.  There are some scenarios which will expose fairly \n"
+"automatic replies though - the streaming library does (with the SYN+ACK) as does the \n"
+"message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:274
 #, python-format
 msgid ""
-"Without protocol scrubbing or higher latency, global active adversaries "
-"can \n"
-"gain substantial information.  As such, people concerned with these "
-"attacks could\n"
-"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial "
-"delays</a> or \n"
-"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol "
-"scrubbing, or\n"
-"other advanced tunnel routing <a "
-"href=\"%(todo)s#batching\">techniques</a>,\n"
+"Without protocol scrubbing or higher latency, global active adversaries can \n"
+"gain substantial information.  As such, people concerned with these attacks could\n"
+"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial delays</a> or \n"
+"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol scrubbing, or\n"
+"other advanced tunnel routing <a href=\"%(todo)s#batching\">techniques</a>,\n"
 "but these are unimplemented in I2P."
 msgstr ""
 
@@ -12109,25 +9870,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:291
 msgid ""
-"Intersection attacks against low latency systems are extremely powerful -"
-"\n"
-"periodically make contact with the target and keep track of what peers "
-"are on\n"
+"Intersection attacks against low latency systems are extremely powerful -\n"
+"periodically make contact with the target and keep track of what peers are on\n"
 "the network.  Over time, as node churn occurs the attacker will gain \n"
-"significant information about the target by simply intersecting the sets "
-"of\n"
-"peers that are online when a message successfully goes through.  The cost"
-" of \n"
-"this attack is significant as the network grows, but may be feasible in "
-"some\n"
+"significant information about the target by simply intersecting the sets of\n"
+"peers that are online when a message successfully goes through.  The cost of \n"
+"this attack is significant as the network grows, but may be feasible in some\n"
 "scenarios."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:301
 #, python-format
 msgid ""
-"In summary, if an attacker is at both ends of your tunnel at the same "
-"time,\n"
+"In summary, if an attacker is at both ends of your tunnel at the same time,\n"
 "he may be successful.\n"
 "I2P does not have a full defense to this for low latency communication.\n"
 "This is an inherent weakness of low-latency onion routing.\n"
@@ -12146,8 +9901,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:316
 #, python-format
 msgid ""
-"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a "
-"small group that changes slowly"
+"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a small "
+"group that changes slowly"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:319
@@ -12162,7 +9917,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:325
 msgid ""
-"For eepsites or other hosted services, we support\n"
+"For I2P Sites or other hosted services, we support\n"
 "simultaneous hosting on multiple routers, or\n"
 "<a href=\"#intersection\">multihoming</a>"
 msgstr ""
@@ -12170,8 +9925,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:332
 msgid ""
 "Even in total, these defenses are not a complete solution.\n"
-"Also, we have made some design choices that may significantly increase "
-"our vulnerability:"
+"Also, we have made some design choices that may significantly increase our vulnerability:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:337
@@ -12180,8 +9934,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:340
 msgid ""
-"We use tunnel pools comprised of several tunnels, and traffic can shift "
-"from tunnel to tunnel."
+"We use tunnel pools comprised of several tunnels, and traffic can shift from"
+" tunnel to tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:343
@@ -12191,8 +9945,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:346
 msgid ""
 "Tunnel lengths are configurable.\n"
-"While 3-hop tunnels are recommended for full protection, several "
-"applications and\n"
+"While 3-hop tunnels are recommended for full protection, several applications and\n"
 "services use 2-hop tunnels by default."
 msgstr ""
 
@@ -12200,14 +9953,10 @@ msgstr ""
 #, python-format
 msgid ""
 "In the future, it could\n"
-"for peers who can afford significant delays (per <a "
-"href=\"%(todo)s#stop\">nontrivial\n"
-"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>).  "
-"In addition,\n"
-"this is only relevant for destinations that other people know about - a "
-"private\n"
-"group whose destination is only known to trusted peers does not have to "
-"worry,\n"
+"for peers who can afford significant delays (per <a href=\"%(todo)s#stop\">nontrivial\n"
+"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>).  In addition,\n"
+"this is only relevant for destinations that other people know about - a private\n"
+"group whose destination is only known to trusted peers does not have to worry,\n"
 "as an adversary can't \"ping\" them to mount the attack.</p>"
 msgstr ""
 
@@ -12218,8 +9967,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:369
 msgid ""
-"There are a whole slew of denial of service attacks available against "
-"I2P,\n"
+"There are a whole slew of denial of service attacks available against I2P,\n"
 "each with different costs and consequences:"
 msgstr ""
 
@@ -12242,10 +9990,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:387
 msgid ""
 "Provide easy configuration options so that users may increase their\n"
-"contribution (share percentage) to the network. Display easy-to-"
-"understand\n"
-"metrics such as \"share ratio\" so that users may see what they are "
-"contributing."
+"contribution (share percentage) to the network. Display easy-to-understand\n"
+"metrics such as \"share ratio\" so that users may see what they are contributing."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:392
@@ -12257,29 +10003,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:399
 #, python-format
 msgid ""
-"<b>Starvation attack:</b> A hostile user may attempt to harm the network "
-"by\n"
-"creating a significant number of peers in the network who are not "
-"identified as\n"
-"being under control of the same entity (as with Sybil). These nodes then"
-" \n"
-"decide not to provide any resources to the network, causing existing "
-"peers \n"
-"to search through a larger network database or request more tunnels than"
-" \n"
+"<b>Starvation attack:</b> A hostile user may attempt to harm the network by\n"
+"creating a significant number of peers in the network who are not identified as\n"
+"being under control of the same entity (as with Sybil). These nodes then \n"
+"decide not to provide any resources to the network, causing existing peers \n"
+"to search through a larger network database or request more tunnels than \n"
 "should be necessary. \n"
-"Alternatively, the nodes may provide intermittent service by periodically"
-"\n"
+"Alternatively, the nodes may provide intermittent service by periodically\n"
 "dropping selected traffic, or refusing connections to certain peers.\n"
-"This behavior may be indistinguishable from that of a heavily-loaded or "
-"failing node.\n"
-"I2P addresses these issues by maintaining <a "
-"href=\"%(peerselection)s\">profiles</a> on the \n"
+"This behavior may be indistinguishable from that of a heavily-loaded or failing node.\n"
+"I2P addresses these issues by maintaining <a href=\"%(peerselection)s\">profiles</a> on the \n"
 "peers, attempting to identify underperforming ones and simply ignoring \n"
 "them, or using them rarely.\n"
 "We have significantly enhanced the\n"
-"ability to recognize and avoid troublesome peers; however there are still"
-"\n"
+"ability to recognize and avoid troublesome peers; however there are still\n"
 "significant efforts required in this area."
 msgstr ""
 
@@ -12287,30 +10024,18 @@ msgstr ""
 #, python-format
 msgid ""
 "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n"
-"a peer, a destination, or a tunnel.  Network and peer flooding is "
-"possible,\n"
-"and I2P does nothing to prevent standard IP layer flooding.  The flooding"
-" of\n"
-"a destination with messages by sending a large number to the target's "
-"various\n"
-"inbound tunnel gateways is possible, but the destination will know this "
-"both\n"
-"by the contents of the message and because the tunnel's tests will fail."
-"  The\n"
-"same goes for flooding just a single tunnel.  I2P has no defenses for a "
-"network\n"
-"flooding attack.  For a destination and tunnel flooding attack, the "
-"target\n"
-"identifies which tunnels are unresponsive and builds new ones.  New code "
-"could\n"
-"also be written to add even more tunnels if the client wishes to handle "
-"the\n"
-"larger load.  If, on the other hand, the load is more than the client can"
-"\n"
-"deal with, they can instruct the tunnels to throttle the number of "
-"messages or\n"
-"bytes they should pass on (once the <a "
-"href=\"%(todo)s#batching\">advanced tunnel\n"
+"a peer, a destination, or a tunnel.  Network and peer flooding is possible,\n"
+"and I2P does nothing to prevent standard IP layer flooding.  The flooding of\n"
+"a destination with messages by sending a large number to the target's various\n"
+"inbound tunnel gateways is possible, but the destination will know this both\n"
+"by the contents of the message and because the tunnel's tests will fail.  The\n"
+"same goes for flooding just a single tunnel.  I2P has no defenses for a network\n"
+"flooding attack.  For a destination and tunnel flooding attack, the target\n"
+"identifies which tunnels are unresponsive and builds new ones.  New code could\n"
+"also be written to add even more tunnels if the client wishes to handle the\n"
+"larger load.  If, on the other hand, the load is more than the client can\n"
+"deal with, they can instruct the tunnels to throttle the number of messages or\n"
+"bytes they should pass on (once the <a href=\"%(todo)s#batching\">advanced tunnel\n"
 "operation</a> is implemented)."
 msgstr ""
 
@@ -12318,13 +10043,10 @@ msgstr ""
 msgid ""
 "<b>CPU load attack:</b> There are currently some methods for people to \n"
 "remotely request that a peer perform some cryptographically expensive \n"
-"operation, and a hostile attacker could use these to flood that peer with"
-"\n"
-"a large number of them in an attempt to overload the CPU.  Both using "
-"good \n"
+"operation, and a hostile attacker could use these to flood that peer with\n"
+"a large number of them in an attempt to overload the CPU.  Both using good \n"
 "engineering practices and potentially requiring nontrivial certificates \n"
-"(e.g. HashCash) to be attached to these expensive requests should "
-"mitigate\n"
+"(e.g. HashCash) to be attached to these expensive requests should mitigate\n"
 "the issue, though there may be room for an attacker to exploit various\n"
 "bugs in the implementation."
 msgstr ""
@@ -12332,8 +10054,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:451
 #, python-format
 msgid ""
-"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the "
-"network by\n"
+"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by\n"
 "becoming a floodfill router. The current defenses against unreliable,\n"
 "intermittent, or malicious floodfill routers are poor.\n"
 "A floodfill router may provide bad or no response to lookups, and\n"
@@ -12348,134 +10069,86 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:470
 #, python-format
 msgid ""
-"Tagging attacks - modifying a message so that it can later be identified"
-" \n"
-"further along the path - are by themselves impossible in I2P, as messages"
-" \n"
-"passed through tunnels are signed.  However, if an attacker is the "
-"inbound \n"
-"tunnel gateway as well as a participant further along in that tunnel, "
-"with\n"
-"collusion they can identify the fact that they are in the same tunnel "
-"(and \n"
-"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and "
-"other updates,\n"
-"colluding peers within the same tunnel can recognize that fact without "
-"any \n"
-"effort).  An attacker in an outbound tunnel and any part of an inbound "
-"tunnel cannot \n"
-"collude however, as the tunnel encryption pads and modifies the data "
-"separately\n"
-"for the inbound and outbound tunnels.  External attackers cannot do "
-"anything,\n"
+"Tagging attacks - modifying a message so that it can later be identified \n"
+"further along the path - are by themselves impossible in I2P, as messages \n"
+"passed through tunnels are signed.  However, if an attacker is the inbound \n"
+"tunnel gateway as well as a participant further along in that tunnel, with\n"
+"collusion they can identify the fact that they are in the same tunnel (and \n"
+"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and other updates,\n"
+"colluding peers within the same tunnel can recognize that fact without any \n"
+"effort).  An attacker in an outbound tunnel and any part of an inbound tunnel cannot \n"
+"collude however, as the tunnel encryption pads and modifies the data separately\n"
+"for the inbound and outbound tunnels.  External attackers cannot do anything,\n"
 "as the links are encrypted and messages signed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:488
 msgid ""
-"Partitioning attacks - finding ways to segregate (technically or "
-"analytically)\n"
-"the peers in a network - are important to keep in mind when dealing with "
-"a \n"
-"powerful adversary, since the size of the network plays a key role in "
-"determining\n"
-"your anonymity.  Technical partitioning by cutting links between peers to"
-" create\n"
-"fragmented networks is addressed by I2P's built in network database, "
-"which \n"
-"maintains statistics about various peers so as to allow any existing "
-"connections\n"
-"to other fragmented sections to be exploited so as to heal the network.  "
-"However,\n"
-"if the attacker does disconnect all links to uncontrolled peers, "
-"essentially\n"
-"isolating the target, no amount of network database healing will fix it."
-"  At\n"
-"that point, the only thing the router can hope to do is notice that a "
-"significant\n"
-"number of previously reliable peers have become unavailable and alert the"
-" client\n"
-"that it is temporarily disconnected (this detection code is not "
-"implemented at\n"
+"Partitioning attacks - finding ways to segregate (technically or analytically)\n"
+"the peers in a network - are important to keep in mind when dealing with a \n"
+"powerful adversary, since the size of the network plays a key role in determining\n"
+"your anonymity.  Technical partitioning by cutting links between peers to create\n"
+"fragmented networks is addressed by I2P's built in network database, which \n"
+"maintains statistics about various peers so as to allow any existing connections\n"
+"to other fragmented sections to be exploited so as to heal the network.  However,\n"
+"if the attacker does disconnect all links to uncontrolled peers, essentially\n"
+"isolating the target, no amount of network database healing will fix it.  At\n"
+"that point, the only thing the router can hope to do is notice that a significant\n"
+"number of previously reliable peers have become unavailable and alert the client\n"
+"that it is temporarily disconnected (this detection code is not implemented at\n"
 "the moment)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:504
 #, python-format
 msgid ""
-"Partitioning the network analytically by looking for differences in how "
-"routers \n"
-"and destinations behave and grouping them accordingly is also a very "
-"powerful\n"
-"attack.  For instance, an attacker <a href=\"#harvesting\">harvesting</a>"
-" the network\n"
-"database will know when a particular destination has 5 inbound tunnels in"
-" their\n"
-"LeaseSet while others have only 2 or 3, allowing the adversary to "
-"potentially \n"
-"partition clients by the number of tunnels selected.  Another partition "
-"is \n"
-"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial "
-"delays</a> and \n"
-"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel "
-"gateways and the\n"
-"particular hops with non-zero delays will likely stand out.  However, "
-"this data\n"
-"is only exposed to those specific hops, so to partition effectively on "
-"that \n"
-"matter, the attacker would need to control a significant portion of the "
-"network\n"
-"(and still that would only be a probabilistic partition, as they wouldn't"
-" know\n"
+"Partitioning the network analytically by looking for differences in how routers \n"
+"and destinations behave and grouping them accordingly is also a very powerful\n"
+"attack.  For instance, an attacker <a href=\"#harvesting\">harvesting</a> the network\n"
+"database will know when a particular destination has 5 inbound tunnels in their\n"
+"LeaseSet while others have only 2 or 3, allowing the adversary to potentially \n"
+"partition clients by the number of tunnels selected.  Another partition is \n"
+"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial delays</a> and \n"
+"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel gateways and the\n"
+"particular hops with non-zero delays will likely stand out.  However, this data\n"
+"is only exposed to those specific hops, so to partition effectively on that \n"
+"matter, the attacker would need to control a significant portion of the network\n"
+"(and still that would only be a probabilistic partition, as they wouldn't know\n"
 "which other tunnels or messages have those delays)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:520
 #, python-format
 msgid ""
-"Also discussed on the <a href=\"%(netdb)s#threat\">network database "
-"page</a> (bootstrap attack)."
+"Also discussed on the <a href=\"%(netdb)s#threat\">network database page</a>"
+" (bootstrap attack)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:528
 msgid ""
-"The predecessor attack is passively gathering statistics in an attempt to"
-" see\n"
-"what peers are 'close' to the destination by participating in their "
-"tunnels and\n"
-"keeping track of the previous or next hop (for outbound or inbound "
-"tunnels, \n"
-"respectively).  Over time, using a perfectly random sample of peers and "
-"random\n"
-"ordering, an attacker would be able to see which peer shows up as "
-"'closer' \n"
-"statistically more than the rest, and that peer would in turn be where "
-"the\n"
+"The predecessor attack is passively gathering statistics in an attempt to see\n"
+"what peers are 'close' to the destination by participating in their tunnels and\n"
+"keeping track of the previous or next hop (for outbound or inbound tunnels, \n"
+"respectively).  Over time, using a perfectly random sample of peers and random\n"
+"ordering, an attacker would be able to see which peer shows up as 'closer' \n"
+"statistically more than the rest, and that peer would in turn be where the\n"
 "target is located."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:538
 #, python-format
 msgid ""
-"I2P avoids this in four ways: first, the peers selected to participate in"
-"\n"
-"tunnels are not randomly sampled throughout the network - they are "
-"derived from\n"
-"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which "
-"breaks them\n"
-"into tiers.  Second, with <a href=\"%(tunnelimpl)s#ordering\">strict "
-"ordering</a> of peers\n"
-"in a tunnel, the fact that a peer shows up more frequently does not mean "
-"they're\n"
-"the source.  Third, with <a href=\"%(tunnelimpl)s#length\">permuted "
-"tunnel length</a>\n"
+"I2P avoids this in four ways: first, the peers selected to participate in\n"
+"tunnels are not randomly sampled throughout the network - they are derived from\n"
+"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which breaks them\n"
+"into tiers.  Second, with <a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers\n"
+"in a tunnel, the fact that a peer shows up more frequently does not mean they're\n"
+"the source.  Third, with <a href=\"%(tunnelimpl)s#length\">permuted tunnel length</a>\n"
 "(not enabled by default)\n"
 "even 0 hop tunnels can provide plausible deniability as the occasional \n"
 "variation of the gateway will look like normal tunnels.  Fourth, with \n"
-"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> "
-"(unimplemented), only the peer with\n"
-"a restricted connection to the target will ever contact the target, while"
-" \n"
+"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> (unimplemented), only the peer with\n"
+"a restricted connection to the target will ever contact the target, while \n"
 "attackers will merely run into that gateway."
 msgstr ""
 
@@ -12513,8 +10186,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:587
 msgid ""
-"Network growth will make it more difficult to obtain a given proportion "
-"of the network"
+"Network growth will make it more difficult to obtain a given proportion of "
+"the network"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:590
@@ -12523,10 +10196,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:593
 msgid ""
-"\"Hidden mode\", which prevents a router from publishing its information "
-"to the netDb,\n"
-"(but also prevents it from relaying data) is not widely used now but "
-"could be."
+"\"Hidden mode\", which prevents a router from publishing its information to the netDb,\n"
+"(but also prevents it from relaying data) is not widely used now but could be."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:599
@@ -12534,19 +10205,15 @@ msgstr ""
 msgid ""
 "In future implementations,\n"
 "<a href=\"%(todo)s#nat\">basic</a> and \n"
-"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted "
-"routes,\n"
-"this attack loses much of its power, as the \"hidden\" peers do not "
-"publish their\n"
-"contact addresses in the network database - only the tunnels through "
-"which \n"
+"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted routes,\n"
+"this attack loses much of its power, as the \"hidden\" peers do not publish their\n"
+"contact addresses in the network database - only the tunnels through which \n"
 "they can be reached (as well as their public keys, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:608
 msgid ""
-"In the future, routers could use GeoIP to identify if they are in a "
-"particular\n"
+"In the future, routers could use GeoIP to identify if they are in a particular\n"
 "country where identification as an I2P node would be risky.\n"
 "In that case, the router could automatically enable hidden mode, or\n"
 "enact other restricted route methods."
@@ -12557,10 +10224,8 @@ msgstr ""
 msgid ""
 "By inspecting the traffic into and out of a router, a malicious ISP\n"
 "or state-level firewall could identify that a computer is running I2P.\n"
-"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically "
-"designed\n"
-"to hide that a computer is running I2P. However, several design decisions"
-" made\n"
+"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically designed\n"
+"to hide that a computer is running I2P. However, several design decisions made\n"
 "in the design of the\n"
 "<a href=\"%(transport)s\">transport layer and protocols</a>\n"
 "make it somewhat difficult to identify I2P traffic:"
@@ -12576,8 +10241,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:636
 msgid ""
-"DH key exchange with no protocol bytes or other unencrypted constant "
-"fields"
+"DH key exchange with no protocol bytes or other unencrypted constant fields"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:639
@@ -12586,14 +10250,13 @@ msgid ""
 "Simultaneous use of both\n"
 "<a href=\"%(ntcp)s\">TCP</a> and\n"
 "<a href=\"%(ssu)s\">UDP</a> transports.\n"
-"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to"
-" track."
+"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:647
 msgid ""
-"In the near future, we plan to directly address traffic analysis issues "
-"by further obfuscation of I2P transport protocols, possibly including:"
+"In the near future, we plan to directly address traffic analysis issues by "
+"further obfuscation of I2P transport protocols, possibly including:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:651
@@ -12610,20 +10273,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:657
 msgid ""
-"Development of additional transport methods that mimic SSL or other "
-"common protocols"
+"Development of additional transport methods that mimic SSL or other common "
+"protocols"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:660
 msgid ""
-"Review of padding strategies at higher layers to see how they affect "
-"packet sizes at the transport layer"
+"Review of padding strategies at higher layers to see how they affect packet "
+"sizes at the transport layer"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:663
 msgid ""
-"Review of methods implemented by various state-level firewalls to block "
-"Tor"
+"Review of methods implemented by various state-level firewalls to block Tor"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:666
@@ -12639,36 +10301,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:680
 msgid ""
-"Sybil describes a category of attacks where the adversary creates "
-"arbitrarily\n"
+"Sybil describes a category of attacks where the adversary creates arbitrarily\n"
 "large numbers of colluding nodes and uses the increased numbers to help \n"
-"mounting other attacks.  For instance, if an attacker is in a network "
-"where peers\n"
-"are selected randomly and they want an 80&#37; chance to be one of those "
-"peers, they\n"
-"simply create five times the number of nodes that are in the network and "
-"roll \n"
-"the dice.  When identity is free, Sybil can be a very potent technique "
-"for a \n"
-"powerful adversary.  The primary technique to address this is simply to "
-"make \n"
-"identity 'non free' - <a "
-"href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n"
+"mounting other attacks.  For instance, if an attacker is in a network where peers\n"
+"are selected randomly and they want an 80&#37; chance to be one of those peers, they\n"
+"simply create five times the number of nodes that are in the network and roll \n"
+"the dice.  When identity is free, Sybil can be a very potent technique for a \n"
+"powerful adversary.  The primary technique to address this is simply to make \n"
+"identity 'non free' - <a href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n"
 "(among others) uses the fact that IP addresses are limited, while \n"
 "IIP used \n"
-"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for "
-"creating a new\n"
-"identity.  We currently have not implemented any particular technique to "
-"address\n"
+"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for creating a new\n"
+"identity.  We currently have not implemented any particular technique to address\n"
 "Sybil, but do include placeholder certificates in the router's and \n"
-"destination's data structures which can contain a HashCash certificate of"
-" \n"
-"appropriate value when necessary (or some other certificate proving "
-"scarcity)."
+"destination's data structures which can contain a HashCash certificate of \n"
+"appropriate value when necessary (or some other certificate proving scarcity)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:698
-msgid "Requiring HashCash Certificates in various places has two major problems:"
+msgid ""
+"Requiring HashCash Certificates in various places has two major problems:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:702
@@ -12678,17 +10330,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:705
 msgid ""
 "The classic HashCash problem -\n"
-"selecting HashCash values that are meaningful proofs of work on high-end "
-"machines,\n"
+"selecting HashCash values that are meaningful proofs of work on high-end machines,\n"
 "while still being feasible on low-end machines such as mobile devices."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:712
 msgid ""
-"Various limitations on the number of routers in a given IP range restrict"
-"\n"
-"the vulnerability to attackers that don't have the ability to put "
-"machines\n"
+"Various limitations on the number of routers in a given IP range restrict\n"
+"the vulnerability to attackers that don't have the ability to put machines\n"
 "in several IP blocks.\n"
 "However, this is not a meaningful defense against a powerful adversary."
 msgstr ""
@@ -12710,22 +10359,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:733
 #, python-format
 msgid ""
-"By refusing to accept or forward tunnel build requests, except to a "
-"colluding peer, a router could ensure\n"
+"By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure\n"
 "that a tunnel is formed wholly from its set of colluding routers.\n"
-"The chances of success are enhanced if there is a large number of "
-"colluding routers,\n"
+"The chances of success are enhanced if there is a large number of colluding routers,\n"
 "i.e. a <a href=\"#sybil\">Sybil attack</a>.\n"
 "This is somewhat mitigated by our\n"
-"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor "
-"the performance\n"
+"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor the performance\n"
 "of peers.\n"
 "However, this is a powerful attack as the number of routers approaches\n"
 "<i>f</i> = 0.2, or 20&#37; malicious nodes, as specifed in the paper.\n"
-"The malicous routers could also maintain connections to the target router"
-" and provide\n"
-"excellent forwarding bandwidth for traffic over those connections, in an "
-"attempt\n"
+"The malicous routers could also maintain connections to the target router and provide\n"
+"excellent forwarding bandwidth for traffic over those connections, in an attempt\n"
 "to manipulate the profiles managed by the target and appear attractive.\n"
 "Further research and defenses may be necessary."
 msgstr ""
@@ -12734,38 +10378,29 @@ msgstr ""
 #, python-format
 msgid ""
 "We use strong cryptography with long keys, and\n"
-"we assume the security of the industry-standard cryptographic primitives "
-"used in I2P, as documented\n"
+"we assume the security of the industry-standard cryptographic primitives used in I2P, as documented\n"
 "<a href=\"%(cryptography)s\">on the low-level cryptography page</a>. \n"
 "Security features include the immediate detection of \n"
-"altered messages along the path, the inability to decrypt messages not "
-"addressed to you,\n"
+"altered messages along the path, the inability to decrypt messages not addressed to you,\n"
 "and defense against man-in-the-middle attacks.\n"
-"The key sizes chosen in 2003 were quite conservative at the time, and are"
-" still longer than\n"
-"those used in <a href=\"https://torproject.org/\">other anonymity "
-"networks</a>.\n"
+"The key sizes chosen in 2003 were quite conservative at the time, and are still longer than\n"
+"those used in <a href=\"https://torproject.org/\">other anonymity networks</a>.\n"
 "We don't think the current key lengths are our biggest weakness,\n"
 "especially for traditional, non-state-level adversaries;\n"
 "bugs and the small size of the network are much more worrisome.\n"
-"Of course, all cryptographic algorithms eventually become obsolete due to"
-"\n"
-"the advent of faster processors, cryptographic research, and advancements"
-" in\n"
+"Of course, all cryptographic algorithms eventually become obsolete due to\n"
+"the advent of faster processors, cryptographic research, and advancements in\n"
 "methods such as rainbow tables, clusters of video game hardware, etc.\n"
-"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys"
-" or change\n"
+"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change\n"
 "shared secret values while maintaining backward compatibility."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:773
 #, python-format
 msgid ""
-"Upgrading the various data structures and protocols to support longer "
-"keys\n"
+"Upgrading the various data structures and protocols to support longer keys\n"
 "will have to be tackled eventually, and this will be a\n"
-"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be "
-"for \n"
+"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be for \n"
 "<a href=\"https://torproject.org/\">others</a>.\n"
 "Hopefully, through careful planning, we can minimize the disruption, and\n"
 "implement mechanisms to make it easier for future transitions."
@@ -12774,12 +10409,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:782
 msgid ""
 "In the future, several I2P protocols and data structures\n"
-"support securely padding messages to arbitrary sizes, so messages could "
-"be made constant\n"
-"size or garlic messages could be modified randomly so that some cloves "
-"appear to contain\n"
-"more subcloves than they actually do.  At the moment, however, garlic, "
-"tunnel, and \n"
+"support securely padding messages to arbitrary sizes, so messages could be made constant\n"
+"size or garlic messages could be modified randomly so that some cloves appear to contain\n"
+"more subcloves than they actually do.  At the moment, however, garlic, tunnel, and \n"
 "end to end messages include simple random padding."
 msgstr ""
 
@@ -12793,18 +10425,14 @@ msgid ""
 "In addition to the floodfill DOS attacks described\n"
 "<a href=\"#ffdos\">above</a>, floodfill routers are uniquely positioned\n"
 "to learn about network participants, due to their role\n"
-"in the netDb, and the high frequency of communication with those "
-"participants.\n"
-"This is somewhat mitigated because floodfill routers only manage a "
-"portion\n"
+"in the netDb, and the high frequency of communication with those participants.\n"
+"This is somewhat mitigated because floodfill routers only manage a portion\n"
 "of the total keyspace, and the keyspace rotates daily, as explained \n"
 "on the <a href=\"%(netdb)s#threat\">network database page</a>.\n"
-"The specific mechanisms by which routers communicate with floodfills have"
-" been\n"
+"The specific mechanisms by which routers communicate with floodfills have been\n"
 "<a href=\"%(netdb)s#delivery\">carefully designed</a>.\n"
 "However, these threats should be studied further.\n"
-"The specific potential threats and corresponding defenses are a topic for"
-" future research."
+"The specific potential threats and corresponding defenses are a topic for future research."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:812
@@ -12823,33 +10451,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:826
 msgid ""
-"There are a few centralized or limited resources (some inside I2P, some "
-"not)\n"
+"There are a few centralized or limited resources (some inside I2P, some not)\n"
 "that could be attacked or used as a vector for attacks.\n"
-"The absence of jrandom starting November 2007, followed by the loss of "
-"the i2p.net hosting service in January 2008,\n"
-"highlighted numerous centralized resources in the development and "
-"operation of the I2P network,\n"
+"The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,\n"
+"highlighted numerous centralized resources in the development and operation of the I2P network,\n"
 "most of which are now distributed.\n"
-"Attacks on externally-reachable resources mainly affect the ability of "
-"new users to find us,\n"
+"Attacks on externally-reachable resources mainly affect the ability of new users to find us,\n"
 "not the operation of the network itself."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:836
 #, python-format
 msgid ""
-"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin"
-" for external public access."
+"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin "
+"for external public access."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:839
 #, python-format
 msgid ""
-"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed "
-"locations</a>,\n"
-"however more reseed hosts may be needed, and the handling of unreliable "
-"or malicious\n"
+"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed locations</a>,\n"
+"however more reseed hosts may be needed, and the handling of unreliable or malicious\n"
 "reseed hosts may need improvement."
 msgstr ""
 
@@ -12865,10 +10487,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:851
 msgid ""
-"Routers now better handle <a href=\"#ffdos\">multiple unreliable "
-"floodfill peers</a>.\n"
-"Malicious floodfills <a href=\"#ffdos\">needs</a> <a "
-"href=\"#floodfill\">more</a> study."
+"Routers now better handle <a href=\"#ffdos\">multiple unreliable floodfill peers</a>.\n"
+"Malicious floodfills <a href=\"#ffdos\">needs</a> <a href=\"#floodfill\">more</a> study."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:855
@@ -12880,47 +10500,35 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:858
 msgid ""
-"Routers rely on a single news host, but there is a hardcoded backup URL "
-"pointing to a different host.\n"
+"Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.\n"
 "A malicious news host could feed a huge file, need to limit the size."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:862
 #, python-format
 msgid ""
-"<a href=\"%(naming)s\">Naming system services</a>, including addressbook "
-"subscription providers, add-host services,\n"
-"and jump services, could be malicious. Substantial protections for "
-"subscriptions were implemented\n"
-"in release 0.6.1.31, with additional enhancements in subsequent releases."
-"\n"
+"<a href=\"%(naming)s\">Naming system services</a>, including address book subscription providers, add-host services,\n"
+"and jump services, could be malicious. Substantial protections for subscriptions were implemented\n"
+"in release 0.6.1.31, with additional enhancements in subsequent releases.\n"
 "However, all naming services require some measure of trust, see\n"
 "<a href=\"%(naming)s\">the naming page</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:869
 msgid ""
-"We remain reliant on the DNS service for i2p2.de, losing this would cause"
-" substantial\n"
+"We remain reliant on the DNS service for i2p2.de, losing this would cause substantial\n"
 "disruption in our ability to attract new users,\n"
-"and would shrink the network (in the short-to-medium term), just as the "
-"loss of i2p.net did."
+"and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:881
 msgid ""
-"These attacks aren't directly on the network, but instead go after its "
-"development team \n"
-"by either introducing legal hurdles on anyone contributing to the "
-"development\n"
-"of the software, or by using whatever means are available to get the "
-"developers to \n"
-"subvert the software.  Traditional technical measures cannot defeat these"
-" attacks, and\n"
-"if someone threatened the life or livelihood of a developer (or even just"
-" issuing a \n"
-"court order along with a gag order, under threat of prison), we would "
-"have a big problem."
+"These attacks aren't directly on the network, but instead go after its development team \n"
+"by either introducing legal hurdles on anyone contributing to the development\n"
+"of the software, or by using whatever means are available to get the developers to \n"
+"subvert the software.  Traditional technical measures cannot defeat these attacks, and\n"
+"if someone threatened the life or livelihood of a developer (or even just issuing a \n"
+"court order along with a gag order, under threat of prison), we would have a big problem."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:890
@@ -12930,26 +10538,19 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:894
 #, python-format
 msgid ""
-"All components of the network must be open source to enable inspection, "
-"verification, \n"
-"modification, and improvement.  If a developer is compromised, once it is"
-" noticed \n"
-"the community should demand explanation and cease to accept that "
-"developer's work.\n"
-"All checkins to our <a href=\"%(monotone)s\">distributed source control "
-"system</a>\n"
-"are cryptographically signed, and the release packagers use a trust-list "
-"system\n"
+"All components of the network must be open source to enable inspection, verification, \n"
+"modification, and improvement.  If a developer is compromised, once it is noticed \n"
+"the community should demand explanation and cease to accept that developer's work.\n"
+"All checkins to our <a href=\"%(monotone)s\">distributed source control system</a>\n"
+"are cryptographically signed, and the release packagers use a trust-list system\n"
 "to restrict modifications to those previously approved."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:902
 #, python-format
 msgid ""
-"Development over the network itself, allowing developers to stay "
-"anonymous but still \n"
-"secure the development process.  All I2P development can occur through "
-"I2P - using\n"
+"Development over the network itself, allowing developers to stay anonymous but still \n"
+"secure the development process.  All I2P development can occur through I2P - using\n"
 "a <a href=\"%(monotone)s\">distributed source control system</a>,\n"
 "a distributed source control system, IRC chat,\n"
 "public web servers,\n"
@@ -12959,8 +10560,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:913
 msgid ""
-"We also maintain relationships with various organizations that offer "
-"legal advice,\n"
+"We also maintain relationships with various organizations that offer legal advice,\n"
 "should any defense be necessary."
 msgstr ""
 
@@ -12970,52 +10570,38 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:922
 msgid ""
-"Try as we might, most nontrivial applications include errors in the "
-"design or \n"
-"implementation, and I2P is no exception.  There may be bugs that could be"
-" exploited to \n"
-"attack the anonymity or security of the communication running over I2P in"
-" unexpected \n"
-"ways.  To help withstand attacks against the design or protocols in use, "
-"we publish \n"
+"Try as we might, most nontrivial applications include errors in the design or \n"
+"implementation, and I2P is no exception.  There may be bugs that could be exploited to \n"
+"attack the anonymity or security of the communication running over I2P in unexpected \n"
+"ways.  To help withstand attacks against the design or protocols in use, we publish \n"
 "all designs and documentation and solicit review and criticism with \n"
 "the hope that many eyes will improve the system.\n"
 "We do not believe in\n"
-"<a href=\"http://www.haystacknetwork.com/\">security through "
-"obscurity</a>."
+"<a href=\"http://www.haystacknetwork.com/\">security through obscurity</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:933
 msgid ""
 "In addition, the code is being \n"
-"treated the same way, with little aversion towards reworking or throwing "
-"out \n"
-"something that isn't meeting the needs of the software system (including "
-"ease of \n"
-"modification).  Documentation for the design and implementation of the "
-"network and \n"
-"the software components are an essential part of security, as without "
-"them it is \n"
-"unlikely that developers would be willing to spend the time to learn the "
-"software \n"
+"treated the same way, with little aversion towards reworking or throwing out \n"
+"something that isn't meeting the needs of the software system (including ease of \n"
+"modification).  Documentation for the design and implementation of the network and \n"
+"the software components are an essential part of security, as without them it is \n"
+"unlikely that developers would be willing to spend the time to learn the software \n"
 "enough to identify shortcomings and bugs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:943
 msgid ""
-"Our software is likely, in particular, to contain bugs related to denial "
-"of service\n"
-"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues  "
-"in the router console,\n"
-"and other vulnerabilities to non-standard inputs via the various "
-"protocols."
+"Our software is likely, in particular, to contain bugs related to denial of service\n"
+"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues  in the router console,\n"
+"and other vulnerabilities to non-standard inputs via the various protocols."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:949
 #, python-format
 msgid ""
-"I2P is still a small network with a small development community and "
-"almost no\n"
+"I2P is still a small network with a small development community and almost no\n"
 "interest from academic or research groups.\n"
 "Therefore we lack the analysis that\n"
 "<a href=\"https://torproject.org/\">other anonymity networks</a>\n"
@@ -13029,18 +10615,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:963
 msgid ""
-"To some extent, I2P could be enhanced to avoid peers operating at IP "
-"addresses\n"
-"listed in a blocklist. Several blocklists are commonly available in "
-"standard formats,\n"
-"listing anti-P2P organizations, potential state-level adversaries, and "
-"others."
+"To some extent, I2P could be enhanced to avoid peers operating at IP addresses\n"
+"listed in a blocklist. Several blocklists are commonly available in standard formats,\n"
+"listing anti-P2P organizations, potential state-level adversaries, and others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:969
 msgid ""
-"To the extent that active peers actually do show up in the actual "
-"blocklist,\n"
+"To the extent that active peers actually do show up in the actual blocklist,\n"
 "blocking by only a subset of peers would tend to segment the network,\n"
 "exacerbate reachability problems, and decrease overall reliability.\n"
 "Therefore we would want to agree on a particular blocklist and\n"
@@ -13049,8 +10631,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:977
 msgid ""
-"Blocklists are only a part (perhaps a small part) of an array of defenses"
-"\n"
+"Blocklists are only a part (perhaps a small part) of an array of defenses\n"
 "against maliciousness.\n"
 "In large part the profiling system does a good job of measuring\n"
 "router behavior so that we don't need to trust anything in netDb.\n"
@@ -13063,8 +10644,7 @@ msgid ""
 "If a blocklist is hosted at a central location with automatic updates\n"
 "the network is vulnerable to a\n"
 "<a href=\"#central\">central resource attack</a>.\n"
-"Automatic subscription to a list gives the list provider the power to "
-"shut\n"
+"Automatic subscription to a list gives the list provider the power to shut\n"
 "the i2p network down. Completely."
 msgstr ""
 
@@ -13073,8 +10653,7 @@ msgid ""
 "Currently, a default blocklist is distributed with our software,\n"
 "listing only the IPs of past DOS sources.\n"
 "There is no automatic update mechanism.\n"
-"Should a particular IP range implement serious attacks on the I2P "
-"network,\n"
+"Should a particular IP range implement serious attacks on the I2P network,\n"
 "we would have to ask people to update their blocklist manually through\n"
 "out-of-band mechanisms such as forums, blogs, etc."
 msgstr ""
@@ -13089,30 +10668,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:7
 msgid ""
-"This page contains an overview of I2P tunnel terminology and operation, "
-"with\n"
+"This page contains an overview of I2P tunnel terminology and operation, with\n"
 "links to more technical pages, details, and specifications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:12
 #, python-format
 msgid ""
-"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P "
-"builds virtual \"tunnels\" -\n"
-"temporary and unidirectional paths through a sequence of routers.  These"
-" \n"
+"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P builds virtual \"tunnels\" -\n"
+"temporary and unidirectional paths through a sequence of routers.  These \n"
 "tunnels are classified as either inbound tunnels (where everything \n"
 "given to it goes towards the creator of the tunnel) or outbound tunnels\n"
 "(where the tunnel creator shoves messages away from them).  When Alice\n"
 "wants to send a message to Bob, she will (typically) send it out one of\n"
-"her existing outbound tunnels with instructions for that tunnel's "
-"endpoint\n"
+"her existing outbound tunnels with instructions for that tunnel's endpoint\n"
 "to forward it to the gateway router for one of Bob's current inbound \n"
 "tunnels, which in turn passes it to Bob."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:25
-msgid "Alice connecting through her outbound tunnel to Bob via his inbound tunnel"
+msgid ""
+"Alice connecting through her outbound tunnel to Bob via his inbound tunnel"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:27
@@ -13148,8 +10724,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:38
 #, python-format
 msgid ""
-"<b>Tunnel gateway</b> - the first router in a tunnel.  For inbound "
-"tunnels,\n"
+"<b>Tunnel gateway</b> - the first router in a tunnel.  For inbound tunnels,\n"
 "this is the one mentioned in the LeaseSet published in the\n"
 "<a href=\"%(netdb)s\">network database</a>.  For outbound tunnels, the\n"
 "gateway is the originating router.  (e.g. both A and D above)"
@@ -13157,21 +10732,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:44
 msgid ""
-"<b>Tunnel endpoint</b> - the last router in a tunnel.  (e.g. both C and F"
-" above)"
+"<b>Tunnel endpoint</b> - the last router in a tunnel.  (e.g. both C and F "
+"above)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:45
 msgid ""
-"<b>Tunnel participant</b> - all routers in a tunnel except for the "
-"gateway or\n"
+"<b>Tunnel participant</b> - all routers in a tunnel except for the gateway or\n"
 "endpoint (e.g. both B and E above)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:49
 msgid ""
-"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router "
-"jumps, e.g.:"
+"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router jumps,"
+" e.g.:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:51
@@ -13186,8 +10760,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:53
 msgid ""
-"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one "
-"intermediate\n"
+"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one intermediate\n"
 "tunnel participant. (the above diagram includes two 2-hop tunnels - one\n"
 "outbound from Alice, one inbound to Bob)"
 msgstr ""
@@ -13195,10 +10768,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:60
 #, python-format
 msgid ""
-"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 "
-"byte integer</a>\n"
-"different for each hop in a tunnel, and unique among all tunnels on a "
-"router.\n"
+"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 byte integer</a>\n"
+"different for each hop in a tunnel, and unique among all tunnels on a router.\n"
 "Chosen randomly by the tunnel creator."
 msgstr ""
 
@@ -13209,8 +10780,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:68
 #, python-format
 msgid ""
-"Routers performing the three roles (gateway, participant, endpoint) are "
-"given\n"
+"Routers performing the three roles (gateway, participant, endpoint) are given\n"
 "different pieces of data in the initial\n"
 "<a href=\"%(tunnelcreation)s\">Tunnel Build Message</a>\n"
 "to accomplish their tasks:"
@@ -13224,9 +10794,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:97
 #, python-format
 msgid ""
-"<b>tunnel encryption key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"encrypting\n"
+"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n"
 "messages and instructions to the next hop"
 msgstr ""
 
@@ -13234,9 +10802,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:101
 #, python-format
 msgid ""
-"<b>tunnel IV key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"double-encrypting\n"
+"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n"
 "the IV to the next hop"
 msgstr ""
 
@@ -13244,9 +10810,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:105
 #, python-format
 msgid ""
-"<b>reply key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for "
-"encrypting\n"
+"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n"
 "the reply to the tunnel build request"
 msgstr ""
 
@@ -13263,8 +10827,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:91
 msgid ""
-"<b>next hop</b> - what router is the next one in the path (unless this is"
-" a 0-hop tunnel, and the gateway is also the endpoint)"
+"<b>next hop</b> - what router is the next one in the path (unless this is a "
+"0-hop tunnel, and the gateway is also the endpoint)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:92
@@ -13291,27 +10855,21 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:117
 #, python-format
 msgid ""
-"<b>tunnel encryption key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"encrypting\n"
+"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n"
 "messages and instructions to the the endpoint (itself)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:121
 #, python-format
 msgid ""
-"<b>tunnel IV key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"double-encrypting\n"
+"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n"
 "the IV to the endpoint (itself)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:125
 #, python-format
 msgid ""
-"<b>reply key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for "
-"encrypting\n"
+"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n"
 "the reply to the tunnel build request (outbound endpoints only)"
 msgstr ""
 
@@ -13327,8 +10885,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:131
 msgid ""
-"<b>reply router</b> - the inbound gateway of the tunnel to send the reply"
-" through (outbound endpoints only)"
+"<b>reply router</b> - the inbound gateway of the tunnel to send the reply "
+"through (outbound endpoints only)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:132
@@ -13351,8 +10909,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:143
 #, python-format
 msgid ""
-"Several tunnels for a particular purpose may be grouped into a \"tunnel "
-"pool\",\n"
+"Several tunnels for a particular purpose may be grouped into a \"tunnel pool\",\n"
 "as described in the\n"
 "<a href=\"%(tunnelimpl)s#tunnel.pooling\">tunnel specification</a>.\n"
 "This provides redundancy and additional bandwidth.\n"
@@ -13367,20 +10924,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:155
 #, python-format
 msgid ""
-"As mentioned above, each client requests that their router provide "
-"tunnels to\n"
+"As mentioned above, each client requests that their router provide tunnels to\n"
 "include at least a certain number of hops.\n"
 "The decision as to how many routers\n"
-"to have in one's outbound and inbound tunnels has an important effect "
-"upon the\n"
-"latency, throughput, reliability, and anonymity provided by I2P - the "
-"more peers\n"
-"that messages have to go through, the longer it takes to get there and "
-"the more\n"
-"likely that one of those routers will fail prematurely.  The less routers"
-" in a\n"
-"tunnel, the easier it is for an adversary to mount traffic analysis "
-"attacks and\n"
+"to have in one's outbound and inbound tunnels has an important effect upon the\n"
+"latency, throughput, reliability, and anonymity provided by I2P - the more peers\n"
+"that messages have to go through, the longer it takes to get there and the more\n"
+"likely that one of those routers will fail prematurely.  The less routers in a\n"
+"tunnel, the easier it is for an adversary to mount traffic analysis attacks and\n"
 "pierce someone's anonymity.\n"
 "Tunnel lengths are specified by clients via\n"
 "<a href=\"%(i2cp)s#options\">I2CP options</a>.\n"
@@ -13394,18 +10945,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:172
 msgid ""
 "With no remote routers in a tunnel, the user has very basic plausible\n"
-"deniability (since no one knows for sure that the peer that sent them the"
-"\n"
-"message wasn't simply just forwarding it on as part of the tunnel). "
-"However, it\n"
-"would be fairly easy to mount a statistical analysis attack and notice "
-"that\n"
-"messages targeting a specific destination are always sent through a "
-"single\n"
-"gateway.  Statistical analysis against outbound 0-hop tunnels are more "
-"complex,\n"
-"but could show similar information (though would be slightly harder to "
-"mount)."
+"deniability (since no one knows for sure that the peer that sent them the\n"
+"message wasn't simply just forwarding it on as part of the tunnel). However, it\n"
+"would be fairly easy to mount a statistical analysis attack and notice that\n"
+"messages targeting a specific destination are always sent through a single\n"
+"gateway.  Statistical analysis against outbound 0-hop tunnels are more complex,\n"
+"but could show similar information (though would be slightly harder to mount)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:182
@@ -13416,14 +10961,10 @@ msgstr ""
 #, python-format
 msgid ""
 "With only one remote router in a tunnel, the user has both plausible\n"
-"deniability and basic anonymity, as long as they are not up against an "
-"internal\n"
-"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>)."
-" However,\n"
-"if the adversary ran a sufficient number of routers such that the single "
-"remote\n"
-"router in the tunnel is often one of those compromised ones, they would "
-"be able\n"
+"deniability and basic anonymity, as long as they are not up against an internal\n"
+"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>). However,\n"
+"if the adversary ran a sufficient number of routers such that the single remote\n"
+"router in the tunnel is often one of those compromised ones, they would be able\n"
 "to mount the above statistical traffic analysis attack."
 msgstr ""
 
@@ -13433,10 +10974,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:193
 msgid ""
-"With two or more remote routers in a tunnel, the costs of mounting the "
-"traffic\n"
-"analysis attack increases, since many remote routers would have to be "
-"compromised\n"
+"With two or more remote routers in a tunnel, the costs of mounting the traffic\n"
+"analysis attack increases, since many remote routers would have to be compromised\n"
 "to mount it."
 msgstr ""
 
@@ -13450,8 +10989,7 @@ msgid ""
 "To reduce the susceptibility to <a href=\"%(url)s\">some attacks</a>,\n"
 "3 or more hops are recommended for the highest level of protection.\n"
 "<a href=\"%(url)s\">Recent studies</a>\n"
-"also conclude that more than 3 hops does not provide additional "
-"protection."
+"also conclude that more than 3 hops does not provide additional protection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:208
@@ -13475,15 +11013,12 @@ msgstr ""
 #, python-format
 msgid ""
 "All tunnels are periodically tested by their creator by sending a\n"
-"DeliveryStatusMessage out an outbound tunnel and bound for another "
-"inbound tunnel\n"
-"(testing both tunnels at once).  If either fails a number of consecutive "
-"tests, it is marked as no longer\n"
+"DeliveryStatusMessage out an outbound tunnel and bound for another inbound tunnel\n"
+"(testing both tunnels at once).  If either fails a number of consecutive tests, it is marked as no longer\n"
 "functional. If it was used for a client's inbound tunnel, a new leaseSet\n"
 "is created.\n"
 "Tunnel test failures are also reflected in the\n"
-"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer "
-"profile</a>."
+"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer profile</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:230
@@ -13493,14 +11028,10 @@ msgstr "Creazione tunnel"
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:231
 #, python-format
 msgid ""
-"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic "
-"routing</a>\n"
-"a Tunnel Build Message to a router, requesting that they participate in "
-"the\n"
-"tunnel (providing them with all of the appropriate information, as above,"
-" along\n"
-"with a certificate, which right now is a 'null' cert, but will support "
-"hashcash\n"
+"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic routing</a>\n"
+"a Tunnel Build Message to a router, requesting that they participate in the\n"
+"tunnel (providing them with all of the appropriate information, as above, along\n"
+"with a certificate, which right now is a 'null' cert, but will support hashcash\n"
 "or other non-free certificates when necessary).\n"
 "That router forwards the message to the next hop in the tunnel.\n"
 "Details are in the\n"
@@ -13510,8 +11041,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:245
 #, python-format
 msgid ""
-"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic"
-" encryption</a>\n"
+"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic encryption</a>\n"
 "of tunnel messages.\n"
 "Details are in the\n"
 "<a href=\"%(tunnelimpl)s\">tunnel specification</a>.\n"
@@ -13532,8 +11062,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:267
 msgid ""
 "In a distant future release,\n"
-"options specifying the pooling, mixing, and chaff generation settings may"
-" be implemented."
+"options specifying the pooling, mixing, and chaff generation settings may be implemented."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:272
@@ -13576,20 +11105,14 @@ msgstr "Opzioni I2CP"
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:6
 msgid ""
-"The I2P Client Protocol (I2CP) exposes a strong separation of concerns "
-"between\n"
-"the router and any client that wishes to communicate over the network.  "
-"It enables\n"
-"secure and asynchronous messaging by sending and receiving messages over "
-"a \n"
+"The I2P Client Protocol (I2CP) exposes a strong separation of concerns between\n"
+"the router and any client that wishes to communicate over the network.  It enables\n"
+"secure and asynchronous messaging by sending and receiving messages over a \n"
 "single TCP socket.\n"
 "With I2CP, a client application tells the\n"
-"router who they are (their \"destination\"), what anonymity, reliability,"
-" and \n"
-"latency tradeoffs to make, and where to send messages.  In turn the "
-"router uses\n"
-"I2CP to tell the client when any messages have arrived, and to request "
-"authorization\n"
+"router who they are (their \"destination\"), what anonymity, reliability, and \n"
+"latency tradeoffs to make, and where to send messages.  In turn the router uses\n"
+"I2CP to tell the client when any messages have arrived, and to request authorization\n"
 "for some tunnels to be used."
 msgstr ""
 
@@ -13598,10 +11121,8 @@ msgstr ""
 msgid ""
 "The protocol itself is implemented in Java, to provide the\n"
 "<a href=\"%(url)s\">Client SDK</a>.\n"
-"This SDK is exposed in the i2p.jar package, which implements the client-"
-"side of I2CP.\n"
-"Clients should never need to access the router.jar package, which "
-"contains the\n"
+"This SDK is exposed in the i2p.jar package, which implements the client-side of I2CP.\n"
+"Clients should never need to access the router.jar package, which contains the\n"
 "router itself and the router-side of I2CP.\n"
 "There is also a <a href=\"%(libi2cp)s\">C library implementation</a>.\n"
 "A non-Java client would also have to implement the\n"
@@ -13612,45 +11133,35 @@ msgstr ""
 #, python-format
 msgid ""
 "Applications can take advantage of the base I2CP plus the \n"
-"<a href=\"%(streaming)s\">streaming</a> and <a "
-"href=\"%(datagrams)s\">datagram</a> libraries\n"
-"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a "
-"href=\"%(bob)s\">BOB</a> protocols,\n"
+"<a href=\"%(streaming)s\">streaming</a> and <a href=\"%(datagrams)s\">datagram</a> libraries\n"
+"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a href=\"%(bob)s\">BOB</a> protocols,\n"
 "which do not require clients to deal with any sort of cryptography.\n"
 "Also, clients may access the network by one of several proxies -\n"
 "HTTP, CONNECT, and SOCKS 4/4a/5.\n"
-"Alternatively, Java clients may access those libraries in "
-"ministreaming.jar and streaming.jar.\n"
+"Alternatively, Java clients may access those libraries in ministreaming.jar and streaming.jar.\n"
 "So there are several options for both Java and non-Java applications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:43
 #, python-format
 msgid ""
-"Client-side end-to-end encryption (encrypting the data over the I2CP "
-"connection)\n"
+"Client-side end-to-end encryption (encrypting the data over the I2CP connection)\n"
 "was disabled in I2P release 0.6,\n"
-"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end "
-"encryption</a>\n"
+"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end encryption</a>\n"
 "which is implemented in the router.\n"
 "The only cryptography that client libraries must still implement is\n"
 "<a href=\"%(cryptography)s#DSA\">DSA public/private key signing</a>\n"
 "for <a href=\"%(i2cp)s#msg_CreateLeaseSet\">LeaseSets</a> and\n"
-"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and"
-" management of those keys."
+"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and management of those keys."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:56
 msgid ""
-"In a standard I2P installation, port 7654 is used by external java "
-"clients to communicate\n"
+"In a standard I2P installation, port 7654 is used by external java clients to communicate\n"
 "with the local router via I2CP.\n"
-"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, "
-"set the\n"
-"router advanced configuration option "
-"<tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n"
-"Clients in the same JVM as the router pass messages directly to the "
-"router\n"
+"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n"
+"router advanced configuration option <tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n"
+"Clients in the same JVM as the router pass messages directly to the router\n"
 "through an internal JVM interface."
 msgstr ""
 
@@ -13658,13 +11169,10 @@ msgstr ""
 #, python-format
 msgid ""
 "The router also supports external connections over SSL.\n"
-"While SSL is not the default, it is strongly recommended for any traffic "
-"that may\n"
-"be exposed to the open Internet. The authorization user/password (if "
-"any), the\n"
+"While SSL is not the default, it is strongly recommended for any traffic that may\n"
+"be exposed to the open Internet. The authorization user/password (if any), the\n"
 "<a href=\"%(commonstructures)s#type_PrivateKey\">Private Key</a> and\n"
-"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private "
-"Key</a> for the\n"
+"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private Key</a> for the\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n"
 "are all transmitted in-the-clear unless SSL is enabled."
 msgstr ""
@@ -13685,19 +11193,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:82
 #, python-format
 msgid ""
-"When a client connects to the router, it first sends a single protocol "
-"version byte (0x2A).\n"
-"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and "
-"waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> "
-"response.\n"
-"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession "
-"Message</a> containing the session configuration.\n"
-"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet"
-" Message</a> from the router, indicating that inbound tunnels\n"
-"have been built, and responds with a CreateLeaseSetMessage containing the"
-" signed LeaseSet.\n"
-"The client may now initiate or receive connections from other I2P "
-"destinations."
+"When a client connects to the router, it first sends a single protocol version byte (0x2A).\n"
+"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> response.\n"
+"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> containing the session configuration.\n"
+"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet Message</a> from the router, indicating that inbound tunnels\n"
+"have been built, and responds with a CreateLeaseSetMessage containing the signed LeaseSet.\n"
+"The client may now initiate or receive connections from other I2P destinations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:91
@@ -13713,10 +11214,7 @@ msgstr ""
 #, python-format
 msgid ""
 "The following options are traditionally passed to the router via\n"
-"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained "
-"in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or "
-"a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession "
-"Message</a>."
+"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession Message</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:104
@@ -13749,14 +11247,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:167
 msgid ""
 "Number of ElGamal/AES Session Tags to send at a time.\n"
-"For clients with relatively low bandwidth per-client-pair (IRC, some UDP "
-"apps), this may be set lower."
+"For clients with relatively low bandwidth per-client-pair (IRC, some UDP apps), this may be set lower."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:179
 msgid ""
-"Comma-separated list of Base 64 Hashes of peers to build tunnels through;"
-" for debugging only"
+"Comma-separated list of Base 64 Hashes of peers to build tunnels through; "
+"for debugging only"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:188
@@ -13773,17 +11270,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:322
 msgid ""
 "Guaranteed is disabled;\n"
-"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1,"
-" the client side default is None as of 0.9.4"
+"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1, the client side default is None as of 0.9.4"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:334
 msgid ""
 "For authorization, if required by the router.\n"
-"If the client is running in the same JVM as a router, this option is not "
-"required.\n"
-"Warning - username and password are sent in the clear to the router, "
-"unless using SSL (i2cp.SSL=true).\n"
+"If the client is running in the same JVM as a router, this option is not required.\n"
+"Warning - username and password are sent in the clear to the router, unless using SSL (i2cp.SSL=true).\n"
 "Authorization is only recommended when using SSL."
 msgstr ""
 
@@ -13857,8 +11351,7 @@ msgid ""
 "Random amount to add or subtract to the length of tunnels in.\n"
 "A positive number x means add a random amount from 0 to x inclusive.\n"
 "A negative number -x means add a random amount from -x to x inclusive.\n"
-"The router will limit the total length of the tunnel to 0 to 7 inclusive."
-"\n"
+"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n"
 "The default variance was 1 prior to release 0.7.6."
 msgstr ""
 
@@ -13867,16 +11360,14 @@ msgid ""
 "Random amount to add or subtract to the length of tunnels out.\n"
 "A positive number x means add a random amount from 0 to x inclusive.\n"
 "A negative number -x means add a random amount from -x to x inclusive.\n"
-"The router will limit the total length of the tunnel to 0 to 7 inclusive."
-"\n"
+"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n"
 "The default variance was 1 prior to release 0.7.6."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:464
 msgid ""
 "Name of tunnel - generally used in routerconsole, which will\n"
-"use the first few characters of the Base64 hash of the destination by "
-"default."
+"use the first few characters of the Base64 hash of the destination by default."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:476
@@ -13892,8 +11383,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:497
 msgid ""
 "Number of tunnels in.\n"
-"Limit was increased from 6 to 16 in release 0.9; however, numbers higher "
-"than 6 are\n"
+"Limit was increased from 6 to 16 in release 0.9; however, numbers higher than 6 are\n"
 "incompatible with older releases."
 msgstr ""
 
@@ -13908,32 +11398,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:538
 msgid ""
 "Any other options prefixed with \"inbound.\" are stored\n"
-"in the \"unknown options\" properties of the inbound tunnel pool's "
-"settings."
+"in the \"unknown options\" properties of the inbound tunnel pool's settings."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:550
 msgid ""
 "Any other options prefixed with \"outbound.\" are stored\n"
-"in the \"unknown options\" properties of the outbound tunnel pool's "
-"settings."
+"in the \"unknown options\" properties of the outbound tunnel pool's settings."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:562
 msgid ""
 "Set to false to disable ever bundling a reply LeaseSet.\n"
 "For clients that do not publish their LeaseSet, this option must be true\n"
-"for any reply to be possible. \"true\" is also recommended for multihomed"
-" servers\n"
+"for any reply to be possible. \"true\" is also recommended for multihomed servers\n"
 "with long connection times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:569
 msgid ""
-"Setting to \"false\" may save significant outbound bandwidth, especially "
-"if\n"
-"the client is configured with a large number of inbound tunnels (Leases)."
-"\n"
+"Setting to \"false\" may save significant outbound bandwidth, especially if\n"
+"the client is configured with a large number of inbound tunnels (Leases).\n"
 "If replies are still required, this may shift the bandwidth burden to\n"
 "the far-end client and the floodfill.\n"
 "There are several cases where \"false\" may be appropriate:"
@@ -13949,14 +11434,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:579
 msgid ""
-"LeaseSet is published, client is a \"server\", all connections are "
-"inbound\n"
-"so the connecting far-end destination obviously has the leaseset already."
-"\n"
-"Connections are either short, or it is acceptable for latency on a long-"
-"lived\n"
-"connection to temporarily increase while the other end re-fetches the "
-"LeaseSet\n"
+"LeaseSet is published, client is a \"server\", all connections are inbound\n"
+"so the connecting far-end destination obviously has the leaseset already.\n"
+"Connections are either short, or it is acceptable for latency on a long-lived\n"
+"connection to temporarily increase while the other end re-fetches the LeaseSet\n"
 "after expiration.\n"
 "HTTP servers may fit these requirements."
 msgstr ""
@@ -13970,15 +11451,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:596
 #, python-format
 msgid ""
-"Note: As of release 0.7.7, option names and values must use UTF-8 "
-"encoding.\n"
+"Note: As of release 0.7.7, option names and values must use UTF-8 encoding.\n"
 "This is primarily useful for nicknames.\n"
-"Prior to that release, options with multi-byte characters were corrupted."
-"\n"
-"Since options are encoded in a <a "
-"href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n"
-"all option names and values are limited to 255 bytes (not characters) "
-"maximum."
+"Prior to that release, options with multi-byte characters were corrupted.\n"
+"Since options are encoded in a <a href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n"
+"all option names and values are limited to 255 bytes (not characters) maximum."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:610
@@ -13989,8 +11466,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:611
 msgid ""
 "The following options are interpreted on the client side,\n"
-"and will be interpreted if passed to the I2PSession via the "
-"I2PClient.createSession() call.\n"
+"and will be interpreted if passed to the I2PSession via the I2PClient.createSession() call.\n"
 "The streaming lib should also pass these options through to I2CP.\n"
 "Other implementations may have different defaults."
 msgstr ""
@@ -14066,28 +11542,24 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:871
 msgid ""
 "Connect to the router using SSL.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:883
 msgid ""
 "Router hostname.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:895
 msgid ""
 "Router I2CP port.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:902
 msgid ""
-"Note: All arguments, including numbers, are strings. True/false values "
-"are case-insensitive strings.\n"
+"Note: All arguments, including numbers, are strings. True/false values are case-insensitive strings.\n"
 "Anything other than case-insensitive \"true\" is interpreted as false.\n"
 "All option names are case-sensitive."
 msgstr ""
@@ -14099,28 +11571,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:909
 #, python-format
 msgid ""
-"The end-to-end messages handled by I2CP (i.e. the data sent by the client"
-" in a\n"
+"The end-to-end messages handled by I2CP (i.e. the data sent by the client in a\n"
 "<a href=\"%(i2cp)s#msg_SendMessage\">SendMessageMessage</a>\n"
 "and received by the client in a\n"
 "<a href=\"%(i2cp)s#msg_MessagePayload\">MessagePayloadMessage</a>)\n"
 "are gzipped with a standard 10-byte gzip\n"
 "header beginning with 0x1F 0x8B 0x08 as\n"
-"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC "
-"1952</a>.\n"
-"As of release 0.7.1, I2P uses ignored portions of the gzip header to "
-"include\n"
-"protocol, from-port, and to-port information, thus supporting streaming "
-"and\n"
-"datagrams on the same destination, and allowing query/response using "
-"datagrams\n"
+"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC 1952</a>.\n"
+"As of release 0.7.1, I2P uses ignored portions of the gzip header to include\n"
+"protocol, from-port, and to-port information, thus supporting streaming and\n"
+"datagrams on the same destination, and allowing query/response using datagrams\n"
 "to work reliably in the presence of multiple channels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:923
 msgid ""
-"The gzip function cannot be completely turned off, however setting "
-"i2cp.gzip=false\n"
+"The gzip function cannot be completely turned off, however setting i2cp.gzip=false\n"
 "turns the gzip effort setting to 0, which may save a little CPU."
 msgstr ""
 
@@ -14154,7 +11620,8 @@ msgid "Gzip xflags"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:960
-msgid "I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)"
+msgid ""
+"I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:969
@@ -14179,8 +11646,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:987
 #, python-format
 msgid ""
-"Some improvements may be able to use messages previously defined but not "
-"implemented.\n"
+"Some improvements may be able to use messages previously defined but not implemented.\n"
 "For reference, here is the\n"
 "<a href=\"%(pdf1)s\">I2CP Protocol Specification Version 0.9</a>\n"
 "(PDF) dated August 28, 2003.\n"
@@ -14199,12 +11665,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2np.html:6
 msgid ""
 "The I2P Network Protocol (I2NP),\n"
-"which is sandwiched between I2CP and the various I2P transport protocols,"
-" manages the\n"
-"routing and mixing of messages between routers, as well as the selection "
-"of what\n"
-"transports to use when communicating with a peer for which there are "
-"multiple\n"
+"which is sandwiched between I2CP and the various I2P transport protocols, manages the\n"
+"routing and mixing of messages between routers, as well as the selection of what\n"
+"transports to use when communicating with a peer for which there are multiple\n"
 "common transports supported."
 msgstr ""
 
@@ -14214,20 +11677,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:15
 msgid ""
-"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-"
-"router, point-to-point messages.\n"
-"By encrypting and wrapping messages in other messages, they can be sent "
-"in a secure way\n"
+"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-router, point-to-point messages.\n"
+"By encrypting and wrapping messages in other messages, they can be sent in a secure way\n"
 "through multiple hops to the ultimate destination.\n"
-"Priority is only used locally at the origin, i.e. when queuing for "
-"outbound delivery."
+"Priority is only used locally at the origin, i.e. when queuing for outbound delivery."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:22
 #, python-format
 msgid ""
-"The priorities listed below may not be current and are subject to change."
-"\n"
+"The priorities listed below may not be current and are subject to change.\n"
 "See the <a href=\"%(outnetmessage)s\">OutNetMessage Javadocs</a>\n"
 "for the current priority settings.\n"
 "Priority queueing implementation may vary."
@@ -14239,8 +11698,7 @@ msgstr "Formato messaggio"
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:31
 msgid ""
-"The following table specifies the traditional 16-byte header used in "
-"NTCP.\n"
+"The following table specifies the traditional 16-byte header used in NTCP.\n"
 "The SSU and NTCP2 transports use modified headers."
 msgstr ""
 
@@ -14277,23 +11735,18 @@ msgstr "Payload"
 #: i2p2www/pages/site/docs/protocol/i2np.html:46
 #, python-format
 msgid ""
-"While the maximum payload size is nominally 64KB, the size is further "
-"constrained by the\n"
-"method of fragmenting I2NP messages into multiple 1KB tunnel messages as "
-"described on\n"
+"While the maximum payload size is nominally 64KB, the size is further constrained by the\n"
+"method of fragmenting I2NP messages into multiple 1KB tunnel messages as described on\n"
 "<a href=\"%(tunnelimpl)s\">the tunnel implementation page</a>.\n"
-"The maximum number of fragments is 64, and the message may not be "
-"perfectly aligned,\n"
+"The maximum number of fragments is 64, and the message may not be perfectly aligned,\n"
 "So the message must nominally fit in 63 fragments."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:54
 msgid ""
-"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL "
-"delivery mode);\n"
+"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL delivery mode);\n"
 "the maximum size of a follow-on fragment is 996 bytes.\n"
-"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 "
-"bytes, or 61.2 KB."
+"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 bytes, or 61.2 KB."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:60
@@ -14301,16 +11754,13 @@ msgid ""
 "In addition, the transports may have additional restrictions.\n"
 "The NTCP limit is 16KB - 6 = 16378 bytes.\n"
 "The SSU limit is approximately 32 KB.\n"
-"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher"
-" than what a tunnel can support."
+"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher than what a tunnel can support."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:67
 msgid ""
-"Note that these are not the limits for datagrams that the client sees, as"
-" the\n"
-"router may bundle a reply leaseset and/or session tags together with the "
-"client message\n"
+"Note that these are not the limits for datagrams that the client sees, as the\n"
+"router may bundle a reply leaseset and/or session tags together with the client message\n"
 "in a garlic message. The leaseset and tags together may add about 5.5KB.\n"
 "Therefore the current datagram limit is about 10KB. This limit will be\n"
 "increased in a future release."
@@ -14367,8 +11817,7 @@ msgid ""
 "Priority may vary.\n"
 "Size is 898 bytes for a typical 2-lease leaseSet.\n"
 "RouterInfo structures are compressed, and size varies; however\n"
-"there is a continuing effort to reduce the amount of data published in a "
-"RouterInfo\n"
+"there is a continuing effort to reduce the amount of data published in a RouterInfo\n"
 "as we approach release 1.0."
 msgstr ""
 
@@ -14378,8 +11827,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:150
 msgid ""
-"Used for message replies, and for testing tunnels - generally wrapped in "
-"a GarlicMessage"
+"Used for message replies, and for testing tunnels - generally wrapped in a "
+"GarlicMessage"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:158
@@ -14390,8 +11839,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:185
 msgid ""
-"The most common message. Priority for tunnel participants, outbound "
-"endpoints, and inbound gateways was\n"
+"The most common message. Priority for tunnel participants, outbound endpoints, and inbound gateways was\n"
 "reduced to 200 as of release 0.6.1.33.\n"
 "Outbound gateway messages (i.e. those originated locally) remains at 400."
 msgstr ""
@@ -14422,16 +11870,13 @@ msgstr "Specifica completa del protocollo"
 msgid ""
 "<a href=\"%(i2npspec)s\">On the I2NP Specification page</a>.\n"
 "See also the\n"
-"<a href=\"%(commonstructures)s\">Common Data Structure Specification "
-"page</a>."
+"<a href=\"%(commonstructures)s\">Common Data Structure Specification page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:234
 msgid ""
-"It isn't clear whether the current priority scheme is generally "
-"effective,\n"
-"and whether the priorities for various messages should be adjusted "
-"further.\n"
+"It isn't clear whether the current priority scheme is generally effective,\n"
+"and whether the priorities for various messages should be adjusted further.\n"
 "This is a topic for further research, analysis and testing."
 msgstr ""
 
@@ -14453,8 +11898,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:12
 msgid ""
 "Each of the layers in the stack provides extra capabilities.\n"
-"The capabilities are listed below, starting at the bottom of the protocol"
-" stack."
+"The capabilities are listed below, starting at the bottom of the protocol stack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:18
@@ -14463,8 +11907,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:20
 msgid ""
-"IP: Internet Protocol, allow addressing hosts on the regular internet and"
-" routing packets across the internet using best-effort delivery."
+"IP: Internet Protocol, allow addressing hosts on the regular internet and "
+"routing packets across the internet using best-effort delivery."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:23
@@ -14485,11 +11929,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:30
 msgid ""
-"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P "
-"routers. These are not anonymous yet, this is strictly a hop-to-hop "
-"connection.\n"
-"Two protocols are implemented to provide these capabilities. NTCP builds "
-"on top of TCP, while SSU uses UDP."
+"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P routers. These are not anonymous yet, this is strictly a hop-to-hop connection.\n"
+"Two protocols are implemented to provide these capabilities. NTCP builds on top of TCP, while SSU uses UDP."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:35
@@ -14507,20 +11948,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:42
 #, python-format
 msgid ""
-"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are "
-"large messages containing encrypted I2NP (see below) messages and "
-"encrypted instructions for their delivery.\n"
-"The encryption is layered. The first hop will decrypt the tunnel message "
-"and read a part. Another part can still be encrypted (with another key),"
-"\n"
+"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are large messages containing encrypted I2NP (see below) messages and encrypted instructions for their delivery.\n"
+"The encryption is layered. The first hop will decrypt the tunnel message and read a part. Another part can still be encrypted (with another key),\n"
 "so it will be forwarded."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:48
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are"
-" used to pass messages through multiple routers. These I2NP messages are "
+"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are "
+"used to pass messages through multiple routers. These I2NP messages are "
 "combined in tunnel messages."
 msgstr ""
 
@@ -14533,54 +11970,51 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:55
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are"
-" wrapped in each other and used to ensure encryption between two tunnels "
-"and are passed along from source to destination, keeping both anonymous."
+"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are "
+"wrapped in each other and used to ensure encryption between two tunnels and "
+"are passed along from source to destination, keeping both anonymous."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:61
 msgid ""
-"The following layers are strictly speaking no longer part of the I2P "
-"Protocol stack, they are not part of the core 'I2P router' functionality."
-"\n"
-"However, each of these layers adds additional functionality, to allow "
-"applications simple and convenient I2P usage."
+"The following layers are strictly speaking no longer part of the I2P Protocol stack, they are not part of the core 'I2P router' functionality.\n"
+"However, each of these layers adds additional functionality, to allow applications simple and convenient I2P usage."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:67
 msgid ""
-"<b>I2P Client Layer:</b> allow any client to use I2P functionality, "
-"without requiring the direct use of the router API."
+"<b>I2P Client Layer:</b> allow any client to use I2P functionality, without "
+"requiring the direct use of the router API."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:69
 #, python-format
 msgid ""
 "<a href=\"%(i2cp)s\">I2CP</a>: I2P Client Protocol, allows secure and "
-"asynchronous messaging over I2P by communicating messages over the I2CP "
-"TCP socket."
+"asynchronous messaging over I2P by communicating messages over the I2CP TCP "
+"socket."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:74
 msgid ""
-"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like "
-"functionality on top of I2P."
+"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like functionality "
+"on top of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:76
 #, python-format
 msgid ""
-"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of "
-"TCP-like streams over I2P. This allows easier porting of existing "
-"applications to I2P."
+"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of TCP-"
+"like streams over I2P. This allows easier porting of existing applications "
+"to I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:80
 #, python-format
 msgid ""
 "<a href=\"%(datagrams)s\">Datagram Library</a>: an implementation of UDP-"
-"like messages over I2P. This allows easier porting of existing "
-"applications to I2P."
+"like messages over I2P. This allows easier porting of existing applications "
+"to I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:85
@@ -14600,8 +12034,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:99
 msgid ""
-"Finally, what could be considered the <b>'I2P application layer'</b>, is "
-"a large number of applications on top of I2P.\n"
+"Finally, what could be considered the <b>'I2P application layer'</b>, is a large number of applications on top of I2P.\n"
 "We can order this based on the I2P stack layer they use."
 msgstr ""
 
@@ -14653,12 +12086,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:8
 msgid ""
-"A \"transport\" in I2P is a method for direct, point-to-point "
-"communication\n"
+"A \"transport\" in I2P is a method for direct, point-to-point communication\n"
 "between two routers.\n"
 "Transports must provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router "
-"contacted \n"
+"against external adversaries while authenticating that the router contacted \n"
 "is the one who should receive a given message."
 msgstr ""
 
@@ -14712,8 +12143,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:44
 msgid ""
 "Maintain a set of router addresses, one or more for each transport,\n"
-"that the router publishes as its global contact information (the "
-"RouterInfo).\n"
+"that the router publishes as its global contact information (the RouterInfo).\n"
 "Each transport may connect using one of these addresses, which may be\n"
 "IPv4 or (as of version 0.9.8) IPv6."
 msgstr ""
@@ -14742,10 +12172,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:55
 msgid ""
-"Maintenance of connection limits for each transport, implementation of "
-"various thresholds for these limits,\n"
-"and communication of threshold status to the router so it may make "
-"operational changes based on the status"
+"Maintenance of connection limits for each transport, implementation of various thresholds for these limits,\n"
+"and communication of threshold status to the router so it may make operational changes based on the status"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:59
@@ -14764,27 +12192,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:62
 msgid ""
-"Coordination of firewall status and local IP, and changes to either, "
-"among the transports"
+"Coordination of firewall status and local IP, and changes to either, among "
+"the transports"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:63
 #: i2p2www/pages/site/docs/transport/ssu.html:35
 msgid ""
-"Communication of firewall status and local IP, and changes to either, to "
-"the router and the user interface"
+"Communication of firewall status and local IP, and changes to either, to the"
+" router and the user interface"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:64
 msgid ""
-"Determination of a consensus clock, which is used to periodically update "
-"the router's clock, as a backup for NTP"
+"Determination of a consensus clock, which is used to periodically update the"
+" router's clock, as a backup for NTP"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:65
 msgid ""
-"Maintenance of status for each peer, including whether it is connected, "
-"whether it was recently connected,\n"
+"Maintenance of status for each peer, including whether it is connected, whether it was recently connected,\n"
 "and whether it was reachable in the last attempt"
 msgstr ""
 
@@ -14794,8 +12221,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:70
 msgid ""
-"Honoring the automated and manual lists of banned peers maintained by the"
-" router,\n"
+"Honoring the automated and manual lists of banned peers maintained by the router,\n"
 "and refusing outbound and inbound connections to those peers"
 msgstr ""
 
@@ -14805,10 +12231,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:79
 msgid ""
-"The transport subsystem maintains a set of router addresses, each of "
-"which lists a transport method, IP, and port.\n"
-"These addresses constitute the advertised contact points, and are "
-"published by the router to the network database.\n"
+"The transport subsystem maintains a set of router addresses, each of which lists a transport method, IP, and port.\n"
+"These addresses constitute the advertised contact points, and are published by the router to the network database.\n"
 "Addresses may also contain an arbitrary set of additional options."
 msgstr ""
 
@@ -14829,16 +12253,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:92
 #, python-format
 msgid ""
-"A router is firewalled, and therefore publishes an SSU address which "
-"contains a list of cooperating\n"
-"peers or \"introducers\" who will assist in NAT traversal (see <a "
-"href=\"%(ssu)s\">the SSU spec</a> for details)"
+"A router is firewalled, and therefore publishes an SSU address which contains a list of cooperating\n"
+"peers or \"introducers\" who will assist in NAT traversal (see <a href=\"%(ssu)s\">the SSU spec</a> for details)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:96
 msgid ""
-"A router is not firewalled or its NAT ports  are open; it publishes both "
-"NTCP and SSU addresses containing\n"
+"A router is not firewalled or its NAT ports  are open; it publishes both NTCP and SSU addresses containing\n"
 "directly-accessible IP and ports."
 msgstr ""
 
@@ -14849,10 +12270,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:104
 #, python-format
 msgid ""
-"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> "
-"only. The transport selected for any message is\n"
-"independent of the upper-layer protocols and contents (router or client "
-"messages, whether an external application was using\n"
+"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> only. The transport selected for any message is\n"
+"independent of the upper-layer protocols and contents (router or client messages, whether an external application was using\n"
 "TCP or UDP to connect to I2P, whether the upper layer was using\n"
 "<a href=\"%(streaming)s\">the streaming library</a>\n"
 "streaming\n"
@@ -14864,15 +12283,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:118
 msgid ""
-"For each outgoing message, the transport system solicits \"bids\" from "
-"each transport.\n"
-"The transport bidding the lowest (best) value wins the bid and receives "
-"the message for delivery.\n"
+"For each outgoing message, the transport system solicits \"bids\" from each transport.\n"
+"The transport bidding the lowest (best) value wins the bid and receives the message for delivery.\n"
 "A transport may refuse to bid."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:124
-msgid "Whether a transport bids, and with what value, depend on numerous factors:"
+msgid ""
+"Whether a transport bids, and with what value, depend on numerous factors:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:128
@@ -14895,8 +12313,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:132
 msgid ""
-"The size of the message, as different transports have different size "
-"limits"
+"The size of the message, as different transports have different size limits"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:133
@@ -14906,7 +12323,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:134
-msgid "Whether the connection would be indirect (requiring introducers) or direct"
+msgid ""
+"Whether the connection would be indirect (requiring introducers) or direct"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:135
@@ -14915,8 +12333,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:138
 msgid ""
-"In general, the bid values are selected so that two routers are only "
-"connected by a single transport\n"
+"In general, the bid values are selected so that two routers are only connected by a single transport\n"
 "at any one time. However, this is not a requirement."
 msgstr ""
 
@@ -14934,8 +12351,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:153
 msgid ""
-"An \"indirect\" transport for routers that are not reachable by all other"
-" routers (one form of \"restricted routes\")"
+"An \"indirect\" transport for routers that are not reachable by all other "
+"routers (one form of \"restricted routes\")"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:154
@@ -14944,31 +12361,24 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:157
 msgid ""
-"Work continues on adjusting default connection limits for each transport."
-"\n"
-"I2P is designed as a \"mesh network\", where it is assumed that any "
-"router can connect to any other router.\n"
-"This assumption may be broken by routers that have exceeded their "
-"connection limits, and by\n"
+"Work continues on adjusting default connection limits for each transport.\n"
+"I2P is designed as a \"mesh network\", where it is assumed that any router can connect to any other router.\n"
+"This assumption may be broken by routers that have exceeded their connection limits, and by\n"
 "routers that are behind restrictive state firewalls (restricted routes)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:164
 msgid ""
-"The current connection limits are higher for SSU than for NTCP, based on "
-"the assumption that\n"
-"the memory requirements for an NTCP connection are higher than that for "
-"SSU.\n"
-"However, as NTCP buffers are partially in the kernel and SSU buffers are "
-"on the Java heap,\n"
+"The current connection limits are higher for SSU than for NTCP, based on the assumption that\n"
+"the memory requirements for an NTCP connection are higher than that for SSU.\n"
+"However, as NTCP buffers are partially in the kernel and SSU buffers are on the Java heap,\n"
 "that assumption is difficult to verify."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:171
 #, python-format
 msgid ""
-"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol "
-"Obfuscation</a>\n"
+"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol Obfuscation</a>\n"
 "and see how transport-layer padding may improve things."
 msgstr ""
 
@@ -14979,11 +12389,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:6
 #, python-format
 msgid ""
-"The others are <a href=\"%(ssu)s\">SSU</a> and <a "
-"href=\"%(ntcp2)s\">NTCP2</a>.\n"
+"The others are <a href=\"%(ssu)s\">SSU</a> and <a href=\"%(ntcp2)s\">NTCP2</a>.\n"
 "NTCP is a Java NIO-based transport introduced in I2P release 0.6.1.22.\n"
-"Java NIO (new I/O) does not suffer from the 1 thread per connection "
-"issues of the old TCP transport.\n"
+"Java NIO (new I/O) does not suffer from the 1 thread per connection issues of the old TCP transport.\n"
 "NTCP-over-IPv6 is supported as of version 0.9.8."
 msgstr ""
 
@@ -14998,8 +12406,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:21
 msgid ""
-"The NTCP code within I2P is relatively lightweight (1/4 the size of the "
-"SSU code)\n"
+"The NTCP code within I2P is relatively lightweight (1/4 the size of the SSU code)\n"
 "because it uses the underlying Java TCP transport for reliable delivery."
 msgstr ""
 
@@ -15024,21 +12431,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:47
 msgid ""
 "After establishment,\n"
-"the NTCP transport sends individual I2NP messages, with a simple "
-"checksum.\n"
+"the NTCP transport sends individual I2NP messages, with a simple checksum.\n"
 "The unencrypted message is encoded as follows:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:65
 msgid ""
-"The data is then AES/256/CBC encrypted. The session key for the "
-"encryption\n"
+"The data is then AES/256/CBC encrypted. The session key for the encryption\n"
 "is negotiated during establishment (using Diffie-Hellman 2048 bit).\n"
-"The establishment between two routers is implemented in the "
-"EstablishState class\n"
+"The establishment between two routers is implemented in the EstablishState class\n"
 "and detailed below.\n"
-"The IV for AES/256/CBC encryption is the last 16 bytes of the previous "
-"encrypted message."
+"The IV for AES/256/CBC encryption is the last 16 bytes of the previous encrypted message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:73
@@ -15062,8 +12465,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:93
 msgid ""
-"Total length: 16 bytes. The time sync message is sent at approximately 15"
-" minute intervals.\n"
+"Total length: 16 bytes. The time sync message is sent at approximately 15 minute intervals.\n"
 "The message is encrypted just as standard messages are."
 msgstr ""
 
@@ -15086,14 +12488,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:107
 #: i2p2www/pages/site/docs/transport/ssu.html:188
 msgid ""
-"Idle timeout and connection close is at the discretion of each endpoint "
-"and may vary.\n"
-"The current implementation lowers the timeout as the number of "
-"connections approaches the\n"
-"configured maximum, and raises the timeout when the connection count is "
-"low.\n"
-"The recommended minimum timeout is two minutes or more, and the "
-"recommended\n"
+"Idle timeout and connection close is at the discretion of each endpoint and may vary.\n"
+"The current implementation lowers the timeout as the number of connections approaches the\n"
+"configured maximum, and raises the timeout when the connection count is low.\n"
+"The recommended minimum timeout is two minutes or more, and the recommended\n"
 "maximum timeout is ten minutes or more."
 msgstr ""
 
@@ -15104,12 +12502,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:117
 msgid ""
 "After establishment, and every 30-60 minutes thereafter,\n"
-"the two routers should generally exchange RouterInfos using a "
-"DatabaseStoreMessage.\n"
-"However, Alice should check if the first queued message is a "
-"DatabaseStoreMessage\n"
-"so as not to send a duplicate message; this is often the case when "
-"connecting to a floodfill router."
+"the two routers should generally exchange RouterInfos using a DatabaseStoreMessage.\n"
+"However, Alice should check if the first queued message is a DatabaseStoreMessage\n"
+"so as not to send a duplicate message; this is often the case when connecting to a floodfill router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:125
@@ -15118,11 +12513,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:126
 msgid ""
-"In the establish state, there is a 4-phase message sequence to exchange "
-"DH keys and signatures.\n"
+"In the establish state, there is a 4-phase message sequence to exchange DH keys and signatures.\n"
 "In the first two messages there is a 2048-bit Diffie Hellman exchange.\n"
-"Then, signatures of the critical data are exchanged to confirm the "
-"connection."
+"Then, signatures of the critical data are exchanged to confirm the connection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:142
@@ -15160,15 +12553,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:159
 msgid ""
 "The DH key exchange consists of a number of steps, displayed below.\n"
-"The mapping between these steps and the messages sent between I2P "
-"routers,\n"
+"The mapping between these steps and the messages sent between I2P routers,\n"
 "is marked in bold."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:165
 msgid ""
-"Alice generates a secret integer x. She then calculates <code>X = g^x mod"
-" p</code>."
+"Alice generates a secret integer x. She then calculates <code>X = g^x mod "
+"p</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:166
@@ -15202,8 +12594,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:173
 #, python-format
 msgid ""
-"The sessionKey is then used to exchange identities in <b>Message 3</b> "
-"and <b>Message 4</b>.\n"
+"The sessionKey is then used to exchange identities in <b>Message 3</b> and <b>Message 4</b>.\n"
 "The exponent (x and y) length for the DH exchange is documented on the\n"
 "<a href=\"%(crypto)s#exponent\">cryptography page</a>."
 msgstr ""
@@ -15216,8 +12607,7 @@ msgstr ""
 #, python-format
 msgid ""
 "This is the DH request. Alice already has Bob's\n"
-"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router "
-"Identity</a>,\n"
+"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router Identity</a>,\n"
 "IP address, and port, as contained in his\n"
 "<a href=\"%(commonstructures)s#struct_RouterInfo\">Router Info</a>,\n"
 "which was published to the\n"
@@ -15297,8 +12687,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:312
 #, python-format
 msgid ""
-"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH "
-"session key and\n"
+"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
 "                  the last 16 bytes of Y as the IV"
 msgstr ""
 
@@ -15314,8 +12703,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:326
 msgid ""
-"This contains Alice's router identity, and a signature of the critical "
-"data. Alice sends Bob:"
+"This contains Alice's router identity, and a signature of the critical data."
+" Alice sends Bob:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:360
@@ -15335,17 +12724,14 @@ msgstr "0-15 byte di dati casuali"
 msgid ""
 "the `Signature` of the following concatenated data:\n"
 "             X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-"             Alice signs it with the `SigningPrivateKey` associated with "
-"the `SigningPublicKey` in her `RouterIdentity`"
+"             Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:389
 #, python-format
 msgid ""
-"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH"
-" session key and\n"
-"                  the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
-"of message #1) as the IV"
+"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
+"                  the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:400
@@ -15360,8 +12746,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:406
 msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this "
-"message as the IV for the next message."
+"Alice will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:430
@@ -15376,19 +12762,15 @@ msgstr ""
 msgid ""
 "the `Signature` of the following concatenated data:\n"
 "             X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-"             Bob signs it with the `SigningPrivateKey` associated with "
-"the `SigningPublicKey` in his `RouterIdentity`"
+"             Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:479
 #, python-format
 msgid ""
-"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH "
-"session key and\n"
-"                  the last 16 bytes of the encrypted contents of message "
-"#2 as the IV\n"
-"                  48 bytes for a DSA signature, may vary for other "
-"signature types"
+"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
+"                  the last 16 bytes of the encrypted contents of message #2 as the IV\n"
+"                  48 bytes for a DSA signature, may vary for other signature types"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:488
@@ -15397,8 +12779,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:491
 msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
+"Bob will use the last 16 bytes of the encrypted contents of this message as "
+"the IV for the next message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:506
@@ -15407,14 +12789,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:507
 msgid ""
-"The connection is established, and standard or time sync messages may be "
-"exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session"
-" key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 "
-"as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
-" the next IV."
+"The connection is established, and standard or time sync messages may be exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:516
@@ -15441,8 +12819,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:528
 msgid ""
-"that many bytes making up the local router's IP address (as reached by "
-"the remote side)"
+"that many bytes making up the local router's IP address (as reached by the "
+"remote side)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:529
@@ -15461,8 +12839,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:532
 msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 "
-"through bytes 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 through "
+"bytes 223"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:535
@@ -15485,11 +12863,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:550
 msgid ""
 "A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to"
-" \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
 "end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next "
-"16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
 "to create a limited number of message sizes."
 msgstr ""
 
@@ -15512,28 +12888,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:7
 #, python-format
 msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user "
-"interfaces)\n"
-"is one of three <a href=\"%(transports)s\">transports</a> currently "
-"implemented in I2P.\n"
-"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a "
-"href=\"%(ntcp2)s\">NTCP2</a>."
+"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
+"is one of three <a href=\"%(transports)s\">transports</a> currently implemented in I2P.\n"
+"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a href=\"%(ntcp2)s\">NTCP2</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:13
 msgid ""
 "SSU was introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for "
-"outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
 "SSU-over-IPv6 is supported as of version 0.9.8."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:19
 msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit "
-"unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is "
-"dropped."
+"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is dropped."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:24
@@ -15542,10 +12912,8 @@ msgstr "Servizi SSU"
 
 #: i2p2www/pages/site/docs/transport/ssu.html:26
 msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
-"oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, "
-"including:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:32
@@ -15562,8 +12930,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:34
 msgid ""
-"Communication of firewall status and local IP, and changes to either to "
-"NTCP"
+"Communication of firewall status and local IP, and changes to either to NTCP"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:46
@@ -15598,26 +12965,20 @@ msgid ""
 "Packets are scheduled according to the router's policy, taking care\n"
 "not to exceed the router's outbound capacity or to exceed the measured \n"
 "capacity of the remote peer.  The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive "
-"increases\n"
-"to the sending capacity and multiplicative decreases in face of "
-"congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive increases\n"
+"to the sending capacity and multiplicative decreases in face of congestion.\n"
 "Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit"
-" \n"
+"a given period or number of retransmissions while continuing to transmit \n"
 "other messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:106
 msgid ""
 "The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message"
-"\n"
-"has a limited size - at most, 32KB.  To efficiently transmit this "
-"feedback\n"
+"message has its own unique and nonsequential identifier, and each message\n"
+"has a limited size - at most, 32KB.  To efficiently transmit this feedback\n"
 "to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received"
-"\n"
+"message identifiers and may also include bitfields for partially received\n"
 "messages, where each bit represents the reception of a fragment.  If \n"
 "duplicate fragments arrive, the message should be ACKed again, or if the\n"
 "message has still not been fully received, the bitfield should be \n"
@@ -15627,8 +12988,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:118
 msgid ""
 "The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment "
-"into\n"
+"any particular size, but instead just places a single message fragment into\n"
 "a packet and sends it off (careful not to exceed the MTU)."
 msgstr ""
 
@@ -15636,8 +12996,7 @@ msgstr ""
 msgid ""
 "As of router version 0.8.12,\n"
 "two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are "
-"retransmitted."
+"The MTU value is adjusted based on the percentage of packets that are retransmitted."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:131
@@ -15656,10 +13015,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:143
 msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP "
-"messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
-"to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
 "into a live network MTU anyway)."
 msgstr ""
 
@@ -15679,8 +13036,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:161
 msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than "
-"1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
 "it will publish that in the network database, and other routers should\n"
 "honor that when a connection is established."
 msgstr ""
@@ -15700,13 +13056,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:175
 msgid ""
 "While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or "
-"128.\n"
-"The current implementation, however, limits each message to a maximum of "
-"64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
+"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
 "which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical "
-"limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
 "at the application level is about 6KB lower, or about 26KB.\n"
 "Further work is necessary to raise the UDP transport limit above 32KB.\n"
 "For connections using the larger MTU, larger messages are possible."
@@ -15720,8 +13073,7 @@ msgstr "Chiavi"
 msgid ""
 "All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
 "When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and "
-"are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
 "for the HMAC and encryption, respectively.  During the DH exchange, \n"
 "Bob's publicly knowable introKey is used for the MAC and encryption."
 msgstr ""
@@ -15738,8 +13090,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:216
 msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and"
-" port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
 "with all established sessions - if there are matches,\n"
 "that session's MAC keys are tested in the HMAC.  If none\n"
 "of those verify or if there are no matching IP addresses, the \n"
@@ -15829,8 +13180,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:296
 msgid ""
-"Direct session establishment is used when no third party is required for "
-"NAT traversal.\n"
+"Direct session establishment is used when no third party is required for NAT traversal.\n"
 "The message sequence is as follows:"
 msgstr ""
 
@@ -15850,10 +13200,8 @@ msgid ""
 "After the SessionConfirmed message is received, Bob sends a small\n"
 "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">DeliveryStatus message</a>\n"
 "as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the"
-"\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
-"\n"
+"In this message, the 4-byte message ID is set to a random number, and the\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
 "(i.e. 0x0000000000000002)."
 msgstr ""
 
@@ -15869,8 +13217,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:335
 msgid ""
-"It does not appear that the type of the status message or its contents "
-"matters.\n"
+"It does not appear that the type of the status message or its contents matters.\n"
 "It was originally added becasue the DatabaseStore message was delayed\n"
 "several seconds; since the store is now sent immediately, perhaps\n"
 "the status message can be eliminated."
@@ -15880,8 +13227,7 @@ msgstr ""
 msgid ""
 "Introduction keys are delivered through an external channel \n"
 "(the network database),\n"
-"where they have traditionally been identical to the router Hash through "
-"release 0.9.47,\n"
+"where they have traditionally been identical to the router Hash through release 0.9.47,\n"
 "but may be random as of release 0.9.48.\n"
 "They must be used when establishing a session key.  For the indirect\n"
 "address, the peer must first contact the relayhost and ask them for\n"
@@ -15900,24 +13246,16 @@ msgid ""
 "is necessary for efficient NAT traversal.  Charlie, a router behind a\n"
 "NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
 "first contacts a few peers, choosing some to serve as introducers.  Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
-"introduction\n"
-"tag - a 4 byte random number - which he then makes available to the "
-"public\n"
-"as methods of contacting him.  Alice, a router who has Charlie's "
-"published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the"
-" \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
+"tag - a 4 byte random number - which he then makes available to the public\n"
+"as methods of contacting him.  Alice, a router who has Charlie's published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the \n"
 "introducers, asking each to introduce her to Charlie (offering the \n"
 "introduction tag to identify Charlie).  Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends"
-"\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port"
-"\n"
-"number.  When Charlie receives the RelayIntro packet, he sends off a "
-"small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
-"\n"
+"packet to Charlie including Alice's public IP and port number, then sends\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
+"number.  When Charlie receives the RelayIntro packet, he sends off a small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
 "and when Alice receives Bob's RelayResponse packet, she begins a new \n"
 "full direction session establishment with the specified IP and port."
 msgstr ""
@@ -15927,20 +13265,21 @@ msgid "Connection establishment (indirect using an introducer)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:389
-msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
+msgid ""
+"Alice first connects to introducer Bob, who relays the request to Charlie."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:407
 msgid ""
-"After the hole punch, the session is established between Alice and "
-"Charlie as in a direct establishment."
+"After the hole punch, the session is established between Alice and Charlie "
+"as in a direct establishment."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:421
+#: i2p2www/pages/site/docs/transport/ssu.html:427
 msgid "Peer testing"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:423
+#: i2p2www/pages/site/docs/transport/ssu.html:429
 msgid ""
 "The automation of collaborative reachability testing for peers is\n"
 "enabled by a sequence of PeerTest messages.  With its proper \n"
@@ -15949,7 +13288,7 @@ msgid ""
 "quite simple:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:442
+#: i2p2www/pages/site/docs/transport/ssu.html:448
 msgid ""
 "Each of the PeerTest messages carry a nonce identifying the\n"
 "test series itself, as initialized by Alice.  If Alice doesn't \n"
@@ -15959,7 +13298,7 @@ msgid ""
 "that may be reached are as follows:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:452
+#: i2p2www/pages/site/docs/transport/ssu.html:458
 msgid ""
 "If she doesn't receive a response from Bob, she will retransmit\n"
 "up to a certain number of times, but if no response ever arrives,\n"
@@ -15969,7 +13308,7 @@ msgid ""
 "Charlie to reply."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:461
+#: i2p2www/pages/site/docs/transport/ssu.html:467
 msgid ""
 "If Alice doesn't receive a PeerTest message with the \n"
 "expected nonce from a third party (Charlie), she will retransmit\n"
@@ -15981,7 +13320,7 @@ msgid ""
 "IP and port that Bob offered up should be forwarded)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:472
+#: i2p2www/pages/site/docs/transport/ssu.html:478
 msgid ""
 "If Alice receives Bob's PeerTest message and both of Charlie's\n"
 "PeerTest messages but the enclosed IP and port numbers in Bob's \n"
@@ -15992,7 +13331,7 @@ msgid ""
 "remote connectivity, ignoring further port discovery."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:482
+#: i2p2www/pages/site/docs/transport/ssu.html:488
 msgid ""
 "If Alice receives Charlie's first message but not his second,\n"
 "she will retransmit her PeerTest message to Charlie up to a \n"
@@ -16000,7 +13339,7 @@ msgid ""
 "that Charlie is either confused or no longer online."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:490
+#: i2p2www/pages/site/docs/transport/ssu.html:496
 msgid ""
 "Alice should choose Bob arbitrarily from known peers who seem\n"
 "to be capable of participating in peer tests.  Bob in turn should\n"
@@ -16011,7 +13350,7 @@ msgid ""
 "to designate a new peer as Bob and try again with a different nonce."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:500
+#: i2p2www/pages/site/docs/transport/ssu.html:506
 msgid ""
 "Alice's introduction key is included in all of the PeerTest \n"
 "messages so that she doesn't need to already have an established\n"
@@ -16020,11 +13359,11 @@ msgid ""
 "with either Bob or Charlie, but it is not required."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:528
+#: i2p2www/pages/site/docs/transport/ssu.html:534
 msgid "Transmission window, ACKs and Retransmissions"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:529
+#: i2p2www/pages/site/docs/transport/ssu.html:535
 #, python-format
 msgid ""
 "The DATA message may contain ACKs of full messages and\n"
@@ -16034,26 +13373,24 @@ msgid ""
 "for details."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:537
+#: i2p2www/pages/site/docs/transport/ssu.html:543
 #, python-format
 msgid ""
-"The details of windowing, ACK, and retransmission strategies are not "
-"specified\n"
+"The details of windowing, ACK, and retransmission strategies are not specified\n"
 "here. See the Java code for the current implementation.\n"
 "During the establishment phase, and for peer testing, routers\n"
 "should implement exponential backoff for retransmission.\n"
 "For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to "
-"TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
 "or <a href=\"%(streaming)s\">streaming</a>.\n"
 "See the code for initial, min and max parameters."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:549
+#: i2p2www/pages/site/docs/transport/ssu.html:555
 msgid "Security"
 msgstr "Sicurezza"
 
-#: i2p2www/pages/site/docs/transport/ssu.html:550
+#: i2p2www/pages/site/docs/transport/ssu.html:556
 msgid ""
 "UDP source addresses may, of course, be spoofed.\n"
 "Additionally, the IPs and ports contained inside specific\n"
@@ -16062,115 +13399,98 @@ msgid ""
 "Also, certain actions and responses may need to be rate-limited."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:558
+#: i2p2www/pages/site/docs/transport/ssu.html:564
 msgid ""
 "The details of validation are not specified\n"
 "here. Implementers should add defenses where appropriate."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:564
+#: i2p2www/pages/site/docs/transport/ssu.html:570
 msgid "Peer capabilities"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:568
+#: i2p2www/pages/site/docs/transport/ssu.html:580
 msgid ""
 "If the peer address contains the 'B' capability, that means \n"
 "they are willing and able to participate in peer tests as\n"
 "a 'Bob' or 'Charlie'."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:580
-msgid ""
-"If the peer address contains the 'C' capability, that means\n"
-"they are willing and able to serve as an introducer - serving\n"
-"as a Bob for an otherwise unreachable Alice."
-msgstr ""
-
-#: i2p2www/pages/site/docs/transport/ssu.html:589
+#: i2p2www/pages/site/docs/transport/ssu.html:617
 msgid ""
-"Analysis of current SSU performance, including assessment of window size "
-"adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to "
-"improve\n"
+"Analysis of current SSU performance, including assessment of window size adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to improve\n"
 "performance, is a topic for future work."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:595
+#: i2p2www/pages/site/docs/transport/ssu.html:623
 msgid ""
-"The current implementation repeatedly sends acknowledgments for the same "
-"packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same packets,\n"
 "which unnecessarily increases overhead."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:600
+#: i2p2www/pages/site/docs/transport/ssu.html:628
 msgid ""
-"The default small MTU value of 620 should be analyzed and possibly "
-"increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly increased.\n"
 "The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
-"Probably not."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:606
+#: i2p2www/pages/site/docs/transport/ssu.html:634
 msgid "The protocol should be extended to exchange MTUs during the setup."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:610
+#: i2p2www/pages/site/docs/transport/ssu.html:638
 msgid "Rekeying is currently unimplemented and may never be."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:614
+#: i2p2www/pages/site/docs/transport/ssu.html:642
 msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and "
-"RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is "
-"undocumented."
+"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:619
+#: i2p2www/pages/site/docs/transport/ssu.html:647
 msgid ""
 "Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same "
-"packet,\n"
+"strategy may be to bundle multiple message fragments into the same packet,\n"
 "so long as it doesn't exceed the MTU."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:625
+#: i2p2www/pages/site/docs/transport/ssu.html:653
 msgid ""
 "A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to"
-" \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
 "end padding should be sufficient for most needs until then."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:631
+#: i2p2www/pages/site/docs/transport/ssu.html:659
 msgid ""
-"Why are introduction keys the same as the router hash, should it be "
-"changed, would there be any benefit?"
+"Why are introduction keys the same as the router hash, should it be changed,"
+" would there be any benefit?"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:635
+#: i2p2www/pages/site/docs/transport/ssu.html:663
 msgid "Capacities appear to be unused."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:639
+#: i2p2www/pages/site/docs/transport/ssu.html:667
 msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be "
-"unused or unverified."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
+"or unverified."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:644
+#: i2p2www/pages/site/docs/transport/ssu.html:672
 msgid "Implementation Diagram"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:645
+#: i2p2www/pages/site/docs/transport/ssu.html:673
 msgid ""
 "This diagram\n"
-"should accurately reflect the current implementation, however there may "
-"be small differences."
+"should accurately reflect the current implementation, however there may be small differences."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:653
+#: i2p2www/pages/site/docs/transport/ssu.html:681
 msgid "Now on the SSU specification page"
 msgstr ""
 
@@ -16191,12 +13511,9 @@ msgid ""
 "Within I2P, messages are passed in one direction through a virtual\n"
 "tunnel of peers, using whatever means are available to pass the \n"
 "message on to the next hop.  Messages arrive at the tunnel's \n"
-"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel "
-"messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and "
-"verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, "
-"until\n"
+"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, until\n"
 "it reaches the tunnel endpoint.  That <i>endpoint</i> takes the messages\n"
 "bundled up by the gateway and forwards them as instructed - either\n"
 "to another router, to another tunnel on another router, or locally."
@@ -16218,12 +13535,9 @@ msgid ""
 "in the tunnel, and provides each with the necessary configuration\n"
 "data.  They may have any number of hops.\n"
 "It is the intent to make\n"
-"it hard for either participants or third parties to determine the length "
-"of \n"
-"a tunnel, or even for colluding participants to determine whether they "
-"are a\n"
-"part of the same tunnel at all (barring the situation where colluding "
-"peers are\n"
+"it hard for either participants or third parties to determine the length of \n"
+"a tunnel, or even for colluding participants to determine whether they are a\n"
+"part of the same tunnel at all (barring the situation where colluding peers are\n"
 "next to each other in the tunnel)."
 msgstr ""
 
@@ -16261,8 +13575,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:69
 #, python-format
 msgid ""
-"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are "
-"processed and passed through it.\n"
+"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are processed and passed through it.\n"
 "Tunnel operation has four distinct processes, taken on by various \n"
 "peers in the tunnel."
 msgstr ""
@@ -16289,8 +13602,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:89
 msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
-"messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
 "originally bundled by the gateway are reassembled and forwarded on as \n"
 "requested."
 msgstr ""
@@ -16350,11 +13662,13 @@ msgid "Decrypt (using an encryption operation)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgid ""
+"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgid ""
+"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:142
@@ -16415,10 +13729,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:181
 msgid ""
 "Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be "
-"forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they "
-"receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
 "on.  Tunnels themselves are short-lived (10 minutes).\n"
 "Even if subsequent tunnels are built using the same sequence of \n"
 "peers, each hop's tunnel ID will change."
@@ -16426,16 +13738,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:190
 msgid ""
-"To prevent adversaries from tagging the messages along the path by "
-"adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size.  To"
-" accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently,"
-" the\n"
-"gateway splits up the larger I2NP messages into fragments contained "
-"within each\n"
-"tunnel message.  The endpoint will attempt to rebuild the I2NP message "
-"from the\n"
+"To prevent adversaries from tagging the messages along the path by adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size.  To accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
+"gateway splits up the larger I2NP messages into fragments contained within each\n"
+"tunnel message.  The endpoint will attempt to rebuild the I2NP message from the\n"
 "fragments for a short period of time, but will discard them as necessary."
 msgstr ""
 
@@ -16452,30 +13759,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:207
 msgid ""
-"After the preprocessing of messages into a padded payload, the gateway "
-"builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel "
-"message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
-"message} to the next hop."
+"After the preprocessing of messages into a padded payload, the gateway builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:213
 msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an"
-"\n"
-"inbound or an outbound tunnel.  For inbound tunnels, they simply select a"
-" random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and"
-" using \n"
-"that IV along side their own layer key to encrypt the preprocessed data."
-"  For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and "
-"preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel.  The result "
-"of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will "
-"recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an\n"
+"inbound or an outbound tunnel.  For inbound tunnels, they simply select a random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
+"that IV along side their own layer key to encrypt the preprocessed data.  For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel.  The result of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
 "the initial preprocessed data."
 msgstr ""
 
@@ -16485,46 +13782,29 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:227
 msgid ""
-"When a peer receives a tunnel message, it checks that the message came "
-"from\n"
-"the same previous hop as before (initialized when the first message comes"
-" through\n"
-"the tunnel).  If the previous peer is a different router, or if the "
-"message has\n"
-"already been seen, the message is dropped.  The participant then encrypts"
-" the \n"
-"received IV with AES256/ECB using their IV key to determine the current "
-"IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts "
-"the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the "
-"tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop.  This double "
-"encryption\n"
+"When a peer receives a tunnel message, it checks that the message came from\n"
+"the same previous hop as before (initialized when the first message comes through\n"
+"the tunnel).  If the previous peer is a different router, or if the message has\n"
+"already been seen, the message is dropped.  The participant then encrypts the \n"
+"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop.  This double encryption\n"
 "of the IV (both before and after use) help address a certain class of\n"
 "confirmation attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:243
 msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on "
-"message\n"
-"IVs.  Each router maintains a single Bloom filter to contain the XOR of "
-"the IV and\n"
-"the first block of the message received for all of the tunnels it is "
-"participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
-"will have\n"
-"expired).  The size of the bloom filter and the parameters used are "
-"sufficient to\n"
-"more than saturate the router's network connection with a negligible "
-"chance of \n"
-"false positive.  The unique value fed into the Bloom filter is the XOR of"
-" the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the"
-" tunnel \n"
-"from tagging a message by resending it with the IV and first block "
-"switched."
+"Duplicate message detection is handled by a decaying Bloom filter on message\n"
+"IVs.  Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
+"the first block of the message received for all of the tunnels it is participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
+"expired).  The size of the bloom filter and the parameters used are sufficient to\n"
+"more than saturate the router's network connection with a negligible chance of \n"
+"false positive.  The unique value fed into the Bloom filter is the XOR of the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
+"from tagging a message by resending it with the IV and first block switched."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:256
@@ -16533,27 +13813,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:258
 msgid ""
-"After receiving and validating a tunnel message at the last hop in the "
-"tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon "
-"whether \n"
-"the tunnel is an inbound or an outbound tunnel.  For outbound tunnels, "
-"the \n"
-"endpoint encrypts the message with its layer key just like any other "
-"participant, \n"
-"exposing the preprocessed data.  For inbound tunnels, the endpoint is "
-"also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message,"
-" using the \n"
+"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
+"the tunnel is an inbound or an outbound tunnel.  For outbound tunnels, the \n"
+"endpoint encrypts the message with its layer key just like any other participant, \n"
+"exposing the preprocessed data.  For inbound tunnels, the endpoint is also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
 "layer and IV keys of each step in reverse order."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:268
 msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the "
-"gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards "
-"them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards them as\n"
 "requested in their delivery instructions."
 msgstr ""
 
@@ -16563,30 +13835,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:277
 msgid ""
-"When building a tunnel, the creator must send a request with the "
-"necessary\n"
-"configuration data to each of the hops and wait for all of them to agree "
-"before\n"
-"enabling the tunnel.  The requests are encrypted so that only the peers "
-"who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has "
-"that\n"
-"data.  In addition, only the tunnel creator will have access to the "
-"peer's\n"
-"reply.  There are three important dimensions to keep in mind when "
-"producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent "
-"(and \n"
+"When building a tunnel, the creator must send a request with the necessary\n"
+"configuration data to each of the hops and wait for all of them to agree before\n"
+"enabling the tunnel.  The requests are encrypted so that only the peers who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has that\n"
+"data.  In addition, only the tunnel creator will have access to the peer's\n"
+"reply.  There are three important dimensions to keep in mind when producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent (and \n"
 "replies received), and how they are maintained."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:291
 msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two "
-"styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
 "of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and "
-"tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and tunnel\n"
 "maintenance, while client tunnels are used for end to end client messages."
 msgstr ""
 
@@ -16596,18 +13859,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:301
 msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a "
-"subset\n"
-"of the network.  The particular subset varies on the local router and on "
-"what their\n"
-"tunnel routing needs are.  In general, the exploratory tunnels are built "
-"out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" "
-"profile\n"
-"category.  The secondary purpose of the tunnels, beyond merely tunnel "
-"routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted"
-" for\n"
+"Exploratory tunnels are built out of a random selection of peers from a subset\n"
+"of the network.  The particular subset varies on the local router and on what their\n"
+"tunnel routing needs are.  In general, the exploratory tunnels are built out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
+"category.  The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted for\n"
 "use in client tunnels."
 msgstr ""
 
@@ -16624,14 +13881,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:319
 msgid ""
-"Client tunnels are built with a more stringent set of requirements - the "
-"local\n"
-"router will select peers out of its \"fast and high capacity\" profile "
-"category so\n"
-"that performance and reliability will meet the needs of the client "
-"application.\n"
-"However, there are several important details beyond that basic selection "
-"that \n"
+"Client tunnels are built with a more stringent set of requirements - the local\n"
+"router will select peers out of its \"fast and high capacity\" profile category so\n"
+"that performance and reliability will meet the needs of the client application.\n"
+"However, there are several important details beyond that basic selection that \n"
 "should be adhered to, depending upon the client's anonymity needs."
 msgstr ""
 
@@ -16657,10 +13910,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:341
 msgid ""
 "To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -"
-"\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
-"after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
 "B is always C."
 msgstr ""
 
@@ -16669,18 +13920,15 @@ msgid ""
 "Ordering is implemented by generating a random 32-byte key for each\n"
 "tunnel pool at startup.\n"
 "Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both"
-"\n"
+"craft two router hashes far apart to maximize the chance of being at both\n"
 "ends of a tunnel.\n"
 "Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from "
-"the random key"
+"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:363
 msgid ""
-"Because each tunnel pool uses a different random key, ordering is "
-"consistent\n"
+"Because each tunnel pool uses a different random key, ordering is consistent\n"
 "within a single pool but not between different pools.\n"
 "New keys are generated at each router restart."
 msgstr ""
@@ -16692,8 +13940,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:372
 #, python-format
 msgid ""
-"A multi-hop tunnel is built using a single build message which is "
-"repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is repeatedly\n"
 "decrypted and forwarded. In the terminology of\n"
 "<a href=\"%(pdf)s\">Hashing it out in Public</a>,\n"
 "this is \"non-interactive\" telescopic tunnel building."
@@ -16704,38 +13951,28 @@ msgstr ""
 msgid ""
 "This tunnel request preparation, delivery, and response method is\n"
 "<a href=\"%(tunnelcreation)s\">designed</a> to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies "
-"proper\n"
-"connectivity, and avoids the message counting attack of traditional "
-"telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
+"connectivity, and avoids the message counting attack of traditional telescopic\n"
 "tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the "
-"already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
-"in\n"
+"(This method, which sends messages to extend a tunnel through the already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
 "the \"Hashing it out\" paper.)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:390
 #, python-format
 msgid ""
-"The details of tunnel request and response messages, and their "
-"encryption,\n"
+"The details of tunnel request and response messages, and their encryption,\n"
 "<a href=\"%(tunnelcreation)s\">are specified here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:395
 msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, "
-"though\n"
-"a series of four increasingly severe rejections are known: probabilistic "
-"rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of "
-"requests), \n"
-"transient overload, bandwidth overload, and critical failure.  When "
-"received, \n"
-"those four are interpreted by the tunnel creator to help adjust their "
-"profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, though\n"
+"a series of four increasingly severe rejections are known: probabilistic rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of requests), \n"
+"transient overload, bandwidth overload, and critical failure.  When received, \n"
+"those four are interpreted by the tunnel creator to help adjust their profile of\n"
 "the router in question."
 msgstr ""
 
@@ -16753,37 +13990,26 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:412
 #, python-format
 msgid ""
-"To allow efficient operation, the router maintains a series of tunnel "
-"pools,\n"
-"each managing a group of tunnels used for a specific purpose with their "
-"own\n"
-"configuration.  When a tunnel is needed for that purpose, the router "
-"selects one\n"
-"out of the appropriate pool at random.  Overall, there are two "
-"exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default "
-"configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel pools,\n"
+"each managing a group of tunnels used for a specific purpose with their own\n"
+"configuration.  When a tunnel is needed for that purpose, the router selects one\n"
+"out of the appropriate pool at random.  Overall, there are two exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default configuration.\n"
 "In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool.  Those pools use the "
-"configuration specified\n"
-"when the local destination connects to the router via <a "
-"href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool.  Those pools use the configuration specified\n"
+"when the local destination connects to the router via <a href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n"
 "not specified."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:424
 #, python-format
 msgid ""
-"Each pool has within its configuration a few key settings, defining how "
-"many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of "
-"failure,\n"
+"Each pool has within its configuration a few key settings, defining how many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
 "how long the tunnels should be, whether those\n"
 "lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual "
-"tunnels.\n"
-"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP "
-"page</a>."
+"well as any of the other settings allowed when configuring individual tunnels.\n"
+"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:434
@@ -16800,20 +14026,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:440
 msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they "
-"are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is "
-"essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local "
-"and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local and global\n"
 "network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build "
-"strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,"
-"\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,\n"
 "without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted"
-" build messages."
+"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:451
@@ -16821,8 +14041,7 @@ msgid ""
 "For each tuple {exploratory/client, in/out, length, length variance}\n"
 "the router maintains statistics on the time required for a successful\n"
 "tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's "
-"expiration\n"
+"Using these statistics, it calculates how long before a tunnel's expiration\n"
 "it should start attempting to build a replacement.\n"
 "As the expiration time approaches without a successful replacement,\n"
 "it starts multiple build attempts in parallel, and then\n"
@@ -16844,30 +14063,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:473
 msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit "
-"switched\n"
-"network, everything within I2P is strictly message based - tunnels are "
-"merely\n"
-"accounting tricks to help organize the delivery of messages.  No "
-"assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions "
-"are left\n"
-"to higher levels (e.g. I2P's client layer streaming library).  This "
-"allows I2P\n"
-"to take advantage of throttling techniques available to both packet "
-"switched and\n"
-"circuit switched networks.  For instance, each router may keep track of "
-"the \n"
-"moving average of how much data each tunnel is using, combine that with "
-"all of \n"
-"the averages used by other tunnels the router is participating in, and be"
-" able\n"
-"to accept or reject additional tunnel participation requests based on its"
-" \n"
-"capacity and utilization.  On the other hand, each router can simply drop"
-" \n"
-"messages that are beyond its capacity, exploiting the research used on "
-"the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
+"network, everything within I2P is strictly message based - tunnels are merely\n"
+"accounting tricks to help organize the delivery of messages.  No assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions are left\n"
+"to higher levels (e.g. I2P's client layer streaming library).  This allows I2P\n"
+"to take advantage of throttling techniques available to both packet switched and\n"
+"circuit switched networks.  For instance, each router may keep track of the \n"
+"moving average of how much data each tunnel is using, combine that with all of \n"
+"the averages used by other tunnels the router is participating in, and be able\n"
+"to accept or reject additional tunnel participation requests based on its \n"
+"capacity and utilization.  On the other hand, each router can simply drop \n"
+"messages that are beyond its capacity, exploiting the research used on the \n"
 "normal Internet."
 msgstr ""
 
@@ -16875,23 +14082,16 @@ msgstr ""
 msgid ""
 "In the current implementation, routers implement a\n"
 "weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and"
-" outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
 "the router will start randomly dropping a portion of messages as the\n"
 "bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are "
-"dropped.\n"
-"For an internal participant, all messages are fragmented and padded and "
-"therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping "
-"decision is made\n"
-"on the full (coalesced) message, and the message size is taken into "
-"account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
+"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
+"on the full (coalesced) message, and the message size is taken into account.\n"
 "Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint "
-"than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the "
-"network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
 "dropping those messages is lower."
 msgstr ""
 
@@ -16901,16 +14101,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:509
 msgid ""
-"What strategies could be used at the gateway and at each hop for "
-"delaying,\n"
-"reordering, rerouting, or padding messages?  To what extent should this "
-"be done\n"
-"automatically, how much should be configured as a per tunnel or per hop "
-"setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this "
-"operation?\n"
-"All of this is left as unknown, to be worked out for a distant future "
-"release."
+"What strategies could be used at the gateway and at each hop for delaying,\n"
+"reordering, rerouting, or padding messages?  To what extent should this be done\n"
+"automatically, how much should be configured as a per tunnel or per hop setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this operation?\n"
+"All of this is left as unknown, to be worked out for a distant future release."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:518
@@ -16919,13 +14114,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:519
 msgid ""
-"The padding strategies can be used on a variety of levels, addressing the"
-"\n"
+"The padding strategies can be used on a variety of levels, addressing the\n"
 "exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes.  Within this "
-"however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end "
-"to end \n"
+"The current fixed tunnel message size is 1024 bytes.  Within this however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end to end \n"
 "messages, they may be padded as part of the garlic wrapping."
 msgstr ""
 
@@ -16953,8 +14145,7 @@ msgstr "Novembre 2016"
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
 msgid ""
-"This page describes the origins and design of I2P's unidirectional "
-"tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional tunnels.\n"
 "For further information see:"
 msgstr ""
 
@@ -16988,8 +14179,7 @@ msgid ""
 "Several apps and protocols, notably HTTP,\n"
 "do transfer data in such manner. Having the traffic follow the same \n"
 "route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a"
-" \n"
+"attacker who has only timing and traffic volume data to infer the path a \n"
 "tunnel is taking.\n"
 "Having the response come back along a different path arguably \n"
 "makes it harder."
@@ -16998,42 +14188,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
 msgid ""
 "When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional "
-"tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional"
-" circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response "
-"would \n"
-"follow the same path in Tor, while in I2P the packets making up the "
-"request \n"
-"would go out through one or more outbound tunnels and the packets making "
-"up \n"
-"the response would come back through one or more different inbound "
-"tunnels."
+"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response would \n"
+"follow the same path in Tor, while in I2P the packets making up the request \n"
+"would go out through one or more outbound tunnels and the packets making up \n"
+"the response would come back through one or more different inbound tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
 msgid ""
 "The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have "
-"anonymity\n"
-"implications.  On the positive side, by using separate tunnels it lessens"
-" the\n"
-"traffic data exposed for analysis to participants in a tunnel - for "
-"instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic"
-" of\n"
+"communication is not the only technique available, and it does have anonymity\n"
+"implications.  On the positive side, by using separate tunnels it lessens the\n"
+"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic of\n"
 "an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel.  With bidirectional tunnels, all participants"
-" would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then "
-"100KB\n"
-"in the other.  On the negative side, using unidirectional tunnels means "
-"that\n"
-"there are two sets of peers which need to be profiled and accounted for, "
-"and\n"
-"additional care must be taken to address the increased speed of "
-"predecessor\n"
+"delivered along the tunnel.  With bidirectional tunnels, all participants would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
+"in the other.  On the negative side, using unidirectional tunnels means that\n"
+"there are two sets of peers which need to be profiled and accounted for, and\n"
+"additional care must be taken to address the increased speed of predecessor\n"
 "attacks.  The tunnel pooling and building process\n"
 "(peer selection and ordering strategies)\n"
 "should minimize the worries of the predecessor attack."
@@ -17047,28 +14222,22 @@ msgstr "Anonimità"
 #, python-format
 msgid ""
 "A recent <a href=\"%(pdf)s\">paper by Hermann and Grothoff</a>\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design "
-"decision\"."
+"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
 msgid ""
 "The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is "
-"an \n"
-"advantage, but that an attacker can be more certain in the unidirectional"
-" case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a "
-"disadvantage, at least\n"
-"with long-living eepsites."
+"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
+"advantage, but that an attacker can be more certain in the unidirectional case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
+"with long-living I2P Sites."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
 msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional "
-"tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of "
-"the \n"
+"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of the \n"
 "attack in the paper\n"
 "with attacks on a bidirectional tunnel architecture."
 msgstr ""
@@ -17077,63 +14246,45 @@ msgstr ""
 msgid ""
 "This conclusion is based on an arbitrary certainty vs. time weighting \n"
 "(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas "
-"to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas to \n"
 "each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the eepsite goes down or is slowed down. So "
-"close \n"
+"intersection attack see if the I2P Site goes down or is slowed down. So close \n"
 "may be good enough, or time may be more important."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
 msgid ""
-"The conclusion is based on a specific weighting of the importance of "
-"certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable,"
-" \n"
-"especially in a real world with subpoenas, search warrants, and other "
-"methods \n"
+"The conclusion is based on a specific weighting of the importance of certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
+"especially in a real world with subpoenas, search warrants, and other methods \n"
 "available for final confirmation."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
 msgid ""
 "A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done"
-" \n"
-"elsewhere. For example, how does this attack compare to the numerous "
-"possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors"
-" have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done \n"
+"elsewhere. For example, how does this attack compare to the numerous possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors have not\n"
 "done that analysis, if it's even possible to do it\n"
 "effectively."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
 msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
-" \n"
-"uses unidirectional tunnels and has had very little review. Does the lack"
-" of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor "
-"design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
+"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor design \n"
 "choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. "
-"The \n"
-"design intent (see references above) was that unidirectional tunnels are "
-"more \n"
-"resistant to timing attacks. However, the paper presents a somewhat "
-"different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
+"design intent (see references above) was that unidirectional tunnels are more \n"
+"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
 "attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
 "tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative "
-"that \n"
-"clearly needs further investigation and analysis? There are several other"
-" reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small "
-"network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels "
-"really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative that \n"
+"clearly needs further investigation and analysis? There are several other reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
 "reason?"
 msgstr ""
 
@@ -17144,4 +14295,3 @@ msgid ""
 "tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
 "conclusion is not supported by the paper."
 msgstr ""
-
diff --git a/i2p2www/translations/it/LC_MESSAGES/misc.po b/i2p2www/translations/it/LC_MESSAGES/misc.po
index c5b19147ae69cf32c87fb37ca7b0515b13dc8764..3655e9c19a413d0ab4c179acaa4bfd55b891ac12 100644
--- a/i2p2www/translations/it/LC_MESSAGES/misc.po
+++ b/i2p2www/translations/it/LC_MESSAGES/misc.po
@@ -1,25 +1,26 @@
-# Italian translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
-# Giuseppe Pignataro (Fastbyte01) <rogepix@gmail.com>, 2014
-# Sebastiano Pistore <SebastianoPistore.info@protonmail.ch>, 2015-2017
-# Sebastiano Pistore <SebastianoPistore.info@protonmail.ch>, 2018
+# Giuseppe Pignataro <rogepix@gmail.com>, 2014
+# Giuseppe Pignataro <rogepix@gmail.com>, 2014
+# SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2015-2017
+# SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2018
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-02-12 00:06+0000\n"
-"PO-Revision-Date: 2018-08-16 15:05+0000\n"
-"Last-Translator: Sebastiano Pistore "
-"<SebastianoPistore.info@protonmail.ch>\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2018\n"
 "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: it\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/misc/clt.html:2
 msgid "I2P at CLT and PetCon 2009.1"
@@ -28,51 +29,37 @@ msgstr ""
 #: i2p2www/pages/site/misc/clt.html:4
 msgid ""
 "Members of I2P will held a talk at CLT and PetCon 2009.1\n"
-"Two members of the I2P team will be at two forthcoming Linux day and "
-"security convention."
+"Two members of the I2P team will be at two forthcoming Linux day and security convention."
 msgstr ""
 
 #: i2p2www/pages/site/misc/clt.html:9
 #, python-format
 msgid ""
-"On 14th march of 2009 there will be a short talk about general "
-"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> hold by echelon.\n"
-"Echelon and some other members of the I2P family will attend to the Linux"
-" meeting the whole two days (Saturday and Sunday) and will be "
-"recognizable as I2P family members. Meet them, ask them your questions, "
-"show them your props! Show your support!"
+"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n"
+"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!"
 msgstr ""
 
 #: i2p2www/pages/site/misc/clt.html:14
 #, python-format
 msgid ""
-"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security "
-"convention</a> in Dresden will take place.\n"
-"Again, echelon will attend this event and hold a short talk about general"
-" introduction to I2P. Another talk about the profiling by the I2P clients"
-" will be held."
+"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n"
+"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held."
 msgstr ""
 
 #: i2p2www/pages/site/misc/cvs.html:4
 #, python-format
 msgid ""
-"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a"
-" <a href=\"%(monotone)s\">Monotone</a> repository.\n"
+"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n"
 "For those who aren't very familiar with CVS, there is a\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> "
-"on the\n"
-"subject (developers only need to deal with the first chapter - \"An "
-"Overview of\n"
-"CVS\", as subsequent chapters go into some nasty details very few ever "
-"need to\n"
+"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n"
+"subject (developers only need to deal with the first chapter - \"An Overview of\n"
+"CVS\", as subsequent chapters go into some nasty details very few ever need to\n"
 "touch)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/cvs.html:31
 msgid ""
-"Humorous quote from WinCVS: \"Did you know...  Never experiment with new "
-"CVS\n"
+"Humorous quote from WinCVS: \"Did you know...  Never experiment with new CVS\n"
 "commands on your working repository.  Create a sample module instead.\""
 msgstr ""
 
@@ -85,7 +72,7 @@ msgstr ""
 msgid ""
 "After upgrading to the new architecture, you'll have to do a \n"
 "little work to get your old I2PTunnel-driven servers running.  \n"
-"Lets walk through a simple example.  For an eepsite with the \n"
+"Lets walk through a simple example.  For an I2P Site with the \n"
 "old clientApp configuration, you had:"
 msgstr ""
 
@@ -103,12 +90,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\""
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21
-msgid "For the name: <code>\"eepsite\"</code>"
+msgid "For the name: <code>\"I2P Site\"</code>"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22
-msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>"
-msgstr "Per la descrizione: <code>\"È bello il mio eepsite, no?\"</code>"
+msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23
 msgid ">For the target host:"
@@ -138,14 +125,10 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39
 msgid ""
-"That's it!  Creating a new I2PTunnel server works the same way too, "
-"except you\n"
-"don't need to \"copy the old file\", obviously.  Behind the scenes, it is"
-" all driven\n"
-"by the <code>i2ptunnel.config</code> file, which you may modify "
-"externally (if you do,\n"
-"hit \"Reload config\" on the I2PTunnel web page, which will tear down all"
-" of your \n"
+"That's it!  Creating a new I2PTunnel server works the same way too, except you\n"
+"don't need to \"copy the old file\", obviously.  Behind the scenes, it is all driven\n"
+"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n"
+"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n"
 "existing tunnels and rebuild new ones)"
 msgstr ""
 
@@ -163,7 +146,7 @@ msgid "I2PTunnel services"
 msgstr "Servizi I2PTunnel"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:4
-msgid "Below is quick copy of aum's eepsite deployment guide."
+msgid "Below is quick copy of aum's I2P Site deployment guide."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:8
@@ -179,23 +162,23 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:13
 msgid ""
-"I recommend the Tiny Httpd web server, thttpd, (windows version available"
-" on site) although you can use anything that you feel comfortable with."
+"I recommend the Tiny Httpd web server, thttpd, (windows version available on"
+" site) although you can use anything that you feel comfortable with."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:16
 msgid ""
 "Another more robust option would be to use EasyPHP, which is also open "
 "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For "
-"newbies who have no experience setting up and hosting content over "
-"servers, see the hosting page for help."
+"newbies who have no experience setting up and hosting content over servers, "
+"see the hosting page for help."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:19
 msgid ""
-"With the web server you've chosen, configure it to listen on a port of "
-"your choice, and serve its documents from a directory of your choice. For"
-" this example, we'll assume port 10880."
+"With the web server you've chosen, configure it to listen on a port of your "
+"choice, and serve its documents from a directory of your choice. For this "
+"example, we'll assume port 10880."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:22
@@ -208,8 +191,8 @@ msgstr ""
 msgid ""
 "Test the webserver, by pointing your normal browser (the one with the "
 "\"direct connection\") at <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the "
-"port number you have chosen)."
+"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port"
+" number you have chosen)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:28
@@ -224,28 +207,28 @@ msgstr "2 - Generare una coppia di chiavi di destinazione I2P"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:35
 msgid ""
-"I2P does not deal in IP addresses. To protect your anonymity, it deals in"
-" unique addresses called destination keys."
+"I2P does not deal in IP addresses. To protect your anonymity, it deals in "
+"unique addresses called destination keys."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:38
 msgid ""
 "A destination key works a lot like a regular IP address, except that it "
-"can't be traced to your IP address or physical location. When users place"
-" a request to speak with you, your gateways are the ones that answer for "
-"you. So the requesting user can only know the IP address of your "
-"gateways. However, gateways don't know your IP address, because gateways "
-"are the last nodes on your tunnels, and you anonymously create tunnels by"
-" way of garlic routing. (So gateways are like puppets that can't see "
-"their masters, and everyone communicates through these puppets)"
+"can't be traced to your IP address or physical location. When users place a "
+"request to speak with you, your gateways are the ones that answer for you. "
+"So the requesting user can only know the IP address of your gateways. "
+"However, gateways don't know your IP address, because gateways are the last "
+"nodes on your tunnels, and you anonymously create tunnels by way of garlic "
+"routing. (So gateways are like puppets that can't see their masters, and "
+"everyone communicates through these puppets)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:41
 msgid ""
 "To deploy a server on I2P, you create a destination keypair. You use the "
-"private key to authenticate your server when connecting it to I2P, and "
-"you make the public key (aka destination key) known publicly, so others "
-"can connect to your server. (indirectly, through your gateways)"
+"private key to authenticate your server when connecting it to I2P, and you "
+"make the public key (aka destination key) known publicly, so others can "
+"connect to your server. (indirectly, through your gateways)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:44
@@ -268,9 +251,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:53
 msgid ""
-"The filenames <code>myWebPrivKey.dat</code> and "
-"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want "
-"here, as long as you understand your own choices."
+"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>"
+" are arbitrary - choose whatever you want here, as long as you understand "
+"your own choices."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:56
@@ -281,27 +264,27 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:59
 msgid ""
-"To convert your myWebPubKey.dat file into shareable base64, type the "
-"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (all on one line)."
+"To convert your myWebPubKey.dat file into shareable base64, type the command"
+" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; "
+"myWebPubKey.txt</code> (all on one line)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:62
 msgid ""
-"This file you have just generated, <code>myWebPubKey.txt</code>, contains"
-" a long base64 string (516 chars at last count), which we call a "
-"destination key. All you need to know about this string for now is that "
-"it allows remote clients to uniquely pinpoint and connect to your server,"
-" just the same way as an IP address allows remote machines to pinpoint "
-"and connect to your machine."
+"This file you have just generated, <code>myWebPubKey.txt</code>, contains a "
+"long base64 string (516 chars at last count), which we call a destination "
+"key. All you need to know about this string for now is that it allows remote"
+" clients to uniquely pinpoint and connect to your server, just the same way "
+"as an IP address allows remote machines to pinpoint and connect to your "
+"machine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:65
 msgid ""
 "However, in contrast to an IP address, there is no way to trace your "
-"machine's physical location - even though your server can be addressed "
-"via I2P, your IP address cannot be traced or associated with this "
-"destination key."
+"machine's physical location - even though your server can be addressed via "
+"I2P, your IP address cannot be traced or associated with this destination "
+"key."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:70
@@ -310,9 +293,9 @@ msgstr "3 - Apri un 'tunnel' da I2P al tuo server locale"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:72
 msgid ""
-"For clients elsewhere in I2P to be able to access your server, you must "
-"run a 'bridge' or 'tunnel', which takes connections from these clients "
-"and forwards them to your local server."
+"For clients elsewhere in I2P to be able to access your server, you must run "
+"a 'bridge' or 'tunnel', which takes connections from these clients and "
+"forwards them to your local server."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:75
@@ -337,9 +320,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:84
 msgid ""
-"Within a few seconds, the 'tunnel' should now be active, and remote "
-"clients should be able to reach your server anonymously. Remember to let "
-"your router \"warm up\" before opening clients to it."
+"Within a few seconds, the 'tunnel' should now be active, and remote clients "
+"should be able to reach your server anonymously. Remember to let your router"
+" \"warm up\" before opening clients to it."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:89
@@ -357,9 +340,9 @@ msgstr ""
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:94
 msgid ""
 "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where "
-"myserver.i2p is an I2P 'domain' you want to associate with your site, and"
-" the blahblahblah is the text of the base64 public key you created "
-"earlier in the file myWebPubKey.txt"
+"myserver.i2p is an I2P 'domain' you want to associate with your site, and "
+"the blahblahblah is the text of the base64 public key you created earlier in"
+" the file myWebPubKey.txt"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:97
@@ -393,42 +376,42 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:117
 msgid ""
-"As you grow into I2P and get more of a 'feel' for it, you will want to "
-"use all manner of servers and clients."
+"As you grow into I2P and get more of a 'feel' for it, you will want to use "
+"all manner of servers and clients."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:120
 msgid ""
-"The beauty of I2P is that it allows standard Internet clients and servers"
-" for most protocols to be transparently 'tunneled' through the anonymous "
+"The beauty of I2P is that it allows standard Internet clients and servers "
+"for most protocols to be transparently 'tunneled' through the anonymous "
 "network."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:123
 msgid ""
-"You can run mailservers/clients, nameservers/clients, newsservers/clients"
-" - almost anything at all - perhaps even FTP in passive mode."
+"You can run mailservers/clients, nameservers/clients, newsservers/clients - "
+"almost anything at all - perhaps even FTP in passive mode."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:126
 msgid ""
-"Now, we'll create a client tunnel. This is like the server tunnel we "
-"created earlier, but works in reverse. It listens to a port on your local"
-" machine; your local client connects to this port; the connection gets "
-"forwarded through I2P to the service on the other end."
+"Now, we'll create a client tunnel. This is like the server tunnel we created"
+" earlier, but works in reverse. It listens to a port on your local machine; "
+"your local client connects to this port; the connection gets forwarded "
+"through I2P to the service on the other end."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:129
 msgid ""
-"To open your client tunnel for your server, type the command <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (all one line)."
+"To open your client tunnel for your server, type the command <code>java -jar"
+" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 "
+"textofbase64key\"</code> (all one line)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:132
 msgid ""
-"The port 10888 is arbitrary - it just needs to be something other than "
-"the physical port your server is listening on."
+"The port 10888 is arbitrary - it just needs to be something other than the "
+"physical port your server is listening on."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:135
@@ -460,11 +443,10 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:147
 msgid ""
-"You use the same procedure for using any local client program to access a"
-" remote I2P server - just get the base64 public key (called destination "
-"key) of the remote server, choose a local port to connect to the remote "
-"server, open the tunnel, and just connect with your client to your "
-"heart's content."
+"You use the same procedure for using any local client program to access a "
+"remote I2P server - just get the base64 public key (called destination key) "
+"of the remote server, choose a local port to connect to the remote server, "
+"open the tunnel, and just connect with your client to your heart's content."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:152
@@ -475,25 +457,25 @@ msgstr "7 - Condividi i dettagli del tuo server con gli altri utenti"
 msgid ""
 "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's "
 "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. "
-"Others will then be able to reach your server remotely, without either of"
-" you jeopardizing your anonymity."
+"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others"
+" will then be able to reach your server remotely, without either of you "
+"jeopardizing your anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:157
 msgid ""
-"Remember, you can go to What's on I2P and find the latest public keys "
-"linked to their URL. You should also post your own public key and URL "
-"their. However, you will want to do this anonymously, of course. "
-"Drupal.i2p.net is currently, as of this writing, only accessible from the"
-" net. So, to access the outside WWW anonymously from inside of I2P, you "
-"will need to start up your script called startSquid. Do it the same way "
-"you have been doing these other scripts. Reconfigure your browser to "
-"proxy on localhost:5555, as defined in the script, and when the script "
-"has generated it's keys, you can access the squid proxy. Put any WWW URL "
-"(such as Google or this i2p site) into your browser's address bar and you"
-" will be surfing the World Wide Web anonymously. Now you can safely post "
-"your public key, and no one can detect your IP address."
+"Remember, you can go to What's on I2P and find the latest public keys linked"
+" to their URL. You should also post your own public key and URL their. "
+"However, you will want to do this anonymously, of course. Drupal.i2p.net is "
+"currently, as of this writing, only accessible from the net. So, to access "
+"the outside WWW anonymously from inside of I2P, you will need to start up "
+"your script called startSquid. Do it the same way you have been doing these "
+"other scripts. Reconfigure your browser to proxy on localhost:5555, as "
+"defined in the script, and when the script has generated it's keys, you can "
+"access the squid proxy. Put any WWW URL (such as Google or this i2p site) "
+"into your browser's address bar and you will be surfing the World Wide Web "
+"anonymously. Now you can safely post your public key, and no one can detect "
+"your IP address."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:162
@@ -502,8 +484,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:164
 msgid ""
-"It would drive most people crazy, going through all these steps every "
-"time one sets up an I2P server, and/or deploys a client."
+"It would drive most people crazy, going through all these steps every time "
+"one sets up an I2P server, and/or deploys a client."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:167
@@ -512,8 +494,8 @@ msgid ""
 "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called "
 "setupServer.py which automates all this nonsense into one simple command "
 "line . But I respect that people's tastes in user interfaces differ, and "
-"trying to write something which satisfies everyone's needs usually "
-"results in something so complex that it turns into newbie-repellent."
+"trying to write something which satisfies everyone's needs usually results "
+"in something so complex that it turns into newbie-repellent."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:170
@@ -524,16 +506,16 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:173
 msgid ""
-"Also, you may want to write a script which handles the startup of the I2P"
-" Router, the eepProxy, plus any and all tunnels you are using. I've got "
-"such a script called startEverything.sh, which gets launched at system "
-"startup. (Be sure to search this site for template scripts to automate "
-"your I2P commands. If I create a page for one, I'll try to remember to "
-"link it here."
+"Also, you may want to write a script which handles the startup of the I2P "
+"Router, the eepProxy, plus any and all tunnels you are using. I've got such "
+"a script called startEverything.sh, which gets launched at system startup. "
+"(Be sure to search this site for template scripts to automate your I2P "
+"commands. If I create a page for one, I'll try to remember to link it here."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:176
-msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
+msgid ""
+"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
 msgstr ""
 
 #: i2p2www/pages/site/misc/invisiblenet.html:2
@@ -542,13 +524,11 @@ msgstr "Vecchia documentazione"
 
 #: i2p2www/pages/site/misc/invisiblenet.html:5
 msgid ""
-"Following is a list of documents originally on www.invisiblenet.net/i2p/ "
-"and\n"
+"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n"
 "rescued via the\n"
 "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
 "They are quite dated and may or may not be accurate.\n"
-"However, the I2CP and I2NP documents in particular have some good "
-"information."
+"However, the I2CP and I2NP documents in particular have some good information."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:3
@@ -561,8 +541,7 @@ msgstr "Panoramica"
 
 #: i2p2www/pages/site/misc/jbigi.html:7
 msgid ""
-"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a "
-"little\n"
+"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n"
 "manual work and a piece of chewing gum we have made several\n"
 "cryptography operations quite a bit faster."
 msgstr ""
@@ -576,18 +555,15 @@ msgid ""
 "<a href=\"%(func)s\">mpz_powm()</a>\n"
 "as a replacement for the\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n"
-"As modPow() is a significant computational portion of many crypto "
-"operations, this is of significant benefit."
+"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:25
 #, python-format
 msgid ""
-"The standard I2P installation includes about 20 versions of the library "
-"for different platforms,\n"
+"The standard I2P installation includes about 20 versions of the library for different platforms,\n"
 "each about 50KB, inside the jbigi.jar file.\n"
-"The initialization of the JBigI library, including CPU identification, "
-"selection, and extraction\n"
+"The initialization of the JBigI library, including CPU identification, selection, and extraction\n"
 "of the correct loadable module, is handled by the\n"
 "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n"
 "If no module is available for the current platform, the standard\n"
@@ -601,8 +577,7 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:39
 msgid ""
-"Following are the instructions to build a new jbigi library for your own "
-"platform\n"
+"Following are the instructions to build a new jbigi library for your own platform\n"
 "and testing its performance."
 msgstr ""
 
@@ -613,31 +588,25 @@ msgstr "Requisiti"
 #: i2p2www/pages/site/misc/jbigi.html:43
 msgid ""
 "This works on Linux, and with a few changes in build.sh probably also on\n"
-"other platforms. FreeBSD has also been reported to work too. On Kaffee "
-"the\n"
-"speedup is very small, because it already uses native BitInteger "
-"internally.\n"
+"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n"
+"speedup is very small, because it already uses native BitInteger internally.\n"
 "Blackdown seems to cause strange errors. Because you are going to do\n"
 "compilation, you need JDK; JRE won't work."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:50
 msgid ""
-"The required code is available in monotone database and the latest source"
-" tarball. "
+"The required code is available in monotone database and the latest source "
+"tarball. "
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:51
 msgid ""
 "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n"
-"included in your OS / distribution or installed already, it can be "
-"received from\n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Even if you\n"
-"have already installed it as binary, it might still be worth a try to "
-"compile\n"
-"GMP yourself, since then it will be able to use the specific instructions"
-" of\n"
+"included in your OS / distribution or installed already, it can be received from\n"
+"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n"
+"have already installed it as binary, it might still be worth a try to compile\n"
+"GMP yourself, since then it will be able to use the specific instructions of\n"
 "your processor. The latest GMP may also\n"
 "be used instead of GMP 5.0.2, but it hasn't been tested by us."
 msgstr ""
@@ -648,8 +617,7 @@ msgstr "Istruzioni passo-passo"
 
 #: i2p2www/pages/site/misc/jbigi.html:63
 msgid ""
-"Look at <a href=\"http://localhost:7657/logs.jsp\">your running "
-"environment on the logs.jsp page</a>.\n"
+"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n"
 "There should be one of two status messages for JBigI - either"
 msgstr ""
 
@@ -677,27 +645,20 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:78
 msgid ""
-"Look on <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"to see what the lifetime average values for "
-"<code>crypto.elGamal.decrypt</code> and\n"
-"<code>crypto.elGamal.encrypt</code> are. The numbers are times in "
-"milliseconds. Copy these somewhere so you can compare\n"
+"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n"
+"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n"
 "them later on.\n"
 "The network average for encrypt time is about 20ms.\n"
-"If your encrypt time is less than 50ms for a relatively new processor, or"
-" less than 100ms\n"
-"for an older processor, and the native BigInteger library was loaded, you"
-" are probably fine."
+"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n"
+"for an older processor, and the native BigInteger library was loaded, you are probably fine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:87
 #, python-format
 msgid ""
 "Get the latest released source code of I2P from\n"
-"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge "
-"source\n"
+"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n"
 "out of the monotone database mtn.i2p2.de"
 msgstr ""
 
@@ -711,18 +672,14 @@ msgid ""
 "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n"
 "Use the 'dynamic' argument to build.sh.\n"
 "Otherwise, you must download GMP version 5.0.2 from\n"
-"from <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"saving it to gmp-5.0.2.tar.bz2.\n"
-"If you decide to use a newer version, change the VER= line in "
-"<code>core/c/jbigi/build.sh</code>."
+"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n"
+"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:101
 msgid ""
 "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n"
-"environment variable is set and you are using Linux then it might just "
-"work.\n"
+"environment variable is set and you are using Linux then it might just work.\n"
 "Otherwise change the settings. Remember, you need the Java SDK installed."
 msgstr ""
 
@@ -730,17 +687,13 @@ msgstr ""
 msgid ""
 "Run <code>build.sh</code> (if you downloaded GMP) or\n"
 "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n"
-"Maybe the build spewed out some errors of missing jni.h and jni_md.h "
-"files.\n"
-"Either copy these files from your java install into the "
-"core/c/jbigi/jbigi/include/ directory,\n"
+"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n"
+"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n"
 "or fix $JAVA_HOME.<br>\n"
-"You can run the <code>build.sh</code> from the <code>core/c/</code> "
-"directory which will\n"
+"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n"
 "build all available jbigi libs into a jbigi.jar.</br>\n"
 "A file named <code>libjbigi.so</code> should be created in the current\n"
-"directory. If this doesn't happen and/or you get errors then please "
-"report\n"
+"directory. If this doesn't happen and/or you get errors then please report\n"
 "them."
 msgstr ""
 
@@ -768,11 +721,8 @@ msgstr "Riavvia I2P."
 
 #: i2p2www/pages/site/misc/jbigi.html:131
 msgid ""
-"On <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"the <code>crypto.elGamal.decrypt</code> and "
-"<code>crypto.elGamal.encrypt</code>\n"
+"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n"
 "should be a lot faster."
 msgstr ""
 
@@ -782,8 +732,7 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:4
 msgid ""
-"The following message was received in mid-November 2007. We have no "
-"further information\n"
+"The following message was received in mid-November 2007. We have no further information\n"
 "on jrandom's status."
 msgstr ""
 
@@ -792,8 +741,7 @@ msgstr ""
 msgid ""
 "Subsequently, in an unrelated incident, the hosting company for\n"
 "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n"
-"on January 13, 2008, and the i2p.net servers did not fully return to "
-"service.\n"
+"on January 13, 2008, and the i2p.net servers did not fully return to service.\n"
 "As only jrandom has the credentials required to restore service,\n"
 "and he could not be contacted,\n"
 "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n"
@@ -815,33 +763,24 @@ msgstr "Installare manualmente il wrapper Java"
 #: i2p2www/pages/site/misc/manual-wrapper.html:6
 #, python-format
 msgid ""
-"The installation package for the <a href=\"%(downloads)s\">I2P router</a>"
-" comes\n"
-"with a Java wrapper for the most common architectures. If your system is "
-"not\n"
-"supported by our installer&mdash;or if you want to update the wrapper to "
-"a\n"
-"newer version&mdash;the following steps describe installing the wrapper "
-"manually."
+"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n"
+"with a Java wrapper for the most common architectures. If your system is not\n"
+"supported by our installer&mdash;or if you want to update the wrapper to a\n"
+"newer version&mdash;the following steps describe installing the wrapper manually."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:14
 msgid ""
-"Check Tanuki Software's <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download"
-" page</a>\n"
+"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n"
 "for your platform. Is your platform listed? If so, you're in\n"
-"luck! Download the most recent version of the Community Edition for your "
-"OS and\n"
+"luck! Download the most recent version of the Community Edition for your OS and\n"
 "CPU and move to <a href=\"#packaged\">the next step</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:20
 msgid ""
-"If your platform does not have an already compiled wrapper available, you"
-"\n"
-"may be able to compile it yourself. If you are willing to have a go at "
-"it, move\n"
+"If your platform does not have an already compiled wrapper available, you\n"
+"may be able to compile it yourself. If you are willing to have a go at it, move\n"
 "on to <a href=\"#compiling\">compiling</a> the wrapper for your system."
 msgstr ""
 
@@ -850,7 +789,8 @@ msgid "Using existing binaries"
 msgstr "Usare il binari precompilati"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:28
-msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>."
+msgid ""
+"In the steps below, $I2P means <em>the location I2P was installed to</em>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:36
@@ -866,8 +806,8 @@ msgstr ""
 #: i2p2www/pages/site/misc/manual-wrapper.html:39
 #: i2p2www/pages/site/misc/manual-wrapper.html:67
 msgid ""
-"If this did not work you'll need to use <code>runplain.sh</code> to start"
-" I2P."
+"If this did not work you'll need to use <code>runplain.sh</code> to start "
+"I2P."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:43
@@ -876,16 +816,15 @@ msgstr "Compilare dai sorgenti"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:44
 msgid ""
-"These steps worked to compile the wrapper for use on a mipsel system "
-"running Debian. The steps <strong>will</strong> need to be altered for "
-"your system."
+"These steps worked to compile the wrapper for use on a mipsel system running"
+" Debian. The steps <strong>will</strong> need to be altered for your system."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:48
 msgid ""
-"Download the source archive for the community version of the wrapper from"
-" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download"
-" page</a>."
+"Download the source archive for the community version of the wrapper from <a"
+" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download "
+"page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:49
@@ -894,8 +833,8 @@ msgstr "Estrai il tarball"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:51
 msgid ""
-"Set environment variables <code>ANT_HOME</code> and "
-"<code>JAVA_HOME</code>. For example, in Debian:"
+"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. "
+"For example, in Debian:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:54
@@ -934,164 +873,110 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:47
 msgid ""
-"An optimized form, designed to handle only 128KB [1] files and pages, can"
-"\n"
+"An optimized form, designed to handle only 128KB [1] files and pages, can\n"
 "operate significantly faster:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:71
 msgid ""
 "The difference in network load and latency is significant - this is\n"
-"essentially a UDP version of HTTP.  On the normal web, we can't really do"
-" that,\n"
-"since most HTTP requests and responses are orders of magnitude larger "
-"than UDP\n"
-"packets functionally support, but in I2P, messages can be large.  The "
-"savings\n"
-"for the network load comes from the fact that we don't need to send any "
-"ACK\n"
+"essentially a UDP version of HTTP.  On the normal web, we can't really do that,\n"
+"since most HTTP requests and responses are orders of magnitude larger than UDP\n"
+"packets functionally support, but in I2P, messages can be large.  The savings\n"
+"for the network load comes from the fact that we don't need to send any ACK\n"
 "messages - rather than the earlier wrap/unwrap request (that bundles a\n"
-"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery),"
-" the\n"
-"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there"
-" are no\n"
+"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n"
+"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n"
 "resends)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:83
 msgid ""
-"The data that the MinWWW proxy and server need to wrap is trivial - when "
-"the\n"
-"proxy wants to send \"GET /\", it prepends it with the I2P Destination "
-"sending\n"
-"the request, followed by a 4 byte request ID.  The MinWWW server receives"
-" those\n"
-"requests, contacts the appropriate HTTPD, sends the request, waits for "
-"the\n"
+"The data that the MinWWW proxy and server need to wrap is trivial - when the\n"
+"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n"
+"the request, followed by a 4 byte request ID.  The MinWWW server receives those\n"
+"requests, contacts the appropriate HTTPD, sends the request, waits for the\n"
 "response, and sends a reply to the MinWWW proxy containing the response,\n"
-"prefixed with the original request ID.  That response is taken and passed"
-" back\n"
+"prefixed with the original request ID.  That response is taken and passed back\n"
 "to the browser and the connection is closed."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:93
 msgid ""
 "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n"
-"list, going through some round robin or other algorithm, so that there "
-"are\n"
-"multiple outproxies merged transparently.  The bandwidth required for "
-"running\n"
-"one of these outproxies is also greatly reduced, since it will only "
-"handle 128KB\n"
+"list, going through some round robin or other algorithm, so that there are\n"
+"multiple outproxies merged transparently.  The bandwidth required for running\n"
+"one of these outproxies is also greatly reduced, since it will only handle 128KB\n"
 "files (aka no one is going to be downloading porn, warez, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:101
 msgid ""
-"The functionality /is/ limited, but 128KB of data is a lot for a single "
-"HTTP\n"
-"request or response.  The above diagrams are also unrealistic in their "
-"hops -\n"
-"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send "
-"each\n"
-"of the messages through two additional outbound routers, then forwarded "
-"to\n"
-"two additional inbound routers to ROUTERB, so the lag there is "
-"significant -\n"
-"while the above only saves 11 steps, 8 of those steps need to traverse "
-"the\n"
-"entire tunnel path (4+ remote hops each time when tunnels are 2 remote "
-"hops\n"
-"in each stretch), leaving MinWWW with only two full traversals (one for "
-"the\n"
+"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n"
+"request or response.  The above diagrams are also unrealistic in their hops -\n"
+"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send each\n"
+"of the messages through two additional outbound routers, then forwarded to\n"
+"two additional inbound routers to ROUTERB, so the lag there is significant -\n"
+"while the above only saves 11 steps, 8 of those steps need to traverse the\n"
+"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n"
+"in each stretch), leaving MinWWW with only two full traversals (one for the\n"
 "request, one for the response), instead of 10."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:113
 msgid ""
-"Implementing the MinWWW proxy and server should be fairly easy - read an "
-"HTTP\n"
-"request from the client fully (perhaps only start out with HTTP GET, "
-"leaving\n"
-"HTTP POST for later), wrap the message, and wait for the response.  The "
-"server\n"
-"in turn simply needs to parse the request to either open a socket or URL,"
-"\n"
-"send the request, wait for the response, and send it back through the "
-"network.\n"
+"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n"
+"request from the client fully (perhaps only start out with HTTP GET, leaving\n"
+"HTTP POST for later), wrap the message, and wait for the response.  The server\n"
+"in turn simply needs to parse the request to either open a socket or URL,\n"
+"send the request, wait for the response, and send it back through the network.\n"
 "If someone were to implement this, it would be Good :)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:122
 msgid ""
-"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary "
-"message\n"
-"size, but that's going to be going away since it involves either "
-"excessive memory\n"
-"overhead on intermediary routers, or additional implementation details to"
-"\n"
-"handle.  I2PTunnel is currently limited to 128KB and hasn't been a "
-"burden,\n"
+"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary message\n"
+"size, but that's going to be going away since it involves either excessive memory\n"
+"overhead on intermediary routers, or additional implementation details to\n"
+"handle.  I2PTunnel is currently limited to 128KB and hasn't been a burden,\n"
 "so perhaps it could be increased to 256KB when the I2CP spec is updated)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:4
 msgid ""
-"There has been discussion about a distributed blogging application for a "
-"few\n"
-"months now called \"MyI2P\".  While the original discussions were lost, "
-"we were \n"
-"able to retrieve a Google <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
-"of it.  It isn't pretty, but it includes the basic overview and some "
-"discussion\n"
+"There has been discussion about a distributed blogging application for a few\n"
+"months now called \"MyI2P\".  While the original discussions were lost, we were \n"
+"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
+"of it.  It isn't pretty, but it includes the basic overview and some discussion\n"
 "that ensued."
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:12
 #, python-format
 msgid ""
-"The application itself is not yet implemented, and the ideas behind it "
-"have \n"
-"been made less ambitious over time, but they are still valid and the "
-"current \n"
-"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality "
-"available \n"
-"along side the I2P 1.0 release.  That will include a distributed address "
-"book\n"
-"to enable secure, distributed, and human readable naming by sacrificing "
-"the \n"
-"need for global uniqueness - basically everyone has their own local "
-"address book \n"
-"and can 'subscribe' to other people's address books, letting MyI2P "
-"periodically\n"
-"retrieve new name to destination mappings (leaving conflicts up to the "
-"user to\n"
-"resolve).  In addition to the address book, there will be a distributed "
-"blogging\n"
+"The application itself is not yet implemented, and the ideas behind it have \n"
+"been made less ambitious over time, but they are still valid and the current \n"
+"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n"
+"along side the I2P 1.0 release.  That will include a distributed address book\n"
+"to enable secure, distributed, and human readable naming by sacrificing the \n"
+"need for global uniqueness - basically everyone has their own local address book \n"
+"and can 'subscribe' to other people's address books, letting MyI2P periodically\n"
+"retrieve new name to destination mappings (leaving conflicts up to the user to\n"
+"resolve).  In addition to the address book, there will be a distributed blogging\n"
 "system using a reduced and secured subset of \n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to "
-"essentially\n"
-"provide an anonymous <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
-"a 'friends list' and transparent access control (authenticated by the I2P"
-"\n"
-"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the "
-"address book)."
+"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n"
+"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
+"a 'friends list' and transparent access control (authenticated by the I2P\n"
+"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:29
 msgid ""
-"Additional functionality, such as integration with a DHT backing store or"
-" \n"
-"swarming file transfers for 'attachments' can be added later.  Email may "
-"or may\n"
-"not get in the first pass either, though its implementation is "
-"essentially just\n"
-"a blog entry with private access, so perhaps some UI designer can come up"
-" with\n"
-"something.  Exporting the data to RSS or access through ATOM will be an "
-"option \n"
+"Additional functionality, such as integration with a DHT backing store or \n"
+"swarming file transfers for 'attachments' can be added later.  Email may or may\n"
+"not get in the first pass either, though its implementation is essentially just\n"
+"a blog entry with private access, so perhaps some UI designer can come up with\n"
+"something.  Exporting the data to RSS or access through ATOM will be an option \n"
 "down the road as well."
 msgstr ""
 
@@ -1106,8 +991,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/ratestats.html:7
 msgid ""
-"The list was gathered using the following command in the top directory of"
-" the branch i2p.i2p:"
+"The list was gathered using the following command in the top directory of "
+"the branch i2p.i2p:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/ratestats.html:10
@@ -1122,18 +1007,15 @@ msgid ""
 "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n"
 "on monotone.\n"
 "See\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p "
-"monotone</a>\n"
-"for more information on how to get started and check out the source "
-"anonymously.\n"
+"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n"
+"for more information on how to get started and check out the source anonymously.\n"
 "There is also a quick-start guide on the\n"
 "<a href=\"%(newdevs)s\">new developer's page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/transition-guide.html:16
 msgid ""
-"If you want to get the source non-anonymously, pull from the public "
-"server mtn.welterde.de.\n"
+"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n"
 "The i2p source code branch is \"i2p.i2p\"."
 msgstr ""
 
@@ -1145,9 +1027,7 @@ msgstr "Guida"
 msgid ""
 "\n"
 "The following is a detailed guide by Complication."
-msgstr ""
-"\n"
-"Segue una guida dettagliata scritta da Complication."
+msgstr "\nSegue una guida dettagliata scritta da Complication."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2
 msgid "How to Upgrade from 0.6.1.30 and Earlier"
@@ -1164,24 +1044,20 @@ msgid ""
 "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n"
 "we do not have his update signing key or access to\n"
 "www.i2p[.net] or dev.i2p[.net].\n"
-"Complication and zzz have generated new signing keys, and they and Amiga "
-"are providing\n"
-"update file hosting. These changes must be configured in your router to "
-"take effect."
+"Complication and zzz have generated new signing keys, and they and Amiga are providing\n"
+"update file hosting. These changes must be configured in your router to take effect."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17
 msgid ""
-"Make the following configuration changes and your router will "
-"automatically install\n"
+"Make the following configuration changes and your router will automatically install\n"
 "the latest release."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22
 #, python-format
 msgid ""
-"We recommend the automated process as it will verify the key of the "
-"signed update file.\n"
+"We recommend the automated process as it will verify the key of the signed update file.\n"
 "If you do not make these changes,\n"
 "you may manually download the i2pupdate.zip file from\n"
 "<a href=\"%(downloads)s\">the download page</a>."
@@ -1194,8 +1070,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38
 msgid ""
-"Select ONE of the following new Update URLs at random and enter it into "
-"the Update URL box: "
+"Select ONE of the following new Update URLs at random and enter it into the "
+"Update URL box: "
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43
@@ -1217,8 +1093,7 @@ msgstr "Fai click su \"Applica\""
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58
 msgid ""
 "You are now ready to automatically receive the release update file,\n"
-"either by setting your update policy to \"download and install\" or by "
-"clicking on the\n"
+"either by setting your update policy to \"download and install\" or by clicking on the\n"
 "\"update available\" link when it appears."
 msgstr ""
 
@@ -1227,7 +1102,5 @@ msgstr ""
 msgid ""
 "If you would like to verify the trusted update keys, they are also\n"
 "<a href=\"%(url)s\">posted and signed here</a>.\n"
-"Thank you for your support during this transition. For help please "
-"contact us on #i2p."
+"Thank you for your support during this transition. For help please contact us on #i2p."
 msgstr ""
-
diff --git a/i2p2www/translations/it/LC_MESSAGES/research.po b/i2p2www/translations/it/LC_MESSAGES/research.po
index 04c0552e3a5877bd13efd6a278b327ca5b32204b..fc38cc4bbd0c46a2755db90494bc4f1e5a87387d 100644
--- a/i2p2www/translations/it/LC_MESSAGES/research.po
+++ b/i2p2www/translations/it/LC_MESSAGES/research.po
@@ -1,26 +1,27 @@
-# Italian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # alamir <christianm@libero.it>, 2014
+# alamir <christianm@libero.it>, 2014
 # Fletcher Lynd <fletcherlynd@hotmail.com>, 2013
 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017
 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020-2021
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-05-06 14:26+0000\n"
-"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>"
-"\n"
+"PO-Revision-Date: 2013-07-15 12:01+0000\n"
+"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020-2021\n"
 "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: it\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/research/index.html:2
 msgid "Academic Research"
@@ -41,16 +42,11 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:10
 msgid ""
-"I2P is a very unique project that unfortunately has not received the "
-"wider\n"
-"academic attention it deserves. To date, most research focus on anonymous"
-" and\n"
-"onion-routing technology has been around Tor, and while those papers "
-"benefit us\n"
-"as well, there is a great need for I2P-focused research. This plays a key"
-" role\n"
-"in both maintaining the security and integrity of the network, as well as"
-"\n"
+"I2P is a very unique project that unfortunately has not received the wider\n"
+"academic attention it deserves. To date, most research focus on anonymous and\n"
+"onion-routing technology has been around Tor, and while those papers benefit us\n"
+"as well, there is a great need for I2P-focused research. This plays a key role\n"
+"in both maintaining the security and integrity of the network, as well as\n"
 "opening doors for more impactful future development."
 msgstr ""
 
@@ -58,49 +54,27 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"There is a large research community investigating a wide range of aspects"
-" of\n"
-"anonymity. For a current and comprehensive list of relevant papers, see "
-"the\n"
+"There is a large research community investigating a wide range of aspects of\n"
+"anonymity. For a current and comprehensive list of relevant papers, see the\n"
 "<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
-"I2P benefits from much of the research into Tor and onion routing, but "
-"there is\n"
-"little dedicated research interest into the theory behind I2P, and the "
-"choices\n"
-"and tradeoffs that the network makes. This presents a unique opportunity "
-"for\n"
+"I2P benefits from much of the research into Tor and onion routing, but there is\n"
+"little dedicated research interest into the theory behind I2P, and the choices\n"
+"and tradeoffs that the network makes. This presents a unique opportunity for\n"
 "original research.\n"
-msgstr ""
-"\n"
-"Esiste una grande comunità di ricerca che indaga una vasta gamma di "
-"aspetti \n"
-"relativi all'anonimato. Per un elenco aggiornato e completo di documenti,"
-"\n"
-"consulta la <a href=\"%(anonbib)s\">bibliografia di Free Haven "
-"Anonymity</a>.\n"
-"I2P si avvantaggia di molte delle ricerche relative a Tor e all'onion "
-"routing, \n"
-"ma c'è poco interesse dedicato alla ricerca nel campo della teoria alla "
-"base\n"
-"di I2P e alle scelte e ai compromessi fatti dalla rete. Questo presenta "
-"una\n"
-"opportunità di ricerca originale unica.\n"
+msgstr "\nEsiste una grande comunità di ricerca che indaga una vasta gamma di aspetti \nrelativi all'anonimato. Per un elenco aggiornato e completo di documenti,\nconsulta la <a href=\"%(anonbib)s\">bibliografia di Free Haven Anonymity</a>.\nI2P si avvantaggia di molte delle ricerche relative a Tor e all'onion routing, \nma c'è poco interesse dedicato alla ricerca nel campo della teoria alla base\ndi I2P e alle scelte e ai compromessi fatti dalla rete. Questo presenta una\nopportunità di ricerca originale unica.\n"
 
 #: i2p2www/pages/site/research/index.html:29
 #, python-format
 msgid ""
 "A list of known published papers about I2P is available <a "
 "href=\"%(papers)s\">here</a>."
-msgstr ""
-"Un elenco di documenti pubblicati inerenti a I2P di cui siamo a "
-"conoscenza è disponibile <a href=\"%(papers)s\">qui</a>."
+msgstr "Un elenco di documenti pubblicati inerenti a I2P di cui siamo a conoscenza è disponibile <a href=\"%(papers)s\">qui</a>."
 
 #: i2p2www/pages/site/research/index.html:34
 msgid ""
 "\n"
 "This page aims to outline the most needed fields of research, notes to\n"
-"potential researchers, our general safety guidelines as well as an "
-"expanding\n"
+"potential researchers, our general safety guidelines as well as an expanding\n"
 "list of open questions that you can begin on at any time.\n"
 msgstr ""
 
@@ -114,16 +88,12 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:44
 msgid ""
-"While all research on the I2P network is beneficial and appreciated, "
-"there are\n"
+"While all research on the I2P network is beneficial and appreciated, there are\n"
 "certain areas which are more in need than others - most so in defensive\n"
 "research. Most people enjoy coming up with fun ways to launch offensives\n"
-"against anonymous software, and this is further reinforced by the "
-"incentives in\n"
-"academic institutions. While we know it is often not the first choice for"
-"\n"
-"researchers, We would certainly appreciate any and all work towards ways "
-"to\n"
+"against anonymous software, and this is further reinforced by the incentives in\n"
+"academic institutions. While we know it is often not the first choice for\n"
+"researchers, We would certainly appreciate any and all work towards ways to\n"
 "fortify the network!"
 msgstr ""
 
@@ -134,27 +104,17 @@ msgstr ""
 #: i2p2www/pages/site/research/index.html:56
 #, python-format
 msgid ""
-"If you've decided on a research topic that aims to hands-on investigate "
-"the I2P\n"
-"network or solve a problem of large proportions we ask you to "
-"<b>please</b> \n"
-"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
-"team, the\n"
-"sooner the better. I2P is under constant development and a significant "
-"amount\n"
-"of roadmapping occurs, therefore your problem may have already been "
-"identified\n"
-"and flagged for update or patch. In the unlikely event you are conducting"
-"\n"
-"testing that overlaps with / would be of interest to another research "
-"project\n"
-"already in motion, we are also able to make you aware of this (with their"
-"\n"
-"permission, of course), and possibly open the door for collaboration. "
-"There is\n"
+"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
+"network or solve a problem of large proportions we ask you to <b>please</b> \n"
+"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
+"sooner the better. I2P is under constant development and a significant amount\n"
+"of roadmapping occurs, therefore your problem may have already been identified\n"
+"and flagged for update or patch. In the unlikely event you are conducting\n"
+"testing that overlaps with / would be of interest to another research project\n"
+"already in motion, we are also able to make you aware of this (with their\n"
+"permission, of course), and possibly open the door for collaboration. There is\n"
 "also a chance that the test itself may significantly harm the network or\n"
-"regular users, and the team may have ideas or suggestions to mitigate "
-"that risk\n"
+"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
 "and increase the safety of your testing."
 msgstr ""
 
@@ -170,13 +130,11 @@ msgstr "Linee guida generali"
 msgid ""
 "<ol>\n"
 "  <li>\n"
-"    Consider the benefits and risks - is there any doubt that the "
-"research\n"
+"    Consider the benefits and risks - is there any doubt that the research\n"
 "    provides more value than danger?\n"
 "  </li>\n"
 "  <li>\n"
-"    If the research can be done on a test network then that is the "
-"preferred\n"
+"    If the research can be done on a test network then that is the preferred\n"
 "    method\n"
 "  </li>\n"
 "  <li>\n"
@@ -184,10 +142,8 @@ msgid ""
 "    collecting data about yourself\n"
 "  </li>\n"
 "  <li>\n"
-"    If you need 'bigger data', It is recommended to first see if you can "
-"use\n"
-"    data sets from previous experiments or other third party resources is"
-"\n"
+"    If you need 'bigger data', It is recommended to first see if you can use\n"
+"    data sets from previous experiments or other third party resources is\n"
 "    recommended\n"
 "  </li>\n"
 "  <li>\n"
@@ -195,10 +151,8 @@ msgid ""
 "    publication and collect as little as possible\n"
 "  </li>\n"
 "  <li>\n"
-"    After testing and before publish, review that all data which is to be"
-"\n"
-"    published publicly is <b><i>not</i></b> intended to be private by the"
-"\n"
+"    After testing and before publish, review that all data which is to be\n"
+"    published publicly is <b><i>not</i></b> intended to be private by the\n"
 "    originator\n"
 "  </li>\n"
 "</ol>"
@@ -210,32 +164,24 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:108
 msgid ""
-"I2P can be run as a separate test network by controlling the locations "
-"that a\n"
+"I2P can be run as a separate test network by controlling the locations that a\n"
 "new router reseeds from so that it only finds other test routers.\n"
 "\n"
-"The standard mode of operation is to have one JVM per router instance; "
-"hence\n"
-"running multiple copies of I2P on a single machine is inadvisable, both "
-"due to\n"
+"The standard mode of operation is to have one JVM per router instance; hence\n"
+"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
 "the potential resource drain and the certain port conflicts. To better\n"
-"facilitate setting up small test networks, I2P has a multirouter mode "
-"which\n"
+"facilitate setting up small test networks, I2P has a multirouter mode which\n"
 "enables multiple distinct routers to be run in the same JVM.\n"
 "\n"
-"MultiRouter can be started from the i2p base directory by running the "
-"below\n"
+"MultiRouter can be started from the i2p base directory by running the below\n"
 "command."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:124
 msgid ""
-"Additionally, I2P can be started in a virtual network mode. This mode "
-"disables\n"
-"all transports, allowing the router to be tested in isolation without "
-"network\n"
-"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
-"the\n"
+"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
+"all transports, allowing the router to be tested in isolation without network\n"
+"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
 "router.config before starting."
 msgstr ""
 
@@ -246,13 +192,10 @@ msgstr ""
 #: i2p2www/pages/site/research/index.html:133
 #, python-format
 msgid ""
-"As stated above in the researcher notes, please <a "
-"href=\"%(contact)s\">contact\n"
+"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
 "  us</a> before you commence your testing. While we do not discourage\n"
-"researchers from responsibly testing their ideas on the live network, if "
-"an\n"
-"attack becomes apparent and we don't have any line of communication then "
-"we\n"
+"researchers from responsibly testing their ideas on the live network, if an\n"
+"attack becomes apparent and we don't have any line of communication then we\n"
 "will end up taking countermeasures which could interfere with the test."
 msgstr ""
 
@@ -262,35 +205,23 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:143
 msgid ""
-"As of release 0.9.25, I2P supports a router family configuration. This "
-"provides\n"
-"researchers who run multiple routers with the means to publicly identify "
-"those\n"
-"routers. In turn, this helps the I2P project understand that these "
-"routers are\n"
-"not running an attack on the network. It also will prevent other routers "
-"from\n"
-"including multiple routers of the family in a single tunnel, which could "
-"lead\n"
-"to deanonymization. Routers that appear to be colluding but do not have a"
-"\n"
-"declared family may be assumed to be an attack on the network, and may be"
-"\n"
-"blocked. The best way to ensure the success of your research project is "
-"to work\n"
+"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
+"researchers who run multiple routers with the means to publicly identify those\n"
+"routers. In turn, this helps the I2P project understand that these routers are\n"
+"not running an attack on the network. It also will prevent other routers from\n"
+"including multiple routers of the family in a single tunnel, which could lead\n"
+"to deanonymization. Routers that appear to be colluding but do not have a\n"
+"declared family may be assumed to be an attack on the network, and may be\n"
+"blocked. The best way to ensure the success of your research project is to work\n"
 "with us directly."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:155
 msgid ""
-"A router family shares a private key so that participation in the family "
-"cannot\n"
-"be spoofed. To configure a router family, click on the 'I2P Internals' "
-"link in\n"
-"the router console, and then on the 'Family' tab. Follow the instructions"
-" there\n"
-"to generate the private key for the first router in the family. Then, "
-"export\n"
+"A router family shares a private key so that participation in the family cannot\n"
+"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
+"the router console, and then on the 'Family' tab. Follow the instructions there\n"
+"to generate the private key for the first router in the family. Then, export\n"
 "the key from that router, and import it to other members of the family."
 msgstr ""
 
@@ -345,8 +276,7 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:6
 msgid ""
 "\n"
-"This process is subject to change. Please refer to this page for the "
-"current VRP."
+"This process is subject to change. Please refer to this page for the current VRP."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:10
@@ -355,22 +285,15 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:12
 msgid ""
-"Researchers: while you research/hack, we ask that you refrain from the "
-"following: - Performing active exploits or Denial of Service attacks on "
-"the\n"
-"i2p network - Performing social engineering on i2p development team "
-"members - Performing any physical or electronic attempts against i2p "
-"property and/or data\n"
+"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
+"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
 "centers"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:15
 msgid ""
-"As i2p is an open-source community, many volunteers and development team "
-"members run their own I2P Sites as well as public (“non-private "
-"internet”) domains. These\n"
-"sites/servers are NOT in the scope of the vulnerability assessment / "
-"response process, only the underlying code of i2p is."
+"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
+"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:18
@@ -397,8 +320,7 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:37
 msgid ""
-"Response Team designates a Response Manager who is in charge of the "
-"particular\n"
+"Response Team designates a Response Manager who is in charge of the particular\n"
 "report based on availability and/or knowledge-set."
 msgstr ""
 
@@ -411,8 +333,7 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:47
 msgid ""
-"Response Manager makes inquiries to satisfy any needed information and to"
-"\n"
+"Response Manager makes inquiries to satisfy any needed information and to\n"
 "confirm if submission is indeed a vulnerability."
 msgstr ""
 
@@ -432,8 +353,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:62
 msgid ""
-"Response Manager moves discussion to a new or existing ticket on public "
-"Trac if necessary."
+"Response Manager moves discussion to a new or existing ticket on public Trac"
+" if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:70
@@ -441,15 +362,12 @@ msgid ""
 "\n"
 "Establish severity of vulnerability:\n"
 "  "
-msgstr ""
-"\n"
-"Capire la gravità di una vulnerabiltà:\n"
-"  "
+msgstr "\nCapire la gravità di una vulnerabiltà:\n  "
 
 #: i2p2www/pages/site/research/vrp.html:75
 msgid ""
-"Affects network as a whole, has potential to break entire network or is "
-"on a scale of great catastrophe."
+"Affects network as a whole, has potential to break entire network or is on a"
+" scale of great catastrophe."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:79
@@ -467,19 +385,18 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:93
 #, python-format
 msgid ""
-"HIGH severities must be notified on website and news feed within "
-"%(limit)s\n"
+"HIGH severities must be notified on website and news feed within %(limit)s\n"
 "working days of classification."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:98
-msgid "The notification should list appropriate steps for users to take, if any."
+msgid ""
+"The notification should list appropriate steps for users to take, if any."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:101
 msgid ""
-"The notification must not include any details that could suggest an "
-"exploitation\n"
+"The notification must not include any details that could suggest an exploitation\n"
 "path."
 msgstr ""
 
@@ -502,8 +419,8 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:122
 msgid ""
 "Response Manager works on a patch LOCALLY, patches are shared by the "
-"response team via PGP-encrypted e-mail until such a time as it is safe to"
-" expose to the public."
+"response team via PGP-encrypted e-mail until such a time as it is safe to "
+"expose to the public."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:125
@@ -512,10 +429,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:128
 msgid ""
-"Any messages associated with PUBLIC commits during the time of review "
-"should not\n"
-"make reference to the security nature of the PRIVATE branch or its "
-"commits."
+"Any messages associated with PUBLIC commits during the time of review should not\n"
+"make reference to the security nature of the PRIVATE branch or its commits."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:132
@@ -550,19 +465,14 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:159
 msgid ""
-"Response Manager includes vulnerability announcement draft in release "
-"notes."
+"Response Manager includes vulnerability announcement draft in release notes."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:162
 msgid ""
-"Proceed with the Point or Regular Release. At this time, it is not "
-"possible to release an in-network update for only one operating system or"
-"\n"
-"\t\tarchitecture. In order that all affected products can be released as "
-"quickly as possible, the person responsible\n"
-"\t\tfor that software should be able to perform necessary release "
-"processes in a timely manner. Importantly this should include\n"
+"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
+"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
+"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
 "\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
 msgstr ""
 
@@ -572,11 +482,13 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:175
 #, python-format
-msgid "Response Team has %(limit)s days to fulfill all points within section III."
+msgid ""
+"Response Team has %(limit)s days to fulfill all points within section III."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:179
-msgid "If the Incident Response process in section III is successfully completed:"
+msgid ""
+"If the Incident Response process in section III is successfully completed:"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:183
@@ -628,8 +540,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:214
 msgid ""
-"Workarounds (configuration changes users can make to reduce their "
-"exposure to the vulnerability)."
+"Workarounds (configuration changes users can make to reduce their exposure "
+"to the vulnerability)."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:217
@@ -637,13 +549,14 @@ msgid "If applicable, credits to the original reporter."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:222
-msgid "Release finalized vulnerability announcement on website and in news feed."
+msgid ""
+"Release finalized vulnerability announcement on website and in news feed."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:230
 msgid ""
-"For HIGH severities, release finalized vulnerability announcement on "
-"well-known mailing lists:"
+"For HIGH severities, release finalized vulnerability announcement on well-"
+"known mailing lists:"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:238
@@ -652,8 +565,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:242
 msgid ""
-"The commit that applied the fix is made reference too in a future commit "
-"and includes a CVE-ID."
+"The commit that applied the fix is made reference too in a future commit and"
+" includes a CVE-ID."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:250
@@ -664,33 +577,28 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:254
 msgid ""
-"Response Team and developers organize an IRC meeting to discuss why/what "
-"points\n"
-"in section III were not resolved and how the team can resolve them in the"
-"\n"
+"Response Team and developers organize an IRC meeting to discuss why/what points\n"
+"in section III were not resolved and how the team can resolve them in the\n"
 "future."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:259
 msgid ""
-"Any developer meetings immediately following the incident should include "
-"points\n"
+"Any developer meetings immediately following the incident should include points\n"
 "made in section V."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:263
 msgid ""
 "If disputes arise about whether or when to disclose information about a\n"
-"vulnerability, the Response Team will publicly discuss the issue via IRC "
-"and\n"
+"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
 "attempt to reach consensus."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:268
 #, python-format
 msgid ""
-"If consensus on a timely disclosure is not met (no later than %(limit)s "
-"days),\n"
+"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
 "the researcher (after %(limit)s days) has every right to expose the\n"
 "vulnerability to the public."
 msgstr ""
@@ -705,7 +613,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:282
 #: i2p2www/pages/site/research/vrp.html:302
-msgid "Response Team and developers should coordinate to work on the following:"
+msgid ""
+"Response Team and developers should coordinate to work on the following:"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:286
@@ -734,15 +643,13 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:312
 msgid ""
-"If results are not sensitive, share with the public via IRC or public "
-"Trac."
+"If results are not sensitive, share with the public via IRC or public Trac."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:320
 #, python-format
 msgid ""
-"Response Team has %(limit)s days following completion of section III to "
-"ensure\n"
+"Response Team has %(limit)s days following completion of section III to ensure\n"
 "completion of section V."
 msgstr ""
 
@@ -752,10 +659,8 @@ msgstr "Soluzioni"
 
 #: i2p2www/pages/site/research/vrp.html:328
 msgid ""
-"Any further questions or resolutions regarding the incident(s) between "
-"the\n"
-"researcher and response + development team after public disclosure can be"
-"\n"
+"Any further questions or resolutions regarding the incident(s) between the\n"
+"researcher and response + development team after public disclosure can be\n"
 "addressed via the following:"
 msgstr ""
 
@@ -765,8 +670,7 @@ msgstr "Continuous Improvement"
 
 #: i2p2www/pages/site/research/vrp.html:344
 msgid ""
-"Response Team and developers should hold annual meetings to review the "
-"previous\n"
+"Response Team and developers should hold annual meetings to review the previous\n"
 "year's incidents."
 msgstr ""
 
@@ -803,4 +707,3 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:375
 msgid "Potential changes to this process to improve future responses."
 msgstr ""
-
diff --git a/i2p2www/translations/ja/LC_MESSAGES/get-involved.po b/i2p2www/translations/ja/LC_MESSAGES/get-involved.po
index 92879038e2b48c032891108e1b44508907285483..8005670e0ac04b04f982b53d346c56757f90de31 100644
--- a/i2p2www/translations/ja/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/ja/LC_MESSAGES/get-involved.po
@@ -1,26 +1,27 @@
-# Japanese translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # kami <b52c55627324b29125cbcfb101258463_228943>, 2015
 # rafe <rafe.kun@gmail.com>, 2015
-# XMPPはいいぞ, 2020-2021
+# daingewuvzeevisiddfddd, 2020-2021
 # tama negi, 2020
-# XMPPはいいぞ, 2021
+# daingewuvzeevisiddfddd, 2021
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-09-06 14:33+0000\n"
-"Last-Translator: XMPPはいいぞ\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: daingewuvzeevisiddfddd, 2021\n"
 "Language-Team: Japanese (http://www.transifex.com/otf/I2P/language/ja/)\n"
-"Plural-Forms: nplurals=1; plural=0\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ja\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -35,12 +36,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -55,44 +53,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -131,10 +118,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -164,10 +149,8 @@ msgstr "ステッカー"
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -182,25 +165,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -226,8 +199,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -241,12 +213,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -257,10 +226,8 @@ msgstr "翻訳"
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
 msgstr ""
@@ -271,17 +238,12 @@ msgstr "文書"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -292,16 +254,11 @@ msgstr "テスト中"
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -314,14 +271,10 @@ msgstr "サービス"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -331,9 +284,9 @@ msgstr "再シード"
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -377,8 +330,7 @@ msgstr "分析"
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -386,7 +338,7 @@ msgstr ""
 msgid "Roadmap"
 msgstr "ロードマップ"
 
-#: i2p2www/pages/site/get-involved/roadmap.html:309
+#: i2p2www/pages/site/get-involved/roadmap.html:210
 #, python-format
 msgid ""
 "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info "
@@ -447,84 +399,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -533,17 +462,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -551,29 +475,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -581,42 +499,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -660,72 +569,52 @@ msgstr ""
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -735,8 +624,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -749,33 +638,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -796,76 +679,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -875,25 +739,18 @@ msgstr "匿名性と機密性"
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -904,29 +761,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -936,10 +785,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -947,13 +794,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -964,43 +808,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1015,28 +852,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1047,8 +876,7 @@ msgstr "削除されました"
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1062,8 +890,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1082,14 +909,10 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1098,17 +921,14 @@ msgstr "ウェブアプリケーション"
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1118,8 +938,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1141,32 +960,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1175,47 +987,39 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1227,12 +1031,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1257,8 +1058,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1277,8 +1078,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1307,20 +1107,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1392,8 +1188,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1406,24 +1201,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1433,22 +1219,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1484,21 +1262,16 @@ msgstr ""
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1522,10 +1295,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1536,8 +1307,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1550,10 +1320,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1563,7 +1331,8 @@ msgid "Release Signing Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1584,7 +1353,8 @@ msgid "Download PGP public key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1592,13 +1362,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1606,7 +1377,8 @@ msgid "Security GPG Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1615,8 +1387,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1648,35 +1419,28 @@ msgstr "その他"
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1684,29 +1448,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1733,12 +1491,10 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1748,10 +1504,8 @@ msgstr "コミュニティー"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1773,8 +1527,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1782,13 +1536,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1797,8 +1552,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1812,34 +1566,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1849,61 +1597,49 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1930,20 +1666,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1952,14 +1687,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1969,12 +1704,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1994,8 +1730,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2022,12 +1757,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2046,22 +1778,22 @@ msgstr "I2PでIDEを使用"
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2078,8 +1810,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2096,14 +1828,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2182,34 +1914,26 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2219,20 +1943,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2249,22 +1969,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2276,10 +1993,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2289,38 +2004,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2338,23 +2045,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2368,11 +2069,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2383,34 +2081,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2423,18 +2114,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2448,16 +2135,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2477,67 +2162,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2561,8 +2236,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2578,44 +2253,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2623,8 +2288,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2633,64 +2297,59 @@ msgid "New Developer's Guide"
 msgstr "新規開発者のガイド"
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:6
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:32
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:31
 msgid "Basic study"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:7
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:46
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:45
 msgid "Getting the I2P code"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:9
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:52
 msgid "The new way: Git"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:10
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:11
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81
-msgid "The old way: Monotone"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:145
 msgid "Building I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:166
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:102
 msgid "Development ideas"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:174
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:110
 msgid "Making the results available"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:196
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
 msgid "Get to know us!"
 msgstr "私達を知ろう!"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:202
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
 msgid "Translations"
 msgstr "翻訳"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:17
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:208
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
 msgid "Tools"
 msgstr "ツール"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:22
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:21
 msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:26
 #, python-format
 msgid ""
 "\n"
@@ -2698,42 +2357,34 @@ msgid ""
 "Try <a href=\"%(volunteer)s\">getting involved</a> first."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:34
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:38
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:37
 #, python-format
 msgid ""
 "Study the <a href=\"%(intro)s\">how intro</a>,\n"
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:47
 msgid ""
 "For development on the I2P router or the embedded applications,\n"
 "there are two ways to get the source code:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
-msgid "The easy way: Git"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:55
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"For the time being, issues are still being manged on <a "
-"href=\"%(trac)s\">trac</a>."
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
+"issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:58
@@ -2746,143 +2397,31 @@ msgstr ""
 msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:84
-msgid ""
-"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n"
-"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to "
-"the source code (and for a lot of complicated things, but 'keeping track "
-"of changes' is the basic idea)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:89
-msgid ""
-"Skim over the <a "
-"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>,"
-" to make sure you understand the concepts."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:93
-msgid ""
-"If you want to remain anonymous, you need to do an additional step, to "
-"set up a connection to a monotone server over I2P:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
-#, python-format
-msgid ""
-"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port "
-"8998 pointing to mtn.i2p-projekt.i2p."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
-msgid ""
-"Pick a directory where you want to put all your I2P files, and create a "
-"monotone database:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
-msgid ""
-"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or"
-" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the "
-"following contents:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
-#, python-format
-msgid ""
-"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> "
-"into a new file (e.g. <code>keys.txt</code>) in the same directory\n"
-"  that <code>i2p.mtn</code> is in. Import the keys into your database "
-"with <br><code><pre>      mtn -d i2p.mtn read < keys.txt</pre></code>"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
-msgid ""
-"Pull the I2P sources to your machine. This may take a long time, "
-"especially if you are doing this over I2P!"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
-msgid "Anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
-msgid "Non-anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
-msgid ""
-"All the sources are now present on your machine, in the database file. To"
-" make them available in a directory, you need to check them out:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:125
-msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the "
-"I2P sources."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
-msgid "Remarks"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
-msgid ""
-"\n"
-"To download the website files instead of the I2P source files, use "
-"'i2p.www' instead of 'i2p.i2p'."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:133
-msgid ""
-"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it"
-" left off.\n"
-"If you are in a hurry, use the non-anonymous access."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
-#, python-format
-msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on <a"
-" href=\"%(viewmtn)s\">viewmtn</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:141
-#, python-format
-msgid ""
-"A long explanation about using monotone is available on the <a "
-"href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:147
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:155
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:91
 msgid ""
 "To build or work on console translations, you need\n"
 "the xgettext, msgfmt, and msgmerge tools from the\n"
 "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:161
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
 #, python-format
 msgid ""
 "For development on new applications,\n"
 "see the <a href=\"%(apps)s\">application development guide</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:167
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
 #, python-format
 msgid ""
 "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n"
@@ -2891,93 +2430,42 @@ msgid ""
 "for ideas."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:176
-#, python-format
-msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:181
-msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:184
-msgid "use an empty passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:185
-msgid "enter a passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:186
-#, python-format
-msgid ""
-"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get "
-"push privileges"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:187
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get "
-"commit privileges - not required for website"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:188
-msgid "check in with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:189
-msgid "push with this key"
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:191
-#, python-format
-msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:197
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:203
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:209
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:217
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -2997,17 +2485,11 @@ msgstr "サイトを翻訳するには"
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
-msgstr ""
-"Webサイトの翻訳は .po ファイルによって行われます。\n"
-"今のところWebサイト翻訳で最も簡便な方法は\n"
-"<a href=\"%(transifex)s\">Transifex</a>でアカウントを作成し、翻訳チームへの参加申請を行うことです。\n"
-"それとは別に、以下に示す「古いやり方」も可能。"
+msgstr "Webサイトの翻訳は .po ファイルによって行われます。\n今のところWebサイト翻訳で最も簡便な方法は\n<a href=\"%(transifex)s\">Transifex</a>でアカウントを作成し、翻訳チームへの参加申請を行うことです。\nそれとは別に、以下に示す「古いやり方」も可能。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:17
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:82
@@ -3020,14 +2502,9 @@ msgstr "準備"
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
-msgstr ""
-"IRC上の#i2p-devに来て人と話してください。\n"
-"言語を表明してください - \n"
-"あなたが編集中のファイルに他の人が衝突しないように、<a href=\"%(url)s\">このWikiページ</a>の翻訳状況を更新してください。"
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
+msgstr "IRC上の#i2p-devに来て人と話してください。\n言語を表明してください - \nあなたが編集中のファイルに他の人が衝突しないように、<a href=\"%(url)s\">このWikiページ</a>の翻訳状況を更新してください。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
 #, python-format
@@ -3036,82 +2513,48 @@ msgid ""
 "Including the installation of monotone,\n"
 "checking out i2p.www branch, and generate your own monotone keys.\n"
 "It is not required that you sign a dev agreement."
-msgstr ""
-"<a href=\"%(newdevs)s\">新規開発者向けガイド</a>に従い、\n"
-"monotoneのインストール、i2p.www ブランチの確認、自身のmonotoneキーの生成を行ってください。\n"
-"開発者契約を結ぶ必要はありません。"
+msgstr "<a href=\"%(newdevs)s\">新規開発者向けガイド</a>に従い、\nmonotoneのインストール、i2p.www ブランチの確認、自身のmonotoneキーの生成を行ってください。\n開発者契約を結ぶ必要はありません。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:33
 msgid ""
 "<b>Create files:</b>\n"
 "If the file for your language does not exist yet:"
-msgstr ""
-"<b>ファイル作成:</b>\n"
-"あなたの言語用のファイルがまだない場合:"
+msgstr "<b>ファイル作成:</b>\nあなたの言語用のファイルがまだない場合:"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
-msgstr ""
-"<code>./extract-messages.sh</code>を起動して "
-"<code>messages.pot</code>をベースディレクトリに作成。\n"
-"ヘッダを編集し、それから\"<code>./init-new-po.sh locale</code>\"を起動して、ファイル "
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code> を作成。\n"
-"このファイルを \"mtn add\" してください。"
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
+msgstr "<code>./extract-messages.sh</code>を起動して <code>messages.pot</code>をベースディレクトリに作成。\nヘッダを編集し、それから\"<code>./init-new-po.sh locale</code>\"を起動して、ファイル <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code> を作成。\nこのファイルを \"mtn add\" してください。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
 msgid ""
 "Edit <code>i2p2www/pages/global/lang.html</code> and add a line for your "
 "language (copy an existing line)."
-msgstr ""
-"<code>i2p2www/pages/global/lang.html</code> "
-"を編集し、あなたの言語を追記する(既存の行をコピーしてください)。"
+msgstr "<code>i2p2www/pages/global/lang.html</code> を編集し、あなたの言語を追記する(既存の行をコピーしてください)。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
-msgstr ""
-"<code>i2p2www/static/images/flags/</code> "
-"にメニュー用の国旗画像ファイルを追加する(ルータからコピーしてください)。"
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
+msgstr "<code>i2p2www/static/images/flags/</code> にメニュー用の国旗画像ファイルを追加する(ルータからコピーしてください)。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
-msgstr ""
-"<b>ファイル編集:</b>\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code> "
-"を編集してください。\n"
-".poファイルを効率よく扱うには、<a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>を使うとよいかもしれません。"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
+msgstr "<b>ファイル編集:</b>\n<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code> を編集してください。\n.poファイルを効率よく扱うには、<a href=\"http://www.poedit.net/download.php\">POEdit</a>を使うとよいかもしれません。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
-msgstr ""
-"<b>チェックイン:</b>\n"
-"\"<code>mtn pull</code>\"、\"<code>mtn update</code>\" してください。\n"
-"それから \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\" "
-"でチェックインしてください。\n"
-"これはあなたのローカルレポジトリに編集後ファイルの差分情報を集めるものです。\n"
-"次に \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\" を行ってください。\n"
-"これはローカルレポジトリとターゲットマシンのレポジトリを同期させます。"
+msgstr "<b>チェックイン:</b>\n\"<code>mtn pull</code>\"、\"<code>mtn update</code>\" してください。\nそれから \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\" でチェックインしてください。\nこれはあなたのローカルレポジトリに編集後ファイルの差分情報を集めるものです。\n次に \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\" を行ってください。\nこれはローカルレポジトリとターゲットマシンのレポジトリを同期させます。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:65
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:158
@@ -3125,15 +2568,10 @@ msgstr "ルータコンソールを翻訳するには"
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
-msgstr ""
-"今のところルータコンソール翻訳で最も簡便な方法は\n"
-"<a href=\"%(transifex)s\">Transifex</a>でアカウントを作成し、翻訳チームへの参加申請を行うことです。\n"
-"それとは別に、以下に示す「古いやり方」も可能。"
+msgstr "今のところルータコンソール翻訳で最も簡便な方法は\n<a href=\"%(transifex)s\">Transifex</a>でアカウントを作成し、翻訳チームへの参加申請を行うことです。\nそれとは別に、以下に示す「古いやり方」も可能。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:90
 #, python-format
@@ -3141,9 +2579,7 @@ msgid ""
 "Follow the <a href=\"%(newdevs)s\">new developer's guide</a>,\n"
 "including the installation of monotone and the gettext tools,\n"
 "checking out i2p.i2p branch, and generate your own monotone keys."
-msgstr ""
-"<a href=\"%(newdevs)s\">新規開発者向けガイド</a>に従い、\n"
-"monotoneのインストール、i2p.i2p ブランチの確認、自身のmonotoneキーの生成を行ってください。"
+msgstr "<a href=\"%(newdevs)s\">新規開発者向けガイド</a>に従い、\nmonotoneのインストール、i2p.i2p ブランチの確認、自身のmonotoneキーの生成を行ってください。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:95
 msgid "Generate your own gpg key and sign the dev agreement."
@@ -3151,69 +2587,43 @@ msgstr "自身のGPGキーを作成し開発者契約を結んでください。
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
-msgstr ""
-"コンソール翻訳を始める前に、まずI2Pウェブページの翻訳支援を行ったほうがいいでしょう。\n"
-"少なくともあなたの言語のI2Pトップページはやるとよいです。"
+msgstr "コンソール翻訳を始める前に、まずI2Pウェブページの翻訳支援を行ったほうがいいでしょう。\n少なくともあなたの言語のI2Pトップページはやるとよいです。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:106
 msgid ""
 "<b>What to translate:</b>\n"
 "There are about 15 files in the i2p.i2p branch that needs translation:"
-msgstr ""
-"<b>何を翻訳するのか:</b>\n"
-"i2p.i2pブランチには翻訳が必要なファイルが約15コあります:"
+msgstr "<b>何を翻訳するのか:</b>\ni2p.i2pブランチには翻訳が必要なファイルが約15コあります:"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
-msgstr ""
-"xxが fr/de/ch/zh/... のような言語コードにあたります。\n"
-"あなたの言語のファイルが既にあるかは分かりません。ない場合は自分で作成できます - "
-"あなたが知ってる他の言語のファイルをコピーして自分の言語コードに書き換えましょう。"
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
+msgstr "xxが fr/de/ch/zh/... のような言語コードにあたります。\nあなたの言語のファイルが既にあるかは分かりません。ない場合は自分で作成できます - あなたが知ってる他の言語のファイルをコピーして自分の言語コードに書き換えましょう。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
-msgstr ""
-"<b>ファイル作成:</b>\n"
-"あなたの言語用のファイルがまだない場合、他の言語ファイルをコピーして、あなたの言語用に <code>foo_xx.bar</code> "
-"という新規ファイルとします。\n"
-"次にそのファイルを \"<code>mtn add</code>\" します。\n"
-".poファイルの作成後、ヘッダを編集します。それから \"<code>ant distclean poupdate</code>\" を走らせます。"
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
+msgstr "<b>ファイル作成:</b>\nあなたの言語用のファイルがまだない場合、他の言語ファイルをコピーして、あなたの言語用に <code>foo_xx.bar</code> という新規ファイルとします。\n次にそのファイルを \"<code>mtn add</code>\" します。\n.poファイルの作成後、ヘッダを編集します。それから \"<code>ant distclean poupdate</code>\" を走らせます。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
 msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
-msgstr ""
-"<b>作業開始:</b>\n"
-"HTMLファイルを好きなテキストエディタで編集します。\n"
-"エディタをHTMLモードにしないように注意。全ての書式が変わってしまいます。\n"
-".poファイルを効率よく扱うには、<a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>を使うとよいかもしれません。"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
+msgstr "<b>作業開始:</b>\nHTMLファイルを好きなテキストエディタで編集します。\nエディタをHTMLモードにしないように注意。全ての書式が変わってしまいます。\n.poファイルを効率よく扱うには、<a href=\"http://www.poedit.net/download.php\">POEdit</a>を使うとよいかもしれません。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
-msgstr ""
-"以上のように、さほど難しくはありません。\n"
-"コンソールの用語の意味について疑問があれば、IRCの<code>#i2p-dev</code>で聞いてください。"
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
+msgstr "以上のように、さほど難しくはありません。\nコンソールの用語の意味について疑問があれば、IRCの<code>#i2p-dev</code>で聞いてください。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
 msgid "FAQ"
@@ -3221,11 +2631,9 @@ msgstr "よくある質問"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
-msgstr ""
-"Q: "
-"なぜmonotone・Java・JSPのインストール、.poファイルとHTMLの学習などなどやらなければいけないんでしょう?どうして翻訳をメールで送るだけではいけないのですか?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
+msgstr "Q: なぜmonotone・Java・JSPのインストール、.poファイルとHTMLの学習などなどやらなければいけないんでしょう?どうして翻訳をメールで送るだけではいけないのですか?"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
 msgid "A: Several reasons:"
@@ -3236,80 +2644,70 @@ msgstr "A: 理由はさまざまあります:"
 msgid ""
 "You might be interested in translating via Transifex. Request to join a "
 "translation team <a href=\"%(transifex)s\">here</a>."
-msgstr ""
-"Transifexで翻訳するのは面白いですよ。<a "
-"href=\"%(transifex)s\">ここ</a>の翻訳チームに参加申請を行ってください。"
+msgstr "Transifexで翻訳するのは面白いですよ。<a href=\"%(transifex)s\">ここ</a>の翻訳チームに参加申請を行ってください。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr "お手製の翻訳を受け付けてそれらをあなたの代わりに我々のソース制御システムに提出するだけの暇がある人が誰も居ません。仮に居たとして、大規模化はできません。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr "あなたは翻訳が1ステップの工程だと思っているかもしれませんが、そうではありません。1度に全てを片付けることはできません。誤りを犯すこともあるでしょう。まともに見えるように提出<i>前</i>に試したりいじったりする必要もあります。開発者らが英文を更新したり追加したりすれば、翻訳更新が必要になります。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
-msgstr ""
-"翻訳者にソース制御システムを使わせれば、直ちに認証や追跡性が提供されます - \n"
-"誰が何をやっているか把握でき、変更の追跡ができ、必要であれば差し戻しできます。"
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
+msgstr "翻訳者にソース制御システムを使わせれば、直ちに認証や追跡性が提供されます - \n誰が何をやっているか把握でき、変更の追跡ができ、必要であれば差し戻しできます。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ".poファイルは難しくありません。直接それを触りたくないなら 'poedit' を勧めます。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr "HTMLファイルは難しくありません。ただHTML関連を無視してテキストを訳しましょう。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr "monotoneのインストールと使用はそれほど難しくありません。I2P翻訳者やその他の貢献者のいくらかはプログラマーではありませんが、monotoneを日々使いこなしています。Monotoneは単にソース制御システムであって、\"コーディング\"の類ではありません。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr "我々の翻訳対象は\"文書\"ではありません。HTMLファイルと.poファイルであり、特定の書式と文字コード(UTF-8)を持っています。それは維持されなければならず、メーラーや別の転送方法による破損は許されません。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
-msgstr ""
-"我々は翻訳者用フロントエンドとして 'Pootle' "
-"を調査していました。それは上手くいかず、管理者が必要で、もしPootleに基づく工程になっていたら上述したたくさんの欠陥に悩まされることになったでしょう。"
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
+msgstr "我々は翻訳者用フロントエンドとして 'Pootle' を調査していました。それは上手くいかず、管理者が必要で、もしPootleに基づく工程になっていたら上述したたくさんの欠陥に悩まされることになったでしょう。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
-msgstr ""
-"<b>まとめ:</b>\n"
-"確かに、翻訳開始にはいくらかハードルがあります。これが我々がただ1つ実現可能な手段なのです。やってみましょう。実際そこまで難しいものではありません。"
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
+msgstr "<b>まとめ:</b>\n確かに、翻訳開始にはいくらかハードルがあります。これが我々がただ1つ実現可能な手段なのです。やってみましょう。実際そこまで難しいものではありません。"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
 msgid "More Information"
@@ -3320,9 +2718,7 @@ msgstr "詳細情報"
 msgid ""
 "The #i2p-dev channel on IRC, or the <a "
 "href=\"http://%(zzz)s/forums/14\">translation forum on %(zzz)s</a>."
-msgstr ""
-"IRC上の#i2p-devチャンネル、および<a href=\"http://%(zzz)s/forums/14\">%(zzz)s "
-"の翻訳フォーラム</a>"
+msgstr "IRC上の#i2p-devチャンネル、および<a href=\"http://%(zzz)s/forums/14\">%(zzz)s の翻訳フォーラム</a>"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:2
 msgid "How to Set up a Reseed Server"
@@ -3335,10 +2731,8 @@ msgstr "概観"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3347,21 +2741,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3384,8 +2774,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3395,18 +2784,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3416,10 +2800,8 @@ msgstr "プライバシーポリシー"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3428,17 +2810,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3447,10 +2827,8 @@ msgstr "始めましょう"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3461,18 +2839,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr ""
-
diff --git a/i2p2www/translations/ko/LC_MESSAGES/about.po b/i2p2www/translations/ko/LC_MESSAGES/about.po
index 94091fd12a2010bd567594bf7111c2b18c616d19..df26a844d7e5fbc0d16db1d1d900e67d621eb375 100644
--- a/i2p2www/translations/ko/LC_MESSAGES/about.po
+++ b/i2p2www/translations/ko/LC_MESSAGES/about.po
@@ -1,21 +1,22 @@
-# Korean translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: HelloKS <kqwe1859@gmail.com>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Korean (http://www.transifex.com/otf/I2P/language/ko/)\n"
-"Plural-Forms: nplurals=1; plural=0\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ko\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -25,8 +26,7 @@ msgstr ""
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
 msgstr ""
 
@@ -49,8 +49,7 @@ msgstr ""
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
 msgstr ""
 
 #: i2p2www/pages/site/about/browser-config.html:2
@@ -63,24 +62,158 @@ msgstr "용어 사전"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
 
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
+
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -90,15 +223,14 @@ msgstr ""
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -112,12 +244,8 @@ msgstr "보이지 않는 인터넷 프로젝트"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -127,13 +255,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -142,15 +270,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -159,28 +287,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -189,36 +316,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -227,13 +353,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -242,15 +368,11 @@ msgstr "비교"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -269,9 +391,8 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -328,8 +449,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -348,8 +468,7 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
 msgstr ""
 
@@ -358,8 +477,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:76
@@ -372,8 +490,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
@@ -382,8 +499,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:95
@@ -391,8 +508,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -407,15 +523,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -427,8 +541,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -483,16 +596,14 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
@@ -501,11 +612,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:189
@@ -558,16 +667,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
 msgstr ""
@@ -583,12 +690,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -602,35 +706,29 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -639,16 +737,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -665,11 +761,57 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -678,18 +820,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -700,84 +839,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -788,8 +904,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -797,27 +912,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -825,26 +936,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -855,10 +957,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -866,18 +966,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -888,10 +985,8 @@ msgstr ""
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
 msgstr ""
@@ -1063,7 +1158,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1303,7 +1399,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1353,32 +1450,25 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1396,8 +1486,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1436,10 +1526,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1453,15 +1541,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1470,11 +1554,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1529,8 +1610,7 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1548,15 +1628,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1575,14 +1651,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1593,20 +1665,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1617,24 +1682,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1654,33 +1710,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -1693,32 +1740,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -1728,27 +1767,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -1765,17 +1796,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -1788,8 +1816,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -1800,10 +1827,8 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -1822,30 +1847,23 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -1859,55 +1877,40 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -1918,20 +1921,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -1942,16 +1938,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -1961,17 +1952,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -1982,20 +1970,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2009,26 +1990,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2037,18 +2008,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2056,16 +2021,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2081,52 +2041,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2141,102 +2082,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2249,4 +2149,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/ko/LC_MESSAGES/blog.po b/i2p2www/translations/ko/LC_MESSAGES/blog.po
index 4162f045b3e415b02b456e9a1b4c62b002d97e3b..e11bbcb9211a39b74bb27dcea71e9f2adff00252 100644
--- a/i2p2www/translations/ko/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/ko/LC_MESSAGES/blog.po
@@ -1,21 +1,22 @@
-# Korean translations for I2P.
-# Copyright (C) 2019 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2019-12-04 15:24+0000\n"
-"PO-Revision-Date: 2019-11-24 14:31+0000\n"
-"Last-Translator: zzzi2p\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Korean (http://www.transifex.com/otf/I2P/language/ko/)\n"
-"Plural-Forms: nplurals=1; plural=0\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ko\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/blog/2011/10/11/0.8.9-Release.rst:24
 #: i2p2www/blog/2011/10/20/0.8.10-Release.rst:11
@@ -83,6 +84,13 @@ msgstr ""
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:30
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:29
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:35
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:28
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:40
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:33
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:33
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:45
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:35
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:34
 msgid "RELEASE DETAILS"
 msgstr ""
 
@@ -149,6 +157,13 @@ msgstr ""
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:46
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:39
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:48
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:41
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:52
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:49
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:51
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:64
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:51
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:43
 msgid "Bug Fixes"
 msgstr ""
 
@@ -205,6 +220,13 @@ msgstr ""
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:55
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:48
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:61
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:48
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:61
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:62
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:65
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:76
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:74
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:52
 msgid "Other"
 msgstr "그 외"
 
@@ -262,6 +284,13 @@ msgstr "그 외"
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:69
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:66
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:75
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:65
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:87
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:76
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:93
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:97
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:94
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:66
 msgid "SHA256 Checksums:"
 msgstr ""
 
@@ -292,11 +321,11 @@ msgstr ""
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:8
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:10
 msgid ""
-"0.9.2 includes extensive low-level changes to improve the performance and"
-" efficiency of the router. We have updated our UPnP library, to hopefully"
-" make UPnP work for more people. I2PSnark now has DHT support, but it is "
-"not yet enabled by default, as we plan to do more testing during the "
-"upcoming 0.9.3 development cycle."
+"0.9.2 includes extensive low-level changes to improve the performance and "
+"efficiency of the router. We have updated our UPnP library, to hopefully "
+"make UPnP work for more people. I2PSnark now has DHT support, but it is not "
+"yet enabled by default, as we plan to do more testing during the upcoming "
+"0.9.3 development cycle."
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:13
@@ -308,8 +337,8 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:27
 msgid ""
-"SSU: Fix several problems in our UDP transport, to improve efficiency and"
-" reliability for connection setup. Also improve defenses against various "
+"SSU: Fix several problems in our UDP transport, to improve efficiency and "
+"reliability for connection setup. Also improve defenses against various "
 "types of bad input."
 msgstr ""
 
@@ -327,9 +356,9 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:30
 msgid ""
-"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered "
-"are now much more flexible, which should lessen protocol overhead and "
-"reduce stalls caused by dropped tags."
+"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered are "
+"now much more flexible, which should lessen protocol overhead and reduce "
+"stalls caused by dropped tags."
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:31
@@ -340,16 +369,18 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:35
 msgid ""
-"Fix various issues affecting memory usage and performance on high-"
-"bandwidth routers"
+"Fix various issues affecting memory usage and performance on high-bandwidth "
+"routers"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:36
-msgid "Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
+msgid ""
+"Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:37
-msgid "Fix i2psnark bug that prevented a completion announcement to the tracker"
+msgid ""
+"Fix i2psnark bug that prevented a completion announcement to the tracker"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:38
@@ -436,14 +467,14 @@ msgstr ""
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:8
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:10
 msgid ""
-"0.9.3 includes extensive low-level changes to the queueing of messages in"
-" the router.  We implement the CoDel Active Queue Management (AQM) "
-"algorithm.  We also unify the queueing and priority mechanisms in the "
-"transports to aid diagnosis and reduce network latency.  Work continues "
-"on fixing UDP transport bugs and making UDP more resistant to attacks.  "
-"There are more changes to improve the performance of the router and "
-"reduce its memory usage.  Also, we enable i2psnark's DHT support, "
-"introduced last release, by default."
+"0.9.3 includes extensive low-level changes to the queueing of messages in "
+"the router.  We implement the CoDel Active Queue Management (AQM) algorithm."
+"  We also unify the queueing and priority mechanisms in the transports to "
+"aid diagnosis and reduce network latency.  Work continues on fixing UDP "
+"transport bugs and making UDP more resistant to attacks.  There are more "
+"changes to improve the performance of the router and reduce its memory "
+"usage.  Also, we enable i2psnark's DHT support, introduced last release, by "
+"default."
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:27
@@ -461,8 +492,8 @@ msgstr ""
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:33
 msgid ""
 "Several SSU fixes including memory leak, and better handling of routers "
-"behind firewalls that change UDP ports; additional defenses for malicious"
-" packets."
+"behind firewalls that change UDP ports; additional defenses for malicious "
+"packets."
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:34
@@ -487,9 +518,8 @@ msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:42
 msgid ""
-"Fix streaming connection timeout back to 1 minute, was inadvertently "
-"changed to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was"
-" unlimited"
+"Fix streaming connection timeout back to 1 minute, was inadvertently changed"
+" to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was unlimited"
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:43
@@ -545,28 +575,24 @@ msgstr ""
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:8
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:10
 msgid ""
-"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, "
-"that was reducing network performance and reliability. It also includes "
-"major changes in the in-network update system, and adds the capability to"
-" update via in-network torrents."
+"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, that "
+"was reducing network performance and reliability. It also includes major "
+"changes in the in-network update system, and adds the capability to update "
+"via in-network torrents."
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:14
 msgid ""
-"We fixed several bugs in the i2psnark DHT implementation that was "
-"introduced\n"
+"We fixed several bugs in the i2psnark DHT implementation that was introduced\n"
 "last release. For those of you using console or http proxy passwords,\n"
-"we converted to the more-secure digest method and improved the security "
-"for console forms."
+"we converted to the more-secure digest method and improved the security for console forms."
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:20
 msgid ""
-"For those of you already running development builds, your router should "
-"automatically\n"
+"For those of you already running development builds, your router should automatically\n"
 "update to 0.9.4-0 using the new in-network torrent facility.\n"
-"For those running 0.9.3-0, you will update normally using in-network "
-"HTTP, and\n"
+"For those running 0.9.3-0, you will update normally using in-network HTTP, and\n"
 "we will have more information for you when we release 0.9.5."
 msgstr ""
 
@@ -582,12 +608,13 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:42
 msgid ""
-"Fix major bug that reduced SSU connection limits which reduced tunnel "
-"build success rates"
+"Fix major bug that reduced SSU connection limits which reduced tunnel build "
+"success rates"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:43
-msgid "Fix bug with external I2CP that prevented some external apps from working"
+msgid ""
+"Fix bug with external I2CP that prevented some external apps from working"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:44
@@ -620,8 +647,7 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:54
 msgid ""
-"More performance improvements, memory reduction, and object churn "
-"reduction"
+"More performance improvements, memory reduction, and object churn reduction"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:55
@@ -638,15 +664,15 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:58
 msgid ""
-"Convert http proxy and console from basic to digest authentication for "
-"added security"
+"Convert http proxy and console from basic to digest authentication for added"
+" security"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:59
 msgid ""
 "Improved verification of console form submissions, using jsp sessions. "
-"Cookies may now be required on forms, except when the console password is"
-" enabled"
+"Cookies may now be required on forms, except when the console password is "
+"enabled"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:60
@@ -665,8 +691,8 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:63
 msgid ""
-"Translation updates: Chinese, French, German, Italian, Polish, "
-"Portuguese, Swedish, and Ukrainian"
+"Translation updates: Chinese, French, German, Italian, Polish, Portuguese, "
+"Swedish, and Ukrainian"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:65
@@ -684,24 +710,21 @@ msgstr ""
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:8
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:10
 msgid ""
-"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities"
-" that are being investigated by researchers at UCSB. We continue to work "
-"with them on additional improvements. This is a good opportunity to "
-"remind the community that while our network continues to grow rapidly, it"
-" is still relatively small. There may be multiple weaknesses or bugs that"
-" could compromise your anonymity. Help us grow the network by spreading "
-"the word and contributing where you can."
+"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities "
+"that are being investigated by researchers at UCSB. We continue to work with"
+" them on additional improvements. This is a good opportunity to remind the "
+"community that while our network continues to grow rapidly, it is still "
+"relatively small. There may be multiple weaknesses or bugs that could "
+"compromise your anonymity. Help us grow the network by spreading the word "
+"and contributing where you can."
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:14
 #, python-format
 msgid ""
-"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers "
-"running a\n"
-"development build) will attempt to update via the experimental in-network"
-" bittorrent\n"
-"with i2psnark. If this doesn't work, it should fall back to standard in-"
-"network HTTP update."
+"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers running a\n"
+"development build) will attempt to update via the experimental in-network bittorrent\n"
+"with i2psnark. If this doesn't work, it should fall back to standard in-network HTTP update."
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:28
@@ -746,8 +769,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:39
 msgid ""
-"Encrypt database lookup messages end-to-end when sent through exploratory"
-" tunnels"
+"Encrypt database lookup messages end-to-end when sent through exploratory "
+"tunnels"
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:40
@@ -792,8 +815,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53
 msgid ""
-"Translation updates: French, German, Hungarian, Italian, Norwegian, "
-"Polish, Portuguese, Russian, Swedish"
+"Translation updates: French, German, Hungarian, Italian, Norwegian, Polish, "
+"Portuguese, Russian, Swedish"
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:55
@@ -808,17 +831,15 @@ msgstr ""
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:10
 msgid ""
 "0.9.6 includes bug fixes and an update from Jetty 6.1.26 (2010-11-10) to "
-"Jetty 7.6.10 (2013-03-12). See below for important information on the "
-"Jetty update. The Jetty 7 series is actively maintained and we plan to "
-"stay current with it in future I2P releases."
+"Jetty 7.6.10 (2013-03-12). See below for important information on the Jetty "
+"update. The Jetty 7 series is actively maintained and we plan to stay "
+"current with it in future I2P releases."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:14
 msgid ""
-"Most users will update via HTTP. Those running development builds will "
-"attempt to update via the\n"
-"experimental in-network bittorrent with i2psnark. We've fixed some bugs "
-"that will enable more users\n"
+"Most users will update via HTTP. Those running development builds will attempt to update via the\n"
+"experimental in-network bittorrent with i2psnark. We've fixed some bugs that will enable more users\n"
 "to update via torrent in the 0.9.7 update cycle."
 msgstr ""
 
@@ -828,12 +849,9 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:28
 msgid ""
-"If you first installed I2P with version 0.9.5, on Windows only, we "
-"recommend that you follow the\n"
-"following instructions to fix your eepsite location **before** you update"
-" to 0.9.6.\n"
-"Only original installations of 0.9.5-0 on Windows are affected by this "
-"issue. If your router version\n"
+"If you first installed I2P with version 0.9.5, on Windows only, we recommend that you follow the\n"
+"following instructions to fix your eepsite location **before** you update to 0.9.6.\n"
+"Only original installations of 0.9.5-0 on Windows are affected by this issue. If your router version\n"
 "is 0.9.5-0-win1, you already have the fix and need not take any action."
 msgstr ""
 
@@ -847,36 +865,29 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:43
 msgid ""
-"For most people, the update should just work. If you have multiple Jetty "
-"eepsites,\n"
-"OR have made changes to jetty.xml or other Jetty configuration files, "
-"including changing the port\n"
+"For most people, the update should just work. If you have multiple Jetty eepsites,\n"
+"OR have made changes to jetty.xml or other Jetty configuration files, including changing the port\n"
 "from 7658, you MUST take manual action AFTER updating."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:49
 msgid ""
-"After update, the router will migrate your jetty.xml files to the new "
-"Jetty 7 format."
+"After update, the router will migrate your jetty.xml files to the new Jetty "
+"7 format."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:51
 msgid ""
-"The migration resets the port to 7658. If you have more than one Jetty "
-"eepsite, OR your eepsite\n"
-"  is NOT on port 7658, OR you have made other modifications to jetty.xml "
-"(for example changing the\n"
-"  listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml "
-"file for each eepsite to fix them up\n"
+"The migration resets the port to 7658. If you have more than one Jetty eepsite, OR your eepsite\n"
+"  is NOT on port 7658, OR you have made other modifications to jetty.xml (for example changing the\n"
+"  listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml file for each eepsite to fix them up\n"
 "  after updating, and restart again."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:56
 msgid ""
-"**The following files will be backed up with a &quot;.jetty6&quot; suffix"
-" and then migrated.**\n"
-"If you have made local changes, you may have to edit them manually and "
-"restart.\n"
+"**The following files will be backed up with a &quot;.jetty6&quot; suffix and then migrated.**\n"
+"If you have made local changes, you may have to edit them manually and restart.\n"
 "See http://wiki.eclipse.org/Jetty for assistance in configuring Jetty 7."
 msgstr ""
 
@@ -895,7 +906,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:78
-msgid "If a plugin does not work, please contact the maintainer for that plugin."
+msgid ""
+"If a plugin does not work, please contact the maintainer for that plugin."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:84
@@ -924,14 +936,14 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:90
 msgid ""
-"Ignore unsupported IPs in RouterInfos when selecting an address (prep for"
-" IPv6)"
+"Ignore unsupported IPs in RouterInfos when selecting an address (prep for "
+"IPv6)"
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:91
 msgid ""
-"Ignore unused option bits in Database Lookup Message (prep for requesting"
-" encrypted response)"
+"Ignore unused option bits in Database Lookup Message (prep for requesting "
+"encrypted response)"
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:92
@@ -1001,31 +1013,24 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:12
 msgid ""
-"For the first time, class 'N' routers (those with a minimumum of 128 "
-"KBytes/sec of shared bandwidth)\n"
-"will automatically become floodfill (previously it was only 'O' routers "
-"with 256 KBps). This will\n"
-"increase the floodfill population for additional resistance to certain "
-"attacks (see below). Floodfill routers\n"
-"don't consume much additional bandwidth, but they do tend to use "
-"additional memory and concurrent\n"
-"connections. If you do not wish your router to become floodfill, set the "
-"advanced configuration\n"
+"For the first time, class 'N' routers (those with a minimumum of 128 KBytes/sec of shared bandwidth)\n"
+"will automatically become floodfill (previously it was only 'O' routers with 256 KBps). This will\n"
+"increase the floodfill population for additional resistance to certain attacks (see below). Floodfill routers\n"
+"don't consume much additional bandwidth, but they do tend to use additional memory and concurrent\n"
+"connections. If you do not wish your router to become floodfill, set the advanced configuration\n"
 "router.floodfillParticipant=false ."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:21
 #, python-format
 msgid ""
-"As we think the last release fixed the experimental update-via-torrent "
-"bugs, 3%(pc)s of routers should\n"
+"As we think the last release fixed the experimental update-via-torrent bugs, 3%(pc)s of routers should\n"
 "update over in-network bittorrent this cycle."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:26
 msgid ""
-"Plugin update checks, possibly broken for several releases, are fixed. "
-"Your plugins should once again\n"
+"Plugin update checks, possibly broken for several releases, are fixed. Your plugins should once again\n"
 "auto-update after updating the router."
 msgstr ""
 
@@ -1037,17 +1042,12 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:35
 msgid ""
-"This release contains additional mitigations for the `\"practical "
-"attacks\" paper`__.\n"
-"However, we have a lot more work to do to resist Sybil attacks on the "
-"floodfills, and resist\n"
+"This release contains additional mitigations for the `\"practical attacks\" paper`__.\n"
+"However, we have a lot more work to do to resist Sybil attacks on the floodfills, and resist\n"
 "traffic analysis at the gateways and endpoints of exploratory tunnels.\n"
-"It's a good reminder for everybody that our network is still relatively "
-"small and vulnerable.\n"
-"We don't currently recommend any uses that would put anybody in serious "
-"jeopardy.\n"
-"We'll keep working to improve it... please keep working to spread the "
-"word. A bigger network is a better network."
+"It's a good reminder for everybody that our network is still relatively small and vulnerable.\n"
+"We don't currently recommend any uses that would put anybody in serious jeopardy.\n"
+"We'll keep working to improve it... please keep working to spread the word. A bigger network is a better network."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:48
@@ -1092,8 +1092,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:60
 msgid ""
-"Fix i2psnark bug that changed the infohash of torrents created by Robert "
-"and fetched via magnet link"
+"Fix i2psnark bug that changed the infohash of torrents created by Robert and"
+" fetched via magnet link"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:61
@@ -1128,8 +1128,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:71
 msgid ""
-"Individual expiration times in leases, for efficiency on destinations "
-"with a high number of tunnels"
+"Individual expiration times in leases, for efficiency on destinations with a"
+" high number of tunnels"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:72
@@ -1145,7 +1145,8 @@ msgid "Tomcat 6.0.37"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:75
-msgid "Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
+msgid ""
+"Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:76
@@ -1163,12 +1164,11 @@ msgstr ""
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:8
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:10
 msgid ""
-"This unscheduled release disables the RouterInfo verification messages "
-"that were used in the attack published in the UCSB paper, which should "
-"make correlating a LeaseSet and a Router much more difficult. We have "
-"also included a limited number of other fixes listed below. Our 0.9.8 "
-"release, which will include IPv6 support, is still on-schedule for late "
-"September."
+"This unscheduled release disables the RouterInfo verification messages that "
+"were used in the attack published in the UCSB paper, which should make "
+"correlating a LeaseSet and a Router much more difficult. We have also "
+"included a limited number of other fixes listed below. Our 0.9.8 release, "
+"which will include IPv6 support, is still on-schedule for late September."
 msgstr ""
 
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:12
@@ -1218,16 +1218,17 @@ msgstr ""
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:8
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:10
 msgid ""
-"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
-"default, but of course you need a public IPv6 address to use it. "
-"Configuration is on the 'network' configuration tab in your console. We "
-"also have anonymity improvements including padding of SSU packets and "
-"longer router private keys."
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by default, "
+"but of course you need a public IPv6 address to use it. Configuration is on "
+"the 'network' configuration tab in your console. We also have anonymity "
+"improvements including padding of SSU packets and longer router private "
+"keys."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:12
 #, python-format
-msgid "30%(pc)s of you will update via in-network torrent in this update cycle."
+msgid ""
+"30%(pc)s of you will update via in-network torrent in this update cycle."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:14
@@ -1236,41 +1237,30 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:16
 msgid ""
-"IPv6 is enabled and preferred by default. If you have a public IPv6 "
-"address \n"
-"and you are connecting to another router with a published IPv6 address, "
-"it will \n"
-"connect via IPv6. There is a new IPv6 configuration section on /confignet"
-" in \n"
+"IPv6 is enabled and preferred by default. If you have a public IPv6 address \n"
+"and you are connecting to another router with a published IPv6 address, it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet in \n"
 "the router console. If IPv6 is causing problems you may disable it there."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:23
 msgid ""
 "As a part of the IPv6 development effort, I2P now supports multiple \n"
-"published IP addresses. If you have multiple public IP addresses (IPv4, "
-"IPv6, \n"
-"or both), you may enable or disable them individually on /confignet. The"
-" \n"
-"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
-"have \n"
-"multiple addresses you should review the configuration on /confignet and "
-"adjust \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you have \n"
+"multiple addresses you should review the configuration on /confignet and adjust \n"
 "it if necessary.\n"
-"Note that while you may enable multiple IPv4 and IPv6 addresses on "
-"/confignet,\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on /confignet,\n"
 "we recommend that you use only one IPv4 and one IPv6 address. There are\n"
 "bugs still to be fixed with multiple addresses of each type."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:35
 msgid ""
-"While IPv6 support was designed and developed over several years, it has"
-" \n"
-"only been tested by a limited number of users and is still beta. If you "
-"do have \n"
-"a public IPv6 address, please monitor your router and the logs for "
-"problems, \n"
+"While IPv6 support was designed and developed over several years, it has \n"
+"only been tested by a limited number of users and is still beta. If you do have \n"
+"a public IPv6 address, please monitor your router and the logs for problems, \n"
 "and disable it necessary. Please report any bugs on \n"
 "http://trac.i2p2.i2p."
 msgstr ""
@@ -1281,26 +1271,19 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:45
 msgid ""
-"For those of you running I2P on faster hardware (generally, 64-bit x86) "
-"the \n"
-"router will generate a new identity using longer keys. This will "
-"substantially \n"
-"reduce your participating traffic for 48 hours or more, while your router"
-" \n"
-"re-integrates into the network. Due to the new keys, the large number of"
-" \n"
+"For those of you running I2P on faster hardware (generally, 64-bit x86) the \n"
+"router will generate a new identity using longer keys. This will substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router \n"
+"re-integrates into the network. Due to the new keys, the large number of \n"
 "torrent updates, and the recent network growth, we expect substantial \n"
-"disruption to the network for a week or more after the update is "
-"released. \n"
+"disruption to the network for a week or more after the update is released. \n"
 "Please be patient and things should start to improve after a few days."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:55
 msgid ""
-"These changes may result in higher CPU usage for some of you. We're doing"
-" \n"
-"our best to increase efficiency, but stronger security generally requires"
-" more \n"
+"These changes may result in higher CPU usage for some of you. We're doing \n"
+"our best to increase efficiency, but stronger security generally requires more \n"
 "computation. Performance may also be poor during the first week\n"
 "due to the network churn.\n"
 "We will evaluate the network performace before deciding whether to\n"
@@ -1309,10 +1292,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:64
 msgid ""
-"We are experiencing rapid network growth in the last few weeks, which is"
-" \n"
-"causing a bit of a bumpy ride for some, especially on weekends. However, "
-"the \n"
+"We are experiencing rapid network growth in the last few weeks, which is \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, the \n"
 "network is still performing fairly well, so keep spreading the word."
 msgstr ""
 
@@ -1324,14 +1305,10 @@ msgstr ""
 msgid ""
 "We're in the initial stages of desiging major changes to strengthen our \n"
 "crypto. Stronger crypto will use more CPU and it may possibly \n"
-"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
-"on low-power \n"
-"and/or older hardware. We're working hard to minimize the impacts, but "
-"some \n"
-"loss of performance is inevitable. In addition, Java 5 and 6 are no "
-"longer \n"
-"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
-"in \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change in \n"
 "minimum requirements will be announced well in advance."
 msgstr ""
 
@@ -1358,8 +1335,7 @@ msgid ""
 "Last weekend, echelon attended the CTS IV conference in Berlin and\n"
 "psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
 "Several of us will be at 30C3 in Hamburg late this year.\n"
-"It's great to see people participating at these events and representing "
-"I2P."
+"It's great to see people participating at these events and representing I2P."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:106
@@ -1387,7 +1363,8 @@ msgid "Fix occasional runtime exception in NTCP"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
-msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
+msgid ""
+"Big rework of transport code to accommodate multiple addresses and IPv6"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
@@ -1395,13 +1372,14 @@ msgid "Streaming: Improved recovery from lost acks, other fixes"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
-msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgid ""
+"Use Transifex for translation of initial news and HTTP proxy error pages"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
 msgid ""
-"Translation updates: Chinese, French, German, Portuguese, Russian, "
-"Swedish, Turkish"
+"Translation updates: Chinese, French, German, Portuguese, Russian, Swedish, "
+"Turkish"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:125
@@ -1419,9 +1397,9 @@ msgstr ""
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:7
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:9
 msgid ""
-"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some "
-"people. New installs and non-Windows platforms are not affected, however "
-"all platforms will automatically update even if running 0.9.8."
+"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some people. "
+"New installs and non-Windows platforms are not affected, however all "
+"platforms will automatically update even if running 0.9.8."
 msgstr ""
 
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:11
@@ -1432,10 +1410,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:20
 msgid ""
-"Due to recent attacks, logins are disabled on `Trac`_ and new "
-"registrations are\n"
-"disabled on `zzz.i2p`_. Until those services are restored, please report "
-"all\n"
+"Due to recent attacks, logins are disabled on `Trac`_ and new registrations are\n"
+"disabled on `zzz.i2p`_. Until those services are restored, please report all\n"
 "bugs on IRC freenode or IRC2P #i2p-dev."
 msgstr ""
 
@@ -1448,9 +1424,9 @@ msgstr ""
 msgid ""
 "0.9.9 fixes a number of bugs in the netdb, streaming, and i2ptunnel, and "
 "starts work on a year-long plan to increase the strength of the "
-"cryptographic signing algorithms used in the router, and support multiple"
-" algorithms and key lengths simultaneously. Automatic update files will "
-"now be signed with 4096-bit RSA keys."
+"cryptographic signing algorithms used in the router, and support multiple "
+"algorithms and key lengths simultaneously. Automatic update files will now "
+"be signed with 4096-bit RSA keys."
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:11
@@ -1462,8 +1438,7 @@ msgstr ""
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:18
 msgid ""
 "As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the "
-"latest release.\n"
+"The best way to maintain security and help the network is to run the latest release.\n"
 "Several members of the I2P team will be at 30C3 in Hamburg this year.\n"
 "Come say hello and ask for an I2P sticker.\n"
 "Thanks to everyone for their support this year."
@@ -1579,8 +1554,7 @@ msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:62
 msgid ""
-"Extend router info expiration and other changes to reduce load on "
-"floodfills"
+"Extend router info expiration and other changes to reduce load on floodfills"
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:63
@@ -1617,8 +1591,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:71
 msgid ""
-"Translation updates: French, German, Italian, Romanian, Russian, Spanish,"
-" Swedish, and others"
+"Translation updates: French, German, Italian, Romanian, Russian, Spanish, "
+"Swedish, and others"
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:73
@@ -1657,19 +1631,15 @@ msgstr ""
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:26
 msgid ""
 "If you have a large database or an identity you wish to preserve,\n"
-"you may wish to back up your entire ~/.syndie directory before you start."
-"\n"
-"The upgrade process does make its own backup, however you may find it "
-"easier to use your own backup if the upgrade fails."
+"you may wish to back up your entire ~/.syndie directory before you start.\n"
+"The upgrade process does make its own backup, however you may find it easier to use your own backup if the upgrade fails."
 msgstr ""
 
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:32
 msgid ""
-"Upgrades from 1.103b may fail for some people due to database corruption "
-"due to bugs in the old HSQLDB.\n"
+"Upgrades from 1.103b may fail for some people due to database corruption due to bugs in the old HSQLDB.\n"
 "Unfortunately, we don't know how to fix it.\n"
-"Your alternatives are to start over with a clean database, or stay with "
-"1.103b forever.\n"
+"Your alternatives are to start over with a clean database, or stay with 1.103b forever.\n"
 "Sorry about that."
 msgstr ""
 
@@ -1677,8 +1647,7 @@ msgstr ""
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:30
 msgid ""
 "As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the "
-"latest release."
+"The best way to maintain security and help the network is to run the latest release."
 msgstr ""
 
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:57
@@ -1733,6 +1702,13 @@ msgstr ""
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:60
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:57
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:66
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:55
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:78
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:67
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:83
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:87
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:84
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:58
 msgid "Translation updates"
 msgstr ""
 
@@ -1751,19 +1727,15 @@ msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:12
 msgid ""
-"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more "
-"difficult for an attacker\n"
-"to correlate a Destination with a Router. It also fixes character "
-"encoding bugs in susimail,\n"
+"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more difficult for an attacker\n"
+"to correlate a Destination with a Router. It also fixes character encoding bugs in susimail,\n"
 "and includes lots of other bug fixes and translation updates.\n"
-"Most of you will update via torrent, using the new \"su3\" update format "
-"with stronger keys."
+"Most of you will update via torrent, using the new \"su3\" update format with stronger keys."
 msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:19
 msgid ""
-"We recently attended `30C3`__ and `Real World Crypto`__, making several "
-"new\n"
+"We recently attended `30C3`__ and `Real World Crypto`__, making several new\n"
 "connections and formulating `big plans`__ for 2014. Thanks to those who\n"
 "supported our attendance with their `donations`__!"
 msgstr ""
@@ -1774,8 +1746,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:43
 msgid ""
-"Flood netdb stores to new location before midnight to prevent lookup "
-"fails after midnight"
+"Flood netdb stores to new location before midnight to prevent lookup fails "
+"after midnight"
 msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:44
@@ -1852,24 +1824,19 @@ msgstr ""
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:12
 #, python-format
 msgid ""
-"0.9.11 continues improving LeaseSet lookup and storage to prevent an "
-"attacker\n"
+"0.9.11 continues improving LeaseSet lookup and storage to prevent an attacker\n"
 "from correlating a Destination with a Router. It adds support for the\n"
 "%(orchid)s outproxy plugin which is available at %(url)s. There is a\n"
-"reduction in memory usage due to fixes in the transports. We have some "
-"I2CP\n"
+"reduction in memory usage due to fixes in the transports. We have some I2CP\n"
 "protocol improvements that will provide better lookup facilities and\n"
-"authorization protection for external clients. Of course, there's also "
-"the\n"
+"authorization protection for external clients. Of course, there's also the\n"
 "usual collection of bug fixes. All users should update."
 msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:22
 msgid ""
-"This may be the last release that works with Java 5, which is very old "
-"and\n"
-"unsupported. If you are using a Java 5 or 6 runtime, we strongly "
-"recommend that\n"
+"This may be the last release that works with Java 5, which is very old and\n"
+"unsupported. If you are using a Java 5 or 6 runtime, we strongly recommend that\n"
 "you upgrade to Java 7."
 msgstr ""
 
@@ -1906,12 +1873,17 @@ msgstr ""
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:24
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:23
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:29
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:22
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:34
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:27
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:27
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:39
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:29
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:28
 msgid ""
 "As usual, we recommend that you update to this release. The best way to\n"
 "maintain security and help the network is to run the latest release."
-msgstr ""
-"평소와 같이, 이 릴리즈로 업데이트하는 것을 권장합니다. 보안을 유지하고\n"
-"네트워크를 돕기 위한 가장 좋은 것은 최신 릴리즈를 사용하는 것입니다."
+msgstr "평소와 같이, 이 릴리즈로 업데이트하는 것을 권장합니다. 보안을 유지하고\n네트워크를 돕기 위한 가장 좋은 것은 최신 릴리즈를 사용하는 것입니다."
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:40
 msgid "More leaseset handling improvements"
@@ -1943,8 +1915,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:53
 msgid ""
-"Stricter I2CP authorization enforcement of external clients (incompatible"
-" change)"
+"Stricter I2CP authorization enforcement of external clients (incompatible "
+"change)"
 msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:54
@@ -1968,23 +1940,21 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:9
 msgid ""
-"The site i2pbrowser.net is a fake I2P website mirror serving up malware "
-"for Windows."
+"The site i2pbrowser.net is a fake I2P website mirror serving up malware for "
+"Windows."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:11
 msgid ""
-"We have recently been made aware of the existence of i2pbrowser.net. This"
-"\n"
-"website copies our homepage and download page, and attempts to trick "
-"users into\n"
+"We have recently been made aware of the existence of i2pbrowser.net. This\n"
+"website copies our homepage and download page, and attempts to trick users into\n"
 "downloading Windows malware."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:17
 msgid ""
-"There are several indicators that point to i2pbrowser.net being a malware"
-" site:"
+"There are several indicators that point to i2pbrowser.net being a malware "
+"site:"
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21
@@ -1993,29 +1963,26 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22
 msgid ""
-"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to "
-"the same .exe file."
+"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to the "
+"same .exe file."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:23
-msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
+msgid ""
+"The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:25
 msgid ""
-"We have not examined the malware ourselves, but it does not appear to be "
-"very\n"
-"sophisticated; it is not integrated into or bundled with the I2P "
-"software.\n"
-"Information security expert `Lance James`__ posted `a tweet`__ labelling "
-"it as\n"
+"We have not examined the malware ourselves, but it does not appear to be very\n"
+"sophisticated; it is not integrated into or bundled with the I2P software.\n"
+"Information security expert `Lance James`__ posted `a tweet`__ labelling it as\n"
 "\"a standard dark comet rat\"."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:35
 msgid ""
-"Spread the word. The only official download locations for I2P are linked "
-"on our\n"
+"Spread the word. The only official download locations for I2P are linked on our\n"
 "`download page`__. All I2P download packages are GPG-signed by the\n"
 "`release signing key`__."
 msgstr ""
@@ -2036,31 +2003,21 @@ msgstr ""
 #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:12
 msgid ""
 "**Somewhere, NH** -- Internet search company `DuckDuckGo`__ `donates`__\n"
-"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly"
-" open-source\n"
-"donation program. The award was granted on the basis of `nominations`__ "
-"by members of the public\n"
-"on the DuckDuckGo community portal. With an emphasis on privacy, "
-"DuckDuckGo provides a search\n"
-"engine which does not track its users or store personal data. I2P is an "
-"anonymous network intended to\n"
-"protect individuals from dragnet surveillance regularly performed by ISPs"
-" and governments."
+"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly open-source\n"
+"donation program. The award was granted on the basis of `nominations`__ by members of the public\n"
+"on the DuckDuckGo community portal. With an emphasis on privacy, DuckDuckGo provides a search\n"
+"engine which does not track its users or store personal data. I2P is an anonymous network intended to\n"
+"protect individuals from dragnet surveillance regularly performed by ISPs and governments."
 msgstr ""
 
 #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:26
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:46
 msgid ""
-"This marks the single largest donation ever received by I2P and reflects "
-"a growing interest in\n"
-"privacy and security by the Internet community. The funding will help I2P"
-" to reach more users, expand\n"
-"development, and audit the code. It will also enable I2P developers to "
-"attend conferences, such\n"
-"as the `Real-World Cryptography`__ conference in New York City, where the"
-" developers met and\n"
-"collaborated with cryptography experts pursuant to I2P's goals of "
-"providing anonymity to the\n"
+"This marks the single largest donation ever received by I2P and reflects a growing interest in\n"
+"privacy and security by the Internet community. The funding will help I2P to reach more users, expand\n"
+"development, and audit the code. It will also enable I2P developers to attend conferences, such\n"
+"as the `Real-World Cryptography`__ conference in New York City, where the developers met and\n"
+"collaborated with cryptography experts pursuant to I2P's goals of providing anonymity to the\n"
 "public."
 msgstr ""
 
@@ -2091,34 +2048,28 @@ msgstr ""
 msgid ""
 "I2P now requires Java 6 or higher.\n"
 "We strongly recommend that you upgrade to Java 7.\n"
-"If you are still using Java 5, you must upgrade your Java before "
-"installing I2P 0.9.12."
+"If you are still using Java 5, you must upgrade your Java before installing I2P 0.9.12."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:19
 msgid ""
 "0.9.12 adds preliminary support for ECDSA-signed Destinations.\n"
-"It contains several fixes for the handling of Delivery Status Messages "
-"(acknowledgements)\n"
+"It contains several fixes for the handling of Delivery Status Messages (acknowledgements)\n"
 "and those messages are now end-to-end encrypted for increased security."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:24
 msgid ""
 "We have upgraded to Jetty 8.\n"
-"Jetty 8 is almost identical to Jetty 7, so there are no complex "
-"configuration file conversions as there have been in past Jetty upgrades."
-"\n"
+"Jetty 8 is almost identical to Jetty 7, so there are no complex configuration file conversions as there have been in past Jetty upgrades.\n"
 "No manual changes should be necessary."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:35
 msgid ""
 "In early March, Internet search company `DuckDuckGo`__ `donated`__\n"
-"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly "
-"open-source\n"
-"donation program. The award was granted on the basis of `nominations`__ "
-"by members of the public\n"
+"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly open-source\n"
+"donation program. The award was granted on the basis of `nominations`__ by members of the public\n"
 "on the DuckDuckGo community portal."
 msgstr ""
 
@@ -2173,7 +2124,8 @@ msgid "Jetty 8.1.14.v20131031; Java 6 now required"
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:88
-msgid "Reduce target connection count again to reduce tunnel reject rate further"
+msgid ""
+"Reduce target connection count again to reduce tunnel reject rate further"
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:89
@@ -2221,10 +2173,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:13
 msgid ""
-"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, "
-"and a big SusiMail update.\n"
-"Of course, there's also the usual collection of bug fixes and translation"
-" updates."
+"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, and a big SusiMail update.\n"
+"Of course, there's also the usual collection of bug fixes and translation updates."
 msgstr ""
 
 #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:23
@@ -2322,30 +2272,24 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:13
 msgid ""
-"0.9.14 includes critical fixes for XSS and remote execution "
-"vulnerabilities reported by Exodus Intelligence.\n"
-"As an added precaution, we have disabled several advanced configuration "
-"features in the router console,\n"
+"0.9.14 includes critical fixes for XSS and remote execution vulnerabilities reported by Exodus Intelligence.\n"
+"As an added precaution, we have disabled several advanced configuration features in the router console,\n"
 "including installation of new plugins.\n"
 "We plan to re-enable these in a future release after additional review."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:20
 msgid ""
-"Due to I2P library changes, I2P-Bote users must upgrade their plugin to "
-"version 0.2.10 to work with I2P 0.9.14.\n"
-"Your router should update the plugin automatically after the router "
-"restarts."
+"Due to I2P library changes, I2P-Bote users must upgrade their plugin to version 0.2.10 to work with I2P 0.9.14.\n"
+"Your router should update the plugin automatically after the router restarts."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:25
 msgid ""
-"The release also contains several bug fixes in i2ptunnel, i2psnark, and "
-"other areas,\n"
+"The release also contains several bug fixes in i2ptunnel, i2psnark, and other areas,\n"
 "and updates to the latest Jetty, Tomcat, and Wrapper.\n"
 "We've also implemented a faster and more secure method for reseeding.\n"
-"Of course, there's also the usual collection of minor bug fixes and "
-"translation updates."
+"Of course, there's also the usual collection of minor bug fixes and translation updates."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:32
@@ -2396,14 +2340,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:55
 msgid ""
-"Several i2psnark improvements and fixes (GUI and DHT), including changes "
-"for better compatibility with Vuze"
+"Several i2psnark improvements and fixes (GUI and DHT), including changes for"
+" better compatibility with Vuze"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:60
 msgid ""
-"Reseeding now fetches a signed zip file containing router infos for "
-"security and speed"
+"Reseeding now fetches a signed zip file containing router infos for security"
+" and speed"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:61
@@ -2416,8 +2360,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:63
 msgid ""
-"Per-message reliabilitiy settings in I2CP and error propagation back from"
-" router to client"
+"Per-message reliabilitiy settings in I2CP and error propagation back from "
+"router to client"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:64
@@ -2449,33 +2393,23 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:13
 msgid ""
-"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some"
-" other web forms.\n"
-"We've restored the ability to install plugins via the console, but you "
-"must first edit your router.config file\n"
-"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the "
-"line routerconsole.enablePluginInstall=true.\n"
-"Other rarely-used advanced features that were removed in 0.9.14 may be "
-"restored by adding the line routerconsole.advanced=true."
+"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some other web forms.\n"
+"We've restored the ability to install plugins via the console, but you must first edit your router.config file\n"
+"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the line routerconsole.enablePluginInstall=true.\n"
+"Other rarely-used advanced features that were removed in 0.9.14 may be restored by adding the line routerconsole.advanced=true."
 msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:20
 msgid ""
-"As usual, if configured with the default \"Download and Verify\", the "
-"router will automatically download the update and display a button to "
-"restart.\n"
-"However, due to a bug in 0.9.14, if your update is configured for "
-"\"Notify only\", the download button will not be displayed.\n"
-"You must change your configuration to \"Download and Verify\" or "
-"\"Download, Verify, and Restart\" to update."
+"As usual, if configured with the default \"Download and Verify\", the router will automatically download the update and display a button to restart.\n"
+"However, due to a bug in 0.9.14, if your update is configured for \"Notify only\", the download button will not be displayed.\n"
+"You must change your configuration to \"Download and Verify\" or \"Download, Verify, and Restart\" to update."
 msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:26
 msgid ""
-"If you are still running 0.9.13 or older, we recommend that you update to"
-" this release as soon as possible.\n"
-"If you don't often check your router console, please consider changing "
-"your configuration to \"Download, Verify, and Restart\"\n"
+"If you are still running 0.9.13 or older, we recommend that you update to this release as soon as possible.\n"
+"If you don't often check your router console, please consider changing your configuration to \"Download, Verify, and Restart\"\n"
 "to ensure you are always running the latest release."
 msgstr ""
 
@@ -2529,10 +2463,7 @@ msgstr ""
 msgid ""
 "Hello all!\n"
 "\n"
-"Today we announce the Privacy Solutions project, a new organization that "
-"develops and maintains I2P software. Privacy Solutions includes several "
-"new development efforts designed to enhance the privacy, security, and "
-"anonymity for users, based on I2P protocols and technology.\n"
+"Today we announce the Privacy Solutions project, a new organization that develops and maintains I2P software. Privacy Solutions includes several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.\n"
 "\n"
 "These efforts include\n"
 "\n"
@@ -2542,40 +2473,23 @@ msgid ""
 "4) The Anoncoin crypto-coin project.\n"
 "5) The Monero crypto-coin project.\n"
 "\n"
-"Privacy Solutions' initial funding was provided by the supporters of the "
-"Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-"
-"profit type of organization registered within the Norwegian government "
-"registers. ( Kind of like US 501(c)3. )\n"
+"Privacy Solutions' initial funding was provided by the supporters of the Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-profit type of organization registered within the Norwegian government registers. ( Kind of like US 501(c)3. )\n"
 "\n"
-"Privacy Solutions plans to apply for funding from the Norwegian goverment"
-" for network research, because of BigBrother (We'll get back to what that"
-" is) and the coins that are planned to use low-latency networks as "
-"primary transport layer. Our research will support advances in software "
-"technology for anonymity, security, and privacy.\n"
+"Privacy Solutions plans to apply for funding from the Norwegian goverment for network research, because of BigBrother (We'll get back to what that is) and the coins that are planned to use low-latency networks as primary transport layer. Our research will support advances in software technology for anonymity, security, and privacy.\n"
 "\n"
 "\n"
-"First a little bit about the Abscond Browser Bundle. This was first a "
-"one-man project by Meeh, but later on friends started sending patches, "
-"the project is now trying to create the same easy access to I2P as Tor "
-"has with their browser bundle. Our first release isn't far away, it's "
-"just some gitian script tasks left, including setup of the Apple "
-"toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C"
-" struct keeping vital proces information about an process) from the Java "
-"instance to check on I2P before we declare it stable. I2pd will also "
-"switch with the Java version once it's ready, and there is no point in "
-"shipping a JRE in the bundle anymore. You can read more about the Abscond"
-" Browser Bundle at https://hideme.today/dev"
+"First a little bit about the Abscond Browser Bundle. This was first a one-man project by Meeh, but later on friends started sending patches, the project is now trying to create the same easy access to I2P as Tor has with their browser bundle. Our first release isn't far away, it's just some gitian script tasks left, including setup of the Apple toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C struct keeping vital proces information about an process) from the Java instance to check on I2P before we declare it stable. I2pd will also switch with the Java version once it's ready, and there is no point in shipping a JRE in the bundle anymore. You can read more about the Abscond Browser Bundle at https://hideme.today/dev"
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:35
 msgid ""
-"We would also like to inform of the current status of i2pd. I2pd supports"
-" bi-directional streaming now, that allows to use not only HTTP but long-"
-"lived communication channels. Instant IRC support has been added. I2pd "
-"users are able to use it same way as Java I2P for access to I2P IRC "
-"network. I2PTunnel is one of key features of I2P network, allowing non-"
-"I2P applications communicate transparently. That's why it's vital feature"
-" for i2pd and one of key milestones."
+"We would also like to inform of the current status of i2pd. I2pd supports "
+"bi-directional streaming now, that allows to use not only HTTP but long-"
+"lived communication channels. Instant IRC support has been added. I2pd users"
+" are able to use it same way as Java I2P for access to I2P IRC network. "
+"I2PTunnel is one of key features of I2P network, allowing non-I2P "
+"applications communicate transparently. That's why it's vital feature for "
+"i2pd and one of key milestones."
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:39
@@ -2584,18 +2498,17 @@ msgid ""
 "Bigbrother.i2p, which is a metrics system Meeh made over a year back. "
 "Recently we noticed that Meeh actually have 100Gb of non-duplicated data "
 "from nodes reporting in since initial launch. This will also be moved to "
-"Privacy Solutions and be rewritten with a NSPOF backend. With this we "
-"will aslo start using the Graphite ( http://graphite.wikidot.com/screen-"
-"shots ). This will give us a great overview over the network without "
-"privacy issues for our end users. The clients filter all data except "
-"country, router hash and success rate on tunnel buildings. The name of "
-"this service is as always a little joke from Meeh."
+"Privacy Solutions and be rewritten with a NSPOF backend. With this we will "
+"aslo start using the Graphite ( http://graphite.wikidot.com/screen-shots ). "
+"This will give us a great overview over the network without privacy issues "
+"for our end users. The clients filter all data except country, router hash "
+"and success rate on tunnel buildings. The name of this service is as always "
+"a little joke from Meeh."
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:46
 msgid ""
-"We have shorted down a bit of the news here, if you're interested in more"
-" information please visit https://blog.privacysolutions.no/\n"
+"We have shorted down a bit of the news here, if you're interested in more information please visit https://blog.privacysolutions.no/\n"
 "We're still under construction and more content will come!\n"
 "\n"
 "\n"
@@ -2619,67 +2532,50 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:11
 msgid ""
-"I2P Android and Bote have been released on Google Play in Norway, as a "
-"test run for a future worldwide release."
+"I2P Android and Bote have been released on Google Play in Norway, as a test "
+"run for a future worldwide release."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:13
 msgid ""
-"I2P Android has existed for over three years. In that time, it has "
-"evolved from\n"
-"a simple test project into a usable, useful Android port of the I2P "
-"router. Our\n"
-"eventual goal has been to release I2P Android on Google Play, to make it "
-"easier\n"
-"for users to discover, install and use I2P on their Android devices. "
-"After much\n"
-"work improving the user interface, fixing bugs and testing, we think that"
-" I2P\n"
+"I2P Android has existed for over three years. In that time, it has evolved from\n"
+"a simple test project into a usable, useful Android port of the I2P router. Our\n"
+"eventual goal has been to release I2P Android on Google Play, to make it easier\n"
+"for users to discover, install and use I2P on their Android devices. After much\n"
+"work improving the user interface, fixing bugs and testing, we think that I2P\n"
 "Android is finally ready to go where the users are."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:22
 msgid ""
-"Initially, we are only releasing to Android users in Norway, as a test "
-"run. I2P\n"
-"Android will have far more exposure on Google Play than it has ever had "
-"before,\n"
-"and there will be bugs and usability issues that we need to fix. It will "
-"be much\n"
-"easier (and less stressful!) to respond to feedback if we only need to "
-"deal with\n"
-"reports from hundreds of users instead of thousands (already orders of "
-"magnitude\n"
+"Initially, we are only releasing to Android users in Norway, as a test run. I2P\n"
+"Android will have far more exposure on Google Play than it has ever had before,\n"
+"and there will be bugs and usability issues that we need to fix. It will be much\n"
+"easier (and less stressful!) to respond to feedback if we only need to deal with\n"
+"reports from hundreds of users instead of thousands (already orders of magnitude\n"
 "more feedback than we have ever had)."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:31
 msgid ""
-"Simultaneously we are making the first public release of Bote, an Android"
-" port\n"
-"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. "
-"It runs\n"
-"on top of the I2P network, and while it works as a standalone app, it "
-"will use\n"
+"Simultaneously we are making the first public release of Bote, an Android port\n"
+"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. It runs\n"
+"on top of the I2P network, and while it works as a standalone app, it will use\n"
 "the I2P Android app by default if installed. As with I2P Android, we are\n"
 "initially only releasing Bote to Android users in Norway."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:41
 msgid ""
-"The apps are being released on Google Play by `The Privacy Solutions "
-"Project`__.\n"
-"See their `blog post`__ for further information, and links to the Google "
-"Play\n"
+"The apps are being released on Google Play by `The Privacy Solutions Project`__.\n"
+"See their `blog post`__ for further information, and links to the Google Play\n"
 "page for Norway users."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:50
 msgid ""
-"As lead developer for I2P Android and Bote, I look forward to your "
-"comments. You\n"
-"are the people who will be using them, and your perspectives will help me"
-" craft\n"
+"As lead developer for I2P Android and Bote, I look forward to your comments. You\n"
+"are the people who will be using them, and your perspectives will help me craft\n"
 "simple, intuitive apps that make privacy accessible to everyone."
 msgstr ""
 
@@ -2689,28 +2585,22 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:59
 msgid ""
-"We have also updated I2P Android on the website to match the release "
-"candidate\n"
-"deployed in Norway. This version will be updated with changes as we "
-"respond to\n"
+"We have also updated I2P Android on the website to match the release candidate\n"
+"deployed in Norway. This version will be updated with changes as we respond to\n"
 "feedback from Norwegian users, heading towards our next stable release."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:65
 msgid ""
-"Please note that we have upgraded the Android API to 9. This means that "
-"Froyo\n"
-"Android 2.2 will not be supported anymore; the minimum requirement is now"
-"\n"
+"Please note that we have upgraded the Android API to 9. This means that Froyo\n"
+"Android 2.2 will not be supported anymore; the minimum requirement is now\n"
 "Gingerbread Android 2.3."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:71
 msgid ""
-"Also note that if you have an earlier version of I2P Android, you will "
-"need to\n"
-"uninstall and reinstall because we have changed the release keys. Further"
-"\n"
+"Also note that if you have an earlier version of I2P Android, you will need to\n"
+"uninstall and reinstall because we have changed the release keys. Further\n"
 "information about this will be provided in a subsequent blog post."
 msgstr ""
 
@@ -2728,31 +2618,23 @@ msgstr ""
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:13
 msgid ""
 "0.9.15 adds preliminary support for Ed25519 EdDSA signatures.\n"
-"It includes a new persistent configuration backend for i2psnark and fixes"
-" several issues with i2psnark's handling of file names.\n"
+"It includes a new persistent configuration backend for i2psnark and fixes several issues with i2psnark's handling of file names.\n"
 "There are several improvements to speed up SAM.\n"
 "Plugins now support stronger signatures in the su3 file format.\n"
-"Plugin installation via the console, which was disabled in 0.9.14, is re-"
-"enabled."
+"Plugin installation via the console, which was disabled in 0.9.14, is re-enabled."
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:21
 msgid ""
-"We have supported ECDSA signatures since 0.9.12, and we would like to "
-"start using ECDSA by default.\n"
-"Unfortunately, some of you are still running older I2P versions, and for "
-"others,\n"
+"We have supported ECDSA signatures since 0.9.12, and we would like to start using ECDSA by default.\n"
+"Unfortunately, some of you are still running older I2P versions, and for others,\n"
 "their distribution or Java runtime does not support ECDSA. Red Hat\n"
 "(RHEL, Fedora) distributions are reported to be missing ECDSA.\n"
 "Some have fixed the Java issues by upgrading from Java 6 to Java 7;\n"
-"others have had success with installing the \"unlimited strength policy "
-"files\".\n"
-"We've added information about missing crypto to the log file and the "
-"/logs page in the console.\n"
-"After you update to 0.9.15, please check if you are missing ECDSA "
-"support, and attempt to fix it if necessary.\n"
-"This is particularly important for those that run popular eepsites and "
-"services."
+"others have had success with installing the \"unlimited strength policy files\".\n"
+"We've added information about missing crypto to the log file and the /logs page in the console.\n"
+"After you update to 0.9.15, please check if you are missing ECDSA support, and attempt to fix it if necessary.\n"
+"This is particularly important for those that run popular eepsites and services."
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:42
@@ -2784,6 +2666,13 @@ msgstr ""
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:32
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:31
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:37
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:30
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:42
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:35
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:35
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:47
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:37
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:36
 msgid "Changes"
 msgstr ""
 
@@ -2855,8 +2744,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:68
 msgid ""
-"i2ptunnel add support for local SSL connections for standard and IRC "
-"client tunnels"
+"i2ptunnel add support for local SSL connections for standard and IRC client "
+"tunnels"
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:69
@@ -2893,26 +2782,21 @@ msgid ""
 "0.9.16 is a significant step forward in our plan to migrate\n"
 "from DSA to ECDSA and then EdDSA cryptographic signatures,\n"
 "and makes several other changes to increase your anonymity and security.\n"
-"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures"
-" by default.\n"
-"In addition, we've fixed a large number of serious bugs, including "
-"console lockups."
+"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures by default.\n"
+"In addition, we've fixed a large number of serious bugs, including console lockups."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:21
 msgid ""
-"Changes in router data structures will require i2pcontrol plugin users to"
-" update to version 0.0.9."
+"Changes in router data structures will require i2pcontrol plugin users to "
+"update to version 0.0.9."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:25
 msgid ""
-"If you run an eepsite or a service and you are not running a recent "
-"release,\n"
-"or your Java or OS does not support ECDSA (as noted in the logs and on "
-"the /logs page in the console),\n"
-"please fix the issue as soon as possible or your users will soon be "
-"unable to connect."
+"If you run an eepsite or a service and you are not running a recent release,\n"
+"or your Java or OS does not support ECDSA (as noted in the logs and on the /logs page in the console),\n"
+"please fix the issue as soon as possible or your users will soon be unable to connect."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:42
@@ -2925,8 +2809,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:44
 msgid ""
-"Require I2CP authorization for all messages when enabled (requires 0.9.11"
-" or higher client)"
+"Require I2CP authorization for all messages when enabled (requires 0.9.11 or"
+" higher client)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:45
@@ -2945,8 +2829,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:48
 msgid ""
-"New column sorting, set-all priority buttons, and upload ratio display in"
-" i2psnark"
+"New column sorting, set-all priority buttons, and upload ratio display in "
+"i2psnark"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:49
@@ -3007,14 +2891,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:71
 msgid ""
-"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol"
-" plugin)"
+"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol "
+"plugin)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:72
 msgid ""
-"New router keys now stored in router.keys.dat (eepPriv.dat format) "
-"instead of router.keys"
+"New router keys now stored in router.keys.dat (eepPriv.dat format) instead "
+"of router.keys"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:73
@@ -3049,8 +2933,7 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:80
 msgid ""
-"Change eepsite Jetty threadpool and queue configuration (new installs "
-"only)"
+"Change eepsite Jetty threadpool and queue configuration (new installs only)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:81
@@ -3070,39 +2953,34 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:13
 msgid ""
-"0.9.17 is primarily a bugfix release, but it also continues our migration"
-" to stronger cryptographic signatures."
+"0.9.17 is primarily a bugfix release, but it also continues our migration to"
+" stronger cryptographic signatures."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:17
 msgid ""
-"We have moved the news feed system used for the news on your console and "
-"the latest router version indication\n"
+"We have moved the news feed system used for the news on your console and the latest router version indication\n"
 "to a signed format using RSA 4096-bit keys for enhanced security."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:22
 msgid ""
-"New eepsites and servers will be ECDSA-signed by default, if ECDSA is "
-"available.\n"
+"New eepsites and servers will be ECDSA-signed by default, if ECDSA is available.\n"
 "There is now a warning in the console sidebar if ECDSA is not available.\n"
-"For RedHat users, we have reports of successful installs of the "
-"BouncyCastle Provider (bcprov) jar to add ECDSA support."
+"For RedHat users, we have reports of successful installs of the BouncyCastle Provider (bcprov) jar to add ECDSA support."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:28
 msgid ""
-"We've fixed several serious bugs, including an SSU packet corruption "
-"problem,\n"
+"We've fixed several serious bugs, including an SSU packet corruption problem,\n"
 "and a SAM bug affecting i2p-messenger and other SAM applications.\n"
-"There are several fixes for the preliminary ECDSA router signatures added"
-" in the last release but not yet enabled."
+"There are several fixes for the preliminary ECDSA router signatures added in the last release but not yet enabled."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:34
 msgid ""
-"Many of us will be attending 31C3 in Hamburg in December. Stop by our "
-"table and say hi!"
+"Many of us will be attending 31C3 in Hamburg in December. Stop by our table "
+"and say hi!"
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:49
@@ -3202,16 +3080,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:11
 msgid ""
-"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google"
-" Play and F-Droid."
+"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google "
+"Play and F-Droid."
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:13
 msgid ""
-"It has been some time since I last posted updates about our Android "
-"development,\n"
-"and several I2P releases have gone by without any matching Android "
-"releases.\n"
+"It has been some time since I last posted updates about our Android development,\n"
+"and several I2P releases have gone by without any matching Android releases.\n"
 "At last, the wait is over!"
 msgstr ""
 
@@ -3223,47 +3099,31 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:24
 msgid ""
-"New versions of I2P Android and Bote have been released! They can be "
-"downloaded\n"
+"New versions of I2P Android and Bote have been released! They can be downloaded\n"
 "from these URLs:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:35
 msgid ""
-"The main change in these releases is the transition to Android's new "
-"Material\n"
-"design system. Material has made it much easier for app developers with, "
-"shall\n"
-"we say, \"minimalist\" design skills (like myself) to create apps that "
-"are nicer\n"
-"to use. I2P Android also updates its underlying I2P router to the just-"
-"released\n"
-"version 0.9.17. Bote brings in several new features along with many "
-"smaller\n"
-"improvements; for example, you can now add new email destinations via QR "
-"codes."
+"The main change in these releases is the transition to Android's new Material\n"
+"design system. Material has made it much easier for app developers with, shall\n"
+"we say, \"minimalist\" design skills (like myself) to create apps that are nicer\n"
+"to use. I2P Android also updates its underlying I2P router to the just-released\n"
+"version 0.9.17. Bote brings in several new features along with many smaller\n"
+"improvements; for example, you can now add new email destinations via QR codes."
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:44
 msgid ""
-"As I mentioned in `my last update`__, the release key that signs the apps"
-" has\n"
-"changed. The reason for this was because we needed to change the package "
-"name\n"
-"of I2P Android. The old package name (``net.i2p.android.router``) had "
-"already\n"
-"been taken on Google Play (we still don't know who was using it), and we "
-"wanted\n"
-"to use the same package name and signing key for all distributions of I2P"
-"\n"
-"Android. Doing so means that a user could initially install the app from "
-"the I2P\n"
-"website, and then later if the website was blocked they could upgrade it "
-"using\n"
-"Google Play. Android OS considers an application to be completely "
-"different when\n"
-"its package name changes, so we took the opportunity to increase the "
-"strength of\n"
+"As I mentioned in `my last update`__, the release key that signs the apps has\n"
+"changed. The reason for this was because we needed to change the package name\n"
+"of I2P Android. The old package name (``net.i2p.android.router``) had already\n"
+"been taken on Google Play (we still don't know who was using it), and we wanted\n"
+"to use the same package name and signing key for all distributions of I2P\n"
+"Android. Doing so means that a user could initially install the app from the I2P\n"
+"website, and then later if the website was blocked they could upgrade it using\n"
+"Google Play. Android OS considers an application to be completely different when\n"
+"its package name changes, so we took the opportunity to increase the strength of\n"
 "the signing key."
 msgstr ""
 
@@ -3279,25 +3139,18 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:73
 msgid ""
-"A few months ago we `released`__ both I2P Android and Bote on Google Play"
-" in\n"
-"Norway, to test the release process there. We are pleased to announce "
-"that both\n"
-"apps are now being released globally by `Privacy Solutions`__. The apps "
-"can be\n"
+"A few months ago we `released`__ both I2P Android and Bote on Google Play in\n"
+"Norway, to test the release process there. We are pleased to announce that both\n"
+"apps are now being released globally by `Privacy Solutions`__. The apps can be\n"
 "found at these URLs:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:89
 msgid ""
-"The global release is being done in several stages, starting with the "
-"countries\n"
-"for which we have translations. The notable exception to this is France; "
-"due to\n"
-"import regulations on cryptographic code, we are unable yet to distribute"
-" these\n"
-"apps on Google Play France. This is the same issue that has affected "
-"other apps\n"
+"The global release is being done in several stages, starting with the countries\n"
+"for which we have translations. The notable exception to this is France; due to\n"
+"import regulations on cryptographic code, we are unable yet to distribute these\n"
+"apps on Google Play France. This is the same issue that has affected other apps\n"
 "like TextSecure and Orbot."
 msgstr ""
 
@@ -3309,39 +3162,28 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:103
 msgid ""
-"Don't think we have forgotten about you, F-Droid users! In addition to "
-"the two\n"
-"locations above, we have set up our own F-Droid repository. If you are "
-"reading\n"
-"this post on your phone, `click here`__ to add it to F-Droid (this only "
-"works in\n"
-"some Android browsers). Or, you can manually add the URL below to your "
-"F-Droid\n"
+"Don't think we have forgotten about you, F-Droid users! In addition to the two\n"
+"locations above, we have set up our own F-Droid repository. If you are reading\n"
+"this post on your phone, `click here`__ to add it to F-Droid (this only works in\n"
+"some Android browsers). Or, you can manually add the URL below to your F-Droid\n"
 "repository list:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:115
 msgid ""
-"If you would like to manually verify the fingerprint (SHA-256) of the "
-"repository\n"
+"If you would like to manually verify the fingerprint (SHA-256) of the repository\n"
 "signing key, or type it in when adding the repository, here it is:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:124
 msgid ""
-"Unfortunately the I2P app in the main F-Droid repository has not been "
-"updated\n"
-"because our F-Droid maintainer has disappeared. We hope that by "
-"maintaining this\n"
+"Unfortunately the I2P app in the main F-Droid repository has not been updated\n"
+"because our F-Droid maintainer has disappeared. We hope that by maintaining this\n"
 "binary repository, we can better support our F-Droid users and keep them\n"
-"up-to-date. If you have already installed I2P from the main F-Droid "
-"repository,\n"
-"you will need to uninstall it if you want to upgrade, because the signing"
-" key\n"
-"will be different. The apps in our F-Droid repository are the same APKs "
-"that are\n"
-"provided on our website and on Google Play, so in future you will be able"
-" to\n"
+"up-to-date. If you have already installed I2P from the main F-Droid repository,\n"
+"you will need to uninstall it if you want to upgrade, because the signing key\n"
+"will be different. The apps in our F-Droid repository are the same APKs that are\n"
+"provided on our website and on Google Play, so in future you will be able to\n"
 "upgrade using any of these sources."
 msgstr ""
 
@@ -3360,25 +3202,18 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:21
 msgid ""
-"We were, for the second year in a row, at a great location in the "
-"Congress, in\n"
-"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square "
-"has\n"
-"really increased our visibility and helped many people find us. Thanks to"
-" Noisy\n"
+"We were, for the second year in a row, at a great location in the Congress, in\n"
+"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square has\n"
+"really increased our visibility and helped many people find us. Thanks to Noisy\n"
 "Square and the 31C3 organizers for a great Congress."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:30
 msgid ""
-"We also thank Gabriel Weinberg and his fabulous search engine "
-"`DuckDuckGo`__ for\n"
-"their support of open source anonymity tools and their `generous "
-"contribution`__\n"
-"to I2P in 2014. Funding from DuckDuckGo and others helped support our "
-"attendance\n"
-"at CCC. This is the primary annual meetup for I2P developers and it is "
-"critical\n"
+"We also thank Gabriel Weinberg and his fabulous search engine `DuckDuckGo`__ for\n"
+"their support of open source anonymity tools and their `generous contribution`__\n"
+"to I2P in 2014. Funding from DuckDuckGo and others helped support our attendance\n"
+"at CCC. This is the primary annual meetup for I2P developers and it is critical\n"
 "to our success."
 msgstr ""
 
@@ -3390,127 +3225,88 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:49
 msgid ""
-"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved "
-"himself\n"
-"and the project from TU Munich to `Inria`__ in France. He has a large "
-"number of\n"
-"`open positions`__. This is a great opportunity to get paid to work on "
-"open\n"
+"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved himself\n"
+"and the project from TU Munich to `Inria`__ in France. He has a large number of\n"
+"`open positions`__. This is a great opportunity to get paid to work on open\n"
 "source anonymity tools, we encourage everybody to contact him about it."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:60
 msgid ""
-"The prospect of an invigorated GNUnet with a large amount of new funding "
-"is\n"
-"quite interesting. We discussed more ways to work together. In early "
-"2014, we\n"
-"worked hard to understand the GnuNet DNS replacement, but we were unable "
-"to\n"
-"figure out a good fit for it in I2P. One of his new ideas is a "
-"distributed,\n"
-"anonymous statistics gathering subsystem, for detecting problems or "
-"attacks on\n"
+"The prospect of an invigorated GNUnet with a large amount of new funding is\n"
+"quite interesting. We discussed more ways to work together. In early 2014, we\n"
+"worked hard to understand the GnuNet DNS replacement, but we were unable to\n"
+"figure out a good fit for it in I2P. One of his new ideas is a distributed,\n"
+"anonymous statistics gathering subsystem, for detecting problems or attacks on\n"
 "the network. We'd definitely be interested in that."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:69
 msgid ""
-"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems "
-"draft`__.\n"
-"A new, greatly simplified version 3 was posted in December. The prospects"
-" for\n"
+"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems draft`__.\n"
+"A new, greatly simplified version 3 was posted in December. The prospects for\n"
 "approval remain unclear. The best way to monitor or participate in the\n"
-"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to "
-"do so\n"
+"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to do so\n"
 "on our side, and also give Hellekin a new point-of-contact for this topic."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:80
 msgid ""
-"We apologized to Christian for not being organized enough to have a talk "
-"at his\n"
-"`We Fix The Net assembly`__. One of our biggest failures as a project is "
-"our\n"
-"seeming inability to submit talks at conferences. We'll have to do better"
-" in the\n"
+"We apologized to Christian for not being organized enough to have a talk at his\n"
+"`We Fix The Net assembly`__. One of our biggest failures as a project is our\n"
+"seeming inability to submit talks at conferences. We'll have to do better in the\n"
 "new year."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:92
 msgid ""
-"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in "
-"with\n"
-"other anonymity tools into this new Debian \"superpackage\" of some sort,"
-" and\n"
-"would love to get I2P into Debian in 2015. He claims the process is now "
-"easy,\n"
+"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in with\n"
+"other anonymity tools into this new Debian \"superpackage\" of some sort, and\n"
+"would love to get I2P into Debian in 2015. He claims the process is now easy,\n"
 "just `follow the instructions`__. We said that's funny, we've been\n"
 "`stuck in the process for over 7 years`__."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:103
 msgid ""
-"He said, well, try the new process, it works great, should be no problem "
-"at all\n"
-"if your package is in good shape. The people in Debian that run this "
-"process are\n"
-"eager volunteers who want nothing more than to get more packages in. We "
-"said our\n"
-"package is indeed in fantastic shape, and we would try out the new "
-"process as\n"
-"soon as possible. If all this is true, we will be in the next Debian "
-"release in\n"
+"He said, well, try the new process, it works great, should be no problem at all\n"
+"if your package is in good shape. The people in Debian that run this process are\n"
+"eager volunteers who want nothing more than to get more packages in. We said our\n"
+"package is indeed in fantastic shape, and we would try out the new process as\n"
+"soon as possible. If all this is true, we will be in the next Debian release in\n"
 "late 2015. This would be very very cool."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:115
 msgid ""
-"We had a nice discussion with BitingBird of Tails. They are very happy "
-"with our\n"
-"rapid response to the `vulnerability disclosure`__ last summer, resulting"
-" in our\n"
-"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and "
-"they\n"
-"took `great offense`__ to that and the lack of private notification. We "
-"thanked\n"
+"We had a nice discussion with BitingBird of Tails. They are very happy with our\n"
+"rapid response to the `vulnerability disclosure`__ last summer, resulting in our\n"
+"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and they\n"
+"took `great offense`__ to that and the lack of private notification. We thanked\n"
 "them for taking the heat and fighting back."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:127
 msgid ""
-"BitingBird also handles support, and she tells us the number one issue is"
-" how\n"
-"long I2P takes to start up and be useful for browsing I2P sites. Her "
-"standard\n"
-"answer is \"wait ten more minutes\" and that seems to be effective. I2P "
-"is\n"
-"particularly slow to startup on Tails since it does not persist peer data"
-" by\n"
-"default. It would be nice to change that, but there's also things we can "
-"do on\n"
-"the I2P side to make things start faster. Expect some improvement in our "
-"0.9.18\n"
+"BitingBird also handles support, and she tells us the number one issue is how\n"
+"long I2P takes to start up and be useful for browsing I2P sites. Her standard\n"
+"answer is \"wait ten more minutes\" and that seems to be effective. I2P is\n"
+"particularly slow to startup on Tails since it does not persist peer data by\n"
+"default. It would be nice to change that, but there's also things we can do on\n"
+"the I2P side to make things start faster. Expect some improvement in our 0.9.18\n"
 "release."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:140
 msgid ""
-"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The "
-"upcoming\n"
-"Tor Hidden Services changes mean that their keys will no longer fit into "
-"a\n"
-"portion of an IPv6 address, and he was working on a solution. We reminded"
-" him\n"
-"that this has always been the case for I2P (with \"GarliCat\"), that it's"
-" not a\n"
-"new problem. He pointed us to `a presentation`__ of his proposal. It "
-"involves\n"
+"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The upcoming\n"
+"Tor Hidden Services changes mean that their keys will no longer fit into a\n"
+"portion of an IPv6 address, and he was working on a solution. We reminded him\n"
+"that this has always been the case for I2P (with \"GarliCat\"), that it's not a\n"
+"new problem. He pointed us to `a presentation`__ of his proposal. It involves\n"
 "storing an extra record in the hidden service directory (equivalent of a\n"
-"leaseset I2P's network database). It wasn't completely clear how this "
-"would\n"
-"work, or if we would consider it abuse of the netDb. We'll follow up with"
-" him\n"
+"leaseset I2P's network database). It wasn't completely clear how this would\n"
+"work, or if we would consider it abuse of the netDb. We'll follow up with him\n"
 "as he gets further."
 msgstr ""
 
@@ -3522,23 +3318,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:160
 msgid ""
-"We spent hours and hours explaining I2P to people stopping by our table. "
-"Some\n"
-"had heard of I2P before, some had not; everybody had heard of Tor and had"
-" at\n"
-"least a vague idea of what hidden services are. As usual, introducing "
-"people to\n"
-"I2P was a struggle. By the end of the Congress, we became convinced that "
-"a part\n"
-"of the problem was a difference in terminology. Back 12 years ago, when "
-"I2P and\n"
-"Tor were both getting started, we each came up with terms for the various"
-" parts\n"
+"We spent hours and hours explaining I2P to people stopping by our table. Some\n"
+"had heard of I2P before, some had not; everybody had heard of Tor and had at\n"
+"least a vague idea of what hidden services are. As usual, introducing people to\n"
+"I2P was a struggle. By the end of the Congress, we became convinced that a part\n"
+"of the problem was a difference in terminology. Back 12 years ago, when I2P and\n"
+"Tor were both getting started, we each came up with terms for the various parts\n"
 "of our systems. Today, the Tor terminology such as \"hidden service\" is\n"
-"well-understood and commonplace. The I2P terminology such as \"eepsite\" "
-"is\n"
-"neither. We agreed to review our documentation, router console, and other"
-" places\n"
+"well-understood and commonplace. The I2P terminology such as \"eepsite\" is\n"
+"neither. We agreed to review our documentation, router console, and other places\n"
 "for opportunities to simplify it and use common terms."
 msgstr ""
 
@@ -3557,66 +3345,65 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:182
 msgid ""
-"* *Toronto meetup:* CCC is such a productive time for us, and it seems "
-"that a second meetup in the year would be quite helpful. We have proposed"
-" it for August 2015 in Toronto, Canada, in conjunction with `Toronto "
-"Crypto`__. It would include developer meetings together with "
-"presentations and tutorials, all open to the public. We are attempting to"
-" gauge interest and research possible venues. If you are considering "
-"attending, please let us know by `tweeting @i2p`__ or posting `on the dev"
-" forum thread`__."
+"* *Toronto meetup:* CCC is such a productive time for us, and it seems that "
+"a second meetup in the year would be quite helpful. We have proposed it for "
+"August 2015 in Toronto, Canada, in conjunction with `Toronto Crypto`__. It "
+"would include developer meetings together with presentations and tutorials, "
+"all open to the public. We are attempting to gauge interest and research "
+"possible venues. If you are considering attending, please let us know by "
+"`tweeting @i2p`__ or posting `on the dev forum thread`__."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:190
 msgid ""
-"* We discussed Meeh's workload and the state of the various services he "
-"is running. We made some plans to reduce his load and have some other "
-"people help out."
+"* We discussed Meeh's workload and the state of the various services he is "
+"running. We made some plans to reduce his load and have some other people "
+"help out."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:194
 msgid ""
-"* We reviewed our critieria for placing links to `i2pd`__ on our download"
-" page.  We agreed that the only remaining item is to have a nice page on "
-"the `Privacy Solutions web site`__ or elsewhere with binary packages for "
+"* We reviewed our critieria for placing links to `i2pd`__ on our download "
+"page.  We agreed that the only remaining item is to have a nice page on the "
+"`Privacy Solutions web site`__ or elsewhere with binary packages for "
 "Windows, Linux, and Mac, and source packages. It's not clear who is "
-"responsible for building the packages and where the \"official\" version "
-"is. Once there's an established process for building and signing packages"
-" and an official place to put them, we're ready to link to it. If it is "
-"not feasible to host it on the Privacy Solutions website, we will discuss"
-" alternatives with orignal, including possible migration to our download "
+"responsible for building the packages and where the \"official\" version is."
+" Once there's an established process for building and signing packages and "
+"an official place to put them, we're ready to link to it. If it is not "
+"feasible to host it on the Privacy Solutions website, we will discuss "
+"alternatives with orignal, including possible migration to our download "
 "servers."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:201
 msgid ""
-"* Lots of people coming by the table asked if we had a non-Java version. "
-"It was great to finally answer \"yes\" and we're eager to get the word "
-"out and get more users, testers, and developers on it."
+"* Lots of people coming by the table asked if we had a non-Java version. It "
+"was great to finally answer \"yes\" and we're eager to get the word out and "
+"get more users, testers, and developers on it."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:205
 msgid ""
-"* `Vuze`__ continues to make good progress on their I2P integration. We "
-"look forward to working with them in the new year on a managed rollout to"
-" more users."
+"* `Vuze`__ continues to make good progress on their I2P integration. We look"
+" forward to working with them in the new year on a managed rollout to more "
+"users."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:211
 msgid ""
 "* We discussed the state of Meeh's and Sindu's reseed servers. They made "
-"several improvements while at the congress and are investigating "
-"migration to `Matt Drollette's Go implementation`__. The security and "
-"reliability of our reseed servers is vital to new users and network "
-"operation. `User 'backup'`__ is doing a great job monitoring and managing"
-" the pool of reseed servers."
+"several improvements while at the congress and are investigating migration "
+"to `Matt Drollette's Go implementation`__. The security and reliability of "
+"our reseed servers is vital to new users and network operation. `User "
+"'backup'`__ is doing a great job monitoring and managing the pool of reseed "
+"servers."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:218
 msgid ""
-"* We agreed to purchase a second root server for development, testing, "
-"and services. Echelon will be adminstering it. Contact him if you would "
-"like a VM."
+"* We agreed to purchase a second root server for development, testing, and "
+"services. Echelon will be adminstering it. Contact him if you would like a "
+"VM."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:222
@@ -3627,26 +3414,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:226
 msgid ""
-"* We met with Welterde about the state of his services including his "
-"`open tracker`__. These services are not being adequately maintained and "
-"will soon become inaccessible due to crypto changes if they are not "
-"upgraded. He committed to upgrading them soon."
+"* We met with Welterde about the state of his services including his `open "
+"tracker`__. These services are not being adequately maintained and will soon"
+" become inaccessible due to crypto changes if they are not upgraded. He "
+"committed to upgrading them soon."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:232
 msgid ""
-"* We met lots of people interested in our `Android app`__. We passed "
-"several ideas and bug reports back to str4d. We plan to make a big push "
-"to give the app some development love early in the year."
+"* We met lots of people interested in our `Android app`__. We passed several"
+" ideas and bug reports back to str4d. We plan to make a big push to give the"
+" app some development love early in the year."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:238
 msgid ""
-"* Regrettably, we didn't get to see too many talks at the Congress, as we"
-" were so busy meeting with people. We plan to catch up and `watch them "
-"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and"
-" Jacob's talk was great. We hear that the cryptography talks were good as"
-" well."
+"* Regrettably, we didn't get to see too many talks at the Congress, as we "
+"were so busy meeting with people. We plan to catch up and `watch them "
+"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and "
+"Jacob's talk was great. We hear that the cryptography talks were good as "
+"well."
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:1
@@ -3663,13 +3450,11 @@ msgstr ""
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:13
 msgid ""
 "0.9.18 contains several bug fixes and performance improvements.\n"
-"We have shortened the startup time, and reduced latency throughout our "
-"network protocols.\n"
+"We have shortened the startup time, and reduced latency throughout our network protocols.\n"
 "We've increased the default connection limits for the fastest routers,\n"
 "and reduced the thread usage in i2ptunnel.\n"
 "UPnP fixes should improve handling of external device changes.\n"
-"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP "
-"fixes."
+"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP fixes."
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:33
@@ -3677,7 +3462,8 @@ msgid "Fix parsing of ECDSA address helper in HTTP client proxy"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:34
-msgid "Fix news last-modified processing which prevented notification of update"
+msgid ""
+"Fix news last-modified processing which prevented notification of update"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:35
@@ -3714,8 +3500,7 @@ msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:46
 msgid ""
-"Add startup browser configuration with advanced config "
-"routerconsole.browser"
+"Add startup browser configuration with advanced config routerconsole.browser"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:47
@@ -3777,21 +3562,16 @@ msgstr ""
 msgid ""
 "0.9.19 has several fixes and improvements for floodfill performance.\n"
 "Many of you saw high CPU usage after 0.9.18 was released.\n"
-"This was caused by a combination of increased encryption usage, the big "
-"influx of Vuze users into the network,\n"
-"reduced floodfills due to tighter performance requirements, and some "
-"longstanding bugs.\n"
+"This was caused by a combination of increased encryption usage, the big influx of Vuze users into the network,\n"
+"reduced floodfills due to tighter performance requirements, and some longstanding bugs.\n"
 "Things should be a lot better after most of the network has updated.\n"
-"As always, the best way to reduce CPU usage is to lower your bandwidth "
-"limits."
+"As always, the best way to reduce CPU usage is to lower your bandwidth limits."
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:21
 msgid ""
-"We've also added new ways to reseed manually, and to generate a reseed "
-"file you can easily share with others who need it.\n"
-"See the reseed configuration page in the router console for more "
-"information."
+"We've also added new ways to reseed manually, and to generate a reseed file you can easily share with others who need it.\n"
+"See the reseed configuration page in the router console for more information."
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:35
@@ -3857,7 +3637,8 @@ msgid "Increase min and default bandwidth for i2psnark"
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:58
-msgid "Improved strategies for dropping jobs on high job lag to prevent overload"
+msgid ""
+"Improved strategies for dropping jobs on high job lag to prevent overload"
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:59
@@ -3897,35 +3678,28 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:13
 msgid ""
-"0.9.20 contains many important bug fixes, and several changes to increase"
-" floodfill capacity in the network."
+"0.9.20 contains many important bug fixes, and several changes to increase "
+"floodfill capacity in the network."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:17
 msgid ""
-"Routers configured for 32-64 KB of shared bandwidth may now become "
-"floodfill,\n"
-"and routers configured for 512 KB or more of shared bandwidth will have "
-"higher connection limits.\n"
+"Routers configured for 32-64 KB of shared bandwidth may now become floodfill,\n"
+"and routers configured for 512 KB or more of shared bandwidth will have higher connection limits.\n"
 "These changes may cause your router to use more resources.\n"
-"If the router becomes too busy, the best way to reduce usage is to lower "
-"the bandwidth settings in your console.\n"
-"If that doesn't help, you may now disable automatic floodfill on the "
-"advanced configuration page in the console."
+"If the router becomes too busy, the best way to reduce usage is to lower the bandwidth settings in your console.\n"
+"If that doesn't help, you may now disable automatic floodfill on the advanced configuration page in the console."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:25
 msgid ""
-"We're hopeful that these changes will increase network capacity and "
-"performance,\n"
-"and reduce the congestion that's been affecting the network the last "
-"three months."
+"We're hopeful that these changes will increase network capacity and performance,\n"
+"and reduce the congestion that's been affecting the network the last three months."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:35
 msgid ""
-"Finally, we're excited to announce our first-ever I2P meetup, in Toronto "
-"August 15-16.\n"
+"Finally, we're excited to announce our first-ever I2P meetup, in Toronto August 15-16.\n"
 "There will be lots of presentations and tutorials. All are welcome.\n"
 "For more information, see the `announcement`_."
 msgstr ""
@@ -3944,8 +3718,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:53
 msgid ""
-"Raise connection limits for new classes 'P' (512-2000 KBps share "
-"bandwidth) and 'X' (over 2000 KBps)"
+"Raise connection limits for new classes 'P' (512-2000 KBps share bandwidth) "
+"and 'X' (over 2000 KBps)"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:54
@@ -3957,7 +3731,8 @@ msgid "Clock skew fixes"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:62
-msgid "Fixes and configuration for when IPv4 is firewalled but IPv6 still works"
+msgid ""
+"Fixes and configuration for when IPv4 is firewalled but IPv6 still works"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:63
@@ -4030,8 +3805,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:86
 msgid ""
-"Add Bloom filter warning when configured for high bandwidth but not "
-"enough memory"
+"Add Bloom filter warning when configured for high bandwidth but not enough "
+"memory"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:87
@@ -4044,8 +3819,7 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:89
 msgid ""
-"Better error handling and user feedback when HTTP client tunnel is "
-"disabled"
+"Better error handling and user feedback when HTTP client tunnel is disabled"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:90
@@ -4078,19 +3852,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:13
 msgid ""
-"The I2P team is proud to announce that we are going to host a meetup in "
-"Toronto on August 15-16.\n"
-"A number of members of our community will be attending and are going to "
-"host talks, workshops and discussions about and relating to I2P. This "
-"event is not just for I2P people though, it's meant for everyone."
+"The I2P team is proud to announce that we are going to host a meetup in Toronto on August 15-16.\n"
+"A number of members of our community will be attending and are going to host talks, workshops and discussions about and relating to I2P. This event is not just for I2P people though, it's meant for everyone."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:18
 msgid ""
-"If you're curious about I2P, interested in privacy/cryptography/anonymity"
-" or just want to come by and talk to us, please do. This is an event for "
-"everyone. If you're not familiar with any of these topics, come by anyway"
-" and we'll show you how I2P works and what you can do with it.\n"
+"If you're curious about I2P, interested in privacy/cryptography/anonymity or just want to come by and talk to us, please do. This is an event for everyone. If you're not familiar with any of these topics, come by anyway and we'll show you how I2P works and what you can do with it.\n"
 "\n"
 "The event is entirely free, you don't need to sign up or register."
 msgstr ""
@@ -4098,9 +3866,9 @@ msgstr ""
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:24
 msgid ""
 "The meetup couldn't have been arranged without our friends at `Toronto "
-"Crypto <https://torontocrypto.org/>`_ which have been helping us organize"
-" the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are"
-" providing us with a very nice space."
+"Crypto <https://torontocrypto.org/>`_ which have been helping us organize "
+"the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are "
+"providing us with a very nice space."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:28
@@ -4128,9 +3896,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:55
 msgid ""
-"The focus will be on an introduction to topics surrounding I2P, privacy "
-"and anonymity online. People of all backgrounds and knowledge levels are "
-"welcome to attend."
+"The focus will be on an introduction to topics surrounding I2P, privacy and "
+"anonymity online. People of all backgrounds and knowledge levels are welcome"
+" to attend."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:59
@@ -4147,9 +3915,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:63
 msgid ""
-"The crypto party will contain a number of stations where "
-"privacy/anonymity software will be demoed. The goal is to provide people "
-"with the tools they need to communicate securely."
+"The crypto party will contain a number of stations where privacy/anonymity "
+"software will be demoed. The goal is to provide people with the tools they "
+"need to communicate securely."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:67
@@ -4170,11 +3938,10 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:72
 msgid ""
-"We're currently looking for help staffing the stations. If you want to "
-"help out, you can! Bring a monitor/laptop and run a station. The station "
-"could be any of the ones listed above, or any other privacy/anonymity "
-"related one you would like to run. Please contact us at `@geti2p`_ if "
-"you're interested."
+"We're currently looking for help staffing the stations. If you want to help "
+"out, you can! Bring a monitor/laptop and run a station. The station could be"
+" any of the ones listed above, or any other privacy/anonymity related one "
+"you would like to run. Please contact us at `@geti2p`_ if you're interested."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:81
@@ -4184,8 +3951,8 @@ msgstr ""
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:86
 msgid ""
 "The focus will be on in-depth topics surrounding I2P, the roadmap and "
-"development. Anyone is welcome to attend, but the content will be "
-"somewhat technical."
+"development. Anyone is welcome to attend, but the content will be somewhat "
+"technical."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:90
@@ -4221,35 +3988,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:14
 msgid ""
-"I2PCon is the first event of its kind. It has two short term goals. Where"
-" the\n"
-"first one is to provide the general public with an event where knowledge "
-"about\n"
-"privacy and privacy concerns can be obtained. The second goal is to "
-"further the\n"
-"I2P project and its community. This will take the shape of technical "
-"discussions\n"
+"I2PCon is the first event of its kind. It has two short term goals. Where the\n"
+"first one is to provide the general public with an event where knowledge about\n"
+"privacy and privacy concerns can be obtained. The second goal is to further the\n"
+"I2P project and its community. This will take the shape of technical discussions\n"
 "about cryptography, anonymity and I2P centric topics."
 msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:22
 msgid ""
-"There is a larger and more long-term goal of this event, and it is to "
-"build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we would like to provide a forum where this "
-"community\n"
+"There is a larger and more long-term goal of this event, and it is to build a\n"
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we would like to provide a forum where this community\n"
 "can grow."
 msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:29
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
-"`Toronto Crypto`_. The venue and everything relating to it is provided by"
-"\n"
-"`Hacklab`_. Without either of them this event would not have been "
-"possible, so\n"
+"`Toronto Crypto`_. The venue and everything relating to it is provided by\n"
+"`Hacklab`_. Without either of them this event would not have been possible, so\n"
 "thank you both."
 msgstr ""
 
@@ -4259,12 +4017,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:49
 msgid ""
-"I2PCon is entirely free to attend! We ask you to register `here`__, to "
-"give us\n"
-"an estimate of how many people will be attending. No identifying "
-"information has\n"
-"to be given in order to register, but if you have any concerns, please "
-"let us\n"
+"I2PCon is entirely free to attend! We ask you to register `here`__, to give us\n"
+"an estimate of how many people will be attending. No identifying information has\n"
+"to be given in order to register, but if you have any concerns, please let us\n"
 "know."
 msgstr ""
 
@@ -4309,26 +4064,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:13
 msgid ""
-"0.9.21 contains several changes to add capacity to the network, increase "
-"the efficiency of the floodfills,\n"
-"and use bandwidth more effectively.\n"
-"We have migrated the shared clients tunnels to ECDSA signatures and added"
-" a DSA fallback\n"
-"using the new \"multisession\" capability for those sites that don't "
-"support ECDSA."
-msgstr ""
-"0.9.21 contains several changes to add capacity to the network, increase "
-"the efficiency of the floodfills,\n"
+"0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\n"
 "and use bandwidth more effectively.\n"
-"We have migrated the shared clients tunnels to ECDSA signatures and added"
-" a DSA fallback\n"
-"using the new \"multisession\" capability for those sites that don't "
-"support ECDSA."
+"We have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\n"
+"using the new \"multisession\" capability for those sites that don't support ECDSA."
+msgstr "0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\nand use bandwidth more effectively.\nWe have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\nusing the new \"multisession\" capability for those sites that don't support ECDSA."
 
 #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:20
 msgid ""
-"The speakers and the schedule of the I2PCon in Toronto 2015 have been "
-"announced.\n"
+"The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.\n"
 "Have a look on the `I2PCon page`_ for details.\n"
 "Reserve your seat on `Eventbrite`_."
 msgstr ""
@@ -4440,21 +4184,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:14
 msgid ""
-"I2PCon has been a giant success. For us, the I2P contributors, it "
-"represents a\n"
-"leap forward in terms of what we're capable of pulling off as a "
-"community, how we\n"
-"communicate the usecases of I2P and reach out to privacy conscious "
-"individuals.\n"
+"I2PCon has been a giant success. For us, the I2P contributors, it represents a\n"
+"leap forward in terms of what we're capable of pulling off as a community, how we\n"
+"communicate the usecases of I2P and reach out to privacy conscious individuals.\n"
 "\n"
-"By arranging this event, we've also grown our community. People who've "
-"previously\n"
-"only lurked on our irc channels, or run our software or possibly hadn't "
-"even heard\n"
+"By arranging this event, we've also grown our community. People who've previously\n"
+"only lurked on our irc channels, or run our software or possibly hadn't even heard\n"
 "of I2P are now a part of our comminuty.\n"
 "\n"
-"This event has been our first active step towards building a large and "
-"inclusive\n"
+"This event has been our first active step towards building a large and inclusive\n"
 "community, and as such it's been great success."
 msgstr ""
 
@@ -4462,11 +4200,9 @@ msgstr ""
 msgid ""
 "Minutiae\n"
 "========\n"
-"On day 2 we had two short discussion sessions. A more general discussion "
-"and a roadmapping discussion.\n"
+"On day 2 we had two short discussion sessions. A more general discussion and a roadmapping discussion.\n"
 "\n"
-"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P "
-"Discussion session minutiae`_."
+"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P Discussion session minutiae`_."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:37
@@ -4495,32 +4231,25 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:62
 msgid ""
-"We've had some wonderful speakers, from both inside- and outside of our "
-"community.\n"
+"We've had some wonderful speakers, from both inside- and outside of our community.\n"
 "\n"
-"`David Dagon`_ talked to us about the way forward and how I2P could "
-"handle potential abuse.\n"
+"`David Dagon`_ talked to us about the way forward and how I2P could handle potential abuse.\n"
 "\n"
-"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us"
-" his thoughts about how far I2P has come.\n"
+"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us his thoughts about how far I2P has come.\n"
 "\n"
-"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and "
-"why you should care."
+"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and why you should care."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:72
 msgid ""
-"I would also like to thank the speakers from our community. `psi`_, "
-"`@str4d`_ and `zzz`_  who all had\n"
-"wonderful talks. Improving our ability to inform people about I2P is "
-"something that\n"
+"I would also like to thank the speakers from our community. `psi`_, `@str4d`_ and `zzz`_  who all had\n"
+"wonderful talks. Improving our ability to inform people about I2P is something that\n"
 "is going to be important for us going forward."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:78
 msgid ""
-"I would like to thank `Sadie`_ and Siew for helping us out with marketing"
-" and graphics.\n"
+"I would like to thank `Sadie`_ and Siew for helping us out with marketing and graphics.\n"
 "Without you I2PCon would've been a very different event."
 msgstr ""
 
@@ -4532,43 +4261,39 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:87
 msgid ""
-"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto "
-"Crypto`_ for their help during the event."
+"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto Crypto`_ "
+"for their help during the event."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:91
 msgid ""
-"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV "
-"and doing all of the post-production\n"
+"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV and doing all of the post-production\n"
 "work for the videos of all the talks."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:96
 msgid ""
-"I would like to thank `@killyourtv_i2p`_ for hosting a very popular "
-"crypto party station."
+"I would like to thank `@killyourtv_i2p`_ for hosting a very popular crypto "
+"party station."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:100
 msgid ""
-"Thanks to our new favorite journalist `@robinlevinson`_, for showing an "
-"interest in our cause and\n"
+"Thanks to our new favorite journalist `@robinlevinson`_, for showing an interest in our cause and\n"
 "educating yourself about the technologies involved."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:105
 msgid ""
-"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very "
-"much made this event better."
+"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very much "
+"made this event better."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:109
 msgid ""
-"Finally I would like to thank everyone else who just showed up to the "
-"event and helped out in any way\n"
+"Finally I would like to thank everyone else who just showed up to the event and helped out in any way\n"
 "they could.\n"
-"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was "
-"most excellent to hang out\n"
+"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was most excellent to hang out\n"
 "with you."
 msgstr ""
 
@@ -4585,25 +4310,11 @@ msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:13
 msgid ""
-"0.9.22 contains fixes for i2psnark getting stuck before completion, and "
-"begins the migration of router infos to new, stronger Ed25519 signatures."
-"\n"
-"To reduce network churn, your router will have only a small probability "
-"of converting to Ed25519 at each restart.\n"
-"When it does rekey, expect to see lower bandwidth usage for a couple of "
-"days as it reintegrates into the network with its new identity.\n"
-"If all goes well, we will accelerate the rekeying process in the next "
-"release."
-msgstr ""
-"0.9.22 contains fixes for i2psnark getting stuck before completion, and "
-"begins the migration of router infos to new, stronger Ed25519 signatures."
-"\n"
-"To reduce network churn, your router will have only a small probability "
-"of converting to Ed25519 at each restart.\n"
-"When it does rekey, expect to see lower bandwidth usage for a couple of "
-"days as it reintegrates into the network with its new identity.\n"
-"If all goes well, we will accelerate the rekeying process in the next "
-"release."
+"0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\n"
+"To reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\n"
+"When it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\n"
+"If all goes well, we will accelerate the rekeying process in the next release."
+msgstr "0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\nTo reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\nWhen it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\nIf all goes well, we will accelerate the rekeying process in the next release."
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:20
 msgid ""
@@ -4621,14 +4332,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:46
 msgid ""
-"Fix i2psnark getting stuck before download complete, and not deleting "
-"temp files"
+"Fix i2psnark getting stuck before download complete, and not deleting temp "
+"files"
 msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:47
 msgid ""
-"Fix starting of torrents added by copying torrent file to i2psnark "
-"directory"
+"Fix starting of torrents added by copying torrent file to i2psnark directory"
 msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:48
@@ -4657,10 +4367,8 @@ msgstr ""
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:15
 msgid ""
 "Greetings!\n"
-"This is the first in a long series of blogs to help the community see "
-"what is happening in the I2P community.\n"
-"Since many awesome events are happening *inside* the network, we think it"
-" will be worthwhile to talk about some of activities here."
+"This is the first in a long series of blogs to help the community see what is happening in the I2P community.\n"
+"Since many awesome events are happening *inside* the network, we think it will be worthwhile to talk about some of activities here."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:21
@@ -4671,16 +4379,14 @@ msgstr ""
 msgid ""
 "Let's face it -- our console needs improvement.\n"
 "Our site could use an update as well.\n"
-"We are looking for feedback on how to improve the usability of I2P for "
-"new and existing users!"
+"We are looking for feedback on how to improve the usability of I2P for new and existing users!"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:29
 msgid ""
 "Any and all feedback is welcome.\n"
 "Please contact `@GetI2P`_, `@str4d`_, or `@YrB1rd`_.\n"
-"If you don't feel comfortable using Twitter, we are always available via "
-"the in-network IRC channel.\n"
+"If you don't feel comfortable using Twitter, we are always available via the in-network IRC channel.\n"
 "You don't have to be a long time user.\n"
 "We want to hear from all sorts of people!"
 msgstr ""
@@ -4692,36 +4398,27 @@ msgstr ""
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:43
 msgid ""
 "On 03 November there was an I2P developer meeting (`log`_).\n"
-"This meeting focused on adding new links to the router console, "
-"preparation for CCC, finding a replacement for forum.i2p, and website "
-"improvements."
+"This meeting focused on adding new links to the router console, preparation for CCC, finding a replacement for forum.i2p, and website improvements."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:50
 msgid ""
 "The consensus was to not add dogecoindark.i2p.\n"
-"There are concerns about usability due to many images being included on "
-"the page.\n"
-"Exchanged.i2p is conditionally added, as long as the maintainer adds a "
-"disclaimer on the site.\n"
-"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was "
-"lenta.i2p (a russian news site)."
+"There are concerns about usability due to many images being included on the page.\n"
+"Exchanged.i2p is conditionally added, as long as the maintainer adds a disclaimer on the site.\n"
+"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was lenta.i2p (a russian news site)."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:57
 msgid ""
-"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used"
-" for developer's services.\n"
-"He also suggested a more formalized technical proposal system, with more "
-"prominence on the main website."
+"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used for developer's services.\n"
+"He also suggested a more formalized technical proposal system, with more prominence on the main website."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:62
 msgid ""
-"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos "
-"Computer Congress.\n"
-"More details are to come on this, but we can promise there will be "
-"stickers."
+"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos Computer Congress.\n"
+"More details are to come on this, but we can promise there will be stickers."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:67
@@ -4729,13 +4426,14 @@ msgid "General Announcements"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:69
-msgid "Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!"
+msgid ""
+"Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:75
 msgid ""
-"Translation deadline Thursday, 12 November, translators please update. "
-"All translations are done via `Transifex`_ ."
+"Translation deadline Thursday, 12 November, translators please update. All "
+"translations are done via `Transifex`_ ."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:1
@@ -4753,15 +4451,10 @@ msgstr "0.9.23 는 여러 버그 픽스와 함께 I2PSnark의 작은 성능향
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:13
 msgid ""
-"Hello I2P! This is the first release signed by me (str4d), after 49 "
-"releases\n"
-"signed by zzz. This is an important test of our redundancy for all "
-"things,\n"
+"Hello I2P! This is the first release signed by me (str4d), after 49 releases\n"
+"signed by zzz. This is an important test of our redundancy for all things,\n"
 "including people."
-msgstr ""
-"안녕하세요! I2P 사용자 여러분. 이 릴리즈는 제가 서명한 첫번째 릴리즈입니다 (str4d). zzz가 서명한 49개의 릴리즈를 "
-"거쳐서 말이죠. \n"
-"이는 모든것에 대한 정리, 감원에 중요한 테스트가 될 것입니다. 사람들을 포함해서요."
+msgstr "안녕하세요! I2P 사용자 여러분. 이 릴리즈는 제가 서명한 첫번째 릴리즈입니다 (str4d). zzz가 서명한 49개의 릴리즈를 거쳐서 말이죠. \n이는 모든것에 대한 정리, 감원에 중요한 테스트가 될 것입니다. 사람들을 포함해서요."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:19
 msgid "Housekeeping"
@@ -4769,25 +4462,18 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:24
 msgid ""
-"My signing key has been in router updates for over two years (since "
-"0.9.9), so\n"
-"if you are on a recent version of I2P this update should be just as easy "
-"as\n"
-"every other update. However, if you are running an older version than "
-"0.9.9, you\n"
-"will first need to manually update to a recent version. Update files for "
-"recent\n"
-"versions `can be downloaded here`__, and instructions on how to manually "
-"update\n"
-"`are provided here`__. Once you have manually updated, your router will "
-"then find\n"
+"My signing key has been in router updates for over two years (since 0.9.9), so\n"
+"if you are on a recent version of I2P this update should be just as easy as\n"
+"every other update. However, if you are running an older version than 0.9.9, you\n"
+"will first need to manually update to a recent version. Update files for recent\n"
+"versions `can be downloaded here`__, and instructions on how to manually update\n"
+"`are provided here`__. Once you have manually updated, your router will then find\n"
 "and download the 0.9.23 update as usual."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:38
 msgid ""
-"If you installed I2P via a package manager, you are not affected by the "
-"change,\n"
+"If you installed I2P via a package manager, you are not affected by the change,\n"
 "and can update as usual."
 msgstr "만약 패키지 관리자를 통해 I2P를 설치했다면, 그냥 평소대로 업데이트 하시면 됩니다."
 
@@ -4799,50 +4485,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:48
 msgid ""
-"The migration of RouterInfos to new, stronger Ed25519 signatures is going"
-" well,\n"
-"with at least half of the network already estimated to have rekeyed. This"
-"\n"
-"release accelerates the rekeying process. To reduce network churn, your "
-"router\n"
-"will have a small probability of converting to Ed25519 at each restart. "
-"When it\n"
-"does rekey, expect to see lower bandwidth usage for a couple of days as "
-"it\n"
-"reintegrates into the network with its new identity."
-msgstr ""
-"The migration of RouterInfos to new, stronger Ed25519 signatures is going"
-" well,\n"
-"with at least half of the network already estimated to have rekeyed. This"
-"\n"
-"release accelerates the rekeying process. To reduce network churn, your "
-"router\n"
-"will have a small probability of converting to Ed25519 at each restart. "
-"When it\n"
-"does rekey, expect to see lower bandwidth usage for a couple of days as "
-"it\n"
+"The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\n"
+"with at least half of the network already estimated to have rekeyed. This\n"
+"release accelerates the rekeying process. To reduce network churn, your router\n"
+"will have a small probability of converting to Ed25519 at each restart. When it\n"
+"does rekey, expect to see lower bandwidth usage for a couple of days as it\n"
 "reintegrates into the network with its new identity."
+msgstr "The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\nwith at least half of the network already estimated to have rekeyed. This\nrelease accelerates the rekeying process. To reduce network churn, your router\nwill have a small probability of converting to Ed25519 at each restart. When it\ndoes rekey, expect to see lower bandwidth usage for a couple of days as it\nreintegrates into the network with its new identity."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:57
 msgid ""
-"Note that this will be the last release to support Java 6. Please update "
-"to\n"
-"Java 7 or 8 as soon as possible. We are already working to make I2P "
-"compatible\n"
+"Note that this will be the last release to support Java 6. Please update to\n"
+"Java 7 or 8 as soon as possible. We are already working to make I2P compatible\n"
 "with the upcoming Java 9, and some of that work is in this release."
-msgstr ""
-"이 릴리즈는 Java 6를 지원하는 마지막 릴리즈가 될 것입니다. Java 7 혹은 8로 \n"
-"빠른 시일안에 업데이트 해주세요. 우리는 곧 나올 Java 9에 I2P가 호환 가능하도록 \n"
-"하는 작업을 이미 시작했으며, 일부는 이 릴리즈에 포함되었습니다."
+msgstr "이 릴리즈는 Java 6를 지원하는 마지막 릴리즈가 될 것입니다. Java 7 혹은 8로 \n빠른 시일안에 업데이트 해주세요. 우리는 곧 나올 Java 9에 I2P가 호환 가능하도록 \n하는 작업을 이미 시작했으며, 일부는 이 릴리즈에 포함되었습니다."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:63
 msgid ""
-"We have also made some minor improvements in I2PSnark, and added a new "
-"page in\n"
+"We have also made some minor improvements in I2PSnark, and added a new page in\n"
 "the routerconsole for viewing older news items."
-msgstr ""
-"우리는 I2PSnark에 사소한 개선을 했으며, routerconsole에 이전 뉴스 항목을 볼 수 있게 \n"
-"새로운 페이지를 추가했습니다."
+msgstr "우리는 I2PSnark에 사소한 개선을 했으며, routerconsole에 이전 뉴스 항목을 볼 수 있게 \n새로운 페이지를 추가했습니다."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:78
 msgid "Accelerate transition to Ed25519"
@@ -4850,14 +4512,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:83
 msgid ""
-"Fix some bugs soft restarting after a large clock shift (e.g. resume) "
-"(but more to do)"
+"Fix some bugs soft restarting after a large clock shift (e.g. resume) (but "
+"more to do)"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:84
 msgid ""
-"Fix streaming retransmission timers that were dying, and related timer "
-"bugs"
+"Fix streaming retransmission timers that were dying, and related timer bugs"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:85
@@ -4901,7 +4562,8 @@ msgid "Detect for broken ECDSA support in Gentoo"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:98
-msgid "Console: Add a Java 6 warning, this is the last release to support Java 6"
+msgid ""
+"Console: Add a Java 6 warning, this is the last release to support Java 6"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:99
@@ -4910,8 +4572,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:100
 msgid ""
-"Pass Accept-Encoding header through client and server proxies, to allow "
-"end-to-end compression"
+"Pass Accept-Encoding header through client and server proxies, to allow end-"
+"to-end compression"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:103
@@ -4927,7 +4589,8 @@ msgid "Save magnet parameters across restart"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:106
-msgid "Don't delete .torrent file on errors at startup, rename to .torrent.BAD"
+msgid ""
+"Don't delete .torrent file on errors at startup, rename to .torrent.BAD"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:107
@@ -4959,8 +4622,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:13
 msgid ""
-"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and "
-"eche|on."
+"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and eche|on."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:17
@@ -4968,21 +4630,15 @@ msgid ""
 "Start\n"
 "=====\n"
 "The project has had another successful year at CCC.\n"
-"We would like to thank the volunteers at `32C3`__ for all of their help "
-"in organizing this event and for being accommodating hosts for us.\n"
-"Many I2P contributors were able to attend this year's Congress due to "
-"many of the generous donations from supporters like you to the project.\n"
-"If you would like to fund I2P, please see `our donation page`__ for more "
-"information."
+"We would like to thank the volunteers at `32C3`__ for all of their help in organizing this event and for being accommodating hosts for us.\n"
+"Many I2P contributors were able to attend this year's Congress due to many of the generous donations from supporters like you to the project.\n"
+"If you would like to fund I2P, please see `our donation page`__ for more information."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:29
 msgid ""
-"Just like previous years we were located in Noisy Square, located near "
-"the EFF's table.\n"
-"This proved to be an ideal spot for us as our table was almost always "
-"busy with current and new users who were interested in I2P, many of whom "
-"we wouldn't have otherwise had the ability to talk to."
+"Just like previous years we were located in Noisy Square, located near the EFF's table.\n"
+"This proved to be an ideal spot for us as our table was almost always busy with current and new users who were interested in I2P, many of whom we wouldn't have otherwise had the ability to talk to."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:63
@@ -4997,13 +4653,10 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:72
 msgid ""
-"If you don't know what a reseed server is, it is first the connection new"
-" routers use to find peers.\n"
-"There was a lot of discussion around the current status of the reseed "
-"network right now.\n"
+"If you don't know what a reseed server is, it is first the connection new routers use to find peers.\n"
+"There was a lot of discussion around the current status of the reseed network right now.\n"
 "As always, more reseed operators are needed!\n"
-"If you would like to strengthen the reseed infrastructure, (or if you're "
-"talented with Go) email `backup -at- i2pmail.org`__."
+"If you would like to strengthen the reseed infrastructure, (or if you're talented with Go) email `backup -at- i2pmail.org`__."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:81
@@ -5014,16 +4667,11 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:86
 msgid ""
-"Due to the decentralized nature of I2P detecting Sybil attacks is not as "
-"straight forward as on other networks (i.e. Tor).\n"
-"To mitigate this zzz has been working on a new router-based Sybil "
-"detection tool.\n"
-"To be brief, the tool runs in the router, and collects information on "
-"floodfills your router is currently aware of.\n"
-"Currently the tool is mainly collecting a baseline and does not act on "
-"any of the information it is collecting.\n"
-"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as "
-"it is still in active development"
+"Due to the decentralized nature of I2P detecting Sybil attacks is not as straight forward as on other networks (i.e. Tor).\n"
+"To mitigate this zzz has been working on a new router-based Sybil detection tool.\n"
+"To be brief, the tool runs in the router, and collects information on floodfills your router is currently aware of.\n"
+"Currently the tool is mainly collecting a baseline and does not act on any of the information it is collecting.\n"
+"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as it is still in active development"
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:94
@@ -5035,21 +4683,15 @@ msgstr ""
 #: i2p2www/blog/2016/01/23/32C3.rst:99
 msgid ""
 "On the 30th we held an in person `meeting`__ at our table.\n"
-"The meeting focused on organizationally preparing for more project "
-"management, and public relations (both from Sadie)."
+"The meeting focused on organizationally preparing for more project management, and public relations (both from Sadie)."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:106
 msgid ""
-"We discussed how much of the work done on I2P is lost in the commits and "
-"there is not much to see for our users.\n"
-"To remedy this lazygravy plans on preparing a series of posts explaining "
-"some technical topics in I2P.\n"
-"The initial ideas that we discussed writing posts on are what encrypted "
-"lease sets are, why different tunnel types are needed, and some "
-"observations seen in `I2Spy`__.\n"
-"But these are just the start and we would like to hear feedback on topics"
-" we should write about!"
+"We discussed how much of the work done on I2P is lost in the commits and there is not much to see for our users.\n"
+"To remedy this lazygravy plans on preparing a series of posts explaining some technical topics in I2P.\n"
+"The initial ideas that we discussed writing posts on are what encrypted lease sets are, why different tunnel types are needed, and some observations seen in `I2Spy`__.\n"
+"But these are just the start and we would like to hear feedback on topics we should write about!"
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:115
@@ -5111,41 +4753,37 @@ msgstr ""
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:11
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:11
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:11
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:11
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:11
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:11
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:11
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:11
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:11
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:11
 msgid "Update details"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:18
 msgid ""
-"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and "
-"efficiency improvements.\n"
+"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and efficiency improvements.\n"
 "Note that this release is the first to require Java 7.\n"
 "Please update to Java 7 or 8 as soon as possible.\n"
 "Your router will not automatically update if you are using Java 6."
-msgstr ""
-"0.9.24 는 새 SAM (v3.2) 과 버그 픽스, 성능향상이 포함됩니다.\n"
-"이 릴리즈는 처음으로 JAVA7을 요구하게 됩니다. \n"
-"JAVA7이나 JAVA8로 업그레이드 하시기 바랍니다.\n"
-"JAVA6을 사용하고 있다면 라우터가 자동으로 업데이트가 되지 않습니다."
+msgstr "0.9.24 는 새 SAM (v3.2) 과 버그 픽스, 성능향상이 포함됩니다.\n이 릴리즈는 처음으로 JAVA7을 요구하게 됩니다. \nJAVA7이나 JAVA8로 업그레이드 하시기 바랍니다.\nJAVA6을 사용하고 있다면 라우터가 자동으로 업데이트가 되지 않습니다."
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:25
 msgid ""
-"To prevent the problems caused by the ancient commons-logging library, we"
-" have removed it.\n"
-"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by "
-"HungryHobo) to crash if they have IMAP enabled.\n"
-"The recommended fix is to replace your old I2P-Bote plugin with the "
-"current one signed by str4d.\n"
+"To prevent the problems caused by the ancient commons-logging library, we have removed it.\n"
+"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by HungryHobo) to crash if they have IMAP enabled.\n"
+"The recommended fix is to replace your old I2P-Bote plugin with the current one signed by str4d.\n"
 "For more details, see `this post`__."
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:34
 msgid ""
-"We had a great `32C3 Congress`__ and are making good progress on our 2016"
-" project plans.\n"
-"Echelon gave a talk on I2P's history and current status, and his slides "
-"are `available here`__ (pdf).\n"
-"Str4d attended `Real World Crypto`__ and gave a talk on our crypto "
-"migration, his slides are `here`__ (pdf)."
+"We had a great `32C3 Congress`__ and are making good progress on our 2016 project plans.\n"
+"Echelon gave a talk on I2P's history and current status, and his slides are `available here`__ (pdf).\n"
+"Str4d attended `Real World Crypto`__ and gave a talk on our crypto migration, his slides are `here`__ (pdf)."
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:58
@@ -5154,8 +4792,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:59
 msgid ""
-"SAM 3.2, with several new advanced features, command parser improvements,"
-" and lots of bug fixes"
+"SAM 3.2, with several new advanced features, command parser improvements, "
+"and lots of bug fixes"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:60
@@ -5180,8 +4818,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:69
 msgid ""
-"Don't remove tunnel on next-hop failure indication from transport, it "
-"isn't reliable"
+"Don't remove tunnel on next-hop failure indication from transport, it isn't "
+"reliable"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:70
@@ -5189,13 +4827,13 @@ msgid "Fix formatting in summary bar to prevent overflow"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:71
-msgid "Fix console links in i2ptunnel error pages when on nonstandard host/port"
+msgid ""
+"Fix console links in i2ptunnel error pages when on nonstandard host/port"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:72
 msgid ""
-"Don't query floodfills whose version is too old to support encrypted "
-"replies"
+"Don't query floodfills whose version is too old to support encrypted replies"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:73
@@ -5242,8 +4880,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:87
 msgid ""
-"Don't offer to introduce unless requested, to introduce only those that "
-"need it"
+"Don't offer to introduce unless requested, to introduce only those that need"
+" it"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:88
@@ -5303,6 +4941,13 @@ msgstr ""
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:64
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:61
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:70
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:60
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:82
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:71
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:88
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:92
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:89
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:61
 msgid "Full list of fixed bugs"
 msgstr ""
 
@@ -5319,26 +4964,17 @@ msgstr "0.9.25 패치는 SAM 3.3, QR codes, 몇가지 버그 픽스를 포함합
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:18
 msgid ""
-"0.9.25 contains a major new version of SAM, v3.3, to support "
-"sophisticated multiprotocol applications.\n"
+"0.9.25 contains a major new version of SAM, v3.3, to support sophisticated multiprotocol applications.\n"
 "It adds QR codes for sharing hidden service addresses with others,\n"
 "and \"identicon\" images for visually distinguishing addresses."
-msgstr ""
-"0.9.25는 복잡한 멀티프로토콜 어플리케이션 지원을 위해, 새 메이저 버전의 SAM, v3.3를 포함합니다.\n"
-"숨겨진 서비스 주소들을 QR코드를 통해 타인과 공유할 수 있고, 주소 구별을 시각적으로 구별하기 위해 \"인식표\" 이미지를 "
-"추가했습니다."
+msgstr "0.9.25는 복잡한 멀티프로토콜 어플리케이션 지원을 위해, 새 메이저 버전의 SAM, v3.3를 포함합니다.\n숨겨진 서비스 주소들을 QR코드를 통해 타인과 공유할 수 있고, 주소 구별을 시각적으로 구별하기 위해 \"인식표\" 이미지를 추가했습니다."
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:24
 msgid ""
 "We've added a new \"router family\" configuration page in the console,\n"
-"to make it easier to declare that your group of routers is run by a "
-"single person.\n"
-"There are several changes to increase the capacity of the network and "
-"hopefully improve tunnel build success."
-msgstr ""
-"우리는 콘솔에 새 \"라우터 제품군\" 페이지를 콘솔에 추가해서,\n"
-"한 사람이 라우터 그룹을 운영하는 것을 쉽게 알아볼 수 있게 했습니다.\n"
-"네트워크의 가용성을 올리고 터널 생성 성공률을 올리기 위해 몇가지 수정이 가해졌습니다."
+"to make it easier to declare that your group of routers is run by a single person.\n"
+"There are several changes to increase the capacity of the network and hopefully improve tunnel build success."
+msgstr "우리는 콘솔에 새 \"라우터 제품군\" 페이지를 콘솔에 추가해서,\n한 사람이 라우터 그룹을 운영하는 것을 쉽게 알아볼 수 있게 했습니다.\n네트워크의 가용성을 올리고 터널 생성 성공률을 올리기 위해 몇가지 수정이 가해졌습니다."
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:40
 msgid "Display of identicons and QR codes in address book and i2ptunnel"
@@ -5430,34 +5066,26 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:11
 msgid ""
 "We are pleased to announce that this summer, I2P will be embarking on a "
-"development program aimed at improving the privacy software ecosystem for"
-" both developers and users."
+"development program aimed at improving the privacy software ecosystem for "
+"both developers and users."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:13
 msgid ""
-"Over the last few years, the need for users to be in control of their own"
-" data\n"
-"has become increasingly apparent. Some excellent progress had been made "
-"in this\n"
-"regard with the rise of messaging apps like Signal_, and file storage "
-"systems\n"
-"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to "
-"the\n"
+"Over the last few years, the need for users to be in control of their own data\n"
+"has become increasingly apparent. Some excellent progress had been made in this\n"
+"regard with the rise of messaging apps like Signal_, and file storage systems\n"
+"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to the\n"
 "whole world is steadily gaining traction."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:21
 msgid ""
-"But building privacy and anonymity into applications is not trivial. Much"
-" of the\n"
-"software people use every day was not designed to be privacy-preserving, "
-"and the\n"
+"But building privacy and anonymity into applications is not trivial. Much of the\n"
+"software people use every day was not designed to be privacy-preserving, and the\n"
 "tools developers have available are generally not easy to work with. The\n"
-"recently-published OnionScan_ survey gives some insight into just how "
-"easy it is\n"
-"for even technical users to mis-configure their services, completely "
-"undermining\n"
+"recently-published OnionScan_ survey gives some insight into just how easy it is\n"
+"for even technical users to mis-configure their services, completely undermining\n"
 "their intentions."
 msgstr ""
 
@@ -5470,16 +5098,14 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:41
 msgid ""
 "We are pleased to announce that this summer, I2P will be embarking on a\n"
-"development program aimed at improving the privacy software ecosystem. "
-"Our goal\n"
-"is to make life easier both for developers wanting to leverage I2P in "
-"their\n"
-"applications, and for users trying to configure and run their apps "
-"through I2P."
+"development program aimed at improving the privacy software ecosystem. Our goal\n"
+"is to make life easier both for developers wanting to leverage I2P in their\n"
+"applications, and for users trying to configure and run their apps through I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:48
-msgid "We will be focusing our time this summer into three complementary areas:"
+msgid ""
+"We will be focusing our time this summer into three complementary areas:"
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:52
@@ -5490,19 +5116,15 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:57
 msgid ""
-"In June, we will be updating the various libraries that exist for "
-"interfacing\n"
-"with I2P. We have made significant progress this year on extending our "
-"SAM_ API\n"
-"with additional features, such as support for datagrams and ports. We "
-"plan to\n"
+"In June, we will be updating the various libraries that exist for interfacing\n"
+"with I2P. We have made significant progress this year on extending our SAM_ API\n"
+"with additional features, such as support for datagrams and ports. We plan to\n"
 "make these features easily accessible in our C++ and Python libraries."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:64
 msgid ""
-"We will also soon be making it much easier for Java and Android "
-"developers to\n"
+"We will also soon be making it much easier for Java and Android developers to\n"
 "add I2P support to their applications. Stay tuned!"
 msgstr ""
 
@@ -5514,18 +5136,12 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:76
 msgid ""
-"In July we will be working with applications that have expressed interest"
-" in\n"
-"adding support for I2P. There are some really neat ideas being developed "
-"in the\n"
-"privacy space right now, and we want to help their communities leverage "
-"over a\n"
-"decade of research and development on peer-to-peer anonymity. Extending "
-"these\n"
-"applications to work natively over I2P is a good step forward for "
-"usability, and\n"
-"in the process will improve how these applications think about and handle"
-" user\n"
+"In July we will be working with applications that have expressed interest in\n"
+"adding support for I2P. There are some really neat ideas being developed in the\n"
+"privacy space right now, and we want to help their communities leverage over a\n"
+"decade of research and development on peer-to-peer anonymity. Extending these\n"
+"applications to work natively over I2P is a good step forward for usability, and\n"
+"in the process will improve how these applications think about and handle user\n"
 "information."
 msgstr ""
 
@@ -5537,12 +5153,9 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:91
 msgid ""
-"Finally, in August we will turn out attention to the apps we bundle "
-"inside I2P,\n"
-"and the wider array of plugins. Some of these are due for some love, to "
-"make\n"
-"them more user-friendly - as well as fix any outstanding bugs! We hope "
-"that\n"
+"Finally, in August we will turn out attention to the apps we bundle inside I2P,\n"
+"and the wider array of plugins. Some of these are due for some love, to make\n"
+"them more user-friendly - as well as fix any outstanding bugs! We hope that\n"
 "longtime I2P supporters will enjoy the outcome of this work."
 msgstr ""
 
@@ -5557,14 +5170,10 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:104
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:131
 msgid ""
-"We have many more ideas for things we'd like to get done in these areas. "
-"If\n"
-"you're interested in hacking on privacy and anonymity software, designing"
-" usable\n"
-"websites or interfaces, or writing guides for users: come and chat with "
-"us on\n"
-"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our "
-"community, both\n"
+"We have many more ideas for things we'd like to get done in these areas. If\n"
+"you're interested in hacking on privacy and anonymity software, designing usable\n"
+"websites or interfaces, or writing guides for users: come and chat with us on\n"
+"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our community, both\n"
 "inside and outside I2P. We'll be sending I2P stickers out to all new\n"
 "contributors taking part (or possibly other pending I2P goodies)!"
 msgstr ""
@@ -5572,24 +5181,18 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:113
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:140
 msgid ""
-"Likewise, if you are an application developer who wants a hand with "
-"integrating\n"
-"I2P, or even just to chat about the concepts or details: get in touch! If"
-" you\n"
-"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ "
-"or\n"
-"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or "
-"FreeNode."
+"Likewise, if you are an application developer who wants a hand with integrating\n"
+"I2P, or even just to chat about the concepts or details: get in touch! If you\n"
+"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ or\n"
+"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or FreeNode."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:120
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:147
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:131
 msgid ""
-"We'll be posting here as we go, but you can also follow our progress, and"
-" share\n"
-"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring"
-" on the\n"
+"We'll be posting here as we go, but you can also follow our progress, and share\n"
+"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring on the\n"
 "summer!"
 msgstr ""
 
@@ -5602,8 +5205,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:11
 msgid ""
-"0.9.26 contains crypto updates, Debian packaging improvements, and bug "
-"fixes"
+"0.9.26 contains crypto updates, Debian packaging improvements, and bug fixes"
 msgstr "0.9.26은 암호화 업데이트, 데비안 패키지 향상, 몇몇 버그 픽스가 포함됩니다."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:13
@@ -5617,36 +5219,22 @@ msgid ""
 "0.9.26 contains a major upgrade to our native crypto library,\n"
 "a new addressbook subscription protocol with signatures,\n"
 "and major improvements to the Debian/Ubuntu packaging."
-msgstr ""
-"0.9.26에는 암호화 라이브러리의 주요 업데이트가 들어가 있습니다.\n"
-"그리고 서명된 새 주소록 구독 프로토콜과, 데비안/안드로이드 패키징에 관한 주요 업데이트가 포함됩니다."
+msgstr "0.9.26에는 암호화 라이브러리의 주요 업데이트가 들어가 있습니다.\n그리고 서명된 새 주소록 구독 프로토콜과, 데비안/안드로이드 패키징에 관한 주요 업데이트가 포함됩니다."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:31
 msgid ""
-"For crypto, we have upgraded to GMP 6.0.0, and added support for newer "
-"processors,\n"
+"For crypto, we have upgraded to GMP 6.0.0, and added support for newer processors,\n"
 "which will speed up crypto operations considerably.\n"
-"Also, we are now using constant-time GMP functions to prevent side-"
-"channel attacks.\n"
-"For caution, the GMP changes are enabled for new installs and "
-"Debian/Ubuntu builds only;\n"
+"Also, we are now using constant-time GMP functions to prevent side-channel attacks.\n"
+"For caution, the GMP changes are enabled for new installs and Debian/Ubuntu builds only;\n"
 "we will include them for in-net updates in the 0.9.27 release."
-msgstr ""
-"암호화에 관련해 말씀드리면 라이브러리를 GMP 6.0.0 버전으로 업그레이드 하였고 새로 나온 프로세서에 대한 지원을 "
-"추가하였습니다.\n"
-"암호화 성능에 많은 도움을 줄것으로 기대됩니다.\n"
-"그리고, side-channel attacks를 막기 위해 GMP의 constant-time 기능을 사용하기로 하였습니다.\n"
-"그러나 이 GMP 변경 사항은 새로 설치하거나 데비안/우분투 빌드에서만 사용 가능합니다.\n"
-"in-net 업데이트에서는 0.9.27에 포함할 것입니다."
+msgstr "암호화에 관련해 말씀드리면 라이브러리를 GMP 6.0.0 버전으로 업그레이드 하였고 새로 나온 프로세서에 대한 지원을 추가하였습니다.\n암호화 성능에 많은 도움을 줄것으로 기대됩니다.\n그리고, side-channel attacks를 막기 위해 GMP의 constant-time 기능을 사용하기로 하였습니다.\n그러나 이 GMP 변경 사항은 새로 설치하거나 데비안/우분투 빌드에서만 사용 가능합니다.\nin-net 업데이트에서는 0.9.27에 포함할 것입니다."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:39
 msgid ""
-"For Debian/Ubuntu builds, we have added dependencies on several packages,"
-"\n"
+"For Debian/Ubuntu builds, we have added dependencies on several packages,\n"
 "including Jetty 8 and geoip, and removed the equivalent bundled code."
-msgstr ""
-"데비안/우분투 빌드에 새로운 의존성 패키지들을 추가했습니다.\n"
-"Jetty 8, geoip를 추가하고 같은 역할을 하던 내장 코드들은 제거했습니다."
+msgstr "데비안/우분투 빌드에 새로운 의존성 패키지들을 추가했습니다.\nJetty 8, geoip를 추가하고 같은 역할을 하던 내장 코드들은 제거했습니다."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:44
 msgid ""
@@ -5656,10 +5244,10 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:59
 msgid ""
-"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant "
-"speedups on newer architectures, and constant-time crypto operations  "
-"(new installs and Debian/Ubuntu builds only, will include in the updates "
-"in the next release, 0.9.27)"
+"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant speedups "
+"on newer architectures, and constant-time crypto operations  (new installs "
+"and Debian/Ubuntu builds only, will include in the updates in the next "
+"release, 0.9.27)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:60
@@ -5672,8 +5260,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:62
 msgid ""
-"Enhance hosts blockfile format to allow for multiple destinations per "
-"entry"
+"Enhance hosts blockfile format to allow for multiple destinations per entry"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:63
@@ -5682,8 +5269,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:64
 msgid ""
-"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu "
-"packages"
+"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu packages"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:65
@@ -5701,8 +5287,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:67
 msgid ""
-"Enhancements to the desktopgui system tray feature, to be enabled by "
-"default in next release"
+"Enhancements to the desktopgui system tray feature, to be enabled by default"
+" in next release"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:68
@@ -5717,8 +5303,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:75
 msgid ""
-"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual"
-" fix)"
+"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual "
+"fix)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:76
@@ -5727,8 +5313,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:77
 msgid ""
-"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 "
-"for manual fix)"
+"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 for "
+"manual fix)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:78
@@ -5749,8 +5335,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:87
 msgid ""
-"Rework resource bundle generation for 20x speedup in build time (requires"
-" gettext version 0.19)"
+"Rework resource bundle generation for 20x speedup in build time (requires "
+"gettext version 0.19)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:1
@@ -5766,10 +5352,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:13
 msgid ""
-"We're nearly half-way into the APIs month of Summer Dev, and making great"
-"\n"
-"progress on a number of fronts. I'm happy to announce that the first of "
-"these is\n"
+"We're nearly half-way into the APIs month of Summer Dev, and making great\n"
+"progress on a number of fronts. I'm happy to announce that the first of these is\n"
 "complete: the I2P client libraries are now available on Maven Central!"
 msgstr ""
 
@@ -5777,10 +5361,8 @@ msgstr ""
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:51
 msgid ""
 "This should make it much simpler for Java developers to use I2P in their\n"
-"applications. Instead of needing to obtain the libraries from a current "
-"install,\n"
-"they can simply add I2P to their dependencies. Upgrading to new versions "
-"will\n"
+"applications. Instead of needing to obtain the libraries from a current install,\n"
+"they can simply add I2P to their dependencies. Upgrading to new versions will\n"
 "similarly be much easier."
 msgstr ""
 
@@ -5804,25 +5386,21 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:39
 msgid ""
-"Add one or both of these to your project's dependencies, and you're good "
-"to go!"
+"Add one or both of these to your project's dependencies, and you're good to "
+"go!"
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:67
 msgid ""
-"For other build systems, see the Maven Central pages for the `core`__ and"
-"\n"
+"For other build systems, see the Maven Central pages for the `core`__ and\n"
 "`streaming`__ libraries."
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:72
 msgid ""
-"Android developers should use the `I2P Android client library`__, which "
-"contains\n"
-"the same libraries along with Android-specific helpers. I'll be updating "
-"it soon\n"
-"to depend on the new I2P libraries, so that cross-platform applications "
-"can work\n"
+"Android developers should use the `I2P Android client library`__, which contains\n"
+"the same libraries along with Android-specific helpers. I'll be updating it soon\n"
+"to depend on the new I2P libraries, so that cross-platform applications can work\n"
 "natively with either I2P Android or desktop I2P."
 msgstr ""
 
@@ -5834,10 +5412,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:89
 msgid ""
-"See our `application development`__ guide for help getting started with "
-"these\n"
-"libraries. You can also chat with us about them in #i2p-dev on IRC. And "
-"if you\n"
+"See our `application development`__ guide for help getting started with these\n"
+"libraries. You can also chat with us about them in #i2p-dev on IRC. And if you\n"
 "do start using them, let us know what you're working on with the hashtag\n"
 "`#I2PSummer`__ on Twitter!"
 msgstr ""
@@ -5851,26 +5427,22 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:11
 msgid ""
-"In the first month of Summer Dev, we have improved the usability of our "
-"APIs for Java, Android, and Python developers."
+"In the first month of Summer Dev, we have improved the usability of our APIs"
+" for Java, Android, and Python developers."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:13
 msgid ""
-"Summer Dev is in full swing: we've been busy greasing wheels, sanding "
-"edges, and\n"
-"tidying the place up. Now it's time for our first roundup, where we bring"
-" you up\n"
+"Summer Dev is in full swing: we've been busy greasing wheels, sanding edges, and\n"
+"tidying the place up. Now it's time for our first roundup, where we bring you up\n"
 "to speed on the progress we are making!"
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:19
 msgid ""
 "\n"
-"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us"
-" the\n"
-"fantastic logo you see above. It adds a cheerful personality to our "
-"development\n"
+"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us the\n"
+"fantastic logo you see above. It adds a cheerful personality to our development\n"
 "program (and is going to look great on t-shirts)."
 msgstr ""
 
@@ -5882,48 +5454,37 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:33
 msgid ""
-"Our goal for this month was to \"blend in\" - to make our APIs and "
-"libraries work\n"
-"within the existing infrastructure of various communities, so that "
-"application\n"
-"developers can work with I2P more efficiently, and users don't need to "
-"worry\n"
+"Our goal for this month was to \"blend in\" - to make our APIs and libraries work\n"
+"within the existing infrastructure of various communities, so that application\n"
+"developers can work with I2P more efficiently, and users don't need to worry\n"
 "about the details."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:43
 msgid ""
-"The I2P client libraries are now available on `Maven Central`__ ! See our"
-"\n"
+"The I2P client libraries are now available on `Maven Central`__ ! See our\n"
 "`previous blog post`__ for full details.\n"
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:58
 msgid ""
-"The `I2P Android client library`__ has also been updated to use the new "
-"I2P\n"
-"libraries. This means that cross-platform applications can work natively "
-"with\n"
+"The `I2P Android client library`__ has also been updated to use the new I2P\n"
+"libraries. This means that cross-platform applications can work natively with\n"
 "either I2P Android or desktop I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:71
 msgid ""
-"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work"
-"\n"
+"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work\n"
 "seamlessly over local, remote, and port-forwarded `SAM APIs`__. See its\n"
-"`documentation`__ for usage instructions, and report any issues on "
-"`GitHub`__."
+"`documentation`__ for usage instructions, and report any issues on `GitHub`__."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:84
 msgid ""
-"The first (beta) version of ``i2psocket`` has been released! This is a "
-"direct\n"
-"replacement for the standard Python ``socket`` library that extends it "
-"with I2P\n"
-"support over the SAM API. See its `GitHub page`__ for usage instructions,"
-" and\n"
+"The first (beta) version of ``i2psocket`` has been released! This is a direct\n"
+"replacement for the standard Python ``socket`` library that extends it with I2P\n"
+"support over the SAM API. See its `GitHub page`__ for usage instructions, and\n"
 "to report any issues."
 msgstr ""
 
@@ -5935,15 +5496,15 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:98
 msgid ""
-"zzz has been hard at work on Syndie, getting a headstart on Plugins "
-"month. You can follow his progress on `the development forum thread`__."
+"zzz has been hard at work on Syndie, getting a headstart on Plugins month. "
+"You can follow his progress on `the development forum thread`__."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:100
 msgid ""
-"psi has been creating an I2P test network using i2pd, and in the process "
-"has found and fixed several i2pd bugs that will improve its compatibility"
-" with Java I2P."
+"psi has been creating an I2P test network using i2pd, and in the process has"
+" found and fixed several i2pd bugs that will improve its compatibility with "
+"Java I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:104
@@ -5954,21 +5515,16 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:109
 msgid ""
-"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a "
-"long time\n"
-"been home to one of the `largest public grids`__, using a patched version"
-" of\n"
-"Tahoe-LAFS. During Apps month we will be helping them with their ongoing "
-"work to\n"
-"add native support for I2P and Tor, so that I2P users can benefit from "
-"all of\n"
+"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a long time\n"
+"been home to one of the `largest public grids`__, using a patched version of\n"
+"Tahoe-LAFS. During Apps month we will be helping them with their ongoing work to\n"
+"add native support for I2P and Tor, so that I2P users can benefit from all of\n"
 "the improvements upstream."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:117
 msgid ""
-"There are several other projects that we will be talking with about their"
-" plans\n"
+"There are several other projects that we will be talking with about their plans\n"
 "for I2P integration, and helping with design. Stay tuned!"
 msgstr ""
 
@@ -5986,16 +5542,9 @@ msgstr "0.9.27 버전은 버그 픽스를 포함하고 있습니다"
 #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:18
 msgid ""
 "0.9.27 contains a number of bug fixes.\n"
-"The updated GMP library for crypto acceleration, which was bundled in the"
-" 0.9.26 release for new installs and Debian builds only, is now included "
-"in the in-network update for 0.9.27.\n"
-"There are improvements in IPv6 transports, SSU peer testing, and hidden "
-"mode."
-msgstr ""
-"0.9.27 은 많은 버그픽스를 포함합니다.\n"
-"이미 0.9.26 버전의 새 설치판과 데비안 빌드에서는 포함되었던 암호화 가속을 위한 GMP 라이브러리 업데이트가 인-네트워크 "
-"업데이트 판에도 포함됩니다.\n"
-"또한 IPv6 프랜스포트, SS 피어 테스팅, 히든 모드의 성능을 향상시켰습니다."
+"The updated GMP library for crypto acceleration, which was bundled in the 0.9.26 release for new installs and Debian builds only, is now included in the in-network update for 0.9.27.\n"
+"There are improvements in IPv6 transports, SSU peer testing, and hidden mode."
+msgstr "0.9.27 은 많은 버그픽스를 포함합니다.\n이미 0.9.26 버전의 새 설치판과 데비안 빌드에서는 포함되었던 암호화 가속을 위한 GMP 라이브러리 업데이트가 인-네트워크 업데이트 판에도 포함됩니다.\n또한 IPv6 프랜스포트, SS 피어 테스팅, 히든 모드의 성능을 향상시켰습니다."
 
 #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:24
 msgid ""
@@ -6092,29 +5641,17 @@ msgstr "0.9.28는 버그 픽스를 포함하고 있습니다"
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:18
 msgid ""
-"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number "
-"of bundled software packages including Jetty.\n"
-"There are fixes for the IPv6 peer testing feature introduced last "
-"release.\n"
-"We continue improvements to detect and block peers that are potentially "
-"malicious.\n"
-"There are preliminary fixes for Java 9, although we do not yet recommend "
-"Java 9 for general use."
-msgstr ""
-"0.9.28에서는 25 Trac이 넘는 Ticket들을 픽스했으며, Jetty를 포함한 많은 수의 소프트웨어 패키지를 업데이트 "
-"하였습니다.\n"
-"해당 픽스들은 지난 릴리즈에 소개됬었던 IPv6 피어 테스트 기능을 위한 것입니다.\n"
-"또한 위험할 수 있는 피어들을 감지하고 차단하는 기능에도 향상을 거듭하고 있습니다.\n"
-"Java 9를 대비한 픽스들도 있으나, 아직까지는 해당 자바 버전을 사용하는것은 권장하지 않습니다."
+"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number of bundled software packages including Jetty.\n"
+"There are fixes for the IPv6 peer testing feature introduced last release.\n"
+"We continue improvements to detect and block peers that are potentially malicious.\n"
+"There are preliminary fixes for Java 9, although we do not yet recommend Java 9 for general use."
+msgstr "0.9.28에서는 25 Trac이 넘는 Ticket들을 픽스했으며, Jetty를 포함한 많은 수의 소프트웨어 패키지를 업데이트 하였습니다.\n해당 픽스들은 지난 릴리즈에 소개됬었던 IPv6 피어 테스트 기능을 위한 것입니다.\n또한 위험할 수 있는 피어들을 감지하고 차단하는 기능에도 향상을 거듭하고 있습니다.\nJava 9를 대비한 픽스들도 있으나, 아직까지는 해당 자바 버전을 사용하는것은 권장하지 않습니다."
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:25
 msgid ""
-"I2P will be at 33C3, please stop by our table and give us your ideas on "
-"how to improve the network.\n"
+"I2P will be at 33C3, please stop by our table and give us your ideas on how to improve the network.\n"
 "We will review our 2017 roadmap and priorities 2017 at the Congress."
-msgstr ""
-"I2P팀이 33C3에 참가합니다. 저희 테이블에 들리셔서 네트워크를 향상할 수 있는 좋은 아이디어들을 들려주세요.\n"
-"회의에서 저희의 2017년 로드맵과 개발 우선순위에 대해 리뷰할 것입니다."
+msgstr "I2P팀이 33C3에 참가합니다. 저희 테이블에 들리셔서 네트워크를 향상할 수 있는 좋은 아이디어들을 들려주세요.\n회의에서 저희의 2017년 로드맵과 개발 우선순위에 대해 리뷰할 것입니다."
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:50
 msgid "Fix version test for SSU IPv6 peer testing"
@@ -6289,22 +5826,13 @@ msgstr "0.9.29는 버그 픽스를 포함합니다"
 
 #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:18
 msgid ""
-"0.9.29 contains fixes for numerous Trac tickets, including workarounds "
-"for corrupt compressed messages.\n"
+"0.9.29 contains fixes for numerous Trac tickets, including workarounds for corrupt compressed messages.\n"
 "We now support NTP over IPv6.\n"
 "We've added preliminary Docker support.\n"
 "We now have translated man pages.\n"
 "We now pass same-origin Referer headers through the HTTP proxy.\n"
-"There are more fixes for Java 9, although we do not yet recommend Java 9 "
-"for general use."
-msgstr ""
-"0.9.29에서는 corrupt compressed messages에 대한 대책 등, Trac ticket에 관한 버그를 "
-"수정했습니다.\n"
-"이제 IPv6 NTP를 지원합니다.\n"
-"preliminary Docker를 지원합니다.\n"
-"번역된 man page를 지원합니다.\n"
-"HTTP proxy를 통한 same-origin Referer headers를 여과하지 않습니다.\n"
-"Java 9를 위한 몇가지 픽스들을 포함합니다만 아직 일반적인 용도의 사용을 권장하지는 않습니다."
+"There are more fixes for Java 9, although we do not yet recommend Java 9 for general use."
+msgstr "0.9.29에서는 corrupt compressed messages에 대한 대책 등, Trac ticket에 관한 버그를 수정했습니다.\n이제 IPv6 NTP를 지원합니다.\npreliminary Docker를 지원합니다.\n번역된 man page를 지원합니다.\nHTTP proxy를 통한 same-origin Referer headers를 여과하지 않습니다.\nJava 9를 위한 몇가지 픽스들을 포함합니다만 아직 일반적인 용도의 사용을 권장하지는 않습니다."
 
 #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:37
 msgid "BOB database refactor"
@@ -6415,11 +5943,9 @@ msgstr ""
 
 #: i2p2www/blog/2017/03/04/0.9.29-Windows-Installer-Fix.rst:18
 msgid ""
-"The 0.9.29 Windows installer posted on our website two days ago fails "
-"during install with an Exception.\n"
+"The 0.9.29 Windows installer posted on our website two days ago fails during install with an Exception.\n"
 "We have fixed the bug and posted the new installer to our website.\n"
-"This does not affect upgrades from previous releases or non-Windows "
-"installers.\n"
+"This does not affect upgrades from previous releases or non-Windows installers.\n"
 "We apologize for the issue."
 msgstr ""
 
@@ -6437,52 +5963,39 @@ msgstr ""
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:18
 msgid ""
 "0.9.30 contains an upgrade to Jetty 9 and Tomcat 8.\n"
-"The previous versions are no longer supported, and are not available in "
-"the upcoming Debian Stretch and Ubuntu Zesty releases."
+"The previous versions are no longer supported, and are not available in the upcoming Debian Stretch and Ubuntu Zesty releases."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:23
 msgid ""
-"The router will migrate the jetty.xml configuration file for each Jetty "
-"website to the new Jetty 9 setup.\n"
-"This should work for recent, unmodified configurations but may not work "
-"for modified or very old setups.\n"
-"Verify that your Jetty website works after upgrading, and contact us on "
-"IRC if you need assistance."
+"The router will migrate the jetty.xml configuration file for each Jetty website to the new Jetty 9 setup.\n"
+"This should work for recent, unmodified configurations but may not work for modified or very old setups.\n"
+"Verify that your Jetty website works after upgrading, and contact us on IRC if you need assistance."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:29
 msgid ""
 "Several plugins are not compatible with Jetty 9 and must be updated.\n"
-"The following plugins have been updated to work with 0.9.30, and your "
-"router should update them after restart:"
+"The following plugins have been updated to work with 0.9.30, and your router should update them after restart:"
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:35
 msgid ""
-"The following plugins (with current versions listed) will not work with "
-"0.9.30.\n"
+"The following plugins (with current versions listed) will not work with 0.9.30.\n"
 "Contact the appropriate plugin developer for the status of new versions:"
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:41
 msgid ""
-"This release also supports migration of old (2014 and earlier) DSA-SHA1 "
-"hidden services to the more-secure EdDSA signature type.\n"
-"See http://zzz.i2p/topics/2271 for further information, including a guide"
-" and FAQ."
+"This release also supports migration of old (2014 and earlier) DSA-SHA1 hidden services to the more-secure EdDSA signature type.\n"
+"See http://zzz.i2p/topics/2271 for further information, including a guide and FAQ."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:46
 msgid ""
-"Note: On non-Android ARM platforms such as the Raspberry Pi, the "
-"blockfile database will upgrade on restart, which may take several "
-"minutes.\n"
+"Note: On non-Android ARM platforms such as the Raspberry Pi, the blockfile database will upgrade on restart, which may take several minutes.\n"
 "Please be patient."
-msgstr ""
-"알림: Raspberry Pi와 같은 비 안드로이드 ARM 플랫폼에서, 블록파일 데이터베이스가 재시작시에 실행되며, 몇 분 정도 "
-"걸릴 수 있습니다.\n"
-"인내심을 가져주세요."
+msgstr "알림: Raspberry Pi와 같은 비 안드로이드 ARM 플랫폼에서, 블록파일 데이터베이스가 재시작시에 실행되며, 몇 분 정도 걸릴 수 있습니다.\n인내심을 가져주세요."
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:61
 msgid "Jetty 9, Tomcat 8"
@@ -6593,41 +6106,32 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:11
 msgid ""
-"This year's Summer Dev will be focused on metrics collection and "
-"performance improvements for the network."
+"This year's Summer Dev will be focused on metrics collection and performance"
+" improvements for the network."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:13
 msgid ""
 "It's that time of year again! We're embarking on our summer development\n"
-"programme, where we focus on a particular aspect of I2P to push it "
-"forward. For\n"
-"the next three months, we'll be encouraging both new contributors and "
-"existing\n"
+"programme, where we focus on a particular aspect of I2P to push it forward. For\n"
+"the next three months, we'll be encouraging both new contributors and existing\n"
 "community members to pick a task and have fun with it!"
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:20
 msgid ""
-"`Last year`__, we focused on helping users and developers leverage I2P, "
-"by\n"
-"improving API tooling and giving some love to applications that run over "
-"I2P.\n"
-"This year, we want to improve the user experience by working on an aspect"
-" that\n"
+"`Last year`__, we focused on helping users and developers leverage I2P, by\n"
+"improving API tooling and giving some love to applications that run over I2P.\n"
+"This year, we want to improve the user experience by working on an aspect that\n"
 "affects everyone: performance."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:29
 msgid ""
-"Despite onion-routing networks often being called \"low-latency\" "
-"networks, there\n"
-"is significant overhead created by routing traffic through additional "
-"computers.\n"
-"I2P's unidirectional tunnel design means that by default, a round trip "
-"between\n"
-"two Destinations will involve twelve participants! Improving the "
-"performance of\n"
+"Despite onion-routing networks often being called \"low-latency\" networks, there\n"
+"is significant overhead created by routing traffic through additional computers.\n"
+"I2P's unidirectional tunnel design means that by default, a round trip between\n"
+"two Destinations will involve twelve participants! Improving the performance of\n"
 "these participants will help to both reduce the latency of end-to-end\n"
 "connections [1]_, and increase the quality of tunnels network-wide."
 msgstr ""
@@ -6650,11 +6154,9 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:52
 msgid ""
-"We can't tell if we improve performance without a baseline! We'll be "
-"creating a\n"
+"We can't tell if we improve performance without a baseline! We'll be creating a\n"
 "metrics system for collecting usage and performance data about I2P in a\n"
-"privacy-preserving way, as well as porting various benchmarking tools to "
-"run\n"
+"privacy-preserving way, as well as porting various benchmarking tools to run\n"
 "over I2P (e.g. iperf3_)."
 msgstr ""
 
@@ -6666,10 +6168,8 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:66
 msgid ""
-"There's a lot of scope for improving the performance of our existing "
-"code, to\n"
-"e.g. reduce the overhead of participating in tunnels. We will be looking "
-"at\n"
+"There's a lot of scope for improving the performance of our existing code, to\n"
+"e.g. reduce the overhead of participating in tunnels. We will be looking at\n"
 "potential improvements to:"
 msgstr ""
 
@@ -6699,14 +6199,10 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:86
 msgid ""
-"We have several open proposals for improving the scalability of the I2P "
-"network\n"
-"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We "
-"will be\n"
-"working on these proposals, and begin implementing the finalised ones in "
-"the\n"
-"various network routers. The more feedback these proposals receive, the "
-"sooner\n"
+"We have several open proposals for improving the scalability of the I2P network\n"
+"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We will be\n"
+"working on these proposals, and begin implementing the finalised ones in the\n"
+"various network routers. The more feedback these proposals receive, the sooner\n"
 "we can roll them out, and the sooner I2P services can start using them!"
 msgstr ""
 
@@ -6718,46 +6214,36 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:106
 msgid ""
-"I2P is a packet-switched network, like the internet it runs on top of. "
-"This\n"
-"gives us significant flexibility in how we route packets, both for "
-"performance\n"
+"I2P is a packet-switched network, like the internet it runs on top of. This\n"
+"gives us significant flexibility in how we route packets, both for performance\n"
 "and privacy. The majority of this flexibility is unexplored! We want to\n"
-"encourage research into how various clearnet techniques for improving "
-"bandwidth\n"
+"encourage research into how various clearnet techniques for improving bandwidth\n"
 "can be applied to I2P, and how they might affect the privacy of network\n"
 "participants."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:120
 msgid ""
-"We have many more ideas for things we'd like to get done in these areas. "
-"If\n"
-"you're interested in hacking on privacy and anonymity software, designing"
-"\n"
-"protocols (cryptographic or otherwise), or researching future ideas - "
-"come and\n"
-"chat with us on IRC or Twitter! We are always happy to welcome newcomers "
-"into\n"
-"our community, both inside and outside the I2P network. We'll also be "
-"sending\n"
-"I2P stickers out to all new contributors taking part! If you want to chat"
-" about\n"
-"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You"
-" can\n"
+"We have many more ideas for things we'd like to get done in these areas. If\n"
+"you're interested in hacking on privacy and anonymity software, designing\n"
+"protocols (cryptographic or otherwise), or researching future ideas - come and\n"
+"chat with us on IRC or Twitter! We are always happy to welcome newcomers into\n"
+"our community, both inside and outside the I2P network. We'll also be sending\n"
+"I2P stickers out to all new contributors taking part! If you want to chat about\n"
+"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You can\n"
 "also find us in #i2p-dev on OFTC or Freenode."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:142
 msgid ""
-"Low-latency onion-routing networks are vulnerable to traffic confirmation"
-" attacks, so it would be reasonable to ask whether improved performance "
+"Low-latency onion-routing networks are vulnerable to traffic confirmation "
+"attacks, so it would be reasonable to ask whether improved performance "
 "equates to reduced privacy. Some latency can help privacy if applied "
 "correctly via random delays or batching (neither of which are currently "
-"employed by any general-purpose onion-routing network). However, if a "
-"tunnel has uniform overall latency, then traffic confirmation attacks "
-"should be just as viable with or without that latency; thus there should "
-"be little statistical difference when the latency is reduced uniformly."
+"employed by any general-purpose onion-routing network). However, if a tunnel"
+" has uniform overall latency, then traffic confirmation attacks should be "
+"just as viable with or without that latency; thus there should be little "
+"statistical difference when the latency is reduced uniformly."
 msgstr ""
 
 #: i2p2www/blog/2017/08/07/0.9.31-Release.rst:1
@@ -6777,8 +6263,7 @@ msgid ""
 "We have refreshed the router console to make it easier to understand,\n"
 "improve accessibility and cross-browser support,\n"
 "and generally tidy things up.\n"
-"This is the first step in a longer-term plan to make the router console "
-"more user-friendly.\n"
+"This is the first step in a longer-term plan to make the router console more user-friendly.\n"
 "We have also added torrent ratings and comments support to i2psnark."
 msgstr ""
 
@@ -6848,16 +6333,10 @@ msgstr ""
 
 #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:18
 msgid ""
-"0.9.32 contains a number of fixes in the router console and associated "
-"webapps (addressbook, i2psnark, and susimail).\n"
-"We have also changed the way we handle configured hostnames for published"
-" router infos, to eliminate some network enumeration attacks via DNS.\n"
+"0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail).\n"
+"We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS.\n"
 "We have added some checks in the console to resist rebinding attacks."
-msgstr ""
-"0.9.32는 라우터 콘솔 그리고 관련된 웹 앱 (주소록, i2psnark, susimail)의 수정을 포함합니다.\n"
-"또한 DNS를 통한 몇몇 네트워크 열거 공격을 제거하기 위해, 게시된 라우터 정보를 위해 설정된 호스트 이름을 처리하는 방법을 "
-"변경했습니다.\n"
-"리바인딩 공격에 저항하기 위해 콘솔에 몇몇 검사들을 추가했습니다."
+msgstr "0.9.32는 라우터 콘솔 그리고 관련된 웹 앱 (주소록, i2psnark, susimail)의 수정을 포함합니다.\n또한 DNS를 통한 몇몇 네트워크 열거 공격을 제거하기 위해, 게시된 라우터 정보를 위해 설정된 호스트 이름을 처리하는 방법을 변경했습니다.\n리바인딩 공격에 저항하기 위해 콘솔에 몇몇 검사들을 추가했습니다."
 
 #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:34
 msgid "Disallow hostnames in router addresses (proposal 141)"
@@ -6897,18 +6376,11 @@ msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:17
 msgid ""
-"0.9.33 contains a large number of bug fixes, including i2psnark, "
-"i2ptunnel, streaming, and SusiMail.\n"
-"For those who cannot access the reseed sites directly, we now support "
-"several types of proxies for reseeding.\n"
+"0.9.33 contains a large number of bug fixes, including i2psnark, i2ptunnel, streaming, and SusiMail.\n"
+"For those who cannot access the reseed sites directly, we now support several types of proxies for reseeding.\n"
 "We now set rate limits by default in the hidden services manager.\n"
-"For those that run high-traffic servers, please review and adjust the "
-"limits as necessary."
-msgstr ""
-"0.9.33은 i2psnark, i2ptunnel, 스트리밍, SusiMail을 포함한 많은 수의 버그 수정을 포함합니다.\n"
-"재시딩된 사이트를 바로 접근하지 못하는 분들을 위해, 이제 재시딩을 위한 여러 종류의 프록시를 지원합니다.\n"
-"히든 서비스 매니저는 이제 전송 제한을 기본으로 설정합니다.\n"
-"높은 트래픽 서버들을 운영하는 경우, 검토 후에 필요에 맞게 다시 제한을 조절하시기 바랍니다."
+"For those that run high-traffic servers, please review and adjust the limits as necessary."
+msgstr "0.9.33은 i2psnark, i2ptunnel, 스트리밍, SusiMail을 포함한 많은 수의 버그 수정을 포함합니다.\n재시딩된 사이트를 바로 접근하지 못하는 분들을 위해, 이제 재시딩을 위한 여러 종류의 프록시를 지원합니다.\n히든 서비스 매니저는 이제 전송 제한을 기본으로 설정합니다.\n높은 트래픽 서버들을 운영하는 경우, 검토 후에 필요에 맞게 다시 제한을 조절하시기 바랍니다."
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:34
 msgid "DesktopGui: Enable on OSX"
@@ -6995,7 +6467,8 @@ msgid "SusiMail: Fix several issues when using multiple browser tabs"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:62
-msgid "SusuMail: Fix bugs corrupting text attachments and large message bodies"
+msgid ""
+"SusuMail: Fix bugs corrupting text attachments and large message bodies"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:63
@@ -7062,8 +6535,7 @@ msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:83
 msgid ""
-"Debian: Remove ecj dependency; replace glassfish with libtaglibs where "
-"able"
+"Debian: Remove ecj dependency; replace glassfish with libtaglibs where able"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:84
@@ -7133,12 +6605,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:13
 msgid ""
-"One of the many things we discussed at 34C3 was what we should focus on "
-"for the\n"
-"coming year. In particular, we wanted a roadmap that was clear about what"
-" we\n"
-"want to ensure we get done, vs what would be really nice to have, and be "
-"able to\n"
+"One of the many things we discussed at 34C3 was what we should focus on for the\n"
+"coming year. In particular, we wanted a roadmap that was clear about what we\n"
+"want to ensure we get done, vs what would be really nice to have, and be able to\n"
 "help onboard newcomers to either category. Here is what we came up with:"
 msgstr ""
 
@@ -7150,14 +6619,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:25
 msgid ""
-"Many of the current primitives and protocols still retain their original "
-"designs\n"
-"from circa 2005, and need improvement. We have had a number of open "
-"proposals\n"
-"for several years with ideas, but forward progress has been slow. We all "
-"agreed\n"
-"that this needs to be our top priority for 2018. The core components are:"
-"\n"
+"Many of the current primitives and protocols still retain their original designs\n"
+"from circa 2005, and need improvement. We have had a number of open proposals\n"
+"for several years with ideas, but forward progress has been slow. We all agreed\n"
+"that this needs to be our top priority for 2018. The core components are:\n"
 "\n"
 "- New transport protocols (to replace NTCP and SSU). See Prop111_.\n"
 "- New onion-encryption protocol for building and using tunnels.\n"
@@ -7176,8 +6641,7 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:50
 msgid ""
-"We cannot release new protocol specifications across the entire network "
-"without\n"
+"We cannot release new protocol specifications across the entire network without\n"
 "work on all of these areas."
 msgstr ""
 
@@ -7189,31 +6653,24 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:60
 msgid ""
-"One of the benefits of starting the above work now, is that over the last"
-" few\n"
+"One of the benefits of starting the above work now, is that over the last few\n"
 "years there have been independent efforts to create simple protocols and\n"
-"protocol frameworks that achieve many of the aims we have for our own "
-"protocols,\n"
-"and have gained traction with the wider community. By leveraging this "
-"work, we\n"
+"protocol frameworks that achieve many of the aims we have for our own protocols,\n"
+"and have gained traction with the wider community. By leveraging this work, we\n"
 "get a \"force multiplier\" effect:\n"
 "\n"
-"- We benefit from protocol designs, security proofs, and code written by "
-"others,\n"
+"- We benefit from protocol designs, security proofs, and code written by others,\n"
 "  reducing the amount of work we need to do for the same level of\n"
 "  feature-completeness and security assurances.\n"
 "\n"
-"- Work we do can be leveraged by other communities, increasing their "
-"interest in\n"
+"- Work we do can be leveraged by other communities, increasing their interest in\n"
 "  collaborating with us, and thinking about I2P as a whole."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:76
 msgid ""
-"My proposals in particular will be leveraging the `Noise Protocol "
-"Framework`_,\n"
-"and the `SPHINX packet format`_. I have collaborations lined up with "
-"several\n"
+"My proposals in particular will be leveraging the `Noise Protocol Framework`_,\n"
+"and the `SPHINX packet format`_. I have collaborations lined up with several\n"
 "people outside I2P for these!"
 msgstr ""
 
@@ -7225,16 +6682,11 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:90
 msgid ""
-"On that topic, we've been slowly building interest over the last six "
-"months or\n"
-"so. Across PETS2017, 34C3, and RWC2018, I've had some very good "
-"discussions\n"
-"about ways in which we can improve collaboration with the wider "
-"community. This\n"
-"is really important to ensure we can garner as much review as possible "
-"for new\n"
-"protocols. The biggest blocker I've seen is the fact that the majority of"
-" I2P\n"
+"On that topic, we've been slowly building interest over the last six months or\n"
+"so. Across PETS2017, 34C3, and RWC2018, I've had some very good discussions\n"
+"about ways in which we can improve collaboration with the wider community. This\n"
+"is really important to ensure we can garner as much review as possible for new\n"
+"protocols. The biggest blocker I've seen is the fact that the majority of I2P\n"
 "development collaboration currently happens inside I2P itself, which\n"
 "significantly increases the effort required to contribute."
 msgstr ""
@@ -7243,8 +6695,7 @@ msgstr ""
 msgid ""
 "The two priorities in this area are:\n"
 "\n"
-"- Set up a project-run development forum that is accessible both inside "
-"and\n"
+"- Set up a project-run development forum that is accessible both inside and\n"
 "  outside I2P.\n"
 "\n"
 "- Set up mailing lists for review and discussion of proposals (possibly\n"
@@ -7255,21 +6706,17 @@ msgstr ""
 msgid ""
 "Other goals which are classed as nice-to-have:\n"
 "\n"
-"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit"
-"\n"
-"  clearnet contributions on GitHub while keeping the canonical dev "
-"environment\n"
+"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit\n"
+"  clearnet contributions on GitHub while keeping the canonical dev environment\n"
 "  on Monotone.\n"
 "\n"
-"- Write a \"position paper\" that accurately explains I2P to academic "
-"audiences,\n"
+"- Write a \"position paper\" that accurately explains I2P to academic audiences,\n"
 "  and puts it in context with existing literature."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:123
 msgid ""
-"I expect that collaborations with people outside I2P will be done "
-"entirely on\n"
+"I expect that collaborations with people outside I2P will be done entirely on\n"
 "GitHub, for minimal friction."
 msgstr ""
 
@@ -7281,24 +6728,18 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:133
 msgid ""
-"I2P is now in Debian Sid (their unstable repo) which will stablilise in "
-"around a\n"
+"I2P is now in Debian Sid (their unstable repo) which will stablilise in around a\n"
 "year and a half, and has also been pulled into the Ubuntu repository for\n"
-"inclusion in the next LTS release in April. We are going to start having "
-"I2P\n"
-"versions that end up hanging around for years, and we need to ensure we "
-"can\n"
+"inclusion in the next LTS release in April. We are going to start having I2P\n"
+"versions that end up hanging around for years, and we need to ensure we can\n"
 "handle their presence in the network."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:141
 msgid ""
-"The primary goal here is to roll out as many of the new protocols as we "
-"feasibly\n"
-"can in the next year, to hit the next Debian stable release. For those "
-"that\n"
-"require multi-year rollouts, we should incorporate the forward-"
-"compatability\n"
+"The primary goal here is to roll out as many of the new protocols as we feasibly\n"
+"can in the next year, to hit the next Debian stable release. For those that\n"
+"require multi-year rollouts, we should incorporate the forward-compatability\n"
 "changes as early as we can."
 msgstr ""
 
@@ -7310,32 +6751,24 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:153
 msgid ""
-"The Debian model encourages having separate packages for separate "
-"components. We\n"
-"agreed that decoupling the currently-bundled Java applications from the "
-"core\n"
+"The Debian model encourages having separate packages for separate components. We\n"
+"agreed that decoupling the currently-bundled Java applications from the core\n"
 "Java router would be beneficial for several reasons:\n"
 "\n"
 "- It codifies the boundary between the applications and the router.\n"
 "\n"
-"- It should make it easier to get these apps running with non-Java "
-"routers.\n"
+"- It should make it easier to get these apps running with non-Java routers.\n"
 "\n"
-"- It would enable third parties to create \"I2P bundles\" containing just"
-" the\n"
+"- It would enable third parties to create \"I2P bundles\" containing just the\n"
 "  applications they want."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:167
 msgid ""
-"In combination with the earlier priorities, this moves the main I2P "
-"project more\n"
-"in the direction of e.g. the Linux kernel. We will spend more time "
-"focusing on\n"
-"the network itself, leaving third-party developers to focus on "
-"applications that\n"
-"use the network (something that is significantly easier to do after our "
-"work in\n"
+"In combination with the earlier priorities, this moves the main I2P project more\n"
+"in the direction of e.g. the Linux kernel. We will spend more time focusing on\n"
+"the network itself, leaving third-party developers to focus on applications that\n"
+"use the network (something that is significantly easier to do after our work in\n"
 "the last few years on APIs and libraries)."
 msgstr ""
 
@@ -7347,25 +6780,18 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:180
 msgid ""
-"There are a bunch of app-level improvements that we want to work on, but "
-"do not\n"
-"currently have the developer time to do so, given our other priorities. "
-"This is\n"
-"an area we would love to see new contributors for! Once the above "
-"decoupling is\n"
-"complete, it will be significantly easier for someone to work on a "
-"specific\n"
+"There are a bunch of app-level improvements that we want to work on, but do not\n"
+"currently have the developer time to do so, given our other priorities. This is\n"
+"an area we would love to see new contributors for! Once the above decoupling is\n"
+"complete, it will be significantly easier for someone to work on a specific\n"
 "application independently of the main Java router."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:188
 msgid ""
-"One such application we would love to have help with is I2P Android. We "
-"will be\n"
-"keeping it up-to-date with the core I2P releases, and fixing bugs as we "
-"can, but\n"
-"there is much that could be done to improve the underlying code as well "
-"as the\n"
+"One such application we would love to have help with is I2P Android. We will be\n"
+"keeping it up-to-date with the core I2P releases, and fixing bugs as we can, but\n"
+"there is much that could be done to improve the underlying code as well as the\n"
 "usability."
 msgstr ""
 
@@ -7377,14 +6803,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:200
 msgid ""
-"Having said that, we do want to work specifically on Susimail and I2P-"
-"Bote fixes\n"
-"in the near term (some of which have landed in 0.9.33). They have had "
-"less work\n"
-"over the last few years than other I2P apps, and so we want to spend some"
-" time\n"
-"bringing their codebases up to par, and making them easier for new "
-"contributors\n"
+"Having said that, we do want to work specifically on Susimail and I2P-Bote fixes\n"
+"in the near term (some of which have landed in 0.9.33). They have had less work\n"
+"over the last few years than other I2P apps, and so we want to spend some time\n"
+"bringing their codebases up to par, and making them easier for new contributors\n"
 "to jump into!"
 msgstr ""
 
@@ -7396,14 +6818,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:213
 msgid ""
-"We have a large backlog of tickets in a number of I2P subsystems and "
-"apps. As\n"
-"part of the above stabilisation effort, we would love to clean up some of"
-" our\n"
-"older long-standing issues. More importantly, we want to ensure that our "
-"tickets\n"
-"are correctly organised, so that new contributors can find good tickets "
-"to work\n"
+"We have a large backlog of tickets in a number of I2P subsystems and apps. As\n"
+"part of the above stabilisation effort, we would love to clean up some of our\n"
+"older long-standing issues. More importantly, we want to ensure that our tickets\n"
+"are correctly organised, so that new contributors can find good tickets to work\n"
 "on."
 msgstr ""
 
@@ -7415,12 +6833,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:226
 msgid ""
-"One aspect of the above we will be focusing on is keeping in touch with "
-"users\n"
-"who take the time to report issues. Thank you! The smaller we can make "
-"the\n"
-"feedback loop, the quicker we can resolve problems that new users face, "
-"and the\n"
+"One aspect of the above we will be focusing on is keeping in touch with users\n"
+"who take the time to report issues. Thank you! The smaller we can make the\n"
+"feedback loop, the quicker we can resolve problems that new users face, and the\n"
 "more likely it is that they keep participating in the community."
 msgstr ""
 
@@ -7432,15 +6847,13 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:238
 msgid ""
-"That all looks very ambitious, and it is! But many of the items above "
-"overlap,\n"
+"That all looks very ambitious, and it is! But many of the items above overlap,\n"
 "and with careful planning we can make a serious dent in them."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:243
 msgid ""
-"If you are interested in helping with any of the goals above, come chat "
-"to us!\n"
+"If you are interested in helping with any of the goals above, come chat to us!\n"
 "You can find us on OFTC and Freenode (#i2p-dev), and Twitter (@GetI2P)."
 msgstr ""
 
@@ -7466,16 +6879,10 @@ msgstr ""
 #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:17
 msgid ""
 "0.9.34 contains a lot of bug fixes!\n"
-"It also has improvements in SusiMail, IPv6 handling, and tunnel peer "
-"selection.\n"
+"It also has improvements in SusiMail, IPv6 handling, and tunnel peer selection.\n"
 "We add support for IGD2 schemas in UPnP.\n"
-"There's also preparation for more improvements you will see in future "
-"releases."
-msgstr ""
-"0.9.34는 엄청 많은 버그 수정을 포함합니다!\n"
-"또한 SusiMail과 IPv6 처리, 터널 피어 선택에 관련해 개선이 이루어졌습니다.\n"
-"UPnP의 IGD2 스키마 지원을 추가했습니다.\n"
-"그리고 추후 릴리즈에서 보게 될 여러 개선사항을 위해 준비를 했습니다."
+"There's also preparation for more improvements you will see in future releases."
+msgstr "0.9.34는 엄청 많은 버그 수정을 포함합니다!\n또한 SusiMail과 IPv6 처리, 터널 피어 선택에 관련해 개선이 이루어졌습니다.\nUPnP의 IGD2 스키마 지원을 추가했습니다.\n그리고 추후 릴리즈에서 보게 될 여러 개선사항을 위해 준비를 했습니다."
 
 #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:34
 msgid "SusiMail: Improved startup and memory management"
@@ -7537,23 +6944,19 @@ msgstr "0.9.35에서 SusiMail 폴더와 SSL 마법사 추가"
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:16
 msgid ""
-"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for "
-"setting up HTTPS on your Hidden Service website.\n"
+"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.\n"
 "We also have the usual collection of bug fixes, especially in SusiMail."
-msgstr ""
-"0.9.35에서 SusiMail 폴더 지원과 히든 서비스 웹사이트를 위한 HTTPS를 설정하는 SSL 마법사가 추가되었습니다.\n"
-"또한 특히 SusiMail에서, 평소처럼 버그 수정을 했습니다."
+msgstr "0.9.35에서 SusiMail 폴더 지원과 히든 서비스 웹사이트를 위한 HTTPS를 설정하는 SSL 마법사가 추가되었습니다.\n또한 특히 SusiMail에서, 평소처럼 버그 수정을 했습니다."
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:21
 msgid ""
 "We're hard at work on several things for 0.9.36, including a new OSX "
 "installer and a faster, more secure transport protocol called NTCP2."
-msgstr ""
-"저희는 0.9.36을 위해, NTCP2라 불리는 더 빠르고 안전한 전송 프로토콜과 새 OSX 설치 프로그램을 포함한 여러가지를 "
-"열심히 작업 중입니다."
+msgstr "저희는 0.9.36을 위해, NTCP2라 불리는 더 빠르고 안전한 전송 프로토콜과 새 OSX 설치 프로그램을 포함한 여러가지를 열심히 작업 중입니다."
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:25
-msgid "I2P will be at HOPE in New York City, July 20-22. Find us and say hello!"
+msgid ""
+"I2P will be at HOPE in New York City, July 20-22. Find us and say hello!"
 msgstr "I2P는 7월 20-22일에 New York City에서 열리는 HOPE에 있을 예정입니다. 저희를 찾아서 반가운 인사 남겨주세요!"
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:39
@@ -7573,7 +6976,8 @@ msgid "CPUID: Fix TBM detection"
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:48
-msgid "i2psnark: Fix torrents ignoring priority settings when autostart enabled"
+msgid ""
+"i2psnark: Fix torrents ignoring priority settings when autostart enabled"
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:49
@@ -7649,25 +7053,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:20
 msgid ""
-"I2P's transport protocols were originally developed around 15 years ago. "
-"Back \n"
-"then, the main goal was to hide the transferred data, not to hide the "
-"fact that \n"
-"one was using the protocol itself. Nobody thought seriously about "
-"protecting \n"
-"against DPI (deep packets inspection) and protocols censorship. Times "
-"change, \n"
-"and even though original transport protocols are still providing strong "
-"security, \n"
-"there was a demand for a new transport protocol. NTCP2 is designed to "
-"resist \n"
-"current censorship threats. Mainly, DPI analysis of packets length. Plus,"
-" the new \n"
-"protocol uses the most modern cryptography developments. NTCP2 is based "
-"on the \n"
+"I2P's transport protocols were originally developed around 15 years ago. Back \n"
+"then, the main goal was to hide the transferred data, not to hide the fact that \n"
+"one was using the protocol itself. Nobody thought seriously about protecting \n"
+"against DPI (deep packets inspection) and protocols censorship. Times change, \n"
+"and even though original transport protocols are still providing strong security, \n"
+"there was a demand for a new transport protocol. NTCP2 is designed to resist \n"
+"current censorship threats. Mainly, DPI analysis of packets length. Plus, the new \n"
+"protocol uses the most modern cryptography developments. NTCP2 is based on the \n"
 "`Noise Protocol Framework`_, with SHA256 \n"
-"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) "
-"key \n"
+"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) key \n"
 "exchange."
 msgstr ""
 
@@ -7689,23 +7084,17 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:59
 msgid ""
-"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of "
-"ElGamal \n"
-"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, "
-"and uses \n"
-"SipHash for obfuscating the packet's length information. The key "
-"derivation \n"
+"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of ElGamal \n"
+"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, and uses \n"
+"SipHash for obfuscating the packet's length information. The key derivation \n"
 "function used in NTCP2 is more complex, now using many HMAC-SHA256 calls."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:66
 msgid ""
-"i2pd (C++) implementation note: All of the algorithms mentioned above, "
-"except \n"
-"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the "
-"coming \n"
-"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is "
-"used in \n"
+"i2pd (C++) implementation note: All of the algorithms mentioned above, except \n"
+"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the coming \n"
+"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is used in \n"
 "most of the current systems, core i2pd developer \n"
 "`Jeff Becker`_ has contributed standalone \n"
 "implementations of missing cryptographic algorithms."
@@ -7719,40 +7108,28 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:82
 msgid ""
-"NTCP2 requires having a third (x25519) key in addition to existing two "
-"(the \n"
-"encryption and signature keys). It is called a static key and it has to "
-"be added \n"
-"to any of RouterInfo addresses as an \"s\" parameter. It is required for "
-"both \n"
-"NTCP2 initiator (Alice) and responder (Bob). If more than one address "
-"supports \n"
-"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for "
-"all of \n"
-"them. Alice's address is allowed to have just the \"s\" parameter without"
-" \"host\" \n"
-"and \"port\" set. Also, a \"v\" parameter is required, that is currently "
-"always set \n"
+"NTCP2 requires having a third (x25519) key in addition to existing two (the \n"
+"encryption and signature keys). It is called a static key and it has to be added \n"
+"to any of RouterInfo addresses as an \"s\" parameter. It is required for both \n"
+"NTCP2 initiator (Alice) and responder (Bob). If more than one address supports \n"
+"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for all of \n"
+"them. Alice's address is allowed to have just the \"s\" parameter without \"host\" \n"
+"and \"port\" set. Also, a \"v\" parameter is required, that is currently always set \n"
 "to \"2\"."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:93
 msgid ""
-"NTCP2 address can be declared as a separate NTCP2 address or as an old-"
-"style \n"
-"NTCP address with additional parameters, in which case it will accept "
-"both \n"
-"NTCP and NTCP2 connections. Java I2P implementation uses the second "
-"approach, \n"
+"NTCP2 address can be declared as a separate NTCP2 address or as an old-style \n"
+"NTCP address with additional parameters, in which case it will accept both \n"
+"NTCP and NTCP2 connections. Java I2P implementation uses the second approach, \n"
 "i2pd (C++ implementation) uses the first."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:100
 msgid ""
-"If a node accepts NTCP2 connections, it has to publish its RouterInfo "
-"with the \n"
-"\"i\" parameter, which is used as an initialization vector (IV) for the "
-"public \n"
+"If a node accepts NTCP2 connections, it has to publish its RouterInfo with the \n"
+"\"i\" parameter, which is used as an initialization vector (IV) for the public \n"
 "encryption key when that node establishes new connections."
 msgstr ""
 
@@ -7764,14 +7141,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:111
 msgid ""
-"To establish a connection both sides need to generate pairs of ephemeral "
-"x25519 \n"
-"keys. Based on those keys and \"static\" keys they derive a set of keys "
-"for data \n"
-"transferring. Both parties must verify that the other side actually has a"
-" \n"
-"private key for that static key, and that static key is the same as in "
-"RouterInfo."
+"To establish a connection both sides need to generate pairs of ephemeral x25519 \n"
+"keys. Based on those keys and \"static\" keys they derive a set of keys for data \n"
+"transferring. Both parties must verify that the other side actually has a \n"
+"private key for that static key, and that static key is the same as in RouterInfo."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:118
@@ -7780,29 +7153,23 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:131
 msgid ""
-"A common x25519 key, called «input key material», is computed for each "
-"message, \n"
-"after which message encryption key is generated with a MixKey function. A"
-" value \n"
+"A common x25519 key, called «input key material», is computed for each message, \n"
+"after which message encryption key is generated with a MixKey function. A value \n"
 "ck (chaining key) is kept while messages are being exchanged. \n"
-"That value is used as a final input when generating keys for data "
-"transferring."
+"That value is used as a final input when generating keys for data transferring."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:138
 msgid ""
-"MixKey function looks something like this in the C++ implementation of "
-"I2P:"
+"MixKey function looks something like this in the C++ implementation of I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:159
 msgid ""
-"**SessionRequest** message is made of a public x25519 Alice key (32 "
-"bytes), a \n"
+"**SessionRequest** message is made of a public x25519 Alice key (32 bytes), a \n"
 "block of data encrypted with AEAD/Chacha20/Poly1305 (16 bytes), a hash \n"
 "(16 bytes) and some random data in the end (padding). Padding length is \n"
-"defined in the encrypted block of data. Encrypted block also contains "
-"length of \n"
+"defined in the encrypted block of data. Encrypted block also contains length of \n"
 "the second part of the **SessionConfirmed** message. A block of data is \n"
 "encrypted and signed with a key derived from Alice's ephemeral key and \n"
 "Bob's static key. Initial ck value for MixKey function is set to SHA256 \n"
@@ -7811,38 +7178,28 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:170
 msgid ""
-"Since 32 bytes of public x25519 key can be detected by DPI, it is "
-"encrypted with \n"
-"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" "
-"parameter \n"
+"Since 32 bytes of public x25519 key can be detected by DPI, it is encrypted with \n"
+"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" parameter \n"
 "from RouterInfo as an initialization vector (IV)."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:176
 msgid ""
-"**SessionCreated** message has the same structure as **SessionRequest**, "
-"except \n"
-"the key is computed based on ephemeral keys of both sides. IV generated "
-"after \n"
-"encrypting/decrypting public key from **SessionRequest** message is used "
-"as IV \n"
+"**SessionCreated** message has the same structure as **SessionRequest**, except \n"
+"the key is computed based on ephemeral keys of both sides. IV generated after \n"
+"encrypting/decrypting public key from **SessionRequest** message is used as IV \n"
 "for encrypting/decrypting ephemeral public key."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:183
 msgid ""
 "**SessionConfirmed** message has 2 parts: public static key and Alice's \n"
-"RouterInfo. The difference from previous messages is that ephemeral "
-"public key \n"
-"is encrypted with AEAD/Chaha20/Poly1305 using the same key as "
-"**SessionCreated**. \n"
+"RouterInfo. The difference from previous messages is that ephemeral public key \n"
+"is encrypted with AEAD/Chaha20/Poly1305 using the same key as **SessionCreated**. \n"
 "It leads to increasing first part of the message from 32 to 48 bytes. \n"
-"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a"
-" new \n"
-"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo"
-" part \n"
-"can also be appended with random data padding, but it is not required, "
-"since \n"
+"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a new \n"
+"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo part \n"
+"can also be appended with random data padding, but it is not required, since \n"
 "RouterInfo usually has various length."
 msgstr ""
 
@@ -7854,29 +7211,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:199
 msgid ""
-"If every hash and key verification has succeeded, a common ck value must "
-"be \n"
-"present after the last MixKey operation on both sides. This value is used"
-" to \n"
-"generate two sets of keys <k, sipk, sipiv> for each side of a connection."
-" \"k\" is \n"
-"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an "
-"initial \n"
+"If every hash and key verification has succeeded, a common ck value must be \n"
+"present after the last MixKey operation on both sides. This value is used to \n"
+"generate two sets of keys <k, sipk, sipiv> for each side of a connection. \"k\" is \n"
+"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an initial \n"
 "value for SipHash IV, that is changed after each use."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:207
 msgid ""
-"Code used to generate keys looks like this in the C++ implementation of "
-"I2P:"
+"Code used to generate keys looks like this in the C++ implementation of I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:246
 msgid ""
-"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array "
-"are a \n"
-"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, "
-"but i2pd \n"
+"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array are a \n"
+"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, but i2pd \n"
 "handles them as a single 16 bytes key."
 msgstr ""
 
@@ -7903,28 +7253,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:271
 msgid ""
-"Message length is obfuscated by applying the XOR function with two first "
-"bytes \n"
+"Message length is obfuscated by applying the XOR function with two first bytes \n"
 "of the current SipHash IV."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:276
 msgid ""
-"Encrypted data part contains blocks of data. Each block is prepended with"
-" 3 \n"
-"bytes header, that defines block type and block length. Generally, I2NP "
-"type \n"
-"blocks are transferred, that are I2NP messages with an altered header. "
-"One NTCP2 \n"
+"Encrypted data part contains blocks of data. Each block is prepended with 3 \n"
+"bytes header, that defines block type and block length. Generally, I2NP type \n"
+"blocks are transferred, that are I2NP messages with an altered header. One NTCP2 \n"
 "frame can transfer multiple I2NP blocks."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:283
 msgid ""
-"The other important data block type is a random data block. It is "
-"recommended to \n"
-"add a random data block to every NTCP2 frame. Only one random data block "
-"can be \n"
+"The other important data block type is a random data block. It is recommended to \n"
+"add a random data block to every NTCP2 frame. Only one random data block can be \n"
 "added and it must be the last block."
 msgstr ""
 
@@ -7934,12 +7278,8 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:293
 msgid ""
-"- RouterInfo  — usually contains Bob's RouterInfo after the connection "
-"has been established, but it can also contain RouterInfo of a random node"
-" for the purpose of speeding up floodfills (there is a flags field for "
-"that case). \n"
-"- Termination  — is used when a host explicitly terminates a connection "
-"and specifies a reason for that.\n"
+"- RouterInfo  — usually contains Bob's RouterInfo after the connection has been established, but it can also contain RouterInfo of a random node for the purpose of speeding up floodfills (there is a flags field for that case). \n"
+"- Termination  — is used when a host explicitly terminates a connection and specifies a reason for that.\n"
 "- DateTime — a current time in seconds."
 msgstr ""
 
@@ -7951,14 +7291,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:305
 msgid ""
-"The new I2P transport protocol NTCP2 provides effective resistance "
-"against DPI \n"
-"censorship. It also results in reduced CPU load because of the faster, "
-"modern \n"
-"cryptography used. It makes I2P more likely to run on low-end devices, "
-"such as \n"
-"smartphones and home routers. Both major I2P implementations have full "
-"support \n"
+"The new I2P transport protocol NTCP2 provides effective resistance against DPI \n"
+"censorship. It also results in reduced CPU load because of the faster, modern \n"
+"cryptography used. It makes I2P more likely to run on low-end devices, such as \n"
+"smartphones and home routers. Both major I2P implementations have full support \n"
 "for NTCP2 and it make NTCP2 available for use starting with version \n"
 "0.9.36 (Java) and 2.20 (i2pd, C++)."
 msgstr ""
@@ -8044,7 +7380,8 @@ msgid "i2psnark: Add icon for comments"
 msgstr ""
 
 #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:60
-msgid "i2ptunnel: Change read timeout defaults to account for streaming changes"
+msgid ""
+"i2ptunnel: Change read timeout defaults to account for streaming changes"
 msgstr ""
 
 #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:61
@@ -8069,7 +7406,8 @@ msgid "0.9.37 with NTCP2 enabled"
 msgstr "0.9.37에서 NTCP2가 활성화되었습니다."
 
 #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:16
-msgid "0.9.37 enables the faster, more secure transport protocol called NTCP2."
+msgid ""
+"0.9.37 enables the faster, more secure transport protocol called NTCP2."
 msgstr ""
 
 #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:30
@@ -8110,27 +7448,19 @@ msgstr ""
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:18
 msgid ""
 "`Invisible Internet Project`_ (I2P) provides a framework for\n"
-"developing privacy-aware applications. It is a virtual network working on"
-" top of\n"
-"the regular Internet, in which hosts can exchange data without disclosing"
-" their\n"
-"\"real\" IP addresses. Connections inside I2P network are established "
-"between \n"
-"virtual addresses called *I2P destinations*. It's possible to have as "
-"many\n"
-"of destinations as one needs, even use a new destination for each "
-"connection,\n"
-"they don't disclose any information about the real IP address to the "
-"other\n"
+"developing privacy-aware applications. It is a virtual network working on top of\n"
+"the regular Internet, in which hosts can exchange data without disclosing their\n"
+"\"real\" IP addresses. Connections inside I2P network are established between \n"
+"virtual addresses called *I2P destinations*. It's possible to have as many\n"
+"of destinations as one needs, even use a new destination for each connection,\n"
+"they don't disclose any information about the real IP address to the other\n"
 "side."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:31
 msgid ""
-"This article describes basic concepts one needs to know when developing "
-"I2P\n"
-"applications. Code samples are written in Python with the use of built-in"
-"\n"
+"This article describes basic concepts one needs to know when developing I2P\n"
+"applications. Code samples are written in Python with the use of built-in\n"
 "asynchronous framework asyncio."
 msgstr ""
 
@@ -8143,15 +7473,11 @@ msgstr ""
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:42
 msgid ""
 "I2P provides many different APIs to the client applications. Regular\n"
-"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java "
-"applications \n"
-"usually use I2CP. For developing with other languages, like Python, the "
-"best \n"
+"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java applications \n"
+"usually use I2CP. For developing with other languages, like Python, the best \n"
 "option is `SAM`_. SAM is disabled by \n"
-"default in the original Java client implementation, so we need to enable "
-"it. \n"
-"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run "
-"at Startup\" \n"
+"default in the original Java client implementation, so we need to enable it. \n"
+"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run at Startup\" \n"
 "and press \"Start\", then \"Save Client Configuration\"."
 msgstr ""
 
@@ -8172,12 +7498,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:79
 msgid ""
-"This library works with the Python's built-in `asynchronous framework "
-"asyncio`_,\n"
-"so please note that code samples are taken from async functions "
-"(coroutines)\n"
-"which are running inside the event loop. Additional examples of i2plib "
-"usage can\n"
+"This library works with the Python's built-in `asynchronous framework asyncio`_,\n"
+"so please note that code samples are taken from async functions (coroutines)\n"
+"which are running inside the event loop. Additional examples of i2plib usage can\n"
 "be found in the `source code repository`_."
 msgstr ""
 
@@ -8189,10 +7512,8 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:94
 msgid ""
-"I2P destination is literally a set of encryption and cryptographic "
-"signature\n"
-"keys. Public keys from this set are published to the I2P network and are "
-"used to\n"
+"I2P destination is literally a set of encryption and cryptographic signature\n"
+"keys. Public keys from this set are published to the I2P network and are used to\n"
 "make connections instead of IP addresses."
 msgstr ""
 
@@ -8202,28 +7523,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:112
 msgid ""
-"base32 address is a hash which is used by other peers to discover your "
-"full\n"
-"Destination in the network. If you plan to use this destination as a "
-"permanent\n"
-"address in your program, save the binary data from "
-"*dest.private\\_key.data* \n"
+"base32 address is a hash which is used by other peers to discover your full\n"
+"Destination in the network. If you plan to use this destination as a permanent\n"
+"address in your program, save the binary data from *dest.private\\_key.data* \n"
 "to a local file."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:119
 msgid ""
-"Now you can create a SAM session, which literally means to make the "
-"Destination\n"
+"Now you can create a SAM session, which literally means to make the Destination\n"
 "online in I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:130
 msgid ""
-"Important note here: Destination will remain online while "
-"*session\\_writer* socket\n"
-"is kept open. If you wish to switch it off, you can call "
-"*session\\_writer.close()*."
+"Important note here: Destination will remain online while *session\\_writer* socket\n"
+"is kept open. If you wish to switch it off, you can call *session\\_writer.close()*."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:135
@@ -8234,11 +7549,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:140
 msgid ""
-"Now when the Destination is online, you can use it to connect to other "
-"peers.\n"
+"Now when the Destination is online, you can use it to connect to other peers.\n"
 "For example, this is how you connect to\n"
-"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send "
-"HTTP GET\n"
+"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send HTTP GET\n"
 "request and read the response (it is \"i2p-projekt.i2p\" web server):"
 msgstr ""
 
@@ -8250,20 +7563,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:171
 msgid ""
-"While making outgoing connections is trivial, when you accept connections"
-" there\n"
-"is one important detail. After a new client is connected, SAM API sends "
-"an ASCII\n"
-"string with base64-encoded client's Destination to the socket. Since "
-"Destination \n"
+"While making outgoing connections is trivial, when you accept connections there\n"
+"is one important detail. After a new client is connected, SAM API sends an ASCII\n"
+"string with base64-encoded client's Destination to the socket. Since Destination \n"
 "and data can come in one chunk, you should be aware of it."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:178
 msgid ""
 "This is how a simple PING-PONG server looks like. It accepts incoming\n"
-"connection, saves client's Destination to a *remote\\_destination* "
-"variable and\n"
+"connection, saves client's Destination to a *remote\\_destination* variable and\n"
 "sends back \"PONG\" string:"
 msgstr ""
 
@@ -8275,21 +7584,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:208
 msgid ""
-"This article describes the usage of a TCP-like Streaming protocol. SAM "
-"API also\n"
-"provides a UDP-like protocol to send and receive datagrams. This feature "
-"will\n"
+"This article describes the usage of a TCP-like Streaming protocol. SAM API also\n"
+"provides a UDP-like protocol to send and receive datagrams. This feature will\n"
 "be added to i2plib later."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:214
 msgid ""
-"This is just a basic information, but it's enough to start your own "
-"project with\n"
-"the use of I2P. Invisible Internet is a great tool to develop all kinds "
-"of\n"
-"privacy-aware applications. There are no design constraints by the "
-"network,\n"
+"This is just a basic information, but it's enough to start your own project with\n"
+"the use of I2P. Invisible Internet is a great tool to develop all kinds of\n"
+"privacy-aware applications. There are no design constraints by the network,\n"
 "those applications can be client-server as well as P2P."
 msgstr ""
 
@@ -8305,22 +7609,15 @@ msgstr "0.9.38에서 새로운 시작 마법사를 포함합니다"
 msgid ""
 "0.9.38 includes a new first-install wizard with a bandwidth tester.\n"
 "We've added support for the latest GeoIP database format.\n"
-"There's a new Firefox profile installer and a new, native Mac OSX "
-"installer on our website.\n"
+"There's a new Firefox profile installer and a new, native Mac OSX installer on our website.\n"
 "Work continues on supporting the new \"LS2\" netdb format."
-msgstr ""
-"0.9.38에서는 대역폭 테스터가 있는 새로운 첫 설치 마법사를 포함합니다.\n"
-"저희는 최신 버전의 GeoIP 데이터베이스 포맷 지원을 추가했습니다.\n"
-"새로운 파이어폭스 프로파일 설치 프로그램과 네이티브 Mac OSX 설치 프로그램이 웹 사이트에 생겼습니다.\n"
-"새 \"LS2\" netdb 포맷 지원을 위한 작업이 계속됩니다."
+msgstr "0.9.38에서는 대역폭 테스터가 있는 새로운 첫 설치 마법사를 포함합니다.\n저희는 최신 버전의 GeoIP 데이터베이스 포맷 지원을 추가했습니다.\n새로운 파이어폭스 프로파일 설치 프로그램과 네이티브 Mac OSX 설치 프로그램이 웹 사이트에 생겼습니다.\n새 \"LS2\" netdb 포맷 지원을 위한 작업이 계속됩니다."
 
 #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:23
 msgid ""
 "This release also contains plenty of bug fixes, including several issues "
 "with susimail attachments, and a fix for IPv6-only routers."
-msgstr ""
-"또한 이 릴리즈는 susimail 첨부파일에 관련된 여러 문제들과, IPv6 전용 라우터를 위한 수정 사항을 포함한 다양한 버그 "
-"수정을 포함합니다."
+msgstr "또한 이 릴리즈는 susimail 첨부파일에 관련된 여러 문제들과, IPv6 전용 라우터를 위한 수정 사항을 포함한 다양한 버그 수정을 포함합니다."
 
 #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:37
 msgid "New setup wizard with bandwidth testing"
@@ -8404,25 +7701,25 @@ msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:16
 msgid ""
-"There are many projects in the I2P world that we are excited about, but "
-"not all of them are ready for prime-time.  We decided to create a place "
-"where we can make those available for anyone interested in trying them "
-"out, that will serve as proving grounds for projects that may one day "
-"become official I2P products.  This place is the `I2P Laboratory`_."
+"There are many projects in the I2P world that we are excited about, but not "
+"all of them are ready for prime-time.  We decided to create a place where we"
+" can make those available for anyone interested in trying them out, that "
+"will serve as proving grounds for projects that may one day become official "
+"I2P products.  This place is the `I2P Laboratory`_."
 msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:22
 msgid ""
-"In the lab we will be offering downoads ready for you to try.  Keep in "
-"mind that they are not going to be \"release\" quality, and some may not "
-"even be \"beta\" quality.  We do not offer official support for them.  "
-"Any of the lab projects may get discontinued at any time."
+"In the lab we will be offering downoads ready for you to try.  Keep in mind "
+"that they are not going to be \"release\" quality, and some may not even be "
+"\"beta\" quality.  We do not offer official support for them.  Any of the "
+"lab projects may get discontinued at any time."
 msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:26
 msgid ""
-"If you are feeling adventurous we invite you to try our ideas.  We "
-"welcome your feedback at the `I2P Lab Forum`_."
+"If you are feeling adventurous we invite you to try our ideas.  We welcome "
+"your feedback at the `I2P Lab Forum`_."
 msgstr ""
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:2
@@ -8435,26 +7732,17 @@ msgstr "0.9.39에서 성능이 개선되었습니다"
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:16
 msgid ""
-"0.9.39 includes extensive changes for the new network database types "
-"(proposal 123).\n"
-"We've bundled the i2pcontrol plugin as a webapp to support development of"
-" RPC applications.\n"
+"0.9.39 includes extensive changes for the new network database types (proposal 123).\n"
+"We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications.\n"
 "There are numerous performance improvements and bug fixes."
-msgstr ""
-"0.9.39에서는 새로운 네트워크 데이터베이스 타입 (proposal 123)을 위한 대규모 변경을 포함합니다.\n"
-"저희는 RPC 어플리케이션 개발을 지원하기 위해 i2pcontrol 플러그인을 웹 앱으로 포함했습니다.\n"
-"많은 성능 개선과 버그 수정이 이루어졌습니다."
+msgstr "0.9.39에서는 새로운 네트워크 데이터베이스 타입 (proposal 123)을 위한 대규모 변경을 포함합니다.\n저희는 RPC 어플리케이션 개발을 지원하기 위해 i2pcontrol 플러그인을 웹 앱으로 포함했습니다.\n많은 성능 개선과 버그 수정이 이루어졌습니다."
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:22
 msgid ""
-"We've removed the midnight and classic themes to reduce the maintenance "
-"burden;\n"
+"We've removed the midnight and classic themes to reduce the maintenance burden;\n"
 "previous users of those themes will now see the dark or light theme.\n"
 "There's also new home page icons, a first step in updating the console."
-msgstr ""
-"저희는 유지보수 부담을 줄이기 위해 미드나잇과 클래식 테마를 제거했습니다;\n"
-"이전에 이 테마들을 사용하시던 유저분들은 다크 혹은 라이트 테마를 보시게 될 것입니다.\n"
-"콘솔 업데이트의 첫 시작으로, 새로운 홈 페이지 아이콘들도 보시게 될 겁니다."
+msgstr "저희는 유지보수 부담을 줄이기 위해 미드나잇과 클래식 테마를 제거했습니다;\n이전에 이 테마들을 사용하시던 유저분들은 다크 혹은 라이트 테마를 보시게 될 것입니다.\n콘솔 업데이트의 첫 시작으로, 새로운 홈 페이지 아이콘들도 보시게 될 겁니다."
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:38
 msgid "I2PControl RPC plugin bundled as a webapp"
@@ -8528,14 +7816,12 @@ msgstr ""
 msgid ""
 "0.9.40 includes support for the new encrypted leaseset format.\n"
 "We disabled the old NTCP 1 transport protocol.\n"
-"There's a new SusiDNS import feature, and a new scripted filtering "
-"mechanism for incoming connections."
+"There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections."
 msgstr ""
 
 #: i2p2www/blog/2019/05/07/0.9.40-Release.rst:22
 msgid ""
-"We've made a lot of improvements to the OSX native installer, and we've "
-"updated the IzPack installer as well.\n"
+"We've made a lot of improvements to the OSX native installer, and we've updated the IzPack installer as well.\n"
 "The work continues on refreshing the console with new icons.\n"
 "As usual, we've fixed lots of bugs as well!"
 msgstr ""
@@ -8638,24 +7924,16 @@ msgid ""
 "::\n"
 "\n"
 "       What is I2P-bote?\n"
-"          I2P-bote is a private messaging system built on i2p, which has "
-"additional\n"
-"          features to make it even more difficult to discern information "
-"about the\n"
-"          messages that are transmitted. Because of this, it can be used "
-"to transmit\n"
-"          private messages securely while tolerating high latency and not"
-" relying on\n"
-"          a centralized relay to send messages when the sender goes "
-"offline. This is\n"
-"          in contrast to almost every other popular private messaging "
-"system, which\n"
-"          either require both parties to be online or rely on a semi-"
-"trusted service\n"
+"          I2P-bote is a private messaging system built on i2p, which has additional\n"
+"          features to make it even more difficult to discern information about the\n"
+"          messages that are transmitted. Because of this, it can be used to transmit\n"
+"          private messages securely while tolerating high latency and not relying on\n"
+"          a centralized relay to send messages when the sender goes offline. This is\n"
+"          in contrast to almost every other popular private messaging system, which\n"
+"          either require both parties to be online or rely on a semi-trusted service\n"
 "          which transmits messages on behalf of senders who go offline.\n"
 "\n"
-"          or, ELI5: It's used similarly to e-mail, but it suffers from "
-"none of e-mail's\n"
+"          or, ELI5: It's used similarly to e-mail, but it suffers from none of e-mail's\n"
 "          privacy defects."
 msgstr ""
 
@@ -8737,11 +8015,9 @@ msgid ""
 "   character set into binary.\n"
 "2. Second, take bytes 386 and 387 and convert them to a single\n"
 "   Big-Endian integer.\n"
-"3. Add the number you computed from the two bytes in step two to 387. "
-"This is\n"
+"3. Add the number you computed from the two bytes in step two to 387. This is\n"
 "   the length of the base64 destination.\n"
-"4. Take that nummber of bytes from the front of the full destination to "
-"get\n"
+"4. Take that nummber of bytes from the front of the full destination to get\n"
 "   the destination as a range of bytes.\n"
 "5. Convert back to a base64 representation using i2p's base64 character\n"
 "   set."
@@ -8792,8 +8068,7 @@ msgid ""
 "\n"
 "::\n"
 "\n"
-"       sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-"
-"config/i2pbote/local_dest.key"
+"       sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-config/i2pbote/local_dest.key"
 msgstr ""
 
 #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:149
@@ -8848,8 +8123,7 @@ msgid ""
 "\n"
 "Now that you've got the correct destination for your I2P-Bote node, the\n"
 "final step is to add yourself to the default peers list for `I2P-Bote\n"
-"here <https://github.com/i2p/i2p.i2p-"
-"bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n"
+"here <https://github.com/i2p/i2p.i2p-bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n"
 "here. You can do this by forking the repository, adding yourself to the\n"
 "list with your name commented out, and your 516-char destination\n"
 "directly below it, like this:"
@@ -8862,12 +8136,7 @@ msgid ""
 "::\n"
 "\n"
 "       # idk\n"
-"       QuabT3H5ljZyd-PXCQjvDzdfCec-"
-"2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-"
-"bkSo0gEhB-"
-"GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA"
-"~z0Nus-"
-"VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA"
+"       QuabT3H5ljZyd-PXCQjvDzdfCec-2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-bkSo0gEhB-GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA~z0Nus-VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA"
 msgstr ""
 
 #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:205
@@ -8888,38 +8157,25 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:10
 msgid ""
-"Although the Java I2P router comes pre-configured with a static web "
-"server,\n"
-"jetty, to provide the user's first eepSite, many require more "
-"sophisticated\n"
-"functionality from their web server and would rather create an eepSite "
-"with a\n"
-"different server. This is of course possible, and actually is really easy"
-" once\n"
+"Although the Java I2P router comes pre-configured with a static web server,\n"
+"jetty, to provide the user's first eepSite, many require more sophisticated\n"
+"functionality from their web server and would rather create an eepSite with a\n"
+"different server. This is of course possible, and actually is really easy once\n"
 "you've done it one time."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:18
 msgid ""
-"Although it is easy to do, there are a few things you should consider "
-"before\n"
-"doing it. You will want to remove identifying characteristics from your "
-"web\n"
-"server, like potentially identifying headers and default error pages that"
-"\n"
-"report the server/distro type. More information about threats to "
-"anonymity\n"
+"Although it is easy to do, there are a few things you should consider before\n"
+"doing it. You will want to remove identifying characteristics from your web\n"
+"server, like potentially identifying headers and default error pages that\n"
+"report the server/distro type. More information about threats to anonymity\n"
 "posed by improperly configured applications see:\n"
-"`Riseup here: <https://riseup.net/en/security/network-security/tor"
-"/onionservices-best-practices>`__,\n"
+"`Riseup here: <https://riseup.net/en/security/network-security/tor/onionservices-best-practices>`__,\n"
 "`Whonix Here: <https://www.whonix.org/wiki/Onion_Services>`__,\n"
-"`This blog article for some opsec fails: "
-"<https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,"
-"\n"
-"`and the I2P applications page here "
-"<https://geti2p.net/en/docs/applications/supported>`__.\n"
-"Although much of this information is expressed for Tor Onion Services, "
-"the same\n"
+"`This blog article for some opsec fails: <https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,\n"
+"`and the I2P applications page here <https://geti2p.net/en/docs/applications/supported>`__.\n"
+"Although much of this information is expressed for Tor Onion Services, the same\n"
 "procedures and principles apply to hosting applications over I2P."
 msgstr ""
 
@@ -8930,8 +8186,7 @@ msgstr ""
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:35
 msgid ""
 "Go to the I2P web interface at 127.0.0.1:7657 and open the\n"
-"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links"
-" to\n"
+"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links to\n"
 "localhost). Click the button that says \"Tunnel Wizard\" to begin."
 msgstr ""
 
@@ -8941,8 +8196,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:48
 msgid ""
-"The tunnel wizard is very simple. Since we're setting up an http "
-"*server*, all\n"
+"The tunnel wizard is very simple. Since we're setting up an http *server*, all\n"
 "we need to do is select a *server* tunnel."
 msgstr ""
 
@@ -8952,15 +8206,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:60
 msgid ""
-"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP "
-"services.\n"
+"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP services.\n"
 "It has filtering and rate-limiting features enabled that are tailored\n"
-"specifically to that purpose. A standard tunnel may work as well, but if "
-"you\n"
-"select a atandard tunnel you'll need to take care of those security "
-"features\n"
-"yourself. A more in-depth dive into the HTTP Tunnel configuration is "
-"available\n"
+"specifically to that purpose. A standard tunnel may work as well, but if you\n"
+"select a atandard tunnel you'll need to take care of those security features\n"
+"yourself. A more in-depth dive into the HTTP Tunnel configuration is available\n"
 "in the next tutorial."
 msgstr ""
 
@@ -8970,12 +8220,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:76
 msgid ""
-"For your own benefit and ability to remeber and distinguish the what you "
-"are\n"
-"using the tunnel for, give it a good nickname and description. If you "
-"need to\n"
-"come back and do more management later, then this is how you will "
-"identify the\n"
+"For your own benefit and ability to remeber and distinguish the what you are\n"
+"using the tunnel for, give it a good nickname and description. If you need to\n"
+"come back and do more management later, then this is how you will identify the\n"
 "tunnel in the hidden services manager."
 msgstr ""
 
@@ -8985,12 +8232,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:90
 msgid ""
-"In this step, you point the web server at the TCP port where your web "
-"server is\n"
-"listening. Since most web servers listen on port 80 or port 8080, the "
-"example\n"
-"shows that. If you use alternate ports or virtual machines or containers "
-"to\n"
+"In this step, you point the web server at the TCP port where your web server is\n"
+"listening. Since most web servers listen on port 80 or port 8080, the example\n"
+"shows that. If you use alternate ports or virtual machines or containers to\n"
 "isolate your web services, you may need to adjust the host, port, or both."
 msgstr ""
 
@@ -9008,12 +8252,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:115
 msgid ""
-"Finally, take a look at the settings you have selected. If you approve, "
-"save\n"
-"them. If you did not choose to start the tunnel automatically, go to the "
-"hidden\n"
-"services manager and start it manually when you wish to make your service"
-"\n"
+"Finally, take a look at the settings you have selected. If you approve, save\n"
+"them. If you did not choose to start the tunnel automatically, go to the hidden\n"
+"services manager and start it manually when you wish to make your service\n"
 "available."
 msgstr ""
 
@@ -9023,10 +8264,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:129
 msgid ""
-"I2P provides a detailed panel for configuring the http server tunnel in "
-"custom\n"
-"ways. I'll finish this tutorial by walking through all of them. "
-"Eventually."
+"I2P provides a detailed panel for configuring the http server tunnel in custom\n"
+"ways. I'll finish this tutorial by walking through all of them. Eventually."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:4
@@ -9039,38 +8278,28 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:10
 msgid ""
-"This blog post is intended as a general guide to running a mirror of a "
-"clear-net\n"
-"service as an eepSite. It elaborates on the previous blog post about "
-"basic\n"
+"This blog post is intended as a general guide to running a mirror of a clear-net\n"
+"service as an eepSite. It elaborates on the previous blog post about basic\n"
 "I2PTunnel tunnels."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:16
 msgid ""
-"Unfortunately, it's probably impossible to *completely* cover all "
-"possible cases\n"
-"of making an existing web site available as an eepSite, there's simply "
-"too\n"
+"Unfortunately, it's probably impossible to *completely* cover all possible cases\n"
+"of making an existing web site available as an eepSite, there's simply too\n"
 "diverse an array of server-side software, not to mention the in-practice\n"
-"peculiarities of any particular deployment of software. Instead, I'm "
-"going to\n"
-"try and convey, as specifically as possible, the general process "
-"preparing a\n"
+"peculiarities of any particular deployment of software. Instead, I'm going to\n"
+"try and convey, as specifically as possible, the general process preparing a\n"
 "service for deployment to the eepWeb or other hidden services."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:25
 msgid ""
-"Much of this guide will be treating the reader as a conversational "
-"participant,\n"
-"in particular If I really mean it I will address the reader directly(i.e."
-" using\n"
-"\"you\" instead of \"one\") and I'll frequently head sections with "
-"questions I think\n"
+"Much of this guide will be treating the reader as a conversational participant,\n"
+"in particular If I really mean it I will address the reader directly(i.e. using\n"
+"\"you\" instead of \"one\") and I'll frequently head sections with questions I think\n"
 "the reader might be asking. This is, after all, a \"process\" that an\n"
-"administrator must consider themselves \"involved\" in just like hosting "
-"any other\n"
+"administrator must consider themselves \"involved\" in just like hosting any other\n"
 "service."
 msgstr ""
 
@@ -9080,16 +8309,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:37
 msgid ""
-"While it would be wonderful, it's probably impossible for me to put "
-"specific\n"
-"instructions for every single kind of software that one might use to host"
-" web\n"
-"sites. As such, this tutorial requires some assumptions on the part of "
-"the\n"
-"writer and some critical thinking and common sense on the part of the "
-"reader.\n"
-"To be clear, **I have assumed that the person following this tutorial "
-"is**\n"
+"While it would be wonderful, it's probably impossible for me to put specific\n"
+"instructions for every single kind of software that one might use to host web\n"
+"sites. As such, this tutorial requires some assumptions on the part of the\n"
+"writer and some critical thinking and common sense on the part of the reader.\n"
+"To be clear, **I have assumed that the person following this tutorial is**\n"
 "**already operating a clear-web service linkable to a real identity or**\n"
 "**organization** and thus is simply offering anonymous access and not\n"
 "anonymizing themselves."
@@ -9097,22 +8321,17 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:48
 msgid ""
-"Thus, **it makes no attempt whatsoever to anonymize** a connection from "
-"one\n"
-"server to another. If you want to run a new, un-linkable hidden service "
-"that\n"
-"makes server-to-server connections, additional steps will be required and"
-" will\n"
+"Thus, **it makes no attempt whatsoever to anonymize** a connection from one\n"
+"server to another. If you want to run a new, un-linkable hidden service that\n"
+"makes server-to-server connections, additional steps will be required and will\n"
 "be covered in another tutorial."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:55
 msgid ""
 "That said: If you can be sure that a *brand new service* which is *not*\n"
-"*available to the clear-web* will never make a server-to-server "
-"connection and\n"
-"will not leak server metadata in responses to clients, then services "
-"configured\n"
+"*available to the clear-web* will never make a server-to-server connection and\n"
+"will not leak server metadata in responses to clients, then services configured\n"
 "in this way will be anonymous."
 msgstr ""
 
@@ -9126,16 +8345,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:68
 msgid ""
-"In practice, your web service probably uses a number of things to enhance"
-" it's\n"
-"reliability and security. These things could be proxies, reverse proxies,"
-"\n"
-"containers, tunnels, Intrusion Detection Systems, rate-limiters, load "
-"balancers,\n"
-"among many other things. When you get started, you should go through your"
-"\n"
-"deployment and determine which software you are using, and what you are "
-"using it\n"
+"In practice, your web service probably uses a number of things to enhance it's\n"
+"reliability and security. These things could be proxies, reverse proxies,\n"
+"containers, tunnels, Intrusion Detection Systems, rate-limiters, load balancers,\n"
+"among many other things. When you get started, you should go through your\n"
+"deployment and determine which software you are using, and what you are using it\n"
 "for."
 msgstr ""
 
@@ -9145,8 +8359,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:80
 msgid ""
-"These questions should help you evaluate what parts of your software "
-"stack are\n"
+"These questions should help you evaluate what parts of your software stack are\n"
 "relevant to your I2P eepSite."
 msgstr ""
 
@@ -9156,16 +8369,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:88
 msgid ""
-"If you are using software which alters the behavior of traffic based on "
-"the IP\n"
-"address of the sender, these things will probably not work with I2P, or "
-"may work\n"
-"in complicated or unexpected ways. This is because the address will "
-"usually be\n"
-"the localhost, or at least the host where your I2P router is running. "
-"Software\n"
-"which sometimes does things based on IP addresses could be Fail2Ban, "
-"iptables,\n"
+"If you are using software which alters the behavior of traffic based on the IP\n"
+"address of the sender, these things will probably not work with I2P, or may work\n"
+"in complicated or unexpected ways. This is because the address will usually be\n"
+"the localhost, or at least the host where your I2P router is running. Software\n"
+"which sometimes does things based on IP addresses could be Fail2Ban, iptables,\n"
 "and similar applications."
 msgstr ""
 
@@ -9175,10 +8383,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:100
 msgid ""
-"Some software may be configured to add information to the traffic it "
-"handles.\n"
-"Obviously, if this information is identifying it should not be part of "
-"the chain\n"
+"Some software may be configured to add information to the traffic it handles.\n"
+"Obviously, if this information is identifying it should not be part of the chain\n"
 "of services that is exposed to the I2P network."
 msgstr ""
 
@@ -9190,37 +8396,27 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:109
 msgid ""
-"Some software may also draw from remote resources, to find up-to-date "
-"rules and\n"
-"block lists which can be used to prevent attacks. Some of these might be "
-"useful\n"
-"as part of the service that is exposed to I2P, but you should make sure "
-"that the\n"
-"rules are applicable and that a rules update cannot be triggered as a "
-"result of\n"
-"a normal client request. This would create a server-to-server "
-"communication\n"
+"Some software may also draw from remote resources, to find up-to-date rules and\n"
+"block lists which can be used to prevent attacks. Some of these might be useful\n"
+"as part of the service that is exposed to I2P, but you should make sure that the\n"
+"rules are applicable and that a rules update cannot be triggered as a result of\n"
+"a normal client request. This would create a server-to-server communication\n"
 "which could reveal the timing of an I2P communication to a third party."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:118
 msgid ""
-"Step two: Determine which port to Forward to I2P and Optionally locate "
-"your TLS certificate"
+"Step two: Determine which port to Forward to I2P and Optionally locate your "
+"TLS certificate"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:121
 msgid ""
-"Now you've gathered all the information that you will require to forward "
-"your\n"
-"service to I2P. Once you've selected the point at which you would like to"
-" make\n"
-"your site available to I2P, you will need to note the port you wish to "
-"foward.\n"
-"In simple scenarios, this will probably just be port 80 or port 8080. In "
-"more\n"
-"sophisticated scenarios, this might be a reverse proxy or something like "
-"that.\n"
+"Now you've gathered all the information that you will require to forward your\n"
+"service to I2P. Once you've selected the point at which you would like to make\n"
+"your site available to I2P, you will need to note the port you wish to foward.\n"
+"In simple scenarios, this will probably just be port 80 or port 8080. In more\n"
+"sophisticated scenarios, this might be a reverse proxy or something like that.\n"
 "Make a note of the port."
 msgstr ""
 
@@ -9230,18 +8426,12 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:133
 msgid ""
-"Should you be a non-anonymous organization that wishes to provide "
-"enhanced\n"
-"privacy to your users by providing a hidden service, you may wish to "
-"establish\n"
-"a common identity between versions of your site. However, since we can't "
-"add\n"
-"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we "
-"have to do\n"
-"this in another way. To do this, **even if you are forwarding the HTTP "
-"port**\n"
-"**and not HTTPS**, make a note of the location of your TLS certificate "
-"for use\n"
+"Should you be a non-anonymous organization that wishes to provide enhanced\n"
+"privacy to your users by providing a hidden service, you may wish to establish\n"
+"a common identity between versions of your site. However, since we can't add\n"
+"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we have to do\n"
+"this in another way. To do this, **even if you are forwarding the HTTP port**\n"
+"**and not HTTPS**, make a note of the location of your TLS certificate for use\n"
 "in the final step."
 msgstr ""
 
@@ -9251,10 +8441,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:146
 msgid ""
-"Congratulations! You've completed the most difficult part. From here on, "
-"the\n"
-"decisions you must make, and the consequences that they will have, are "
-"much\n"
+"Congratulations! You've completed the most difficult part. From here on, the\n"
+"decisions you must make, and the consequences that they will have, are much\n"
 "more straightforward and easy to enumerate. Such is the beauty of a\n"
 "cryptographically secure network layer like I2P!"
 msgstr ""
@@ -9266,20 +8454,13 @@ msgstr ""
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:158
 msgid ""
 "For eepSites, you will need to create an HTTP Server Tunnel. This is\n"
-"an I2P destination with a few special features for hosting HTTP services "
-"to\n"
-"enable things like rate-limiting, filtering, and the inclusion of headers"
-" to\n"
-"identify the destination of the client to the server. These enable "
-"flexibility\n"
-"in how you handle connections in terms of load-balancing and rate-"
-"limiting on\n"
-"a case-by-case basis, among other things. Explore these options and how "
-"they\n"
-"relate to the applications which you considered in step one, even though "
-"a very\n"
-"simple setup is easy, larger sites may benefit from taking advantage of "
-"these\n"
+"an I2P destination with a few special features for hosting HTTP services to\n"
+"enable things like rate-limiting, filtering, and the inclusion of headers to\n"
+"identify the destination of the client to the server. These enable flexibility\n"
+"in how you handle connections in terms of load-balancing and rate-limiting on\n"
+"a case-by-case basis, among other things. Explore these options and how they\n"
+"relate to the applications which you considered in step one, even though a very\n"
+"simple setup is easy, larger sites may benefit from taking advantage of these\n"
 "features."
 msgstr ""
 
@@ -9289,98 +8470,70 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:173
 msgid ""
-"If you've configured a reverse proxy or an SSH tunnel before, then the "
-"general\n"
+"If you've configured a reverse proxy or an SSH tunnel before, then the general\n"
 "idea here should be very familiar to you. I2PTunnel, in essence, is just\n"
-"forwarding ports from the host to the I2P Network. To set this up using "
-"the web\n"
+"forwarding ports from the host to the I2P Network. To set this up using the web\n"
 "interface, go to the I2PTunnel configuration page."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:180
 msgid ""
-"At the bottom of the \"I2P Hidden Services\" section of the page, select "
-"an HTTP\n"
+"At the bottom of the \"I2P Hidden Services\" section of the page, select an HTTP\n"
 "Service from the drop-down and click \"Create.\""
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:189
 msgid ""
-"It will immediately drop you into the granular tunnel configuration page,"
-" which\n"
-"we're about to explore from top-to-bottom. The first, most essential "
-"settings\n"
-"are the tunnel name and the target host:port. **The target host:port is**"
-"\n"
-"**the place where you input the address of the service you are forwarding"
-" to**\n"
-"**I2P**. Once you've configured that, your web site will become available"
-" over\n"
+"It will immediately drop you into the granular tunnel configuration page, which\n"
+"we're about to explore from top-to-bottom. The first, most essential settings\n"
+"are the tunnel name and the target host:port. **The target host:port is**\n"
+"**the place where you input the address of the service you are forwarding to**\n"
+"**I2P**. Once you've configured that, your web site will become available over\n"
 "i2p. However, there are probably a few things that we can improve."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:202
 msgid ""
-"Next, you may want to pick a hostname to use for your eepSite. This "
-"hostname\n"
-"doesn't need to be universally unique, for now, it will only be used "
-"locally.\n"
-"We'll publish it to an address helper later. **If** the *Local "
-"Destination*\n"
-"field isn't populated with your Base64 Destination yet, you should scroll"
-" down\n"
+"Next, you may want to pick a hostname to use for your eepSite. This hostname\n"
+"doesn't need to be universally unique, for now, it will only be used locally.\n"
+"We'll publish it to an address helper later. **If** the *Local Destination*\n"
+"field isn't populated with your Base64 Destination yet, you should scroll down\n"
 "to the bottom, save the tunnel configuration, and return to the tunnel\n"
 "configuration."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:215
 msgid ""
-"A little further down the configuration page, the tunnel options are "
-"available.\n"
-"Since you've got a site which is not intended to be anonymous, but rather"
-" to\n"
-"provide anonymous access to others by an alternate gateway, it may be "
-"good to\n"
+"A little further down the configuration page, the tunnel options are available.\n"
+"Since you've got a site which is not intended to be anonymous, but rather to\n"
+"provide anonymous access to others by an alternate gateway, it may be good to\n"
 "reduce the number of hops the tunnel takes on the I2P network."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:226
 msgid ""
-"Next are the encrypted leaseset options. You can probably leave these as "
-"the\n"
-"defaults, since your site isn't anonymous it probably doesn't need "
-"features like\n"
-"blinding or encrypted leasesets. If you were to choose encrypted "
-"leasesets, you\n"
-"would not be accessible to anyone unless you shared a key with them in "
-"advance."
+"Next are the encrypted leaseset options. You can probably leave these as the\n"
+"defaults, since your site isn't anonymous it probably doesn't need features like\n"
+"blinding or encrypted leasesets. If you were to choose encrypted leasesets, you\n"
+"would not be accessible to anyone unless you shared a key with them in advance."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:237
 msgid ""
-"The next few parts may be especially useful to you if you run a high-"
-"traffic\n"
-"site or find yourself subject to DDOS attacks. Here you can configure "
-"various\n"
+"The next few parts may be especially useful to you if you run a high-traffic\n"
+"site or find yourself subject to DDOS attacks. Here you can configure various\n"
 "kinds of connection limits."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:247
 msgid ""
-"After that, there are a few other ways of filtering connections by client"
-"\n"
-"characteristics. First, you can block access via inproxies like I2P.to "
-"and\n"
-"similar. Since you have a clearnet presence already, changing this may be"
-" better\n"
-"if you want to encourage I2P users to only use your eepSite. You can also"
-" block\n"
-"accesses via specific user-agents, for instance blocking wget may be "
-"helpful if\n"
-"you want to prevent spidering. Finally, and of particular interest to "
-"Fail2Ban\n"
-"users, the \"Unique local address per client\" will give each client it's"
-" own\n"
+"After that, there are a few other ways of filtering connections by client\n"
+"characteristics. First, you can block access via inproxies like I2P.to and\n"
+"similar. Since you have a clearnet presence already, changing this may be better\n"
+"if you want to encourage I2P users to only use your eepSite. You can also block\n"
+"accesses via specific user-agents, for instance blocking wget may be helpful if\n"
+"you want to prevent spidering. Finally, and of particular interest to Fail2Ban\n"
+"users, the \"Unique local address per client\" will give each client it's own\n"
 "local IP address instead of them all appearing to the server to be from\n"
 "127.0.0.1."
 msgstr ""
@@ -9391,10 +8544,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:271
 msgid ""
-"Lastly, you can set up an advanced filter definition. Writing filters is "
-"beyond\n"
-"what I'm prepared to do in this document, for more information see the "
-"format\n"
+"Lastly, you can set up an advanced filter definition. Writing filters is beyond\n"
+"what I'm prepared to do in this document, for more information see the format\n"
 "specification for now."
 msgstr ""
 
@@ -9404,22 +8555,16 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:284
 msgid ""
-"One interesting thing that I2P can do is host the same site on multiple "
-"servers\n"
-"at the same time transparently, which is referred to as \"Multihoming.\" "
-"In order\n"
-"to multihome your application, you will need to return to the tunnel menu"
-" and\n"
-"change the location of your private key file to it's own, non-shared "
-"location."
+"One interesting thing that I2P can do is host the same site on multiple servers\n"
+"at the same time transparently, which is referred to as \"Multihoming.\" In order\n"
+"to multihome your application, you will need to return to the tunnel menu and\n"
+"change the location of your private key file to it's own, non-shared location."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:295
 msgid ""
-"When you're done, copy the new key file for your new multihomed service "
-"to a\n"
-"storage device. Now, you can re-produce your service/tunnel configuration"
-" with\n"
+"When you're done, copy the new key file for your new multihomed service to a\n"
+"storage device. Now, you can re-produce your service/tunnel configuration with\n"
 "those same keys on any I2P router and increase your service's redundancy."
 msgstr ""
 
@@ -9429,11 +8574,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:304
 msgid ""
-"Since you're running an anonymously accessible instance of an existing "
-"clear-net\n"
+"Since you're running an anonymously accessible instance of an existing clear-net\n"
 "service, you'll probably want to leverage some existing form of trust to\n"
-"distribute your eepSite URL, like a TLS Certificate signed by a "
-"recognized and\n"
+"distribute your eepSite URL, like a TLS Certificate signed by a recognized and\n"
 "reputable authority. What can I say we live in an imperfect world."
 msgstr ""
 
@@ -9443,29 +8586,23 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:316
 msgid ""
-"The simplest way to provide a link to your eepSite using an existing site"
-" to\n"
-"distribute the link is to distribute a so-called \"Base32\" address. The "
-"Base32\n"
-"address is the hash of the public key of your I2P destination, so it "
-"cannot be\n"
-"forged if it is provided by a reliable source. In the case of a clear-net"
-" site\n"
+"The simplest way to provide a link to your eepSite using an existing site to\n"
+"distribute the link is to distribute a so-called \"Base32\" address. The Base32\n"
+"address is the hash of the public key of your I2P destination, so it cannot be\n"
+"forged if it is provided by a reliable source. In the case of a clear-net site\n"
 "with a hidden service presence, one of those places is likely to be that\n"
 "clear-net site."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:325
 msgid ""
-"Your base32 address is visible on the main i2ptunnel configuration page "
-"and it\n"
+"Your base32 address is visible on the main i2ptunnel configuration page and it\n"
 "looks like this:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:334
 msgid ""
-"Your users can copy-and-paste this link directly into their I2P browsers "
-"and\n"
+"Your users can copy-and-paste this link directly into their I2P browsers and\n"
 "it will just work, no additional configuration required."
 msgstr ""
 
@@ -9475,17 +8612,12 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:342
 msgid ""
-"You can also distribute a human-readable link to suggest to your "
-"potential users\n"
-"by taking advantage of I2P's \"Address Book\" feature, which allows the "
-"users to\n"
+"You can also distribute a human-readable link to suggest to your potential users\n"
+"by taking advantage of I2P's \"Address Book\" feature, which allows the users to\n"
 "decide to assign a human-readable domain name to your cryptographically\n"
-"assured identity. You can do this by distributing a specially crafted "
-"link\n"
-"containing the domain name that you want to suggest, followed by a slash,"
-"\n"
-"followed by ?i2paddresshelper=, followed by the Local Destination of the "
-"tunnel\n"
+"assured identity. You can do this by distributing a specially crafted link\n"
+"containing the domain name that you want to suggest, followed by a slash,\n"
+"followed by ?i2paddresshelper=, followed by the Local Destination of the tunnel\n"
 "you just created, which you can see here:"
 msgstr ""
 
@@ -9495,14 +8627,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:364
 msgid ""
-"I keep saying suggest because when the such a link is visited, I2P asks "
-"for the\n"
-"user's consent to add this human-readable name to the user's local "
-"address book.\n"
-"That means there is no expectation that this domain be universally agreed"
-" upon\n"
-"by all visitors on the I2P network, whereas in the case of base32 "
-"addresses,\n"
+"I keep saying suggest because when the such a link is visited, I2P asks for the\n"
+"user's consent to add this human-readable name to the user's local address book.\n"
+"That means there is no expectation that this domain be universally agreed upon\n"
+"by all visitors on the I2P network, whereas in the case of base32 addresses,\n"
 "the opposite is true."
 msgstr ""
 
@@ -9512,16 +8640,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:375
 msgid ""
-"Nonetheless, there do exist publicly available address subscription "
-"feeds, and\n"
-"special services for discovering new human-readable addresses, such as "
-"no.i2p,\n"
-"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or "
-"Jump\n"
-"Services, and can also be subscribed to automatically. This may be "
-"espescially\n"
-"helpful to users of your service who wish to acquire the address without "
-"leaving\n"
+"Nonetheless, there do exist publicly available address subscription feeds, and\n"
+"special services for discovering new human-readable addresses, such as no.i2p,\n"
+"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or Jump\n"
+"Services, and can also be subscribed to automatically. This may be espescially\n"
+"helpful to users of your service who wish to acquire the address without leaving\n"
 "I2P or visiting your clearnet service."
 msgstr ""
 
@@ -9539,10 +8662,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:405
 msgid ""
-"Most of the security issues of hosting Tor hidden services also apply to "
-"I2P. It\n"
-"would be advisable to take advantage of their resources as well as this "
-"one:"
+"Most of the security issues of hosting Tor hidden services also apply to I2P. It\n"
+"would be advisable to take advantage of their resources as well as this one:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:410
@@ -9595,27 +8716,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:10
 msgid ""
-"This is a tutorial on how to set up and tweak an I2P tunnel in order to "
-"use it\n"
-"to access an SSH server remotely, using either I2P or i2pd. For now, it "
-"assumes\n"
-"you will install your SSH server from a package manager and that it's "
-"running\n"
+"This is a tutorial on how to set up and tweak an I2P tunnel in order to use it\n"
+"to access an SSH server remotely, using either I2P or i2pd. For now, it assumes\n"
+"you will install your SSH server from a package manager and that it's running\n"
 "as a service."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:17
 msgid ""
-"Considerations: In this guide, I'm assuming a few things. They will need "
-"to be\n"
-"adjusted depending on the complications that arise in your particular "
-"setup,\n"
-"especially if you use VM's or containers for isolation. This assumes that"
-" the\n"
-"I2P router and the ssh server are running on the same localhost. You "
-"should be\n"
-"using newly-generated SSH host keys, either by using a freshly installed "
-"sshd,\n"
+"Considerations: In this guide, I'm assuming a few things. They will need to be\n"
+"adjusted depending on the complications that arise in your particular setup,\n"
+"especially if you use VM's or containers for isolation. This assumes that the\n"
+"I2P router and the ssh server are running on the same localhost. You should be\n"
+"using newly-generated SSH host keys, either by using a freshly installed sshd,\n"
 "or by deleting old keys and forcing their re-generation. For example:"
 msgstr ""
 
@@ -9630,9 +8743,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:41
 msgid ""
-"Using java I2P's web interface, navigate to the (Links to your Router "
-"Console)\\ `Hidden Services Manager "
-"<http://127.0.0.1:7657/i2ptunnelmgr>`__\n"
+"Using java I2P's web interface, navigate to the (Links to your Router Console)\\ `Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\n"
 "and start the tunnel wizard."
 msgstr ""
 
@@ -9643,15 +8754,13 @@ msgstr "터널 마법사"
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:49
 msgid ""
-"Since you are setting up this tunnel for the SSH server, you need to "
-"select the\n"
+"Since you are setting up this tunnel for the SSH server, you need to select the\n"
 "\"Server\" tunnel type."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:58
 msgid ""
-"You should fine-tune it later, but the Standard tunnel type is easiest to"
-" start\n"
+"You should fine-tune it later, but the Standard tunnel type is easiest to start\n"
 "with."
 msgstr ""
 
@@ -9674,23 +8783,17 @@ msgstr "고급 설정"
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:92
 msgid ""
-"Now head back over the the Hidden Services Manager, and look over the "
-"available\n"
-"advanced settings. One thing you'll definitely want to change is to set "
-"it up\n"
+"Now head back over the the Hidden Services Manager, and look over the available\n"
+"advanced settings. One thing you'll definitely want to change is to set it up\n"
 "for interactive connections intstead of bulk connections."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:102
 msgid ""
-"Besides that, these other options can affect performance when accessing "
-"your SSH\n"
-"server. If you aren't that concerned about your anonymity, then you could"
-" reduce\n"
-"the number of hops you take. If you have trouble with speed, a higher "
-"tunnel\n"
-"count might help. A few backup tunnels are probably a good idea. You "
-"might have\n"
+"Besides that, these other options can affect performance when accessing your SSH\n"
+"server. If you aren't that concerned about your anonymity, then you could reduce\n"
+"the number of hops you take. If you have trouble with speed, a higher tunnel\n"
+"count might help. A few backup tunnels are probably a good idea. You might have\n"
 "to dial-it-in a bit."
 msgstr ""
 
@@ -9700,10 +8803,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:118
 msgid ""
-"Another interesting setting, especially if you choose to run a high "
-"number of\n"
-"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels "
-"that run\n"
+"Another interesting setting, especially if you choose to run a high number of\n"
+"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels that run\n"
 "when the serve has experienced extended inactivity."
 msgstr ""
 
@@ -9714,12 +8815,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:131
 msgid ""
-"With i2pd, all configuration is done with files instead of via a web "
-"interface.\n"
-"In order to configure an SSH Service tunnel for i2pd, tweak the following"
-"\n"
-"example settings to your anonymity and performance needs and copy them "
-"into\n"
+"With i2pd, all configuration is done with files instead of via a web interface.\n"
+"In order to configure an SSH Service tunnel for i2pd, tweak the following\n"
+"example settings to your anonymity and performance needs and copy them into\n"
 "tunnels.conf"
 msgstr ""
 
@@ -9733,21 +8831,16 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:158
 msgid ""
-"Depending on how you want to access your SSH Server, you may want to make"
-" a few\n"
-"changes to the settings. Besides the obvious SSH hardening stuff you "
-"should do\n"
-"on all SSH servers(Public-Key Authentication, no login as root, etc), if "
-"you\n"
-"don't want your SSH server to listen on any addresses except your server "
-"tunnel,\n"
+"Depending on how you want to access your SSH Server, you may want to make a few\n"
+"changes to the settings. Besides the obvious SSH hardening stuff you should do\n"
+"on all SSH servers(Public-Key Authentication, no login as root, etc), if you\n"
+"don't want your SSH server to listen on any addresses except your server tunnel,\n"
 "you should change AddressFamily to inet and ListenAddress to 127.0.0.1."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:171
 msgid ""
-"If you choose to use a port other than 22 for your SSH server, you will "
-"need to\n"
+"If you choose to use a port other than 22 for your SSH server, you will need to\n"
 "change the port in your I2P tunnel configuration."
 msgstr ""
 
@@ -9757,27 +8850,22 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:179
 msgid ""
-"You will need to be able to see the I2P router console of the SSH server "
-"in\n"
-"order to configure your client connection. One neat thing about this "
-"setup is\n"
+"You will need to be able to see the I2P router console of the SSH server in\n"
+"order to configure your client connection. One neat thing about this setup is\n"
 "that the initial connection to the I2P tunnel is authenticated, somewhat\n"
-"reducing the risk of your initial connection to the SSH server being "
-"MITM'ed,\n"
+"reducing the risk of your initial connection to the SSH server being MITM'ed,\n"
 "as is a risk in Trust-On-First-Use scenarios."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:197
 msgid ""
-"First, start the tunnel configuration wizard from the hidden services "
-"manager\n"
+"First, start the tunnel configuration wizard from the hidden services manager\n"
 "and select a client tunnel."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:206
 msgid ""
-"Next, select the standard tunnel type. You will fine-tune this "
-"configuration\n"
+"Next, select the standard tunnel type. You will fine-tune this configuration\n"
 "later."
 msgstr ""
 
@@ -9787,27 +8875,22 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:223
 msgid ""
-"This is the only slightly tricky part. Go to the hidden services manager "
-"of the\n"
-"I2P router console and find the base64 \"local destination\" of the SSH "
-"server\n"
-"tunnel. You'll need to find a way to copy this information into the next "
-"step.\n"
+"This is the only slightly tricky part. Go to the hidden services manager of the\n"
+"I2P router console and find the base64 \"local destination\" of the SSH server\n"
+"tunnel. You'll need to find a way to copy this information into the next step.\n"
 "I generally `Tox <https://tox.chat>`__ it to myself, any off-the-record\n"
 "should be sufficient for most people."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:235
 msgid ""
-"Once you've found the base64 destination you want to connect to "
-"transmitted to\n"
+"Once you've found the base64 destination you want to connect to transmitted to\n"
 "your client device, then paste it into the client destination field."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:244
 msgid ""
-"Lastly, set a local port to connect your ssh client to. This will local "
-"port\n"
+"Lastly, set a local port to connect your ssh client to. This will local port\n"
 "will be connected to the base64 destination and thus the SSH server."
 msgstr ""
 
@@ -9817,19 +8900,15 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:266
 msgid ""
-"Like before, you'll want to change the settings to be optimized for "
-"interactive\n"
-"connections. Additionally, if you want to set up client whiteliting on "
-"the\n"
-"server, you should check the \"Generate key to enable persistent client "
-"tunnel\n"
+"Like before, you'll want to change the settings to be optimized for interactive\n"
+"connections. Additionally, if you want to set up client whiteliting on the\n"
+"server, you should check the \"Generate key to enable persistent client tunnel\n"
 "identity\" radial button."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:282
 msgid ""
-"You can set this up by adding the following lines to your tunnels.conf "
-"and\n"
+"You can set this up by adding the following lines to your tunnels.conf and\n"
 "adjust it for your performance/anonymity needs."
 msgstr ""
 
@@ -9843,14 +8922,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:309
 msgid ""
-"There are lots of ways to set up an SSH client to connect to your server "
-"on I2P,\n"
-"but there are a few things you should do to secure your SSH client for "
-"anonymous\n"
-"use. First, you should configure it to only identify itself to SSH server"
-" with\n"
-"a single, specific key so that you don't risk contaminating your "
-"anonymous and\n"
+"There are lots of ways to set up an SSH client to connect to your server on I2P,\n"
+"but there are a few things you should do to secure your SSH client for anonymous\n"
+"use. First, you should configure it to only identify itself to SSH server with\n"
+"a single, specific key so that you don't risk contaminating your anonymous and\n"
 "non-anonymous SSH connections."
 msgstr ""
 
@@ -9860,8 +8935,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:328
 msgid ""
-"Alternatively, you could make a .bash_alias entry to enforce your options"
-" and\n"
+"Alternatively, you could make a .bash_alias entry to enforce your options and\n"
 "automatically connect to I2P. You get the idea, you need to enforce\n"
 "IdentitiesOnly and provide an identity file."
 msgstr ""
@@ -9872,26 +8946,21 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:343
 msgid ""
-"This is more-or-less optional, but it's pretty cool and will prevent "
-"anyone who\n"
-"happens to come across your destination from being able to tell you are "
-"hosting\n"
+"This is more-or-less optional, but it's pretty cool and will prevent anyone who\n"
+"happens to come across your destination from being able to tell you are hosting\n"
 "an SSH service."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:349
 msgid ""
-"First, retrieve the persistent client tunnel destination and transmit it "
-"to the\n"
+"First, retrieve the persistent client tunnel destination and transmit it to the\n"
 "server."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:358
 msgid ""
-"Add the client's base64 destination to the server's destination "
-"whitelist. Now\n"
-"you'll only be able to connect to the server tunnel from that specific "
-"client\n"
+"Add the client's base64 destination to the server's destination whitelist. Now\n"
+"you'll only be able to connect to the server tunnel from that specific client\n"
 "tunnel and no one else will be able to connect to that destination."
 msgstr ""
 
@@ -9909,28 +8978,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:12
 msgid ""
-"One of the best features of I2P, in my opinion, is it's SAM API, which "
-"can be\n"
-"used to build a bridge between I2P and your application or language of "
-"choice.\n"
-"Currently, dozens of SAM libraries exist for a variety of languages, "
-"including:"
+"One of the best features of I2P, in my opinion, is it's SAM API, which can be\n"
+"used to build a bridge between I2P and your application or language of choice.\n"
+"Currently, dozens of SAM libraries exist for a variety of languages, including:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:32
 msgid ""
-"If you're using any of these languages, you may be able to port your "
-"application\n"
-"to I2P already, using an existing library. That's not what this tutorial "
-"is\n"
-"about, though. This tutorial is about what to do if you want to create a "
-"SAM\n"
-"library in a new language. In this tutorial, I will implement a new SAM "
-"library\n"
-"in Java. I chose Java because there isn't a Java library that connects "
-"you to\n"
-"SAM yet, because of Java's use in Android, and because it's a language "
-"almost\n"
+"If you're using any of these languages, you may be able to port your application\n"
+"to I2P already, using an existing library. That's not what this tutorial is\n"
+"about, though. This tutorial is about what to do if you want to create a SAM\n"
+"library in a new language. In this tutorial, I will implement a new SAM library\n"
+"in Java. I chose Java because there isn't a Java library that connects you to\n"
+"SAM yet, because of Java's use in Android, and because it's a language almost\n"
 "everybody has at least a *little* experience with, so hopefully you can\n"
 "translate it into a language of your choice."
 msgstr ""
@@ -9941,10 +9001,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:46
 msgid ""
-"How you set up your own library will vary depending on the language you "
-"wish\n"
-"to use. For this example library, we'll be using java so we can create a "
-"library\n"
+"How you set up your own library will vary depending on the language you wish\n"
+"to use. For this example library, we'll be using java so we can create a library\n"
 "like this:"
 msgstr ""
 
@@ -9958,10 +9016,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:69
 msgid ""
-"There are a few pieces of data that almost any SAM library should "
-"probably\n"
-"manage. It will at least need to store the address of the SAM Bridge you "
-"intend\n"
+"There are a few pieces of data that almost any SAM library should probably\n"
+"manage. It will at least need to store the address of the SAM Bridge you intend\n"
 "to use and the signature type you wish to use."
 msgstr ""
 
@@ -9971,8 +9027,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:78
 msgid ""
-"I prefer to store the SAM address as a String and an Integer, and re-"
-"combine\n"
+"I prefer to store the SAM address as a String and an Integer, and re-combine\n"
 "them in a function at runtime."
 msgstr ""
 
@@ -9982,15 +9037,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:94
 msgid ""
-"The valid signature types for an I2P Tunnel are DSA_SHA1, "
-"ECDSA_SHA256_P256,\n"
+"The valid signature types for an I2P Tunnel are DSA_SHA1, ECDSA_SHA256_P256,\n"
 "ECDSA_SHA384_P384, ECDSA_SHA512_P521, EdDSA_SHA512_Ed25519, but it is\n"
-"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if "
-"you\n"
-"implement at least SAM 3.1. In java, the 'enum' datastructure lends "
-"itself to\n"
-"this task, as it is intended to contain a group of constants. Add the "
-"enum, and\n"
+"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if you\n"
+"implement at least SAM 3.1. In java, the 'enum' datastructure lends itself to\n"
+"this task, as it is intended to contain a group of constants. Add the enum, and\n"
 "an instance of the enum, to your java class definition."
 msgstr ""
 
@@ -10001,8 +9052,7 @@ msgstr ""
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:117
 msgid ""
 "That takes care of reliably storing the signature type in use by the SAM\n"
-"connection, but you've still got to retrieve it as a string to "
-"communicate it\n"
+"connection, but you've still got to retrieve it as a string to communicate it\n"
 "to the bridge."
 msgstr ""
 
@@ -10012,10 +9062,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:156
 msgid ""
-"Once that's done, begin creating your constructor. Note that we've given "
-"our\n"
-"library defaults which will be useful in default situations on all "
-"existing I2P\n"
+"Once that's done, begin creating your constructor. Note that we've given our\n"
+"library defaults which will be useful in default situations on all existing I2P\n"
 "routers so far."
 msgstr ""
 
@@ -10025,14 +9073,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:173
 msgid ""
-"Finally, the good part. Interaction with the SAM bridge is done by "
-"sending a\n"
-"\"command\" to the address of the SAM bridge, and you can parse the "
-"result of the\n"
-"command as a set of string-based key-value pairs. So bearing that in "
-"mind, let's\n"
-"estabish a read-write connection to the SAM Address we defined before, "
-"then\n"
+"Finally, the good part. Interaction with the SAM bridge is done by sending a\n"
+"\"command\" to the address of the SAM bridge, and you can parse the result of the\n"
+"command as a set of string-based key-value pairs. So bearing that in mind, let's\n"
+"estabish a read-write connection to the SAM Address we defined before, then\n"
 "write a \"CommandSAM\" Function and a reply parser."
 msgstr ""
 
@@ -10042,17 +9086,14 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:184
 msgid ""
-"We're communicating with SAM via a Socket, so in order to connect to, "
-"read from,\n"
-"and write to the socket, you'll need to create the following private "
-"variables\n"
+"We're communicating with SAM via a Socket, so in order to connect to, read from,\n"
+"and write to the socket, you'll need to create the following private variables\n"
 "in the Jsam class:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:196
 msgid ""
-"You will also want to instantiate those variables in your Constructors by"
-"\n"
+"You will also want to instantiate those variables in your Constructors by\n"
 "creating a function to do so."
 msgstr ""
 
@@ -10062,23 +9103,17 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:222
 msgid ""
-"Now you're all set up to finally start talking to SAM. In order to keep "
-"things\n"
-"nicely organized, let's create a function which sends a single command to"
-" SAM,\n"
-"terminated by a newline, and which returns a Reply object, which we will "
-"create\n"
+"Now you're all set up to finally start talking to SAM. In order to keep things\n"
+"nicely organized, let's create a function which sends a single command to SAM,\n"
+"terminated by a newline, and which returns a Reply object, which we will create\n"
 "in the next step:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:241
 msgid ""
-"Note that we are using the writer and reader we created from the socket "
-"in the\n"
-"previous step as our inputs and outputs to the socket. When we get a "
-"reply from\n"
-"the reader, we pass the string to the Reply constructor, which parses it "
-"and\n"
+"Note that we are using the writer and reader we created from the socket in the\n"
+"previous step as our inputs and outputs to the socket. When we get a reply from\n"
+"the reader, we pass the string to the Reply constructor, which parses it and\n"
 "returns the Reply object."
 msgstr ""
 
@@ -10089,37 +9124,29 @@ msgstr ""
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:253
 msgid ""
 "In order to more easily handle replies, we'll use a Reply object to\n"
-"automatically parse the results we get from the SAM bridge. A reply has "
-"at least\n"
-"a topic, a type, and a result, as well as an arbitrary number of key-"
-"value\n"
+"automatically parse the results we get from the SAM bridge. A reply has at least\n"
+"a topic, a type, and a result, as well as an arbitrary number of key-value\n"
 "pairs."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:268
 msgid ""
-"As you can see, we will be storing the \"result\" as an enum, "
-"REPLY_TYPES. This\n"
-"enum contains all the possible reply results which the SAM bridge might "
-"respond\n"
+"As you can see, we will be storing the \"result\" as an enum, REPLY_TYPES. This\n"
+"enum contains all the possible reply results which the SAM bridge might respond\n"
 "with."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:335
 msgid ""
-"Now let's create our constructor, which takes the reply string recieved "
-"from the\n"
-"socket as a parameter, parses it, and uses the information to set up the "
-"reply\n"
-"object. The reply is space-delimited, with key-value pairs joined by an "
-"equal\n"
+"Now let's create our constructor, which takes the reply string recieved from the\n"
+"socket as a parameter, parses it, and uses the information to set up the reply\n"
+"object. The reply is space-delimited, with key-value pairs joined by an equal\n"
 "sign and terminated by a newline."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:364
 msgid ""
-"Lastly, for the sake of convenience, let's give the reply object a "
-"toString()\n"
+"Lastly, for the sake of convenience, let's give the reply object a toString()\n"
 "function which returns a string representation of the Reply object."
 msgstr ""
 
@@ -10129,30 +9156,21 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:379
 msgid ""
-"Now we're ready to establish communication with SAM by sending a "
-"\"Hello\"\n"
-"message. If you're writing a new SAM library, you should probably target "
-"at\n"
-"least SAM 3.1, since it's available in both I2P and i2pd and introduces "
-"support\n"
+"Now we're ready to establish communication with SAM by sending a \"Hello\"\n"
+"message. If you're writing a new SAM library, you should probably target at\n"
+"least SAM 3.1, since it's available in both I2P and i2pd and introduces support\n"
 "for the SIGNATURE_TYPE parameter."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:397
 msgid ""
-"As you can see, we use the CommandSAM function we created before to send "
-"the\n"
-"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This "
-"tells\n"
-"SAM that you want to start communicating with the API, and that you know "
-"how\n"
+"As you can see, we use the CommandSAM function we created before to send the\n"
+"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This tells\n"
+"SAM that you want to start communicating with the API, and that you know how\n"
 "to speak SAM version 3.0 and 3.1. The router, in turn, will respond with\n"
-"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass"
-" to\n"
-"the Reply constructor to get a valid Reply object. From now on, we can "
-"use our\n"
-"CommandSAM function and Reply object to deal with all our communication "
-"across\n"
+"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass to\n"
+"the Reply constructor to get a valid Reply object. From now on, we can use our\n"
+"CommandSAM function and Reply object to deal with all our communication across\n"
 "the SAM bridge."
 msgstr ""
 
@@ -10162,66 +9180,46 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:423
 msgid ""
-"Now that you've negotiated your connection to SAM and agreed on a SAM "
-"version\n"
-"you both speak, you can set up peer-to-peer connections for your "
-"application\n"
-"to connect to other i2p applications. You do this by sending a \"SESSION "
-"CREATE\"\n"
-"command to the SAM Bridge. To do that, we'll use a CreateSession function"
-" that\n"
+"Now that you've negotiated your connection to SAM and agreed on a SAM version\n"
+"you both speak, you can set up peer-to-peer connections for your application\n"
+"to connect to other i2p applications. You do this by sending a \"SESSION CREATE\"\n"
+"command to the SAM Bridge. To do that, we'll use a CreateSession function that\n"
 "accepts a session ID and a destination type parameter."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:444
 msgid ""
-"That was easy, right? All we had to do was adapt the pattern we used in "
-"our\n"
-"HelloSAM function to the ``SESSION CREATE`` command. A good reply from "
-"the\n"
-"bridge will still return OK, and in that case we return the ID of the "
-"newly\n"
-"created SAM connection. Otherwise, we return an empty string because "
-"that's an\n"
-"invalid ID anyway and it failed, so it's easy to check. Let's see if this"
-"\n"
+"That was easy, right? All we had to do was adapt the pattern we used in our\n"
+"HelloSAM function to the ``SESSION CREATE`` command. A good reply from the\n"
+"bridge will still return OK, and in that case we return the ID of the newly\n"
+"created SAM connection. Otherwise, we return an empty string because that's an\n"
+"invalid ID anyway and it failed, so it's easy to check. Let's see if this\n"
 "function works by writing a test for it:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:461
 msgid ""
-"Note that in this test, we *must* call HelloSAM first to establish "
-"communication\n"
-"with SAM before starting our session. If not, the bridge will reply with "
-"an\n"
+"Note that in this test, we *must* call HelloSAM first to establish communication\n"
+"with SAM before starting our session. If not, the bridge will reply with an\n"
 "error and the test will fail."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:472
 msgid ""
-"Now you have your session established and your local destination, and "
-"need to\n"
-"decide what you want to do with them. Your session can now be commanded "
-"to\n"
-"connect to a remote service over I2P, or to wait for incoming connections"
-" to\n"
-"respond to. However, before you can connect to a remote destination, you "
-"may\n"
-"need to obtain the base64 of the destination, which is what the API "
-"expects. In\n"
-"order to do this, we'll create a LookupName function, which will return "
-"the\n"
+"Now you have your session established and your local destination, and need to\n"
+"decide what you want to do with them. Your session can now be commanded to\n"
+"connect to a remote service over I2P, or to wait for incoming connections to\n"
+"respond to. However, before you can connect to a remote destination, you may\n"
+"need to obtain the base64 of the destination, which is what the API expects. In\n"
+"order to do this, we'll create a LookupName function, which will return the\n"
 "base64 in a usable form."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:494
 msgid ""
-"Again, this is almost the same as our HelloSAM and CreateSession "
-"functions,\n"
-"with one difference. Since we're looking for the VALUE specifically and "
-"the NAME\n"
-"field will be the same as the ``name`` argument, it simply returns the "
-"base64\n"
+"Again, this is almost the same as our HelloSAM and CreateSession functions,\n"
+"with one difference. Since we're looking for the VALUE specifically and the NAME\n"
+"field will be the same as the ``name`` argument, it simply returns the base64\n"
 "string of the destination requested."
 msgstr ""
 
@@ -10231,50 +9229,39 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:516
 msgid ""
-"At last, we are going to establish a connection to another service with "
-"our new\n"
+"At last, we are going to establish a connection to another service with our new\n"
 "library. This part confused me a bit at first, but the most astute Java\n"
 "developers were probably wondering why we didn't extend the socket class\n"
-"instead of creating a Socket variable inside of the Jsam class. That's "
-"because\n"
-"until now, we've been communicating with the \"Control Socket\" and we "
-"need to\n"
-"create a new socket to do the actual communication. So we've waited to "
-"extend\n"
+"instead of creating a Socket variable inside of the Jsam class. That's because\n"
+"until now, we've been communicating with the \"Control Socket\" and we need to\n"
+"create a new socket to do the actual communication. So we've waited to extend\n"
 "the the Socket class with the Jsam class until now:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:530
 msgid ""
-"Also, let's alter our startConnection function so that we can use it to "
-"switch\n"
-"over from the control socket to the socket we'll be using in our "
-"application. It\n"
+"Also, let's alter our startConnection function so that we can use it to switch\n"
+"over from the control socket to the socket we'll be using in our application. It\n"
 "will now take a Socket argument."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:556
 msgid ""
-"This allows us to quickly and easily open a new socket to communicate "
-"over,\n"
+"This allows us to quickly and easily open a new socket to communicate over,\n"
 "perform the \"Hello SAM\" handshake over again, and connect the stream."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:579
 msgid ""
-"And now you have a new Socket for communicating over SAM! Let's do the "
-"same\n"
+"And now you have a new Socket for communicating over SAM! Let's do the same\n"
 "thing for Accepting remote connections:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:599
 msgid ""
-"There you have it. That's how you build a SAM library, step-by-step. In "
-"the\n"
-"future, I will cross-reference this with the working version of the "
-"library,\n"
-"Jsam, and the SAM v3 specification but for now I've got to get some other"
-" stuff\n"
+"There you have it. That's how you build a SAM library, step-by-step. In the\n"
+"future, I will cross-reference this with the working version of the library,\n"
+"Jsam, and the SAM v3 specification but for now I've got to get some other stuff\n"
 "done."
 msgstr ""
 
@@ -10297,8 +9284,7 @@ msgstr ""
 #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:23
 msgid ""
 "Startup should be faster on platforms such as Raspberry Pi.\n"
-"We've fixed several bugs, including some serious ones affecting low-level"
-" network messages."
+"We've fixed several bugs, including some serious ones affecting low-level network messages."
 msgstr ""
 
 #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:38
@@ -10392,58 +9378,39 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:11
 msgid ""
-"*This post is adapted directly from material originally created for "
-"mhatta's*\n"
-"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-"
-"c08ec9de225d>`__\\ *.*\n"
-"*He deserves the credit for the OP. It has been updated in certain places"
-" where*\n"
-"*it refers to old versions of I2P as current and has undergone some "
-"light*\n"
+"*This post is adapted directly from material originally created for mhatta's*\n"
+"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-c08ec9de225d>`__\\ *.*\n"
+"*He deserves the credit for the OP. It has been updated in certain places where*\n"
+"*it refers to old versions of I2P as current and has undergone some light*\n"
 "*editing. -idk*"
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:17
 msgid ""
-"Right after it starts up, I2P is often seen as a little bit slow. It's "
-"true, and\n"
-"we all know why, by nature, `garlic routing "
-"<https://en.wikipedia.org/wiki/Garlic_routing>`__\n"
-"adds overhead to the familiar experience of using the internet so that "
-"you can\n"
-"have privacy, but this means that for many or most I2P services, your "
-"data will\n"
+"Right after it starts up, I2P is often seen as a little bit slow. It's true, and\n"
+"we all know why, by nature, `garlic routing <https://en.wikipedia.org/wiki/Garlic_routing>`__\n"
+"adds overhead to the familiar experience of using the internet so that you can\n"
+"have privacy, but this means that for many or most I2P services, your data will\n"
 "need to go through 12 hops by default."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:28
 msgid ""
-"Also, unlike Tor, I2P was primarily designed as a closed network. You can"
-"\n"
-"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-"
-"untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources "
-"inside I2P, but you are not supposed\n"
-"to access `clearnet "
-"<https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n"
+"Also, unlike Tor, I2P was primarily designed as a closed network. You can\n"
+"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources inside I2P, but you are not supposed\n"
+"to access `clearnet <https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n"
 "websites through I2P. There exist a few I2P “outproxies” similar to\n"
-"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit"
-" nodes to\n"
-"access clearnet, but most of them are very slow to use as going to the "
-"clearnet\n"
-"is effectively *another* hop in the already 6 hops in, six hops out "
-"connection."
+"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit nodes to\n"
+"access clearnet, but most of them are very slow to use as going to the clearnet\n"
+"is effectively *another* hop in the already 6 hops in, six hops out connection."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:36
 msgid ""
-"Until a few versions ago, this problem was even harder to deal with "
-"because many\n"
-"I2P router users were having difficulties configuring the bandwidth "
-"settings for\n"
-"their routers. If everyone who can takes the time to adjust their "
-"bandwidth\n"
-"settings properly, they will improve not only your connection but also "
-"the I2P\n"
+"Until a few versions ago, this problem was even harder to deal with because many\n"
+"I2P router users were having difficulties configuring the bandwidth settings for\n"
+"their routers. If everyone who can takes the time to adjust their bandwidth\n"
+"settings properly, they will improve not only your connection but also the I2P\n"
 "network as a whole."
 msgstr ""
 
@@ -10453,8 +9420,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:45
 msgid ""
-"Since I2P is a peer-to-peer network, you have to share some of your "
-"network\n"
+"Since I2P is a peer-to-peer network, you have to share some of your network\n"
 "bandwidth with other peers. You see choose how much in “I2P Bandwidth\n"
 "Configuration” (“Configure Bandwidth” button in the “Applications and\n"
 "Configuration” section of I2P Router Console, or\n"
@@ -10463,47 +9429,34 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:55
 msgid ""
-"If you see a shared bandwidth limit of 48 KBps, which is very low, then "
-"you\n"
-"may not have adjusted your shared bandwidth from the default. As the "
-"original\n"
-"author of the material this blog post is adapted from noted, I2P has a "
-"default\n"
-"shared bandwidth limit that is very low until the user adjusts it to "
-"avoid\n"
+"If you see a shared bandwidth limit of 48 KBps, which is very low, then you\n"
+"may not have adjusted your shared bandwidth from the default. As the original\n"
+"author of the material this blog post is adapted from noted, I2P has a default\n"
+"shared bandwidth limit that is very low until the user adjusts it to avoid\n"
 "causing issues with the user's connection."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:61
 msgid ""
-"However, since many users may not know exactly which bandwidth settings "
-"to\n"
-"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ "
-"introduced a\n"
-"New Install Wizard. It contains a Bandwidth Test, which automatically "
-"detects\n"
-"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) "
-"and adjusts\n"
+"However, since many users may not know exactly which bandwidth settings to\n"
+"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ introduced a\n"
+"New Install Wizard. It contains a Bandwidth Test, which automatically detects\n"
+"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) and adjusts\n"
 "I2P’s bandwidth settings accordingly."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:67
 msgid ""
-"If you want to re-run the wizard, for instance following a change in your"
-"\n"
-"service provider or bcause you installed I2P before version 0.9.38, you "
-"can\n"
-"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply "
-"access\n"
+"If you want to re-run the wizard, for instance following a change in your\n"
+"service provider or bcause you installed I2P before version 0.9.38, you can\n"
+"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply access\n"
 "the wizard directly at http://localhost:7657/welcome"
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:76
 msgid ""
-"Using the Wizard is straightforward, simply keep clicking “Next”. "
-"Sometimes\n"
-"M-Lab’s chosen measurement servers are down and the test fails. In such "
-"case,\n"
+"Using the Wizard is straightforward, simply keep clicking “Next”. Sometimes\n"
+"M-Lab’s chosen measurement servers are down and the test fails. In such case,\n"
 "click “Previous” (do not use your web browser’s “back” button), then\n"
 "try it again."
 msgstr ""
@@ -10514,27 +9467,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:88
 msgid ""
-"Even after adjusted the bandwidth, your connection might still be slow As"
-" I\n"
-"said, I2P is a P2P network. It will take some time for your I2P router to"
-" be\n"
-"discovered by other peers and integrated into the I2P network. If your "
-"router\n"
-"not up long enough to become well integrated, or if you shut down un-"
-"gracefully\n"
-"too often, the network will remain fairly slow. On the other hand, the "
-"longer\n"
-"you run your I2P router continuously, the faster and more stable your "
-"connection\n"
+"Even after adjusted the bandwidth, your connection might still be slow As I\n"
+"said, I2P is a P2P network. It will take some time for your I2P router to be\n"
+"discovered by other peers and integrated into the I2P network. If your router\n"
+"not up long enough to become well integrated, or if you shut down un-gracefully\n"
+"too often, the network will remain fairly slow. On the other hand, the longer\n"
+"you run your I2P router continuously, the faster and more stable your connection\n"
 "becomes, and more of your bandwidth share will be used in the network."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:96
 msgid ""
-"However, many people might not be able to stay your I2P router up. In "
-"such\n"
-"case, you can still run the I2P router on a remote server such as VPS, "
-"then use\n"
+"However, many people might not be able to stay your I2P router up. In such\n"
+"case, you can still run the I2P router on a remote server such as VPS, then use\n"
 "SSH port forwarding."
 msgstr ""
 
@@ -10550,10 +9495,8 @@ msgstr ""
 msgid ""
 "0.9.42 continues the work to make I2P faster and more reliable.\n"
 "It includes several changes to speed up our UDP transport.\n"
-"We have split up the configuration files to enable future work for more "
-"modular packaging.\n"
-"We continue work to implement new proposals for faster and more secure "
-"encryption.\n"
+"We have split up the configuration files to enable future work for more modular packaging.\n"
+"We continue work to implement new proposals for faster and more secure encryption.\n"
 "There are, of course, a lot of bug fixes also."
 msgstr ""
 
@@ -10582,7 +9525,8 @@ msgid "JBigI: GMP 6.1.2 (Linux 64-bit only)"
 msgstr ""
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:40
-msgid "NetDB: Choose alternate gateway for store replies to reduce connections"
+msgid ""
+"NetDB: Choose alternate gateway for store replies to reduce connections"
 msgstr ""
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:41
@@ -10629,134 +9573,91 @@ msgstr ""
 msgid "Def Con Trip Report- zzz"
 msgstr ""
 
-#: i2p2www/blog/2019/08/30/defcon.rst:11 i2p2www/blog/2019/08/30/defcon2.rst:11
+#: i2p2www/blog/2019/08/30/defcon.rst:11
+#: i2p2www/blog/2019/08/30/defcon2.rst:11
 msgid "Def Con Trip Report"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:14
 msgid ""
-"idk and I attended DEFCON 27 and presented two workshops on I2P for "
-"application\n"
-"developers, with support from mhatta and Alex. I gave the workshop at "
-"Monero\n"
-"Village and idk gave the one at Crypto/Privacy Village. Here, I will "
-"summarize\n"
-"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will"
-" post a\n"
+"idk and I attended DEFCON 27 and presented two workshops on I2P for application\n"
+"developers, with support from mhatta and Alex. I gave the workshop at Monero\n"
+"Village and idk gave the one at Crypto/Privacy Village. Here, I will summarize\n"
+"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will post a\n"
 "trip report covering his workshop."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:22
 msgid ""
-"We had about 8 attendees for the Monero Village workshop, entitled \"I2P "
-"for\n"
-"Cryptocurrency Developers\". We planned to discuss the particular "
-"networking\n"
-"needs for each application and work through the various i2ptunnel and SAM"
-"\n"
-"options available. However, all attendees were relatively unfamiliar with"
-" I2P,\n"
-"so we pivoted and gave an overview of I2P. As none of the attendees had a"
-" laptop\n"
-"with them, we helped several of them install I2P on their Android phone "
-"and\n"
-"walked through some of the features of the app. For all users, the app "
-"appeared\n"
+"We had about 8 attendees for the Monero Village workshop, entitled \"I2P for\n"
+"Cryptocurrency Developers\". We planned to discuss the particular networking\n"
+"needs for each application and work through the various i2ptunnel and SAM\n"
+"options available. However, all attendees were relatively unfamiliar with I2P,\n"
+"so we pivoted and gave an overview of I2P. As none of the attendees had a laptop\n"
+"with them, we helped several of them install I2P on their Android phone and\n"
+"walked through some of the features of the app. For all users, the app appeared\n"
 "to reseed and build tunnels fairly quickly."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:33
 msgid ""
-"One common question after installing the app was \"what do I do now?\". "
-"The app\n"
-"doesn't have a 'hidden services of interest' section or first-run wizard "
-"like\n"
-"our desktop application does, and most of the default addressbook entries"
-" are\n"
-"long-dead. There's improvements we could make to the first-run "
-"experience.\n"
+"One common question after installing the app was \"what do I do now?\". The app\n"
+"doesn't have a 'hidden services of interest' section or first-run wizard like\n"
+"our desktop application does, and most of the default addressbook entries are\n"
+"long-dead. There's improvements we could make to the first-run experience.\n"
 "Also, some of the more interesting parts of the app are hidden behind an\n"
-"advanced setting; we should review those items and consider un-hiding "
-"some of\n"
+"advanced setting; we should review those items and consider un-hiding some of\n"
 "them."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:43
 msgid ""
-"It's always useful to go to Tor talks, not so much to find out what "
-"they're\n"
-"doing, but to hear how they explain things to people, and what "
-"terminology they\n"
-"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large "
-"room\n"
-"attended by about two thousand people. He gave a very brief overview of "
-"Tor\n"
-"with only three or four slides. He says they now have \"two to eight "
-"million\n"
-"users a day\". Most of the talk was a review of national blocking "
-"attempts over\n"
-"the years, starting with Thailand and Iran in '06-'07 through Tunisia, "
-"china,\n"
-"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He "
-"showed a\n"
-"new form to be showed to new users, with a checkbox \"Tor is censored in "
-"my\n"
+"It's always useful to go to Tor talks, not so much to find out what they're\n"
+"doing, but to hear how they explain things to people, and what terminology they\n"
+"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large room\n"
+"attended by about two thousand people. He gave a very brief overview of Tor\n"
+"with only three or four slides. He says they now have \"two to eight million\n"
+"users a day\". Most of the talk was a review of national blocking attempts over\n"
+"the years, starting with Thailand and Iran in '06-'07 through Tunisia, china,\n"
+"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He showed a\n"
+"new form to be showed to new users, with a checkbox \"Tor is censored in my\n"
 "country\"."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:56
 msgid ""
 "Their new pluggable transport \"snowflake\" uses a combination of domain\n"
-"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. "
-"Roger\n"
-"only had one slide on it, and I wasn't familiar with it, so we should do "
-"more\n"
-"research on what it's all about. He briefly mentioned some things they "
-"may be\n"
-"working on next, including \"salmon\" distribution of bridges, "
-"FTE/Marionette,\n"
-"decoy routing, and \"cupcake\" which is an extension of snowflake. While "
-"I don't\n"
-"have any further information about them, they may be good buzzwords to "
-"keep an\n"
+"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. Roger\n"
+"only had one slide on it, and I wasn't familiar with it, so we should do more\n"
+"research on what it's all about. He briefly mentioned some things they may be\n"
+"working on next, including \"salmon\" distribution of bridges, FTE/Marionette,\n"
+"decoy routing, and \"cupcake\" which is an extension of snowflake. While I don't\n"
+"have any further information about them, they may be good buzzwords to keep an\n"
 "eye out for on their mailing lists."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:67
 msgid ""
 "Much of Tor's censorship woes is due to Tor's popularity, but their TLS\n"
-"handshake is a particular issue and it's been the focus of much of the "
-"\"arms\n"
-"race\" over the years. In some ways we're in better shape, as we've taken"
-"\n"
-"several features of their current-best obfs4 pluggable transport and "
-"build them\n"
-"into NTCP2. However, we do have issues with our website and reseeds being"
-"\n"
+"handshake is a particular issue and it's been the focus of much of the \"arms\n"
+"race\" over the years. In some ways we're in better shape, as we've taken\n"
+"several features of their current-best obfs4 pluggable transport and build them\n"
+"into NTCP2. However, we do have issues with our website and reseeds being\n"
 "blocked, as Sadie and Phong will be presenting at USENIX FOCI this week."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:76
 msgid ""
-"Notes for next time: I do recommend DEFCON, as long as we find a village "
-"to\n"
-"call our home. It's an enormous conference and the limited general "
-"hangout\n"
+"Notes for next time: I do recommend DEFCON, as long as we find a village to\n"
+"call our home. It's an enormous conference and the limited general hangout\n"
 "spaces are massively overcrowded. Both Monero Village and Crypto/Privacy\n"
-"Village were fantastic hosts and we had several hours at each spot to "
-"meet with\n"
-"people. We should find more opportunities to work with both "
-"organizations.\n"
-"There were also ZCash people at the Monero Village and we should work "
-"with them\n"
-"also. Any future workshop should be targeted at a more general audience. "
-"We do\n"
-"need a standard \"Intro to I2P\" slide deck; it would have been helpful "
-"at the\n"
-"workshops. Don't expect attendees to have laptops with them, focus on "
-"Android\n"
-"for any hands-on exercises. There's several improvements to be made in "
-"our\n"
+"Village were fantastic hosts and we had several hours at each spot to meet with\n"
+"people. We should find more opportunities to work with both organizations.\n"
+"There were also ZCash people at the Monero Village and we should work with them\n"
+"also. Any future workshop should be targeted at a more general audience. We do\n"
+"need a standard \"Intro to I2P\" slide deck; it would have been helpful at the\n"
+"workshops. Don't expect attendees to have laptops with them, focus on Android\n"
+"for any hands-on exercises. There's several improvements to be made in our\n"
 "Android app. Drink lots of water in Vegas... and stay away from the slot\n"
 "machines."
 msgstr ""
@@ -10773,95 +9674,67 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:19
 msgid ""
-"My workshop went well, we even had a few application developers attend! "
-"In\n"
-"particular I had a pretty lengthy conversation with a person named Mary "
-"about\n"
+"My workshop went well, we even had a few application developers attend! In\n"
+"particular I had a pretty lengthy conversation with a person named Mary about\n"
 "how I2P could be used to eliminate centralization and enhance privacy in\n"
-"a \"Magic Wormhole\" type of application. While I wasn't totally familiar"
-" with\n"
-"Magic Wormhole at the time, I think most of my advice was usable. I think"
-" Mary\n"
-"had some very interesting and workable ideas about sharing information in"
-" more\n"
-"human-centric ways that could be interesting in I2P applications, and am "
-"looking\n"
+"a \"Magic Wormhole\" type of application. While I wasn't totally familiar with\n"
+"Magic Wormhole at the time, I think most of my advice was usable. I think Mary\n"
+"had some very interesting and workable ideas about sharing information in more\n"
+"human-centric ways that could be interesting in I2P applications, and am looking\n"
 "forward to experimenting with some of those."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:30
 msgid ""
-"The materials I made for the application development workshop are "
-"available on\n"
-"Github! https://github.com/eyedeekay/defcon Please consider it a living "
-"document,\n"
-"your input is desired! As it is licensed permissively, you are free to "
-"fork it\n"
-"and make it your own as well. Share your examples, your hacks, or correct"
-" my\n"
-"comma use, complain about my document preparation style, or just print "
-"off your\n"
+"The materials I made for the application development workshop are available on\n"
+"Github! https://github.com/eyedeekay/defcon Please consider it a living document,\n"
+"your input is desired! As it is licensed permissively, you are free to fork it\n"
+"and make it your own as well. Share your examples, your hacks, or correct my\n"
+"comma use, complain about my document preparation style, or just print off your\n"
 "own copy in booklet form!"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:39
 msgid ""
-"I also talked to a guy who gives advice to the government about the "
-"differences\n"
-"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in "
-"which\n"
-"peers in a P2P application might want to have enhanced privacy from each-"
-"other,\n"
+"I also talked to a guy who gives advice to the government about the differences\n"
+"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in which\n"
+"peers in a P2P application might want to have enhanced privacy from each-other,\n"
 "and why I2P is perhaps uniquely suited to accomplish that."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:46
 msgid ""
-"In general, both the application development workshops went well, even "
-"though\n"
-"they didn't go entirely according to plan in that only a small proportion"
-" of the\n"
-"audience were application developers. The impression I got was that many "
-"people\n"
-"are very interested in I2P, but also many people are confused by how "
-"interacting\n"
-"with I2P works. By re-focusing on their questions and by teaming off with"
-" zzz,\n"
-"mhatta, and Alex we were fairly successful at dealing with our audience, "
-"which\n"
+"In general, both the application development workshops went well, even though\n"
+"they didn't go entirely according to plan in that only a small proportion of the\n"
+"audience were application developers. The impression I got was that many people\n"
+"are very interested in I2P, but also many people are confused by how interacting\n"
+"with I2P works. By re-focusing on their questions and by teaming off with zzz,\n"
+"mhatta, and Alex we were fairly successful at dealing with our audience, which\n"
 "was more varied in terms of occupation, interest, and I2P knowledge than\n"
 "expected."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:57
 msgid ""
-"Besides that, I also talked to Alex about my experimental contextual-"
-"identity\n"
-"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to"
-" talk\n"
-"a little about bundling, but not too much, as it was a very busy "
-"convention. I'm\n"
+"Besides that, I also talked to Alex about my experimental contextual-identity\n"
+"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to talk\n"
+"a little about bundling, but not too much, as it was a very busy convention. I'm\n"
 "looking forward to following up with him on that soon."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:64
 msgid ""
 "mhatta and I almost won a lobster from a claw machine, but it was a real\n"
-"fighter and got away at the last second. Really thought I had it for a "
-"moment\n"
+"fighter and got away at the last second. Really thought I had it for a moment\n"
 "though. :)"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:70
 msgid ""
-"To add to zzz's notes for next time, aside from being more general I "
-"believe our\n"
-"workshops would not have been as able to adapt to the needs of the "
-"audience\n"
-"without the support of mhatta and Alex. Having people who can help "
-"particpants\n"
-"individually or in small groups was immensely helpful, many, many thanks "
-"to both\n"
+"To add to zzz's notes for next time, aside from being more general I believe our\n"
+"workshops would not have been as able to adapt to the needs of the audience\n"
+"without the support of mhatta and Alex. Having people who can help particpants\n"
+"individually or in small groups was immensely helpful, many, many thanks to both\n"
 "of them for helping us out."
 msgstr ""
 
@@ -10872,95 +9745,71 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:14
 msgid ""
-"Over the past year I have had the good fortune to participate in the "
-"research\n"
-"Nguyen Phong Hoang from Stony Brook University has been doing regarding "
-"I2P\n"
-"censorship. The infrastructure used for this research provided numerous "
-"and\n"
-"geographically diverse vantage points, and also the ability to conduct "
-"in-depth\n"
-"measurements across all levels of the network stack. I2P services which "
-"were\n"
-"measured for availability included official homepage, mirror site, reseed"
-"\n"
+"Over the past year I have had the good fortune to participate in the research\n"
+"Nguyen Phong Hoang from Stony Brook University has been doing regarding I2P\n"
+"censorship. The infrastructure used for this research provided numerous and\n"
+"geographically diverse vantage points, and also the ability to conduct in-depth\n"
+"measurements across all levels of the network stack. I2P services which were\n"
+"measured for availability included official homepage, mirror site, reseed\n"
 "servers and active relays."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:24
 msgid ""
-"The presentation on Tuesday went very well, and Phong was very busy "
-"afterwards\n"
-"answering questions about his work. I was busy too answering questions "
-"about\n"
-"I2P and what it does. The new stickers featuring the updated logo by Ura "
-"Design\n"
-"got rave reviews! It was a very positive experience and I will be looking"
-"\n"
-"forward to continuing to work with Phong and monitoring I2P censorship. I"
-" would\n"
-"encourage anyone who has encountered blocking, or has had success using "
-"I2P to\n"
+"The presentation on Tuesday went very well, and Phong was very busy afterwards\n"
+"answering questions about his work. I was busy too answering questions about\n"
+"I2P and what it does. The new stickers featuring the updated logo by Ura Design\n"
+"got rave reviews! It was a very positive experience and I will be looking\n"
+"forward to continuing to work with Phong and monitoring I2P censorship. I would\n"
+"encourage anyone who has encountered blocking, or has had success using I2P to\n"
 "communicate in restricted environments to reach out if you can. I2P is\n"
-"currently working on new solutions to circumvent internet blocking. "
-"Having met\n"
+"currently working on new solutions to circumvent internet blocking. Having met\n"
 "people this year who have given me first hand accounts of the effects of\n"
-"censorship and the need to stay connected, makes the need for I2P to be "
-"more\n"
-"resilient where it needs to be and for the team to be creating guides for"
-" using\n"
+"censorship and the need to stay connected, makes the need for I2P to be more\n"
+"resilient where it needs to be and for the team to be creating guides for using\n"
 "I2P in these situations."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:39
 msgid ""
-"I will be putting together better resources for researchers interested in"
-" I2P,\n"
+"I will be putting together better resources for researchers interested in I2P,\n"
 "as well."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:44
 msgid ""
 "I also had the good fortune to spend time with Mhatta, who is an I2P\n"
-"contributor, and to make connections for future funding. A huge thank you"
-" to\n"
-"the community builders I met in Tunis who I met again and who are "
-"offering so\n"
-"much support to the project. This has been an exciting year so far, and "
-"I2P has\n"
-"so much work to do. Please consider donating your time or funding the "
-"project\n"
+"contributor, and to make connections for future funding. A huge thank you to\n"
+"the community builders I met in Tunis who I met again and who are offering so\n"
+"much support to the project. This has been an exciting year so far, and I2P has\n"
+"so much work to do. Please consider donating your time or funding the project\n"
 "as it needs to scale quickly to new challenges."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:53
 msgid ""
-"If you have an opportunity to, you can read the full report Measuring I2P"
-"\n"
+"If you have an opportunity to, you can read the full report Measuring I2P\n"
 "Censorship at a Global Scale here\n"
 "https://www.usenix.org/conference/foci19/presentation/hoang"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:59
 msgid ""
-"Another great workshop in the measurements workshop was On the Importance"
-" of\n"
+"Another great workshop in the measurements workshop was On the Importance of\n"
 "Encrypted-SNI (ESNI) to Censorship Circumvention\n"
 "https://www.usenix.org/conference/foci19/presentation/chai"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:65
 msgid ""
-"There are so many great workshops that I attended - anyone who would like"
-" too\n"
+"There are so many great workshops that I attended - anyone who would like too\n"
 "can access the program and related materials here:\n"
 "https://www.usenix.org/conference/foci19/workshop-program"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:71
 msgid ""
-"I will be attending Our Networks in Toronto next month "
-"https://ournetworks.ca/\n"
+"I will be attending Our Networks in Toronto next month https://ournetworks.ca/\n"
 "- and so should you! The program can be viewed here\n"
 "https://ournetworks.ca/program/"
 msgstr ""
@@ -10972,63 +9821,43 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:14
 msgid ""
-"This was my first time attending IFF, and what a great experience for I2P"
-" this\n"
-"was! I met with human rights defenders, people who work on censorship "
-"metrics,\n"
+"This was my first time attending IFF, and what a great experience for I2P this\n"
+"was! I met with human rights defenders, people who work on censorship metrics,\n"
 "and of course UX and security professionals."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:20
 msgid ""
 "My goal was to connect with people to further support I2P’s UX overhaul,\n"
-"keeping in mind security and UX considerations for frontline workers. As "
-"it was\n"
-"pointed out to me, people see I2P as a very important and powerful "
-"resource to\n"
-"circumvent censorship and support safe communication, however the "
-"interface\n"
-"suffers from some usability concerns. People were happy with our initial "
-"steps\n"
-"to make first time users have a better experience, such as our set up "
-"wizard\n"
-"and bandwidth detection tool. I also received positive reviews on our "
-"changes\n"
-"to the website and /home icons. It was very encouraging to hear directly "
-"from\n"
+"keeping in mind security and UX considerations for frontline workers. As it was\n"
+"pointed out to me, people see I2P as a very important and powerful resource to\n"
+"circumvent censorship and support safe communication, however the interface\n"
+"suffers from some usability concerns. People were happy with our initial steps\n"
+"to make first time users have a better experience, such as our set up wizard\n"
+"and bandwidth detection tool. I also received positive reviews on our changes\n"
+"to the website and /home icons. It was very encouraging to hear directly from\n"
 "the community that small changes we have made are in the right direction."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:32
 msgid ""
-"Things like having configuration happen out of the box and not having to "
-"put\n"
-"people in the position where they need to rely on reading so much "
-"documentation\n"
-"or chasing documentation were discussed. Also, improved documentation for"
-"\n"
-"setting up outproxies and and site mirroring were requested and "
-"suggested.\n"
-"Please see Mikal’s very good instructions on setting up an I2P outproxy "
-"that\n"
+"Things like having configuration happen out of the box and not having to put\n"
+"people in the position where they need to rely on reading so much documentation\n"
+"or chasing documentation were discussed. Also, improved documentation for\n"
+"setting up outproxies and and site mirroring were requested and suggested.\n"
+"Please see Mikal’s very good instructions on setting up an I2P outproxy that\n"
 "came out of the suggestions this week —\n"
-"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to "
-"make\n"
+"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to make\n"
 "bug reporting easier."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:43
 msgid ""
-"To this point, I truly hope that the project will secure resources to "
-"continue\n"
-"the improvements to its usability that it requires to meet the growing "
-"demand\n"
-"for I2P services. It is humbling to to be working with such talented "
-"people and\n"
-"to be able to work together with our community during a time when people "
-"all\n"
-"over the globe need all of the privacy protecting resources we as people "
-"who\n"
+"To this point, I truly hope that the project will secure resources to continue\n"
+"the improvements to its usability that it requires to meet the growing demand\n"
+"for I2P services. It is humbling to to be working with such talented people and\n"
+"to be able to work together with our community during a time when people all\n"
+"over the globe need all of the privacy protecting resources we as people who\n"
 "develop, design and educate can offer."
 msgstr ""
 
@@ -11039,58 +9868,40 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:14
 msgid ""
-"The messages from activists in Syria during the Access No\\_! session on "
-"the\n"
+"The messages from activists in Syria during the Access No\\_! session on the\n"
 "first day were deeply moving and really drove home why I work in digital\n"
-"rights. We listened to the experiences of activists who are unable to "
-"travel\n"
-"due to lack of status, documentation and active conflict. For these "
-"people\n"
+"rights. We listened to the experiences of activists who are unable to travel\n"
+"due to lack of status, documentation and active conflict. For these people\n"
 "“the internet is the only passport (they) carry.” Human rights defenders\n"
-"spoke of the importance of  digital training to keep people protected "
-"when they\n"
-"are communicating with family inside of the country, as well as with "
-"family and\n"
-"friends who have left. They had created digital clinics to show people "
-"how to\n"
+"spoke of the importance of  digital training to keep people protected when they\n"
+"are communicating with family inside of the country, as well as with family and\n"
+"friends who have left. They had created digital clinics to show people how to\n"
 "use services securely, for instance, how to use features like Signal’s\n"
-"disappearing messages so that those messages could not be used against "
-"them\n"
+"disappearing messages so that those messages could not be used against them\n"
 "when devices are searched at security check points. Continuing to pursue\n"
-"education was also very important, the internet being relied on to access"
-"\n"
+"education was also very important, the internet being relied on to access\n"
 "resources."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:30
 msgid ""
-"The following days we met with people who had both questions about I2P "
-"and\n"
-"suggestions for potential use cases. We also discussed overhauling the "
-"project\n"
+"The following days we met with people who had both questions about I2P and\n"
+"suggestions for potential use cases. We also discussed overhauling the project\n"
 "documentation for threat models, improving guides for users with little\n"
-"technical background, and ensuring that these guides are easily "
-"translatable. I\n"
-"made a note that I should go through the proposals and connect then to "
-"human\n"
-"use cases and solutions. This will be part of the projects’ continued "
-"effort\n"
+"technical background, and ensuring that these guides are easily translatable. I\n"
+"made a note that I should go through the proposals and connect then to human\n"
+"use cases and solutions. This will be part of the projects’ continued effort\n"
 "to improve its user guides and onboarding."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:40
 msgid ""
-"The opportunity to meet face to face with people who are using I2P and "
-"have\n"
-"successfully used it to circumvent internet blockages was inspiring. As "
-"the\n"
+"The opportunity to meet face to face with people who are using I2P and have\n"
+"successfully used it to circumvent internet blockages was inspiring. As the\n"
 "project has began working on its own browser and is examining outproxy\n"
-"packaging, it needs as much feedback and testing as possible to create "
-"secure\n"
-"and frictionless experiences for people. Also, the I2P network needs more"
-"\n"
-"hosted content and mirrored sites in order to expand resources for its "
-"users."
+"packaging, it needs as much feedback and testing as possible to create secure\n"
+"and frictionless experiences for people. Also, the I2P network needs more\n"
+"hosted content and mirrored sites in order to expand resources for its users."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:2
@@ -11104,47 +9915,35 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:14
 msgid ""
-"The weekend of September 20th I traveled to Toronto to meet with Sadie to"
-" take\n"
-"part in the Our Networks conference. The Our Networks conference "
-"encompasses a\n"
-"wide variety of topic including many peer-to-peer technologies with an "
-"eye\n"
+"The weekend of September 20th I traveled to Toronto to meet with Sadie to take\n"
+"part in the Our Networks conference. The Our Networks conference encompasses a\n"
+"wide variety of topic including many peer-to-peer technologies with an eye\n"
 "toward their potential to make the world a better place."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:21
 msgid ""
-"The conference was fascinating, full of very smart people working on "
-"everything\n"
-"from physical mesh networks to the distributed web to, of course, "
-"anonymity. We\n"
-"got to talk to some great people from Tor, Protocol Labs, Parity Labs, "
-"the Dat\n"
-"Project, as well as a variety of artists and social scientists. Lots of "
-"fun too,\n"
+"The conference was fascinating, full of very smart people working on everything\n"
+"from physical mesh networks to the distributed web to, of course, anonymity. We\n"
+"got to talk to some great people from Tor, Protocol Labs, Parity Labs, the Dat\n"
+"Project, as well as a variety of artists and social scientists. Lots of fun too,\n"
 "and a great environment. Dat in particular presents some pretty cool\n"
 "opportunities for future co-operation I think."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:30
 msgid ""
-"I hadn't planned on giving a talk, but we were having so much fun that "
-"when\n"
-"we were asked, Sadie and I put something together and I gave a quick "
-"lightning\n"
+"I hadn't planned on giving a talk, but we were having so much fun that when\n"
+"we were asked, Sadie and I put something together and I gave a quick lightning\n"
 "talk about I2P and how it's design choices are relevant to Peer-to-Peer\n"
-"application development. The talk was recorded and when the video becomes"
-"\n"
-"available, I'll make sure to add it to this blog. Next year, I'll have "
-"some\n"
+"application development. The talk was recorded and when the video becomes\n"
+"available, I'll make sure to add it to this blog. Next year, I'll have some\n"
 "submissions for their Zine Library about I2P."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:39
 msgid ""
-"Besides that, I really enjoyed my time visiting Toronto, it was a great "
-"place\n"
+"Besides that, I really enjoyed my time visiting Toronto, it was a great place\n"
 "to visit."
 msgstr ""
 
@@ -11158,14 +9957,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:16
 msgid ""
-"In the 0.9.43 release, we continue work on stronger security and privacy "
-"features and performance improvements.\n"
-"Our implementation of the new leaseset specification (LS2) is now "
-"complete.\n"
-"We are beginning our implementation of stronger and faster end-to-end "
-"encryption (proposal 144) for a future release.\n"
-"Several IPv6 address detection issues have been fixed, and there of "
-"course are several other bug fixes."
+"In the 0.9.43 release, we continue work on stronger security and privacy features and performance improvements.\n"
+"Our implementation of the new leaseset specification (LS2) is now complete.\n"
+"We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release.\n"
+"Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes."
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:33
@@ -11209,7 +10004,8 @@ msgid "i2ptunnel support for quoted custom options"
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:51
-msgid "i2psnark now starts with reduced tunnel count then increases as necessary"
+msgid ""
+"i2psnark now starts with reduced tunnel count then increases as necessary"
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:52
@@ -11240,47 +10036,33 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:11
 msgid ""
-"Highlighting Research - An Empirical Study of the I2P Anonymity Network "
-"and its Censorship Resistance"
+"Highlighting Research - An Empirical Study of the I2P Anonymity Network and "
+"its Censorship Resistance"
 msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:16
 msgid ""
-"The following blog post is authored by Information Controls Fellow Hoàng "
-"Nguyên\n"
-"Phong. As an ICFP fellow, Phong's research focused on analyzing different"
-"\n"
-"aspects of the I2P network, a privacy-enhancing Internet tool that can be"
-" used\n"
+"The following blog post is authored by Information Controls Fellow Hoàng Nguyên\n"
+"Phong. As an ICFP fellow, Phong's research focused on analyzing different\n"
+"aspects of the I2P network, a privacy-enhancing Internet tool that can be used\n"
 "to access online content over an anonymity-enhancing network helpful in\n"
-"circumventing state-imposed censorship. Working with his host "
-"organization, the\n"
-"University of Massachusetts Amherst, Phong studied the I2P network's "
-"censorship\n"
-"resilience, including identifying what blocking methods a state censor "
-"might use\n"
-"to inhibit access to I2P and investigating potential solutions to make "
-"I2P more\n"
+"circumventing state-imposed censorship. Working with his host organization, the\n"
+"University of Massachusetts Amherst, Phong studied the I2P network's censorship\n"
+"resilience, including identifying what blocking methods a state censor might use\n"
+"to inhibit access to I2P and investigating potential solutions to make I2P more\n"
 "resistant to such blockage."
 msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:28
 msgid ""
 "Phong found blocking attempts on the I2P network (specifically via DNS\n"
-"poisoning, SNI-based blocking, TCP packet injection, and page-specific "
-"blocks)\n"
-"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. "
-"Phong\n"
-"posits that because the blocks are usually imposed on the I2P download "
-"page and\n"
-"reseed servers, such blocking could be mitigated by hosting download "
-"links to\n"
-"this content on large cloud service providers - raising the collateral "
-"cost of\n"
-"blocking. Phong also built a metrics portal for the platform so that "
-"researchers\n"
-"and others can better understand who is using I2P, finding that there are"
-" about\n"
+"poisoning, SNI-based blocking, TCP packet injection, and page-specific blocks)\n"
+"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. Phong\n"
+"posits that because the blocks are usually imposed on the I2P download page and\n"
+"reseed servers, such blocking could be mitigated by hosting download links to\n"
+"this content on large cloud service providers - raising the collateral cost of\n"
+"blocking. Phong also built a metrics portal for the platform so that researchers\n"
+"and others can better understand who is using I2P, finding that there are about\n"
 "20,000 relays in the network on a daily basis."
 msgstr ""
 
@@ -11294,10 +10076,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:55
 msgid ""
-"We thank Phong and his collaborators for their excellent study as we move"
-" to\n"
-"address the issues that were identified. It's exciting to see more "
-"academic\n"
+"We thank Phong and his collaborators for their excellent study as we move to\n"
+"address the issues that were identified. It's exciting to see more academic\n"
 "study of I2P and are excited to keep working with him."
 msgstr ""
 
@@ -11306,24 +10086,20 @@ msgid "0.9.44 Release"
 msgstr ""
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:9
-#, fuzzy
 msgid "0.9.44 with bug fixes"
-msgstr "0.9.36에서 NTCP2와 버그 수정이 이루어졌습니다."
+msgstr ""
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:16
 msgid ""
-"0.9.44 contains an important fix for a denial of service issue in hidden "
-"services handling of new encryption types.\n"
+"0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.\n"
 "All users should update as soon as possible."
 msgstr ""
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:21
 msgid ""
-"The release includes initial support for new end-to-end encryption "
-"(proposal 144).\n"
+"The release includes initial support for new end-to-end encryption (proposal 144).\n"
 "Work continues on this project, and it is not yet ready for use.\n"
-"There are changes to the console home page, and new embedded HTML5 media "
-"players in i2psnark.\n"
+"There are changes to the console home page, and new embedded HTML5 media players in i2psnark.\n"
 "Additional fixes for firewalled IPv6 networks are included.\n"
 "Tunnel build fixes should result in faster startup for some users."
 msgstr ""
@@ -11396,3 +10172,2777 @@ msgstr ""
 msgid "Change default sig type to EdDSA for Android"
 msgstr ""
 
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:2
+msgid "0.9.45 Release"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:9
+msgid "0.9.45 with bug fixes"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:16
+msgid ""
+"0.9.45 contains important fixes for hidden mode and the bandwidth tester.\n"
+"There's an update to the console dark theme.\n"
+"We continue work on improving performance and the development of new end-to-end encryption (proposal 144)."
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:32
+msgid "Dark theme improvements"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:33
+msgid "Console icon changes"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:34
+msgid ""
+"Move some translations from console to router and core for embedded uses"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:37
+msgid "i2psnark HTML5 preview player for partial files"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:43
+msgid "Numerous bandwidth test fixes"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:44
+msgid "Hidden mode fixes to prevent losing peers"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:45
+msgid "Hebrew translation fixes"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:50
+msgid "Content Security Policy improvements"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:51
+msgid "SSU extend timeout for large messages"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:52
+msgid "ECIES-X25519 continued development and fixes"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:53
+msgid "Cancel timeout jobs on message reply"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:54
+msgid "Add SSL and SSL redirect support to EepGet"
+msgstr ""
+
+#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:56
+msgid "Update JBigI library"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:2
+msgid "Git over I2P for Users"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:8
+msgid "Git over I2P"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:10
+msgid ""
+"Tutorial for setting up git access through an I2P Tunnel. This tunnel\n"
+"will act as your access point to a single git service on I2P. It is part of the\n"
+"overall effort to transition I2P from monotone to Git."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:16
+msgid ""
+"Before anything else: Know the capabilities the service offers to the public"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:19
+msgid ""
+"Depending on how the git service is configured, it may or may not offer\n"
+"all services on the same address. In the case of git.idk.i2p, there is a\n"
+"public HTTP URL, and an SSH URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to configure for your Git SSH client. Either\n"
+"can be used to push or pull, but SSH is recommended."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:26
+msgid "First: Set up an account at a Git service"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:29
+msgid ""
+"To create your repositories on a remote git service, sign up for a user\n"
+"account at that service. Of course it’s also possible to create\n"
+"repositories locally and push them to a remote git service, but most\n"
+"will require an account and for you to create a space for the repository\n"
+"on the server. Gitlab has a very simple sign-up form:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:43
+msgid "Second: Create a project to test with"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:46
+msgid ""
+"To make sure the setup process works, it helps to make a repository to\n"
+"test with from the server, and for the sake of this tutorial, we’re\n"
+"going to use a fork of the I2P router. First, browse to the\n"
+"i2p-hackers/i2p.i2p repository:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:61
+msgid "Then, fork it to your account."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:73
+msgid "Third: Set up your git client tunnel"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:76
+msgid ""
+"To have read-write access to my server, you’ll need to set up a tunnel\n"
+"for your SSH client. As an example, we’re going to use the HTTP tunnel\n"
+"instead, but if all you need is read-only, HTTP/S cloning, then you can\n"
+"skip all this and just use the http_proxy environment variable to\n"
+"configure git to use the pre-configured I2P HTTP Proxy. For example:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:97
+msgid ""
+"Then, add the address you will be pushing and pulling from. Note that\n"
+"this example address is for Read-Only HTTP-over-I2P clones, if your\n"
+"admin does not allow the git HTTP(Smart HTTP) protocol, then you will\n"
+"need to get the SSH clone base32 from them. Use this Base32 to connect the\n"
+"client tunnel to the Git SSH service: **g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:109
+msgid "Pick a port to forward the I2P service to locally."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:117
+msgid ""
+"I use it alot, so I start my client tunnel automatically, but it’s up to\n"
+"you."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:126
+msgid "When you’re all done, it should look alot like this."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:134
+msgid "Fourth: Attempt a clone"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:137
+msgid "Now your tunnel is all set up, you can attempt a clone over SSH."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:146
+msgid ""
+"You might get an error where the remote end hangs up unexpectedly.\n"
+"Unfortunately git still doesn’t support resumable cloning. Until it\n"
+"does, there are a couple fairly easy ways to handle this. The first and\n"
+"easiest is to try and clone to a shallow depth:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:158
+msgid ""
+"Once you’ve performed a shallow clone, you can fetch the rest resumably\n"
+"by changing to the repo directory and running:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:167
+msgid ""
+"At this point, you still don’t have all your branches yet. You can get\n"
+"them by running the following commands:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:177
+msgid ""
+"Which tells git to alter the repository configuration so that fetching\n"
+"from origin fetches all branches."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:182
+msgid ""
+"If that doesn’t work, you can try opening the tunnel configuration menu\n"
+"and adding some backup tunnels."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:193
+msgid ""
+"If that doesn’t work, then the next easy thing to try is to decrease the\n"
+"tunnel length. Don’t do this if you believe you are at risk of your\n"
+"code-contribution activity being de-anonymized by a well-resourced\n"
+"attacker seeking to run many malicious nodes and control your whole\n"
+"path. If that sounds unlikely to you then you can probably do it safely."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:207
+msgid "Suggested Workflow for Developers!"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:210
+msgid ""
+"Revision control can make your life easier, but it works best if you use\n"
+"it well! In light of this, we strongly suggest a fork-first,\n"
+"feature-branch workflow as many are familiar with from Github. In such a\n"
+"workflow, the master branch is used as a sort of “Trunk” for updates and\n"
+"is never touched by the programmmer, instead, all changes to the master\n"
+"are merged from branches. In order to do set up your workspace for this,\n"
+"take the following steps:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:220
+msgid ""
+"**Never make changes to the Master Branch**. You will be using the\n"
+"   master branch to periodially obtain updates to the official source\n"
+"   code. All changes should be made in feature branches."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:224
+msgid ""
+"Set up a second remote in your local repository using the upstream\n"
+"   source code."
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:231
+msgid "Pull in any upstream changes on your current master:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:237
+msgid ""
+"Before making any changes to the source code, check out a new feature\n"
+"   branch to develop on:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:244
+msgid ""
+"When you’re done with your changes, commit them and push them to your\n"
+"   branch"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:252
+msgid ""
+"Submit a merge request. When the merge request is approved and\n"
+"   brought into the upstream master, check out the master locally and\n"
+"   pull in the changes:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/06/git-over-i2p.rst:261
+msgid ""
+"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is\n"
+"   made, you can update your master code using this procedure as well."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:1
+msgid "Gitlab over I2P Setup"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:7
+msgid ""
+"Mirror I2P Git repositories and Bridge Clearnet repositories for others."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:9
+msgid ""
+"This is the setup process I use for configuring Gitlab and I2P, with\n"
+"Docker in place to manage the service itself. Gitlab is very easy to\n"
+"host on I2P in this fashion, it can be administered by one person\n"
+"without much difficulty. In my configuration, I use a Debian VM to host\n"
+"docker containers and an I2P router, on a Debian Host system, however,\n"
+"this may be more than necessary for some people. These instructions\n"
+"should work on any Debian-based system, regardless of whether it is in a\n"
+"VM or not, and should easily translate to any system where Docker and an\n"
+"I2P router are available. This guide starts at Docker and does not\n"
+"assume any VM underneath."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:22
+msgid "Dependencies and Docker"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:25
+msgid ""
+"Because Gitlab runs in a container, we only need to install the\n"
+"dependencies required for the container on our main system.\n"
+"Conveniently, you can install everything you need with:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:35
+msgid ""
+"on an otherwise unmodified Debian system, or if you have added Docker’s\n"
+"own “Community” Debian repository, you may use:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:44
+msgid "instead."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:49
+msgid "Fetch the Docker Containers"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:52
+msgid ""
+"Once you have docker installed, you can fetch the docker containers\n"
+"required for gitlab. *Don’t run them yet.*"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:61
+msgid ""
+"For those who are concerned, the gitlab-ce Docker image is built using\n"
+"only Ubuntu Docker images as a parent, which are built from scratch\n"
+"images. Since there are no third-party images involved here, updates\n"
+"should come as soon as they are available in the host images. To review\n"
+"the Dockerfile for yourself, visit the `Gitlab source\n"
+"code <https://gitlab.com/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile>`__."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:70
+msgid ""
+"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional "
+"steps)"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:73
+msgid ""
+"Gitlab servers inside of I2P can be run with or without the ability to\n"
+"interact with servers on the internet outside of I2P. In the case where\n"
+"the Gitlab server is *not allowed* to interact with servers outside of\n"
+"I2P, they cannot be de-anonymized by cloning a git repository from a git\n"
+"server on the internet outside of I2P. They can, however, export and\n"
+"mirror repositories from other git services inside of I2P."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:82
+msgid ""
+"In the case where the Gitlab server is *allowed* to interact with\n"
+"servers outside of I2P, it can act as a “Bridge” for the users, who can\n"
+"use it to mirror content outside I2P to an I2P-accessible source,\n"
+"however it *is not anonymous* in this case. Git services on the\n"
+"non-anonymous internet will be connected to directly."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:90
+msgid ""
+"**If you want to have a bridged, non-anonymous Gitlab instance with\n"
+"access to** **web repositories,** no further modification is necessary."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:95
+msgid ""
+"**If you want to have an I2P-Only Gitlab instance with no access to\n"
+"Web-Only** **Repositories**, you will need to configure Gitlab to use an\n"
+"I2P HTTP Proxy. Since the default I2P HTTP proxy only listens on\n"
+"``127.0.0.1``, you will need to set up a new one for Docker that listens\n"
+"on the Host/Gateway address of the Docker network, which is usually\n"
+"``172.17.0.1``. I configure mine on port ``4446``."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:104
+msgid "Start the Container Locally"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:107
+msgid ""
+"Once you have that set up, you can start the container and publish your\n"
+"Gitlab instance locally."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:124
+msgid ""
+"Visit your Local Gitlab instance and set up your admin account. Choose a\n"
+"strong password, and configure user account limits to match your\n"
+"resources."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:130
+msgid ""
+"Modify gitlab.rb(Optional, but a good idea for “Bridged non-anonymous” "
+"hosts)"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:133
+msgid ""
+"It’s also possible to apply your HTTP Proxy settings in a more granular\n"
+"way, so that you can only allow users to mirror repositories from the\n"
+"domains that you choose. Since the domain is presumably operated by an\n"
+"organization, you can use this to ensure that repositories that are\n"
+"mirrorable follow a reasonable set of policies. After all, there is far\n"
+"more abusive content on the non-anonymous internet than there is on I2P,\n"
+"we wouldn’t want to make it too easy to introduce abusive content from\n"
+"such a nefarious place."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:144
+msgid ""
+"Add the following lines to your gitlab.rb file inside the\n"
+"/src/gitlab/config container. These settings will take effect when you\n"
+"restart in a moment."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:169
+msgid "Set up your Service tunnels and sign up for a Hostname"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:172
+msgid ""
+"Once you have Gitlab set up locally, go to the I2P Router console. You\n"
+"will need to set up two server tunnels, one leading to the Gitlab\n"
+"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH\n"
+"interface on TCP Port 8022."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:179
+msgid "Gitlab Web(HTTP) Interface"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:182
+msgid ""
+"For the Web interface, use an “HTTP” server tunnel. From\n"
+"http://127.0.0.1:7657/i2ptunnelmgr launch the “New Tunnel Wizard” and\n"
+"enter the following values at each step:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:188
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:221
+msgid "Select “Server Tunnel”"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:189
+msgid "Select “HTTP Server”"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:190
+msgid "Fill in “Gitlab Web Service” or otherwise describe the tunnel"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:191
+msgid "Fill in ``127.0.0.1`` for the host and ``8080`` for the port."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:192
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:225
+msgid "Select “Automatically start tunnel when Router Starts”"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:193
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:226
+msgid "Confirm your selections."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:195
+msgid "Register a Hostname(Optional)"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:198
+msgid ""
+"Web services on I2P can register hostnames for themselves by providing\n"
+"an authentication string to a jump service provider like\n"
+"`stats.i2p <http://stats.i2p>`__. To do this, open the\n"
+"http://127.0.0.1:7657/i2ptunnelmgr again and click on the “Gitlab Web\n"
+"Service” item you just set up. Scroll to the bottom of the “Edit Server\n"
+"Settings” section and click Registration Authentication. Copy the field\n"
+"that says “Authentication for adding Hostname” and visit\n"
+"`stats.i2p <http://stats.i2p/i2p/addkey.html>`__ to add your hostname.\n"
+"Note that if you want to use a subdomain(Like git.idk.i2p) then you will\n"
+"have to use the correct authentication string for your subdomain, which\n"
+"is a little bit more complicated and merits it’s own instructions."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:212
+msgid "Gitlab SSH Interface"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:215
+msgid ""
+"For the SSH interface, use a “Standard” server tunnel. From\n"
+"http://127.0.0.1:7657/i2ptunnelmgr launch the “New Tunnel Wizard” and\n"
+"enter the following values at each step:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:222
+msgid "Select “Standard Server”"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:223
+msgid "Fill in “Gitlab SSH Service” or otherwise describe the tunnel"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:224
+msgid "Fill in ``127.0.0.1`` for the host and ``8022`` for the port."
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:228
+msgid "Re-start the Gitlab Service with the new Hostname"
+msgstr ""
+
+#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:231
+msgid ""
+"Finally, if you either modified ``gitlab.rb`` or you registered a\n"
+"hostname, you will need to re-start the gitlab service for the settings\n"
+"to take effect."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:1
+msgid "Using a git bundle to fetch the I2P source code"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:7
+msgid "Download the I2P Source code via Bittorrent."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:9
+msgid ""
+"Cloning large software repositories over I2P can be difficult, and using\n"
+"git can sometimes make this harder. Fortunately, it can also sometimes\n"
+"make it easier. Git has a ``git bundle`` command which can be used to\n"
+"turn a git repository into a file which git can then clone, fetch, or\n"
+"import from a location on your local disk. By combining this capability\n"
+"with bittorrent downloads, we can solve our remaining problems with\n"
+"``git clone``."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:17
+msgid "Before you Start"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:20
+msgid ""
+"If you intend to generate a git bundle, you **must** already possess a\n"
+"full copy of the **git** repository, not the mtn repository. You can get\n"
+"it from github or from git.idk.i2p, but a shallow clone(a clone done to\n"
+"–depth=1) *will not* *work*. It will fail silently, creating what looks\n"
+"like a bundle, but when you try to clone it it will fail. If you are\n"
+"just retrieving a pre-generated git bundle, then this section does not\n"
+"apply to you."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:28
+msgid "Fetching I2P Source via Bittorrent"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:31
+#, python-format
+msgid ""
+"Someone will need to supply you with a torrent file or a magnet link\n"
+"corresponding to an existing ``git bundle`` that they have already\n"
+"generated for you. A recent, correctly-generated bundle of the mainline\n"
+"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside\n"
+"of I2P at my pastebin\n"
+"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also use a\n"
+"`magnet link <magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,\n"
+"and if you're a BiglyBT user who wants to bridge the torrent, use \n"
+"`this magnet link instead <magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__\n"
+"to announce to clearnet trackers as well."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:43
+msgid ""
+"Once you have a bundle, you will need to use git to create a working\n"
+"repository from it. If you’re using GNU/Linux and i2psnark, the git\n"
+"bundle should be located in $HOME/.i2p/i2psnark or, as a service on\n"
+"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on\n"
+"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/” instead. The\n"
+"examples here assume I2PSnark on GNU/Linux, if you use something else,\n"
+"replace the path to the bundle with the download directory preferred by\n"
+"your client and platform."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:52
+msgid "Using ``git clone``"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:55
+msgid "Cloning from a git bundle is easy, just:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:61
+msgid ""
+"If you get the following error, try using git init and git fetch\n"
+"manually instead."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:68
+msgid "Using ``git init`` and ``git fetch``"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:71
+msgid "First, create an i2p.i2p directory to turn into a git repository."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:77
+msgid "Next, initialize an empty git repository to fetch changes back into."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:84
+msgid "Finally, fetch the repository from the bundle."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:91
+msgid "Replace the bundle remote with the upstream remote"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:94
+msgid ""
+"Now that you have a bundle, you can keep up with changes by setting the\n"
+"remote to the upstream repository source."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:101
+msgid "Generating a Bundle"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:104
+msgid ""
+"First, follow the `Git guide for Users <GIT.md>`__ until you have a\n"
+"successfully ``--unshallow``\\ ed clone of clone of the i2p.i2p\n"
+"repository. If you already have a clone, make sure you run\n"
+"``git fetch --unshallow`` before you generate a torrent bundle."
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:109
+msgid "Once you have that, simply run the corresponding ant target:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:115
+msgid ""
+"and copy the resulting bundle into your I2PSnark downloads directory.\n"
+"For instance:"
+msgstr ""
+
+#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:122
+msgid ""
+"In a minute or two, I2PSnark will pick up on the torrent. Click on the\n"
+"“Start” button to begin seeding the torrent."
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:2
+msgid "0.9.46 Release"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:9
+msgid "0.9.46 with new ECIES Encryption"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:16
+msgid ""
+"0.9.46 contains significant performance improvements in the streaming library.\n"
+"We have completed development of ECIES encryption (proposal 144) and there is now an option to enable it for testing."
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:21
+msgid ""
+"Windows users only:\n"
+"This release fixes a local privilege escalation vulnerability\n"
+"which could be exploited by a local user that has the ability to run programs.\n"
+"Please apply the update as soon as possible.\n"
+"Thanks to Blaze Infosec for their responsible disclosure of the issue."
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:29
+msgid ""
+"This is the last release to support Java 7, Debian packages Wheezy and Stretch, and Ubuntu packages Precise and Trusty.\n"
+"Users on those platforms must upgrade to receive future I2P updates."
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:44
+msgid ""
+"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing (proposal "
+"144)"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:45
+msgid "Hidden Services Manager: Redesign edit pages"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:46
+msgid "i2psnark: Fix marking torrents as BAD at startup"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:47
+msgid "NetDB: Support ECIES replies to lookups (proposal 154)"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:48
+msgid "RRD4J 3.5 replaces jrobin"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:49
+msgid "Streaming performance improvments using Westwood+ congestion control"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:54
+msgid ""
+"Hidden Services Manager: Fixes for changing shared client options, prevent "
+"changing certain options while tunnel is running"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:55
+msgid "Reproducible build fix"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:56
+msgid "Streaming: Multiple fixes"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:57
+msgid "UPnP: Several fixes for changing interfaces and devices"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:58
+msgid "Windows: Fix permissions on install directory"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:63
+msgid "Build process changes to support git"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:64
+msgid "Console: Don't show IPv6 temporary addresses as bind options"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:65
+msgid "Console: Fix up javascript, stricter Content Security Policy"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:66
+msgid "Crypto: Disable speculative tagset usage"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:67
+msgid "Eepsites: Add Jetty GzipHandler for Jetty 9.3+"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:68
+msgid "I2CP: Disable gzip for HTTP server tunnels and i2psnark"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:69
+msgid "i2psnark: Connect out to other seeds to fetch new comments"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:70
+msgid "i2psnark: Support file paths in add form"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:71
+msgid "NetDB: Don't send \"fake hash\" to indicate exploration"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:72
+msgid "Profiles: Change decay algorithm"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:73
+msgid "Profiles: Limit average speed calculation to high capacity peers"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:74
+msgid "Router: Auto-floodfill now class N minimum"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:75
+msgid "Router: Checks for key certificates in destinations (proposal 145)"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:76
+msgid "Router: Enforce minimum version for tunnel peers"
+msgstr ""
+
+#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:77
+msgid "SusiDNS: Support adding Base 32 addresses"
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:2
+msgid "Help your Friends Join I2P by Sharing Reseed Bundles"
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:9
+msgid "Create, exchange, and use reseed bundles"
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:11
+msgid ""
+"Most new I2P routers join the network by bootstrapping with the help of\n"
+"a reseed service. However, reseed services are centralized and\n"
+"comparatively easy to block, considering the emphasis on de-centralized\n"
+"and un-blockable connections in the rest of the I2P network. If a new\n"
+"I2P router finds itself unable to bootstrap, it may be a possible to use\n"
+"an existing I2P router to generate a working “Reseed bundle” and\n"
+"bootstrap without the need of a reseed service."
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:21
+msgid ""
+"It is possible for a user with a working I2P connection to help a\n"
+"blocked router join the network by generating a reseed file and passing\n"
+"it to them via a secret or non-blocked channel. In fact, in many\n"
+"circumstances, an I2P router that is already connected will not be\n"
+"affected by reseed blocking at all, so **having working I2P routers\n"
+"around means that existing I2P routers can help new I2P routers by\n"
+"providing them with a hidden way of bootstrapping**."
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:31
+msgid "Generating a Reseed Bundle"
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:34
+msgid ""
+"To create a reseed bundle for others to use, go to the `Reseed\n"
+"   configuration page <http://127.0.0.1:7657/configreseed>`__. You will\n"
+"   see a section that looks like this. Click the button indicated by the\n"
+"   red circle. |Create a Reseed Zip|"
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:38
+msgid ""
+"Now that you’ve clicked the button, a zip will be generated\n"
+"   containing enough information to bootstrap a new I2P router. Download\n"
+"   it and transfer it to the computer with the new, un-bootstrapped I2P\n"
+"   router. |Downloads a Reseed Zip|"
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:43
+msgid "Performing a Reseed from File"
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:46
+msgid ""
+"Obtain an i2preseed.zip file from a friend with an I2P router that is\n"
+"   already running, or from a trusted source somewhere on the internet,\n"
+"   and visit the `Reseed Configuration\n"
+"   page <http://127.0.0.1:7657/configreseed>`__. Click the button that\n"
+"   says “Select zip or su3 file” and navigate to that file. |Select a\n"
+"   Reseed Zip|"
+msgstr ""
+
+#: i2p2www/blog/2020/06/07/file-based-reseed.rst:52
+msgid ""
+"When you’ve selected your reseed file, click the “Reseed from File”\n"
+"   button. |Reseed from a Zip File|. You’re done! Your router will now\n"
+"   bootstrap using the zip file, and you will be ready to join the I2P\n"
+"   network."
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:2
+msgid "0.9.47 Release"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:9
+msgid "0.9.47 enables new ECIES Encryption"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:16
+msgid ""
+"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by default for some services.\n"
+"The Sybil analysis and blocking tool is now enabled by default."
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:21
+msgid ""
+"Java 8 or higher is now required.\n"
+"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and Precise, are no longer supported.\n"
+"Users on those platforms should upgrade so you may continue to receive I2P updates."
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:37
+msgid "Java 8 now required"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:42
+msgid ""
+"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared clients, "
+"HTTP proxy, and new tunnels"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:43
+msgid "Increase streaming MTU for ECIES connections"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:44
+msgid "Enable Sybil analysis and blocking tool by default"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:51
+msgid ""
+"Hidden Services Manager: Fix missing server tunnel length configuration"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:52
+msgid "Hidden Services Manager: Fix missing server throttle configuration"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:53
+msgid "i2psnark: Fix javascript confirmation for delete buttons"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:54
+msgid "UPnP: More fixes for changing interfaces and devices"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:55
+msgid "Fix DoH handling of Cloudflare responses"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:56
+msgid "Fix blinded/encrypted leaseset creation"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:57
+msgid "Fix persistent leaseset keys"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:64
+msgid "Sign Windows dlls"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:65
+msgid "Faster gzip uncompression for level 0"
+msgstr ""
+
+#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:66
+msgid "i2psnark: Increase max pipeline"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:2
+msgid "0.9.48 Release"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:9
+msgid "0.9.48 with performance enhancements"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:16
+msgid ""
+"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for most services.\n"
+"We have added preliminary support for new tunnel build message encryption (proposal 152).\n"
+"There are significant performance improvements throughout the router."
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:22
+msgid ""
+"Packages for Ubuntu Xenial (16.04 LTS) are no longer supported.\n"
+"Users on that platform should upgrade so you may continue to receive I2P updates."
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:37
+msgid "Avoid old DSA-SHA1 routers for lookups, stores, and tunnel peers"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:38
+msgid "Block same-country connections when in hidden mode"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:39
+msgid "BOB: Add deprecation warning"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:40
+msgid "Build: Drop support for Xenial; ant 1.9.8 or higher required to build"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:41
+msgid "i2ptunnel: Enable dual-key encryption for most tunnel types"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:42
+msgid "JBigI: Add library for Linux aarch64, zen, and zen2"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:43
+msgid "Preliminary support for ECIES-X25519 routers (proposals 152 and 156)"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:44
+msgid "Ratchet: Efficiency improvements and memory reduction"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:45
+msgid "SSU: Randomize intro key"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:46
+msgid "SSU performance improvements"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:47
+msgid "System tray: Enable by default for Linux KDE and LXDE"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:53
+msgid "Build: Set release property for better runtime compatibility"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:54
+msgid "Console: Fix Jetty not starting on Java 11.0.9.1"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:55
+msgid "i2psnark: Limit size of embedded video"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:56
+msgid "Improved IPv6 address validation"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:57
+msgid "Installer: Disable pack200 to support Java 14+"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:58
+msgid "Installer: Add missing linux armv7 and aarch64 wrapper binaries"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:59
+msgid "i2ptunnel: Filter server response headers when not compressing"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:60
+msgid "NTCP2: Fix sending termination message on idle timeout"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:61
+msgid "Streaming: Fix handling of tag options"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:67
+msgid "Build: Reproducible build fix"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:68
+msgid "Core: Refactoring of data structures to reduce memory usage"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:69
+msgid "Crypto: Cache HMAC256 instances"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:70
+msgid "i2psnark: Hide BEP 48 padding directory in UI"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:71
+msgid "i2psnark: Checks for unsupported v2 torrents"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:72
+msgid "i2psnark: Remove old opentrackers"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:73
+msgid "i2ptunnel: Improved support for offline keys"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:75
+msgid "NetDB: Increase minimum floodfill version for leaseset lookups"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:76
+msgid "NTCP: Set nodelay on sockets"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:77
+msgid "Proxy: Remove old jump servers"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:78
+msgid "Ratchet: Rotate keys faster"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:80
+msgid "Wrapper 3.5.44 (new installs only)"
+msgstr ""
+
+#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:82
+msgid "New partial translations for Kurdish, Turkmen, Argentinian Spanish"
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:2
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:11
+msgid "Hello Git, Goodbye Monotone"
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:9
+msgid "Hello git, goodbye mtn"
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:16
+msgid "The I2P Git Migration is nearly concluded"
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:21
+msgid ""
+"For over a decade, I2P has relied on the venerable Monotone service to support\n"
+"its version control needs, but during the past few years, most of the world has\n"
+"moved on to the now-universal Git version control system. In that same\n"
+"time, the I2P Network has become faster and more reliable, and accessible\n"
+"workarounds to Git's non-resumability have been developed."
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:29
+msgid ""
+"Today marks a significant occasion for I2P, as we switched off the old mtn\n"
+"i2p.i2p branch, and moved the development of the core Java I2P libraries from\n"
+"Monotone to Git officially."
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:35
+msgid ""
+"While our use of mtn has been questioned in the past, and it's not always been a\n"
+"popular choice, I'd like to take this moment, as perhaps the very last project to use\n"
+"Monotone to thank the Monotone developers, current and former, wherever they are,\n"
+"for the software they created."
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:44
+msgid "GPG Signing"
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:49
+msgid ""
+"Checkins to the I2P Project repositories require you to configure GPG signing for\n"
+"your git commits, including Merge Requests and Pull Requests. Please configure\n"
+"your git client for GPG signing before you fork i2p.i2p and check anything in."
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:55
+msgid "Official Repositories and Gitlab/Github Syncing"
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:60
+msgid ""
+"The official repository is the one hosted at https://i2pgit.org/i2p-hackers/i2p.i2p\n"
+"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\" available\n"
+"at Github at https://github.com/i2p/i2p.i2p."
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:66
+msgid ""
+"Now that we're on git, we can synchronize repositories from our own self-hosted Gitlab\n"
+"instance, to Github, and back again. This means that it is possible to create and submit\n"
+"a merge request on Gitlab and when it is merged, the result will be synced with Github,\n"
+"and a Pull Request on Github, when merged, will appear on Gitlab."
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:73
+msgid ""
+"This means that it's possible to submit code to us through our Gitlab instance or through\n"
+"Github depending on what you prefer, however, more of the I2P developers are regularly\n"
+"monitoring Gitlab than Github. MR's to Gitlab are more likely to be merged sooner\n"
+"than PR's to Github."
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:80
+msgid "Thanks"
+msgstr ""
+
+#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:85
+msgid ""
+"Congratulations and thanks to everyone who helped in the git migration, especially\n"
+"zzz, eche|on, nextloop, and our site mirror operators! While some of us will miss\n"
+"Monotone, it has become a barrier for new and existing participants in I2P development\n"
+"and we're excited to join the world of developers using Git to manage their distributed\n"
+"projects."
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:2
+msgid "0.9.49 Release"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:9
+msgid "0.9.49 with SSU fixes and faster crypto"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:16
+msgid ""
+"0.9.49 continues the work to make I2P faster and more secure.\n"
+"We have several improvements and fixes for the SSU (UDP) transport that should result in faster speeds.\n"
+"This release also starts the migration to new, faster ECIES-X25519 encryption for routers.\n"
+"(Destinations have been using this encryption for a few releases now)\n"
+"We've been working on the specifications and protocols for new encryption for several years,\n"
+"and we are getting close to the end of it! The migration will take several releases to complete."
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:25
+msgid ""
+"For this release, to minimize disruption, only new installs and a very small percentage of existing installs\n"
+"(randomly selected at restart) will be using the new encryption.\n"
+"If your router does \"rekey\" to use the new encryption, it may have lower traffic or less reliability than usual for several days after you restart.\n"
+"This is normal, because your router has generated a new identity.\n"
+"Your performance should recover after a while."
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:33
+msgid ""
+"We have \"rekeyed\" the network twice before, when changing the default signature type,\n"
+"but this is the first time we've changed the default encryption type.\n"
+"Hopefully it will all go smoothly, but we're starting slowly to be sure."
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:49
+msgid "Build: Git migration"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:50
+msgid "Build: Move web resources to wars"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:51
+msgid "i2psnark WebSeed support"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:52
+msgid "i2psnark padding file support"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:53
+msgid "i2ptunnel: Move proxy resources to jar"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:54
+msgid "Router: Redesign ECIES encryption for floodfills (proposal 156)"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:55
+msgid "Router: Verify RI stores after startup"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:56
+msgid "Router: Reduce Sybil threshold"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:57
+msgid "Router: ECIES for new routers"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:58
+msgid "Router: Start of ECIES migration"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:59
+msgid "SSU: Send individual fragments of messages"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:60
+msgid "SSU: Westwood+ congestion control"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:61
+msgid "SSU: Fast retransmit"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:66
+msgid "Build: Fix Gradle build"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:67
+msgid "Crypto: Increase ratchet tag window to prevent message loss"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:68
+msgid ""
+"I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:69
+msgid "i2ptunnel: Fix config file saving issues"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:70
+msgid "Router: Fix leaseset request fails causing watchdog to bark"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:71
+msgid "Router: Hidden mode fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:72
+msgid "SSU: Fix partial acks not being sent"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:73
+msgid "SSU: Fix occasional high CPU usage"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:78
+msgid "Crypto: AES performance improvements"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:79
+msgid "DoH: Change to RFC 8484 style"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:80
+msgid "i2ptunnel: Remove DSA shared clients"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:81
+msgid "Proxy: Add jump servers"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:82
+msgid "Router: Add more countries for hidden mode"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:83
+msgid "Router: Tunnel peer selection changes"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:84
+msgid "Router: Move Sybil subsystem from console to router for embedded use"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:85
+msgid "Router: Verify RI stores for a while after startup"
+msgstr ""
+
+#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:86
+msgid "Util: New unit tests"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:2
+msgid "0.9.50 Release"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:9
+msgid "0.9.50 with IPv6 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:16
+msgid ""
+"0.9.50 continues the transition to ECIES-X25519 for router encryption keys.\n"
+"We have enabled DNS over HTTPS for reseeding to protect users from passive DNS snooping.\n"
+"There are numerous fixes and improvements for IPv6 addresses, including new UPnP support."
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:22
+msgid ""
+"We have finally fixed some longstanding SusiMail corruption bugs.\n"
+"Changes to the bandwidth limiter should improve network tunnel performance.\n"
+"There are several improvements in our Docker containers.\n"
+"We have improved our defenses for possible malicious and buggy routers in the network."
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:39
+msgid "Docker improvements"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:40
+msgid "NTCP: Remove support for version 1"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:41
+msgid "Reseed: Use DNSOverHTTPS"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:42
+msgid "Router: Increase ECIES rekey probability"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:43
+msgid "Router: Persist Sybil blocklist"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:44
+msgid "SSU: Enable introducers and introductions via IPv6 (proposal 158)"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:46
+msgid "Transports: Publish support for outbound IPv4/v6 (proposal 158)"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:47
+msgid "UPnP: Add support for IPv6"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:53
+msgid "Debian: Fix link to compiler jar"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:54
+msgid "i2psnark: Fix theme selection"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:55
+msgid "Jetty: Fix detection of SSL connector"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:56
+msgid "NetDB: Fix NPE when validating expired blinded leaseset"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:57
+msgid "NTP: Year 2036 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:58
+msgid "Router: Fix rekeying every restart on ARM"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:59
+msgid "Router: Fix decryption of encrypted leasesets"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:60
+msgid "SAM: Fix removal of subsessions"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:61
+msgid "SSU: Fix excessive dropping by the bandwidth limiter"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:62
+msgid "SSU: Fix publishing 'C' capability when not an introducer"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:63
+msgid "SSU: Fixes for firewalled/not firewalled state transitions"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:64
+msgid "SSU: IPv6 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:65
+msgid "SSU: Peer test fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:66
+msgid "SusiMail: Fix theme selection"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:67
+msgid "SusiMail: Fix stream closed errors"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:68
+msgid "SusiMail: Fix corruption in display of large, new messages"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:69
+msgid "Tunnels: Several fixes in the participating tunnel bandwidth limiter"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:70
+msgid "UPnP: Fix leases not being renewed before expiration"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:76
+msgid "Build: Remove empty jars and wars from installers"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:77
+msgid "Build: Prep for different release and API versions"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:78
+msgid "Build: Remove launcher code"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:79
+msgid "Gradle build fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:80
+msgid "Profiles: Disable tunnel peer test"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:81
+msgid "Profiles: Remove unused tunnel test response time stat"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:82
+msgid "SSU: Avoid outbound connections to buggy routers"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:83
+msgid "Transports: Increase connection limits for some platforms"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:2
+msgid "1.5.0 Release"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:9
+msgid "1.5.0 with new tunnel build messages"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:16
+msgid ""
+"Yes, that's right, after 9 years of 0.9.x releases, we are going straight from 0.9.50 to 1.5.0.\n"
+"This does not signify a major API change, or a claim that development is now complete.\n"
+"It is simply a recognition of almost 20 years of work to provide anonymity and security for our users."
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:22
+msgid ""
+"This release finishes implementation of smaller tunnel build messages to reduce bandwidth.\n"
+"We continue the transition of the network's routers to X25519 encryption.\n"
+"Of course there are also numerous bug fixes and performance improvements."
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:39
+msgid "Tunnels: Finish support for new build messages (proposal 157)"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:40
+msgid "Updates: Support for .dmg and .exe updates"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:45
+msgid "Console: Fix generation of SSL keys on Java 17"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:46
+msgid "i2psnark: Fix autostart for magnets"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:47
+msgid "Router: Fix rare deadlock in publishing our RI"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:48
+msgid "SSU: Fix handling of bad peer test responses"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:49
+msgid "UPnP: IPv6 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:54
+msgid "Jetty: Improve sort in directory listings"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:55
+msgid "Jetty: Add X-I2P-Location header"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:56
+msgid "Router: Increase probability to rekey to ECIES"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:57
+msgid "Streaming: Performance improvements for low-latency connections"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:2
+msgid "I2P Celebrates its 20th Year"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:9
+msgid "I2P has been around for 20 years, let's take a look back"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:11
+msgid "20 Years of I2P"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:16
+msgid ""
+"It's hard to believe, but I2P has been around for nearly 20 years! From its\n"
+"beginning as a C project which provided anonymous access to IRC, we've had\n"
+"hundreds of contributors, accepted checkins from dozens of coders, used 2\n"
+"main languages, 3 version control systems, experienced a migration of its\n"
+"crypography, and multiple soft-forks. There have been around 500 registered\n"
+"sites on the Invisible Web, and countless unregistered I2P sites that were only\n"
+"accessible via their cryptographic hostnames."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:26
+msgid ""
+"Thanks to the participation of users like you, the network has grown from a tiny\n"
+"group of power users to over 75,000 nodes operated from all over the world,\n"
+"made of I2P routers bundled in perhaps dozens of applications. Today I2P is\n"
+"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, OpenBSD, and\n"
+"many other systems. I2P can run on phones and even in SOHO routers (thanks to the\n"
+"independent C++ implementation of the protocol, i2pd)."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:35
+msgid "A Routing Protocol with Flagship Applications"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:40
+msgid ""
+"Even before other anonymity projects were providing their own application\n"
+"bundles, I2P was a tool for building applications that were configured for\n"
+"anonymity. Over the years, we've leaned on this strength, by expanding our\n"
+"APIs to support more and more versatile applications. Today, we're still\n"
+"developing new ways of building I2P into applications."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:48
+msgid ""
+"Using the power of the Hidden Services Manager or the SAM API, developers of all\n"
+"kinds of applications can empower their users with anonymity using I2P. Exciting\n"
+"downstream projects like Monero's I2P-Zero have made it very easy for developers\n"
+"to help their users get connected to I2P. Today, I2P helps provide anonymity to\n"
+"dozens of applications including Bitcoin, IRC, email and multiple file-sharing\n"
+"protocols."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:57
+msgid "An Anonymous Network By Everyone, For Everyone"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:62
+msgid ""
+"I2P has always been a decentralized network, because its obvious that providing\n"
+"an anonymity network is an intrinsically collaborative process. To illustrate\n"
+"with the most extreme example, a single computer cannot provide itself\n"
+"with anonymity, nor can it be a useful network, by definiton. However, building\n"
+"I2P in this fully-decentralized manner hasn't always been easy."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:70
+msgid ""
+"From the beginning, I2P would need to be scalable, and be able to balance itself\n"
+"so that  high-bandwidth nodes wouldn't be able to easily take over the network.\n"
+"Sybil attacks would leave the realm of academia and we would need to develop\n"
+"new defenses against them."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:77
+msgid ""
+"We've worked very hard to never compromise on this stance, and today every I2P\n"
+"router helps participate in providing the network with bandwidth resources and\n"
+"providing the users with anonymity. In doing so, we've learned incredible things\n"
+"and produced a network which at times has seemed inconceivable."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:84
+msgid "Celebrating I2P"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:89
+msgid ""
+"Over the next 2 weeks, we've planned some blog posts where we'll explore the past,\n"
+"present, and future of I2P, highlight applications and tools that build on\n"
+"and enhance I2P, and showcase the best of our community. Check back here for\n"
+"more in the coming days!"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:96
+msgid ""
+"`The History of I2P\n"
+"  </en/blog/post/2021/08/28/History-of-I2P>`_"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:98
+msgid ""
+"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from Monero)\n"
+"  </en/blog/post/2021/09/08/I2P-Jpackage-Bundles-and-Zero>`_"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:100
+msgid ""
+"`Level-Up your I2P use with Encrypted LeaseSets\n"
+"  </en/blog/post/2021/09/07/Level-Up-Encrypted-Leasesets>`_"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:102
+msgid ""
+"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for "
+"End-Users"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:103
+msgid "I2P's Usability Journey"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:104
+msgid "Building Bridges - Making Connections with Other Privacy Projects"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:2
+msgid "20 Years of Privacy: A brief History of I2P"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:9
+msgid "A history of I2P As We Know It"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:11
+msgid ""
+"Invisibility is the best defense: building an internet within an internet"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:16
+msgid ""
+"I believe most people want this technology so they can express\n"
+"    themselves freely. It’s a comfortable feeling when you know you can\n"
+"    do that. At the same time we can conquer some of the problems seen\n"
+"    within the Internet by changing the way security and privacy is\n"
+"    viewed, as well as the extent to what it is valued."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:23
+msgid ""
+"In October 2001, 0x90 ( Lance James) had a dream. It started as a\n"
+"“desire for instant communication with other Freenet users to talk about\n"
+"Freenet issues, and exchange Freenet keys while still maintaining\n"
+"anonymity, privacy and security.” It was called IIP — the Invisible IRC\n"
+"Project."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:35
+msgid ""
+"The Invisible IRC Project was based on an ideal and framework behind The\n"
+"InvisibleNet:"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:38
+msgid "In an interview from 2002, 0x90 described the project:"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:40
+msgid ""
+"“InvisibleNet is a research & development driven organization whose main\n"
+"    focus is the innovation of intelligent network technology. Our goal is\n"
+"    to provide the highest standards in security and privacy on the widely\n"
+"    used, yet notoriously insecure Internet.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:45
+msgid ""
+"\"The InvisibleNet team is comprised of a talented group of developers and\n"
+"    architects entirely dedicated to providing its users with both\n"
+"    convenience and the very best in secure communication.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:49
+msgid ""
+"\"Our technological ideals are reflected in the implementation of a\n"
+"    framework that is solid in design, and transparent in its application.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:52
+msgid ""
+"\"Here at InvisibleNet we strive towards the greatest level of quality\n"
+"    possible by keeping all areas of our research & development open and\n"
+"    available to the public for peer review, feedback, suggestions and new\n"
+"    ideas.”"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:57
+msgid ""
+"\"The Invisible Internet Project: Defined as the “New Internet”.\n"
+"    Peer 2 Peer Internet. Using your peers to protect you. It is a\n"
+"    similar concept to the Invisible IRC Project, with its design as our\n"
+"    test model. We plan to re-design the Internet by taking it a step\n"
+"    further and having security and privacy be first priority.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:63
+msgid ""
+"\"The Invisible Internet Project or Protocol will be utilizing the\n"
+"    tests and research/development concepts of the Invisible IRC Project\n"
+"    to give us the scalability that we need and leverage this to take it\n"
+"    to the next level.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:68
+msgid ""
+"\"This, in essence will be an impenetrable neural-network, that is\n"
+"    self-driven, self-defensed, and completely seamless to already\n"
+"    applied protocols, specifically client to server (or agents as I call\n"
+"    them). It will be THE next transport layer, a layer on top of the\n"
+"    notoriously insecure Internet, to deliver full anonymity, privacy,\n"
+"    and security at the highest level possible. Decentralized and peer to\n"
+"    peer Internet, by the way, means no more worrying about your ISP\n"
+"    controlling your traffic. This will allow you to do seamless\n"
+"    activities and change the way we look at security and even the\n"
+"    Internet, utilizing public key cryptography, IP steganography, and\n"
+"    message authentication. The Internet that should have been, will be\n"
+"    soon.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:85
+msgid "All citations and quotes are from the interviews found here:"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:90
+msgid ""
+"By 2003, several other similar projects had started, the largest being\n"
+"Freenet, GNUNet, and Tor. All of these projects had broad goals to\n"
+"encrypt and anonymize a variety of traffic. For IIP, it became clear\n"
+"that IRC alone was not a big-enough target. What was needed was an\n"
+"anonymizing layer for all protocols. IIP by now was also being called\n"
+"“InvisibleNet”."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:97
+msgid ""
+"In early 2003, a new anonymous developer, “jrandom” joined the project.\n"
+"His explicit goal was to broaden the charter of IIP."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:100
+msgid ""
+"jrandom wished to rewrite the IIP code base in Java, a language he was\n"
+"familiar with, and the same language Freenet was using. He also wished\n"
+"to redesign the IIP protocols based on recent papers and the early\n"
+"design decisions that Tor and Freenet were making. Some of these\n"
+"concepts and naming conventions, such as “onion routing”, were modified\n"
+"to become “garlic routing”. For several of the design decisions, jrandom\n"
+"made different choices than Tor did, including selecting different\n"
+"cryptographic primitives in a number of places. Many (but not all) of\n"
+"these choices turned out quite well. For some others, such as using\n"
+"unidirectional tunnels rather than Tor’s bidirectional tunnels, the\n"
+"benefits and trade-offs are still not well-studied."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:112
+msgid ""
+"jrandom also set out a clear vision for the architecture of the code. It\n"
+"would be a client/server model, with the server (i.e. the router)\n"
+"isolated from any “client” protocols. Clients such as web browsers, web\n"
+"servers, IRC clients and servers, and others, would communicate through\n"
+"the router using I2CP, the I2P Client Protocol."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:118
+msgid ""
+"jrandom also had strong opinions on the direction of the project and its\n"
+"philosophy. He was strongly committed to open source and free software.\n"
+"He explicitly set a goal of protection from organizations with\n"
+"“unlimited financial and political resources.”"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:123
+msgid ""
+"By late summer 2003, jrandom had taken control of the project, and\n"
+"renamed it the Invisible Internet Project or “I2P”. He published a\n"
+"document outlining the philosophy of the project, and placed its\n"
+"technical goals and design in the context of mixnets and anonymizing\n"
+"layers. He also published the specification of two protocols (I2CP and\n"
+"I2NP) and their underlying data structures, that formed the basis of the\n"
+"network I2P uses today. Lance (“nop”) was last seen in a project meeting\n"
+"on November 11, 2003."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:138
+msgid ""
+"By fall 2003, I2P, Freenet, and Tor were rapidly developing. Business\n"
+"Week published an article on “The Underground Internet” which referenced\n"
+"InvisibleNet and discussed “darknets” extensively. jrandom released I2P\n"
+"version 0.2 on November 1, 2003, and continued rapid releases for the\n"
+"next 3 years. He maintained regular weekly meetings and status notes\n"
+"during this time. Several popular services and “respites” emerged during\n"
+"this time. Auto updates via clearnet HTTP became available in 2004."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:146
+msgid ""
+"Through 2004 and 2005, router development continued, and several\n"
+"“clients” or applications were added to the I2P package. “Mihi” wrote\n"
+"the first streaming protocol implementation and the i2ptunnel interface\n"
+"for configuring and starting client tunnels. “Susi” wrote the web mail\n"
+"and address book applications SusiMail and SusiDNS. Many people worked\n"
+"on the router console web interface. A bridge to make it easier for\n"
+"non-I2P clients to communicate over I2P, called “SAM” (Simple Anonymous\n"
+"Messaging) was added."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:155
+msgid "In February 2005, zzz installed I2P for the first time."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:156
+msgid ""
+"Anonymity projects were in the news. After surveying the field, he\n"
+"  installed Freenet, and found it ambiguous, and difficult to explore.\n"
+"  Not only that, it was very resource heavy and it was difficult to get\n"
+"  anything to load. Tor and I2P were the other options, and he tried\n"
+"  I2P."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:162
+msgid ""
+"zzz had no preconceived plans to contribute to the project, and had\n"
+"never written a line of Java. He had maybe used IRC once. At this time,\n"
+"I2P was at version 0.5, with maybe a thousand users and three hard-coded\n"
+"floodfills. Forum.i2p and postman’s tracker were up and running at the\n"
+"time, and weekly meetings and status notes, and releases every couple of\n"
+"week were happening."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:169
+msgid ""
+"By summer 2005, zzz had set up two websites. The first was zzz.i2p,\n"
+"which over the years became a central resource for I2P development, and\n"
+"still is. The second was stats.i2p, the first site to gather statistics\n"
+"on I2P network performance and present graphs on both the network and\n"
+"individual routers. While the individual router statistics eventually\n"
+"had to be shut down due to the tremendous growth of the network, the\n"
+"overall performance graphs remain. We are not sure that he ever planned\n"
+"to become the release manger for almost 2 decades, but we are happy he\n"
+"did. The project has not only stayed active, it has thrived and scaled\n"
+"to the demands of its growth."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:184
+msgid ""
+"On July 27, 2005, jrandom released I2P version 0.6, including an\n"
+"innovative new UDP transport protocol he designed called “SSU”, for\n"
+"Secure Semi-reliable UDP. It contained features for IP discovery and\n"
+"firewall traversal."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:189
+msgid ""
+"In September 2005, jrandom bundled “Syndie”, his new high-latency\n"
+"anonymous messaging system. In October 2005, jrandom ported Snark, a\n"
+"Java BitTorrent client, to become an I2P application and bundled it with\n"
+"the I2P package. This completed the collection of client applications\n"
+"that are still bundled with I2P today."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:195
+msgid ""
+"In late 2005 and early 2006, jrandom redesigned the way that I2P built\n"
+"tunnels. This was a major effort that was done to increase the security\n"
+"of the tunnel building, which is crucial to maintain anonymity and\n"
+"resist attacks. He worked closely with the Freenet developers, including\n"
+"“Toad”, on this design. The new build protocol required new I2NP\n"
+"messages and a hard cut-over or “flag day”. These changes were released\n"
+"in version 0.6.1.10 on February 16, 2006. This is significant as it is\n"
+"the last flag day I2P has had. While, in practice, an 0.6.1.10 router\n"
+"would not work well, if at all, in today’s network, we are, technically\n"
+"speaking, backwards-compatible with this ten-year-old version today."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:206
+msgid ""
+"By early 2006, the I2P software was at least feature-complete, but it\n"
+"was still not widely-known. jrandom’s view was that it shouldn’t be\n"
+"marketed publicly until it was near-perfect, and labeled as version 1.0.\n"
+"The network had perhaps a thousand users at the time. Project members\n"
+"were discouraged from talking about it online, and the website\n"
+"(`i2p.net <http://i2p.net>`__) was unpolished and incomplete."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:213
+msgid ""
+"On July 27, 2006, jrandom released I2P version 0.6.1.23, including an\n"
+"innovative new TCP transport protocol he designed called “NTCP”, for\n"
+"new-IO-based TCP. It used Java’s new IO library for efficient handling\n"
+"of large numbers of TCP connections."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:218
+msgid ""
+"In late 2006, jrandom turned his focus to Syndie. He came to see it as\n"
+"his top priority, and the “killer application” for I2P. Highly secure\n"
+"and almost unusable, it delayed messages for up to two days before\n"
+"delivery to resist traffic analysis. Later in 2006, he stopped work on\n"
+"the bundled Syndie application and started a new, incompatible,\n"
+"standalone messaging application. This application was, confusingly,\n"
+"also called “Syndie”. The new Syndie was a large and complex\n"
+"development, and it was essentially a one-man project."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:227
+msgid ""
+"From late 2006 into 2007, core I2P development and releases slowed\n"
+"dramatically. From almost 30 releases in 2005 and 13 in the first half\n"
+"of 2006, there were only 5 in the second half of 2006 and only 4 in all\n"
+"of 2007. During this time, zzz and a developer named Complication had\n"
+"source code commit privileges and were making changes, but their\n"
+"understanding of the code base was limited. zzz worked, for example, on\n"
+"improving i2psnark, fixing bugs, and redesigning the strategy for\n"
+"anticipatory tunnel building. But there was a lot more that needed to be\n"
+"done. Complication and zzz did what they could, and they wrote the code\n"
+"for almost all the changes in the four 2007 releases\n"
+"(0.6.1.27–0.6.1.30). By this time, jrandom was providing very little\n"
+"guidance, code review, or direction for the project."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:240
+msgid "It wasn’t apparent at the time, but the project was in trouble."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:242
+msgid ""
+"jrandom had almost stopped working on the core I2P router and\n"
+"applications. Even the new Syndie, which he had declared as far more\n"
+"important than I2P itself, languished. After regular releases through\n"
+"March 2007, his next Syndie release, 1.100a, was August 25, 2007. All\n"
+"I2P releases were required to be signed by jrandom’s key, and he built\n"
+"and signed his last release, 0.6.1.30, on October 7, 2007."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:249
+msgid ""
+"In November 2007, disaster struck. Complication and zzz received a\n"
+"cryptic message from jrandom, that he would have to take time off from\n"
+"both Syndie and I2P development for a year or more. He expected that he\n"
+"would still be available to sign releases, but was willing to pass the\n"
+"release signing key to somebody else. Complication and zzz immediately\n"
+"replied with a request for the release key and other credentials, such\n"
+"as access to the website, mailing list, CVS administration, and others.\n"
+"Unfortunately, they never heard from jrandom again."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:258
+msgid ""
+"Late 2007 and early 2008, they awaited jrandom’s response, and wondered\n"
+"what to do next. However, all of the project infrastructure remained\n"
+"active, so it didn’t seem to be an immediate crisis. They knew, however,\n"
+"that without the release key or website access, they would have to sign\n"
+"with new keys, host the files on a new website, and require everybody to\n"
+"manually update since their keys wouldn’t be recognized."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:265
+msgid ""
+"The second stage of the disaster happened on January 13, 2008. The\n"
+"hosting company for almost all `i2p.net <http://i2p.net>`__ servers\n"
+"suffered a power outage, and they did not fully return to service. Only\n"
+"jrandom had the credentials required to restore service. In addition,\n"
+"the centralized CVS source control appeared to be down, so five years of\n"
+"source control history appeared to be lost. Luckily, the CVS server was\n"
+"up, only the name server for it was down. The full contents of the CVS\n"
+"archive was quickly downloaded."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:274
+msgid ""
+"Complication, welterde, and zzz quickly made a number of decisions to\n"
+"  get the project back up and running. Welterde started a new website at\n"
+"  `i2p2.de <http://i2p2.de>`__. I2P needed to move to a decentralized\n"
+"  source code control system. They tested bazaar and that did not work\n"
+"  well over I2P. Git was just getting started. jrandom had used monotone\n"
+"  for Syndie and liked its security properties, and it worked well over\n"
+"  I2P, so it was selected."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:281
+msgid ""
+"Several people set up new services. The next release, 0.6.1.31, was\n"
+"  signed by Complication and required a manual upgrade. It was released\n"
+"  on February 10, 2008."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:285
+msgid ""
+"The project realized that even though it claimed to be totally\n"
+"decentralized, it actually depended on a number of centralized\n"
+"resources, above all, on jrandom. Work was done throughout 2008 to\n"
+"decentralize the project, and distribute roles to a number of people.\n"
+"Additionally, it was realized that development had essentially stalled\n"
+"in 2007, because jrandom had stopped working on it, but had not\n"
+"delegated to other developers. Nobody had an overall understanding of\n"
+"the code base."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:294
+msgid ""
+"Complication continued to sign the releases through mid-2009, but his\n"
+"contributions declined as he focused on activism and other projects.\n"
+"Starting with release 0.7.6 on July 31, 2009, zzz would sign the next 49\n"
+"releases."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:299
+msgid ""
+"In December 2008, zzz attended his first CCC, 25C3 in Berlin, and met\n"
+"other I2P project team members for the first time, including hottuna and\n"
+"welterde. The experience was overwhelming, and also humbling, as he\n"
+"struggled to explain I2P to others or answer even basic questions about\n"
+"its design and use of cryptography."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:305
+msgid ""
+"By mid-2009, zzz had come to understand the code base much better. Far\n"
+"from being complete or perfect, it was filled with problems and\n"
+"scalability issues. In 2009 the project experienced more network growth\n"
+"due to its anonymizing properties as well as its circumvention\n"
+"abilities. Participants appeared who were beginning to adopt the network\n"
+"for reasons like censorship and clearnet issues like blocking of popular\n"
+"services. For development gains, in-net auto updates became available\n"
+"for the software."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:316
+msgid ""
+"July 2010 zzz briefly presented I2P at the end of Adrian Hong’s\n"
+"presentation at HOPE XXXX. Adrian talked about how tech has helped\n"
+"expose human rights violations, and the need for defensive tools for\n"
+"activists. He urged that we all be ambassadors for all tech, stay on top\n"
+"of new tech, and keep the barrier low and educate people about how to\n"
+"use the tool we create."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:323
+msgid ""
+"He also talked about how we need many options for people to use, and\n"
+"asked how do we make it easier to support human rights, freedom of\n"
+"expression?"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:327
+msgid ""
+"At the end of the talk, zzz was invited on stage to introduce I2P and\n"
+"give an overview of what the project was about. The same weekend, it was\n"
+"pointed out that the I2P documentation was not in great shape."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:331
+msgid ""
+"In Fall 2010, zzz declared a moratorium on I2P development until the\n"
+"website documentation was complete and accurate. It took 3 months to get\n"
+"it done."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:335
+msgid ""
+"Beginning in 2010, until COVID restrictions were put in place, zzz, ech,\n"
+"hottuna, and other I2P contributors have attended CCC ( Chaos\n"
+"Communications Congress) every year. Over the years, meeh, Zab, Sadie,\n"
+"LazyGravy, KYTV, IDK and others have made the trip to Germany to share\n"
+"tables with other projects and celebrate the end of a year of releases.\n"
+"The project looks forward to one day being able to meet up again and\n"
+"have an in-person yearly roadmap meeting."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:343
+msgid ""
+"Anoncoin, a digital cryptocurrency that focuses on privacy and anonymity\n"
+"for its users was created in 2013. It was the first coin that provided\n"
+"built-in support for I2P, as well as Tor that makes it impossible to\n"
+"determine the IP address of the user. The developers, including meeh,\n"
+"also ran organizations like Privacy Solutions, and provided infrastructure\n"
+"support to the I2P network by running services like outproxies and\n"
+"reseed servers."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:351
+msgid ""
+"I2PBote development started to take off again in 2014 when str4d began\n"
+"contributing to the project. Bote is a server-less email client — it\n"
+"stores email in a `distributed hash\n"
+"table <http://en.wikipedia.org/wiki/Distributed_hash_table>`__. Email is\n"
+"“automatically encrypted and digitally signed, which ensures no one but\n"
+"the intended recipient can read the email, and third parties cannot\n"
+"forge them.” ( https://i2pbote.xyz/). The project has existed since\n"
+"2009."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:366
+msgid ""
+"At Real World Crypto that year, zzz, psi and str4d began to talk about\n"
+"and review the plan to update I2P’s cryptography. The same year, the\n"
+"project was awarded a $5k donation from Duck Duck Go. Lavabit,\n"
+"SecureDrop, RiseUp and Mailpile also received donations for supporting\n"
+"better trust and privacy online."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:372
+msgid ""
+"By late 2014 most new signing crypto was complete, including ECDSA and\n"
+"EdDSA. New destination crypto was available; but new router info crypto\n"
+"needed to wait a year for the network to upgrade sufficiently."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:376
+msgid ""
+"During the early part of 2015, zzz posted to Twitter that it would be\n"
+"great to have a mini conference for I2P. In Spring, it was decided that\n"
+"I2PCon would take place that August over the course of a weekend."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:380
+msgid ""
+"Hottuna and Sadie organized most of the details, getting graphic assets\n"
+"created, posters printed and a banner made for the podium. Nick at\n"
+"Hacklab, where the event would take place, helped with making sure the\n"
+"space was ready for the event. Sadie reached out to the local infosec\n"
+"community and helped secure guest speakers as well. The event happened\n"
+"on one of the hottest weekends of the Summer, with attendees arriving\n"
+"from America and Europe. The I2P community did an amazing job of\n"
+"supporting the event by postering, giving talks, and spreading the word\n"
+"in forums and on social media. The talks can be viewed on KYTV’s YouTube\n"
+"Channel https://www.youtube.com/channel/UCZfD2Dk6POE-VU8DOqW7VVw"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:395
+msgid ""
+"In January 2016 at Real World Crypto Stanford — str4d gave a talk on the\n"
+"crypto migration progress and future plans for the project. zzz and\n"
+"others would continue weekly meetings to plan the migration over the\n"
+"next few years."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:400
+msgid ""
+"NTCP2 was implemented in 2018, in release 0.9.36. It was disabled by\n"
+"default so that it could be tested. It was enabled in 0.9.37. NTCP1 was\n"
+"disabled in 0.9.40."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:404
+msgid ""
+"The new I2P transport protocol provides effective resistance against\n"
+"    DPI censorship. It also results in reduced CPU load because of the\n"
+"    faster, modern cryptography used. It makes I2P more likely to run on\n"
+"    low-end devices, such as smartphones and home routers. Both major I2P\n"
+"    implementations have full support for NTCP2 and it make NTCP2\n"
+"    available for use starting with version 0.9.36 (Java) and 2.20 (i2pd,\n"
+"    C++)."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:412
+msgid ""
+"The complete implementation details can be read here\n"
+"https://geti2p.net/en/blog/post/2018/08/20/NTCP2"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:415
+msgid ""
+"0.9.39 included extensive changes for new network database types\n"
+"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support\n"
+"development of RPC applications."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:419
+msgid ""
+"In 2019, the team decided to attend more conferences. That year IDK and\n"
+"zzz attended DefCon, and IDK gave a workshop on I2P application\n"
+"development. At Monero Village, zzz gave a talk called I2P for\n"
+"Cryptocurrency Developers."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:424
+msgid ""
+"Late that year, Sadie and IDK attended Our Networks in Toronto, where\n"
+"IDK gave a lightning talk about I2P."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:427
+msgid ""
+"Sadie attended RightsCon in Tunis and the Internet Freedom Festival in\n"
+"Valencia to meet with NGO’s and Human Right Defenders. Thanks to the the\n"
+"connections we made, the project received grants for usability and\n"
+"accessibility support from Open Tech Fund, and most recently Internews.\n"
+"This will ensure more user friendly onboarding, UX, and information\n"
+"architecture improvements to support the growing interest in the\n"
+"network. It will also support specific tooling to help in-need users\n"
+"with specific risk surfaces through user research."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:438
+msgid ""
+"That Summer, Hoàng Nguyên Phong had his research into I2P censorship\n"
+"accepted too FOCI at USENIX in Santa Clara. Sadie had supported the\n"
+"research and they attended together. I2P Metrics was created during this\n"
+"time https://i2p-metrics.np-tokumei.net/, and well as research into more\n"
+"resistant reseed servers for the I2P network\n"
+"https://homepage.np-tokumei.net/post/notes-i2p-reseed-over-cloudflare/.\n"
+"You can read the research report here\n"
+"https://homepage.np-tokumei.net/post/notes-otf-wrapup-blogpost/."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:447
+msgid ""
+"At CCC that year, the decision was made to migrate from Monotone too\n"
+"GitLab. The project was one of the last to use Monotone, and it was time\n"
+"to prepare to move on. IDK would spend 2020 ensuring the process was as\n"
+"smooth as it could be. The pandemic would result in the team not being\n"
+"able to see each other that year to celebrate the ( mostly) smooth move\n"
+"to Gitlab. On December 10. 2020, the project switched off the old mtn\n"
+"i2p.i2p branch, and moved the development of the core Java I2P libraries\n"
+"from Monotone to Git officially."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:456
+msgid ""
+"Congratulations and thanks to everyone who helped in the git\n"
+"    migration, especially zzz, eche|on, nextloop, and our site mirror\n"
+"    operators! While some of us will miss Monotone, it has become a\n"
+"    barrier for new and existing participants in I2P development and\n"
+"    we’re excited to join the world of developers using Git to manage\n"
+"    their distributed projects."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:465
+msgid ""
+"0.9.47 enabled the new end-to-end encryption protocol (proposal 144) by\n"
+"default for some services. A Sybil analysis and blocking tool was also\n"
+"now enabled by default. 0.9.48 enabled the new end-to-end encryption\n"
+"protocol (proposal 144) for most services. Preliminary support was added\n"
+"for new tunnel build message encryption (proposal 152). There were\n"
+"significant performance improvements throughout the router."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:472
+msgid ""
+"0.9.49 was the release that brought faster crypto. The I2P network\n"
+"became faster and more secure. Improvements and fixes for the SSU (UDP)\n"
+"transport resulted in faster speeds. The release also started the\n"
+"migration to new, faster ECIES-X25519 encryption for routers. The\n"
+"project had been working on the specifications and protocols for new\n"
+"encryption for several years, and was getting close to the end of it.\n"
+"The migration would take several releases to complete."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:480
+msgid ""
+"To minimize disruption, only new installs and a very small percentage of\n"
+"existing installs (randomly selected at restart) would be using the new\n"
+"encryption."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:484
+msgid ""
+"The project had “rekeyed” the network twice before, when changing the\n"
+"default signature type, but this was the first time it had changed the\n"
+"default encryption type. 0.9.50 enabled DNS over HTTPS for reseeding to\n"
+"protect users from passive DNS snooping. There were numerous fixes and\n"
+"improvements for IPv6 addresses, including new UPnP support."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:492
+msgid "1.5.0 — The early anniversary release because it is so good!"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:495
+msgid ""
+"Yes, that’s right, after 9 years of 0.9.x releases, we are going\n"
+"    straight from 0.9.50 to 1.5.0. This does not signify a major API\n"
+"    change, or a claim that development is now complete. It is simply a\n"
+"    recognition of almost 20 years of work to provide anonymity and\n"
+"    security for our users."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:501
+msgid ""
+"This release finishes implementation of smaller tunnel build messages\n"
+"    to reduce bandwidth. We continue the transition of the network’s\n"
+"    routers to X25519 encryption. Of course there are also numerous bug\n"
+"    fixes and performance improvements."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:506
+msgid ""
+"As usual, we recommend that you update to this release. The best way\n"
+"    to maintain security and help the network is to run the latest\n"
+"    release."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:510
+msgid "Congratulations team. Let’s do another 20."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:2
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:11
+msgid "Level up your I2P Skills with Encrypted LeaseSets"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:9
+msgid ""
+"It has been said that I2P emphasizes Hidden Services, we examine one "
+"interpretation of this"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:16
+msgid ""
+"It has been said in the past that I2P emphasizes support for Hidden Services,\n"
+"which is true in many ways. However, what this means to users, developers, and\n"
+"hidden service administrators isn't always the same. Encrypted LeaseSets and\n"
+"their use-cases provide a unique, practical window into how I2P makes hidden\n"
+"services more versatile, easier to administer, and how I2P extends on the\n"
+"Hidden Service concept to provide security benefits for potentially interesting\n"
+"use-cases."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:26
+msgid ""
+"What is a LeaseSet?\n"
+"-------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:31
+msgid ""
+"When you create a hidden service, you publish something called a \"LeaseSet\" to\n"
+"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P users\n"
+"need to discover \"where\" your hidden service is on the I2P Network. It contains\n"
+"\"Leases\" which identify tunnels that can be used to reach your hidden service,\n"
+"and the public key of your destination, which clients will encrypt messages to.\n"
+"This type of hidden service is reachable by anyone who has the address, which\n"
+"is probably the most common use case for now."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:41
+msgid ""
+"Sometimes, you might not want to allow your hidden services to be accessible by\n"
+"anyone, though. Some people use hidden services as a way of accessing an SSH\n"
+"server on a home PC, or to stitch together a network of IOT Devices. In these\n"
+"cases it's not necessary, and may be counter-productive, to make your hidden\n"
+"service accessible to everyone one the I2P Network. This is where \"Encrypted\n"
+"LeaseSets\" come into play."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:50
+msgid ""
+"Encrypted LeaseSets: VERY Hidden Services\n"
+"------------------------------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:55
+msgid ""
+"Encrypted LeaseSets are LeaseSets which are published to the NetDB in an\n"
+"encrypted form, where none of the Leases or public keys are visible unless\n"
+"the client has the keys required to decrypt the LeaseSet inside of it. Only\n"
+"clients you share keys with(For PSK Encrypted LeaseSets), or who share their\n"
+"keys with you(For DH Encrypted LeaseSets), will be able to see the destination\n"
+"and no one else."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:64
+msgid ""
+"I2P Supports several strategies for Encrypted LeaseSets. The key characteristics\n"
+"of each strategy are important to understand when deciding which one to use. If\n"
+"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the server\n"
+"will generate a key(or keys) which the server operator then shares with each\n"
+"client. Of course, this exchange must happen out-of-band, possibly via an\n"
+"exchange on IRC for example. This version of Encrypted LeaseSets is sort of\n"
+"like logging into Wi-Fi with a password. Except, what you're logging into is\n"
+"a Hidden Service."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:75
+msgid ""
+"If an Encrypted LeaseSet uses a \"Diffie-Hellman(DH)\n"
+"strategy, then they keys are generated on the client instead. When a\n"
+"Diffie-Hellman client connects to a destination with an Encrypted LeaseSet, they\n"
+"must first share their keys with the server operator. The server operator then\n"
+"decides whether to authorize the DH client. This version of Encrypted LeaseSets\n"
+"is sort of like SSH with an `authorized_keys` file. Except, what you're logging\n"
+"into is a Hidden Service."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:85
+msgid ""
+"By Encrypting your LeaseSet, you not only make it impossible for unauthorized\n"
+"users to connect to your destination, you make it impossible for unauthorized\n"
+"visitors to even discover the real destination of the I2P Hidden Service. Some\n"
+"readers have probably already considered a use-case for their own Encrypted\n"
+"LeaseSet."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:93
+msgid ""
+"Using Encrypted LeaseSets to Safely Access a Router Console\n"
+"-----------------------------------------------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:98
+msgid ""
+"As a general rule, the more complex information a service has access to about\n"
+"your device, the more dangerous it is to expose that service to the Internet or\n"
+"indeed, to a Hidden Service network like I2P. If you want to expose such a\n"
+"service, you need to protect it with something like a password, or, in the case\n"
+"of I2P, a much more thorough and secure option could be an Encrypted LeaseSet."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:106
+msgid ""
+"**Before continuing, please read and understand that if you do the following**\n"
+"**procedure without an Encrypted LeaseSet, you will be defeating the security of**\n"
+"**your I2P router. Do not configure access to your router console over I2P without**\n"
+"**an Encrypted LeaseSet. Additionally, do not share your Encrypted LeaseSet PSK's**\n"
+"**with any devices you do not control.**"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:114
+msgid ""
+"One such service which is useful to share over I2P, but ONLY with an Encrypted\n"
+"LeaseSet, is the I2P router console itself. Exposing the I2P router console on\n"
+"one machine to I2P with an Encrypted LeaseSet allows another machine with a\n"
+"browser to administer the remote I2P instance. I find this useful for remotely\n"
+"monitoring my regular I2P Services. It could also be used to monitor a server\n"
+"which is used to seed a torrent long-term as a way to access I2PSnark."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:123
+msgid ""
+"For as long as it takes to explain them, setting up an Encrypted LeaseSet is\n"
+"straightforward to configure via the Hidden Services Manager UI."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:128
+msgid ""
+"On the \"Server\"\n"
+"---------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:137
+msgid ""
+"Start by opening the Hidden Services Manager at http://127.0.0.1:7657/i2ptunnelmgr\n"
+"and scroll to the bottom of the section that says \"I2P Hidden Services.\" Create\n"
+"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" with these\n"
+"\"Tunnel Cryptography Options\" and save the hidden service."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:148
+msgid ""
+"Then, select your new tunnel from the Hidden Services Manager main page. The\n"
+"Tunnel Cryptography Options should now include your first Pre-Shared Key. Copy\n"
+"this down for the next step, along with the Encrypted Base32 Address of your\n"
+"tunnel."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:159
+msgid ""
+"On the \"Client\"\n"
+"---------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:164
+msgid ""
+"Now switch computers to the client which will connect to the hidden service,\n"
+"and visit the Keyring Configuration at http://127.0.0.1:7657/configkeyring to\n"
+"add the keys from earlier. Start by pasting the Base32 from the Server into\n"
+"the field labeled: \"Full destination, name, Base32, or hash.\" Next, paste the\n"
+"Pre-Shared Key from the server into the \"Encryption Key\" field. Click save,\n"
+"and you're ready to securely visit the Hidden Service using an Encrypted\n"
+"LeaseSet."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:178
+msgid ""
+"Now You're Ready to Remotely Administer I2P\n"
+"-------------------------------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:183
+msgid ""
+"As you can see, I2P offers unique capabilities to Hidden Service Administrators\n"
+"which empower them to securely manage their I2P connections from anywhere in the\n"
+"world. Other Encrypted LeaseSets I keep on the same device for the same reason\n"
+"point to the SSH server, the Portainer instance I user to manage my service\n"
+"containers, and my personal NextCloud instance. With I2P, truly private, always\n"
+"reachable Self-Hosting is an achievable goal, in fact I think it's one of the\n"
+"things we're uniquely suited to, because of Encrypted LeaseSets. With them, I2P\n"
+"could become the key to securing self-hosted home automation or simply become\n"
+"the backbone of a new more private peer-to-peer web."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:2
+msgid "Improving I2P Adoption and Onboarding using Jpackage, I2P-Zero"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:9
+msgid ""
+"Versatile and emerging ways of installing and embedding I2P in your "
+"application"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:11
+msgid ""
+"For the majority of I2P's existence, it's been an application that runs with the\n"
+"help of a Java Virtual Machine that is already installed on the platform. This\n"
+"has always been the normal way to distribute Java applications, but it leads to\n"
+"a complicated installation procedure for many people. To make things even more\n"
+"complicated, the \"right answer\" to making I2P easy to install on any given\n"
+"platform might not be the same as any other platform. For example, I2P is quite\n"
+"simple to install with standard tools on Debian and Ubuntu based operating\n"
+"systems, because we can simply list the required Java components as \"Required\"\n"
+"by our package, however on Windows or OSX, there is no such system allowing us to make\n"
+"sure that a compatible Java is installed."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:24
+msgid ""
+"The obvious solution would be to manage the Java installation ourselves, but\n"
+"this used to a problem in-and-of-itself, outside of the scope of I2P. However,\n"
+"in recent Java versions, a new set of options has emerged which has the\n"
+"potential to solve this problem for many Java software. This exciting tool is\n"
+"called **\"Jpackage.\"**"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:32
+msgid "I2P-Zero and Dependency-Free I2P Installation"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:37
+msgid ""
+"The first very successful effort at building a dependency-free I2P Package was\n"
+"I2P-Zero, which was created by the Monero project originally for use with the\n"
+"Monero cryptocurrency. This project got us very excited because of it's success\n"
+"in creating a general-purpose I2P router which could easily packaged with an\n"
+"I2P application. Especially on Reddit, many people express their preference for\n"
+"the simplicity of setting up an I2P-Zero router."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:46
+msgid ""
+"This really proved to us that a dependency-free I2P Package which was easy to\n"
+"install was possible using modern Java tools, but I2P-Zero's use case was a\n"
+"little bit different than ours. It is best for embedded apps that need an I2P\n"
+"router that they can easily control using it's convenient control port on port\n"
+"\"8051\". Our next step would be to adapt the technology to the general-purpose\n"
+"I2P Application."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:55
+msgid "OSX Application Security Changes affect I2P IzPack Installer"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:60
+msgid ""
+"The issue became more pressing in recent versions of Mac OSX, where it is no\n"
+"longer straightforward to use the \"Classic\" installer which comes in the .jar\n"
+"format. This is because the application is not \"Notarized\" by Apple authorities\n"
+"and it is deemed a security risk. **However**, Jpackage can produce a .dmg file,\n"
+"which can be notarized by Apple authorities, conveniently solving our problem."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:68
+msgid ""
+"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to install on\n"
+"OSX than ever, no longer requiring users to install Java themselves and using\n"
+"standard OSX installation tools in their prescribed ways. The new .dmg installer\n"
+"makes setting up I2P on Mac OSX easier than it's ever been."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:79
+msgid "The I2P of the future is Easy to Install"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:84
+msgid ""
+"One of the things I hear from users the most is that if I2P wants adoption, it\n"
+"needs to be easy to use for people. Many of them want a \"Tor Browser Like\" user\n"
+"experience, to quote or paraphrase many familiar Redditors. Installation should\n"
+"not require complicated and error-prone \"post-installation\" steps. Many new\n"
+"users are not prepared to deal with their browser configuration in a thorough\n"
+"and complete way. To address this problem, we created the I2P Profile Bundle\n"
+"which configured Firefox so that it would automatically \"Just Work\" for I2P.\n"
+"As it's developed, it's added security features and improved integration with\n"
+"I2P itself. In it's latest version, it **also** bundles a complete, Jpackage\n"
+"powered I2P Router. The I2P Firefox Profile is now a fully-fledged distribution\n"
+"of I2P for Windows, with the only remaining dependency being Firefox itself.\n"
+"This should provide an unprecedented level of convenience for I2P users on\n"
+"Windows."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:2
+msgid "Bitcoin Core adds support for I2P!"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:9
+msgid "A new use case and a signal of growing acceptance"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:11
+msgid ""
+"An event months in the making, Bitcoin Core has added official support for I2P!\n"
+"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin nodes,\n"
+"using the help of nodes that operate within both I2P and the clearnet, making\n"
+"them first-class participants in the Bitcoin network. It's exciting to see\n"
+"large communities like Bitcoin taking notice of the advantages I2P can bring\n"
+"to them providing privacy and reachability to people all over the world."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:20
+msgid "How it Works"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:25
+msgid ""
+"I2P support is automatic, via the SAM API. This is also exciting news, because\n"
+"it highlights some of the things I2P is singularly good at, like empowering \n"
+"application developers to build I2P connections programmatically and\n"
+"conveniently. Bitcoin-over-I2P users can use I2P with no manual configuration by\n"
+"enabling the SAM API and running Bitcoin with I2P enabled."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:33
+msgid "Configuring your I2P Router"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:38
+msgid ""
+"In order to set up an I2P Router to provide anonymous connectivity to bitcoin,\n"
+"the SAM API needs to be enabled. In Java I2P, you should go to `http://127.0.0.1:7657/configclients\n"
+"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application Bridge\n"
+"with the \"Start\" button. You may also want to enable the SAM Application Bridge\n"
+"by default by checking the \"Run at Startup\" box and clicking \"Save Client\n"
+"Configuration.\""
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:47
+msgid ""
+"On i2pd, the SAM API is normally enabled by default, but if it isn't, you should\n"
+"set::\n"
+"\n"
+"  sam.enabled=true\n"
+"\n"
+"in your i2pd.conf file."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:56
+msgid "Configuring your Bitcoin Node for Anonymity and Connectivity"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:61
+msgid ""
+"Getting Bitcoin itself launched in an anonymous mode still requires editing some\n"
+"configuration files in the Bitcoin Data Directory, which is %APPDATA%\\Bitcoin on\n"
+"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ on Mac\n"
+"OSX. It also requires at least version 22.0.0 for I2P support to be present."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:68
+msgid ""
+"After following these instructions, you should have a private Bitcoin\n"
+"node which uses I2P for I2P connections, and Tor for .onion and clearnet\n"
+"connections, so that all your connections are anonymous. For convenience,\n"
+"Windows users should open their Bitcoin Data Directory by opening the start menu\n"
+"and searching for \"Run.\" Inside the run prompt, type \"%APPDATA%\\Bitcoin\" and\n"
+"press enter."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:77
+msgid ""
+"In that directory create a file called \"i2p.conf.\" On Windows, you should make\n"
+"sure that you've add quotes around the file when you save it, in order to\n"
+"prevent Windows from adding a default file extension to the file. The file\n"
+"should contain the following I2P-Related Bitcoin configuration options::\n"
+"\n"
+"  i2psam=127.0.0.1:7656\n"
+"  i2pacceptincoming=true\n"
+"  onlynet=i2p\n"
+"\n"
+"Next, you should create another file called \"tor.conf.\" The file should contain\n"
+"the following Tor related configuration options::\n"
+"\n"
+"  proxy=127.0.0.1:9050\n"
+"  onion=127.0.0.1:9050\n"
+"  onlynet=tor\n"
+"\n"
+"Finally, you'll need to \"include\" these configuration options in your Bitcoin\n"
+"configuration file, called \"bitcoin.conf\" in the Data Directory. Add these two\n"
+"lines to your bitcoin.conf file::\n"
+"\n"
+"  includeconf=i2p.conf\n"
+"  includeconf=tor.conf\n"
+"\n"
+"Now your Bitcoin node is configured to only use anonymous connections. In order\n"
+"to enable direct connections to remote nodes, remove the lines beginning in::\n"
+"\n"
+"  onlynet=\n"
+"\n"
+"You can do this if you do not require your Bitcoin node to be anonymous, and\n"
+"it helps anonymous users connect to the rest of the Bitcoin network."
+msgstr ""
diff --git a/i2p2www/translations/ko/LC_MESSAGES/comparison.po b/i2p2www/translations/ko/LC_MESSAGES/comparison.po
index dedf32951bd38395d2c98b6710efed5e9a1a0f86..ee9bb62b2ebdac73eee353a90ecb76f48a4d3ea4 100644
--- a/i2p2www/translations/ko/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/ko/LC_MESSAGES/comparison.po
@@ -1,22 +1,23 @@
-# Korean translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # SEPT____ <xpressengine3@mail.beo.kr>, 2016
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2020-11-04 00:06+0000\n"
-"Last-Translator: ylsun <y15un@y15un.dog>\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: SEPT____ <xpressengine3@mail.beo.kr>, 2016\n"
 "Language-Team: Korean (http://www.transifex.com/otf/I2P/language/ko/)\n"
-"Plural-Forms: nplurals=1; plural=0\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ko\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -24,34 +25,23 @@ msgstr "I2P와 프리넷의 비교"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
@@ -59,20 +49,13 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
 msgstr ""
 
@@ -82,15 +65,11 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -105,10 +84,8 @@ msgstr ""
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
@@ -126,52 +103,38 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
 msgstr ""
 
@@ -179,19 +142,15 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
@@ -203,32 +162,20 @@ msgstr ""
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
 msgstr ""
 
@@ -237,36 +184,23 @@ msgstr ""
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
 msgstr ""
 
@@ -274,10 +208,8 @@ msgstr ""
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
 msgstr ""
@@ -291,7 +223,7 @@ msgstr ""
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
@@ -426,7 +358,7 @@ msgstr "히든 서비스"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
+msgid "I2P Site or Destination"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
@@ -497,8 +429,7 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
 msgstr ""
@@ -517,10 +448,8 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:93
@@ -528,7 +457,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:96
@@ -567,8 +497,8 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:121
@@ -705,4 +635,3 @@ msgid ""
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
 msgstr ""
-
diff --git a/i2p2www/translations/ko/LC_MESSAGES/get-involved.po b/i2p2www/translations/ko/LC_MESSAGES/get-involved.po
index 0050564954c98b23b07495c63dc9f5ca671580c9..c871de5a9c57edb6d86f2e01de73549b8360e79d 100644
--- a/i2p2www/translations/ko/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/ko/LC_MESSAGES/get-involved.po
@@ -1,21 +1,22 @@
-# Korean translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-10-11 16:27+0000\n"
-"PO-Revision-Date: 2021-12-26 06:18+0000\n"
-"Last-Translator: 노 유현\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Korean (http://www.transifex.com/otf/I2P/language/ko/)\n"
-"Plural-Forms: nplurals=1; plural=0\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ko\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -30,12 +31,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -50,44 +48,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -126,10 +113,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -159,10 +144,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -177,25 +160,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -221,8 +194,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -236,12 +208,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -252,10 +221,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
 msgstr ""
@@ -266,17 +233,12 @@ msgstr "문서"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -287,16 +249,11 @@ msgstr "시험중"
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -309,14 +266,10 @@ msgstr "서비스들"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -326,9 +279,9 @@ msgstr "재배포"
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -372,8 +325,7 @@ msgstr ""
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -442,84 +394,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -528,17 +457,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -546,29 +470,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -576,42 +494,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -655,72 +564,52 @@ msgstr ""
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -730,8 +619,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -744,33 +633,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -791,76 +674,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -870,25 +734,18 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -899,29 +756,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -931,10 +780,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -942,13 +789,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -959,43 +803,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1010,28 +847,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1042,8 +871,7 @@ msgstr "제거됨"
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1057,8 +885,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1077,14 +904,10 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1093,17 +916,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1113,8 +933,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1136,32 +955,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1170,47 +982,39 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1222,12 +1026,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1252,8 +1053,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1272,8 +1073,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1302,20 +1102,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1387,8 +1183,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1401,24 +1196,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1428,22 +1214,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1479,21 +1257,16 @@ msgstr ""
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1517,10 +1290,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1531,8 +1302,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1545,10 +1315,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1558,7 +1326,8 @@ msgid "Release Signing Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1579,7 +1348,8 @@ msgid "Download PGP public key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1587,13 +1357,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1601,7 +1372,8 @@ msgid "Security GPG Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1610,8 +1382,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1643,35 +1414,28 @@ msgstr "기타 사항"
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1679,29 +1443,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1728,12 +1486,10 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1743,10 +1499,8 @@ msgstr "커뮤니티"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1768,8 +1522,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1777,13 +1531,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1792,8 +1547,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1807,34 +1561,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1844,61 +1592,49 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1925,20 +1661,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1947,14 +1682,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1964,12 +1699,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1989,8 +1725,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2017,12 +1752,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2041,22 +1773,22 @@ msgstr "I2P와 함께 IDE 사용하기"
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2073,8 +1805,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2091,14 +1823,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2177,34 +1909,26 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2214,20 +1938,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2244,22 +1964,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2271,10 +1988,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2284,38 +1999,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2333,23 +2040,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2363,11 +2064,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2378,34 +2076,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2418,18 +2109,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2443,16 +2130,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2472,67 +2157,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2556,8 +2231,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2573,44 +2248,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2618,8 +2283,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2677,8 +2341,7 @@ msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:26
@@ -2691,10 +2354,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:37
@@ -2704,8 +2365,7 @@ msgid ""
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:47
@@ -2717,10 +2377,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, "
-"however Trac still available for now. Two-way syncing of\n"
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
 "issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
@@ -2737,13 +2395,11 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:91
@@ -2772,51 +2428,39 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -2836,11 +2480,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -2855,10 +2497,8 @@ msgstr ""
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -2878,12 +2518,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -2894,27 +2531,23 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
 msgstr ""
 
@@ -2930,10 +2563,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -2951,8 +2582,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
 msgstr ""
 
@@ -2965,19 +2595,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -2985,15 +2611,13 @@ msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3002,8 +2626,8 @@ msgstr "FAQ"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3019,67 +2643,65 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3104,10 +2726,8 @@ msgstr "미리보기"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3116,21 +2736,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3153,8 +2769,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3164,18 +2779,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3185,10 +2795,8 @@ msgstr "개인 정보 보호 정책"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3197,17 +2805,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3216,10 +2822,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3230,18 +2834,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr ""
-
diff --git a/i2p2www/translations/mg/LC_MESSAGES/about.po b/i2p2www/translations/mg/LC_MESSAGES/about.po
index 47157a1d5bcd0d88ceb1538e718796fa3df45c40..2531b416b7485e8a8f8e08360b80a79229133165 100644
--- a/i2p2www/translations/mg/LC_MESSAGES/about.po
+++ b/i2p2www/translations/mg/LC_MESSAGES/about.po
@@ -1,22 +1,23 @@
-# Malagasy translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # topdog101 <topdog101@free.fr>, 2014
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: topdog101 <topdog101@free.fr>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: topdog101 <topdog101@free.fr>, 2014\n"
 "Language-Team: Malagasy (http://www.transifex.com/otf/I2P/language/mg/)\n"
-"Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: mg\n"
+"Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -26,8 +27,7 @@ msgstr ""
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
 msgstr ""
 
@@ -50,8 +50,7 @@ msgstr ""
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
 msgstr ""
 
 #: i2p2www/pages/site/about/browser-config.html:2
@@ -64,24 +63,158 @@ msgstr "Fanatontoloana"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
 
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
+
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -91,15 +224,14 @@ msgstr ""
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -113,12 +245,8 @@ msgstr "Tetik 'asa momba ny Tranonkala Miafina"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -128,13 +256,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -143,15 +271,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -160,28 +288,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -190,36 +317,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -228,13 +354,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -243,15 +369,11 @@ msgstr "Fampitahana"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -270,9 +392,8 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -329,8 +450,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -349,8 +469,7 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
 msgstr ""
 
@@ -359,8 +478,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:76
@@ -373,8 +491,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
@@ -383,8 +500,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:95
@@ -392,8 +509,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -408,15 +524,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -428,8 +542,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -484,16 +597,14 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
@@ -502,11 +613,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:189
@@ -559,16 +668,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
 msgstr ""
@@ -584,12 +691,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -603,35 +707,29 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -640,16 +738,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -666,11 +762,57 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -679,18 +821,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -701,84 +840,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -789,8 +905,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -798,27 +913,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -826,26 +937,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -856,10 +958,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -867,18 +967,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -889,10 +986,8 @@ msgstr ""
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
 msgstr ""
@@ -1064,7 +1159,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1304,7 +1400,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1354,32 +1451,25 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1397,8 +1487,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1437,10 +1527,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1454,15 +1542,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1471,11 +1555,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1530,8 +1611,7 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1549,15 +1629,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1576,14 +1652,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1594,20 +1666,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1618,24 +1683,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1655,33 +1711,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -1694,32 +1741,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -1729,27 +1768,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -1766,17 +1797,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -1789,8 +1817,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -1801,10 +1828,8 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -1823,30 +1848,23 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -1860,55 +1878,40 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -1919,20 +1922,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -1943,16 +1939,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -1962,17 +1953,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -1983,20 +1971,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2010,26 +1991,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2038,18 +2009,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2057,16 +2022,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2082,52 +2042,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2142,102 +2083,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2250,4 +2150,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/nl/LC_MESSAGES/about.po b/i2p2www/translations/nl/LC_MESSAGES/about.po
index da20f003d4a76ea03d26904a3e025fe5364f9f7e..8f321a5516eff726950960580d3553c4b21e75ad 100644
--- a/i2p2www/translations/nl/LC_MESSAGES/about.po
+++ b/i2p2www/translations/nl/LC_MESSAGES/about.po
@@ -1,23 +1,24 @@
-# Dutch translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Jakob Wuhrer <pinoaffe@gmail.com>, 2016
 # Nathan Follens, 2015,2018
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: Desirius <martinjefmeyers@gmail.com>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Nathan Follens, 2015,2018\n"
 "Language-Team: Dutch (http://www.transifex.com/otf/I2P/language/nl/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: nl\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -27,14 +28,9 @@ msgstr "Alternatieve I2P-cliënten"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
-msgstr ""
-"De voornaamste implementatie van een I2P-cliënt gebruikt de "
-"programmeertaal Java. Als je om een of andere reden Java niet kan "
-"gebruiken op je apparaat, zijn er alternatieve implementaties die "
-"ontwikkeld worden door leden van de gemeenschap."
+msgstr "De voornaamste implementatie van een I2P-cliënt gebruikt de programmeertaal Java. Als je om een of andere reden Java niet kan gebruiken op je apparaat, zijn er alternatieve implementaties die ontwikkeld worden door leden van de gemeenschap."
 
 #: i2p2www/pages/site/about/alternative-clients.html:12
 #, python-format
@@ -42,32 +38,21 @@ msgid ""
 "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n"
 "As of early 2016, i2pd is became stable enough to be used in \n"
 "production, and since summer 2016 it fully implements all I2P APIs."
-msgstr ""
-"<a href=\"%(i2pd)s\">i2pd</a> is een I2P-cliëntimplementatie geschreven "
-"in C++.\n"
-"Sinds het begin van 2016 is i2pd stabiel genoeg om in productie gebruikt "
-"te worden,\n"
-"en sinds de zomer van 2016 implementeert het alle I2P-API’s volledig."
+msgstr "<a href=\"%(i2pd)s\">i2pd</a> is een I2P-cliëntimplementatie geschreven in C++.\nSinds het begin van 2016 is i2pd stabiel genoeg om in productie gebruikt te worden,\nen sinds de zomer van 2016 implementeert het alle I2P-API’s volledig."
 
 #: i2p2www/pages/site/about/alternative-clients.html:19
 #, python-format
 msgid ""
 "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero "
 "cryptocurrency."
-msgstr ""
-"<a href=\"%(kovri)s\">Kovri</a> is een actieve i2pd-vork, ontwikkeld voor"
-" de Monero-cryptomunt."
+msgstr "<a href=\"%(kovri)s\">Kovri</a> is een actieve i2pd-vork, ontwikkeld voor de Monero-cryptomunt."
 
 #: i2p2www/pages/site/about/alternative-clients.html:24
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
-msgstr ""
-"<a href=\"%(go_i2p)s\">Go-I2P</a> is een I2P-cliënt ontwikkeld met de\n"
-"<a href=\"%(golang)s\">Go</a>-programmeertaal. Het project bevindt zich "
-"nog in een vroege fase van ontwikkeling."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
+msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> is een I2P-cliënt ontwikkeld met de\n<a href=\"%(golang)s\">Go</a>-programmeertaal. Het project bevindt zich nog in een vroege fase van ontwikkeling."
 
 #: i2p2www/pages/site/about/browser-config.html:2
 msgid "Web Browser Configuration"
@@ -79,11 +64,147 @@ msgstr "Woordenlijst"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
-"Deze pagina bevat een lijst met veelgebruikte terminologie bij het "
-"bespreken van I2P en cryptografie."
+
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
@@ -91,14 +212,10 @@ msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -108,19 +225,14 @@ msgstr "Veel dank aan de mensen die gedoneerd hebben aan de I2P!"
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
-msgstr ""
-"Als je gedoneerd hebt, stuur dan een e-mail naar <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
-"met je naam of gebruikersnaam (of mogelijkerwijs een website) zodat we je"
-" hier in de lijst kunnen opnemen"
+msgstr "Als je gedoneerd hebt, stuur dan een e-mail naar <a href=\"mailto:%(echelon)s\">echelon</a>\nmet je naam of gebruikersnaam (of mogelijkerwijs een website) zodat we je hier in de lijst kunnen opnemen"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -134,12 +246,8 @@ msgstr "Het onzichtbaarinternetproject"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -149,13 +257,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -164,15 +272,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -181,28 +289,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -211,36 +318,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -249,13 +355,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -264,15 +370,11 @@ msgstr "Vergelijkingen"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -291,9 +393,8 @@ msgstr "Presentaties over I2P"
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -350,8 +451,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -370,8 +470,7 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
 msgstr ""
 
@@ -380,8 +479,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:76
@@ -394,8 +492,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
@@ -404,8 +501,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:95
@@ -413,8 +510,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -429,15 +525,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -449,8 +543,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -505,16 +598,14 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
@@ -523,11 +614,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:189
@@ -580,16 +669,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
 msgstr ""
@@ -605,12 +692,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -624,35 +708,29 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -661,16 +739,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -682,18 +758,62 @@ msgstr "Andere"
 msgid ""
 "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n"
 "February 14, 2014"
-msgstr ""
-"I2P vermeld in Netflix’ ‘House of Cards’, seizoen 2, aflevering 2,\n"
-"14 februari 2014"
+msgstr "I2P vermeld in Netflix’ ‘House of Cards’, seizoen 2, aflevering 2,\n14 februari 2014"
 
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -702,18 +822,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -724,84 +841,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -812,8 +906,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -821,27 +914,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -849,26 +938,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -879,10 +959,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -890,18 +968,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -912,19 +987,11 @@ msgstr "I2P-projectleden"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
-msgstr ""
-"We zijn een kleine groep mensen verspreid over verschillende continenten "
-"die werkt\n"
-"aan het verbeteren van verschillende aspecten van het project, en het "
-"ontwerp van het\n"
-"netwerk bespreken.\n"
-"<a href=\"%(volunteer)s\">Help mee!</a>"
+msgstr "We zijn een kleine groep mensen verspreid over verschillende continenten die werkt\naan het verbeteren van verschillende aspecten van het project, en het ontwerp van het\nnetwerk bespreken.\n<a href=\"%(volunteer)s\">Help mee!</a>"
 
 #: i2p2www/pages/site/about/team.html:14
 msgid "Admin"
@@ -1093,7 +1160,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1333,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1383,32 +1452,25 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1426,8 +1488,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1466,10 +1528,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1483,15 +1543,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1500,11 +1556,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1559,8 +1612,7 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1578,15 +1630,11 @@ msgstr "Augustus 2010"
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1605,14 +1653,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1623,20 +1667,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1647,24 +1684,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1684,33 +1712,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -1723,32 +1742,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -1758,27 +1769,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -1795,17 +1798,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -1818,8 +1818,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -1830,10 +1829,8 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -1852,30 +1849,23 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -1889,55 +1879,40 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -1948,20 +1923,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -1972,16 +1940,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -1991,17 +1954,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -2012,20 +1972,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2039,26 +1992,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2067,18 +2010,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2086,16 +2023,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2111,52 +2043,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2171,102 +2084,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2279,4 +2151,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/nl/LC_MESSAGES/comparison.po b/i2p2www/translations/nl/LC_MESSAGES/comparison.po
index ee8c5b2ae3ffebd48bc36e397f683d80b8df4b27..d1d685a806415006bc7ac44df16d6800b5a82f8e 100644
--- a/i2p2www/translations/nl/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/nl/LC_MESSAGES/comparison.po
@@ -1,24 +1,25 @@
-# Dutch translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Just ATranslater <transifex@weinand.nl>, 2017
 # Martijn de Boer, 2016
 # Nathan Follens, 2015,2018
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2018-08-24 11:51+0000\n"
-"Last-Translator: zzzi2p\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Nathan Follens, 2015,2018\n"
 "Language-Team: Dutch (http://www.transifex.com/otf/I2P/language/nl/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: nl\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -26,41 +27,23 @@ msgstr "I2P vergeleken met Freenet"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
-msgstr ""
-"Freenet is een volledig gedistribueerd, peer to peer anoniem netwerk voor"
-" publicaties, met mogelijkheden om veilig gegevens op te slaan, inclusief"
-" mogelijke oplossingen om inbreuk op bandbreedte tegen te gaan. Naast het"
-" feit dat Freenet is ontwikkeld als een gedistribueerde manier voor "
-"gegevensopslag, wordt het tevens gebruikt om hierop applicaties te bouwen"
-" voor meer algemene vormen van anonieme communicatie, zoals websites en "
-"forums."
+msgstr "Freenet is een volledig gedistribueerd, peer to peer anoniem netwerk voor publicaties, met mogelijkheden om veilig gegevens op te slaan, inclusief mogelijke oplossingen om inbreuk op bandbreedte tegen te gaan. Naast het feit dat Freenet is ontwikkeld als een gedistribueerde manier voor gegevensopslag, wordt het tevens gebruikt om hierop applicaties te bouwen voor meer algemene vormen van anonieme communicatie, zoals websites en forums."
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
@@ -68,20 +51,13 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
 msgstr ""
 
@@ -91,15 +67,11 @@ msgstr "I2P vergeleken met andere projecten"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -114,10 +86,8 @@ msgstr ""
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
@@ -135,52 +105,38 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
 msgstr ""
 
@@ -188,19 +144,15 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
@@ -212,32 +164,20 @@ msgstr ""
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
 msgstr ""
 
@@ -246,36 +186,23 @@ msgstr ""
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
 msgstr ""
 
@@ -283,10 +210,8 @@ msgstr ""
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
 msgstr ""
@@ -300,7 +225,7 @@ msgstr "Betaalde VPN-diensten"
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
@@ -362,9 +287,7 @@ msgstr "Vergelijking van Tor- en I2P-terminologie"
 msgid ""
 "While Tor and I2P are similar in many ways, much of the terminology is "
 "different."
-msgstr ""
-"Hoewel Tor en I2P op verschillende vlakken gelijkaardig zijn, is een "
-"groot deel van de terminologie verschillend."
+msgstr "Hoewel Tor en I2P op verschillende vlakken gelijkaardig zijn, is een groot deel van de terminologie verschillend."
 
 #: i2p2www/pages/site/comparison/tor.html:55
 msgid "Cell"
@@ -437,8 +360,8 @@ msgstr "Verborgen dienst"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
-msgstr "Eepsite of Doel"
+msgid "I2P Site or Destination"
+msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
 msgid "Hidden Service Descriptor"
@@ -508,8 +431,7 @@ msgstr "Voordelen van Tor over I2P"
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
 msgstr ""
@@ -528,10 +450,8 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:93
@@ -539,7 +459,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:96
@@ -578,8 +499,8 @@ msgstr "Voordelen van I2P over Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:121
@@ -694,9 +615,7 @@ msgstr "Andere mogelijke voordelen van I2P die nog niet geïmplementeerd zijn"
 
 #: i2p2www/pages/site/comparison/tor.html:207
 msgid "...and may never be implemented, so don't count on them!"
-msgstr ""
-"en misschien ook nooit geïmplementeerd zullen worden, dus reken er niet "
-"op!"
+msgstr "en misschien ook nooit geïmplementeerd zullen worden, dus reken er niet op!"
 
 #: i2p2www/pages/site/comparison/tor.html:210
 msgid ""
@@ -718,4 +637,3 @@ msgid ""
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
 msgstr ""
-
diff --git a/i2p2www/translations/nl/LC_MESSAGES/get-involved.po b/i2p2www/translations/nl/LC_MESSAGES/get-involved.po
index 60b4cd3dc7ffe28bb60fbd52b85d6c07a645269c..c4f7c30d5dfdf0b461fe2937b84e974e0d813c70 100644
--- a/i2p2www/translations/nl/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/nl/LC_MESSAGES/get-involved.po
@@ -1,22 +1,23 @@
-# Dutch translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Nathan Follens, 2015
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:56+0000\n"
-"Last-Translator: erinm\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Nathan Follens, 2015\n"
 "Language-Team: Dutch (http://www.transifex.com/otf/I2P/language/nl/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: nl\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -31,12 +32,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -51,44 +49,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -127,10 +114,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -160,10 +145,8 @@ msgstr "Stickers"
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -178,25 +161,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -222,8 +195,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -237,12 +209,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -253,10 +222,8 @@ msgstr "Vertalen"
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
 msgstr ""
@@ -267,17 +234,12 @@ msgstr "Documentatie"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -288,16 +250,11 @@ msgstr "Testen"
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -310,14 +267,10 @@ msgstr "Services"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -327,9 +280,9 @@ msgstr "Reseeden"
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -373,8 +326,7 @@ msgstr "Analyse"
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -382,7 +334,7 @@ msgstr ""
 msgid "Roadmap"
 msgstr "Stappenplan"
 
-#: i2p2www/pages/site/get-involved/roadmap.html:309
+#: i2p2www/pages/site/get-involved/roadmap.html:210
 #, python-format
 msgid ""
 "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info "
@@ -443,84 +395,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -529,17 +458,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -547,29 +471,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -577,42 +495,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -656,72 +565,52 @@ msgstr ""
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -731,8 +620,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -745,33 +634,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -792,76 +675,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -871,25 +735,18 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -900,29 +757,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -932,10 +781,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -943,13 +790,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -960,43 +804,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1011,28 +848,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1043,8 +872,7 @@ msgstr "Verwijderd"
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1058,8 +886,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1078,14 +905,10 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1094,17 +917,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1114,8 +934,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1137,32 +956,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1171,47 +983,39 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1223,12 +1027,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1253,8 +1054,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1273,8 +1074,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1303,20 +1103,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1388,8 +1184,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1402,24 +1197,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1429,22 +1215,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1480,21 +1258,16 @@ msgstr ""
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1518,10 +1291,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1532,8 +1303,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1546,10 +1316,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1559,7 +1327,8 @@ msgid "Release Signing Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1580,7 +1349,8 @@ msgid "Download PGP public key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1588,13 +1358,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1602,7 +1373,8 @@ msgid "Security GPG Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1611,8 +1383,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1644,35 +1415,28 @@ msgstr "Andere"
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1680,29 +1444,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1729,12 +1487,10 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1744,10 +1500,8 @@ msgstr "Gemeenschap"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1769,8 +1523,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1778,13 +1532,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1793,8 +1548,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1808,34 +1562,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1845,61 +1593,49 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1926,20 +1662,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1948,14 +1683,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1965,12 +1700,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1990,8 +1726,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2018,12 +1753,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2042,22 +1774,22 @@ msgstr "Een IDE met I2P gebruiken"
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2074,8 +1806,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2092,14 +1824,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2178,34 +1910,26 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2215,20 +1939,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2245,22 +1965,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2272,10 +1989,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2285,38 +2000,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2334,23 +2041,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2364,11 +2065,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2379,34 +2077,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2419,18 +2110,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2444,16 +2131,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2473,67 +2158,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2557,8 +2232,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2574,44 +2249,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2619,8 +2284,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2629,64 +2293,59 @@ msgid "New Developer's Guide"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:6
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:32
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:31
 msgid "Basic study"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:7
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:46
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:45
 msgid "Getting the I2P code"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:9
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:52
 msgid "The new way: Git"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:10
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:11
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81
-msgid "The old way: Monotone"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:145
 msgid "Building I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:166
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:102
 msgid "Development ideas"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:174
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:110
 msgid "Making the results available"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:196
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
 msgid "Get to know us!"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:202
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
 msgid "Translations"
 msgstr "Vertalingen"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:17
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:208
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
 msgid "Tools"
 msgstr "Gereedschappen"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:22
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:21
 msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:26
 #, python-format
 msgid ""
 "\n"
@@ -2694,42 +2353,34 @@ msgid ""
 "Try <a href=\"%(volunteer)s\">getting involved</a> first."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:34
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:38
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:37
 #, python-format
 msgid ""
 "Study the <a href=\"%(intro)s\">how intro</a>,\n"
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:47
 msgid ""
 "For development on the I2P router or the embedded applications,\n"
 "there are two ways to get the source code:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
-msgid "The easy way: Git"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:55
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"For the time being, issues are still being manged on <a "
-"href=\"%(trac)s\">trac</a>."
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
+"issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:58
@@ -2742,143 +2393,31 @@ msgstr ""
 msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:84
-msgid ""
-"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n"
-"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to "
-"the source code (and for a lot of complicated things, but 'keeping track "
-"of changes' is the basic idea)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:89
-msgid ""
-"Skim over the <a "
-"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>,"
-" to make sure you understand the concepts."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:93
-msgid ""
-"If you want to remain anonymous, you need to do an additional step, to "
-"set up a connection to a monotone server over I2P:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
-#, python-format
-msgid ""
-"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port "
-"8998 pointing to mtn.i2p-projekt.i2p."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
-msgid ""
-"Pick a directory where you want to put all your I2P files, and create a "
-"monotone database:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
-msgid ""
-"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or"
-" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the "
-"following contents:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> "
-"into a new file (e.g. <code>keys.txt</code>) in the same directory\n"
-"  that <code>i2p.mtn</code> is in. Import the keys into your database "
-"with <br><code><pre>      mtn -d i2p.mtn read < keys.txt</pre></code>"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
-msgid ""
-"Pull the I2P sources to your machine. This may take a long time, "
-"especially if you are doing this over I2P!"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
-msgid "Anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
-msgid "Non-anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
-msgid ""
-"All the sources are now present on your machine, in the database file. To"
-" make them available in a directory, you need to check them out:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:125
-msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the "
-"I2P sources."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
-msgid "Remarks"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
-msgid ""
-"\n"
-"To download the website files instead of the I2P source files, use "
-"'i2p.www' instead of 'i2p.i2p'."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:133
-msgid ""
-"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it"
-" left off.\n"
-"If you are in a hurry, use the non-anonymous access."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
-#, python-format
-msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on <a"
-" href=\"%(viewmtn)s\">viewmtn</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:141
-#, python-format
-msgid ""
-"A long explanation about using monotone is available on the <a "
-"href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:147
-#, python-format
-msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:155
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:91
 msgid ""
 "To build or work on console translations, you need\n"
 "the xgettext, msgfmt, and msgmerge tools from the\n"
 "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:161
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
 #, python-format
 msgid ""
 "For development on new applications,\n"
 "see the <a href=\"%(apps)s\">application development guide</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:167
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
 #, python-format
 msgid ""
 "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n"
@@ -2887,93 +2426,42 @@ msgid ""
 "for ideas."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:176
-#, python-format
-msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:181
-msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:184
-msgid "use an empty passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:185
-msgid "enter a passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:186
-#, python-format
-msgid ""
-"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get "
-"push privileges"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:187
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get "
-"commit privileges - not required for website"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:188
-msgid "check in with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:189
-msgid "push with this key"
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:191
-#, python-format
-msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:197
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:203
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:209
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:217
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -2993,11 +2481,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3012,10 +2498,8 @@ msgstr "Voorbereiding"
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3035,12 +2519,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3051,27 +2532,23 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
 msgstr ""
 
@@ -3087,10 +2564,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3108,8 +2583,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
 msgstr ""
 
@@ -3122,19 +2596,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3142,15 +2612,13 @@ msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3159,8 +2627,8 @@ msgstr "VGV"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3176,67 +2644,65 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3261,10 +2727,8 @@ msgstr "Overzicht"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3273,21 +2737,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3310,8 +2770,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3321,18 +2780,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3342,10 +2796,8 @@ msgstr "privacybeleid"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3354,17 +2806,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3373,10 +2823,8 @@ msgstr "Aan de slag"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3387,18 +2835,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr ""
-
diff --git a/i2p2www/translations/pl/LC_MESSAGES/about.po b/i2p2www/translations/pl/LC_MESSAGES/about.po
index 35d4d2cb37675874a7e5d305599c40895d6c7adf..5dba0a41ec53389a18c6f2bcd4ac100d8328ab2f 100644
--- a/i2p2www/translations/pl/LC_MESSAGES/about.po
+++ b/i2p2www/translations/pl/LC_MESSAGES/about.po
@@ -1,27 +1,27 @@
-# Polish translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Karol Kosek, 2020
+# Karol Kosek, 2020
 # Karol Kosek, 2018
 # sebx, 2014
 # ☆Verdulo, 2017
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-05-02 19:58+0000\n"
-"Last-Translator: ☆Verdulo\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Karol Kosek, 2020\n"
 "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n"
-"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && "
-"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && "
-"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: pl\n"
+"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -31,8 +31,7 @@ msgstr "Alternatywne klienty I2P"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
 msgstr ""
 
@@ -55,8 +54,7 @@ msgstr ""
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
 msgstr ""
 
 #: i2p2www/pages/site/about/browser-config.html:2
@@ -69,24 +67,158 @@ msgstr "Słowniczek pojęć"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
 
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
+
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -96,15 +228,14 @@ msgstr ""
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -118,12 +249,8 @@ msgstr "Projekt Niewidzialny Internet"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -133,22 +260,14 @@ msgstr "I2P troszczy się o prywatność"
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
-msgstr ""
-"Sieć I2P ukrywa serwer przed użytkownikiem i użytkownika przed serwerem. "
-"Cały ruch w sieci I2P to ruch wewnętrzny, niemający bezpośredniego "
-"kontaktu ze zwykłym internetem. Jest to warstwa sieci nad internetem. "
-"Sieć I2P wykorzystuje szyfrowane tunele jednokierunkowe pomiędzy Tobą i "
-"innymi użytkownikami. Nikt nie może zobaczyć skąd, dokąd i co jest "
-"przesyłane. Dodatkowo sieć oferuje ochronę przed rozpoznawaniem wzorców i"
-" przed blokadą cenzorów. Ponieważ sieć I2P wykorzystuje użytkowników do "
-"przesyłania ruchu, blokowanie lokalizacji jest również ograniczone."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
+msgstr "Sieć I2P ukrywa serwer przed użytkownikiem i użytkownika przed serwerem. Cały ruch w sieci I2P to ruch wewnętrzny, niemający bezpośredniego kontaktu ze zwykłym internetem. Jest to warstwa sieci nad internetem. Sieć I2P wykorzystuje szyfrowane tunele jednokierunkowe pomiędzy Tobą i innymi użytkownikami. Nikt nie może zobaczyć skąd, dokąd i co jest przesyłane. Dodatkowo sieć oferuje ochronę przed rozpoznawaniem wzorców i przed blokadą cenzorów. Ponieważ sieć I2P wykorzystuje użytkowników do przesyłania ruchu, blokowanie lokalizacji jest również ograniczone."
 
 #: i2p2www/pages/site/about/intro.html:14
 msgid "How to Connect to the I2P Network"
@@ -156,15 +275,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -173,28 +292,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -203,38 +321,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
-msgstr ""
-"Widzę adresy IP innych użytkowników sieci I2P w konsoli węzła. Czy to "
-"oznacza, że mój adres IP jest widoczny dla innych?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
+msgstr "Widzę adresy IP innych użytkowników sieci I2P w konsoli węzła. Czy to oznacza, że mój adres IP jest widoczny dla innych?"
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -243,13 +358,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -258,15 +373,11 @@ msgstr "Porównania"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -285,9 +396,8 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -344,8 +454,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -364,8 +473,7 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
 msgstr ""
 
@@ -374,8 +482,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:76
@@ -388,8 +495,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
@@ -398,8 +504,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:95
@@ -407,8 +513,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:101
@@ -423,15 +528,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
@@ -443,8 +546,7 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:129
@@ -499,16 +601,14 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
@@ -517,11 +617,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:189
@@ -574,16 +672,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
 msgstr ""
@@ -599,12 +695,9 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:252
@@ -618,35 +711,29 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -655,16 +742,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -681,11 +766,57 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
+msgstr ""
+
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
 msgstr ""
@@ -694,18 +825,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -716,84 +844,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -804,8 +909,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -813,27 +917,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -841,26 +941,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -871,10 +962,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -882,18 +971,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -904,16 +990,11 @@ msgstr "Członkowie projektu I2P"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
-msgstr ""
-"Jesteśmy małą grupą ludzi rozsianych po kilku kontynentach, którzy "
-"pracują nad różnymi aspektami projektu i dyskutują nad projektem sieci. "
-"<a href=\"%(volunteer)s\">Przyłącz się!</a>"
+msgstr "Jesteśmy małą grupą ludzi rozsianych po kilku kontynentach, którzy pracują nad różnymi aspektami projektu i dyskutują nad projektem sieci. <a href=\"%(volunteer)s\">Przyłącz się!</a>"
 
 #: i2p2www/pages/site/about/team.html:14
 msgid "Admin"
@@ -1082,7 +1163,8 @@ msgid "Product Development"
 msgstr "Menadżer rozwoju"
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr "nadzorowanie projektów od etapu wczesnego planu aż do ukończenia"
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1164,9 +1246,7 @@ msgstr "wtyczka I2P-Bote"
 #: i2p2www/pages/site/about/team.html:182
 #, python-format
 msgid "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a> lead"
-msgstr ""
-"Główny programista <a "
-"href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>"
+msgstr "Główny programista <a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>"
 
 #: i2p2www/pages/site/about/team.html:184
 msgid "Maintains the integrated Bittorrent client"
@@ -1175,9 +1255,7 @@ msgstr "zarzÄ…dza rozwojem zintegrowanego klienta BitTorrent"
 #: i2p2www/pages/site/about/team.html:187
 #, python-format
 msgid "<a href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a> lead"
-msgstr ""
-"Główny programista <a "
-"href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a>"
+msgstr "Główny programista <a href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a>"
 
 #: i2p2www/pages/site/about/team.html:189
 msgid "Syndie development"
@@ -1245,9 +1323,7 @@ msgstr "tworzenie paczek Debiana/Ubuntu i zarzÄ…dzanie PPA"
 
 #: i2p2www/pages/site/about/team.html:232
 msgid "Routerconsole backend and UI work, website revamp, unit tests work"
-msgstr ""
-"back-end i interfejs konsoli węzła, reorganizacja strony, testy "
-"jednostkowe"
+msgstr "back-end i interfejs konsoli węzła, reorganizacja strony, testy jednostkowe"
 
 #: i2p2www/pages/site/about/team.html:237
 msgid "Help needed on many fronts!"
@@ -1328,7 +1404,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "rozwój jbigi, migracja wiki, uporządkowanie dokumentacji"
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr "odpluskwianie Java i rozwój klienta I2PTunnel i konsoli węzła"
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1378,32 +1455,25 @@ msgstr "…i wielu innych"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1421,8 +1491,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1461,10 +1531,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1478,15 +1546,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1495,11 +1559,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1554,8 +1615,7 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1573,15 +1633,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1600,14 +1656,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1618,20 +1670,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1642,24 +1687,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1679,33 +1715,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -1718,32 +1745,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -1753,27 +1772,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -1790,17 +1801,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -1813,8 +1821,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -1825,10 +1832,8 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -1847,30 +1852,23 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -1884,55 +1882,40 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -1943,20 +1926,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -1967,16 +1943,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -1986,17 +1957,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -2007,20 +1975,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2034,26 +1995,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2062,18 +2013,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2081,16 +2026,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2106,52 +2046,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2166,102 +2087,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2274,4 +2154,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/pl/LC_MESSAGES/blog.po b/i2p2www/translations/pl/LC_MESSAGES/blog.po
index 6151e23f7e04611dc6628b9409e8e5de5c810439..ff39cf22b2802dd613f9960f79ba48da2548ab10 100644
--- a/i2p2www/translations/pl/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/pl/LC_MESSAGES/blog.po
@@ -1,7 +1,7 @@
-# Polish translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Karolina <karolina@bitwylesne.pl>, 2014
 # Karol Kosek, 2018
@@ -9,19 +9,18 @@
 # desik <vardesik@gmail.com>, 2015
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-10-11 16:26+0000\n"
-"PO-Revision-Date: 2021-10-11 16:29+0000\n"
-"Last-Translator: ☆Verdulo\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Karol Kosek, 2018\n"
 "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n"
-"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && "
-"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && "
-"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: pl\n"
+"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n"
 
 #: i2p2www/blog/2011/10/11/0.8.9-Release.rst:24
 #: i2p2www/blog/2011/10/20/0.8.10-Release.rst:11
@@ -326,11 +325,11 @@ msgstr "Wersja 0.9.2 wydana"
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:8
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:10
 msgid ""
-"0.9.2 includes extensive low-level changes to improve the performance and"
-" efficiency of the router. We have updated our UPnP library, to hopefully"
-" make UPnP work for more people. I2PSnark now has DHT support, but it is "
-"not yet enabled by default, as we plan to do more testing during the "
-"upcoming 0.9.3 development cycle."
+"0.9.2 includes extensive low-level changes to improve the performance and "
+"efficiency of the router. We have updated our UPnP library, to hopefully "
+"make UPnP work for more people. I2PSnark now has DHT support, but it is not "
+"yet enabled by default, as we plan to do more testing during the upcoming "
+"0.9.3 development cycle."
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:13
@@ -338,14 +337,12 @@ msgstr ""
 msgid ""
 "As usual, there's also lots of bug fixes in this release, so updating is "
 "recommended."
-msgstr ""
-"Jak zwykle, w tym wydaniu mnóstwo błędow zostało naprawionych, więc "
-"aktualizacja jest zalecana."
+msgstr "Jak zwykle, w tym wydaniu mnóstwo błędow zostało naprawionych, więc aktualizacja jest zalecana."
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:27
 msgid ""
-"SSU: Fix several problems in our UDP transport, to improve efficiency and"
-" reliability for connection setup. Also improve defenses against various "
+"SSU: Fix several problems in our UDP transport, to improve efficiency and "
+"reliability for connection setup. Also improve defenses against various "
 "types of bad input."
 msgstr ""
 
@@ -363,9 +360,9 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:30
 msgid ""
-"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered "
-"are now much more flexible, which should lessen protocol overhead and "
-"reduce stalls caused by dropped tags."
+"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered are "
+"now much more flexible, which should lessen protocol overhead and reduce "
+"stalls caused by dropped tags."
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:31
@@ -376,16 +373,18 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:35
 msgid ""
-"Fix various issues affecting memory usage and performance on high-"
-"bandwidth routers"
+"Fix various issues affecting memory usage and performance on high-bandwidth "
+"routers"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:36
-msgid "Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
+msgid ""
+"Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:37
-msgid "Fix i2psnark bug that prevented a completion announcement to the tracker"
+msgid ""
+"Fix i2psnark bug that prevented a completion announcement to the tracker"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:38
@@ -472,14 +471,14 @@ msgstr ""
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:8
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:10
 msgid ""
-"0.9.3 includes extensive low-level changes to the queueing of messages in"
-" the router.  We implement the CoDel Active Queue Management (AQM) "
-"algorithm.  We also unify the queueing and priority mechanisms in the "
-"transports to aid diagnosis and reduce network latency.  Work continues "
-"on fixing UDP transport bugs and making UDP more resistant to attacks.  "
-"There are more changes to improve the performance of the router and "
-"reduce its memory usage.  Also, we enable i2psnark's DHT support, "
-"introduced last release, by default."
+"0.9.3 includes extensive low-level changes to the queueing of messages in "
+"the router.  We implement the CoDel Active Queue Management (AQM) algorithm."
+"  We also unify the queueing and priority mechanisms in the transports to "
+"aid diagnosis and reduce network latency.  Work continues on fixing UDP "
+"transport bugs and making UDP more resistant to attacks.  There are more "
+"changes to improve the performance of the router and reduce its memory "
+"usage.  Also, we enable i2psnark's DHT support, introduced last release, by "
+"default."
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:27
@@ -497,8 +496,8 @@ msgstr ""
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:33
 msgid ""
 "Several SSU fixes including memory leak, and better handling of routers "
-"behind firewalls that change UDP ports; additional defenses for malicious"
-" packets."
+"behind firewalls that change UDP ports; additional defenses for malicious "
+"packets."
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:34
@@ -523,9 +522,8 @@ msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:42
 msgid ""
-"Fix streaming connection timeout back to 1 minute, was inadvertently "
-"changed to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was"
-" unlimited"
+"Fix streaming connection timeout back to 1 minute, was inadvertently changed"
+" to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was unlimited"
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:43
@@ -581,28 +579,24 @@ msgstr ""
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:8
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:10
 msgid ""
-"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, "
-"that was reducing network performance and reliability. It also includes "
-"major changes in the in-network update system, and adds the capability to"
-" update via in-network torrents."
+"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, that "
+"was reducing network performance and reliability. It also includes major "
+"changes in the in-network update system, and adds the capability to update "
+"via in-network torrents."
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:14
 msgid ""
-"We fixed several bugs in the i2psnark DHT implementation that was "
-"introduced\n"
+"We fixed several bugs in the i2psnark DHT implementation that was introduced\n"
 "last release. For those of you using console or http proxy passwords,\n"
-"we converted to the more-secure digest method and improved the security "
-"for console forms."
+"we converted to the more-secure digest method and improved the security for console forms."
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:20
 msgid ""
-"For those of you already running development builds, your router should "
-"automatically\n"
+"For those of you already running development builds, your router should automatically\n"
 "update to 0.9.4-0 using the new in-network torrent facility.\n"
-"For those running 0.9.3-0, you will update normally using in-network "
-"HTTP, and\n"
+"For those running 0.9.3-0, you will update normally using in-network HTTP, and\n"
 "we will have more information for you when we release 0.9.5."
 msgstr ""
 
@@ -618,12 +612,13 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:42
 msgid ""
-"Fix major bug that reduced SSU connection limits which reduced tunnel "
-"build success rates"
+"Fix major bug that reduced SSU connection limits which reduced tunnel build "
+"success rates"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:43
-msgid "Fix bug with external I2CP that prevented some external apps from working"
+msgid ""
+"Fix bug with external I2CP that prevented some external apps from working"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:44
@@ -656,8 +651,7 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:54
 msgid ""
-"More performance improvements, memory reduction, and object churn "
-"reduction"
+"More performance improvements, memory reduction, and object churn reduction"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:55
@@ -674,15 +668,15 @@ msgstr "Dodaj formę hasła konsoli"
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:58
 msgid ""
-"Convert http proxy and console from basic to digest authentication for "
-"added security"
+"Convert http proxy and console from basic to digest authentication for added"
+" security"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:59
 msgid ""
 "Improved verification of console form submissions, using jsp sessions. "
-"Cookies may now be required on forms, except when the console password is"
-" enabled"
+"Cookies may now be required on forms, except when the console password is "
+"enabled"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:60
@@ -701,8 +695,8 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:63
 msgid ""
-"Translation updates: Chinese, French, German, Italian, Polish, "
-"Portuguese, Swedish, and Ukrainian"
+"Translation updates: Chinese, French, German, Italian, Polish, Portuguese, "
+"Swedish, and Ukrainian"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:65
@@ -720,24 +714,21 @@ msgstr ""
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:8
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:10
 msgid ""
-"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities"
-" that are being investigated by researchers at UCSB. We continue to work "
-"with them on additional improvements. This is a good opportunity to "
-"remind the community that while our network continues to grow rapidly, it"
-" is still relatively small. There may be multiple weaknesses or bugs that"
-" could compromise your anonymity. Help us grow the network by spreading "
-"the word and contributing where you can."
+"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities "
+"that are being investigated by researchers at UCSB. We continue to work with"
+" them on additional improvements. This is a good opportunity to remind the "
+"community that while our network continues to grow rapidly, it is still "
+"relatively small. There may be multiple weaknesses or bugs that could "
+"compromise your anonymity. Help us grow the network by spreading the word "
+"and contributing where you can."
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:14
 #, python-format
 msgid ""
-"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers "
-"running a\n"
-"development build) will attempt to update via the experimental in-network"
-" bittorrent\n"
-"with i2psnark. If this doesn't work, it should fall back to standard in-"
-"network HTTP update."
+"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers running a\n"
+"development build) will attempt to update via the experimental in-network bittorrent\n"
+"with i2psnark. If this doesn't work, it should fall back to standard in-network HTTP update."
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:28
@@ -782,8 +773,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:39
 msgid ""
-"Encrypt database lookup messages end-to-end when sent through exploratory"
-" tunnels"
+"Encrypt database lookup messages end-to-end when sent through exploratory "
+"tunnels"
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:40
@@ -828,8 +819,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53
 msgid ""
-"Translation updates: French, German, Hungarian, Italian, Norwegian, "
-"Polish, Portuguese, Russian, Swedish"
+"Translation updates: French, German, Hungarian, Italian, Norwegian, Polish, "
+"Portuguese, Russian, Swedish"
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:55
@@ -844,17 +835,15 @@ msgstr ""
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:10
 msgid ""
 "0.9.6 includes bug fixes and an update from Jetty 6.1.26 (2010-11-10) to "
-"Jetty 7.6.10 (2013-03-12). See below for important information on the "
-"Jetty update. The Jetty 7 series is actively maintained and we plan to "
-"stay current with it in future I2P releases."
+"Jetty 7.6.10 (2013-03-12). See below for important information on the Jetty "
+"update. The Jetty 7 series is actively maintained and we plan to stay "
+"current with it in future I2P releases."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:14
 msgid ""
-"Most users will update via HTTP. Those running development builds will "
-"attempt to update via the\n"
-"experimental in-network bittorrent with i2psnark. We've fixed some bugs "
-"that will enable more users\n"
+"Most users will update via HTTP. Those running development builds will attempt to update via the\n"
+"experimental in-network bittorrent with i2psnark. We've fixed some bugs that will enable more users\n"
 "to update via torrent in the 0.9.7 update cycle."
 msgstr ""
 
@@ -864,12 +853,9 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:28
 msgid ""
-"If you first installed I2P with version 0.9.5, on Windows only, we "
-"recommend that you follow the\n"
-"following instructions to fix your eepsite location **before** you update"
-" to 0.9.6.\n"
-"Only original installations of 0.9.5-0 on Windows are affected by this "
-"issue. If your router version\n"
+"If you first installed I2P with version 0.9.5, on Windows only, we recommend that you follow the\n"
+"following instructions to fix your eepsite location **before** you update to 0.9.6.\n"
+"Only original installations of 0.9.5-0 on Windows are affected by this issue. If your router version\n"
 "is 0.9.5-0-win1, you already have the fix and need not take any action."
 msgstr ""
 
@@ -883,36 +869,29 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:43
 msgid ""
-"For most people, the update should just work. If you have multiple Jetty "
-"eepsites,\n"
-"OR have made changes to jetty.xml or other Jetty configuration files, "
-"including changing the port\n"
+"For most people, the update should just work. If you have multiple Jetty eepsites,\n"
+"OR have made changes to jetty.xml or other Jetty configuration files, including changing the port\n"
 "from 7658, you MUST take manual action AFTER updating."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:49
 msgid ""
-"After update, the router will migrate your jetty.xml files to the new "
-"Jetty 7 format."
+"After update, the router will migrate your jetty.xml files to the new Jetty "
+"7 format."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:51
 msgid ""
-"The migration resets the port to 7658. If you have more than one Jetty "
-"eepsite, OR your eepsite\n"
-"  is NOT on port 7658, OR you have made other modifications to jetty.xml "
-"(for example changing the\n"
-"  listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml "
-"file for each eepsite to fix them up\n"
+"The migration resets the port to 7658. If you have more than one Jetty eepsite, OR your eepsite\n"
+"  is NOT on port 7658, OR you have made other modifications to jetty.xml (for example changing the\n"
+"  listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml file for each eepsite to fix them up\n"
 "  after updating, and restart again."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:56
 msgid ""
-"**The following files will be backed up with a &quot;.jetty6&quot; suffix"
-" and then migrated.**\n"
-"If you have made local changes, you may have to edit them manually and "
-"restart.\n"
+"**The following files will be backed up with a &quot;.jetty6&quot; suffix and then migrated.**\n"
+"If you have made local changes, you may have to edit them manually and restart.\n"
 "See http://wiki.eclipse.org/Jetty for assistance in configuring Jetty 7."
 msgstr ""
 
@@ -931,7 +910,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:78
-msgid "If a plugin does not work, please contact the maintainer for that plugin."
+msgid ""
+"If a plugin does not work, please contact the maintainer for that plugin."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:84
@@ -960,14 +940,14 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:90
 msgid ""
-"Ignore unsupported IPs in RouterInfos when selecting an address (prep for"
-" IPv6)"
+"Ignore unsupported IPs in RouterInfos when selecting an address (prep for "
+"IPv6)"
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:91
 msgid ""
-"Ignore unused option bits in Database Lookup Message (prep for requesting"
-" encrypted response)"
+"Ignore unused option bits in Database Lookup Message (prep for requesting "
+"encrypted response)"
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:92
@@ -1037,31 +1017,24 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:12
 msgid ""
-"For the first time, class 'N' routers (those with a minimumum of 128 "
-"KBytes/sec of shared bandwidth)\n"
-"will automatically become floodfill (previously it was only 'O' routers "
-"with 256 KBps). This will\n"
-"increase the floodfill population for additional resistance to certain "
-"attacks (see below). Floodfill routers\n"
-"don't consume much additional bandwidth, but they do tend to use "
-"additional memory and concurrent\n"
-"connections. If you do not wish your router to become floodfill, set the "
-"advanced configuration\n"
+"For the first time, class 'N' routers (those with a minimumum of 128 KBytes/sec of shared bandwidth)\n"
+"will automatically become floodfill (previously it was only 'O' routers with 256 KBps). This will\n"
+"increase the floodfill population for additional resistance to certain attacks (see below). Floodfill routers\n"
+"don't consume much additional bandwidth, but they do tend to use additional memory and concurrent\n"
+"connections. If you do not wish your router to become floodfill, set the advanced configuration\n"
 "router.floodfillParticipant=false ."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:21
 #, python-format
 msgid ""
-"As we think the last release fixed the experimental update-via-torrent "
-"bugs, 3%(pc)s of routers should\n"
+"As we think the last release fixed the experimental update-via-torrent bugs, 3%(pc)s of routers should\n"
 "update over in-network bittorrent this cycle."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:26
 msgid ""
-"Plugin update checks, possibly broken for several releases, are fixed. "
-"Your plugins should once again\n"
+"Plugin update checks, possibly broken for several releases, are fixed. Your plugins should once again\n"
 "auto-update after updating the router."
 msgstr ""
 
@@ -1073,17 +1046,12 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:35
 msgid ""
-"This release contains additional mitigations for the `\"practical "
-"attacks\" paper`__.\n"
-"However, we have a lot more work to do to resist Sybil attacks on the "
-"floodfills, and resist\n"
+"This release contains additional mitigations for the `\"practical attacks\" paper`__.\n"
+"However, we have a lot more work to do to resist Sybil attacks on the floodfills, and resist\n"
 "traffic analysis at the gateways and endpoints of exploratory tunnels.\n"
-"It's a good reminder for everybody that our network is still relatively "
-"small and vulnerable.\n"
-"We don't currently recommend any uses that would put anybody in serious "
-"jeopardy.\n"
-"We'll keep working to improve it... please keep working to spread the "
-"word. A bigger network is a better network."
+"It's a good reminder for everybody that our network is still relatively small and vulnerable.\n"
+"We don't currently recommend any uses that would put anybody in serious jeopardy.\n"
+"We'll keep working to improve it... please keep working to spread the word. A bigger network is a better network."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:48
@@ -1128,8 +1096,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:60
 msgid ""
-"Fix i2psnark bug that changed the infohash of torrents created by Robert "
-"and fetched via magnet link"
+"Fix i2psnark bug that changed the infohash of torrents created by Robert and"
+" fetched via magnet link"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:61
@@ -1164,8 +1132,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:71
 msgid ""
-"Individual expiration times in leases, for efficiency on destinations "
-"with a high number of tunnels"
+"Individual expiration times in leases, for efficiency on destinations with a"
+" high number of tunnels"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:72
@@ -1181,7 +1149,8 @@ msgid "Tomcat 6.0.37"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:75
-msgid "Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
+msgid ""
+"Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:76
@@ -1199,12 +1168,11 @@ msgstr ""
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:8
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:10
 msgid ""
-"This unscheduled release disables the RouterInfo verification messages "
-"that were used in the attack published in the UCSB paper, which should "
-"make correlating a LeaseSet and a Router much more difficult. We have "
-"also included a limited number of other fixes listed below. Our 0.9.8 "
-"release, which will include IPv6 support, is still on-schedule for late "
-"September."
+"This unscheduled release disables the RouterInfo verification messages that "
+"were used in the attack published in the UCSB paper, which should make "
+"correlating a LeaseSet and a Router much more difficult. We have also "
+"included a limited number of other fixes listed below. Our 0.9.8 release, "
+"which will include IPv6 support, is still on-schedule for late September."
 msgstr ""
 
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:12
@@ -1254,16 +1222,17 @@ msgstr ""
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:8
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:10
 msgid ""
-"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
-"default, but of course you need a public IPv6 address to use it. "
-"Configuration is on the 'network' configuration tab in your console. We "
-"also have anonymity improvements including padding of SSU packets and "
-"longer router private keys."
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by default, "
+"but of course you need a public IPv6 address to use it. Configuration is on "
+"the 'network' configuration tab in your console. We also have anonymity "
+"improvements including padding of SSU packets and longer router private "
+"keys."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:12
 #, python-format
-msgid "30%(pc)s of you will update via in-network torrent in this update cycle."
+msgid ""
+"30%(pc)s of you will update via in-network torrent in this update cycle."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:14
@@ -1272,41 +1241,30 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:16
 msgid ""
-"IPv6 is enabled and preferred by default. If you have a public IPv6 "
-"address \n"
-"and you are connecting to another router with a published IPv6 address, "
-"it will \n"
-"connect via IPv6. There is a new IPv6 configuration section on /confignet"
-" in \n"
+"IPv6 is enabled and preferred by default. If you have a public IPv6 address \n"
+"and you are connecting to another router with a published IPv6 address, it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet in \n"
 "the router console. If IPv6 is causing problems you may disable it there."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:23
 msgid ""
 "As a part of the IPv6 development effort, I2P now supports multiple \n"
-"published IP addresses. If you have multiple public IP addresses (IPv4, "
-"IPv6, \n"
-"or both), you may enable or disable them individually on /confignet. The"
-" \n"
-"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
-"have \n"
-"multiple addresses you should review the configuration on /confignet and "
-"adjust \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you have \n"
+"multiple addresses you should review the configuration on /confignet and adjust \n"
 "it if necessary.\n"
-"Note that while you may enable multiple IPv4 and IPv6 addresses on "
-"/confignet,\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on /confignet,\n"
 "we recommend that you use only one IPv4 and one IPv6 address. There are\n"
 "bugs still to be fixed with multiple addresses of each type."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:35
 msgid ""
-"While IPv6 support was designed and developed over several years, it has"
-" \n"
-"only been tested by a limited number of users and is still beta. If you "
-"do have \n"
-"a public IPv6 address, please monitor your router and the logs for "
-"problems, \n"
+"While IPv6 support was designed and developed over several years, it has \n"
+"only been tested by a limited number of users and is still beta. If you do have \n"
+"a public IPv6 address, please monitor your router and the logs for problems, \n"
 "and disable it necessary. Please report any bugs on \n"
 "http://trac.i2p2.i2p."
 msgstr ""
@@ -1317,26 +1275,19 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:45
 msgid ""
-"For those of you running I2P on faster hardware (generally, 64-bit x86) "
-"the \n"
-"router will generate a new identity using longer keys. This will "
-"substantially \n"
-"reduce your participating traffic for 48 hours or more, while your router"
-" \n"
-"re-integrates into the network. Due to the new keys, the large number of"
-" \n"
+"For those of you running I2P on faster hardware (generally, 64-bit x86) the \n"
+"router will generate a new identity using longer keys. This will substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router \n"
+"re-integrates into the network. Due to the new keys, the large number of \n"
 "torrent updates, and the recent network growth, we expect substantial \n"
-"disruption to the network for a week or more after the update is "
-"released. \n"
+"disruption to the network for a week or more after the update is released. \n"
 "Please be patient and things should start to improve after a few days."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:55
 msgid ""
-"These changes may result in higher CPU usage for some of you. We're doing"
-" \n"
-"our best to increase efficiency, but stronger security generally requires"
-" more \n"
+"These changes may result in higher CPU usage for some of you. We're doing \n"
+"our best to increase efficiency, but stronger security generally requires more \n"
 "computation. Performance may also be poor during the first week\n"
 "due to the network churn.\n"
 "We will evaluate the network performace before deciding whether to\n"
@@ -1345,10 +1296,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:64
 msgid ""
-"We are experiencing rapid network growth in the last few weeks, which is"
-" \n"
-"causing a bit of a bumpy ride for some, especially on weekends. However, "
-"the \n"
+"We are experiencing rapid network growth in the last few weeks, which is \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, the \n"
 "network is still performing fairly well, so keep spreading the word."
 msgstr ""
 
@@ -1360,14 +1309,10 @@ msgstr ""
 msgid ""
 "We're in the initial stages of desiging major changes to strengthen our \n"
 "crypto. Stronger crypto will use more CPU and it may possibly \n"
-"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
-"on low-power \n"
-"and/or older hardware. We're working hard to minimize the impacts, but "
-"some \n"
-"loss of performance is inevitable. In addition, Java 5 and 6 are no "
-"longer \n"
-"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
-"in \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change in \n"
 "minimum requirements will be announced well in advance."
 msgstr ""
 
@@ -1394,8 +1339,7 @@ msgid ""
 "Last weekend, echelon attended the CTS IV conference in Berlin and\n"
 "psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
 "Several of us will be at 30C3 in Hamburg late this year.\n"
-"It's great to see people participating at these events and representing "
-"I2P."
+"It's great to see people participating at these events and representing I2P."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:106
@@ -1423,7 +1367,8 @@ msgid "Fix occasional runtime exception in NTCP"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
-msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
+msgid ""
+"Big rework of transport code to accommodate multiple addresses and IPv6"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
@@ -1431,13 +1376,14 @@ msgid "Streaming: Improved recovery from lost acks, other fixes"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
-msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgid ""
+"Use Transifex for translation of initial news and HTTP proxy error pages"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
 msgid ""
-"Translation updates: Chinese, French, German, Portuguese, Russian, "
-"Swedish, Turkish"
+"Translation updates: Chinese, French, German, Portuguese, Russian, Swedish, "
+"Turkish"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:125
@@ -1455,9 +1401,9 @@ msgstr ""
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:7
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:9
 msgid ""
-"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some "
-"people. New installs and non-Windows platforms are not affected, however "
-"all platforms will automatically update even if running 0.9.8."
+"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some people. "
+"New installs and non-Windows platforms are not affected, however all "
+"platforms will automatically update even if running 0.9.8."
 msgstr ""
 
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:11
@@ -1468,10 +1414,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:20
 msgid ""
-"Due to recent attacks, logins are disabled on `Trac`_ and new "
-"registrations are\n"
-"disabled on `zzz.i2p`_. Until those services are restored, please report "
-"all\n"
+"Due to recent attacks, logins are disabled on `Trac`_ and new registrations are\n"
+"disabled on `zzz.i2p`_. Until those services are restored, please report all\n"
 "bugs on IRC freenode or IRC2P #i2p-dev."
 msgstr ""
 
@@ -1484,9 +1428,9 @@ msgstr ""
 msgid ""
 "0.9.9 fixes a number of bugs in the netdb, streaming, and i2ptunnel, and "
 "starts work on a year-long plan to increase the strength of the "
-"cryptographic signing algorithms used in the router, and support multiple"
-" algorithms and key lengths simultaneously. Automatic update files will "
-"now be signed with 4096-bit RSA keys."
+"cryptographic signing algorithms used in the router, and support multiple "
+"algorithms and key lengths simultaneously. Automatic update files will now "
+"be signed with 4096-bit RSA keys."
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:11
@@ -1498,8 +1442,7 @@ msgstr ""
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:18
 msgid ""
 "As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the "
-"latest release.\n"
+"The best way to maintain security and help the network is to run the latest release.\n"
 "Several members of the I2P team will be at 30C3 in Hamburg this year.\n"
 "Come say hello and ask for an I2P sticker.\n"
 "Thanks to everyone for their support this year."
@@ -1615,8 +1558,7 @@ msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:62
 msgid ""
-"Extend router info expiration and other changes to reduce load on "
-"floodfills"
+"Extend router info expiration and other changes to reduce load on floodfills"
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:63
@@ -1653,8 +1595,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:71
 msgid ""
-"Translation updates: French, German, Italian, Romanian, Russian, Spanish,"
-" Swedish, and others"
+"Translation updates: French, German, Italian, Romanian, Russian, Spanish, "
+"Swedish, and others"
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:73
@@ -1693,19 +1635,15 @@ msgstr ""
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:26
 msgid ""
 "If you have a large database or an identity you wish to preserve,\n"
-"you may wish to back up your entire ~/.syndie directory before you start."
-"\n"
-"The upgrade process does make its own backup, however you may find it "
-"easier to use your own backup if the upgrade fails."
+"you may wish to back up your entire ~/.syndie directory before you start.\n"
+"The upgrade process does make its own backup, however you may find it easier to use your own backup if the upgrade fails."
 msgstr ""
 
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:32
 msgid ""
-"Upgrades from 1.103b may fail for some people due to database corruption "
-"due to bugs in the old HSQLDB.\n"
+"Upgrades from 1.103b may fail for some people due to database corruption due to bugs in the old HSQLDB.\n"
 "Unfortunately, we don't know how to fix it.\n"
-"Your alternatives are to start over with a clean database, or stay with "
-"1.103b forever.\n"
+"Your alternatives are to start over with a clean database, or stay with 1.103b forever.\n"
 "Sorry about that."
 msgstr ""
 
@@ -1713,8 +1651,7 @@ msgstr ""
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:30
 msgid ""
 "As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the "
-"latest release."
+"The best way to maintain security and help the network is to run the latest release."
 msgstr ""
 
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:57
@@ -1794,19 +1731,15 @@ msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:12
 msgid ""
-"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more "
-"difficult for an attacker\n"
-"to correlate a Destination with a Router. It also fixes character "
-"encoding bugs in susimail,\n"
+"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more difficult for an attacker\n"
+"to correlate a Destination with a Router. It also fixes character encoding bugs in susimail,\n"
 "and includes lots of other bug fixes and translation updates.\n"
-"Most of you will update via torrent, using the new \"su3\" update format "
-"with stronger keys."
+"Most of you will update via torrent, using the new \"su3\" update format with stronger keys."
 msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:19
 msgid ""
-"We recently attended `30C3`__ and `Real World Crypto`__, making several "
-"new\n"
+"We recently attended `30C3`__ and `Real World Crypto`__, making several new\n"
 "connections and formulating `big plans`__ for 2014. Thanks to those who\n"
 "supported our attendance with their `donations`__!"
 msgstr ""
@@ -1817,8 +1750,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:43
 msgid ""
-"Flood netdb stores to new location before midnight to prevent lookup "
-"fails after midnight"
+"Flood netdb stores to new location before midnight to prevent lookup fails "
+"after midnight"
 msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:44
@@ -1895,24 +1828,19 @@ msgstr ""
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:12
 #, python-format
 msgid ""
-"0.9.11 continues improving LeaseSet lookup and storage to prevent an "
-"attacker\n"
+"0.9.11 continues improving LeaseSet lookup and storage to prevent an attacker\n"
 "from correlating a Destination with a Router. It adds support for the\n"
 "%(orchid)s outproxy plugin which is available at %(url)s. There is a\n"
-"reduction in memory usage due to fixes in the transports. We have some "
-"I2CP\n"
+"reduction in memory usage due to fixes in the transports. We have some I2CP\n"
 "protocol improvements that will provide better lookup facilities and\n"
-"authorization protection for external clients. Of course, there's also "
-"the\n"
+"authorization protection for external clients. Of course, there's also the\n"
 "usual collection of bug fixes. All users should update."
 msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:22
 msgid ""
-"This may be the last release that works with Java 5, which is very old "
-"and\n"
-"unsupported. If you are using a Java 5 or 6 runtime, we strongly "
-"recommend that\n"
+"This may be the last release that works with Java 5, which is very old and\n"
+"unsupported. If you are using a Java 5 or 6 runtime, we strongly recommend that\n"
 "you upgrade to Java 7."
 msgstr ""
 
@@ -1959,10 +1887,7 @@ msgstr ""
 msgid ""
 "As usual, we recommend that you update to this release. The best way to\n"
 "maintain security and help the network is to run the latest release."
-msgstr ""
-"Jak zwykle, zalecamy aktualizacjÄ™ programu do niniejszej wersji. Nie "
-"musimy dodawać, że służy to zachowaniu bezpieczeństwa sieci oraz jej "
-"uczestników."
+msgstr "Jak zwykle, zalecamy aktualizację programu do niniejszej wersji. Nie musimy dodawać, że służy to zachowaniu bezpieczeństwa sieci oraz jej uczestników."
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:40
 msgid "More leaseset handling improvements"
@@ -1994,8 +1919,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:53
 msgid ""
-"Stricter I2CP authorization enforcement of external clients (incompatible"
-" change)"
+"Stricter I2CP authorization enforcement of external clients (incompatible "
+"change)"
 msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:54
@@ -2019,23 +1944,21 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:9
 msgid ""
-"The site i2pbrowser.net is a fake I2P website mirror serving up malware "
-"for Windows."
+"The site i2pbrowser.net is a fake I2P website mirror serving up malware for "
+"Windows."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:11
 msgid ""
-"We have recently been made aware of the existence of i2pbrowser.net. This"
-"\n"
-"website copies our homepage and download page, and attempts to trick "
-"users into\n"
+"We have recently been made aware of the existence of i2pbrowser.net. This\n"
+"website copies our homepage and download page, and attempts to trick users into\n"
 "downloading Windows malware."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:17
 msgid ""
-"There are several indicators that point to i2pbrowser.net being a malware"
-" site:"
+"There are several indicators that point to i2pbrowser.net being a malware "
+"site:"
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21
@@ -2044,29 +1967,26 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22
 msgid ""
-"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to "
-"the same .exe file."
+"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to the "
+"same .exe file."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:23
-msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
+msgid ""
+"The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:25
 msgid ""
-"We have not examined the malware ourselves, but it does not appear to be "
-"very\n"
-"sophisticated; it is not integrated into or bundled with the I2P "
-"software.\n"
-"Information security expert `Lance James`__ posted `a tweet`__ labelling "
-"it as\n"
+"We have not examined the malware ourselves, but it does not appear to be very\n"
+"sophisticated; it is not integrated into or bundled with the I2P software.\n"
+"Information security expert `Lance James`__ posted `a tweet`__ labelling it as\n"
 "\"a standard dark comet rat\"."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:35
 msgid ""
-"Spread the word. The only official download locations for I2P are linked "
-"on our\n"
+"Spread the word. The only official download locations for I2P are linked on our\n"
 "`download page`__. All I2P download packages are GPG-signed by the\n"
 "`release signing key`__."
 msgstr ""
@@ -2087,31 +2007,21 @@ msgstr ""
 #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:12
 msgid ""
 "**Somewhere, NH** -- Internet search company `DuckDuckGo`__ `donates`__\n"
-"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly"
-" open-source\n"
-"donation program. The award was granted on the basis of `nominations`__ "
-"by members of the public\n"
-"on the DuckDuckGo community portal. With an emphasis on privacy, "
-"DuckDuckGo provides a search\n"
-"engine which does not track its users or store personal data. I2P is an "
-"anonymous network intended to\n"
-"protect individuals from dragnet surveillance regularly performed by ISPs"
-" and governments."
+"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly open-source\n"
+"donation program. The award was granted on the basis of `nominations`__ by members of the public\n"
+"on the DuckDuckGo community portal. With an emphasis on privacy, DuckDuckGo provides a search\n"
+"engine which does not track its users or store personal data. I2P is an anonymous network intended to\n"
+"protect individuals from dragnet surveillance regularly performed by ISPs and governments."
 msgstr ""
 
 #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:26
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:46
 msgid ""
-"This marks the single largest donation ever received by I2P and reflects "
-"a growing interest in\n"
-"privacy and security by the Internet community. The funding will help I2P"
-" to reach more users, expand\n"
-"development, and audit the code. It will also enable I2P developers to "
-"attend conferences, such\n"
-"as the `Real-World Cryptography`__ conference in New York City, where the"
-" developers met and\n"
-"collaborated with cryptography experts pursuant to I2P's goals of "
-"providing anonymity to the\n"
+"This marks the single largest donation ever received by I2P and reflects a growing interest in\n"
+"privacy and security by the Internet community. The funding will help I2P to reach more users, expand\n"
+"development, and audit the code. It will also enable I2P developers to attend conferences, such\n"
+"as the `Real-World Cryptography`__ conference in New York City, where the developers met and\n"
+"collaborated with cryptography experts pursuant to I2P's goals of providing anonymity to the\n"
 "public."
 msgstr ""
 
@@ -2142,34 +2052,28 @@ msgstr ""
 msgid ""
 "I2P now requires Java 6 or higher.\n"
 "We strongly recommend that you upgrade to Java 7.\n"
-"If you are still using Java 5, you must upgrade your Java before "
-"installing I2P 0.9.12."
+"If you are still using Java 5, you must upgrade your Java before installing I2P 0.9.12."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:19
 msgid ""
 "0.9.12 adds preliminary support for ECDSA-signed Destinations.\n"
-"It contains several fixes for the handling of Delivery Status Messages "
-"(acknowledgements)\n"
+"It contains several fixes for the handling of Delivery Status Messages (acknowledgements)\n"
 "and those messages are now end-to-end encrypted for increased security."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:24
 msgid ""
 "We have upgraded to Jetty 8.\n"
-"Jetty 8 is almost identical to Jetty 7, so there are no complex "
-"configuration file conversions as there have been in past Jetty upgrades."
-"\n"
+"Jetty 8 is almost identical to Jetty 7, so there are no complex configuration file conversions as there have been in past Jetty upgrades.\n"
 "No manual changes should be necessary."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:35
 msgid ""
 "In early March, Internet search company `DuckDuckGo`__ `donated`__\n"
-"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly "
-"open-source\n"
-"donation program. The award was granted on the basis of `nominations`__ "
-"by members of the public\n"
+"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly open-source\n"
+"donation program. The award was granted on the basis of `nominations`__ by members of the public\n"
 "on the DuckDuckGo community portal."
 msgstr ""
 
@@ -2224,7 +2128,8 @@ msgid "Jetty 8.1.14.v20131031; Java 6 now required"
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:88
-msgid "Reduce target connection count again to reduce tunnel reject rate further"
+msgid ""
+"Reduce target connection count again to reduce tunnel reject rate further"
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:89
@@ -2272,10 +2177,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:13
 msgid ""
-"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, "
-"and a big SusiMail update.\n"
-"Of course, there's also the usual collection of bug fixes and translation"
-" updates."
+"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, and a big SusiMail update.\n"
+"Of course, there's also the usual collection of bug fixes and translation updates."
 msgstr ""
 
 #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:23
@@ -2373,30 +2276,24 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:13
 msgid ""
-"0.9.14 includes critical fixes for XSS and remote execution "
-"vulnerabilities reported by Exodus Intelligence.\n"
-"As an added precaution, we have disabled several advanced configuration "
-"features in the router console,\n"
+"0.9.14 includes critical fixes for XSS and remote execution vulnerabilities reported by Exodus Intelligence.\n"
+"As an added precaution, we have disabled several advanced configuration features in the router console,\n"
 "including installation of new plugins.\n"
 "We plan to re-enable these in a future release after additional review."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:20
 msgid ""
-"Due to I2P library changes, I2P-Bote users must upgrade their plugin to "
-"version 0.2.10 to work with I2P 0.9.14.\n"
-"Your router should update the plugin automatically after the router "
-"restarts."
+"Due to I2P library changes, I2P-Bote users must upgrade their plugin to version 0.2.10 to work with I2P 0.9.14.\n"
+"Your router should update the plugin automatically after the router restarts."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:25
 msgid ""
-"The release also contains several bug fixes in i2ptunnel, i2psnark, and "
-"other areas,\n"
+"The release also contains several bug fixes in i2ptunnel, i2psnark, and other areas,\n"
 "and updates to the latest Jetty, Tomcat, and Wrapper.\n"
 "We've also implemented a faster and more secure method for reseeding.\n"
-"Of course, there's also the usual collection of minor bug fixes and "
-"translation updates."
+"Of course, there's also the usual collection of minor bug fixes and translation updates."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:32
@@ -2447,14 +2344,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:55
 msgid ""
-"Several i2psnark improvements and fixes (GUI and DHT), including changes "
-"for better compatibility with Vuze"
+"Several i2psnark improvements and fixes (GUI and DHT), including changes for"
+" better compatibility with Vuze"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:60
 msgid ""
-"Reseeding now fetches a signed zip file containing router infos for "
-"security and speed"
+"Reseeding now fetches a signed zip file containing router infos for security"
+" and speed"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:61
@@ -2467,8 +2364,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:63
 msgid ""
-"Per-message reliabilitiy settings in I2CP and error propagation back from"
-" router to client"
+"Per-message reliabilitiy settings in I2CP and error propagation back from "
+"router to client"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:64
@@ -2500,33 +2397,23 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:13
 msgid ""
-"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some"
-" other web forms.\n"
-"We've restored the ability to install plugins via the console, but you "
-"must first edit your router.config file\n"
-"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the "
-"line routerconsole.enablePluginInstall=true.\n"
-"Other rarely-used advanced features that were removed in 0.9.14 may be "
-"restored by adding the line routerconsole.advanced=true."
+"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some other web forms.\n"
+"We've restored the ability to install plugins via the console, but you must first edit your router.config file\n"
+"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the line routerconsole.enablePluginInstall=true.\n"
+"Other rarely-used advanced features that were removed in 0.9.14 may be restored by adding the line routerconsole.advanced=true."
 msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:20
 msgid ""
-"As usual, if configured with the default \"Download and Verify\", the "
-"router will automatically download the update and display a button to "
-"restart.\n"
-"However, due to a bug in 0.9.14, if your update is configured for "
-"\"Notify only\", the download button will not be displayed.\n"
-"You must change your configuration to \"Download and Verify\" or "
-"\"Download, Verify, and Restart\" to update."
+"As usual, if configured with the default \"Download and Verify\", the router will automatically download the update and display a button to restart.\n"
+"However, due to a bug in 0.9.14, if your update is configured for \"Notify only\", the download button will not be displayed.\n"
+"You must change your configuration to \"Download and Verify\" or \"Download, Verify, and Restart\" to update."
 msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:26
 msgid ""
-"If you are still running 0.9.13 or older, we recommend that you update to"
-" this release as soon as possible.\n"
-"If you don't often check your router console, please consider changing "
-"your configuration to \"Download, Verify, and Restart\"\n"
+"If you are still running 0.9.13 or older, we recommend that you update to this release as soon as possible.\n"
+"If you don't often check your router console, please consider changing your configuration to \"Download, Verify, and Restart\"\n"
 "to ensure you are always running the latest release."
 msgstr ""
 
@@ -2580,10 +2467,7 @@ msgstr ""
 msgid ""
 "Hello all!\n"
 "\n"
-"Today we announce the Privacy Solutions project, a new organization that "
-"develops and maintains I2P software. Privacy Solutions includes several "
-"new development efforts designed to enhance the privacy, security, and "
-"anonymity for users, based on I2P protocols and technology.\n"
+"Today we announce the Privacy Solutions project, a new organization that develops and maintains I2P software. Privacy Solutions includes several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.\n"
 "\n"
 "These efforts include\n"
 "\n"
@@ -2593,40 +2477,23 @@ msgid ""
 "4) The Anoncoin crypto-coin project.\n"
 "5) The Monero crypto-coin project.\n"
 "\n"
-"Privacy Solutions' initial funding was provided by the supporters of the "
-"Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-"
-"profit type of organization registered within the Norwegian government "
-"registers. ( Kind of like US 501(c)3. )\n"
+"Privacy Solutions' initial funding was provided by the supporters of the Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-profit type of organization registered within the Norwegian government registers. ( Kind of like US 501(c)3. )\n"
 "\n"
-"Privacy Solutions plans to apply for funding from the Norwegian goverment"
-" for network research, because of BigBrother (We'll get back to what that"
-" is) and the coins that are planned to use low-latency networks as "
-"primary transport layer. Our research will support advances in software "
-"technology for anonymity, security, and privacy.\n"
+"Privacy Solutions plans to apply for funding from the Norwegian goverment for network research, because of BigBrother (We'll get back to what that is) and the coins that are planned to use low-latency networks as primary transport layer. Our research will support advances in software technology for anonymity, security, and privacy.\n"
 "\n"
 "\n"
-"First a little bit about the Abscond Browser Bundle. This was first a "
-"one-man project by Meeh, but later on friends started sending patches, "
-"the project is now trying to create the same easy access to I2P as Tor "
-"has with their browser bundle. Our first release isn't far away, it's "
-"just some gitian script tasks left, including setup of the Apple "
-"toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C"
-" struct keeping vital proces information about an process) from the Java "
-"instance to check on I2P before we declare it stable. I2pd will also "
-"switch with the Java version once it's ready, and there is no point in "
-"shipping a JRE in the bundle anymore. You can read more about the Abscond"
-" Browser Bundle at https://hideme.today/dev"
+"First a little bit about the Abscond Browser Bundle. This was first a one-man project by Meeh, but later on friends started sending patches, the project is now trying to create the same easy access to I2P as Tor has with their browser bundle. Our first release isn't far away, it's just some gitian script tasks left, including setup of the Apple toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C struct keeping vital proces information about an process) from the Java instance to check on I2P before we declare it stable. I2pd will also switch with the Java version once it's ready, and there is no point in shipping a JRE in the bundle anymore. You can read more about the Abscond Browser Bundle at https://hideme.today/dev"
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:35
 msgid ""
-"We would also like to inform of the current status of i2pd. I2pd supports"
-" bi-directional streaming now, that allows to use not only HTTP but long-"
-"lived communication channels. Instant IRC support has been added. I2pd "
-"users are able to use it same way as Java I2P for access to I2P IRC "
-"network. I2PTunnel is one of key features of I2P network, allowing non-"
-"I2P applications communicate transparently. That's why it's vital feature"
-" for i2pd and one of key milestones."
+"We would also like to inform of the current status of i2pd. I2pd supports "
+"bi-directional streaming now, that allows to use not only HTTP but long-"
+"lived communication channels. Instant IRC support has been added. I2pd users"
+" are able to use it same way as Java I2P for access to I2P IRC network. "
+"I2PTunnel is one of key features of I2P network, allowing non-I2P "
+"applications communicate transparently. That's why it's vital feature for "
+"i2pd and one of key milestones."
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:39
@@ -2635,18 +2502,17 @@ msgid ""
 "Bigbrother.i2p, which is a metrics system Meeh made over a year back. "
 "Recently we noticed that Meeh actually have 100Gb of non-duplicated data "
 "from nodes reporting in since initial launch. This will also be moved to "
-"Privacy Solutions and be rewritten with a NSPOF backend. With this we "
-"will aslo start using the Graphite ( http://graphite.wikidot.com/screen-"
-"shots ). This will give us a great overview over the network without "
-"privacy issues for our end users. The clients filter all data except "
-"country, router hash and success rate on tunnel buildings. The name of "
-"this service is as always a little joke from Meeh."
+"Privacy Solutions and be rewritten with a NSPOF backend. With this we will "
+"aslo start using the Graphite ( http://graphite.wikidot.com/screen-shots ). "
+"This will give us a great overview over the network without privacy issues "
+"for our end users. The clients filter all data except country, router hash "
+"and success rate on tunnel buildings. The name of this service is as always "
+"a little joke from Meeh."
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:46
 msgid ""
-"We have shorted down a bit of the news here, if you're interested in more"
-" information please visit https://blog.privacysolutions.no/\n"
+"We have shorted down a bit of the news here, if you're interested in more information please visit https://blog.privacysolutions.no/\n"
 "We're still under construction and more content will come!\n"
 "\n"
 "\n"
@@ -2670,67 +2536,50 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:11
 msgid ""
-"I2P Android and Bote have been released on Google Play in Norway, as a "
-"test run for a future worldwide release."
+"I2P Android and Bote have been released on Google Play in Norway, as a test "
+"run for a future worldwide release."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:13
 msgid ""
-"I2P Android has existed for over three years. In that time, it has "
-"evolved from\n"
-"a simple test project into a usable, useful Android port of the I2P "
-"router. Our\n"
-"eventual goal has been to release I2P Android on Google Play, to make it "
-"easier\n"
-"for users to discover, install and use I2P on their Android devices. "
-"After much\n"
-"work improving the user interface, fixing bugs and testing, we think that"
-" I2P\n"
+"I2P Android has existed for over three years. In that time, it has evolved from\n"
+"a simple test project into a usable, useful Android port of the I2P router. Our\n"
+"eventual goal has been to release I2P Android on Google Play, to make it easier\n"
+"for users to discover, install and use I2P on their Android devices. After much\n"
+"work improving the user interface, fixing bugs and testing, we think that I2P\n"
 "Android is finally ready to go where the users are."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:22
 msgid ""
-"Initially, we are only releasing to Android users in Norway, as a test "
-"run. I2P\n"
-"Android will have far more exposure on Google Play than it has ever had "
-"before,\n"
-"and there will be bugs and usability issues that we need to fix. It will "
-"be much\n"
-"easier (and less stressful!) to respond to feedback if we only need to "
-"deal with\n"
-"reports from hundreds of users instead of thousands (already orders of "
-"magnitude\n"
+"Initially, we are only releasing to Android users in Norway, as a test run. I2P\n"
+"Android will have far more exposure on Google Play than it has ever had before,\n"
+"and there will be bugs and usability issues that we need to fix. It will be much\n"
+"easier (and less stressful!) to respond to feedback if we only need to deal with\n"
+"reports from hundreds of users instead of thousands (already orders of magnitude\n"
 "more feedback than we have ever had)."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:31
 msgid ""
-"Simultaneously we are making the first public release of Bote, an Android"
-" port\n"
-"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. "
-"It runs\n"
-"on top of the I2P network, and while it works as a standalone app, it "
-"will use\n"
+"Simultaneously we are making the first public release of Bote, an Android port\n"
+"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. It runs\n"
+"on top of the I2P network, and while it works as a standalone app, it will use\n"
 "the I2P Android app by default if installed. As with I2P Android, we are\n"
 "initially only releasing Bote to Android users in Norway."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:41
 msgid ""
-"The apps are being released on Google Play by `The Privacy Solutions "
-"Project`__.\n"
-"See their `blog post`__ for further information, and links to the Google "
-"Play\n"
+"The apps are being released on Google Play by `The Privacy Solutions Project`__.\n"
+"See their `blog post`__ for further information, and links to the Google Play\n"
 "page for Norway users."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:50
 msgid ""
-"As lead developer for I2P Android and Bote, I look forward to your "
-"comments. You\n"
-"are the people who will be using them, and your perspectives will help me"
-" craft\n"
+"As lead developer for I2P Android and Bote, I look forward to your comments. You\n"
+"are the people who will be using them, and your perspectives will help me craft\n"
 "simple, intuitive apps that make privacy accessible to everyone."
 msgstr ""
 
@@ -2740,28 +2589,22 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:59
 msgid ""
-"We have also updated I2P Android on the website to match the release "
-"candidate\n"
-"deployed in Norway. This version will be updated with changes as we "
-"respond to\n"
+"We have also updated I2P Android on the website to match the release candidate\n"
+"deployed in Norway. This version will be updated with changes as we respond to\n"
 "feedback from Norwegian users, heading towards our next stable release."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:65
 msgid ""
-"Please note that we have upgraded the Android API to 9. This means that "
-"Froyo\n"
-"Android 2.2 will not be supported anymore; the minimum requirement is now"
-"\n"
+"Please note that we have upgraded the Android API to 9. This means that Froyo\n"
+"Android 2.2 will not be supported anymore; the minimum requirement is now\n"
 "Gingerbread Android 2.3."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:71
 msgid ""
-"Also note that if you have an earlier version of I2P Android, you will "
-"need to\n"
-"uninstall and reinstall because we have changed the release keys. Further"
-"\n"
+"Also note that if you have an earlier version of I2P Android, you will need to\n"
+"uninstall and reinstall because we have changed the release keys. Further\n"
 "information about this will be provided in a subsequent blog post."
 msgstr ""
 
@@ -2779,31 +2622,23 @@ msgstr ""
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:13
 msgid ""
 "0.9.15 adds preliminary support for Ed25519 EdDSA signatures.\n"
-"It includes a new persistent configuration backend for i2psnark and fixes"
-" several issues with i2psnark's handling of file names.\n"
+"It includes a new persistent configuration backend for i2psnark and fixes several issues with i2psnark's handling of file names.\n"
 "There are several improvements to speed up SAM.\n"
 "Plugins now support stronger signatures in the su3 file format.\n"
-"Plugin installation via the console, which was disabled in 0.9.14, is re-"
-"enabled."
+"Plugin installation via the console, which was disabled in 0.9.14, is re-enabled."
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:21
 msgid ""
-"We have supported ECDSA signatures since 0.9.12, and we would like to "
-"start using ECDSA by default.\n"
-"Unfortunately, some of you are still running older I2P versions, and for "
-"others,\n"
+"We have supported ECDSA signatures since 0.9.12, and we would like to start using ECDSA by default.\n"
+"Unfortunately, some of you are still running older I2P versions, and for others,\n"
 "their distribution or Java runtime does not support ECDSA. Red Hat\n"
 "(RHEL, Fedora) distributions are reported to be missing ECDSA.\n"
 "Some have fixed the Java issues by upgrading from Java 6 to Java 7;\n"
-"others have had success with installing the \"unlimited strength policy "
-"files\".\n"
-"We've added information about missing crypto to the log file and the "
-"/logs page in the console.\n"
-"After you update to 0.9.15, please check if you are missing ECDSA "
-"support, and attempt to fix it if necessary.\n"
-"This is particularly important for those that run popular eepsites and "
-"services."
+"others have had success with installing the \"unlimited strength policy files\".\n"
+"We've added information about missing crypto to the log file and the /logs page in the console.\n"
+"After you update to 0.9.15, please check if you are missing ECDSA support, and attempt to fix it if necessary.\n"
+"This is particularly important for those that run popular eepsites and services."
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:42
@@ -2913,8 +2748,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:68
 msgid ""
-"i2ptunnel add support for local SSL connections for standard and IRC "
-"client tunnels"
+"i2ptunnel add support for local SSL connections for standard and IRC client "
+"tunnels"
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:69
@@ -2951,26 +2786,21 @@ msgid ""
 "0.9.16 is a significant step forward in our plan to migrate\n"
 "from DSA to ECDSA and then EdDSA cryptographic signatures,\n"
 "and makes several other changes to increase your anonymity and security.\n"
-"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures"
-" by default.\n"
-"In addition, we've fixed a large number of serious bugs, including "
-"console lockups."
+"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures by default.\n"
+"In addition, we've fixed a large number of serious bugs, including console lockups."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:21
 msgid ""
-"Changes in router data structures will require i2pcontrol plugin users to"
-" update to version 0.0.9."
+"Changes in router data structures will require i2pcontrol plugin users to "
+"update to version 0.0.9."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:25
 msgid ""
-"If you run an eepsite or a service and you are not running a recent "
-"release,\n"
-"or your Java or OS does not support ECDSA (as noted in the logs and on "
-"the /logs page in the console),\n"
-"please fix the issue as soon as possible or your users will soon be "
-"unable to connect."
+"If you run an eepsite or a service and you are not running a recent release,\n"
+"or your Java or OS does not support ECDSA (as noted in the logs and on the /logs page in the console),\n"
+"please fix the issue as soon as possible or your users will soon be unable to connect."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:42
@@ -2983,8 +2813,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:44
 msgid ""
-"Require I2CP authorization for all messages when enabled (requires 0.9.11"
-" or higher client)"
+"Require I2CP authorization for all messages when enabled (requires 0.9.11 or"
+" higher client)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:45
@@ -3003,8 +2833,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:48
 msgid ""
-"New column sorting, set-all priority buttons, and upload ratio display in"
-" i2psnark"
+"New column sorting, set-all priority buttons, and upload ratio display in "
+"i2psnark"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:49
@@ -3065,14 +2895,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:71
 msgid ""
-"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol"
-" plugin)"
+"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol "
+"plugin)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:72
 msgid ""
-"New router keys now stored in router.keys.dat (eepPriv.dat format) "
-"instead of router.keys"
+"New router keys now stored in router.keys.dat (eepPriv.dat format) instead "
+"of router.keys"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:73
@@ -3107,8 +2937,7 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:80
 msgid ""
-"Change eepsite Jetty threadpool and queue configuration (new installs "
-"only)"
+"Change eepsite Jetty threadpool and queue configuration (new installs only)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:81
@@ -3128,39 +2957,34 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:13
 msgid ""
-"0.9.17 is primarily a bugfix release, but it also continues our migration"
-" to stronger cryptographic signatures."
+"0.9.17 is primarily a bugfix release, but it also continues our migration to"
+" stronger cryptographic signatures."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:17
 msgid ""
-"We have moved the news feed system used for the news on your console and "
-"the latest router version indication\n"
+"We have moved the news feed system used for the news on your console and the latest router version indication\n"
 "to a signed format using RSA 4096-bit keys for enhanced security."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:22
 msgid ""
-"New eepsites and servers will be ECDSA-signed by default, if ECDSA is "
-"available.\n"
+"New eepsites and servers will be ECDSA-signed by default, if ECDSA is available.\n"
 "There is now a warning in the console sidebar if ECDSA is not available.\n"
-"For RedHat users, we have reports of successful installs of the "
-"BouncyCastle Provider (bcprov) jar to add ECDSA support."
+"For RedHat users, we have reports of successful installs of the BouncyCastle Provider (bcprov) jar to add ECDSA support."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:28
 msgid ""
-"We've fixed several serious bugs, including an SSU packet corruption "
-"problem,\n"
+"We've fixed several serious bugs, including an SSU packet corruption problem,\n"
 "and a SAM bug affecting i2p-messenger and other SAM applications.\n"
-"There are several fixes for the preliminary ECDSA router signatures added"
-" in the last release but not yet enabled."
+"There are several fixes for the preliminary ECDSA router signatures added in the last release but not yet enabled."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:34
 msgid ""
-"Many of us will be attending 31C3 in Hamburg in December. Stop by our "
-"table and say hi!"
+"Many of us will be attending 31C3 in Hamburg in December. Stop by our table "
+"and say hi!"
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:49
@@ -3260,16 +3084,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:11
 msgid ""
-"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google"
-" Play and F-Droid."
+"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google "
+"Play and F-Droid."
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:13
 msgid ""
-"It has been some time since I last posted updates about our Android "
-"development,\n"
-"and several I2P releases have gone by without any matching Android "
-"releases.\n"
+"It has been some time since I last posted updates about our Android development,\n"
+"and several I2P releases have gone by without any matching Android releases.\n"
 "At last, the wait is over!"
 msgstr ""
 
@@ -3281,47 +3103,31 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:24
 msgid ""
-"New versions of I2P Android and Bote have been released! They can be "
-"downloaded\n"
+"New versions of I2P Android and Bote have been released! They can be downloaded\n"
 "from these URLs:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:35
 msgid ""
-"The main change in these releases is the transition to Android's new "
-"Material\n"
-"design system. Material has made it much easier for app developers with, "
-"shall\n"
-"we say, \"minimalist\" design skills (like myself) to create apps that "
-"are nicer\n"
-"to use. I2P Android also updates its underlying I2P router to the just-"
-"released\n"
-"version 0.9.17. Bote brings in several new features along with many "
-"smaller\n"
-"improvements; for example, you can now add new email destinations via QR "
-"codes."
+"The main change in these releases is the transition to Android's new Material\n"
+"design system. Material has made it much easier for app developers with, shall\n"
+"we say, \"minimalist\" design skills (like myself) to create apps that are nicer\n"
+"to use. I2P Android also updates its underlying I2P router to the just-released\n"
+"version 0.9.17. Bote brings in several new features along with many smaller\n"
+"improvements; for example, you can now add new email destinations via QR codes."
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:44
 msgid ""
-"As I mentioned in `my last update`__, the release key that signs the apps"
-" has\n"
-"changed. The reason for this was because we needed to change the package "
-"name\n"
-"of I2P Android. The old package name (``net.i2p.android.router``) had "
-"already\n"
-"been taken on Google Play (we still don't know who was using it), and we "
-"wanted\n"
-"to use the same package name and signing key for all distributions of I2P"
-"\n"
-"Android. Doing so means that a user could initially install the app from "
-"the I2P\n"
-"website, and then later if the website was blocked they could upgrade it "
-"using\n"
-"Google Play. Android OS considers an application to be completely "
-"different when\n"
-"its package name changes, so we took the opportunity to increase the "
-"strength of\n"
+"As I mentioned in `my last update`__, the release key that signs the apps has\n"
+"changed. The reason for this was because we needed to change the package name\n"
+"of I2P Android. The old package name (``net.i2p.android.router``) had already\n"
+"been taken on Google Play (we still don't know who was using it), and we wanted\n"
+"to use the same package name and signing key for all distributions of I2P\n"
+"Android. Doing so means that a user could initially install the app from the I2P\n"
+"website, and then later if the website was blocked they could upgrade it using\n"
+"Google Play. Android OS considers an application to be completely different when\n"
+"its package name changes, so we took the opportunity to increase the strength of\n"
 "the signing key."
 msgstr ""
 
@@ -3337,25 +3143,18 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:73
 msgid ""
-"A few months ago we `released`__ both I2P Android and Bote on Google Play"
-" in\n"
-"Norway, to test the release process there. We are pleased to announce "
-"that both\n"
-"apps are now being released globally by `Privacy Solutions`__. The apps "
-"can be\n"
+"A few months ago we `released`__ both I2P Android and Bote on Google Play in\n"
+"Norway, to test the release process there. We are pleased to announce that both\n"
+"apps are now being released globally by `Privacy Solutions`__. The apps can be\n"
 "found at these URLs:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:89
 msgid ""
-"The global release is being done in several stages, starting with the "
-"countries\n"
-"for which we have translations. The notable exception to this is France; "
-"due to\n"
-"import regulations on cryptographic code, we are unable yet to distribute"
-" these\n"
-"apps on Google Play France. This is the same issue that has affected "
-"other apps\n"
+"The global release is being done in several stages, starting with the countries\n"
+"for which we have translations. The notable exception to this is France; due to\n"
+"import regulations on cryptographic code, we are unable yet to distribute these\n"
+"apps on Google Play France. This is the same issue that has affected other apps\n"
 "like TextSecure and Orbot."
 msgstr ""
 
@@ -3367,39 +3166,28 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:103
 msgid ""
-"Don't think we have forgotten about you, F-Droid users! In addition to "
-"the two\n"
-"locations above, we have set up our own F-Droid repository. If you are "
-"reading\n"
-"this post on your phone, `click here`__ to add it to F-Droid (this only "
-"works in\n"
-"some Android browsers). Or, you can manually add the URL below to your "
-"F-Droid\n"
+"Don't think we have forgotten about you, F-Droid users! In addition to the two\n"
+"locations above, we have set up our own F-Droid repository. If you are reading\n"
+"this post on your phone, `click here`__ to add it to F-Droid (this only works in\n"
+"some Android browsers). Or, you can manually add the URL below to your F-Droid\n"
 "repository list:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:115
 msgid ""
-"If you would like to manually verify the fingerprint (SHA-256) of the "
-"repository\n"
+"If you would like to manually verify the fingerprint (SHA-256) of the repository\n"
 "signing key, or type it in when adding the repository, here it is:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:124
 msgid ""
-"Unfortunately the I2P app in the main F-Droid repository has not been "
-"updated\n"
-"because our F-Droid maintainer has disappeared. We hope that by "
-"maintaining this\n"
+"Unfortunately the I2P app in the main F-Droid repository has not been updated\n"
+"because our F-Droid maintainer has disappeared. We hope that by maintaining this\n"
 "binary repository, we can better support our F-Droid users and keep them\n"
-"up-to-date. If you have already installed I2P from the main F-Droid "
-"repository,\n"
-"you will need to uninstall it if you want to upgrade, because the signing"
-" key\n"
-"will be different. The apps in our F-Droid repository are the same APKs "
-"that are\n"
-"provided on our website and on Google Play, so in future you will be able"
-" to\n"
+"up-to-date. If you have already installed I2P from the main F-Droid repository,\n"
+"you will need to uninstall it if you want to upgrade, because the signing key\n"
+"will be different. The apps in our F-Droid repository are the same APKs that are\n"
+"provided on our website and on Google Play, so in future you will be able to\n"
 "upgrade using any of these sources."
 msgstr ""
 
@@ -3418,25 +3206,18 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:21
 msgid ""
-"We were, for the second year in a row, at a great location in the "
-"Congress, in\n"
-"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square "
-"has\n"
-"really increased our visibility and helped many people find us. Thanks to"
-" Noisy\n"
+"We were, for the second year in a row, at a great location in the Congress, in\n"
+"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square has\n"
+"really increased our visibility and helped many people find us. Thanks to Noisy\n"
 "Square and the 31C3 organizers for a great Congress."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:30
 msgid ""
-"We also thank Gabriel Weinberg and his fabulous search engine "
-"`DuckDuckGo`__ for\n"
-"their support of open source anonymity tools and their `generous "
-"contribution`__\n"
-"to I2P in 2014. Funding from DuckDuckGo and others helped support our "
-"attendance\n"
-"at CCC. This is the primary annual meetup for I2P developers and it is "
-"critical\n"
+"We also thank Gabriel Weinberg and his fabulous search engine `DuckDuckGo`__ for\n"
+"their support of open source anonymity tools and their `generous contribution`__\n"
+"to I2P in 2014. Funding from DuckDuckGo and others helped support our attendance\n"
+"at CCC. This is the primary annual meetup for I2P developers and it is critical\n"
 "to our success."
 msgstr ""
 
@@ -3448,127 +3229,88 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:49
 msgid ""
-"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved "
-"himself\n"
-"and the project from TU Munich to `Inria`__ in France. He has a large "
-"number of\n"
-"`open positions`__. This is a great opportunity to get paid to work on "
-"open\n"
+"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved himself\n"
+"and the project from TU Munich to `Inria`__ in France. He has a large number of\n"
+"`open positions`__. This is a great opportunity to get paid to work on open\n"
 "source anonymity tools, we encourage everybody to contact him about it."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:60
 msgid ""
-"The prospect of an invigorated GNUnet with a large amount of new funding "
-"is\n"
-"quite interesting. We discussed more ways to work together. In early "
-"2014, we\n"
-"worked hard to understand the GnuNet DNS replacement, but we were unable "
-"to\n"
-"figure out a good fit for it in I2P. One of his new ideas is a "
-"distributed,\n"
-"anonymous statistics gathering subsystem, for detecting problems or "
-"attacks on\n"
+"The prospect of an invigorated GNUnet with a large amount of new funding is\n"
+"quite interesting. We discussed more ways to work together. In early 2014, we\n"
+"worked hard to understand the GnuNet DNS replacement, but we were unable to\n"
+"figure out a good fit for it in I2P. One of his new ideas is a distributed,\n"
+"anonymous statistics gathering subsystem, for detecting problems or attacks on\n"
 "the network. We'd definitely be interested in that."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:69
 msgid ""
-"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems "
-"draft`__.\n"
-"A new, greatly simplified version 3 was posted in December. The prospects"
-" for\n"
+"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems draft`__.\n"
+"A new, greatly simplified version 3 was posted in December. The prospects for\n"
 "approval remain unclear. The best way to monitor or participate in the\n"
-"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to "
-"do so\n"
+"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to do so\n"
 "on our side, and also give Hellekin a new point-of-contact for this topic."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:80
 msgid ""
-"We apologized to Christian for not being organized enough to have a talk "
-"at his\n"
-"`We Fix The Net assembly`__. One of our biggest failures as a project is "
-"our\n"
-"seeming inability to submit talks at conferences. We'll have to do better"
-" in the\n"
+"We apologized to Christian for not being organized enough to have a talk at his\n"
+"`We Fix The Net assembly`__. One of our biggest failures as a project is our\n"
+"seeming inability to submit talks at conferences. We'll have to do better in the\n"
 "new year."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:92
 msgid ""
-"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in "
-"with\n"
-"other anonymity tools into this new Debian \"superpackage\" of some sort,"
-" and\n"
-"would love to get I2P into Debian in 2015. He claims the process is now "
-"easy,\n"
+"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in with\n"
+"other anonymity tools into this new Debian \"superpackage\" of some sort, and\n"
+"would love to get I2P into Debian in 2015. He claims the process is now easy,\n"
 "just `follow the instructions`__. We said that's funny, we've been\n"
 "`stuck in the process for over 7 years`__."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:103
 msgid ""
-"He said, well, try the new process, it works great, should be no problem "
-"at all\n"
-"if your package is in good shape. The people in Debian that run this "
-"process are\n"
-"eager volunteers who want nothing more than to get more packages in. We "
-"said our\n"
-"package is indeed in fantastic shape, and we would try out the new "
-"process as\n"
-"soon as possible. If all this is true, we will be in the next Debian "
-"release in\n"
+"He said, well, try the new process, it works great, should be no problem at all\n"
+"if your package is in good shape. The people in Debian that run this process are\n"
+"eager volunteers who want nothing more than to get more packages in. We said our\n"
+"package is indeed in fantastic shape, and we would try out the new process as\n"
+"soon as possible. If all this is true, we will be in the next Debian release in\n"
 "late 2015. This would be very very cool."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:115
 msgid ""
-"We had a nice discussion with BitingBird of Tails. They are very happy "
-"with our\n"
-"rapid response to the `vulnerability disclosure`__ last summer, resulting"
-" in our\n"
-"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and "
-"they\n"
-"took `great offense`__ to that and the lack of private notification. We "
-"thanked\n"
+"We had a nice discussion with BitingBird of Tails. They are very happy with our\n"
+"rapid response to the `vulnerability disclosure`__ last summer, resulting in our\n"
+"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and they\n"
+"took `great offense`__ to that and the lack of private notification. We thanked\n"
 "them for taking the heat and fighting back."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:127
 msgid ""
-"BitingBird also handles support, and she tells us the number one issue is"
-" how\n"
-"long I2P takes to start up and be useful for browsing I2P sites. Her "
-"standard\n"
-"answer is \"wait ten more minutes\" and that seems to be effective. I2P "
-"is\n"
-"particularly slow to startup on Tails since it does not persist peer data"
-" by\n"
-"default. It would be nice to change that, but there's also things we can "
-"do on\n"
-"the I2P side to make things start faster. Expect some improvement in our "
-"0.9.18\n"
+"BitingBird also handles support, and she tells us the number one issue is how\n"
+"long I2P takes to start up and be useful for browsing I2P sites. Her standard\n"
+"answer is \"wait ten more minutes\" and that seems to be effective. I2P is\n"
+"particularly slow to startup on Tails since it does not persist peer data by\n"
+"default. It would be nice to change that, but there's also things we can do on\n"
+"the I2P side to make things start faster. Expect some improvement in our 0.9.18\n"
 "release."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:140
 msgid ""
-"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The "
-"upcoming\n"
-"Tor Hidden Services changes mean that their keys will no longer fit into "
-"a\n"
-"portion of an IPv6 address, and he was working on a solution. We reminded"
-" him\n"
-"that this has always been the case for I2P (with \"GarliCat\"), that it's"
-" not a\n"
-"new problem. He pointed us to `a presentation`__ of his proposal. It "
-"involves\n"
+"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The upcoming\n"
+"Tor Hidden Services changes mean that their keys will no longer fit into a\n"
+"portion of an IPv6 address, and he was working on a solution. We reminded him\n"
+"that this has always been the case for I2P (with \"GarliCat\"), that it's not a\n"
+"new problem. He pointed us to `a presentation`__ of his proposal. It involves\n"
 "storing an extra record in the hidden service directory (equivalent of a\n"
-"leaseset I2P's network database). It wasn't completely clear how this "
-"would\n"
-"work, or if we would consider it abuse of the netDb. We'll follow up with"
-" him\n"
+"leaseset I2P's network database). It wasn't completely clear how this would\n"
+"work, or if we would consider it abuse of the netDb. We'll follow up with him\n"
 "as he gets further."
 msgstr ""
 
@@ -3580,23 +3322,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:160
 msgid ""
-"We spent hours and hours explaining I2P to people stopping by our table. "
-"Some\n"
-"had heard of I2P before, some had not; everybody had heard of Tor and had"
-" at\n"
-"least a vague idea of what hidden services are. As usual, introducing "
-"people to\n"
-"I2P was a struggle. By the end of the Congress, we became convinced that "
-"a part\n"
-"of the problem was a difference in terminology. Back 12 years ago, when "
-"I2P and\n"
-"Tor were both getting started, we each came up with terms for the various"
-" parts\n"
+"We spent hours and hours explaining I2P to people stopping by our table. Some\n"
+"had heard of I2P before, some had not; everybody had heard of Tor and had at\n"
+"least a vague idea of what hidden services are. As usual, introducing people to\n"
+"I2P was a struggle. By the end of the Congress, we became convinced that a part\n"
+"of the problem was a difference in terminology. Back 12 years ago, when I2P and\n"
+"Tor were both getting started, we each came up with terms for the various parts\n"
 "of our systems. Today, the Tor terminology such as \"hidden service\" is\n"
-"well-understood and commonplace. The I2P terminology such as \"eepsite\" "
-"is\n"
-"neither. We agreed to review our documentation, router console, and other"
-" places\n"
+"well-understood and commonplace. The I2P terminology such as \"eepsite\" is\n"
+"neither. We agreed to review our documentation, router console, and other places\n"
 "for opportunities to simplify it and use common terms."
 msgstr ""
 
@@ -3615,66 +3349,65 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:182
 msgid ""
-"* *Toronto meetup:* CCC is such a productive time for us, and it seems "
-"that a second meetup in the year would be quite helpful. We have proposed"
-" it for August 2015 in Toronto, Canada, in conjunction with `Toronto "
-"Crypto`__. It would include developer meetings together with "
-"presentations and tutorials, all open to the public. We are attempting to"
-" gauge interest and research possible venues. If you are considering "
-"attending, please let us know by `tweeting @i2p`__ or posting `on the dev"
-" forum thread`__."
+"* *Toronto meetup:* CCC is such a productive time for us, and it seems that "
+"a second meetup in the year would be quite helpful. We have proposed it for "
+"August 2015 in Toronto, Canada, in conjunction with `Toronto Crypto`__. It "
+"would include developer meetings together with presentations and tutorials, "
+"all open to the public. We are attempting to gauge interest and research "
+"possible venues. If you are considering attending, please let us know by "
+"`tweeting @i2p`__ or posting `on the dev forum thread`__."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:190
 msgid ""
-"* We discussed Meeh's workload and the state of the various services he "
-"is running. We made some plans to reduce his load and have some other "
-"people help out."
+"* We discussed Meeh's workload and the state of the various services he is "
+"running. We made some plans to reduce his load and have some other people "
+"help out."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:194
 msgid ""
-"* We reviewed our critieria for placing links to `i2pd`__ on our download"
-" page.  We agreed that the only remaining item is to have a nice page on "
-"the `Privacy Solutions web site`__ or elsewhere with binary packages for "
+"* We reviewed our critieria for placing links to `i2pd`__ on our download "
+"page.  We agreed that the only remaining item is to have a nice page on the "
+"`Privacy Solutions web site`__ or elsewhere with binary packages for "
 "Windows, Linux, and Mac, and source packages. It's not clear who is "
-"responsible for building the packages and where the \"official\" version "
-"is. Once there's an established process for building and signing packages"
-" and an official place to put them, we're ready to link to it. If it is "
-"not feasible to host it on the Privacy Solutions website, we will discuss"
-" alternatives with orignal, including possible migration to our download "
+"responsible for building the packages and where the \"official\" version is."
+" Once there's an established process for building and signing packages and "
+"an official place to put them, we're ready to link to it. If it is not "
+"feasible to host it on the Privacy Solutions website, we will discuss "
+"alternatives with orignal, including possible migration to our download "
 "servers."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:201
 msgid ""
-"* Lots of people coming by the table asked if we had a non-Java version. "
-"It was great to finally answer \"yes\" and we're eager to get the word "
-"out and get more users, testers, and developers on it."
+"* Lots of people coming by the table asked if we had a non-Java version. It "
+"was great to finally answer \"yes\" and we're eager to get the word out and "
+"get more users, testers, and developers on it."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:205
 msgid ""
-"* `Vuze`__ continues to make good progress on their I2P integration. We "
-"look forward to working with them in the new year on a managed rollout to"
-" more users."
+"* `Vuze`__ continues to make good progress on their I2P integration. We look"
+" forward to working with them in the new year on a managed rollout to more "
+"users."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:211
 msgid ""
 "* We discussed the state of Meeh's and Sindu's reseed servers. They made "
-"several improvements while at the congress and are investigating "
-"migration to `Matt Drollette's Go implementation`__. The security and "
-"reliability of our reseed servers is vital to new users and network "
-"operation. `User 'backup'`__ is doing a great job monitoring and managing"
-" the pool of reseed servers."
+"several improvements while at the congress and are investigating migration "
+"to `Matt Drollette's Go implementation`__. The security and reliability of "
+"our reseed servers is vital to new users and network operation. `User "
+"'backup'`__ is doing a great job monitoring and managing the pool of reseed "
+"servers."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:218
 msgid ""
-"* We agreed to purchase a second root server for development, testing, "
-"and services. Echelon will be adminstering it. Contact him if you would "
-"like a VM."
+"* We agreed to purchase a second root server for development, testing, and "
+"services. Echelon will be adminstering it. Contact him if you would like a "
+"VM."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:222
@@ -3685,26 +3418,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:226
 msgid ""
-"* We met with Welterde about the state of his services including his "
-"`open tracker`__. These services are not being adequately maintained and "
-"will soon become inaccessible due to crypto changes if they are not "
-"upgraded. He committed to upgrading them soon."
+"* We met with Welterde about the state of his services including his `open "
+"tracker`__. These services are not being adequately maintained and will soon"
+" become inaccessible due to crypto changes if they are not upgraded. He "
+"committed to upgrading them soon."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:232
 msgid ""
-"* We met lots of people interested in our `Android app`__. We passed "
-"several ideas and bug reports back to str4d. We plan to make a big push "
-"to give the app some development love early in the year."
+"* We met lots of people interested in our `Android app`__. We passed several"
+" ideas and bug reports back to str4d. We plan to make a big push to give the"
+" app some development love early in the year."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:238
 msgid ""
-"* Regrettably, we didn't get to see too many talks at the Congress, as we"
-" were so busy meeting with people. We plan to catch up and `watch them "
-"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and"
-" Jacob's talk was great. We hear that the cryptography talks were good as"
-" well."
+"* Regrettably, we didn't get to see too many talks at the Congress, as we "
+"were so busy meeting with people. We plan to catch up and `watch them "
+"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and "
+"Jacob's talk was great. We hear that the cryptography talks were good as "
+"well."
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:1
@@ -3721,13 +3454,11 @@ msgstr ""
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:13
 msgid ""
 "0.9.18 contains several bug fixes and performance improvements.\n"
-"We have shortened the startup time, and reduced latency throughout our "
-"network protocols.\n"
+"We have shortened the startup time, and reduced latency throughout our network protocols.\n"
 "We've increased the default connection limits for the fastest routers,\n"
 "and reduced the thread usage in i2ptunnel.\n"
 "UPnP fixes should improve handling of external device changes.\n"
-"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP "
-"fixes."
+"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP fixes."
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:33
@@ -3735,7 +3466,8 @@ msgid "Fix parsing of ECDSA address helper in HTTP client proxy"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:34
-msgid "Fix news last-modified processing which prevented notification of update"
+msgid ""
+"Fix news last-modified processing which prevented notification of update"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:35
@@ -3772,8 +3504,7 @@ msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:46
 msgid ""
-"Add startup browser configuration with advanced config "
-"routerconsole.browser"
+"Add startup browser configuration with advanced config routerconsole.browser"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:47
@@ -3835,21 +3566,16 @@ msgstr ""
 msgid ""
 "0.9.19 has several fixes and improvements for floodfill performance.\n"
 "Many of you saw high CPU usage after 0.9.18 was released.\n"
-"This was caused by a combination of increased encryption usage, the big "
-"influx of Vuze users into the network,\n"
-"reduced floodfills due to tighter performance requirements, and some "
-"longstanding bugs.\n"
+"This was caused by a combination of increased encryption usage, the big influx of Vuze users into the network,\n"
+"reduced floodfills due to tighter performance requirements, and some longstanding bugs.\n"
 "Things should be a lot better after most of the network has updated.\n"
-"As always, the best way to reduce CPU usage is to lower your bandwidth "
-"limits."
+"As always, the best way to reduce CPU usage is to lower your bandwidth limits."
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:21
 msgid ""
-"We've also added new ways to reseed manually, and to generate a reseed "
-"file you can easily share with others who need it.\n"
-"See the reseed configuration page in the router console for more "
-"information."
+"We've also added new ways to reseed manually, and to generate a reseed file you can easily share with others who need it.\n"
+"See the reseed configuration page in the router console for more information."
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:35
@@ -3915,7 +3641,8 @@ msgid "Increase min and default bandwidth for i2psnark"
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:58
-msgid "Improved strategies for dropping jobs on high job lag to prevent overload"
+msgid ""
+"Improved strategies for dropping jobs on high job lag to prevent overload"
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:59
@@ -3955,35 +3682,28 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:13
 msgid ""
-"0.9.20 contains many important bug fixes, and several changes to increase"
-" floodfill capacity in the network."
+"0.9.20 contains many important bug fixes, and several changes to increase "
+"floodfill capacity in the network."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:17
 msgid ""
-"Routers configured for 32-64 KB of shared bandwidth may now become "
-"floodfill,\n"
-"and routers configured for 512 KB or more of shared bandwidth will have "
-"higher connection limits.\n"
+"Routers configured for 32-64 KB of shared bandwidth may now become floodfill,\n"
+"and routers configured for 512 KB or more of shared bandwidth will have higher connection limits.\n"
 "These changes may cause your router to use more resources.\n"
-"If the router becomes too busy, the best way to reduce usage is to lower "
-"the bandwidth settings in your console.\n"
-"If that doesn't help, you may now disable automatic floodfill on the "
-"advanced configuration page in the console."
+"If the router becomes too busy, the best way to reduce usage is to lower the bandwidth settings in your console.\n"
+"If that doesn't help, you may now disable automatic floodfill on the advanced configuration page in the console."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:25
 msgid ""
-"We're hopeful that these changes will increase network capacity and "
-"performance,\n"
-"and reduce the congestion that's been affecting the network the last "
-"three months."
+"We're hopeful that these changes will increase network capacity and performance,\n"
+"and reduce the congestion that's been affecting the network the last three months."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:35
 msgid ""
-"Finally, we're excited to announce our first-ever I2P meetup, in Toronto "
-"August 15-16.\n"
+"Finally, we're excited to announce our first-ever I2P meetup, in Toronto August 15-16.\n"
 "There will be lots of presentations and tutorials. All are welcome.\n"
 "For more information, see the `announcement`_."
 msgstr ""
@@ -4002,8 +3722,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:53
 msgid ""
-"Raise connection limits for new classes 'P' (512-2000 KBps share "
-"bandwidth) and 'X' (over 2000 KBps)"
+"Raise connection limits for new classes 'P' (512-2000 KBps share bandwidth) "
+"and 'X' (over 2000 KBps)"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:54
@@ -4015,7 +3735,8 @@ msgid "Clock skew fixes"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:62
-msgid "Fixes and configuration for when IPv4 is firewalled but IPv6 still works"
+msgid ""
+"Fixes and configuration for when IPv4 is firewalled but IPv6 still works"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:63
@@ -4088,8 +3809,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:86
 msgid ""
-"Add Bloom filter warning when configured for high bandwidth but not "
-"enough memory"
+"Add Bloom filter warning when configured for high bandwidth but not enough "
+"memory"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:87
@@ -4102,8 +3823,7 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:89
 msgid ""
-"Better error handling and user feedback when HTTP client tunnel is "
-"disabled"
+"Better error handling and user feedback when HTTP client tunnel is disabled"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:90
@@ -4136,19 +3856,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:13
 msgid ""
-"The I2P team is proud to announce that we are going to host a meetup in "
-"Toronto on August 15-16.\n"
-"A number of members of our community will be attending and are going to "
-"host talks, workshops and discussions about and relating to I2P. This "
-"event is not just for I2P people though, it's meant for everyone."
+"The I2P team is proud to announce that we are going to host a meetup in Toronto on August 15-16.\n"
+"A number of members of our community will be attending and are going to host talks, workshops and discussions about and relating to I2P. This event is not just for I2P people though, it's meant for everyone."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:18
 msgid ""
-"If you're curious about I2P, interested in privacy/cryptography/anonymity"
-" or just want to come by and talk to us, please do. This is an event for "
-"everyone. If you're not familiar with any of these topics, come by anyway"
-" and we'll show you how I2P works and what you can do with it.\n"
+"If you're curious about I2P, interested in privacy/cryptography/anonymity or just want to come by and talk to us, please do. This is an event for everyone. If you're not familiar with any of these topics, come by anyway and we'll show you how I2P works and what you can do with it.\n"
 "\n"
 "The event is entirely free, you don't need to sign up or register."
 msgstr ""
@@ -4156,9 +3870,9 @@ msgstr ""
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:24
 msgid ""
 "The meetup couldn't have been arranged without our friends at `Toronto "
-"Crypto <https://torontocrypto.org/>`_ which have been helping us organize"
-" the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are"
-" providing us with a very nice space."
+"Crypto <https://torontocrypto.org/>`_ which have been helping us organize "
+"the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are "
+"providing us with a very nice space."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:28
@@ -4186,9 +3900,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:55
 msgid ""
-"The focus will be on an introduction to topics surrounding I2P, privacy "
-"and anonymity online. People of all backgrounds and knowledge levels are "
-"welcome to attend."
+"The focus will be on an introduction to topics surrounding I2P, privacy and "
+"anonymity online. People of all backgrounds and knowledge levels are welcome"
+" to attend."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:59
@@ -4205,9 +3919,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:63
 msgid ""
-"The crypto party will contain a number of stations where "
-"privacy/anonymity software will be demoed. The goal is to provide people "
-"with the tools they need to communicate securely."
+"The crypto party will contain a number of stations where privacy/anonymity "
+"software will be demoed. The goal is to provide people with the tools they "
+"need to communicate securely."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:67
@@ -4228,11 +3942,10 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:72
 msgid ""
-"We're currently looking for help staffing the stations. If you want to "
-"help out, you can! Bring a monitor/laptop and run a station. The station "
-"could be any of the ones listed above, or any other privacy/anonymity "
-"related one you would like to run. Please contact us at `@geti2p`_ if "
-"you're interested."
+"We're currently looking for help staffing the stations. If you want to help "
+"out, you can! Bring a monitor/laptop and run a station. The station could be"
+" any of the ones listed above, or any other privacy/anonymity related one "
+"you would like to run. Please contact us at `@geti2p`_ if you're interested."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:81
@@ -4242,8 +3955,8 @@ msgstr ""
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:86
 msgid ""
 "The focus will be on in-depth topics surrounding I2P, the roadmap and "
-"development. Anyone is welcome to attend, but the content will be "
-"somewhat technical."
+"development. Anyone is welcome to attend, but the content will be somewhat "
+"technical."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:90
@@ -4279,35 +3992,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:14
 msgid ""
-"I2PCon is the first event of its kind. It has two short term goals. Where"
-" the\n"
-"first one is to provide the general public with an event where knowledge "
-"about\n"
-"privacy and privacy concerns can be obtained. The second goal is to "
-"further the\n"
-"I2P project and its community. This will take the shape of technical "
-"discussions\n"
+"I2PCon is the first event of its kind. It has two short term goals. Where the\n"
+"first one is to provide the general public with an event where knowledge about\n"
+"privacy and privacy concerns can be obtained. The second goal is to further the\n"
+"I2P project and its community. This will take the shape of technical discussions\n"
 "about cryptography, anonymity and I2P centric topics."
 msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:22
 msgid ""
-"There is a larger and more long-term goal of this event, and it is to "
-"build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we would like to provide a forum where this "
-"community\n"
+"There is a larger and more long-term goal of this event, and it is to build a\n"
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we would like to provide a forum where this community\n"
 "can grow."
 msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:29
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
-"`Toronto Crypto`_. The venue and everything relating to it is provided by"
-"\n"
-"`Hacklab`_. Without either of them this event would not have been "
-"possible, so\n"
+"`Toronto Crypto`_. The venue and everything relating to it is provided by\n"
+"`Hacklab`_. Without either of them this event would not have been possible, so\n"
 "thank you both."
 msgstr ""
 
@@ -4317,12 +4021,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:49
 msgid ""
-"I2PCon is entirely free to attend! We ask you to register `here`__, to "
-"give us\n"
-"an estimate of how many people will be attending. No identifying "
-"information has\n"
-"to be given in order to register, but if you have any concerns, please "
-"let us\n"
+"I2PCon is entirely free to attend! We ask you to register `here`__, to give us\n"
+"an estimate of how many people will be attending. No identifying information has\n"
+"to be given in order to register, but if you have any concerns, please let us\n"
 "know."
 msgstr ""
 
@@ -4367,24 +4068,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:13
 msgid ""
-"0.9.21 contains several changes to add capacity to the network, increase "
-"the efficiency of the floodfills,\n"
+"0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\n"
 "and use bandwidth more effectively.\n"
-"We have migrated the shared clients tunnels to ECDSA signatures and added"
-" a DSA fallback\n"
-"using the new \"multisession\" capability for those sites that don't "
-"support ECDSA."
-msgstr ""
-"Wersja 0.9.21 zawiera kilka istotnych zmian zwiększających przepustowość "
-"sieci, zwiększa efektywność floodfilów, i używa transferu sieciowego "
-"bardziej efektywnie. Przeszliśmy na sygnatury ECDSA dla tuneli "
-"współdzielonych klientów i dodaliśmy wsparcie \"na zapas\" dla DSA "
-"używając \"wielo-sesyjności\" dla stron nie wspierających ECDSA."
+"We have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\n"
+"using the new \"multisession\" capability for those sites that don't support ECDSA."
+msgstr "Wersja 0.9.21 zawiera kilka istotnych zmian zwiększających przepustowość sieci, zwiększa efektywność floodfilów, i używa transferu sieciowego bardziej efektywnie. Przeszliśmy na sygnatury ECDSA dla tuneli współdzielonych klientów i dodaliśmy wsparcie \"na zapas\" dla DSA używając \"wielo-sesyjności\" dla stron nie wspierających ECDSA."
 
 #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:20
 msgid ""
-"The speakers and the schedule of the I2PCon in Toronto 2015 have been "
-"announced.\n"
+"The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.\n"
 "Have a look on the `I2PCon page`_ for details.\n"
 "Reserve your seat on `Eventbrite`_."
 msgstr ""
@@ -4496,21 +4188,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:14
 msgid ""
-"I2PCon has been a giant success. For us, the I2P contributors, it "
-"represents a\n"
-"leap forward in terms of what we're capable of pulling off as a "
-"community, how we\n"
-"communicate the usecases of I2P and reach out to privacy conscious "
-"individuals.\n"
+"I2PCon has been a giant success. For us, the I2P contributors, it represents a\n"
+"leap forward in terms of what we're capable of pulling off as a community, how we\n"
+"communicate the usecases of I2P and reach out to privacy conscious individuals.\n"
 "\n"
-"By arranging this event, we've also grown our community. People who've "
-"previously\n"
-"only lurked on our irc channels, or run our software or possibly hadn't "
-"even heard\n"
+"By arranging this event, we've also grown our community. People who've previously\n"
+"only lurked on our irc channels, or run our software or possibly hadn't even heard\n"
 "of I2P are now a part of our comminuty.\n"
 "\n"
-"This event has been our first active step towards building a large and "
-"inclusive\n"
+"This event has been our first active step towards building a large and inclusive\n"
 "community, and as such it's been great success."
 msgstr ""
 
@@ -4518,11 +4204,9 @@ msgstr ""
 msgid ""
 "Minutiae\n"
 "========\n"
-"On day 2 we had two short discussion sessions. A more general discussion "
-"and a roadmapping discussion.\n"
+"On day 2 we had two short discussion sessions. A more general discussion and a roadmapping discussion.\n"
 "\n"
-"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P "
-"Discussion session minutiae`_."
+"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P Discussion session minutiae`_."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:37
@@ -4551,32 +4235,25 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:62
 msgid ""
-"We've had some wonderful speakers, from both inside- and outside of our "
-"community.\n"
+"We've had some wonderful speakers, from both inside- and outside of our community.\n"
 "\n"
-"`David Dagon`_ talked to us about the way forward and how I2P could "
-"handle potential abuse.\n"
+"`David Dagon`_ talked to us about the way forward and how I2P could handle potential abuse.\n"
 "\n"
-"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us"
-" his thoughts about how far I2P has come.\n"
+"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us his thoughts about how far I2P has come.\n"
 "\n"
-"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and "
-"why you should care."
+"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and why you should care."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:72
 msgid ""
-"I would also like to thank the speakers from our community. `psi`_, "
-"`@str4d`_ and `zzz`_  who all had\n"
-"wonderful talks. Improving our ability to inform people about I2P is "
-"something that\n"
+"I would also like to thank the speakers from our community. `psi`_, `@str4d`_ and `zzz`_  who all had\n"
+"wonderful talks. Improving our ability to inform people about I2P is something that\n"
 "is going to be important for us going forward."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:78
 msgid ""
-"I would like to thank `Sadie`_ and Siew for helping us out with marketing"
-" and graphics.\n"
+"I would like to thank `Sadie`_ and Siew for helping us out with marketing and graphics.\n"
 "Without you I2PCon would've been a very different event."
 msgstr ""
 
@@ -4588,43 +4265,39 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:87
 msgid ""
-"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto "
-"Crypto`_ for their help during the event."
+"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto Crypto`_ "
+"for their help during the event."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:91
 msgid ""
-"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV "
-"and doing all of the post-production\n"
+"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV and doing all of the post-production\n"
 "work for the videos of all the talks."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:96
 msgid ""
-"I would like to thank `@killyourtv_i2p`_ for hosting a very popular "
-"crypto party station."
+"I would like to thank `@killyourtv_i2p`_ for hosting a very popular crypto "
+"party station."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:100
 msgid ""
-"Thanks to our new favorite journalist `@robinlevinson`_, for showing an "
-"interest in our cause and\n"
+"Thanks to our new favorite journalist `@robinlevinson`_, for showing an interest in our cause and\n"
 "educating yourself about the technologies involved."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:105
 msgid ""
-"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very "
-"much made this event better."
+"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very much "
+"made this event better."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:109
 msgid ""
-"Finally I would like to thank everyone else who just showed up to the "
-"event and helped out in any way\n"
+"Finally I would like to thank everyone else who just showed up to the event and helped out in any way\n"
 "they could.\n"
-"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was "
-"most excellent to hang out\n"
+"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was most excellent to hang out\n"
 "with you."
 msgstr ""
 
@@ -4641,27 +4314,11 @@ msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:13
 msgid ""
-"0.9.22 contains fixes for i2psnark getting stuck before completion, and "
-"begins the migration of router infos to new, stronger Ed25519 signatures."
-"\n"
-"To reduce network churn, your router will have only a small probability "
-"of converting to Ed25519 at each restart.\n"
-"When it does rekey, expect to see lower bandwidth usage for a couple of "
-"days as it reintegrates into the network with its new identity.\n"
-"If all goes well, we will accelerate the rekeying process in the next "
-"release."
-msgstr ""
-"0.9.22 poprawia błąd polegający na zacinaniu się i2psnark, zanim zakończy"
-" pracÄ™, oraz wprowadza nowy i silniejszy rodzaj sygnatur cyfrowych dla "
-"routerów - Ed25519.\n"
-"Aby zredukować potencjalny chaos w sieci, sygnatury wymieniane są "
-"stopniowo - Twój router będzie miał niedużą szansę, że zmieni swój typ "
-"sygnatury podczas każdego uruchomienia.\n"
-"Gdy router wymienia swój klucz, operator może spodziewać się mniejszego "
-"wykorzystania zasobów sieciowych na kilka następnych dni. Wynika to "
-"oczywiście z konieczności ponownej integracji z całą siecią.\n"
-"Jeżeli wszystko pójdzie po naszej myśli, przyspieszymy proces wymiany "
-"kluczy w następnym wydaniu."
+"0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\n"
+"To reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\n"
+"When it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\n"
+"If all goes well, we will accelerate the rekeying process in the next release."
+msgstr "0.9.22 poprawia błąd polegający na zacinaniu się i2psnark, zanim zakończy pracę, oraz wprowadza nowy i silniejszy rodzaj sygnatur cyfrowych dla routerów - Ed25519.\nAby zredukować potencjalny chaos w sieci, sygnatury wymieniane są stopniowo - Twój router będzie miał niedużą szansę, że zmieni swój typ sygnatury podczas każdego uruchomienia.\nGdy router wymienia swój klucz, operator może spodziewać się mniejszego wykorzystania zasobów sieciowych na kilka następnych dni. Wynika to oczywiście z konieczności ponownej integracji z całą siecią.\nJeżeli wszystko pójdzie po naszej myśli, przyspieszymy proces wymiany kluczy w następnym wydaniu."
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:20
 msgid ""
@@ -4679,14 +4336,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:46
 msgid ""
-"Fix i2psnark getting stuck before download complete, and not deleting "
-"temp files"
+"Fix i2psnark getting stuck before download complete, and not deleting temp "
+"files"
 msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:47
 msgid ""
-"Fix starting of torrents added by copying torrent file to i2psnark "
-"directory"
+"Fix starting of torrents added by copying torrent file to i2psnark directory"
 msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:48
@@ -4715,10 +4371,8 @@ msgstr ""
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:15
 msgid ""
 "Greetings!\n"
-"This is the first in a long series of blogs to help the community see "
-"what is happening in the I2P community.\n"
-"Since many awesome events are happening *inside* the network, we think it"
-" will be worthwhile to talk about some of activities here."
+"This is the first in a long series of blogs to help the community see what is happening in the I2P community.\n"
+"Since many awesome events are happening *inside* the network, we think it will be worthwhile to talk about some of activities here."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:21
@@ -4729,16 +4383,14 @@ msgstr ""
 msgid ""
 "Let's face it -- our console needs improvement.\n"
 "Our site could use an update as well.\n"
-"We are looking for feedback on how to improve the usability of I2P for "
-"new and existing users!"
+"We are looking for feedback on how to improve the usability of I2P for new and existing users!"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:29
 msgid ""
 "Any and all feedback is welcome.\n"
 "Please contact `@GetI2P`_, `@str4d`_, or `@YrB1rd`_.\n"
-"If you don't feel comfortable using Twitter, we are always available via "
-"the in-network IRC channel.\n"
+"If you don't feel comfortable using Twitter, we are always available via the in-network IRC channel.\n"
 "You don't have to be a long time user.\n"
 "We want to hear from all sorts of people!"
 msgstr ""
@@ -4750,36 +4402,27 @@ msgstr ""
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:43
 msgid ""
 "On 03 November there was an I2P developer meeting (`log`_).\n"
-"This meeting focused on adding new links to the router console, "
-"preparation for CCC, finding a replacement for forum.i2p, and website "
-"improvements."
+"This meeting focused on adding new links to the router console, preparation for CCC, finding a replacement for forum.i2p, and website improvements."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:50
 msgid ""
 "The consensus was to not add dogecoindark.i2p.\n"
-"There are concerns about usability due to many images being included on "
-"the page.\n"
-"Exchanged.i2p is conditionally added, as long as the maintainer adds a "
-"disclaimer on the site.\n"
-"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was "
-"lenta.i2p (a russian news site)."
+"There are concerns about usability due to many images being included on the page.\n"
+"Exchanged.i2p is conditionally added, as long as the maintainer adds a disclaimer on the site.\n"
+"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was lenta.i2p (a russian news site)."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:57
 msgid ""
-"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used"
-" for developer's services.\n"
-"He also suggested a more formalized technical proposal system, with more "
-"prominence on the main website."
+"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used for developer's services.\n"
+"He also suggested a more formalized technical proposal system, with more prominence on the main website."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:62
 msgid ""
-"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos "
-"Computer Congress.\n"
-"More details are to come on this, but we can promise there will be "
-"stickers."
+"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos Computer Congress.\n"
+"More details are to come on this, but we can promise there will be stickers."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:67
@@ -4787,13 +4430,14 @@ msgid "General Announcements"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:69
-msgid "Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!"
+msgid ""
+"Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:75
 msgid ""
-"Translation deadline Thursday, 12 November, translators please update. "
-"All translations are done via `Transifex`_ ."
+"Translation deadline Thursday, 12 November, translators please update. All "
+"translations are done via `Transifex`_ ."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:1
@@ -4807,21 +4451,14 @@ msgstr ""
 msgid ""
 "0.9.23 contains a variety of bug fixes, and some minor improvements in "
 "I2PSnark"
-msgstr ""
-"Wersja 0.9.23 zawiera rozmaite poprawki błędów oraz niewielkie ulepszenia"
-" w I2PSnark"
+msgstr "Wersja 0.9.23 zawiera rozmaite poprawki błędów oraz niewielkie ulepszenia w I2PSnark"
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:13
 msgid ""
-"Hello I2P! This is the first release signed by me (str4d), after 49 "
-"releases\n"
-"signed by zzz. This is an important test of our redundancy for all "
-"things,\n"
+"Hello I2P! This is the first release signed by me (str4d), after 49 releases\n"
+"signed by zzz. This is an important test of our redundancy for all things,\n"
 "including people."
-msgstr ""
-"Witaj l2P! Jest to pierwsze wydanie podpisane przeze mnie (str4d), po "
-"wydaniach w wersji 49 podpisanej przez zzz. Jest to ważny test naszego "
-"nadmiaru wszytkich rzeczy, wliczajÄ…c ludzi."
+msgstr "Witaj l2P! Jest to pierwsze wydanie podpisane przeze mnie (str4d), po wydaniach w wersji 49 podpisanej przez zzz. Jest to ważny test naszego nadmiaru wszytkich rzeczy, wliczając ludzi."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:19
 msgid "Housekeeping"
@@ -4829,29 +4466,20 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:24
 msgid ""
-"My signing key has been in router updates for over two years (since "
-"0.9.9), so\n"
-"if you are on a recent version of I2P this update should be just as easy "
-"as\n"
-"every other update. However, if you are running an older version than "
-"0.9.9, you\n"
-"will first need to manually update to a recent version. Update files for "
-"recent\n"
-"versions `can be downloaded here`__, and instructions on how to manually "
-"update\n"
-"`are provided here`__. Once you have manually updated, your router will "
-"then find\n"
+"My signing key has been in router updates for over two years (since 0.9.9), so\n"
+"if you are on a recent version of I2P this update should be just as easy as\n"
+"every other update. However, if you are running an older version than 0.9.9, you\n"
+"will first need to manually update to a recent version. Update files for recent\n"
+"versions `can be downloaded here`__, and instructions on how to manually update\n"
+"`are provided here`__. Once you have manually updated, your router will then find\n"
 "and download the 0.9.23 update as usual."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:38
 msgid ""
-"If you installed I2P via a package manager, you are not affected by the "
-"change,\n"
+"If you installed I2P via a package manager, you are not affected by the change,\n"
 "and can update as usual."
-msgstr ""
-"Jeżeli zainstalowałeś l2P za pomocą menadżera pakietów, zmiana nie ma na "
-"ciebie wpływu, i możesz dokonać aktualizacji tak jak zazwyczaj."
+msgstr "Jeżeli zainstalowałeś l2P za pomocą menadżera pakietów, zmiana nie ma na ciebie wpływu, i możesz dokonać aktualizacji tak jak zazwyczaj."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:43
 msgid ""
@@ -4861,46 +4489,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:48
 msgid ""
-"The migration of RouterInfos to new, stronger Ed25519 signatures is going"
-" well,\n"
-"with at least half of the network already estimated to have rekeyed. This"
-"\n"
-"release accelerates the rekeying process. To reduce network churn, your "
-"router\n"
-"will have a small probability of converting to Ed25519 at each restart. "
-"When it\n"
-"does rekey, expect to see lower bandwidth usage for a couple of days as "
-"it\n"
+"The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\n"
+"with at least half of the network already estimated to have rekeyed. This\n"
+"release accelerates the rekeying process. To reduce network churn, your router\n"
+"will have a small probability of converting to Ed25519 at each restart. When it\n"
+"does rekey, expect to see lower bandwidth usage for a couple of days as it\n"
 "reintegrates into the network with its new identity."
-msgstr ""
-"Migracja identyfikatorów węzłów do nowszych, mocniejszych sygnatur "
-"Ed25519 idzie sprawnie, co najmniej połowa sieci wymieniła swoje klucze. "
-"To wydanie przyspiesza proces wymiany kluczy, Aby zapobiec paraliżowi "
-"sieci Twój ruter ma niewielkie prawdopodobieństwo przejścia na Ed25519 "
-"przy każdym restarcie. Po zmianie klucza spodziewaj się mniejszego ruchu "
-"przez klika dni, aż węzeł zintegruje się do sieci z nową sygnaturą."
+msgstr "Migracja identyfikatorów węzłów do nowszych, mocniejszych sygnatur Ed25519 idzie sprawnie, co najmniej połowa sieci wymieniła swoje klucze. To wydanie przyspiesza proces wymiany kluczy, Aby zapobiec paraliżowi sieci Twój ruter ma niewielkie prawdopodobieństwo przejścia na Ed25519 przy każdym restarcie. Po zmianie klucza spodziewaj się mniejszego ruchu przez klika dni, aż węzeł zintegruje się do sieci z nową sygnaturą."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:57
 msgid ""
-"Note that this will be the last release to support Java 6. Please update "
-"to\n"
-"Java 7 or 8 as soon as possible. We are already working to make I2P "
-"compatible\n"
+"Note that this will be the last release to support Java 6. Please update to\n"
+"Java 7 or 8 as soon as possible. We are already working to make I2P compatible\n"
 "with the upcoming Java 9, and some of that work is in this release."
-msgstr ""
-"Zwróć proszę uwagę, że będzie to ostatnie wydanie, które wspiera Javę 6. "
-"Wskazana jest jak najszybsza aktualizacja Javy do wersji 7 lub 8. W "
-"chwili obecnej pracujemy również nad wsparciem I2P dla Javy 9. Część "
-"efektów naszych działań znajduje się już w niniejszej wersji."
+msgstr "Zwróć proszę uwagę, że będzie to ostatnie wydanie, które wspiera Javę 6. Wskazana jest jak najszybsza aktualizacja Javy do wersji 7 lub 8. W chwili obecnej pracujemy również nad wsparciem I2P dla Javy 9. Część efektów naszych działań znajduje się już w niniejszej wersji."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:63
 msgid ""
-"We have also made some minor improvements in I2PSnark, and added a new "
-"page in\n"
+"We have also made some minor improvements in I2PSnark, and added a new page in\n"
 "the routerconsole for viewing older news items."
-msgstr ""
-"Wprowadziliśmy również parę udoskonaleń w I2PSnark, a także dodaliśmy "
-"nową stronę w konsoli routera z przeglądarką starszych aktualności."
+msgstr "Wprowadziliśmy również parę udoskonaleń w I2PSnark, a także dodaliśmy nową stronę w konsoli routera z przeglądarką starszych aktualności."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:78
 msgid "Accelerate transition to Ed25519"
@@ -4908,14 +4516,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:83
 msgid ""
-"Fix some bugs soft restarting after a large clock shift (e.g. resume) "
-"(but more to do)"
+"Fix some bugs soft restarting after a large clock shift (e.g. resume) (but "
+"more to do)"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:84
 msgid ""
-"Fix streaming retransmission timers that were dying, and related timer "
-"bugs"
+"Fix streaming retransmission timers that were dying, and related timer bugs"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:85
@@ -4959,7 +4566,8 @@ msgid "Detect for broken ECDSA support in Gentoo"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:98
-msgid "Console: Add a Java 6 warning, this is the last release to support Java 6"
+msgid ""
+"Console: Add a Java 6 warning, this is the last release to support Java 6"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:99
@@ -4968,8 +4576,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:100
 msgid ""
-"Pass Accept-Encoding header through client and server proxies, to allow "
-"end-to-end compression"
+"Pass Accept-Encoding header through client and server proxies, to allow end-"
+"to-end compression"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:103
@@ -4985,7 +4593,8 @@ msgid "Save magnet parameters across restart"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:106
-msgid "Don't delete .torrent file on errors at startup, rename to .torrent.BAD"
+msgid ""
+"Don't delete .torrent file on errors at startup, rename to .torrent.BAD"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:107
@@ -5017,8 +4626,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:13
 msgid ""
-"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and "
-"eche|on."
+"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and eche|on."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:17
@@ -5026,21 +4634,15 @@ msgid ""
 "Start\n"
 "=====\n"
 "The project has had another successful year at CCC.\n"
-"We would like to thank the volunteers at `32C3`__ for all of their help "
-"in organizing this event and for being accommodating hosts for us.\n"
-"Many I2P contributors were able to attend this year's Congress due to "
-"many of the generous donations from supporters like you to the project.\n"
-"If you would like to fund I2P, please see `our donation page`__ for more "
-"information."
+"We would like to thank the volunteers at `32C3`__ for all of their help in organizing this event and for being accommodating hosts for us.\n"
+"Many I2P contributors were able to attend this year's Congress due to many of the generous donations from supporters like you to the project.\n"
+"If you would like to fund I2P, please see `our donation page`__ for more information."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:29
 msgid ""
-"Just like previous years we were located in Noisy Square, located near "
-"the EFF's table.\n"
-"This proved to be an ideal spot for us as our table was almost always "
-"busy with current and new users who were interested in I2P, many of whom "
-"we wouldn't have otherwise had the ability to talk to."
+"Just like previous years we were located in Noisy Square, located near the EFF's table.\n"
+"This proved to be an ideal spot for us as our table was almost always busy with current and new users who were interested in I2P, many of whom we wouldn't have otherwise had the ability to talk to."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:63
@@ -5055,13 +4657,10 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:72
 msgid ""
-"If you don't know what a reseed server is, it is first the connection new"
-" routers use to find peers.\n"
-"There was a lot of discussion around the current status of the reseed "
-"network right now.\n"
+"If you don't know what a reseed server is, it is first the connection new routers use to find peers.\n"
+"There was a lot of discussion around the current status of the reseed network right now.\n"
 "As always, more reseed operators are needed!\n"
-"If you would like to strengthen the reseed infrastructure, (or if you're "
-"talented with Go) email `backup -at- i2pmail.org`__."
+"If you would like to strengthen the reseed infrastructure, (or if you're talented with Go) email `backup -at- i2pmail.org`__."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:81
@@ -5072,16 +4671,11 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:86
 msgid ""
-"Due to the decentralized nature of I2P detecting Sybil attacks is not as "
-"straight forward as on other networks (i.e. Tor).\n"
-"To mitigate this zzz has been working on a new router-based Sybil "
-"detection tool.\n"
-"To be brief, the tool runs in the router, and collects information on "
-"floodfills your router is currently aware of.\n"
-"Currently the tool is mainly collecting a baseline and does not act on "
-"any of the information it is collecting.\n"
-"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as "
-"it is still in active development"
+"Due to the decentralized nature of I2P detecting Sybil attacks is not as straight forward as on other networks (i.e. Tor).\n"
+"To mitigate this zzz has been working on a new router-based Sybil detection tool.\n"
+"To be brief, the tool runs in the router, and collects information on floodfills your router is currently aware of.\n"
+"Currently the tool is mainly collecting a baseline and does not act on any of the information it is collecting.\n"
+"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as it is still in active development"
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:94
@@ -5093,21 +4687,15 @@ msgstr ""
 #: i2p2www/blog/2016/01/23/32C3.rst:99
 msgid ""
 "On the 30th we held an in person `meeting`__ at our table.\n"
-"The meeting focused on organizationally preparing for more project "
-"management, and public relations (both from Sadie)."
+"The meeting focused on organizationally preparing for more project management, and public relations (both from Sadie)."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:106
 msgid ""
-"We discussed how much of the work done on I2P is lost in the commits and "
-"there is not much to see for our users.\n"
-"To remedy this lazygravy plans on preparing a series of posts explaining "
-"some technical topics in I2P.\n"
-"The initial ideas that we discussed writing posts on are what encrypted "
-"lease sets are, why different tunnel types are needed, and some "
-"observations seen in `I2Spy`__.\n"
-"But these are just the start and we would like to hear feedback on topics"
-" we should write about!"
+"We discussed how much of the work done on I2P is lost in the commits and there is not much to see for our users.\n"
+"To remedy this lazygravy plans on preparing a series of posts explaining some technical topics in I2P.\n"
+"The initial ideas that we discussed writing posts on are what encrypted lease sets are, why different tunnel types are needed, and some observations seen in `I2Spy`__.\n"
+"But these are just the start and we would like to hear feedback on topics we should write about!"
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:115
@@ -5181,37 +4769,25 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:18
 msgid ""
-"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and "
-"efficiency improvements.\n"
+"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and efficiency improvements.\n"
 "Note that this release is the first to require Java 7.\n"
 "Please update to Java 7 or 8 as soon as possible.\n"
 "Your router will not automatically update if you are using Java 6."
-msgstr ""
-"Wersja 0.9.24 wprowadza nowÄ… wersjÄ™ mostka SAM (v3.2) i rozmaite poprawki"
-" błędów i ulepszenia wydajnościowe.\n"
-"Zauważ, że to wydanie jest pierwszym, które wymaga Javy 7.\n"
-"ProszÄ™ zaktualizuj JavÄ™ do wersji 7 lub 8 jak najszybciej.\n"
-"Twój węzeł nie zaktualizuje się automatycznie jeżeli wciąż używasz Javy 6."
+msgstr "Wersja 0.9.24 wprowadza nową wersję mostka SAM (v3.2) i rozmaite poprawki błędów i ulepszenia wydajnościowe.\nZauważ, że to wydanie jest pierwszym, które wymaga Javy 7.\nProszę zaktualizuj Javę do wersji 7 lub 8 jak najszybciej.\nTwój węzeł nie zaktualizuje się automatycznie jeżeli wciąż używasz Javy 6."
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:25
 msgid ""
-"To prevent the problems caused by the ancient commons-logging library, we"
-" have removed it.\n"
-"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by "
-"HungryHobo) to crash if they have IMAP enabled.\n"
-"The recommended fix is to replace your old I2P-Bote plugin with the "
-"current one signed by str4d.\n"
+"To prevent the problems caused by the ancient commons-logging library, we have removed it.\n"
+"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by HungryHobo) to crash if they have IMAP enabled.\n"
+"The recommended fix is to replace your old I2P-Bote plugin with the current one signed by str4d.\n"
 "For more details, see `this post`__."
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:34
 msgid ""
-"We had a great `32C3 Congress`__ and are making good progress on our 2016"
-" project plans.\n"
-"Echelon gave a talk on I2P's history and current status, and his slides "
-"are `available here`__ (pdf).\n"
-"Str4d attended `Real World Crypto`__ and gave a talk on our crypto "
-"migration, his slides are `here`__ (pdf)."
+"We had a great `32C3 Congress`__ and are making good progress on our 2016 project plans.\n"
+"Echelon gave a talk on I2P's history and current status, and his slides are `available here`__ (pdf).\n"
+"Str4d attended `Real World Crypto`__ and gave a talk on our crypto migration, his slides are `here`__ (pdf)."
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:58
@@ -5220,8 +4796,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:59
 msgid ""
-"SAM 3.2, with several new advanced features, command parser improvements,"
-" and lots of bug fixes"
+"SAM 3.2, with several new advanced features, command parser improvements, "
+"and lots of bug fixes"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:60
@@ -5246,8 +4822,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:69
 msgid ""
-"Don't remove tunnel on next-hop failure indication from transport, it "
-"isn't reliable"
+"Don't remove tunnel on next-hop failure indication from transport, it isn't "
+"reliable"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:70
@@ -5255,13 +4831,13 @@ msgid "Fix formatting in summary bar to prevent overflow"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:71
-msgid "Fix console links in i2ptunnel error pages when on nonstandard host/port"
+msgid ""
+"Fix console links in i2ptunnel error pages when on nonstandard host/port"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:72
 msgid ""
-"Don't query floodfills whose version is too old to support encrypted "
-"replies"
+"Don't query floodfills whose version is too old to support encrypted replies"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:73
@@ -5308,8 +4884,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:87
 msgid ""
-"Don't offer to introduce unless requested, to introduce only those that "
-"need it"
+"Don't offer to introduce unless requested, to introduce only those that need"
+" it"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:88
@@ -5392,29 +4968,17 @@ msgstr "Wersja 0.9.25 zawiera mostek SAM 3.3, kody QR i poprawki błędów"
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:18
 msgid ""
-"0.9.25 contains a major new version of SAM, v3.3, to support "
-"sophisticated multiprotocol applications.\n"
+"0.9.25 contains a major new version of SAM, v3.3, to support sophisticated multiprotocol applications.\n"
 "It adds QR codes for sharing hidden service addresses with others,\n"
 "and \"identicon\" images for visually distinguishing addresses."
-msgstr ""
-"Wersja 0.9.25 zawiera przede wszystkim nową wersję mostka SAM: 3.3, która"
-" zawiera wsparcie dla aplikacji wieloprotokołowych. \n"
-"Dodano też obsługę kodów QR, co pozwala na dzielenie się adresami "
-"ukrytych usług z innymi, i \"identicony\" dla łatwej wizualizacji i "
-"odróżniania adresów."
+msgstr "Wersja 0.9.25 zawiera przede wszystkim nową wersję mostka SAM: 3.3, która zawiera wsparcie dla aplikacji wieloprotokołowych. \nDodano też obsługę kodów QR, co pozwala na dzielenie się adresami ukrytych usług z innymi, i \"identicony\" dla łatwej wizualizacji i odróżniania adresów."
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:24
 msgid ""
 "We've added a new \"router family\" configuration page in the console,\n"
-"to make it easier to declare that your group of routers is run by a "
-"single person.\n"
-"There are several changes to increase the capacity of the network and "
-"hopefully improve tunnel build success."
-msgstr ""
-"Dodano do konsoli stronę konfiguracji \"Rodzina Węzłów\", która pozwala "
-"na łatwą deklarację, że Twoja grupa węzłów należy do jednej osoby. "
-"Wprowadzono kilka poprawek zwiększających przepustowość sieci i miejmy "
-"nadzieję zwiększających niezawodność tworzenia tuneli."
+"to make it easier to declare that your group of routers is run by a single person.\n"
+"There are several changes to increase the capacity of the network and hopefully improve tunnel build success."
+msgstr "Dodano do konsoli stronę konfiguracji \"Rodzina Węzłów\", która pozwala na łatwą deklarację, że Twoja grupa węzłów należy do jednej osoby. Wprowadzono kilka poprawek zwiększających przepustowość sieci i miejmy nadzieję zwiększających niezawodność tworzenia tuneli."
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:40
 msgid "Display of identicons and QR codes in address book and i2ptunnel"
@@ -5506,34 +5070,26 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:11
 msgid ""
 "We are pleased to announce that this summer, I2P will be embarking on a "
-"development program aimed at improving the privacy software ecosystem for"
-" both developers and users."
+"development program aimed at improving the privacy software ecosystem for "
+"both developers and users."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:13
 msgid ""
-"Over the last few years, the need for users to be in control of their own"
-" data\n"
-"has become increasingly apparent. Some excellent progress had been made "
-"in this\n"
-"regard with the rise of messaging apps like Signal_, and file storage "
-"systems\n"
-"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to "
-"the\n"
+"Over the last few years, the need for users to be in control of their own data\n"
+"has become increasingly apparent. Some excellent progress had been made in this\n"
+"regard with the rise of messaging apps like Signal_, and file storage systems\n"
+"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to the\n"
 "whole world is steadily gaining traction."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:21
 msgid ""
-"But building privacy and anonymity into applications is not trivial. Much"
-" of the\n"
-"software people use every day was not designed to be privacy-preserving, "
-"and the\n"
+"But building privacy and anonymity into applications is not trivial. Much of the\n"
+"software people use every day was not designed to be privacy-preserving, and the\n"
 "tools developers have available are generally not easy to work with. The\n"
-"recently-published OnionScan_ survey gives some insight into just how "
-"easy it is\n"
-"for even technical users to mis-configure their services, completely "
-"undermining\n"
+"recently-published OnionScan_ survey gives some insight into just how easy it is\n"
+"for even technical users to mis-configure their services, completely undermining\n"
 "their intentions."
 msgstr ""
 
@@ -5546,16 +5102,14 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:41
 msgid ""
 "We are pleased to announce that this summer, I2P will be embarking on a\n"
-"development program aimed at improving the privacy software ecosystem. "
-"Our goal\n"
-"is to make life easier both for developers wanting to leverage I2P in "
-"their\n"
-"applications, and for users trying to configure and run their apps "
-"through I2P."
+"development program aimed at improving the privacy software ecosystem. Our goal\n"
+"is to make life easier both for developers wanting to leverage I2P in their\n"
+"applications, and for users trying to configure and run their apps through I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:48
-msgid "We will be focusing our time this summer into three complementary areas:"
+msgid ""
+"We will be focusing our time this summer into three complementary areas:"
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:52
@@ -5566,19 +5120,15 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:57
 msgid ""
-"In June, we will be updating the various libraries that exist for "
-"interfacing\n"
-"with I2P. We have made significant progress this year on extending our "
-"SAM_ API\n"
-"with additional features, such as support for datagrams and ports. We "
-"plan to\n"
+"In June, we will be updating the various libraries that exist for interfacing\n"
+"with I2P. We have made significant progress this year on extending our SAM_ API\n"
+"with additional features, such as support for datagrams and ports. We plan to\n"
 "make these features easily accessible in our C++ and Python libraries."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:64
 msgid ""
-"We will also soon be making it much easier for Java and Android "
-"developers to\n"
+"We will also soon be making it much easier for Java and Android developers to\n"
 "add I2P support to their applications. Stay tuned!"
 msgstr ""
 
@@ -5590,18 +5140,12 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:76
 msgid ""
-"In July we will be working with applications that have expressed interest"
-" in\n"
-"adding support for I2P. There are some really neat ideas being developed "
-"in the\n"
-"privacy space right now, and we want to help their communities leverage "
-"over a\n"
-"decade of research and development on peer-to-peer anonymity. Extending "
-"these\n"
-"applications to work natively over I2P is a good step forward for "
-"usability, and\n"
-"in the process will improve how these applications think about and handle"
-" user\n"
+"In July we will be working with applications that have expressed interest in\n"
+"adding support for I2P. There are some really neat ideas being developed in the\n"
+"privacy space right now, and we want to help their communities leverage over a\n"
+"decade of research and development on peer-to-peer anonymity. Extending these\n"
+"applications to work natively over I2P is a good step forward for usability, and\n"
+"in the process will improve how these applications think about and handle user\n"
 "information."
 msgstr ""
 
@@ -5613,12 +5157,9 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:91
 msgid ""
-"Finally, in August we will turn out attention to the apps we bundle "
-"inside I2P,\n"
-"and the wider array of plugins. Some of these are due for some love, to "
-"make\n"
-"them more user-friendly - as well as fix any outstanding bugs! We hope "
-"that\n"
+"Finally, in August we will turn out attention to the apps we bundle inside I2P,\n"
+"and the wider array of plugins. Some of these are due for some love, to make\n"
+"them more user-friendly - as well as fix any outstanding bugs! We hope that\n"
 "longtime I2P supporters will enjoy the outcome of this work."
 msgstr ""
 
@@ -5633,14 +5174,10 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:104
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:131
 msgid ""
-"We have many more ideas for things we'd like to get done in these areas. "
-"If\n"
-"you're interested in hacking on privacy and anonymity software, designing"
-" usable\n"
-"websites or interfaces, or writing guides for users: come and chat with "
-"us on\n"
-"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our "
-"community, both\n"
+"We have many more ideas for things we'd like to get done in these areas. If\n"
+"you're interested in hacking on privacy and anonymity software, designing usable\n"
+"websites or interfaces, or writing guides for users: come and chat with us on\n"
+"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our community, both\n"
 "inside and outside I2P. We'll be sending I2P stickers out to all new\n"
 "contributors taking part (or possibly other pending I2P goodies)!"
 msgstr ""
@@ -5648,24 +5185,18 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:113
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:140
 msgid ""
-"Likewise, if you are an application developer who wants a hand with "
-"integrating\n"
-"I2P, or even just to chat about the concepts or details: get in touch! If"
-" you\n"
-"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ "
-"or\n"
-"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or "
-"FreeNode."
+"Likewise, if you are an application developer who wants a hand with integrating\n"
+"I2P, or even just to chat about the concepts or details: get in touch! If you\n"
+"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ or\n"
+"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or FreeNode."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:120
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:147
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:131
 msgid ""
-"We'll be posting here as we go, but you can also follow our progress, and"
-" share\n"
-"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring"
-" on the\n"
+"We'll be posting here as we go, but you can also follow our progress, and share\n"
+"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring on the\n"
 "summer!"
 msgstr ""
 
@@ -5678,11 +5209,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:11
 msgid ""
-"0.9.26 contains crypto updates, Debian packaging improvements, and bug "
-"fixes"
-msgstr ""
-"Wersja 0.9.26 zawiera ulepszenia algorytmów kryptograficznych, ulepszenia"
-" w paczkach Debiana, i poprawki błędów"
+"0.9.26 contains crypto updates, Debian packaging improvements, and bug fixes"
+msgstr "Wersja 0.9.26 zawiera ulepszenia algorytmów kryptograficznych, ulepszenia w paczkach Debiana, i poprawki błędów"
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:13
 msgid ""
@@ -5695,37 +5223,22 @@ msgid ""
 "0.9.26 contains a major upgrade to our native crypto library,\n"
 "a new addressbook subscription protocol with signatures,\n"
 "and major improvements to the Debian/Ubuntu packaging."
-msgstr ""
-"Wersja 0.9.26 dostarcza znaczÄ…ce ulepszenia natywnej biblioteki "
-"kryptograficznej, nowy protokół subskrypcji książki adresowej z obsługą "
-"sygnatur, i znaczÄ…ce ulepszenia w paczkach Debiana/Ubuntu."
+msgstr "Wersja 0.9.26 dostarcza znaczące ulepszenia natywnej biblioteki kryptograficznej, nowy protokół subskrypcji książki adresowej z obsługą sygnatur, i znaczące ulepszenia w paczkach Debiana/Ubuntu."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:31
 msgid ""
-"For crypto, we have upgraded to GMP 6.0.0, and added support for newer "
-"processors,\n"
+"For crypto, we have upgraded to GMP 6.0.0, and added support for newer processors,\n"
 "which will speed up crypto operations considerably.\n"
-"Also, we are now using constant-time GMP functions to prevent side-"
-"channel attacks.\n"
-"For caution, the GMP changes are enabled for new installs and "
-"Debian/Ubuntu builds only;\n"
+"Also, we are now using constant-time GMP functions to prevent side-channel attacks.\n"
+"For caution, the GMP changes are enabled for new installs and Debian/Ubuntu builds only;\n"
 "we will include them for in-net updates in the 0.9.27 release."
-msgstr ""
-"Kryptografia: GMP został uaktualniony do 6.0.0, i dodano wsparcie dla "
-"nowych procesorów, co znacząco przyspieszy operacje kryptograficzne. "
-"Rozpoczęliśmy używanie stało-czasowych funkcji GMP, aby zapobiec atakom "
-"typu \"side-channel\". Jak na razie, zmiany w GMP są włączone tylko na "
-"nowych instalacjach na Debianie/Ubuntu, zostanÄ… one wprowadzone dla "
-"wszystkich w wydaniu 0.9.27."
+msgstr "Kryptografia: GMP został uaktualniony do 6.0.0, i dodano wsparcie dla nowych procesorów, co znacząco przyspieszy operacje kryptograficzne. Rozpoczęliśmy używanie stało-czasowych funkcji GMP, aby zapobiec atakom typu \"side-channel\". Jak na razie, zmiany w GMP są włączone tylko na nowych instalacjach na Debianie/Ubuntu, zostaną one wprowadzone dla wszystkich w wydaniu 0.9.27."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:39
 msgid ""
-"For Debian/Ubuntu builds, we have added dependencies on several packages,"
-"\n"
+"For Debian/Ubuntu builds, we have added dependencies on several packages,\n"
 "including Jetty 8 and geoip, and removed the equivalent bundled code."
-msgstr ""
-"Dodano kilka zależności pakietów dla kompilacji Debiana/Ubuntu, takich "
-"jak Jetty 8 i geoip, oraz usunięto równoważny kod w programie."
+msgstr "Dodano kilka zależności pakietów dla kompilacji Debiana/Ubuntu, takich jak Jetty 8 i geoip, oraz usunięto równoważny kod w programie."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:44
 msgid ""
@@ -5735,10 +5248,10 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:59
 msgid ""
-"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant "
-"speedups on newer architectures, and constant-time crypto operations  "
-"(new installs and Debian/Ubuntu builds only, will include in the updates "
-"in the next release, 0.9.27)"
+"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant speedups "
+"on newer architectures, and constant-time crypto operations  (new installs "
+"and Debian/Ubuntu builds only, will include in the updates in the next "
+"release, 0.9.27)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:60
@@ -5751,8 +5264,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:62
 msgid ""
-"Enhance hosts blockfile format to allow for multiple destinations per "
-"entry"
+"Enhance hosts blockfile format to allow for multiple destinations per entry"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:63
@@ -5761,8 +5273,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:64
 msgid ""
-"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu "
-"packages"
+"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu packages"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:65
@@ -5780,8 +5291,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:67
 msgid ""
-"Enhancements to the desktopgui system tray feature, to be enabled by "
-"default in next release"
+"Enhancements to the desktopgui system tray feature, to be enabled by default"
+" in next release"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:68
@@ -5796,8 +5307,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:75
 msgid ""
-"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual"
-" fix)"
+"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual "
+"fix)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:76
@@ -5806,8 +5317,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:77
 msgid ""
-"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 "
-"for manual fix)"
+"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 for "
+"manual fix)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:78
@@ -5828,8 +5339,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:87
 msgid ""
-"Rework resource bundle generation for 20x speedup in build time (requires"
-" gettext version 0.19)"
+"Rework resource bundle generation for 20x speedup in build time (requires "
+"gettext version 0.19)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:1
@@ -5845,10 +5356,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:13
 msgid ""
-"We're nearly half-way into the APIs month of Summer Dev, and making great"
-"\n"
-"progress on a number of fronts. I'm happy to announce that the first of "
-"these is\n"
+"We're nearly half-way into the APIs month of Summer Dev, and making great\n"
+"progress on a number of fronts. I'm happy to announce that the first of these is\n"
 "complete: the I2P client libraries are now available on Maven Central!"
 msgstr ""
 
@@ -5856,10 +5365,8 @@ msgstr ""
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:51
 msgid ""
 "This should make it much simpler for Java developers to use I2P in their\n"
-"applications. Instead of needing to obtain the libraries from a current "
-"install,\n"
-"they can simply add I2P to their dependencies. Upgrading to new versions "
-"will\n"
+"applications. Instead of needing to obtain the libraries from a current install,\n"
+"they can simply add I2P to their dependencies. Upgrading to new versions will\n"
 "similarly be much easier."
 msgstr ""
 
@@ -5883,25 +5390,21 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:39
 msgid ""
-"Add one or both of these to your project's dependencies, and you're good "
-"to go!"
+"Add one or both of these to your project's dependencies, and you're good to "
+"go!"
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:67
 msgid ""
-"For other build systems, see the Maven Central pages for the `core`__ and"
-"\n"
+"For other build systems, see the Maven Central pages for the `core`__ and\n"
 "`streaming`__ libraries."
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:72
 msgid ""
-"Android developers should use the `I2P Android client library`__, which "
-"contains\n"
-"the same libraries along with Android-specific helpers. I'll be updating "
-"it soon\n"
-"to depend on the new I2P libraries, so that cross-platform applications "
-"can work\n"
+"Android developers should use the `I2P Android client library`__, which contains\n"
+"the same libraries along with Android-specific helpers. I'll be updating it soon\n"
+"to depend on the new I2P libraries, so that cross-platform applications can work\n"
 "natively with either I2P Android or desktop I2P."
 msgstr ""
 
@@ -5913,10 +5416,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:89
 msgid ""
-"See our `application development`__ guide for help getting started with "
-"these\n"
-"libraries. You can also chat with us about them in #i2p-dev on IRC. And "
-"if you\n"
+"See our `application development`__ guide for help getting started with these\n"
+"libraries. You can also chat with us about them in #i2p-dev on IRC. And if you\n"
 "do start using them, let us know what you're working on with the hashtag\n"
 "`#I2PSummer`__ on Twitter!"
 msgstr ""
@@ -5930,26 +5431,22 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:11
 msgid ""
-"In the first month of Summer Dev, we have improved the usability of our "
-"APIs for Java, Android, and Python developers."
+"In the first month of Summer Dev, we have improved the usability of our APIs"
+" for Java, Android, and Python developers."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:13
 msgid ""
-"Summer Dev is in full swing: we've been busy greasing wheels, sanding "
-"edges, and\n"
-"tidying the place up. Now it's time for our first roundup, where we bring"
-" you up\n"
+"Summer Dev is in full swing: we've been busy greasing wheels, sanding edges, and\n"
+"tidying the place up. Now it's time for our first roundup, where we bring you up\n"
 "to speed on the progress we are making!"
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:19
 msgid ""
 "\n"
-"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us"
-" the\n"
-"fantastic logo you see above. It adds a cheerful personality to our "
-"development\n"
+"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us the\n"
+"fantastic logo you see above. It adds a cheerful personality to our development\n"
 "program (and is going to look great on t-shirts)."
 msgstr ""
 
@@ -5961,48 +5458,37 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:33
 msgid ""
-"Our goal for this month was to \"blend in\" - to make our APIs and "
-"libraries work\n"
-"within the existing infrastructure of various communities, so that "
-"application\n"
-"developers can work with I2P more efficiently, and users don't need to "
-"worry\n"
+"Our goal for this month was to \"blend in\" - to make our APIs and libraries work\n"
+"within the existing infrastructure of various communities, so that application\n"
+"developers can work with I2P more efficiently, and users don't need to worry\n"
 "about the details."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:43
 msgid ""
-"The I2P client libraries are now available on `Maven Central`__ ! See our"
-"\n"
+"The I2P client libraries are now available on `Maven Central`__ ! See our\n"
 "`previous blog post`__ for full details.\n"
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:58
 msgid ""
-"The `I2P Android client library`__ has also been updated to use the new "
-"I2P\n"
-"libraries. This means that cross-platform applications can work natively "
-"with\n"
+"The `I2P Android client library`__ has also been updated to use the new I2P\n"
+"libraries. This means that cross-platform applications can work natively with\n"
 "either I2P Android or desktop I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:71
 msgid ""
-"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work"
-"\n"
+"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work\n"
 "seamlessly over local, remote, and port-forwarded `SAM APIs`__. See its\n"
-"`documentation`__ for usage instructions, and report any issues on "
-"`GitHub`__."
+"`documentation`__ for usage instructions, and report any issues on `GitHub`__."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:84
 msgid ""
-"The first (beta) version of ``i2psocket`` has been released! This is a "
-"direct\n"
-"replacement for the standard Python ``socket`` library that extends it "
-"with I2P\n"
-"support over the SAM API. See its `GitHub page`__ for usage instructions,"
-" and\n"
+"The first (beta) version of ``i2psocket`` has been released! This is a direct\n"
+"replacement for the standard Python ``socket`` library that extends it with I2P\n"
+"support over the SAM API. See its `GitHub page`__ for usage instructions, and\n"
 "to report any issues."
 msgstr ""
 
@@ -6014,15 +5500,15 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:98
 msgid ""
-"zzz has been hard at work on Syndie, getting a headstart on Plugins "
-"month. You can follow his progress on `the development forum thread`__."
+"zzz has been hard at work on Syndie, getting a headstart on Plugins month. "
+"You can follow his progress on `the development forum thread`__."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:100
 msgid ""
-"psi has been creating an I2P test network using i2pd, and in the process "
-"has found and fixed several i2pd bugs that will improve its compatibility"
-" with Java I2P."
+"psi has been creating an I2P test network using i2pd, and in the process has"
+" found and fixed several i2pd bugs that will improve its compatibility with "
+"Java I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:104
@@ -6033,21 +5519,16 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:109
 msgid ""
-"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a "
-"long time\n"
-"been home to one of the `largest public grids`__, using a patched version"
-" of\n"
-"Tahoe-LAFS. During Apps month we will be helping them with their ongoing "
-"work to\n"
-"add native support for I2P and Tor, so that I2P users can benefit from "
-"all of\n"
+"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a long time\n"
+"been home to one of the `largest public grids`__, using a patched version of\n"
+"Tahoe-LAFS. During Apps month we will be helping them with their ongoing work to\n"
+"add native support for I2P and Tor, so that I2P users can benefit from all of\n"
 "the improvements upstream."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:117
 msgid ""
-"There are several other projects that we will be talking with about their"
-" plans\n"
+"There are several other projects that we will be talking with about their plans\n"
 "for I2P integration, and helping with design. Stay tuned!"
 msgstr ""
 
@@ -6065,19 +5546,9 @@ msgstr "0.9.27 zawiera poprawki błędów"
 #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:18
 msgid ""
 "0.9.27 contains a number of bug fixes.\n"
-"The updated GMP library for crypto acceleration, which was bundled in the"
-" 0.9.26 release for new installs and Debian builds only, is now included "
-"in the in-network update for 0.9.27.\n"
-"There are improvements in IPv6 transports, SSU peer testing, and hidden "
-"mode."
-msgstr ""
-"Wersja 0.9.27 zawiera liczne poprawki błędów.\n"
-"Zaktualizowana biblioteka GMP do przyspieszania operacji "
-"kryptograficznych, która została umieszczona w wydaniu 0.9.26 dla nowych "
-"instalacji i w paczkach Debiana, jest teraz dostępna dla wszystkich w "
-"aktualizacji 0.9.27.\n"
-"Dokonano ulepszeń w transportach IPv6, testowaniu użytkowników SSU i "
-"trybie ukrytym."
+"The updated GMP library for crypto acceleration, which was bundled in the 0.9.26 release for new installs and Debian builds only, is now included in the in-network update for 0.9.27.\n"
+"There are improvements in IPv6 transports, SSU peer testing, and hidden mode."
+msgstr "Wersja 0.9.27 zawiera liczne poprawki błędów.\nZaktualizowana biblioteka GMP do przyspieszania operacji kryptograficznych, która została umieszczona w wydaniu 0.9.26 dla nowych instalacji i w paczkach Debiana, jest teraz dostępna dla wszystkich w aktualizacji 0.9.27.\nDokonano ulepszeń w transportach IPv6, testowaniu użytkowników SSU i trybie ukrytym."
 
 #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:24
 msgid ""
@@ -6174,31 +5645,17 @@ msgstr "0.9.28 zawiera poprawki błędów"
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:18
 msgid ""
-"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number "
-"of bundled software packages including Jetty.\n"
-"There are fixes for the IPv6 peer testing feature introduced last "
-"release.\n"
-"We continue improvements to detect and block peers that are potentially "
-"malicious.\n"
-"There are preliminary fixes for Java 9, although we do not yet recommend "
-"Java 9 for general use."
-msgstr ""
-"Wersja 0.9.28 zawiera poprawki 25 różnych błędów, i aktualizacje "
-"przeróżnych dołączonych paczek w tym Jetty. Poprawiono błędy związane z "
-"testowaniem użytkowników IPv6 pojawiające się w poprzednim wydaniu. W "
-"dalszym ciągu poprawiamy wykrywanie i blokowanie potencjalnie złośliwych "
-"użytkowników. Wprowadzono wstępne poprawki dla Javy 9, jednak nie "
-"zalecamy używania Javy 9 na co dzień. "
+"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number of bundled software packages including Jetty.\n"
+"There are fixes for the IPv6 peer testing feature introduced last release.\n"
+"We continue improvements to detect and block peers that are potentially malicious.\n"
+"There are preliminary fixes for Java 9, although we do not yet recommend Java 9 for general use."
+msgstr "Wersja 0.9.28 zawiera poprawki 25 różnych błędów, i aktualizacje przeróżnych dołączonych paczek w tym Jetty. Poprawiono błędy związane z testowaniem użytkowników IPv6 pojawiające się w poprzednim wydaniu. W dalszym ciągu poprawiamy wykrywanie i blokowanie potencjalnie złośliwych użytkowników. Wprowadzono wstępne poprawki dla Javy 9, jednak nie zalecamy używania Javy 9 na co dzień. "
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:25
 msgid ""
-"I2P will be at 33C3, please stop by our table and give us your ideas on "
-"how to improve the network.\n"
+"I2P will be at 33C3, please stop by our table and give us your ideas on how to improve the network.\n"
 "We will review our 2017 roadmap and priorities 2017 at the Congress."
-msgstr ""
-"I2P będzie obecne na 33C3, prosimy zatrzymać się przy naszym stoliku i "
-"zaproponować idee, co ulepszyć w naszej sieci. Na Kongresie przejrzymy "
-"nasze plany działania i priorytety na rok 2017."
+msgstr "I2P będzie obecne na 33C3, prosimy zatrzymać się przy naszym stoliku i zaproponować idee, co ulepszyć w naszej sieci. Na Kongresie przejrzymy nasze plany działania i priorytety na rok 2017."
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:50
 msgid "Fix version test for SSU IPv6 peer testing"
@@ -6373,21 +5830,13 @@ msgstr "0.9.29 zawiera poprawki błędów"
 
 #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:18
 msgid ""
-"0.9.29 contains fixes for numerous Trac tickets, including workarounds "
-"for corrupt compressed messages.\n"
+"0.9.29 contains fixes for numerous Trac tickets, including workarounds for corrupt compressed messages.\n"
 "We now support NTP over IPv6.\n"
 "We've added preliminary Docker support.\n"
 "We now have translated man pages.\n"
 "We now pass same-origin Referer headers through the HTTP proxy.\n"
-"There are more fixes for Java 9, although we do not yet recommend Java 9 "
-"for general use."
-msgstr ""
-"Wersja 0.9.29 zawiera poprawki różnych błędów, wliczając obejścia dla "
-"uszkodzonych skompresowanych wiadomości. Teraz wspieramy NTP przez IPv6. "
-"Dodano wstępne wparcie dla Dockera. Dodano wsparcie językowe dla stron "
-"instrukcji. Nagłówki Referer z tego samego źródła są teraz przepuszczane "
-"przez proxy HTTP. Pojawiło się więcej poprawek dla Javy 9, jednakże nie "
-"zalecamy używania Javy 9 do codziennego stosowania."
+"There are more fixes for Java 9, although we do not yet recommend Java 9 for general use."
+msgstr "Wersja 0.9.29 zawiera poprawki różnych błędów, wliczając obejścia dla uszkodzonych skompresowanych wiadomości. Teraz wspieramy NTP przez IPv6. Dodano wstępne wparcie dla Dockera. Dodano wsparcie językowe dla stron instrukcji. Nagłówki Referer z tego samego źródła są teraz przepuszczane przez proxy HTTP. Pojawiło się więcej poprawek dla Javy 9, jednakże nie zalecamy używania Javy 9 do codziennego stosowania."
 
 #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:37
 msgid "BOB database refactor"
@@ -6498,11 +5947,9 @@ msgstr ""
 
 #: i2p2www/blog/2017/03/04/0.9.29-Windows-Installer-Fix.rst:18
 msgid ""
-"The 0.9.29 Windows installer posted on our website two days ago fails "
-"during install with an Exception.\n"
+"The 0.9.29 Windows installer posted on our website two days ago fails during install with an Exception.\n"
 "We have fixed the bug and posted the new installer to our website.\n"
-"This does not affect upgrades from previous releases or non-Windows "
-"installers.\n"
+"This does not affect upgrades from previous releases or non-Windows installers.\n"
 "We apologize for the issue."
 msgstr ""
 
@@ -6520,53 +5967,39 @@ msgstr ""
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:18
 msgid ""
 "0.9.30 contains an upgrade to Jetty 9 and Tomcat 8.\n"
-"The previous versions are no longer supported, and are not available in "
-"the upcoming Debian Stretch and Ubuntu Zesty releases."
+"The previous versions are no longer supported, and are not available in the upcoming Debian Stretch and Ubuntu Zesty releases."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:23
 msgid ""
-"The router will migrate the jetty.xml configuration file for each Jetty "
-"website to the new Jetty 9 setup.\n"
-"This should work for recent, unmodified configurations but may not work "
-"for modified or very old setups.\n"
-"Verify that your Jetty website works after upgrading, and contact us on "
-"IRC if you need assistance."
+"The router will migrate the jetty.xml configuration file for each Jetty website to the new Jetty 9 setup.\n"
+"This should work for recent, unmodified configurations but may not work for modified or very old setups.\n"
+"Verify that your Jetty website works after upgrading, and contact us on IRC if you need assistance."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:29
 msgid ""
 "Several plugins are not compatible with Jetty 9 and must be updated.\n"
-"The following plugins have been updated to work with 0.9.30, and your "
-"router should update them after restart:"
+"The following plugins have been updated to work with 0.9.30, and your router should update them after restart:"
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:35
 msgid ""
-"The following plugins (with current versions listed) will not work with "
-"0.9.30.\n"
+"The following plugins (with current versions listed) will not work with 0.9.30.\n"
 "Contact the appropriate plugin developer for the status of new versions:"
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:41
 msgid ""
-"This release also supports migration of old (2014 and earlier) DSA-SHA1 "
-"hidden services to the more-secure EdDSA signature type.\n"
-"See http://zzz.i2p/topics/2271 for further information, including a guide"
-" and FAQ."
+"This release also supports migration of old (2014 and earlier) DSA-SHA1 hidden services to the more-secure EdDSA signature type.\n"
+"See http://zzz.i2p/topics/2271 for further information, including a guide and FAQ."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:46
 msgid ""
-"Note: On non-Android ARM platforms such as the Raspberry Pi, the "
-"blockfile database will upgrade on restart, which may take several "
-"minutes.\n"
+"Note: On non-Android ARM platforms such as the Raspberry Pi, the blockfile database will upgrade on restart, which may take several minutes.\n"
 "Please be patient."
-msgstr ""
-"Uwaga: na nie-Androidowych platformach ARM takich jak Raspberry PI, baza "
-"danych blockfile zostanie zaktualizowana po restarcie, co może zająć "
-"kilka minut.\n"
-"Prosimy o cierpliwość."
+msgstr "Uwaga: na nie-Androidowych platformach ARM takich jak Raspberry PI, baza danych blockfile zostanie zaktualizowana po restarcie, co może zająć kilka minut.\nProsimy o cierpliwość."
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:61
 msgid "Jetty 9, Tomcat 8"
@@ -6677,41 +6110,32 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:11
 msgid ""
-"This year's Summer Dev will be focused on metrics collection and "
-"performance improvements for the network."
+"This year's Summer Dev will be focused on metrics collection and performance"
+" improvements for the network."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:13
 msgid ""
 "It's that time of year again! We're embarking on our summer development\n"
-"programme, where we focus on a particular aspect of I2P to push it "
-"forward. For\n"
-"the next three months, we'll be encouraging both new contributors and "
-"existing\n"
+"programme, where we focus on a particular aspect of I2P to push it forward. For\n"
+"the next three months, we'll be encouraging both new contributors and existing\n"
 "community members to pick a task and have fun with it!"
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:20
 msgid ""
-"`Last year`__, we focused on helping users and developers leverage I2P, "
-"by\n"
-"improving API tooling and giving some love to applications that run over "
-"I2P.\n"
-"This year, we want to improve the user experience by working on an aspect"
-" that\n"
+"`Last year`__, we focused on helping users and developers leverage I2P, by\n"
+"improving API tooling and giving some love to applications that run over I2P.\n"
+"This year, we want to improve the user experience by working on an aspect that\n"
 "affects everyone: performance."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:29
 msgid ""
-"Despite onion-routing networks often being called \"low-latency\" "
-"networks, there\n"
-"is significant overhead created by routing traffic through additional "
-"computers.\n"
-"I2P's unidirectional tunnel design means that by default, a round trip "
-"between\n"
-"two Destinations will involve twelve participants! Improving the "
-"performance of\n"
+"Despite onion-routing networks often being called \"low-latency\" networks, there\n"
+"is significant overhead created by routing traffic through additional computers.\n"
+"I2P's unidirectional tunnel design means that by default, a round trip between\n"
+"two Destinations will involve twelve participants! Improving the performance of\n"
 "these participants will help to both reduce the latency of end-to-end\n"
 "connections [1]_, and increase the quality of tunnels network-wide."
 msgstr ""
@@ -6734,11 +6158,9 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:52
 msgid ""
-"We can't tell if we improve performance without a baseline! We'll be "
-"creating a\n"
+"We can't tell if we improve performance without a baseline! We'll be creating a\n"
 "metrics system for collecting usage and performance data about I2P in a\n"
-"privacy-preserving way, as well as porting various benchmarking tools to "
-"run\n"
+"privacy-preserving way, as well as porting various benchmarking tools to run\n"
 "over I2P (e.g. iperf3_)."
 msgstr ""
 
@@ -6750,10 +6172,8 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:66
 msgid ""
-"There's a lot of scope for improving the performance of our existing "
-"code, to\n"
-"e.g. reduce the overhead of participating in tunnels. We will be looking "
-"at\n"
+"There's a lot of scope for improving the performance of our existing code, to\n"
+"e.g. reduce the overhead of participating in tunnels. We will be looking at\n"
 "potential improvements to:"
 msgstr ""
 
@@ -6783,14 +6203,10 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:86
 msgid ""
-"We have several open proposals for improving the scalability of the I2P "
-"network\n"
-"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We "
-"will be\n"
-"working on these proposals, and begin implementing the finalised ones in "
-"the\n"
-"various network routers. The more feedback these proposals receive, the "
-"sooner\n"
+"We have several open proposals for improving the scalability of the I2P network\n"
+"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We will be\n"
+"working on these proposals, and begin implementing the finalised ones in the\n"
+"various network routers. The more feedback these proposals receive, the sooner\n"
 "we can roll them out, and the sooner I2P services can start using them!"
 msgstr ""
 
@@ -6802,46 +6218,36 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:106
 msgid ""
-"I2P is a packet-switched network, like the internet it runs on top of. "
-"This\n"
-"gives us significant flexibility in how we route packets, both for "
-"performance\n"
+"I2P is a packet-switched network, like the internet it runs on top of. This\n"
+"gives us significant flexibility in how we route packets, both for performance\n"
 "and privacy. The majority of this flexibility is unexplored! We want to\n"
-"encourage research into how various clearnet techniques for improving "
-"bandwidth\n"
+"encourage research into how various clearnet techniques for improving bandwidth\n"
 "can be applied to I2P, and how they might affect the privacy of network\n"
 "participants."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:120
 msgid ""
-"We have many more ideas for things we'd like to get done in these areas. "
-"If\n"
-"you're interested in hacking on privacy and anonymity software, designing"
-"\n"
-"protocols (cryptographic or otherwise), or researching future ideas - "
-"come and\n"
-"chat with us on IRC or Twitter! We are always happy to welcome newcomers "
-"into\n"
-"our community, both inside and outside the I2P network. We'll also be "
-"sending\n"
-"I2P stickers out to all new contributors taking part! If you want to chat"
-" about\n"
-"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You"
-" can\n"
+"We have many more ideas for things we'd like to get done in these areas. If\n"
+"you're interested in hacking on privacy and anonymity software, designing\n"
+"protocols (cryptographic or otherwise), or researching future ideas - come and\n"
+"chat with us on IRC or Twitter! We are always happy to welcome newcomers into\n"
+"our community, both inside and outside the I2P network. We'll also be sending\n"
+"I2P stickers out to all new contributors taking part! If you want to chat about\n"
+"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You can\n"
 "also find us in #i2p-dev on OFTC or Freenode."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:142
 msgid ""
-"Low-latency onion-routing networks are vulnerable to traffic confirmation"
-" attacks, so it would be reasonable to ask whether improved performance "
+"Low-latency onion-routing networks are vulnerable to traffic confirmation "
+"attacks, so it would be reasonable to ask whether improved performance "
 "equates to reduced privacy. Some latency can help privacy if applied "
 "correctly via random delays or batching (neither of which are currently "
-"employed by any general-purpose onion-routing network). However, if a "
-"tunnel has uniform overall latency, then traffic confirmation attacks "
-"should be just as viable with or without that latency; thus there should "
-"be little statistical difference when the latency is reduced uniformly."
+"employed by any general-purpose onion-routing network). However, if a tunnel"
+" has uniform overall latency, then traffic confirmation attacks should be "
+"just as viable with or without that latency; thus there should be little "
+"statistical difference when the latency is reduced uniformly."
 msgstr ""
 
 #: i2p2www/blog/2017/08/07/0.9.31-Release.rst:1
@@ -6861,8 +6267,7 @@ msgid ""
 "We have refreshed the router console to make it easier to understand,\n"
 "improve accessibility and cross-browser support,\n"
 "and generally tidy things up.\n"
-"This is the first step in a longer-term plan to make the router console "
-"more user-friendly.\n"
+"This is the first step in a longer-term plan to make the router console more user-friendly.\n"
 "We have also added torrent ratings and comments support to i2psnark."
 msgstr ""
 
@@ -6932,18 +6337,10 @@ msgstr ""
 
 #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:18
 msgid ""
-"0.9.32 contains a number of fixes in the router console and associated "
-"webapps (addressbook, i2psnark, and susimail).\n"
-"We have also changed the way we handle configured hostnames for published"
-" router infos, to eliminate some network enumeration attacks via DNS.\n"
+"0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail).\n"
+"We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS.\n"
 "We have added some checks in the console to resist rebinding attacks."
-msgstr ""
-"Wersja 0.9.32 zawiera liczne poprawki konsoli węzła i powiązanych "
-"webaplikacji (książki adresowej, i2psnarka i susimail'a). Zmieniono także"
-" sposób obchodzenia się z nazwami hostów dla opublikowanych informacji o "
-"węzłach, aby wyeliminować niektóre rodzaje ataków wyliczania (ang. "
-"network enumeration) poprzez DNS. Dodano kilka poprawek w konsoli "
-"zapobiegajÄ…cych atakom przekierowania (ang rebinding)."
+msgstr "Wersja 0.9.32 zawiera liczne poprawki konsoli węzła i powiązanych webaplikacji (książki adresowej, i2psnarka i susimail'a). Zmieniono także sposób obchodzenia się z nazwami hostów dla opublikowanych informacji o węzłach, aby wyeliminować niektóre rodzaje ataków wyliczania (ang. network enumeration) poprzez DNS. Dodano kilka poprawek w konsoli zapobiegających atakom przekierowania (ang rebinding)."
 
 #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:34
 msgid "Disallow hostnames in router addresses (proposal 141)"
@@ -6983,20 +6380,11 @@ msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:17
 msgid ""
-"0.9.33 contains a large number of bug fixes, including i2psnark, "
-"i2ptunnel, streaming, and SusiMail.\n"
-"For those who cannot access the reseed sites directly, we now support "
-"several types of proxies for reseeding.\n"
+"0.9.33 contains a large number of bug fixes, including i2psnark, i2ptunnel, streaming, and SusiMail.\n"
+"For those who cannot access the reseed sites directly, we now support several types of proxies for reseeding.\n"
 "We now set rate limits by default in the hidden services manager.\n"
-"For those that run high-traffic servers, please review and adjust the "
-"limits as necessary."
-msgstr ""
-"Wersja 0.9.33 zawiera liczne poprawki błędów m.in. w: i2psnark, "
-"i2ptunnel, strumieniowaniu i SusiMail. Dla tych którzy nie mogą "
-"bezpośrednio pobrać plików reseedowania, wspierane są liczne typy "
-"serwerów proxy. W menadżerze ukrytych usług można ustalać limity "
-"przepustowości. Posiadacze wyjątkowo wymagających serwerów powinni "
-"przejrzeć i skonfigurować te limity w razie potrzeby."
+"For those that run high-traffic servers, please review and adjust the limits as necessary."
+msgstr "Wersja 0.9.33 zawiera liczne poprawki błędów m.in. w: i2psnark, i2ptunnel, strumieniowaniu i SusiMail. Dla tych którzy nie mogą bezpośrednio pobrać plików reseedowania, wspierane są liczne typy serwerów proxy. W menadżerze ukrytych usług można ustalać limity przepustowości. Posiadacze wyjątkowo wymagających serwerów powinni przejrzeć i skonfigurować te limity w razie potrzeby."
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:34
 msgid "DesktopGui: Enable on OSX"
@@ -7083,7 +6471,8 @@ msgid "SusiMail: Fix several issues when using multiple browser tabs"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:62
-msgid "SusuMail: Fix bugs corrupting text attachments and large message bodies"
+msgid ""
+"SusuMail: Fix bugs corrupting text attachments and large message bodies"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:63
@@ -7150,8 +6539,7 @@ msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:83
 msgid ""
-"Debian: Remove ecj dependency; replace glassfish with libtaglibs where "
-"able"
+"Debian: Remove ecj dependency; replace glassfish with libtaglibs where able"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:84
@@ -7221,12 +6609,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:13
 msgid ""
-"One of the many things we discussed at 34C3 was what we should focus on "
-"for the\n"
-"coming year. In particular, we wanted a roadmap that was clear about what"
-" we\n"
-"want to ensure we get done, vs what would be really nice to have, and be "
-"able to\n"
+"One of the many things we discussed at 34C3 was what we should focus on for the\n"
+"coming year. In particular, we wanted a roadmap that was clear about what we\n"
+"want to ensure we get done, vs what would be really nice to have, and be able to\n"
 "help onboard newcomers to either category. Here is what we came up with:"
 msgstr ""
 
@@ -7238,14 +6623,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:25
 msgid ""
-"Many of the current primitives and protocols still retain their original "
-"designs\n"
-"from circa 2005, and need improvement. We have had a number of open "
-"proposals\n"
-"for several years with ideas, but forward progress has been slow. We all "
-"agreed\n"
-"that this needs to be our top priority for 2018. The core components are:"
-"\n"
+"Many of the current primitives and protocols still retain their original designs\n"
+"from circa 2005, and need improvement. We have had a number of open proposals\n"
+"for several years with ideas, but forward progress has been slow. We all agreed\n"
+"that this needs to be our top priority for 2018. The core components are:\n"
 "\n"
 "- New transport protocols (to replace NTCP and SSU). See Prop111_.\n"
 "- New onion-encryption protocol for building and using tunnels.\n"
@@ -7264,8 +6645,7 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:50
 msgid ""
-"We cannot release new protocol specifications across the entire network "
-"without\n"
+"We cannot release new protocol specifications across the entire network without\n"
 "work on all of these areas."
 msgstr ""
 
@@ -7277,31 +6657,24 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:60
 msgid ""
-"One of the benefits of starting the above work now, is that over the last"
-" few\n"
+"One of the benefits of starting the above work now, is that over the last few\n"
 "years there have been independent efforts to create simple protocols and\n"
-"protocol frameworks that achieve many of the aims we have for our own "
-"protocols,\n"
-"and have gained traction with the wider community. By leveraging this "
-"work, we\n"
+"protocol frameworks that achieve many of the aims we have for our own protocols,\n"
+"and have gained traction with the wider community. By leveraging this work, we\n"
 "get a \"force multiplier\" effect:\n"
 "\n"
-"- We benefit from protocol designs, security proofs, and code written by "
-"others,\n"
+"- We benefit from protocol designs, security proofs, and code written by others,\n"
 "  reducing the amount of work we need to do for the same level of\n"
 "  feature-completeness and security assurances.\n"
 "\n"
-"- Work we do can be leveraged by other communities, increasing their "
-"interest in\n"
+"- Work we do can be leveraged by other communities, increasing their interest in\n"
 "  collaborating with us, and thinking about I2P as a whole."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:76
 msgid ""
-"My proposals in particular will be leveraging the `Noise Protocol "
-"Framework`_,\n"
-"and the `SPHINX packet format`_. I have collaborations lined up with "
-"several\n"
+"My proposals in particular will be leveraging the `Noise Protocol Framework`_,\n"
+"and the `SPHINX packet format`_. I have collaborations lined up with several\n"
 "people outside I2P for these!"
 msgstr ""
 
@@ -7313,16 +6686,11 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:90
 msgid ""
-"On that topic, we've been slowly building interest over the last six "
-"months or\n"
-"so. Across PETS2017, 34C3, and RWC2018, I've had some very good "
-"discussions\n"
-"about ways in which we can improve collaboration with the wider "
-"community. This\n"
-"is really important to ensure we can garner as much review as possible "
-"for new\n"
-"protocols. The biggest blocker I've seen is the fact that the majority of"
-" I2P\n"
+"On that topic, we've been slowly building interest over the last six months or\n"
+"so. Across PETS2017, 34C3, and RWC2018, I've had some very good discussions\n"
+"about ways in which we can improve collaboration with the wider community. This\n"
+"is really important to ensure we can garner as much review as possible for new\n"
+"protocols. The biggest blocker I've seen is the fact that the majority of I2P\n"
 "development collaboration currently happens inside I2P itself, which\n"
 "significantly increases the effort required to contribute."
 msgstr ""
@@ -7331,8 +6699,7 @@ msgstr ""
 msgid ""
 "The two priorities in this area are:\n"
 "\n"
-"- Set up a project-run development forum that is accessible both inside "
-"and\n"
+"- Set up a project-run development forum that is accessible both inside and\n"
 "  outside I2P.\n"
 "\n"
 "- Set up mailing lists for review and discussion of proposals (possibly\n"
@@ -7343,21 +6710,17 @@ msgstr ""
 msgid ""
 "Other goals which are classed as nice-to-have:\n"
 "\n"
-"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit"
-"\n"
-"  clearnet contributions on GitHub while keeping the canonical dev "
-"environment\n"
+"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit\n"
+"  clearnet contributions on GitHub while keeping the canonical dev environment\n"
 "  on Monotone.\n"
 "\n"
-"- Write a \"position paper\" that accurately explains I2P to academic "
-"audiences,\n"
+"- Write a \"position paper\" that accurately explains I2P to academic audiences,\n"
 "  and puts it in context with existing literature."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:123
 msgid ""
-"I expect that collaborations with people outside I2P will be done "
-"entirely on\n"
+"I expect that collaborations with people outside I2P will be done entirely on\n"
 "GitHub, for minimal friction."
 msgstr ""
 
@@ -7369,24 +6732,18 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:133
 msgid ""
-"I2P is now in Debian Sid (their unstable repo) which will stablilise in "
-"around a\n"
+"I2P is now in Debian Sid (their unstable repo) which will stablilise in around a\n"
 "year and a half, and has also been pulled into the Ubuntu repository for\n"
-"inclusion in the next LTS release in April. We are going to start having "
-"I2P\n"
-"versions that end up hanging around for years, and we need to ensure we "
-"can\n"
+"inclusion in the next LTS release in April. We are going to start having I2P\n"
+"versions that end up hanging around for years, and we need to ensure we can\n"
 "handle their presence in the network."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:141
 msgid ""
-"The primary goal here is to roll out as many of the new protocols as we "
-"feasibly\n"
-"can in the next year, to hit the next Debian stable release. For those "
-"that\n"
-"require multi-year rollouts, we should incorporate the forward-"
-"compatability\n"
+"The primary goal here is to roll out as many of the new protocols as we feasibly\n"
+"can in the next year, to hit the next Debian stable release. For those that\n"
+"require multi-year rollouts, we should incorporate the forward-compatability\n"
 "changes as early as we can."
 msgstr ""
 
@@ -7398,32 +6755,24 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:153
 msgid ""
-"The Debian model encourages having separate packages for separate "
-"components. We\n"
-"agreed that decoupling the currently-bundled Java applications from the "
-"core\n"
+"The Debian model encourages having separate packages for separate components. We\n"
+"agreed that decoupling the currently-bundled Java applications from the core\n"
 "Java router would be beneficial for several reasons:\n"
 "\n"
 "- It codifies the boundary between the applications and the router.\n"
 "\n"
-"- It should make it easier to get these apps running with non-Java "
-"routers.\n"
+"- It should make it easier to get these apps running with non-Java routers.\n"
 "\n"
-"- It would enable third parties to create \"I2P bundles\" containing just"
-" the\n"
+"- It would enable third parties to create \"I2P bundles\" containing just the\n"
 "  applications they want."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:167
 msgid ""
-"In combination with the earlier priorities, this moves the main I2P "
-"project more\n"
-"in the direction of e.g. the Linux kernel. We will spend more time "
-"focusing on\n"
-"the network itself, leaving third-party developers to focus on "
-"applications that\n"
-"use the network (something that is significantly easier to do after our "
-"work in\n"
+"In combination with the earlier priorities, this moves the main I2P project more\n"
+"in the direction of e.g. the Linux kernel. We will spend more time focusing on\n"
+"the network itself, leaving third-party developers to focus on applications that\n"
+"use the network (something that is significantly easier to do after our work in\n"
 "the last few years on APIs and libraries)."
 msgstr ""
 
@@ -7435,25 +6784,18 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:180
 msgid ""
-"There are a bunch of app-level improvements that we want to work on, but "
-"do not\n"
-"currently have the developer time to do so, given our other priorities. "
-"This is\n"
-"an area we would love to see new contributors for! Once the above "
-"decoupling is\n"
-"complete, it will be significantly easier for someone to work on a "
-"specific\n"
+"There are a bunch of app-level improvements that we want to work on, but do not\n"
+"currently have the developer time to do so, given our other priorities. This is\n"
+"an area we would love to see new contributors for! Once the above decoupling is\n"
+"complete, it will be significantly easier for someone to work on a specific\n"
 "application independently of the main Java router."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:188
 msgid ""
-"One such application we would love to have help with is I2P Android. We "
-"will be\n"
-"keeping it up-to-date with the core I2P releases, and fixing bugs as we "
-"can, but\n"
-"there is much that could be done to improve the underlying code as well "
-"as the\n"
+"One such application we would love to have help with is I2P Android. We will be\n"
+"keeping it up-to-date with the core I2P releases, and fixing bugs as we can, but\n"
+"there is much that could be done to improve the underlying code as well as the\n"
 "usability."
 msgstr ""
 
@@ -7465,14 +6807,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:200
 msgid ""
-"Having said that, we do want to work specifically on Susimail and I2P-"
-"Bote fixes\n"
-"in the near term (some of which have landed in 0.9.33). They have had "
-"less work\n"
-"over the last few years than other I2P apps, and so we want to spend some"
-" time\n"
-"bringing their codebases up to par, and making them easier for new "
-"contributors\n"
+"Having said that, we do want to work specifically on Susimail and I2P-Bote fixes\n"
+"in the near term (some of which have landed in 0.9.33). They have had less work\n"
+"over the last few years than other I2P apps, and so we want to spend some time\n"
+"bringing their codebases up to par, and making them easier for new contributors\n"
 "to jump into!"
 msgstr ""
 
@@ -7484,14 +6822,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:213
 msgid ""
-"We have a large backlog of tickets in a number of I2P subsystems and "
-"apps. As\n"
-"part of the above stabilisation effort, we would love to clean up some of"
-" our\n"
-"older long-standing issues. More importantly, we want to ensure that our "
-"tickets\n"
-"are correctly organised, so that new contributors can find good tickets "
-"to work\n"
+"We have a large backlog of tickets in a number of I2P subsystems and apps. As\n"
+"part of the above stabilisation effort, we would love to clean up some of our\n"
+"older long-standing issues. More importantly, we want to ensure that our tickets\n"
+"are correctly organised, so that new contributors can find good tickets to work\n"
 "on."
 msgstr ""
 
@@ -7503,12 +6837,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:226
 msgid ""
-"One aspect of the above we will be focusing on is keeping in touch with "
-"users\n"
-"who take the time to report issues. Thank you! The smaller we can make "
-"the\n"
-"feedback loop, the quicker we can resolve problems that new users face, "
-"and the\n"
+"One aspect of the above we will be focusing on is keeping in touch with users\n"
+"who take the time to report issues. Thank you! The smaller we can make the\n"
+"feedback loop, the quicker we can resolve problems that new users face, and the\n"
 "more likely it is that they keep participating in the community."
 msgstr ""
 
@@ -7520,15 +6851,13 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:238
 msgid ""
-"That all looks very ambitious, and it is! But many of the items above "
-"overlap,\n"
+"That all looks very ambitious, and it is! But many of the items above overlap,\n"
 "and with careful planning we can make a serious dent in them."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:243
 msgid ""
-"If you are interested in helping with any of the goals above, come chat "
-"to us!\n"
+"If you are interested in helping with any of the goals above, come chat to us!\n"
 "You can find us on OFTC and Freenode (#i2p-dev), and Twitter (@GetI2P)."
 msgstr ""
 
@@ -7554,16 +6883,10 @@ msgstr ""
 #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:17
 msgid ""
 "0.9.34 contains a lot of bug fixes!\n"
-"It also has improvements in SusiMail, IPv6 handling, and tunnel peer "
-"selection.\n"
+"It also has improvements in SusiMail, IPv6 handling, and tunnel peer selection.\n"
 "We add support for IGD2 schemas in UPnP.\n"
-"There's also preparation for more improvements you will see in future "
-"releases."
-msgstr ""
-"Wersja 0.9.34 zawiera liczne poprawki błędów! Ponadto zawiera ulepszenia "
-"dotyczące SusiMaila, obsługi IPv6, wyboru użytkowników tuneli. Dodaliśmy "
-"wsparcie dla schematów IGD2 w UPnP. Przygotowujemy się na dalsze "
-"usprawnienia, które zobaczysz w przyszłych wydaniach."
+"There's also preparation for more improvements you will see in future releases."
+msgstr "Wersja 0.9.34 zawiera liczne poprawki błędów! Ponadto zawiera ulepszenia dotyczące SusiMaila, obsługi IPv6, wyboru użytkowników tuneli. Dodaliśmy wsparcie dla schematów IGD2 w UPnP. Przygotowujemy się na dalsze usprawnienia, które zobaczysz w przyszłych wydaniach."
 
 #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:34
 msgid "SusiMail: Improved startup and memory management"
@@ -7625,27 +6948,20 @@ msgstr "Wersja 0.9.35 zawiera katalogi SusiMaila i kreatora SSL"
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:16
 msgid ""
-"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for "
-"setting up HTTPS on your Hidden Service website.\n"
+"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.\n"
 "We also have the usual collection of bug fixes, especially in SusiMail."
-msgstr ""
-"Wersja 0.9.35 zawiera wsparcie dla folderów w SusiMailu i nowy kreator "
-"pozwalający skonfigurować HTTPS na Twojej ukrytej stronie w sieci I2P. "
-"Jak zwykle załatano kilkanaście błędów, zwłaszcza w SusiMailu."
+msgstr "Wersja 0.9.35 zawiera wsparcie dla folderów w SusiMailu i nowy kreator pozwalający skonfigurować HTTPS na Twojej ukrytej stronie w sieci I2P. Jak zwykle załatano kilkanaście błędów, zwłaszcza w SusiMailu."
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:21
 msgid ""
 "We're hard at work on several things for 0.9.36, including a new OSX "
 "installer and a faster, more secure transport protocol called NTCP2."
-msgstr ""
-"Ciężko pracujemy nad kilkoma funkcjami w wersji 0.9.36, nad instalatorem "
-"dla OSX i szybszym i bardziej bezpiecznym transporcie NTCP2."
+msgstr "Ciężko pracujemy nad kilkoma funkcjami w wersji 0.9.36, nad instalatorem dla OSX i szybszym i bardziej bezpiecznym transporcie NTCP2."
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:25
-msgid "I2P will be at HOPE in New York City, July 20-22. Find us and say hello!"
-msgstr ""
-"I2P będzie obecne w HOPE w Nowym Jorku, 20-22 lipca. Odwiedź nas i "
-"przywitaj!"
+msgid ""
+"I2P will be at HOPE in New York City, July 20-22. Find us and say hello!"
+msgstr "I2P będzie obecne w HOPE w Nowym Jorku, 20-22 lipca. Odwiedź nas i przywitaj!"
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:39
 msgid "New Hidden Service SSL Wizard"
@@ -7664,7 +6980,8 @@ msgid "CPUID: Fix TBM detection"
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:48
-msgid "i2psnark: Fix torrents ignoring priority settings when autostart enabled"
+msgid ""
+"i2psnark: Fix torrents ignoring priority settings when autostart enabled"
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:49
@@ -7740,25 +7057,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:20
 msgid ""
-"I2P's transport protocols were originally developed around 15 years ago. "
-"Back \n"
-"then, the main goal was to hide the transferred data, not to hide the "
-"fact that \n"
-"one was using the protocol itself. Nobody thought seriously about "
-"protecting \n"
-"against DPI (deep packets inspection) and protocols censorship. Times "
-"change, \n"
-"and even though original transport protocols are still providing strong "
-"security, \n"
-"there was a demand for a new transport protocol. NTCP2 is designed to "
-"resist \n"
-"current censorship threats. Mainly, DPI analysis of packets length. Plus,"
-" the new \n"
-"protocol uses the most modern cryptography developments. NTCP2 is based "
-"on the \n"
+"I2P's transport protocols were originally developed around 15 years ago. Back \n"
+"then, the main goal was to hide the transferred data, not to hide the fact that \n"
+"one was using the protocol itself. Nobody thought seriously about protecting \n"
+"against DPI (deep packets inspection) and protocols censorship. Times change, \n"
+"and even though original transport protocols are still providing strong security, \n"
+"there was a demand for a new transport protocol. NTCP2 is designed to resist \n"
+"current censorship threats. Mainly, DPI analysis of packets length. Plus, the new \n"
+"protocol uses the most modern cryptography developments. NTCP2 is based on the \n"
 "`Noise Protocol Framework`_, with SHA256 \n"
-"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) "
-"key \n"
+"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) key \n"
 "exchange."
 msgstr ""
 
@@ -7780,23 +7088,17 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:59
 msgid ""
-"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of "
-"ElGamal \n"
-"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, "
-"and uses \n"
-"SipHash for obfuscating the packet's length information. The key "
-"derivation \n"
+"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of ElGamal \n"
+"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, and uses \n"
+"SipHash for obfuscating the packet's length information. The key derivation \n"
 "function used in NTCP2 is more complex, now using many HMAC-SHA256 calls."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:66
 msgid ""
-"i2pd (C++) implementation note: All of the algorithms mentioned above, "
-"except \n"
-"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the "
-"coming \n"
-"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is "
-"used in \n"
+"i2pd (C++) implementation note: All of the algorithms mentioned above, except \n"
+"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the coming \n"
+"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is used in \n"
 "most of the current systems, core i2pd developer \n"
 "`Jeff Becker`_ has contributed standalone \n"
 "implementations of missing cryptographic algorithms."
@@ -7810,40 +7112,28 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:82
 msgid ""
-"NTCP2 requires having a third (x25519) key in addition to existing two "
-"(the \n"
-"encryption and signature keys). It is called a static key and it has to "
-"be added \n"
-"to any of RouterInfo addresses as an \"s\" parameter. It is required for "
-"both \n"
-"NTCP2 initiator (Alice) and responder (Bob). If more than one address "
-"supports \n"
-"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for "
-"all of \n"
-"them. Alice's address is allowed to have just the \"s\" parameter without"
-" \"host\" \n"
-"and \"port\" set. Also, a \"v\" parameter is required, that is currently "
-"always set \n"
+"NTCP2 requires having a third (x25519) key in addition to existing two (the \n"
+"encryption and signature keys). It is called a static key and it has to be added \n"
+"to any of RouterInfo addresses as an \"s\" parameter. It is required for both \n"
+"NTCP2 initiator (Alice) and responder (Bob). If more than one address supports \n"
+"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for all of \n"
+"them. Alice's address is allowed to have just the \"s\" parameter without \"host\" \n"
+"and \"port\" set. Also, a \"v\" parameter is required, that is currently always set \n"
 "to \"2\"."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:93
 msgid ""
-"NTCP2 address can be declared as a separate NTCP2 address or as an old-"
-"style \n"
-"NTCP address with additional parameters, in which case it will accept "
-"both \n"
-"NTCP and NTCP2 connections. Java I2P implementation uses the second "
-"approach, \n"
+"NTCP2 address can be declared as a separate NTCP2 address or as an old-style \n"
+"NTCP address with additional parameters, in which case it will accept both \n"
+"NTCP and NTCP2 connections. Java I2P implementation uses the second approach, \n"
 "i2pd (C++ implementation) uses the first."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:100
 msgid ""
-"If a node accepts NTCP2 connections, it has to publish its RouterInfo "
-"with the \n"
-"\"i\" parameter, which is used as an initialization vector (IV) for the "
-"public \n"
+"If a node accepts NTCP2 connections, it has to publish its RouterInfo with the \n"
+"\"i\" parameter, which is used as an initialization vector (IV) for the public \n"
 "encryption key when that node establishes new connections."
 msgstr ""
 
@@ -7855,14 +7145,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:111
 msgid ""
-"To establish a connection both sides need to generate pairs of ephemeral "
-"x25519 \n"
-"keys. Based on those keys and \"static\" keys they derive a set of keys "
-"for data \n"
-"transferring. Both parties must verify that the other side actually has a"
-" \n"
-"private key for that static key, and that static key is the same as in "
-"RouterInfo."
+"To establish a connection both sides need to generate pairs of ephemeral x25519 \n"
+"keys. Based on those keys and \"static\" keys they derive a set of keys for data \n"
+"transferring. Both parties must verify that the other side actually has a \n"
+"private key for that static key, and that static key is the same as in RouterInfo."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:118
@@ -7871,29 +7157,23 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:131
 msgid ""
-"A common x25519 key, called «input key material», is computed for each "
-"message, \n"
-"after which message encryption key is generated with a MixKey function. A"
-" value \n"
+"A common x25519 key, called «input key material», is computed for each message, \n"
+"after which message encryption key is generated with a MixKey function. A value \n"
 "ck (chaining key) is kept while messages are being exchanged. \n"
-"That value is used as a final input when generating keys for data "
-"transferring."
+"That value is used as a final input when generating keys for data transferring."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:138
 msgid ""
-"MixKey function looks something like this in the C++ implementation of "
-"I2P:"
+"MixKey function looks something like this in the C++ implementation of I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:159
 msgid ""
-"**SessionRequest** message is made of a public x25519 Alice key (32 "
-"bytes), a \n"
+"**SessionRequest** message is made of a public x25519 Alice key (32 bytes), a \n"
 "block of data encrypted with AEAD/Chacha20/Poly1305 (16 bytes), a hash \n"
 "(16 bytes) and some random data in the end (padding). Padding length is \n"
-"defined in the encrypted block of data. Encrypted block also contains "
-"length of \n"
+"defined in the encrypted block of data. Encrypted block also contains length of \n"
 "the second part of the **SessionConfirmed** message. A block of data is \n"
 "encrypted and signed with a key derived from Alice's ephemeral key and \n"
 "Bob's static key. Initial ck value for MixKey function is set to SHA256 \n"
@@ -7902,38 +7182,28 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:170
 msgid ""
-"Since 32 bytes of public x25519 key can be detected by DPI, it is "
-"encrypted with \n"
-"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" "
-"parameter \n"
+"Since 32 bytes of public x25519 key can be detected by DPI, it is encrypted with \n"
+"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" parameter \n"
 "from RouterInfo as an initialization vector (IV)."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:176
 msgid ""
-"**SessionCreated** message has the same structure as **SessionRequest**, "
-"except \n"
-"the key is computed based on ephemeral keys of both sides. IV generated "
-"after \n"
-"encrypting/decrypting public key from **SessionRequest** message is used "
-"as IV \n"
+"**SessionCreated** message has the same structure as **SessionRequest**, except \n"
+"the key is computed based on ephemeral keys of both sides. IV generated after \n"
+"encrypting/decrypting public key from **SessionRequest** message is used as IV \n"
 "for encrypting/decrypting ephemeral public key."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:183
 msgid ""
 "**SessionConfirmed** message has 2 parts: public static key and Alice's \n"
-"RouterInfo. The difference from previous messages is that ephemeral "
-"public key \n"
-"is encrypted with AEAD/Chaha20/Poly1305 using the same key as "
-"**SessionCreated**. \n"
+"RouterInfo. The difference from previous messages is that ephemeral public key \n"
+"is encrypted with AEAD/Chaha20/Poly1305 using the same key as **SessionCreated**. \n"
 "It leads to increasing first part of the message from 32 to 48 bytes. \n"
-"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a"
-" new \n"
-"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo"
-" part \n"
-"can also be appended with random data padding, but it is not required, "
-"since \n"
+"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a new \n"
+"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo part \n"
+"can also be appended with random data padding, but it is not required, since \n"
 "RouterInfo usually has various length."
 msgstr ""
 
@@ -7945,29 +7215,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:199
 msgid ""
-"If every hash and key verification has succeeded, a common ck value must "
-"be \n"
-"present after the last MixKey operation on both sides. This value is used"
-" to \n"
-"generate two sets of keys <k, sipk, sipiv> for each side of a connection."
-" \"k\" is \n"
-"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an "
-"initial \n"
+"If every hash and key verification has succeeded, a common ck value must be \n"
+"present after the last MixKey operation on both sides. This value is used to \n"
+"generate two sets of keys <k, sipk, sipiv> for each side of a connection. \"k\" is \n"
+"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an initial \n"
 "value for SipHash IV, that is changed after each use."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:207
 msgid ""
-"Code used to generate keys looks like this in the C++ implementation of "
-"I2P:"
+"Code used to generate keys looks like this in the C++ implementation of I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:246
 msgid ""
-"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array "
-"are a \n"
-"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, "
-"but i2pd \n"
+"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array are a \n"
+"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, but i2pd \n"
 "handles them as a single 16 bytes key."
 msgstr ""
 
@@ -7994,28 +7257,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:271
 msgid ""
-"Message length is obfuscated by applying the XOR function with two first "
-"bytes \n"
+"Message length is obfuscated by applying the XOR function with two first bytes \n"
 "of the current SipHash IV."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:276
 msgid ""
-"Encrypted data part contains blocks of data. Each block is prepended with"
-" 3 \n"
-"bytes header, that defines block type and block length. Generally, I2NP "
-"type \n"
-"blocks are transferred, that are I2NP messages with an altered header. "
-"One NTCP2 \n"
+"Encrypted data part contains blocks of data. Each block is prepended with 3 \n"
+"bytes header, that defines block type and block length. Generally, I2NP type \n"
+"blocks are transferred, that are I2NP messages with an altered header. One NTCP2 \n"
 "frame can transfer multiple I2NP blocks."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:283
 msgid ""
-"The other important data block type is a random data block. It is "
-"recommended to \n"
-"add a random data block to every NTCP2 frame. Only one random data block "
-"can be \n"
+"The other important data block type is a random data block. It is recommended to \n"
+"add a random data block to every NTCP2 frame. Only one random data block can be \n"
 "added and it must be the last block."
 msgstr ""
 
@@ -8025,12 +7282,8 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:293
 msgid ""
-"- RouterInfo  — usually contains Bob's RouterInfo after the connection "
-"has been established, but it can also contain RouterInfo of a random node"
-" for the purpose of speeding up floodfills (there is a flags field for "
-"that case). \n"
-"- Termination  — is used when a host explicitly terminates a connection "
-"and specifies a reason for that.\n"
+"- RouterInfo  — usually contains Bob's RouterInfo after the connection has been established, but it can also contain RouterInfo of a random node for the purpose of speeding up floodfills (there is a flags field for that case). \n"
+"- Termination  — is used when a host explicitly terminates a connection and specifies a reason for that.\n"
 "- DateTime — a current time in seconds."
 msgstr ""
 
@@ -8042,14 +7295,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:305
 msgid ""
-"The new I2P transport protocol NTCP2 provides effective resistance "
-"against DPI \n"
-"censorship. It also results in reduced CPU load because of the faster, "
-"modern \n"
-"cryptography used. It makes I2P more likely to run on low-end devices, "
-"such as \n"
-"smartphones and home routers. Both major I2P implementations have full "
-"support \n"
+"The new I2P transport protocol NTCP2 provides effective resistance against DPI \n"
+"censorship. It also results in reduced CPU load because of the faster, modern \n"
+"cryptography used. It makes I2P more likely to run on low-end devices, such as \n"
+"smartphones and home routers. Both major I2P implementations have full support \n"
 "for NTCP2 and it make NTCP2 available for use starting with version \n"
 "0.9.36 (Java) and 2.20 (i2pd, C++)."
 msgstr ""
@@ -8135,7 +7384,8 @@ msgid "i2psnark: Add icon for comments"
 msgstr ""
 
 #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:60
-msgid "i2ptunnel: Change read timeout defaults to account for streaming changes"
+msgid ""
+"i2ptunnel: Change read timeout defaults to account for streaming changes"
 msgstr ""
 
 #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:61
@@ -8160,7 +7410,8 @@ msgid "0.9.37 with NTCP2 enabled"
 msgstr "Wersja 0.9.37 włącza NTCP2"
 
 #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:16
-msgid "0.9.37 enables the faster, more secure transport protocol called NTCP2."
+msgid ""
+"0.9.37 enables the faster, more secure transport protocol called NTCP2."
 msgstr ""
 
 #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:30
@@ -8201,27 +7452,19 @@ msgstr ""
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:18
 msgid ""
 "`Invisible Internet Project`_ (I2P) provides a framework for\n"
-"developing privacy-aware applications. It is a virtual network working on"
-" top of\n"
-"the regular Internet, in which hosts can exchange data without disclosing"
-" their\n"
-"\"real\" IP addresses. Connections inside I2P network are established "
-"between \n"
-"virtual addresses called *I2P destinations*. It's possible to have as "
-"many\n"
-"of destinations as one needs, even use a new destination for each "
-"connection,\n"
-"they don't disclose any information about the real IP address to the "
-"other\n"
+"developing privacy-aware applications. It is a virtual network working on top of\n"
+"the regular Internet, in which hosts can exchange data without disclosing their\n"
+"\"real\" IP addresses. Connections inside I2P network are established between \n"
+"virtual addresses called *I2P destinations*. It's possible to have as many\n"
+"of destinations as one needs, even use a new destination for each connection,\n"
+"they don't disclose any information about the real IP address to the other\n"
 "side."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:31
 msgid ""
-"This article describes basic concepts one needs to know when developing "
-"I2P\n"
-"applications. Code samples are written in Python with the use of built-in"
-"\n"
+"This article describes basic concepts one needs to know when developing I2P\n"
+"applications. Code samples are written in Python with the use of built-in\n"
 "asynchronous framework asyncio."
 msgstr ""
 
@@ -8234,15 +7477,11 @@ msgstr ""
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:42
 msgid ""
 "I2P provides many different APIs to the client applications. Regular\n"
-"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java "
-"applications \n"
-"usually use I2CP. For developing with other languages, like Python, the "
-"best \n"
+"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java applications \n"
+"usually use I2CP. For developing with other languages, like Python, the best \n"
 "option is `SAM`_. SAM is disabled by \n"
-"default in the original Java client implementation, so we need to enable "
-"it. \n"
-"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run "
-"at Startup\" \n"
+"default in the original Java client implementation, so we need to enable it. \n"
+"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run at Startup\" \n"
 "and press \"Start\", then \"Save Client Configuration\"."
 msgstr ""
 
@@ -8263,12 +7502,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:79
 msgid ""
-"This library works with the Python's built-in `asynchronous framework "
-"asyncio`_,\n"
-"so please note that code samples are taken from async functions "
-"(coroutines)\n"
-"which are running inside the event loop. Additional examples of i2plib "
-"usage can\n"
+"This library works with the Python's built-in `asynchronous framework asyncio`_,\n"
+"so please note that code samples are taken from async functions (coroutines)\n"
+"which are running inside the event loop. Additional examples of i2plib usage can\n"
 "be found in the `source code repository`_."
 msgstr ""
 
@@ -8280,10 +7516,8 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:94
 msgid ""
-"I2P destination is literally a set of encryption and cryptographic "
-"signature\n"
-"keys. Public keys from this set are published to the I2P network and are "
-"used to\n"
+"I2P destination is literally a set of encryption and cryptographic signature\n"
+"keys. Public keys from this set are published to the I2P network and are used to\n"
 "make connections instead of IP addresses."
 msgstr ""
 
@@ -8293,28 +7527,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:112
 msgid ""
-"base32 address is a hash which is used by other peers to discover your "
-"full\n"
-"Destination in the network. If you plan to use this destination as a "
-"permanent\n"
-"address in your program, save the binary data from "
-"*dest.private\\_key.data* \n"
+"base32 address is a hash which is used by other peers to discover your full\n"
+"Destination in the network. If you plan to use this destination as a permanent\n"
+"address in your program, save the binary data from *dest.private\\_key.data* \n"
 "to a local file."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:119
 msgid ""
-"Now you can create a SAM session, which literally means to make the "
-"Destination\n"
+"Now you can create a SAM session, which literally means to make the Destination\n"
 "online in I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:130
 msgid ""
-"Important note here: Destination will remain online while "
-"*session\\_writer* socket\n"
-"is kept open. If you wish to switch it off, you can call "
-"*session\\_writer.close()*."
+"Important note here: Destination will remain online while *session\\_writer* socket\n"
+"is kept open. If you wish to switch it off, you can call *session\\_writer.close()*."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:135
@@ -8325,11 +7553,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:140
 msgid ""
-"Now when the Destination is online, you can use it to connect to other "
-"peers.\n"
+"Now when the Destination is online, you can use it to connect to other peers.\n"
 "For example, this is how you connect to\n"
-"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send "
-"HTTP GET\n"
+"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send HTTP GET\n"
 "request and read the response (it is \"i2p-projekt.i2p\" web server):"
 msgstr ""
 
@@ -8341,20 +7567,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:171
 msgid ""
-"While making outgoing connections is trivial, when you accept connections"
-" there\n"
-"is one important detail. After a new client is connected, SAM API sends "
-"an ASCII\n"
-"string with base64-encoded client's Destination to the socket. Since "
-"Destination \n"
+"While making outgoing connections is trivial, when you accept connections there\n"
+"is one important detail. After a new client is connected, SAM API sends an ASCII\n"
+"string with base64-encoded client's Destination to the socket. Since Destination \n"
 "and data can come in one chunk, you should be aware of it."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:178
 msgid ""
 "This is how a simple PING-PONG server looks like. It accepts incoming\n"
-"connection, saves client's Destination to a *remote\\_destination* "
-"variable and\n"
+"connection, saves client's Destination to a *remote\\_destination* variable and\n"
 "sends back \"PONG\" string:"
 msgstr ""
 
@@ -8366,21 +7588,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:208
 msgid ""
-"This article describes the usage of a TCP-like Streaming protocol. SAM "
-"API also\n"
-"provides a UDP-like protocol to send and receive datagrams. This feature "
-"will\n"
+"This article describes the usage of a TCP-like Streaming protocol. SAM API also\n"
+"provides a UDP-like protocol to send and receive datagrams. This feature will\n"
 "be added to i2plib later."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:214
 msgid ""
-"This is just a basic information, but it's enough to start your own "
-"project with\n"
-"the use of I2P. Invisible Internet is a great tool to develop all kinds "
-"of\n"
-"privacy-aware applications. There are no design constraints by the "
-"network,\n"
+"This is just a basic information, but it's enough to start your own project with\n"
+"the use of I2P. Invisible Internet is a great tool to develop all kinds of\n"
+"privacy-aware applications. There are no design constraints by the network,\n"
 "those applications can be client-server as well as P2P."
 msgstr ""
 
@@ -8396,22 +7613,15 @@ msgstr "Wersja 0.9.38 zawiera nowy kreator instalacji"
 msgid ""
 "0.9.38 includes a new first-install wizard with a bandwidth tester.\n"
 "We've added support for the latest GeoIP database format.\n"
-"There's a new Firefox profile installer and a new, native Mac OSX "
-"installer on our website.\n"
+"There's a new Firefox profile installer and a new, native Mac OSX installer on our website.\n"
 "Work continues on supporting the new \"LS2\" netdb format."
-msgstr ""
-"Wersja 0.9.38 zawiera nowy kreator instalacji z testem przepustowości. "
-"Dodano wsparcie dla najnowszego formatu bazy danych GeoIP. Jest możliwość"
-" instalacji specjalnego profilu Firefoxa i nowy instalator na Mac OSX. "
-"Dalej pracujemy nad nowym formatem netdb “LS2”."
+msgstr "Wersja 0.9.38 zawiera nowy kreator instalacji z testem przepustowości. Dodano wsparcie dla najnowszego formatu bazy danych GeoIP. Jest możliwość instalacji specjalnego profilu Firefoxa i nowy instalator na Mac OSX. Dalej pracujemy nad nowym formatem netdb “LS2”."
 
 #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:23
 msgid ""
 "This release also contains plenty of bug fixes, including several issues "
 "with susimail attachments, and a fix for IPv6-only routers."
-msgstr ""
-"Ponadto to wydanie zawiera mnóstwo poprawek błędów, takich jak problem z "
-"załącznikami w susimailu i łatka dla węzłów działających tylko na IPv6."
+msgstr "Ponadto to wydanie zawiera mnóstwo poprawek błędów, takich jak problem z załącznikami w susimailu i łatka dla węzłów działających tylko na IPv6."
 
 #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:37
 msgid "New setup wizard with bandwidth testing"
@@ -8495,25 +7705,25 @@ msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:16
 msgid ""
-"There are many projects in the I2P world that we are excited about, but "
-"not all of them are ready for prime-time.  We decided to create a place "
-"where we can make those available for anyone interested in trying them "
-"out, that will serve as proving grounds for projects that may one day "
-"become official I2P products.  This place is the `I2P Laboratory`_."
+"There are many projects in the I2P world that we are excited about, but not "
+"all of them are ready for prime-time.  We decided to create a place where we"
+" can make those available for anyone interested in trying them out, that "
+"will serve as proving grounds for projects that may one day become official "
+"I2P products.  This place is the `I2P Laboratory`_."
 msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:22
 msgid ""
-"In the lab we will be offering downoads ready for you to try.  Keep in "
-"mind that they are not going to be \"release\" quality, and some may not "
-"even be \"beta\" quality.  We do not offer official support for them.  "
-"Any of the lab projects may get discontinued at any time."
+"In the lab we will be offering downoads ready for you to try.  Keep in mind "
+"that they are not going to be \"release\" quality, and some may not even be "
+"\"beta\" quality.  We do not offer official support for them.  Any of the "
+"lab projects may get discontinued at any time."
 msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:26
 msgid ""
-"If you are feeling adventurous we invite you to try our ideas.  We "
-"welcome your feedback at the `I2P Lab Forum`_."
+"If you are feeling adventurous we invite you to try our ideas.  We welcome "
+"your feedback at the `I2P Lab Forum`_."
 msgstr ""
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:2
@@ -8526,28 +7736,17 @@ msgstr "Wersja 0.9.39 z poprawkami wydajności"
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:16
 msgid ""
-"0.9.39 includes extensive changes for the new network database types "
-"(proposal 123).\n"
-"We've bundled the i2pcontrol plugin as a webapp to support development of"
-" RPC applications.\n"
+"0.9.39 includes extensive changes for the new network database types (proposal 123).\n"
+"We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications.\n"
 "There are numerous performance improvements and bug fixes."
-msgstr ""
-"Wersja 0.9.39 zawiera znaczące zmiany nowych typów bazy danych sieci "
-"(propozycja 123). Wbudowaliśmy wtyczkę i2pcontrol jako webapp (aplikację "
-"internetową węzła), aby wspomóc rozwój aplikacji RPC. Oprócz tego "
-"poprawiono liczne błędy i poprawiono wydajność."
+msgstr "Wersja 0.9.39 zawiera znaczące zmiany nowych typów bazy danych sieci (propozycja 123). Wbudowaliśmy wtyczkę i2pcontrol jako webapp (aplikację internetową węzła), aby wspomóc rozwój aplikacji RPC. Oprócz tego poprawiono liczne błędy i poprawiono wydajność."
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:22
 msgid ""
-"We've removed the midnight and classic themes to reduce the maintenance "
-"burden;\n"
+"We've removed the midnight and classic themes to reduce the maintenance burden;\n"
 "previous users of those themes will now see the dark or light theme.\n"
 "There's also new home page icons, a first step in updating the console."
-msgstr ""
-"Usunęliśmy skórki „północ” i „klasyczną”, aby uprościć rozwój, "
-"użytkownicy tych skórek zobaczą teraz skórkę jasną bądź ciemną. Strona "
-"startowa konsoli zawiera nowe ikony, jest to pierwszy etap przebudowy "
-"konsoli."
+msgstr "Usunęliśmy skórki „północ” i „klasyczną”, aby uprościć rozwój, użytkownicy tych skórek zobaczą teraz skórkę jasną bądź ciemną. Strona startowa konsoli zawiera nowe ikony, jest to pierwszy etap przebudowy konsoli."
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:38
 msgid "I2PControl RPC plugin bundled as a webapp"
@@ -8621,18 +7820,12 @@ msgstr "Wersja 0.9.40 zawiera nowe ikony"
 msgid ""
 "0.9.40 includes support for the new encrypted leaseset format.\n"
 "We disabled the old NTCP 1 transport protocol.\n"
-"There's a new SusiDNS import feature, and a new scripted filtering "
-"mechanism for incoming connections."
-msgstr ""
-"Wersja 0.9.40 przynosi wsparcie dla nowego formatu szyfrowanego "
-"LeaseSetu. Wyłączyliśmy stary protokół transportowy NTCP 1. Dodano "
-"możliwość importu w SusiDNS i nowy skryptowy mechanizm filtrujący dla "
-"połączeń przychodzących."
+"There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections."
+msgstr "Wersja 0.9.40 przynosi wsparcie dla nowego formatu szyfrowanego LeaseSetu. Wyłączyliśmy stary protokół transportowy NTCP 1. Dodano możliwość importu w SusiDNS i nowy skryptowy mechanizm filtrujący dla połączeń przychodzących."
 
 #: i2p2www/blog/2019/05/07/0.9.40-Release.rst:22
 msgid ""
-"We've made a lot of improvements to the OSX native installer, and we've "
-"updated the IzPack installer as well.\n"
+"We've made a lot of improvements to the OSX native installer, and we've updated the IzPack installer as well.\n"
 "The work continues on refreshing the console with new icons.\n"
 "As usual, we've fixed lots of bugs as well!"
 msgstr ""
@@ -8735,24 +7928,16 @@ msgid ""
 "::\n"
 "\n"
 "       What is I2P-bote?\n"
-"          I2P-bote is a private messaging system built on i2p, which has "
-"additional\n"
-"          features to make it even more difficult to discern information "
-"about the\n"
-"          messages that are transmitted. Because of this, it can be used "
-"to transmit\n"
-"          private messages securely while tolerating high latency and not"
-" relying on\n"
-"          a centralized relay to send messages when the sender goes "
-"offline. This is\n"
-"          in contrast to almost every other popular private messaging "
-"system, which\n"
-"          either require both parties to be online or rely on a semi-"
-"trusted service\n"
+"          I2P-bote is a private messaging system built on i2p, which has additional\n"
+"          features to make it even more difficult to discern information about the\n"
+"          messages that are transmitted. Because of this, it can be used to transmit\n"
+"          private messages securely while tolerating high latency and not relying on\n"
+"          a centralized relay to send messages when the sender goes offline. This is\n"
+"          in contrast to almost every other popular private messaging system, which\n"
+"          either require both parties to be online or rely on a semi-trusted service\n"
 "          which transmits messages on behalf of senders who go offline.\n"
 "\n"
-"          or, ELI5: It's used similarly to e-mail, but it suffers from "
-"none of e-mail's\n"
+"          or, ELI5: It's used similarly to e-mail, but it suffers from none of e-mail's\n"
 "          privacy defects."
 msgstr ""
 
@@ -8834,11 +8019,9 @@ msgid ""
 "   character set into binary.\n"
 "2. Second, take bytes 386 and 387 and convert them to a single\n"
 "   Big-Endian integer.\n"
-"3. Add the number you computed from the two bytes in step two to 387. "
-"This is\n"
+"3. Add the number you computed from the two bytes in step two to 387. This is\n"
 "   the length of the base64 destination.\n"
-"4. Take that nummber of bytes from the front of the full destination to "
-"get\n"
+"4. Take that nummber of bytes from the front of the full destination to get\n"
 "   the destination as a range of bytes.\n"
 "5. Convert back to a base64 representation using i2p's base64 character\n"
 "   set."
@@ -8889,8 +8072,7 @@ msgid ""
 "\n"
 "::\n"
 "\n"
-"       sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-"
-"config/i2pbote/local_dest.key"
+"       sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-config/i2pbote/local_dest.key"
 msgstr ""
 
 #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:149
@@ -8945,8 +8127,7 @@ msgid ""
 "\n"
 "Now that you've got the correct destination for your I2P-Bote node, the\n"
 "final step is to add yourself to the default peers list for `I2P-Bote\n"
-"here <https://github.com/i2p/i2p.i2p-"
-"bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n"
+"here <https://github.com/i2p/i2p.i2p-bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n"
 "here. You can do this by forking the repository, adding yourself to the\n"
 "list with your name commented out, and your 516-char destination\n"
 "directly below it, like this:"
@@ -8959,12 +8140,7 @@ msgid ""
 "::\n"
 "\n"
 "       # idk\n"
-"       QuabT3H5ljZyd-PXCQjvDzdfCec-"
-"2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-"
-"bkSo0gEhB-"
-"GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA"
-"~z0Nus-"
-"VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA"
+"       QuabT3H5ljZyd-PXCQjvDzdfCec-2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-bkSo0gEhB-GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA~z0Nus-VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA"
 msgstr ""
 
 #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:205
@@ -8985,38 +8161,25 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:10
 msgid ""
-"Although the Java I2P router comes pre-configured with a static web "
-"server,\n"
-"jetty, to provide the user's first eepSite, many require more "
-"sophisticated\n"
-"functionality from their web server and would rather create an eepSite "
-"with a\n"
-"different server. This is of course possible, and actually is really easy"
-" once\n"
+"Although the Java I2P router comes pre-configured with a static web server,\n"
+"jetty, to provide the user's first eepSite, many require more sophisticated\n"
+"functionality from their web server and would rather create an eepSite with a\n"
+"different server. This is of course possible, and actually is really easy once\n"
 "you've done it one time."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:18
 msgid ""
-"Although it is easy to do, there are a few things you should consider "
-"before\n"
-"doing it. You will want to remove identifying characteristics from your "
-"web\n"
-"server, like potentially identifying headers and default error pages that"
-"\n"
-"report the server/distro type. More information about threats to "
-"anonymity\n"
+"Although it is easy to do, there are a few things you should consider before\n"
+"doing it. You will want to remove identifying characteristics from your web\n"
+"server, like potentially identifying headers and default error pages that\n"
+"report the server/distro type. More information about threats to anonymity\n"
 "posed by improperly configured applications see:\n"
-"`Riseup here: <https://riseup.net/en/security/network-security/tor"
-"/onionservices-best-practices>`__,\n"
+"`Riseup here: <https://riseup.net/en/security/network-security/tor/onionservices-best-practices>`__,\n"
 "`Whonix Here: <https://www.whonix.org/wiki/Onion_Services>`__,\n"
-"`This blog article for some opsec fails: "
-"<https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,"
-"\n"
-"`and the I2P applications page here "
-"<https://geti2p.net/en/docs/applications/supported>`__.\n"
-"Although much of this information is expressed for Tor Onion Services, "
-"the same\n"
+"`This blog article for some opsec fails: <https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,\n"
+"`and the I2P applications page here <https://geti2p.net/en/docs/applications/supported>`__.\n"
+"Although much of this information is expressed for Tor Onion Services, the same\n"
 "procedures and principles apply to hosting applications over I2P."
 msgstr ""
 
@@ -9027,8 +8190,7 @@ msgstr ""
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:35
 msgid ""
 "Go to the I2P web interface at 127.0.0.1:7657 and open the\n"
-"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links"
-" to\n"
+"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links to\n"
 "localhost). Click the button that says \"Tunnel Wizard\" to begin."
 msgstr ""
 
@@ -9038,8 +8200,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:48
 msgid ""
-"The tunnel wizard is very simple. Since we're setting up an http "
-"*server*, all\n"
+"The tunnel wizard is very simple. Since we're setting up an http *server*, all\n"
 "we need to do is select a *server* tunnel."
 msgstr ""
 
@@ -9049,15 +8210,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:60
 msgid ""
-"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP "
-"services.\n"
+"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP services.\n"
 "It has filtering and rate-limiting features enabled that are tailored\n"
-"specifically to that purpose. A standard tunnel may work as well, but if "
-"you\n"
-"select a atandard tunnel you'll need to take care of those security "
-"features\n"
-"yourself. A more in-depth dive into the HTTP Tunnel configuration is "
-"available\n"
+"specifically to that purpose. A standard tunnel may work as well, but if you\n"
+"select a atandard tunnel you'll need to take care of those security features\n"
+"yourself. A more in-depth dive into the HTTP Tunnel configuration is available\n"
 "in the next tutorial."
 msgstr ""
 
@@ -9067,12 +8224,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:76
 msgid ""
-"For your own benefit and ability to remeber and distinguish the what you "
-"are\n"
-"using the tunnel for, give it a good nickname and description. If you "
-"need to\n"
-"come back and do more management later, then this is how you will "
-"identify the\n"
+"For your own benefit and ability to remeber and distinguish the what you are\n"
+"using the tunnel for, give it a good nickname and description. If you need to\n"
+"come back and do more management later, then this is how you will identify the\n"
 "tunnel in the hidden services manager."
 msgstr ""
 
@@ -9082,12 +8236,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:90
 msgid ""
-"In this step, you point the web server at the TCP port where your web "
-"server is\n"
-"listening. Since most web servers listen on port 80 or port 8080, the "
-"example\n"
-"shows that. If you use alternate ports or virtual machines or containers "
-"to\n"
+"In this step, you point the web server at the TCP port where your web server is\n"
+"listening. Since most web servers listen on port 80 or port 8080, the example\n"
+"shows that. If you use alternate ports or virtual machines or containers to\n"
 "isolate your web services, you may need to adjust the host, port, or both."
 msgstr ""
 
@@ -9105,12 +8256,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:115
 msgid ""
-"Finally, take a look at the settings you have selected. If you approve, "
-"save\n"
-"them. If you did not choose to start the tunnel automatically, go to the "
-"hidden\n"
-"services manager and start it manually when you wish to make your service"
-"\n"
+"Finally, take a look at the settings you have selected. If you approve, save\n"
+"them. If you did not choose to start the tunnel automatically, go to the hidden\n"
+"services manager and start it manually when you wish to make your service\n"
 "available."
 msgstr ""
 
@@ -9120,10 +8268,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:129
 msgid ""
-"I2P provides a detailed panel for configuring the http server tunnel in "
-"custom\n"
-"ways. I'll finish this tutorial by walking through all of them. "
-"Eventually."
+"I2P provides a detailed panel for configuring the http server tunnel in custom\n"
+"ways. I'll finish this tutorial by walking through all of them. Eventually."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:4
@@ -9136,38 +8282,28 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:10
 msgid ""
-"This blog post is intended as a general guide to running a mirror of a "
-"clear-net\n"
-"service as an eepSite. It elaborates on the previous blog post about "
-"basic\n"
+"This blog post is intended as a general guide to running a mirror of a clear-net\n"
+"service as an eepSite. It elaborates on the previous blog post about basic\n"
 "I2PTunnel tunnels."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:16
 msgid ""
-"Unfortunately, it's probably impossible to *completely* cover all "
-"possible cases\n"
-"of making an existing web site available as an eepSite, there's simply "
-"too\n"
+"Unfortunately, it's probably impossible to *completely* cover all possible cases\n"
+"of making an existing web site available as an eepSite, there's simply too\n"
 "diverse an array of server-side software, not to mention the in-practice\n"
-"peculiarities of any particular deployment of software. Instead, I'm "
-"going to\n"
-"try and convey, as specifically as possible, the general process "
-"preparing a\n"
+"peculiarities of any particular deployment of software. Instead, I'm going to\n"
+"try and convey, as specifically as possible, the general process preparing a\n"
 "service for deployment to the eepWeb or other hidden services."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:25
 msgid ""
-"Much of this guide will be treating the reader as a conversational "
-"participant,\n"
-"in particular If I really mean it I will address the reader directly(i.e."
-" using\n"
-"\"you\" instead of \"one\") and I'll frequently head sections with "
-"questions I think\n"
+"Much of this guide will be treating the reader as a conversational participant,\n"
+"in particular If I really mean it I will address the reader directly(i.e. using\n"
+"\"you\" instead of \"one\") and I'll frequently head sections with questions I think\n"
 "the reader might be asking. This is, after all, a \"process\" that an\n"
-"administrator must consider themselves \"involved\" in just like hosting "
-"any other\n"
+"administrator must consider themselves \"involved\" in just like hosting any other\n"
 "service."
 msgstr ""
 
@@ -9177,16 +8313,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:37
 msgid ""
-"While it would be wonderful, it's probably impossible for me to put "
-"specific\n"
-"instructions for every single kind of software that one might use to host"
-" web\n"
-"sites. As such, this tutorial requires some assumptions on the part of "
-"the\n"
-"writer and some critical thinking and common sense on the part of the "
-"reader.\n"
-"To be clear, **I have assumed that the person following this tutorial "
-"is**\n"
+"While it would be wonderful, it's probably impossible for me to put specific\n"
+"instructions for every single kind of software that one might use to host web\n"
+"sites. As such, this tutorial requires some assumptions on the part of the\n"
+"writer and some critical thinking and common sense on the part of the reader.\n"
+"To be clear, **I have assumed that the person following this tutorial is**\n"
 "**already operating a clear-web service linkable to a real identity or**\n"
 "**organization** and thus is simply offering anonymous access and not\n"
 "anonymizing themselves."
@@ -9194,22 +8325,17 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:48
 msgid ""
-"Thus, **it makes no attempt whatsoever to anonymize** a connection from "
-"one\n"
-"server to another. If you want to run a new, un-linkable hidden service "
-"that\n"
-"makes server-to-server connections, additional steps will be required and"
-" will\n"
+"Thus, **it makes no attempt whatsoever to anonymize** a connection from one\n"
+"server to another. If you want to run a new, un-linkable hidden service that\n"
+"makes server-to-server connections, additional steps will be required and will\n"
 "be covered in another tutorial."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:55
 msgid ""
 "That said: If you can be sure that a *brand new service* which is *not*\n"
-"*available to the clear-web* will never make a server-to-server "
-"connection and\n"
-"will not leak server metadata in responses to clients, then services "
-"configured\n"
+"*available to the clear-web* will never make a server-to-server connection and\n"
+"will not leak server metadata in responses to clients, then services configured\n"
 "in this way will be anonymous."
 msgstr ""
 
@@ -9223,16 +8349,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:68
 msgid ""
-"In practice, your web service probably uses a number of things to enhance"
-" it's\n"
-"reliability and security. These things could be proxies, reverse proxies,"
-"\n"
-"containers, tunnels, Intrusion Detection Systems, rate-limiters, load "
-"balancers,\n"
-"among many other things. When you get started, you should go through your"
-"\n"
-"deployment and determine which software you are using, and what you are "
-"using it\n"
+"In practice, your web service probably uses a number of things to enhance it's\n"
+"reliability and security. These things could be proxies, reverse proxies,\n"
+"containers, tunnels, Intrusion Detection Systems, rate-limiters, load balancers,\n"
+"among many other things. When you get started, you should go through your\n"
+"deployment and determine which software you are using, and what you are using it\n"
 "for."
 msgstr ""
 
@@ -9242,8 +8363,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:80
 msgid ""
-"These questions should help you evaluate what parts of your software "
-"stack are\n"
+"These questions should help you evaluate what parts of your software stack are\n"
 "relevant to your I2P eepSite."
 msgstr ""
 
@@ -9253,16 +8373,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:88
 msgid ""
-"If you are using software which alters the behavior of traffic based on "
-"the IP\n"
-"address of the sender, these things will probably not work with I2P, or "
-"may work\n"
-"in complicated or unexpected ways. This is because the address will "
-"usually be\n"
-"the localhost, or at least the host where your I2P router is running. "
-"Software\n"
-"which sometimes does things based on IP addresses could be Fail2Ban, "
-"iptables,\n"
+"If you are using software which alters the behavior of traffic based on the IP\n"
+"address of the sender, these things will probably not work with I2P, or may work\n"
+"in complicated or unexpected ways. This is because the address will usually be\n"
+"the localhost, or at least the host where your I2P router is running. Software\n"
+"which sometimes does things based on IP addresses could be Fail2Ban, iptables,\n"
 "and similar applications."
 msgstr ""
 
@@ -9272,10 +8387,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:100
 msgid ""
-"Some software may be configured to add information to the traffic it "
-"handles.\n"
-"Obviously, if this information is identifying it should not be part of "
-"the chain\n"
+"Some software may be configured to add information to the traffic it handles.\n"
+"Obviously, if this information is identifying it should not be part of the chain\n"
 "of services that is exposed to the I2P network."
 msgstr ""
 
@@ -9287,37 +8400,27 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:109
 msgid ""
-"Some software may also draw from remote resources, to find up-to-date "
-"rules and\n"
-"block lists which can be used to prevent attacks. Some of these might be "
-"useful\n"
-"as part of the service that is exposed to I2P, but you should make sure "
-"that the\n"
-"rules are applicable and that a rules update cannot be triggered as a "
-"result of\n"
-"a normal client request. This would create a server-to-server "
-"communication\n"
+"Some software may also draw from remote resources, to find up-to-date rules and\n"
+"block lists which can be used to prevent attacks. Some of these might be useful\n"
+"as part of the service that is exposed to I2P, but you should make sure that the\n"
+"rules are applicable and that a rules update cannot be triggered as a result of\n"
+"a normal client request. This would create a server-to-server communication\n"
 "which could reveal the timing of an I2P communication to a third party."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:118
 msgid ""
-"Step two: Determine which port to Forward to I2P and Optionally locate "
-"your TLS certificate"
+"Step two: Determine which port to Forward to I2P and Optionally locate your "
+"TLS certificate"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:121
 msgid ""
-"Now you've gathered all the information that you will require to forward "
-"your\n"
-"service to I2P. Once you've selected the point at which you would like to"
-" make\n"
-"your site available to I2P, you will need to note the port you wish to "
-"foward.\n"
-"In simple scenarios, this will probably just be port 80 or port 8080. In "
-"more\n"
-"sophisticated scenarios, this might be a reverse proxy or something like "
-"that.\n"
+"Now you've gathered all the information that you will require to forward your\n"
+"service to I2P. Once you've selected the point at which you would like to make\n"
+"your site available to I2P, you will need to note the port you wish to foward.\n"
+"In simple scenarios, this will probably just be port 80 or port 8080. In more\n"
+"sophisticated scenarios, this might be a reverse proxy or something like that.\n"
 "Make a note of the port."
 msgstr ""
 
@@ -9327,18 +8430,12 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:133
 msgid ""
-"Should you be a non-anonymous organization that wishes to provide "
-"enhanced\n"
-"privacy to your users by providing a hidden service, you may wish to "
-"establish\n"
-"a common identity between versions of your site. However, since we can't "
-"add\n"
-"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we "
-"have to do\n"
-"this in another way. To do this, **even if you are forwarding the HTTP "
-"port**\n"
-"**and not HTTPS**, make a note of the location of your TLS certificate "
-"for use\n"
+"Should you be a non-anonymous organization that wishes to provide enhanced\n"
+"privacy to your users by providing a hidden service, you may wish to establish\n"
+"a common identity between versions of your site. However, since we can't add\n"
+"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we have to do\n"
+"this in another way. To do this, **even if you are forwarding the HTTP port**\n"
+"**and not HTTPS**, make a note of the location of your TLS certificate for use\n"
 "in the final step."
 msgstr ""
 
@@ -9348,10 +8445,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:146
 msgid ""
-"Congratulations! You've completed the most difficult part. From here on, "
-"the\n"
-"decisions you must make, and the consequences that they will have, are "
-"much\n"
+"Congratulations! You've completed the most difficult part. From here on, the\n"
+"decisions you must make, and the consequences that they will have, are much\n"
 "more straightforward and easy to enumerate. Such is the beauty of a\n"
 "cryptographically secure network layer like I2P!"
 msgstr ""
@@ -9363,20 +8458,13 @@ msgstr ""
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:158
 msgid ""
 "For eepSites, you will need to create an HTTP Server Tunnel. This is\n"
-"an I2P destination with a few special features for hosting HTTP services "
-"to\n"
-"enable things like rate-limiting, filtering, and the inclusion of headers"
-" to\n"
-"identify the destination of the client to the server. These enable "
-"flexibility\n"
-"in how you handle connections in terms of load-balancing and rate-"
-"limiting on\n"
-"a case-by-case basis, among other things. Explore these options and how "
-"they\n"
-"relate to the applications which you considered in step one, even though "
-"a very\n"
-"simple setup is easy, larger sites may benefit from taking advantage of "
-"these\n"
+"an I2P destination with a few special features for hosting HTTP services to\n"
+"enable things like rate-limiting, filtering, and the inclusion of headers to\n"
+"identify the destination of the client to the server. These enable flexibility\n"
+"in how you handle connections in terms of load-balancing and rate-limiting on\n"
+"a case-by-case basis, among other things. Explore these options and how they\n"
+"relate to the applications which you considered in step one, even though a very\n"
+"simple setup is easy, larger sites may benefit from taking advantage of these\n"
 "features."
 msgstr ""
 
@@ -9386,98 +8474,70 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:173
 msgid ""
-"If you've configured a reverse proxy or an SSH tunnel before, then the "
-"general\n"
+"If you've configured a reverse proxy or an SSH tunnel before, then the general\n"
 "idea here should be very familiar to you. I2PTunnel, in essence, is just\n"
-"forwarding ports from the host to the I2P Network. To set this up using "
-"the web\n"
+"forwarding ports from the host to the I2P Network. To set this up using the web\n"
 "interface, go to the I2PTunnel configuration page."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:180
 msgid ""
-"At the bottom of the \"I2P Hidden Services\" section of the page, select "
-"an HTTP\n"
+"At the bottom of the \"I2P Hidden Services\" section of the page, select an HTTP\n"
 "Service from the drop-down and click \"Create.\""
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:189
 msgid ""
-"It will immediately drop you into the granular tunnel configuration page,"
-" which\n"
-"we're about to explore from top-to-bottom. The first, most essential "
-"settings\n"
-"are the tunnel name and the target host:port. **The target host:port is**"
-"\n"
-"**the place where you input the address of the service you are forwarding"
-" to**\n"
-"**I2P**. Once you've configured that, your web site will become available"
-" over\n"
+"It will immediately drop you into the granular tunnel configuration page, which\n"
+"we're about to explore from top-to-bottom. The first, most essential settings\n"
+"are the tunnel name and the target host:port. **The target host:port is**\n"
+"**the place where you input the address of the service you are forwarding to**\n"
+"**I2P**. Once you've configured that, your web site will become available over\n"
 "i2p. However, there are probably a few things that we can improve."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:202
 msgid ""
-"Next, you may want to pick a hostname to use for your eepSite. This "
-"hostname\n"
-"doesn't need to be universally unique, for now, it will only be used "
-"locally.\n"
-"We'll publish it to an address helper later. **If** the *Local "
-"Destination*\n"
-"field isn't populated with your Base64 Destination yet, you should scroll"
-" down\n"
+"Next, you may want to pick a hostname to use for your eepSite. This hostname\n"
+"doesn't need to be universally unique, for now, it will only be used locally.\n"
+"We'll publish it to an address helper later. **If** the *Local Destination*\n"
+"field isn't populated with your Base64 Destination yet, you should scroll down\n"
 "to the bottom, save the tunnel configuration, and return to the tunnel\n"
 "configuration."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:215
 msgid ""
-"A little further down the configuration page, the tunnel options are "
-"available.\n"
-"Since you've got a site which is not intended to be anonymous, but rather"
-" to\n"
-"provide anonymous access to others by an alternate gateway, it may be "
-"good to\n"
+"A little further down the configuration page, the tunnel options are available.\n"
+"Since you've got a site which is not intended to be anonymous, but rather to\n"
+"provide anonymous access to others by an alternate gateway, it may be good to\n"
 "reduce the number of hops the tunnel takes on the I2P network."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:226
 msgid ""
-"Next are the encrypted leaseset options. You can probably leave these as "
-"the\n"
-"defaults, since your site isn't anonymous it probably doesn't need "
-"features like\n"
-"blinding or encrypted leasesets. If you were to choose encrypted "
-"leasesets, you\n"
-"would not be accessible to anyone unless you shared a key with them in "
-"advance."
+"Next are the encrypted leaseset options. You can probably leave these as the\n"
+"defaults, since your site isn't anonymous it probably doesn't need features like\n"
+"blinding or encrypted leasesets. If you were to choose encrypted leasesets, you\n"
+"would not be accessible to anyone unless you shared a key with them in advance."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:237
 msgid ""
-"The next few parts may be especially useful to you if you run a high-"
-"traffic\n"
-"site or find yourself subject to DDOS attacks. Here you can configure "
-"various\n"
+"The next few parts may be especially useful to you if you run a high-traffic\n"
+"site or find yourself subject to DDOS attacks. Here you can configure various\n"
 "kinds of connection limits."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:247
 msgid ""
-"After that, there are a few other ways of filtering connections by client"
-"\n"
-"characteristics. First, you can block access via inproxies like I2P.to "
-"and\n"
-"similar. Since you have a clearnet presence already, changing this may be"
-" better\n"
-"if you want to encourage I2P users to only use your eepSite. You can also"
-" block\n"
-"accesses via specific user-agents, for instance blocking wget may be "
-"helpful if\n"
-"you want to prevent spidering. Finally, and of particular interest to "
-"Fail2Ban\n"
-"users, the \"Unique local address per client\" will give each client it's"
-" own\n"
+"After that, there are a few other ways of filtering connections by client\n"
+"characteristics. First, you can block access via inproxies like I2P.to and\n"
+"similar. Since you have a clearnet presence already, changing this may be better\n"
+"if you want to encourage I2P users to only use your eepSite. You can also block\n"
+"accesses via specific user-agents, for instance blocking wget may be helpful if\n"
+"you want to prevent spidering. Finally, and of particular interest to Fail2Ban\n"
+"users, the \"Unique local address per client\" will give each client it's own\n"
 "local IP address instead of them all appearing to the server to be from\n"
 "127.0.0.1."
 msgstr ""
@@ -9488,10 +8548,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:271
 msgid ""
-"Lastly, you can set up an advanced filter definition. Writing filters is "
-"beyond\n"
-"what I'm prepared to do in this document, for more information see the "
-"format\n"
+"Lastly, you can set up an advanced filter definition. Writing filters is beyond\n"
+"what I'm prepared to do in this document, for more information see the format\n"
 "specification for now."
 msgstr ""
 
@@ -9501,22 +8559,16 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:284
 msgid ""
-"One interesting thing that I2P can do is host the same site on multiple "
-"servers\n"
-"at the same time transparently, which is referred to as \"Multihoming.\" "
-"In order\n"
-"to multihome your application, you will need to return to the tunnel menu"
-" and\n"
-"change the location of your private key file to it's own, non-shared "
-"location."
+"One interesting thing that I2P can do is host the same site on multiple servers\n"
+"at the same time transparently, which is referred to as \"Multihoming.\" In order\n"
+"to multihome your application, you will need to return to the tunnel menu and\n"
+"change the location of your private key file to it's own, non-shared location."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:295
 msgid ""
-"When you're done, copy the new key file for your new multihomed service "
-"to a\n"
-"storage device. Now, you can re-produce your service/tunnel configuration"
-" with\n"
+"When you're done, copy the new key file for your new multihomed service to a\n"
+"storage device. Now, you can re-produce your service/tunnel configuration with\n"
 "those same keys on any I2P router and increase your service's redundancy."
 msgstr ""
 
@@ -9526,11 +8578,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:304
 msgid ""
-"Since you're running an anonymously accessible instance of an existing "
-"clear-net\n"
+"Since you're running an anonymously accessible instance of an existing clear-net\n"
 "service, you'll probably want to leverage some existing form of trust to\n"
-"distribute your eepSite URL, like a TLS Certificate signed by a "
-"recognized and\n"
+"distribute your eepSite URL, like a TLS Certificate signed by a recognized and\n"
 "reputable authority. What can I say we live in an imperfect world."
 msgstr ""
 
@@ -9540,29 +8590,23 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:316
 msgid ""
-"The simplest way to provide a link to your eepSite using an existing site"
-" to\n"
-"distribute the link is to distribute a so-called \"Base32\" address. The "
-"Base32\n"
-"address is the hash of the public key of your I2P destination, so it "
-"cannot be\n"
-"forged if it is provided by a reliable source. In the case of a clear-net"
-" site\n"
+"The simplest way to provide a link to your eepSite using an existing site to\n"
+"distribute the link is to distribute a so-called \"Base32\" address. The Base32\n"
+"address is the hash of the public key of your I2P destination, so it cannot be\n"
+"forged if it is provided by a reliable source. In the case of a clear-net site\n"
 "with a hidden service presence, one of those places is likely to be that\n"
 "clear-net site."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:325
 msgid ""
-"Your base32 address is visible on the main i2ptunnel configuration page "
-"and it\n"
+"Your base32 address is visible on the main i2ptunnel configuration page and it\n"
 "looks like this:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:334
 msgid ""
-"Your users can copy-and-paste this link directly into their I2P browsers "
-"and\n"
+"Your users can copy-and-paste this link directly into their I2P browsers and\n"
 "it will just work, no additional configuration required."
 msgstr ""
 
@@ -9572,17 +8616,12 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:342
 msgid ""
-"You can also distribute a human-readable link to suggest to your "
-"potential users\n"
-"by taking advantage of I2P's \"Address Book\" feature, which allows the "
-"users to\n"
+"You can also distribute a human-readable link to suggest to your potential users\n"
+"by taking advantage of I2P's \"Address Book\" feature, which allows the users to\n"
 "decide to assign a human-readable domain name to your cryptographically\n"
-"assured identity. You can do this by distributing a specially crafted "
-"link\n"
-"containing the domain name that you want to suggest, followed by a slash,"
-"\n"
-"followed by ?i2paddresshelper=, followed by the Local Destination of the "
-"tunnel\n"
+"assured identity. You can do this by distributing a specially crafted link\n"
+"containing the domain name that you want to suggest, followed by a slash,\n"
+"followed by ?i2paddresshelper=, followed by the Local Destination of the tunnel\n"
 "you just created, which you can see here:"
 msgstr ""
 
@@ -9592,14 +8631,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:364
 msgid ""
-"I keep saying suggest because when the such a link is visited, I2P asks "
-"for the\n"
-"user's consent to add this human-readable name to the user's local "
-"address book.\n"
-"That means there is no expectation that this domain be universally agreed"
-" upon\n"
-"by all visitors on the I2P network, whereas in the case of base32 "
-"addresses,\n"
+"I keep saying suggest because when the such a link is visited, I2P asks for the\n"
+"user's consent to add this human-readable name to the user's local address book.\n"
+"That means there is no expectation that this domain be universally agreed upon\n"
+"by all visitors on the I2P network, whereas in the case of base32 addresses,\n"
 "the opposite is true."
 msgstr ""
 
@@ -9609,16 +8644,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:375
 msgid ""
-"Nonetheless, there do exist publicly available address subscription "
-"feeds, and\n"
-"special services for discovering new human-readable addresses, such as "
-"no.i2p,\n"
-"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or "
-"Jump\n"
-"Services, and can also be subscribed to automatically. This may be "
-"espescially\n"
-"helpful to users of your service who wish to acquire the address without "
-"leaving\n"
+"Nonetheless, there do exist publicly available address subscription feeds, and\n"
+"special services for discovering new human-readable addresses, such as no.i2p,\n"
+"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or Jump\n"
+"Services, and can also be subscribed to automatically. This may be espescially\n"
+"helpful to users of your service who wish to acquire the address without leaving\n"
 "I2P or visiting your clearnet service."
 msgstr ""
 
@@ -9636,10 +8666,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:405
 msgid ""
-"Most of the security issues of hosting Tor hidden services also apply to "
-"I2P. It\n"
-"would be advisable to take advantage of their resources as well as this "
-"one:"
+"Most of the security issues of hosting Tor hidden services also apply to I2P. It\n"
+"would be advisable to take advantage of their resources as well as this one:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:410
@@ -9692,27 +8720,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:10
 msgid ""
-"This is a tutorial on how to set up and tweak an I2P tunnel in order to "
-"use it\n"
-"to access an SSH server remotely, using either I2P or i2pd. For now, it "
-"assumes\n"
-"you will install your SSH server from a package manager and that it's "
-"running\n"
+"This is a tutorial on how to set up and tweak an I2P tunnel in order to use it\n"
+"to access an SSH server remotely, using either I2P or i2pd. For now, it assumes\n"
+"you will install your SSH server from a package manager and that it's running\n"
 "as a service."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:17
 msgid ""
-"Considerations: In this guide, I'm assuming a few things. They will need "
-"to be\n"
-"adjusted depending on the complications that arise in your particular "
-"setup,\n"
-"especially if you use VM's or containers for isolation. This assumes that"
-" the\n"
-"I2P router and the ssh server are running on the same localhost. You "
-"should be\n"
-"using newly-generated SSH host keys, either by using a freshly installed "
-"sshd,\n"
+"Considerations: In this guide, I'm assuming a few things. They will need to be\n"
+"adjusted depending on the complications that arise in your particular setup,\n"
+"especially if you use VM's or containers for isolation. This assumes that the\n"
+"I2P router and the ssh server are running on the same localhost. You should be\n"
+"using newly-generated SSH host keys, either by using a freshly installed sshd,\n"
 "or by deleting old keys and forcing their re-generation. For example:"
 msgstr ""
 
@@ -9727,9 +8747,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:41
 msgid ""
-"Using java I2P's web interface, navigate to the (Links to your Router "
-"Console)\\ `Hidden Services Manager "
-"<http://127.0.0.1:7657/i2ptunnelmgr>`__\n"
+"Using java I2P's web interface, navigate to the (Links to your Router Console)\\ `Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\n"
 "and start the tunnel wizard."
 msgstr ""
 
@@ -9740,15 +8758,13 @@ msgstr "Kreator Tunelu"
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:49
 msgid ""
-"Since you are setting up this tunnel for the SSH server, you need to "
-"select the\n"
+"Since you are setting up this tunnel for the SSH server, you need to select the\n"
 "\"Server\" tunnel type."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:58
 msgid ""
-"You should fine-tune it later, but the Standard tunnel type is easiest to"
-" start\n"
+"You should fine-tune it later, but the Standard tunnel type is easiest to start\n"
 "with."
 msgstr ""
 
@@ -9771,23 +8787,17 @@ msgstr "Ustawienia zaawansowane"
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:92
 msgid ""
-"Now head back over the the Hidden Services Manager, and look over the "
-"available\n"
-"advanced settings. One thing you'll definitely want to change is to set "
-"it up\n"
+"Now head back over the the Hidden Services Manager, and look over the available\n"
+"advanced settings. One thing you'll definitely want to change is to set it up\n"
 "for interactive connections intstead of bulk connections."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:102
 msgid ""
-"Besides that, these other options can affect performance when accessing "
-"your SSH\n"
-"server. If you aren't that concerned about your anonymity, then you could"
-" reduce\n"
-"the number of hops you take. If you have trouble with speed, a higher "
-"tunnel\n"
-"count might help. A few backup tunnels are probably a good idea. You "
-"might have\n"
+"Besides that, these other options can affect performance when accessing your SSH\n"
+"server. If you aren't that concerned about your anonymity, then you could reduce\n"
+"the number of hops you take. If you have trouble with speed, a higher tunnel\n"
+"count might help. A few backup tunnels are probably a good idea. You might have\n"
 "to dial-it-in a bit."
 msgstr ""
 
@@ -9797,10 +8807,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:118
 msgid ""
-"Another interesting setting, especially if you choose to run a high "
-"number of\n"
-"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels "
-"that run\n"
+"Another interesting setting, especially if you choose to run a high number of\n"
+"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels that run\n"
 "when the serve has experienced extended inactivity."
 msgstr ""
 
@@ -9811,12 +8819,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:131
 msgid ""
-"With i2pd, all configuration is done with files instead of via a web "
-"interface.\n"
-"In order to configure an SSH Service tunnel for i2pd, tweak the following"
-"\n"
-"example settings to your anonymity and performance needs and copy them "
-"into\n"
+"With i2pd, all configuration is done with files instead of via a web interface.\n"
+"In order to configure an SSH Service tunnel for i2pd, tweak the following\n"
+"example settings to your anonymity and performance needs and copy them into\n"
 "tunnels.conf"
 msgstr ""
 
@@ -9830,21 +8835,16 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:158
 msgid ""
-"Depending on how you want to access your SSH Server, you may want to make"
-" a few\n"
-"changes to the settings. Besides the obvious SSH hardening stuff you "
-"should do\n"
-"on all SSH servers(Public-Key Authentication, no login as root, etc), if "
-"you\n"
-"don't want your SSH server to listen on any addresses except your server "
-"tunnel,\n"
+"Depending on how you want to access your SSH Server, you may want to make a few\n"
+"changes to the settings. Besides the obvious SSH hardening stuff you should do\n"
+"on all SSH servers(Public-Key Authentication, no login as root, etc), if you\n"
+"don't want your SSH server to listen on any addresses except your server tunnel,\n"
 "you should change AddressFamily to inet and ListenAddress to 127.0.0.1."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:171
 msgid ""
-"If you choose to use a port other than 22 for your SSH server, you will "
-"need to\n"
+"If you choose to use a port other than 22 for your SSH server, you will need to\n"
 "change the port in your I2P tunnel configuration."
 msgstr ""
 
@@ -9854,27 +8854,22 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:179
 msgid ""
-"You will need to be able to see the I2P router console of the SSH server "
-"in\n"
-"order to configure your client connection. One neat thing about this "
-"setup is\n"
+"You will need to be able to see the I2P router console of the SSH server in\n"
+"order to configure your client connection. One neat thing about this setup is\n"
 "that the initial connection to the I2P tunnel is authenticated, somewhat\n"
-"reducing the risk of your initial connection to the SSH server being "
-"MITM'ed,\n"
+"reducing the risk of your initial connection to the SSH server being MITM'ed,\n"
 "as is a risk in Trust-On-First-Use scenarios."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:197
 msgid ""
-"First, start the tunnel configuration wizard from the hidden services "
-"manager\n"
+"First, start the tunnel configuration wizard from the hidden services manager\n"
 "and select a client tunnel."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:206
 msgid ""
-"Next, select the standard tunnel type. You will fine-tune this "
-"configuration\n"
+"Next, select the standard tunnel type. You will fine-tune this configuration\n"
 "later."
 msgstr ""
 
@@ -9884,27 +8879,22 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:223
 msgid ""
-"This is the only slightly tricky part. Go to the hidden services manager "
-"of the\n"
-"I2P router console and find the base64 \"local destination\" of the SSH "
-"server\n"
-"tunnel. You'll need to find a way to copy this information into the next "
-"step.\n"
+"This is the only slightly tricky part. Go to the hidden services manager of the\n"
+"I2P router console and find the base64 \"local destination\" of the SSH server\n"
+"tunnel. You'll need to find a way to copy this information into the next step.\n"
 "I generally `Tox <https://tox.chat>`__ it to myself, any off-the-record\n"
 "should be sufficient for most people."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:235
 msgid ""
-"Once you've found the base64 destination you want to connect to "
-"transmitted to\n"
+"Once you've found the base64 destination you want to connect to transmitted to\n"
 "your client device, then paste it into the client destination field."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:244
 msgid ""
-"Lastly, set a local port to connect your ssh client to. This will local "
-"port\n"
+"Lastly, set a local port to connect your ssh client to. This will local port\n"
 "will be connected to the base64 destination and thus the SSH server."
 msgstr ""
 
@@ -9914,19 +8904,15 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:266
 msgid ""
-"Like before, you'll want to change the settings to be optimized for "
-"interactive\n"
-"connections. Additionally, if you want to set up client whiteliting on "
-"the\n"
-"server, you should check the \"Generate key to enable persistent client "
-"tunnel\n"
+"Like before, you'll want to change the settings to be optimized for interactive\n"
+"connections. Additionally, if you want to set up client whiteliting on the\n"
+"server, you should check the \"Generate key to enable persistent client tunnel\n"
 "identity\" radial button."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:282
 msgid ""
-"You can set this up by adding the following lines to your tunnels.conf "
-"and\n"
+"You can set this up by adding the following lines to your tunnels.conf and\n"
 "adjust it for your performance/anonymity needs."
 msgstr ""
 
@@ -9940,14 +8926,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:309
 msgid ""
-"There are lots of ways to set up an SSH client to connect to your server "
-"on I2P,\n"
-"but there are a few things you should do to secure your SSH client for "
-"anonymous\n"
-"use. First, you should configure it to only identify itself to SSH server"
-" with\n"
-"a single, specific key so that you don't risk contaminating your "
-"anonymous and\n"
+"There are lots of ways to set up an SSH client to connect to your server on I2P,\n"
+"but there are a few things you should do to secure your SSH client for anonymous\n"
+"use. First, you should configure it to only identify itself to SSH server with\n"
+"a single, specific key so that you don't risk contaminating your anonymous and\n"
 "non-anonymous SSH connections."
 msgstr ""
 
@@ -9957,8 +8939,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:328
 msgid ""
-"Alternatively, you could make a .bash_alias entry to enforce your options"
-" and\n"
+"Alternatively, you could make a .bash_alias entry to enforce your options and\n"
 "automatically connect to I2P. You get the idea, you need to enforce\n"
 "IdentitiesOnly and provide an identity file."
 msgstr ""
@@ -9969,26 +8950,21 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:343
 msgid ""
-"This is more-or-less optional, but it's pretty cool and will prevent "
-"anyone who\n"
-"happens to come across your destination from being able to tell you are "
-"hosting\n"
+"This is more-or-less optional, but it's pretty cool and will prevent anyone who\n"
+"happens to come across your destination from being able to tell you are hosting\n"
 "an SSH service."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:349
 msgid ""
-"First, retrieve the persistent client tunnel destination and transmit it "
-"to the\n"
+"First, retrieve the persistent client tunnel destination and transmit it to the\n"
 "server."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:358
 msgid ""
-"Add the client's base64 destination to the server's destination "
-"whitelist. Now\n"
-"you'll only be able to connect to the server tunnel from that specific "
-"client\n"
+"Add the client's base64 destination to the server's destination whitelist. Now\n"
+"you'll only be able to connect to the server tunnel from that specific client\n"
 "tunnel and no one else will be able to connect to that destination."
 msgstr ""
 
@@ -10006,28 +8982,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:12
 msgid ""
-"One of the best features of I2P, in my opinion, is it's SAM API, which "
-"can be\n"
-"used to build a bridge between I2P and your application or language of "
-"choice.\n"
-"Currently, dozens of SAM libraries exist for a variety of languages, "
-"including:"
+"One of the best features of I2P, in my opinion, is it's SAM API, which can be\n"
+"used to build a bridge between I2P and your application or language of choice.\n"
+"Currently, dozens of SAM libraries exist for a variety of languages, including:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:32
 msgid ""
-"If you're using any of these languages, you may be able to port your "
-"application\n"
-"to I2P already, using an existing library. That's not what this tutorial "
-"is\n"
-"about, though. This tutorial is about what to do if you want to create a "
-"SAM\n"
-"library in a new language. In this tutorial, I will implement a new SAM "
-"library\n"
-"in Java. I chose Java because there isn't a Java library that connects "
-"you to\n"
-"SAM yet, because of Java's use in Android, and because it's a language "
-"almost\n"
+"If you're using any of these languages, you may be able to port your application\n"
+"to I2P already, using an existing library. That's not what this tutorial is\n"
+"about, though. This tutorial is about what to do if you want to create a SAM\n"
+"library in a new language. In this tutorial, I will implement a new SAM library\n"
+"in Java. I chose Java because there isn't a Java library that connects you to\n"
+"SAM yet, because of Java's use in Android, and because it's a language almost\n"
 "everybody has at least a *little* experience with, so hopefully you can\n"
 "translate it into a language of your choice."
 msgstr ""
@@ -10038,10 +9005,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:46
 msgid ""
-"How you set up your own library will vary depending on the language you "
-"wish\n"
-"to use. For this example library, we'll be using java so we can create a "
-"library\n"
+"How you set up your own library will vary depending on the language you wish\n"
+"to use. For this example library, we'll be using java so we can create a library\n"
 "like this:"
 msgstr ""
 
@@ -10055,10 +9020,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:69
 msgid ""
-"There are a few pieces of data that almost any SAM library should "
-"probably\n"
-"manage. It will at least need to store the address of the SAM Bridge you "
-"intend\n"
+"There are a few pieces of data that almost any SAM library should probably\n"
+"manage. It will at least need to store the address of the SAM Bridge you intend\n"
 "to use and the signature type you wish to use."
 msgstr ""
 
@@ -10068,8 +9031,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:78
 msgid ""
-"I prefer to store the SAM address as a String and an Integer, and re-"
-"combine\n"
+"I prefer to store the SAM address as a String and an Integer, and re-combine\n"
 "them in a function at runtime."
 msgstr ""
 
@@ -10079,15 +9041,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:94
 msgid ""
-"The valid signature types for an I2P Tunnel are DSA_SHA1, "
-"ECDSA_SHA256_P256,\n"
+"The valid signature types for an I2P Tunnel are DSA_SHA1, ECDSA_SHA256_P256,\n"
 "ECDSA_SHA384_P384, ECDSA_SHA512_P521, EdDSA_SHA512_Ed25519, but it is\n"
-"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if "
-"you\n"
-"implement at least SAM 3.1. In java, the 'enum' datastructure lends "
-"itself to\n"
-"this task, as it is intended to contain a group of constants. Add the "
-"enum, and\n"
+"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if you\n"
+"implement at least SAM 3.1. In java, the 'enum' datastructure lends itself to\n"
+"this task, as it is intended to contain a group of constants. Add the enum, and\n"
 "an instance of the enum, to your java class definition."
 msgstr ""
 
@@ -10098,8 +9056,7 @@ msgstr ""
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:117
 msgid ""
 "That takes care of reliably storing the signature type in use by the SAM\n"
-"connection, but you've still got to retrieve it as a string to "
-"communicate it\n"
+"connection, but you've still got to retrieve it as a string to communicate it\n"
 "to the bridge."
 msgstr ""
 
@@ -10109,10 +9066,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:156
 msgid ""
-"Once that's done, begin creating your constructor. Note that we've given "
-"our\n"
-"library defaults which will be useful in default situations on all "
-"existing I2P\n"
+"Once that's done, begin creating your constructor. Note that we've given our\n"
+"library defaults which will be useful in default situations on all existing I2P\n"
 "routers so far."
 msgstr ""
 
@@ -10122,14 +9077,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:173
 msgid ""
-"Finally, the good part. Interaction with the SAM bridge is done by "
-"sending a\n"
-"\"command\" to the address of the SAM bridge, and you can parse the "
-"result of the\n"
-"command as a set of string-based key-value pairs. So bearing that in "
-"mind, let's\n"
-"estabish a read-write connection to the SAM Address we defined before, "
-"then\n"
+"Finally, the good part. Interaction with the SAM bridge is done by sending a\n"
+"\"command\" to the address of the SAM bridge, and you can parse the result of the\n"
+"command as a set of string-based key-value pairs. So bearing that in mind, let's\n"
+"estabish a read-write connection to the SAM Address we defined before, then\n"
 "write a \"CommandSAM\" Function and a reply parser."
 msgstr ""
 
@@ -10139,17 +9090,14 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:184
 msgid ""
-"We're communicating with SAM via a Socket, so in order to connect to, "
-"read from,\n"
-"and write to the socket, you'll need to create the following private "
-"variables\n"
+"We're communicating with SAM via a Socket, so in order to connect to, read from,\n"
+"and write to the socket, you'll need to create the following private variables\n"
 "in the Jsam class:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:196
 msgid ""
-"You will also want to instantiate those variables in your Constructors by"
-"\n"
+"You will also want to instantiate those variables in your Constructors by\n"
 "creating a function to do so."
 msgstr ""
 
@@ -10159,23 +9107,17 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:222
 msgid ""
-"Now you're all set up to finally start talking to SAM. In order to keep "
-"things\n"
-"nicely organized, let's create a function which sends a single command to"
-" SAM,\n"
-"terminated by a newline, and which returns a Reply object, which we will "
-"create\n"
+"Now you're all set up to finally start talking to SAM. In order to keep things\n"
+"nicely organized, let's create a function which sends a single command to SAM,\n"
+"terminated by a newline, and which returns a Reply object, which we will create\n"
 "in the next step:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:241
 msgid ""
-"Note that we are using the writer and reader we created from the socket "
-"in the\n"
-"previous step as our inputs and outputs to the socket. When we get a "
-"reply from\n"
-"the reader, we pass the string to the Reply constructor, which parses it "
-"and\n"
+"Note that we are using the writer and reader we created from the socket in the\n"
+"previous step as our inputs and outputs to the socket. When we get a reply from\n"
+"the reader, we pass the string to the Reply constructor, which parses it and\n"
 "returns the Reply object."
 msgstr ""
 
@@ -10186,37 +9128,29 @@ msgstr ""
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:253
 msgid ""
 "In order to more easily handle replies, we'll use a Reply object to\n"
-"automatically parse the results we get from the SAM bridge. A reply has "
-"at least\n"
-"a topic, a type, and a result, as well as an arbitrary number of key-"
-"value\n"
+"automatically parse the results we get from the SAM bridge. A reply has at least\n"
+"a topic, a type, and a result, as well as an arbitrary number of key-value\n"
 "pairs."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:268
 msgid ""
-"As you can see, we will be storing the \"result\" as an enum, "
-"REPLY_TYPES. This\n"
-"enum contains all the possible reply results which the SAM bridge might "
-"respond\n"
+"As you can see, we will be storing the \"result\" as an enum, REPLY_TYPES. This\n"
+"enum contains all the possible reply results which the SAM bridge might respond\n"
 "with."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:335
 msgid ""
-"Now let's create our constructor, which takes the reply string recieved "
-"from the\n"
-"socket as a parameter, parses it, and uses the information to set up the "
-"reply\n"
-"object. The reply is space-delimited, with key-value pairs joined by an "
-"equal\n"
+"Now let's create our constructor, which takes the reply string recieved from the\n"
+"socket as a parameter, parses it, and uses the information to set up the reply\n"
+"object. The reply is space-delimited, with key-value pairs joined by an equal\n"
 "sign and terminated by a newline."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:364
 msgid ""
-"Lastly, for the sake of convenience, let's give the reply object a "
-"toString()\n"
+"Lastly, for the sake of convenience, let's give the reply object a toString()\n"
 "function which returns a string representation of the Reply object."
 msgstr ""
 
@@ -10226,30 +9160,21 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:379
 msgid ""
-"Now we're ready to establish communication with SAM by sending a "
-"\"Hello\"\n"
-"message. If you're writing a new SAM library, you should probably target "
-"at\n"
-"least SAM 3.1, since it's available in both I2P and i2pd and introduces "
-"support\n"
+"Now we're ready to establish communication with SAM by sending a \"Hello\"\n"
+"message. If you're writing a new SAM library, you should probably target at\n"
+"least SAM 3.1, since it's available in both I2P and i2pd and introduces support\n"
 "for the SIGNATURE_TYPE parameter."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:397
 msgid ""
-"As you can see, we use the CommandSAM function we created before to send "
-"the\n"
-"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This "
-"tells\n"
-"SAM that you want to start communicating with the API, and that you know "
-"how\n"
+"As you can see, we use the CommandSAM function we created before to send the\n"
+"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This tells\n"
+"SAM that you want to start communicating with the API, and that you know how\n"
 "to speak SAM version 3.0 and 3.1. The router, in turn, will respond with\n"
-"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass"
-" to\n"
-"the Reply constructor to get a valid Reply object. From now on, we can "
-"use our\n"
-"CommandSAM function and Reply object to deal with all our communication "
-"across\n"
+"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass to\n"
+"the Reply constructor to get a valid Reply object. From now on, we can use our\n"
+"CommandSAM function and Reply object to deal with all our communication across\n"
 "the SAM bridge."
 msgstr ""
 
@@ -10259,66 +9184,46 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:423
 msgid ""
-"Now that you've negotiated your connection to SAM and agreed on a SAM "
-"version\n"
-"you both speak, you can set up peer-to-peer connections for your "
-"application\n"
-"to connect to other i2p applications. You do this by sending a \"SESSION "
-"CREATE\"\n"
-"command to the SAM Bridge. To do that, we'll use a CreateSession function"
-" that\n"
+"Now that you've negotiated your connection to SAM and agreed on a SAM version\n"
+"you both speak, you can set up peer-to-peer connections for your application\n"
+"to connect to other i2p applications. You do this by sending a \"SESSION CREATE\"\n"
+"command to the SAM Bridge. To do that, we'll use a CreateSession function that\n"
 "accepts a session ID and a destination type parameter."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:444
 msgid ""
-"That was easy, right? All we had to do was adapt the pattern we used in "
-"our\n"
-"HelloSAM function to the ``SESSION CREATE`` command. A good reply from "
-"the\n"
-"bridge will still return OK, and in that case we return the ID of the "
-"newly\n"
-"created SAM connection. Otherwise, we return an empty string because "
-"that's an\n"
-"invalid ID anyway and it failed, so it's easy to check. Let's see if this"
-"\n"
+"That was easy, right? All we had to do was adapt the pattern we used in our\n"
+"HelloSAM function to the ``SESSION CREATE`` command. A good reply from the\n"
+"bridge will still return OK, and in that case we return the ID of the newly\n"
+"created SAM connection. Otherwise, we return an empty string because that's an\n"
+"invalid ID anyway and it failed, so it's easy to check. Let's see if this\n"
 "function works by writing a test for it:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:461
 msgid ""
-"Note that in this test, we *must* call HelloSAM first to establish "
-"communication\n"
-"with SAM before starting our session. If not, the bridge will reply with "
-"an\n"
+"Note that in this test, we *must* call HelloSAM first to establish communication\n"
+"with SAM before starting our session. If not, the bridge will reply with an\n"
 "error and the test will fail."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:472
 msgid ""
-"Now you have your session established and your local destination, and "
-"need to\n"
-"decide what you want to do with them. Your session can now be commanded "
-"to\n"
-"connect to a remote service over I2P, or to wait for incoming connections"
-" to\n"
-"respond to. However, before you can connect to a remote destination, you "
-"may\n"
-"need to obtain the base64 of the destination, which is what the API "
-"expects. In\n"
-"order to do this, we'll create a LookupName function, which will return "
-"the\n"
+"Now you have your session established and your local destination, and need to\n"
+"decide what you want to do with them. Your session can now be commanded to\n"
+"connect to a remote service over I2P, or to wait for incoming connections to\n"
+"respond to. However, before you can connect to a remote destination, you may\n"
+"need to obtain the base64 of the destination, which is what the API expects. In\n"
+"order to do this, we'll create a LookupName function, which will return the\n"
 "base64 in a usable form."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:494
 msgid ""
-"Again, this is almost the same as our HelloSAM and CreateSession "
-"functions,\n"
-"with one difference. Since we're looking for the VALUE specifically and "
-"the NAME\n"
-"field will be the same as the ``name`` argument, it simply returns the "
-"base64\n"
+"Again, this is almost the same as our HelloSAM and CreateSession functions,\n"
+"with one difference. Since we're looking for the VALUE specifically and the NAME\n"
+"field will be the same as the ``name`` argument, it simply returns the base64\n"
 "string of the destination requested."
 msgstr ""
 
@@ -10328,50 +9233,39 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:516
 msgid ""
-"At last, we are going to establish a connection to another service with "
-"our new\n"
+"At last, we are going to establish a connection to another service with our new\n"
 "library. This part confused me a bit at first, but the most astute Java\n"
 "developers were probably wondering why we didn't extend the socket class\n"
-"instead of creating a Socket variable inside of the Jsam class. That's "
-"because\n"
-"until now, we've been communicating with the \"Control Socket\" and we "
-"need to\n"
-"create a new socket to do the actual communication. So we've waited to "
-"extend\n"
+"instead of creating a Socket variable inside of the Jsam class. That's because\n"
+"until now, we've been communicating with the \"Control Socket\" and we need to\n"
+"create a new socket to do the actual communication. So we've waited to extend\n"
 "the the Socket class with the Jsam class until now:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:530
 msgid ""
-"Also, let's alter our startConnection function so that we can use it to "
-"switch\n"
-"over from the control socket to the socket we'll be using in our "
-"application. It\n"
+"Also, let's alter our startConnection function so that we can use it to switch\n"
+"over from the control socket to the socket we'll be using in our application. It\n"
 "will now take a Socket argument."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:556
 msgid ""
-"This allows us to quickly and easily open a new socket to communicate "
-"over,\n"
+"This allows us to quickly and easily open a new socket to communicate over,\n"
 "perform the \"Hello SAM\" handshake over again, and connect the stream."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:579
 msgid ""
-"And now you have a new Socket for communicating over SAM! Let's do the "
-"same\n"
+"And now you have a new Socket for communicating over SAM! Let's do the same\n"
 "thing for Accepting remote connections:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:599
 msgid ""
-"There you have it. That's how you build a SAM library, step-by-step. In "
-"the\n"
-"future, I will cross-reference this with the working version of the "
-"library,\n"
-"Jsam, and the SAM v3 specification but for now I've got to get some other"
-" stuff\n"
+"There you have it. That's how you build a SAM library, step-by-step. In the\n"
+"future, I will cross-reference this with the working version of the library,\n"
+"Jsam, and the SAM v3 specification but for now I've got to get some other stuff\n"
 "done."
 msgstr ""
 
@@ -10389,21 +9283,13 @@ msgid ""
 "including per-client authentication for encrypted leasesets.\n"
 "The console has an updated I2P logo and several new icons.\n"
 "We've updated the Linux installer."
-msgstr ""
-"Są prowadzone dalsze prace w celu wdrożenia nowych funkcji z propozycji "
-"123, takich jak uwierzytelnianie na klienta dla szyfrowanych leasesetów. "
-"W konsoli węzła pojawiło się nowe logo I2P i kilka nowych ikon. "
-"Zaktualizowano instalator na Linuksa."
+msgstr "Są prowadzone dalsze prace w celu wdrożenia nowych funkcji z propozycji 123, takich jak uwierzytelnianie na klienta dla szyfrowanych leasesetów. W konsoli węzła pojawiło się nowe logo I2P i kilka nowych ikon. Zaktualizowano instalator na Linuksa."
 
 #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:23
 msgid ""
 "Startup should be faster on platforms such as Raspberry Pi.\n"
-"We've fixed several bugs, including some serious ones affecting low-level"
-" network messages."
-msgstr ""
-"Start na platformach takich jak Raspberry Pi powinien być szybszy. "
-"Naprawiono kilka błędów, m.in. dotyczące niskopoziomowych wiadomości "
-"sieci."
+"We've fixed several bugs, including some serious ones affecting low-level network messages."
+msgstr "Start na platformach takich jak Raspberry Pi powinien być szybszy. Naprawiono kilka błędów, m.in. dotyczące niskopoziomowych wiadomości sieci."
 
 #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:38
 msgid ""
@@ -10496,58 +9382,39 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:11
 msgid ""
-"*This post is adapted directly from material originally created for "
-"mhatta's*\n"
-"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-"
-"c08ec9de225d>`__\\ *.*\n"
-"*He deserves the credit for the OP. It has been updated in certain places"
-" where*\n"
-"*it refers to old versions of I2P as current and has undergone some "
-"light*\n"
+"*This post is adapted directly from material originally created for mhatta's*\n"
+"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-c08ec9de225d>`__\\ *.*\n"
+"*He deserves the credit for the OP. It has been updated in certain places where*\n"
+"*it refers to old versions of I2P as current and has undergone some light*\n"
 "*editing. -idk*"
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:17
 msgid ""
-"Right after it starts up, I2P is often seen as a little bit slow. It's "
-"true, and\n"
-"we all know why, by nature, `garlic routing "
-"<https://en.wikipedia.org/wiki/Garlic_routing>`__\n"
-"adds overhead to the familiar experience of using the internet so that "
-"you can\n"
-"have privacy, but this means that for many or most I2P services, your "
-"data will\n"
+"Right after it starts up, I2P is often seen as a little bit slow. It's true, and\n"
+"we all know why, by nature, `garlic routing <https://en.wikipedia.org/wiki/Garlic_routing>`__\n"
+"adds overhead to the familiar experience of using the internet so that you can\n"
+"have privacy, but this means that for many or most I2P services, your data will\n"
 "need to go through 12 hops by default."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:28
 msgid ""
-"Also, unlike Tor, I2P was primarily designed as a closed network. You can"
-"\n"
-"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-"
-"untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources "
-"inside I2P, but you are not supposed\n"
-"to access `clearnet "
-"<https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n"
+"Also, unlike Tor, I2P was primarily designed as a closed network. You can\n"
+"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources inside I2P, but you are not supposed\n"
+"to access `clearnet <https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n"
 "websites through I2P. There exist a few I2P “outproxies” similar to\n"
-"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit"
-" nodes to\n"
-"access clearnet, but most of them are very slow to use as going to the "
-"clearnet\n"
-"is effectively *another* hop in the already 6 hops in, six hops out "
-"connection."
+"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit nodes to\n"
+"access clearnet, but most of them are very slow to use as going to the clearnet\n"
+"is effectively *another* hop in the already 6 hops in, six hops out connection."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:36
 msgid ""
-"Until a few versions ago, this problem was even harder to deal with "
-"because many\n"
-"I2P router users were having difficulties configuring the bandwidth "
-"settings for\n"
-"their routers. If everyone who can takes the time to adjust their "
-"bandwidth\n"
-"settings properly, they will improve not only your connection but also "
-"the I2P\n"
+"Until a few versions ago, this problem was even harder to deal with because many\n"
+"I2P router users were having difficulties configuring the bandwidth settings for\n"
+"their routers. If everyone who can takes the time to adjust their bandwidth\n"
+"settings properly, they will improve not only your connection but also the I2P\n"
 "network as a whole."
 msgstr ""
 
@@ -10557,8 +9424,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:45
 msgid ""
-"Since I2P is a peer-to-peer network, you have to share some of your "
-"network\n"
+"Since I2P is a peer-to-peer network, you have to share some of your network\n"
 "bandwidth with other peers. You see choose how much in “I2P Bandwidth\n"
 "Configuration” (“Configure Bandwidth” button in the “Applications and\n"
 "Configuration” section of I2P Router Console, or\n"
@@ -10567,47 +9433,34 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:55
 msgid ""
-"If you see a shared bandwidth limit of 48 KBps, which is very low, then "
-"you\n"
-"may not have adjusted your shared bandwidth from the default. As the "
-"original\n"
-"author of the material this blog post is adapted from noted, I2P has a "
-"default\n"
-"shared bandwidth limit that is very low until the user adjusts it to "
-"avoid\n"
+"If you see a shared bandwidth limit of 48 KBps, which is very low, then you\n"
+"may not have adjusted your shared bandwidth from the default. As the original\n"
+"author of the material this blog post is adapted from noted, I2P has a default\n"
+"shared bandwidth limit that is very low until the user adjusts it to avoid\n"
 "causing issues with the user's connection."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:61
 msgid ""
-"However, since many users may not know exactly which bandwidth settings "
-"to\n"
-"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ "
-"introduced a\n"
-"New Install Wizard. It contains a Bandwidth Test, which automatically "
-"detects\n"
-"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) "
-"and adjusts\n"
+"However, since many users may not know exactly which bandwidth settings to\n"
+"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ introduced a\n"
+"New Install Wizard. It contains a Bandwidth Test, which automatically detects\n"
+"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) and adjusts\n"
 "I2P’s bandwidth settings accordingly."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:67
 msgid ""
-"If you want to re-run the wizard, for instance following a change in your"
-"\n"
-"service provider or bcause you installed I2P before version 0.9.38, you "
-"can\n"
-"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply "
-"access\n"
+"If you want to re-run the wizard, for instance following a change in your\n"
+"service provider or bcause you installed I2P before version 0.9.38, you can\n"
+"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply access\n"
 "the wizard directly at http://localhost:7657/welcome"
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:76
 msgid ""
-"Using the Wizard is straightforward, simply keep clicking “Next”. "
-"Sometimes\n"
-"M-Lab’s chosen measurement servers are down and the test fails. In such "
-"case,\n"
+"Using the Wizard is straightforward, simply keep clicking “Next”. Sometimes\n"
+"M-Lab’s chosen measurement servers are down and the test fails. In such case,\n"
 "click “Previous” (do not use your web browser’s “back” button), then\n"
 "try it again."
 msgstr ""
@@ -10618,27 +9471,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:88
 msgid ""
-"Even after adjusted the bandwidth, your connection might still be slow As"
-" I\n"
-"said, I2P is a P2P network. It will take some time for your I2P router to"
-" be\n"
-"discovered by other peers and integrated into the I2P network. If your "
-"router\n"
-"not up long enough to become well integrated, or if you shut down un-"
-"gracefully\n"
-"too often, the network will remain fairly slow. On the other hand, the "
-"longer\n"
-"you run your I2P router continuously, the faster and more stable your "
-"connection\n"
+"Even after adjusted the bandwidth, your connection might still be slow As I\n"
+"said, I2P is a P2P network. It will take some time for your I2P router to be\n"
+"discovered by other peers and integrated into the I2P network. If your router\n"
+"not up long enough to become well integrated, or if you shut down un-gracefully\n"
+"too often, the network will remain fairly slow. On the other hand, the longer\n"
+"you run your I2P router continuously, the faster and more stable your connection\n"
 "becomes, and more of your bandwidth share will be used in the network."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:96
 msgid ""
-"However, many people might not be able to stay your I2P router up. In "
-"such\n"
-"case, you can still run the I2P router on a remote server such as VPS, "
-"then use\n"
+"However, many people might not be able to stay your I2P router up. In such\n"
+"case, you can still run the I2P router on a remote server such as VPS, then use\n"
 "SSH port forwarding."
 msgstr ""
 
@@ -10654,17 +9499,10 @@ msgstr "Wersja 0.9.42 zawiera poprawki błędów"
 msgid ""
 "0.9.42 continues the work to make I2P faster and more reliable.\n"
 "It includes several changes to speed up our UDP transport.\n"
-"We have split up the configuration files to enable future work for more "
-"modular packaging.\n"
-"We continue work to implement new proposals for faster and more secure "
-"encryption.\n"
+"We have split up the configuration files to enable future work for more modular packaging.\n"
+"We continue work to implement new proposals for faster and more secure encryption.\n"
 "There are, of course, a lot of bug fixes also."
-msgstr ""
-"Wersja 0.9.42 sprawia, że sieć I2P pracuje szybciej i sprawniej. Zawiera "
-"znaczące zmiany przyspieszające transport po UDP. Rozdzieliliśmy pliki "
-"konfiguracyjne, aby w przyszłości uczynić program bardziej modularnym. "
-"Kontynuujemy prace nad propozycjami szybszego i bezpieczniejszego "
-"szyfrowania. Oczywiście naprawiliśmy sporo błędów."
+msgstr "Wersja 0.9.42 sprawia, że sieć I2P pracuje szybciej i sprawniej. Zawiera znaczące zmiany przyspieszające transport po UDP. Rozdzieliliśmy pliki konfiguracyjne, aby w przyszłości uczynić program bardziej modularnym. Kontynuujemy prace nad propozycjami szybszego i bezpieczniejszego szyfrowania. Oczywiście naprawiliśmy sporo błędów."
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:34
 msgid "Console: Split up help page, tag text for translation"
@@ -10691,7 +9529,8 @@ msgid "JBigI: GMP 6.1.2 (Linux 64-bit only)"
 msgstr ""
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:40
-msgid "NetDB: Choose alternate gateway for store replies to reduce connections"
+msgid ""
+"NetDB: Choose alternate gateway for store replies to reduce connections"
 msgstr ""
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:41
@@ -10738,134 +9577,91 @@ msgstr ""
 msgid "Def Con Trip Report- zzz"
 msgstr ""
 
-#: i2p2www/blog/2019/08/30/defcon.rst:11 i2p2www/blog/2019/08/30/defcon2.rst:11
+#: i2p2www/blog/2019/08/30/defcon.rst:11
+#: i2p2www/blog/2019/08/30/defcon2.rst:11
 msgid "Def Con Trip Report"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:14
 msgid ""
-"idk and I attended DEFCON 27 and presented two workshops on I2P for "
-"application\n"
-"developers, with support from mhatta and Alex. I gave the workshop at "
-"Monero\n"
-"Village and idk gave the one at Crypto/Privacy Village. Here, I will "
-"summarize\n"
-"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will"
-" post a\n"
+"idk and I attended DEFCON 27 and presented two workshops on I2P for application\n"
+"developers, with support from mhatta and Alex. I gave the workshop at Monero\n"
+"Village and idk gave the one at Crypto/Privacy Village. Here, I will summarize\n"
+"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will post a\n"
 "trip report covering his workshop."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:22
 msgid ""
-"We had about 8 attendees for the Monero Village workshop, entitled \"I2P "
-"for\n"
-"Cryptocurrency Developers\". We planned to discuss the particular "
-"networking\n"
-"needs for each application and work through the various i2ptunnel and SAM"
-"\n"
-"options available. However, all attendees were relatively unfamiliar with"
-" I2P,\n"
-"so we pivoted and gave an overview of I2P. As none of the attendees had a"
-" laptop\n"
-"with them, we helped several of them install I2P on their Android phone "
-"and\n"
-"walked through some of the features of the app. For all users, the app "
-"appeared\n"
+"We had about 8 attendees for the Monero Village workshop, entitled \"I2P for\n"
+"Cryptocurrency Developers\". We planned to discuss the particular networking\n"
+"needs for each application and work through the various i2ptunnel and SAM\n"
+"options available. However, all attendees were relatively unfamiliar with I2P,\n"
+"so we pivoted and gave an overview of I2P. As none of the attendees had a laptop\n"
+"with them, we helped several of them install I2P on their Android phone and\n"
+"walked through some of the features of the app. For all users, the app appeared\n"
 "to reseed and build tunnels fairly quickly."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:33
 msgid ""
-"One common question after installing the app was \"what do I do now?\". "
-"The app\n"
-"doesn't have a 'hidden services of interest' section or first-run wizard "
-"like\n"
-"our desktop application does, and most of the default addressbook entries"
-" are\n"
-"long-dead. There's improvements we could make to the first-run "
-"experience.\n"
+"One common question after installing the app was \"what do I do now?\". The app\n"
+"doesn't have a 'hidden services of interest' section or first-run wizard like\n"
+"our desktop application does, and most of the default addressbook entries are\n"
+"long-dead. There's improvements we could make to the first-run experience.\n"
 "Also, some of the more interesting parts of the app are hidden behind an\n"
-"advanced setting; we should review those items and consider un-hiding "
-"some of\n"
+"advanced setting; we should review those items and consider un-hiding some of\n"
 "them."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:43
 msgid ""
-"It's always useful to go to Tor talks, not so much to find out what "
-"they're\n"
-"doing, but to hear how they explain things to people, and what "
-"terminology they\n"
-"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large "
-"room\n"
-"attended by about two thousand people. He gave a very brief overview of "
-"Tor\n"
-"with only three or four slides. He says they now have \"two to eight "
-"million\n"
-"users a day\". Most of the talk was a review of national blocking "
-"attempts over\n"
-"the years, starting with Thailand and Iran in '06-'07 through Tunisia, "
-"china,\n"
-"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He "
-"showed a\n"
-"new form to be showed to new users, with a checkbox \"Tor is censored in "
-"my\n"
+"It's always useful to go to Tor talks, not so much to find out what they're\n"
+"doing, but to hear how they explain things to people, and what terminology they\n"
+"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large room\n"
+"attended by about two thousand people. He gave a very brief overview of Tor\n"
+"with only three or four slides. He says they now have \"two to eight million\n"
+"users a day\". Most of the talk was a review of national blocking attempts over\n"
+"the years, starting with Thailand and Iran in '06-'07 through Tunisia, china,\n"
+"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He showed a\n"
+"new form to be showed to new users, with a checkbox \"Tor is censored in my\n"
 "country\"."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:56
 msgid ""
 "Their new pluggable transport \"snowflake\" uses a combination of domain\n"
-"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. "
-"Roger\n"
-"only had one slide on it, and I wasn't familiar with it, so we should do "
-"more\n"
-"research on what it's all about. He briefly mentioned some things they "
-"may be\n"
-"working on next, including \"salmon\" distribution of bridges, "
-"FTE/Marionette,\n"
-"decoy routing, and \"cupcake\" which is an extension of snowflake. While "
-"I don't\n"
-"have any further information about them, they may be good buzzwords to "
-"keep an\n"
+"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. Roger\n"
+"only had one slide on it, and I wasn't familiar with it, so we should do more\n"
+"research on what it's all about. He briefly mentioned some things they may be\n"
+"working on next, including \"salmon\" distribution of bridges, FTE/Marionette,\n"
+"decoy routing, and \"cupcake\" which is an extension of snowflake. While I don't\n"
+"have any further information about them, they may be good buzzwords to keep an\n"
 "eye out for on their mailing lists."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:67
 msgid ""
 "Much of Tor's censorship woes is due to Tor's popularity, but their TLS\n"
-"handshake is a particular issue and it's been the focus of much of the "
-"\"arms\n"
-"race\" over the years. In some ways we're in better shape, as we've taken"
-"\n"
-"several features of their current-best obfs4 pluggable transport and "
-"build them\n"
-"into NTCP2. However, we do have issues with our website and reseeds being"
-"\n"
+"handshake is a particular issue and it's been the focus of much of the \"arms\n"
+"race\" over the years. In some ways we're in better shape, as we've taken\n"
+"several features of their current-best obfs4 pluggable transport and build them\n"
+"into NTCP2. However, we do have issues with our website and reseeds being\n"
 "blocked, as Sadie and Phong will be presenting at USENIX FOCI this week."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:76
 msgid ""
-"Notes for next time: I do recommend DEFCON, as long as we find a village "
-"to\n"
-"call our home. It's an enormous conference and the limited general "
-"hangout\n"
+"Notes for next time: I do recommend DEFCON, as long as we find a village to\n"
+"call our home. It's an enormous conference and the limited general hangout\n"
 "spaces are massively overcrowded. Both Monero Village and Crypto/Privacy\n"
-"Village were fantastic hosts and we had several hours at each spot to "
-"meet with\n"
-"people. We should find more opportunities to work with both "
-"organizations.\n"
-"There were also ZCash people at the Monero Village and we should work "
-"with them\n"
-"also. Any future workshop should be targeted at a more general audience. "
-"We do\n"
-"need a standard \"Intro to I2P\" slide deck; it would have been helpful "
-"at the\n"
-"workshops. Don't expect attendees to have laptops with them, focus on "
-"Android\n"
-"for any hands-on exercises. There's several improvements to be made in "
-"our\n"
+"Village were fantastic hosts and we had several hours at each spot to meet with\n"
+"people. We should find more opportunities to work with both organizations.\n"
+"There were also ZCash people at the Monero Village and we should work with them\n"
+"also. Any future workshop should be targeted at a more general audience. We do\n"
+"need a standard \"Intro to I2P\" slide deck; it would have been helpful at the\n"
+"workshops. Don't expect attendees to have laptops with them, focus on Android\n"
+"for any hands-on exercises. There's several improvements to be made in our\n"
 "Android app. Drink lots of water in Vegas... and stay away from the slot\n"
 "machines."
 msgstr ""
@@ -10882,95 +9678,67 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:19
 msgid ""
-"My workshop went well, we even had a few application developers attend! "
-"In\n"
-"particular I had a pretty lengthy conversation with a person named Mary "
-"about\n"
+"My workshop went well, we even had a few application developers attend! In\n"
+"particular I had a pretty lengthy conversation with a person named Mary about\n"
 "how I2P could be used to eliminate centralization and enhance privacy in\n"
-"a \"Magic Wormhole\" type of application. While I wasn't totally familiar"
-" with\n"
-"Magic Wormhole at the time, I think most of my advice was usable. I think"
-" Mary\n"
-"had some very interesting and workable ideas about sharing information in"
-" more\n"
-"human-centric ways that could be interesting in I2P applications, and am "
-"looking\n"
+"a \"Magic Wormhole\" type of application. While I wasn't totally familiar with\n"
+"Magic Wormhole at the time, I think most of my advice was usable. I think Mary\n"
+"had some very interesting and workable ideas about sharing information in more\n"
+"human-centric ways that could be interesting in I2P applications, and am looking\n"
 "forward to experimenting with some of those."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:30
 msgid ""
-"The materials I made for the application development workshop are "
-"available on\n"
-"Github! https://github.com/eyedeekay/defcon Please consider it a living "
-"document,\n"
-"your input is desired! As it is licensed permissively, you are free to "
-"fork it\n"
-"and make it your own as well. Share your examples, your hacks, or correct"
-" my\n"
-"comma use, complain about my document preparation style, or just print "
-"off your\n"
+"The materials I made for the application development workshop are available on\n"
+"Github! https://github.com/eyedeekay/defcon Please consider it a living document,\n"
+"your input is desired! As it is licensed permissively, you are free to fork it\n"
+"and make it your own as well. Share your examples, your hacks, or correct my\n"
+"comma use, complain about my document preparation style, or just print off your\n"
 "own copy in booklet form!"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:39
 msgid ""
-"I also talked to a guy who gives advice to the government about the "
-"differences\n"
-"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in "
-"which\n"
-"peers in a P2P application might want to have enhanced privacy from each-"
-"other,\n"
+"I also talked to a guy who gives advice to the government about the differences\n"
+"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in which\n"
+"peers in a P2P application might want to have enhanced privacy from each-other,\n"
 "and why I2P is perhaps uniquely suited to accomplish that."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:46
 msgid ""
-"In general, both the application development workshops went well, even "
-"though\n"
-"they didn't go entirely according to plan in that only a small proportion"
-" of the\n"
-"audience were application developers. The impression I got was that many "
-"people\n"
-"are very interested in I2P, but also many people are confused by how "
-"interacting\n"
-"with I2P works. By re-focusing on their questions and by teaming off with"
-" zzz,\n"
-"mhatta, and Alex we were fairly successful at dealing with our audience, "
-"which\n"
+"In general, both the application development workshops went well, even though\n"
+"they didn't go entirely according to plan in that only a small proportion of the\n"
+"audience were application developers. The impression I got was that many people\n"
+"are very interested in I2P, but also many people are confused by how interacting\n"
+"with I2P works. By re-focusing on their questions and by teaming off with zzz,\n"
+"mhatta, and Alex we were fairly successful at dealing with our audience, which\n"
 "was more varied in terms of occupation, interest, and I2P knowledge than\n"
 "expected."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:57
 msgid ""
-"Besides that, I also talked to Alex about my experimental contextual-"
-"identity\n"
-"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to"
-" talk\n"
-"a little about bundling, but not too much, as it was a very busy "
-"convention. I'm\n"
+"Besides that, I also talked to Alex about my experimental contextual-identity\n"
+"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to talk\n"
+"a little about bundling, but not too much, as it was a very busy convention. I'm\n"
 "looking forward to following up with him on that soon."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:64
 msgid ""
 "mhatta and I almost won a lobster from a claw machine, but it was a real\n"
-"fighter and got away at the last second. Really thought I had it for a "
-"moment\n"
+"fighter and got away at the last second. Really thought I had it for a moment\n"
 "though. :)"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:70
 msgid ""
-"To add to zzz's notes for next time, aside from being more general I "
-"believe our\n"
-"workshops would not have been as able to adapt to the needs of the "
-"audience\n"
-"without the support of mhatta and Alex. Having people who can help "
-"particpants\n"
-"individually or in small groups was immensely helpful, many, many thanks "
-"to both\n"
+"To add to zzz's notes for next time, aside from being more general I believe our\n"
+"workshops would not have been as able to adapt to the needs of the audience\n"
+"without the support of mhatta and Alex. Having people who can help particpants\n"
+"individually or in small groups was immensely helpful, many, many thanks to both\n"
 "of them for helping us out."
 msgstr ""
 
@@ -10981,95 +9749,71 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:14
 msgid ""
-"Over the past year I have had the good fortune to participate in the "
-"research\n"
-"Nguyen Phong Hoang from Stony Brook University has been doing regarding "
-"I2P\n"
-"censorship. The infrastructure used for this research provided numerous "
-"and\n"
-"geographically diverse vantage points, and also the ability to conduct "
-"in-depth\n"
-"measurements across all levels of the network stack. I2P services which "
-"were\n"
-"measured for availability included official homepage, mirror site, reseed"
-"\n"
+"Over the past year I have had the good fortune to participate in the research\n"
+"Nguyen Phong Hoang from Stony Brook University has been doing regarding I2P\n"
+"censorship. The infrastructure used for this research provided numerous and\n"
+"geographically diverse vantage points, and also the ability to conduct in-depth\n"
+"measurements across all levels of the network stack. I2P services which were\n"
+"measured for availability included official homepage, mirror site, reseed\n"
 "servers and active relays."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:24
 msgid ""
-"The presentation on Tuesday went very well, and Phong was very busy "
-"afterwards\n"
-"answering questions about his work. I was busy too answering questions "
-"about\n"
-"I2P and what it does. The new stickers featuring the updated logo by Ura "
-"Design\n"
-"got rave reviews! It was a very positive experience and I will be looking"
-"\n"
-"forward to continuing to work with Phong and monitoring I2P censorship. I"
-" would\n"
-"encourage anyone who has encountered blocking, or has had success using "
-"I2P to\n"
+"The presentation on Tuesday went very well, and Phong was very busy afterwards\n"
+"answering questions about his work. I was busy too answering questions about\n"
+"I2P and what it does. The new stickers featuring the updated logo by Ura Design\n"
+"got rave reviews! It was a very positive experience and I will be looking\n"
+"forward to continuing to work with Phong and monitoring I2P censorship. I would\n"
+"encourage anyone who has encountered blocking, or has had success using I2P to\n"
 "communicate in restricted environments to reach out if you can. I2P is\n"
-"currently working on new solutions to circumvent internet blocking. "
-"Having met\n"
+"currently working on new solutions to circumvent internet blocking. Having met\n"
 "people this year who have given me first hand accounts of the effects of\n"
-"censorship and the need to stay connected, makes the need for I2P to be "
-"more\n"
-"resilient where it needs to be and for the team to be creating guides for"
-" using\n"
+"censorship and the need to stay connected, makes the need for I2P to be more\n"
+"resilient where it needs to be and for the team to be creating guides for using\n"
 "I2P in these situations."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:39
 msgid ""
-"I will be putting together better resources for researchers interested in"
-" I2P,\n"
+"I will be putting together better resources for researchers interested in I2P,\n"
 "as well."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:44
 msgid ""
 "I also had the good fortune to spend time with Mhatta, who is an I2P\n"
-"contributor, and to make connections for future funding. A huge thank you"
-" to\n"
-"the community builders I met in Tunis who I met again and who are "
-"offering so\n"
-"much support to the project. This has been an exciting year so far, and "
-"I2P has\n"
-"so much work to do. Please consider donating your time or funding the "
-"project\n"
+"contributor, and to make connections for future funding. A huge thank you to\n"
+"the community builders I met in Tunis who I met again and who are offering so\n"
+"much support to the project. This has been an exciting year so far, and I2P has\n"
+"so much work to do. Please consider donating your time or funding the project\n"
 "as it needs to scale quickly to new challenges."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:53
 msgid ""
-"If you have an opportunity to, you can read the full report Measuring I2P"
-"\n"
+"If you have an opportunity to, you can read the full report Measuring I2P\n"
 "Censorship at a Global Scale here\n"
 "https://www.usenix.org/conference/foci19/presentation/hoang"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:59
 msgid ""
-"Another great workshop in the measurements workshop was On the Importance"
-" of\n"
+"Another great workshop in the measurements workshop was On the Importance of\n"
 "Encrypted-SNI (ESNI) to Censorship Circumvention\n"
 "https://www.usenix.org/conference/foci19/presentation/chai"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:65
 msgid ""
-"There are so many great workshops that I attended - anyone who would like"
-" too\n"
+"There are so many great workshops that I attended - anyone who would like too\n"
 "can access the program and related materials here:\n"
 "https://www.usenix.org/conference/foci19/workshop-program"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:71
 msgid ""
-"I will be attending Our Networks in Toronto next month "
-"https://ournetworks.ca/\n"
+"I will be attending Our Networks in Toronto next month https://ournetworks.ca/\n"
 "- and so should you! The program can be viewed here\n"
 "https://ournetworks.ca/program/"
 msgstr ""
@@ -11081,63 +9825,43 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:14
 msgid ""
-"This was my first time attending IFF, and what a great experience for I2P"
-" this\n"
-"was! I met with human rights defenders, people who work on censorship "
-"metrics,\n"
+"This was my first time attending IFF, and what a great experience for I2P this\n"
+"was! I met with human rights defenders, people who work on censorship metrics,\n"
 "and of course UX and security professionals."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:20
 msgid ""
 "My goal was to connect with people to further support I2P’s UX overhaul,\n"
-"keeping in mind security and UX considerations for frontline workers. As "
-"it was\n"
-"pointed out to me, people see I2P as a very important and powerful "
-"resource to\n"
-"circumvent censorship and support safe communication, however the "
-"interface\n"
-"suffers from some usability concerns. People were happy with our initial "
-"steps\n"
-"to make first time users have a better experience, such as our set up "
-"wizard\n"
-"and bandwidth detection tool. I also received positive reviews on our "
-"changes\n"
-"to the website and /home icons. It was very encouraging to hear directly "
-"from\n"
+"keeping in mind security and UX considerations for frontline workers. As it was\n"
+"pointed out to me, people see I2P as a very important and powerful resource to\n"
+"circumvent censorship and support safe communication, however the interface\n"
+"suffers from some usability concerns. People were happy with our initial steps\n"
+"to make first time users have a better experience, such as our set up wizard\n"
+"and bandwidth detection tool. I also received positive reviews on our changes\n"
+"to the website and /home icons. It was very encouraging to hear directly from\n"
 "the community that small changes we have made are in the right direction."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:32
 msgid ""
-"Things like having configuration happen out of the box and not having to "
-"put\n"
-"people in the position where they need to rely on reading so much "
-"documentation\n"
-"or chasing documentation were discussed. Also, improved documentation for"
-"\n"
-"setting up outproxies and and site mirroring were requested and "
-"suggested.\n"
-"Please see Mikal’s very good instructions on setting up an I2P outproxy "
-"that\n"
+"Things like having configuration happen out of the box and not having to put\n"
+"people in the position where they need to rely on reading so much documentation\n"
+"or chasing documentation were discussed. Also, improved documentation for\n"
+"setting up outproxies and and site mirroring were requested and suggested.\n"
+"Please see Mikal’s very good instructions on setting up an I2P outproxy that\n"
 "came out of the suggestions this week —\n"
-"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to "
-"make\n"
+"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to make\n"
 "bug reporting easier."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:43
 msgid ""
-"To this point, I truly hope that the project will secure resources to "
-"continue\n"
-"the improvements to its usability that it requires to meet the growing "
-"demand\n"
-"for I2P services. It is humbling to to be working with such talented "
-"people and\n"
-"to be able to work together with our community during a time when people "
-"all\n"
-"over the globe need all of the privacy protecting resources we as people "
-"who\n"
+"To this point, I truly hope that the project will secure resources to continue\n"
+"the improvements to its usability that it requires to meet the growing demand\n"
+"for I2P services. It is humbling to to be working with such talented people and\n"
+"to be able to work together with our community during a time when people all\n"
+"over the globe need all of the privacy protecting resources we as people who\n"
 "develop, design and educate can offer."
 msgstr ""
 
@@ -11148,58 +9872,40 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:14
 msgid ""
-"The messages from activists in Syria during the Access No\\_! session on "
-"the\n"
+"The messages from activists in Syria during the Access No\\_! session on the\n"
 "first day were deeply moving and really drove home why I work in digital\n"
-"rights. We listened to the experiences of activists who are unable to "
-"travel\n"
-"due to lack of status, documentation and active conflict. For these "
-"people\n"
+"rights. We listened to the experiences of activists who are unable to travel\n"
+"due to lack of status, documentation and active conflict. For these people\n"
 "“the internet is the only passport (they) carry.” Human rights defenders\n"
-"spoke of the importance of  digital training to keep people protected "
-"when they\n"
-"are communicating with family inside of the country, as well as with "
-"family and\n"
-"friends who have left. They had created digital clinics to show people "
-"how to\n"
+"spoke of the importance of  digital training to keep people protected when they\n"
+"are communicating with family inside of the country, as well as with family and\n"
+"friends who have left. They had created digital clinics to show people how to\n"
 "use services securely, for instance, how to use features like Signal’s\n"
-"disappearing messages so that those messages could not be used against "
-"them\n"
+"disappearing messages so that those messages could not be used against them\n"
 "when devices are searched at security check points. Continuing to pursue\n"
-"education was also very important, the internet being relied on to access"
-"\n"
+"education was also very important, the internet being relied on to access\n"
 "resources."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:30
 msgid ""
-"The following days we met with people who had both questions about I2P "
-"and\n"
-"suggestions for potential use cases. We also discussed overhauling the "
-"project\n"
+"The following days we met with people who had both questions about I2P and\n"
+"suggestions for potential use cases. We also discussed overhauling the project\n"
 "documentation for threat models, improving guides for users with little\n"
-"technical background, and ensuring that these guides are easily "
-"translatable. I\n"
-"made a note that I should go through the proposals and connect then to "
-"human\n"
-"use cases and solutions. This will be part of the projects’ continued "
-"effort\n"
+"technical background, and ensuring that these guides are easily translatable. I\n"
+"made a note that I should go through the proposals and connect then to human\n"
+"use cases and solutions. This will be part of the projects’ continued effort\n"
 "to improve its user guides and onboarding."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:40
 msgid ""
-"The opportunity to meet face to face with people who are using I2P and "
-"have\n"
-"successfully used it to circumvent internet blockages was inspiring. As "
-"the\n"
+"The opportunity to meet face to face with people who are using I2P and have\n"
+"successfully used it to circumvent internet blockages was inspiring. As the\n"
 "project has began working on its own browser and is examining outproxy\n"
-"packaging, it needs as much feedback and testing as possible to create "
-"secure\n"
-"and frictionless experiences for people. Also, the I2P network needs more"
-"\n"
-"hosted content and mirrored sites in order to expand resources for its "
-"users."
+"packaging, it needs as much feedback and testing as possible to create secure\n"
+"and frictionless experiences for people. Also, the I2P network needs more\n"
+"hosted content and mirrored sites in order to expand resources for its users."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:2
@@ -11213,47 +9919,35 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:14
 msgid ""
-"The weekend of September 20th I traveled to Toronto to meet with Sadie to"
-" take\n"
-"part in the Our Networks conference. The Our Networks conference "
-"encompasses a\n"
-"wide variety of topic including many peer-to-peer technologies with an "
-"eye\n"
+"The weekend of September 20th I traveled to Toronto to meet with Sadie to take\n"
+"part in the Our Networks conference. The Our Networks conference encompasses a\n"
+"wide variety of topic including many peer-to-peer technologies with an eye\n"
 "toward their potential to make the world a better place."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:21
 msgid ""
-"The conference was fascinating, full of very smart people working on "
-"everything\n"
-"from physical mesh networks to the distributed web to, of course, "
-"anonymity. We\n"
-"got to talk to some great people from Tor, Protocol Labs, Parity Labs, "
-"the Dat\n"
-"Project, as well as a variety of artists and social scientists. Lots of "
-"fun too,\n"
+"The conference was fascinating, full of very smart people working on everything\n"
+"from physical mesh networks to the distributed web to, of course, anonymity. We\n"
+"got to talk to some great people from Tor, Protocol Labs, Parity Labs, the Dat\n"
+"Project, as well as a variety of artists and social scientists. Lots of fun too,\n"
 "and a great environment. Dat in particular presents some pretty cool\n"
 "opportunities for future co-operation I think."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:30
 msgid ""
-"I hadn't planned on giving a talk, but we were having so much fun that "
-"when\n"
-"we were asked, Sadie and I put something together and I gave a quick "
-"lightning\n"
+"I hadn't planned on giving a talk, but we were having so much fun that when\n"
+"we were asked, Sadie and I put something together and I gave a quick lightning\n"
 "talk about I2P and how it's design choices are relevant to Peer-to-Peer\n"
-"application development. The talk was recorded and when the video becomes"
-"\n"
-"available, I'll make sure to add it to this blog. Next year, I'll have "
-"some\n"
+"application development. The talk was recorded and when the video becomes\n"
+"available, I'll make sure to add it to this blog. Next year, I'll have some\n"
 "submissions for their Zine Library about I2P."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:39
 msgid ""
-"Besides that, I really enjoyed my time visiting Toronto, it was a great "
-"place\n"
+"Besides that, I really enjoyed my time visiting Toronto, it was a great place\n"
 "to visit."
 msgstr ""
 
@@ -11267,20 +9961,11 @@ msgstr "Wersja 0.9.43 zawiera poprawki błędów"
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:16
 msgid ""
-"In the 0.9.43 release, we continue work on stronger security and privacy "
-"features and performance improvements.\n"
-"Our implementation of the new leaseset specification (LS2) is now "
-"complete.\n"
-"We are beginning our implementation of stronger and faster end-to-end "
-"encryption (proposal 144) for a future release.\n"
-"Several IPv6 address detection issues have been fixed, and there of "
-"course are several other bug fixes."
-msgstr ""
-"W wersji 0.9.43 kontynuujemy prace zwiększające bezpieczeństwo, "
-"prywatność i wydajność. Zakończyliśmy wdrażanie nowej specyfikacji "
-"leasesetów (LS2). Rozpoczynamy wdrażanie mocniejszego i szybszego "
-"szyfrowania (propozycja 144). Naprawiono kilka problemów związanych z "
-"wykrywaniem adresów IPv6 i naprawiono kilka innych błędów."
+"In the 0.9.43 release, we continue work on stronger security and privacy features and performance improvements.\n"
+"Our implementation of the new leaseset specification (LS2) is now complete.\n"
+"We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release.\n"
+"Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes."
+msgstr "W wersji 0.9.43 kontynuujemy prace zwiększające bezpieczeństwo, prywatność i wydajność. Zakończyliśmy wdrażanie nowej specyfikacji leasesetów (LS2). Rozpoczynamy wdrażanie mocniejszego i szybszego szyfrowania (propozycja 144). Naprawiono kilka problemów związanych z wykrywaniem adresów IPv6 i naprawiono kilka innych błędów."
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:33
 msgid "Console setup wizard improvements"
@@ -11323,7 +10008,8 @@ msgid "i2ptunnel support for quoted custom options"
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:51
-msgid "i2psnark now starts with reduced tunnel count then increases as necessary"
+msgid ""
+"i2psnark now starts with reduced tunnel count then increases as necessary"
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:52
@@ -11354,47 +10040,33 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:11
 msgid ""
-"Highlighting Research - An Empirical Study of the I2P Anonymity Network "
-"and its Censorship Resistance"
+"Highlighting Research - An Empirical Study of the I2P Anonymity Network and "
+"its Censorship Resistance"
 msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:16
 msgid ""
-"The following blog post is authored by Information Controls Fellow Hoàng "
-"Nguyên\n"
-"Phong. As an ICFP fellow, Phong's research focused on analyzing different"
-"\n"
-"aspects of the I2P network, a privacy-enhancing Internet tool that can be"
-" used\n"
+"The following blog post is authored by Information Controls Fellow Hoàng Nguyên\n"
+"Phong. As an ICFP fellow, Phong's research focused on analyzing different\n"
+"aspects of the I2P network, a privacy-enhancing Internet tool that can be used\n"
 "to access online content over an anonymity-enhancing network helpful in\n"
-"circumventing state-imposed censorship. Working with his host "
-"organization, the\n"
-"University of Massachusetts Amherst, Phong studied the I2P network's "
-"censorship\n"
-"resilience, including identifying what blocking methods a state censor "
-"might use\n"
-"to inhibit access to I2P and investigating potential solutions to make "
-"I2P more\n"
+"circumventing state-imposed censorship. Working with his host organization, the\n"
+"University of Massachusetts Amherst, Phong studied the I2P network's censorship\n"
+"resilience, including identifying what blocking methods a state censor might use\n"
+"to inhibit access to I2P and investigating potential solutions to make I2P more\n"
 "resistant to such blockage."
 msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:28
 msgid ""
 "Phong found blocking attempts on the I2P network (specifically via DNS\n"
-"poisoning, SNI-based blocking, TCP packet injection, and page-specific "
-"blocks)\n"
-"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. "
-"Phong\n"
-"posits that because the blocks are usually imposed on the I2P download "
-"page and\n"
-"reseed servers, such blocking could be mitigated by hosting download "
-"links to\n"
-"this content on large cloud service providers - raising the collateral "
-"cost of\n"
-"blocking. Phong also built a metrics portal for the platform so that "
-"researchers\n"
-"and others can better understand who is using I2P, finding that there are"
-" about\n"
+"poisoning, SNI-based blocking, TCP packet injection, and page-specific blocks)\n"
+"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. Phong\n"
+"posits that because the blocks are usually imposed on the I2P download page and\n"
+"reseed servers, such blocking could be mitigated by hosting download links to\n"
+"this content on large cloud service providers - raising the collateral cost of\n"
+"blocking. Phong also built a metrics portal for the platform so that researchers\n"
+"and others can better understand who is using I2P, finding that there are about\n"
 "20,000 relays in the network on a daily basis."
 msgstr ""
 
@@ -11408,10 +10080,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:55
 msgid ""
-"We thank Phong and his collaborators for their excellent study as we move"
-" to\n"
-"address the issues that were identified. It's exciting to see more "
-"academic\n"
+"We thank Phong and his collaborators for their excellent study as we move to\n"
+"address the issues that were identified. It's exciting to see more academic\n"
 "study of I2P and are excited to keep working with him."
 msgstr ""
 
@@ -11425,30 +10095,18 @@ msgstr "Wersja 0.9.44 zawiera poprawki błędów"
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:16
 msgid ""
-"0.9.44 contains an important fix for a denial of service issue in hidden "
-"services handling of new encryption types.\n"
+"0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.\n"
 "All users should update as soon as possible."
-msgstr ""
-"Wersja 0.9.44 naprawia podatność na atak DoS ukrytej usługi obsługującej "
-"nowe rodzaje szyfrowania. Wszyscy użytkownicy powinni dokonać "
-"aktualizacji jak najszybciej."
+msgstr "Wersja 0.9.44 naprawia podatność na atak DoS ukrytej usługi obsługującej nowe rodzaje szyfrowania. Wszyscy użytkownicy powinni dokonać aktualizacji jak najszybciej."
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:21
 msgid ""
-"The release includes initial support for new end-to-end encryption "
-"(proposal 144).\n"
+"The release includes initial support for new end-to-end encryption (proposal 144).\n"
 "Work continues on this project, and it is not yet ready for use.\n"
-"There are changes to the console home page, and new embedded HTML5 media "
-"players in i2psnark.\n"
+"There are changes to the console home page, and new embedded HTML5 media players in i2psnark.\n"
 "Additional fixes for firewalled IPv6 networks are included.\n"
 "Tunnel build fixes should result in faster startup for some users."
-msgstr ""
-"To wydanie wstępnie wprowadza wsparcie dla nowego rodzaju szyfrowania "
-"(propozycja 144), trwajÄ… nad nim dalsze prace, nie jest jeszcze gotowy do"
-" użytku. Wprowadzono zmiany do strony głównej konsoli i zagnieżdżono "
-"odtwarzacz HTML5 do ip2snarka. Wprowadzono usprawnienia dla sieci IPv6 za"
-" zaporą. Poprawki startu tuneli powinny usprawnić start niektórym "
-"użytkownikom."
+msgstr "To wydanie wstępnie wprowadza wsparcie dla nowego rodzaju szyfrowania (propozycja 144), trwają nad nim dalsze prace, nie jest jeszcze gotowy do użytku. Wprowadzono zmiany do strony głównej konsoli i zagnieżdżono odtwarzacz HTML5 do ip2snarka. Wprowadzono usprawnienia dla sieci IPv6 za zaporą. Poprawki startu tuneli powinny usprawnić start niektórym użytkownikom."
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:39
 msgid "Console home page changes"
@@ -11528,16 +10186,10 @@ msgstr "Wersja 0.9.45 zawiera poprawki błędów"
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:16
 msgid ""
-"0.9.45 contains important fixes for hidden mode and the bandwidth tester."
-"\n"
+"0.9.45 contains important fixes for hidden mode and the bandwidth tester.\n"
 "There's an update to the console dark theme.\n"
-"We continue work on improving performance and the development of new end-"
-"to-end encryption (proposal 144)."
-msgstr ""
-"Wersja 0.9.45 zawiera istotne poprawki dla trybu ukrytego i testera "
-"przepustowości. Poprawiono ciemną skórkę konsoli. Kontynuujemy prace "
-"zwiększające wydajności i opracowujemy nowe szyfrowanie end-to-end "
-"(propozycja 144)."
+"We continue work on improving performance and the development of new end-to-end encryption (proposal 144)."
+msgstr "Wersja 0.9.45 zawiera istotne poprawki dla trybu ukrytego i testera przepustowości. Poprawiono ciemną skórkę konsoli. Kontynuujemy prace zwiększające wydajności i opracowujemy nowe szyfrowanie end-to-end (propozycja 144)."
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:32
 msgid "Dark theme improvements"
@@ -11548,7 +10200,8 @@ msgid "Console icon changes"
 msgstr ""
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:34
-msgid "Move some translations from console to router and core for embedded uses"
+msgid ""
+"Move some translations from console to router and core for embedded uses"
 msgstr ""
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:37
@@ -11602,24 +10255,20 @@ msgstr ""
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:10
 msgid ""
 "Tutorial for setting up git access through an I2P Tunnel. This tunnel\n"
-"will act as your access point to a single git service on I2P. It is part "
-"of the\n"
+"will act as your access point to a single git service on I2P. It is part of the\n"
 "overall effort to transition I2P from monotone to Git."
 msgstr ""
 
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:16
 msgid ""
-"Before anything else: Know the capabilities the service offers to the "
-"public"
+"Before anything else: Know the capabilities the service offers to the public"
 msgstr ""
 
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:19
 msgid ""
 "Depending on how the git service is configured, it may or may not offer\n"
 "all services on the same address. In the case of git.idk.i2p, there is a\n"
-"public HTTP URL, and an SSH "
-"URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to "
-"configure for your Git SSH client. Either\n"
+"public HTTP URL, and an SSH URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to configure for your Git SSH client. Either\n"
 "can be used to push or pull, but SSH is recommended."
 msgstr ""
 
@@ -11670,10 +10319,8 @@ msgid ""
 "Then, add the address you will be pushing and pulling from. Note that\n"
 "this example address is for Read-Only HTTP-over-I2P clones, if your\n"
 "admin does not allow the git HTTP(Smart HTTP) protocol, then you will\n"
-"need to get the SSH clone base32 from them. Use this Base32 to connect "
-"the\n"
-"client tunnel to the Git SSH service: "
-"**g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**"
+"need to get the SSH clone base32 from them. Use this Base32 to connect the\n"
+"client tunnel to the Git SSH service: **g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**"
 msgstr ""
 
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:109
@@ -11801,7 +10448,8 @@ msgid "Gitlab over I2P Setup"
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:7
-msgid "Mirror I2P Git repositories and Bridge Clearnet repositories for others."
+msgid ""
+"Mirror I2P Git repositories and Bridge Clearnet repositories for others."
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:9
@@ -11856,14 +10504,13 @@ msgid ""
 "images. Since there are no third-party images involved here, updates\n"
 "should come as soon as they are available in the host images. To review\n"
 "the Dockerfile for yourself, visit the `Gitlab source\n"
-"code <https://gitlab.com/gitlab-org/omnibus-"
-"gitlab/-/blob/master/docker/Dockerfile>`__."
+"code <https://gitlab.com/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile>`__."
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:70
 msgid ""
-"Set up an I2P HTTP Proxy for Gitlab to use(Important information, "
-"optional steps)"
+"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional "
+"steps)"
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:73
@@ -12092,21 +10739,10 @@ msgid ""
 "generated for you. A recent, correctly-generated bundle of the mainline\n"
 "i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside\n"
 "of I2P at my pastebin\n"
-"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also "
-"use a\n"
-"`magnet link "
-"<magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,"
-"\n"
+"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also use a\n"
+"`magnet link <magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,\n"
 "and if you're a BiglyBT user who wants to bridge the torrent, use \n"
-"`this magnet link instead "
-"<magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker"
-".leechers-"
-"paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker"
-".lanta-"
-"net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker"
-".tiny-"
-"vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__"
-"\n"
+"`this magnet link instead <magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__\n"
 "to announce to clearnet trackers as well."
 msgstr ""
 
@@ -12200,40 +10836,29 @@ msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:16
 msgid ""
-"0.9.46 contains significant performance improvements in the streaming "
-"library.\n"
-"We have completed development of ECIES encryption (proposal 144) and "
-"there is now an option to enable it for testing."
-msgstr ""
-"Wersja 0.9.46 wprowadza znaczące poprawki wydajności w bibliotece "
-"strumieniowania. Zakończyliśmy prace nad szyfrowaniem ECIES (propozycja "
-"144) i dodaliśmy możliwość testowego włączenia go."
+"0.9.46 contains significant performance improvements in the streaming library.\n"
+"We have completed development of ECIES encryption (proposal 144) and there is now an option to enable it for testing."
+msgstr "Wersja 0.9.46 wprowadza znaczące poprawki wydajności w bibliotece strumieniowania. Zakończyliśmy prace nad szyfrowaniem ECIES (propozycja 144) i dodaliśmy możliwość testowego włączenia go."
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:21
 msgid ""
 "Windows users only:\n"
 "This release fixes a local privilege escalation vulnerability\n"
-"which could be exploited by a local user that has the ability to run "
-"programs.\n"
+"which could be exploited by a local user that has the ability to run programs.\n"
 "Please apply the update as soon as possible.\n"
 "Thanks to Blaze Infosec for their responsible disclosure of the issue."
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:29
 msgid ""
-"This is the last release to support Java 7, Debian packages Wheezy and "
-"Stretch, and Ubuntu packages Precise and Trusty.\n"
+"This is the last release to support Java 7, Debian packages Wheezy and Stretch, and Ubuntu packages Precise and Trusty.\n"
 "Users on those platforms must upgrade to receive future I2P updates."
-msgstr ""
-"Jest to ostatnie wydanie wspierajÄ…ce JavÄ™ 7, paczki Debiana Wheezy i "
-"Stretch, i paczki Ubuntu Precise i Trusty. Użytkownicy tych platform "
-"muszą dokonać uaktualnienia systemu, aby móc dalej otrzymywać "
-"aktualizacje I2P."
+msgstr "Jest to ostatnie wydanie wspierające Javę 7, paczki Debiana Wheezy i Stretch, i paczki Ubuntu Precise i Trusty. Użytkownicy tych platform muszą dokonać uaktualnienia systemu, aby móc dalej otrzymywać aktualizacje I2P."
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:44
 msgid ""
-"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing "
-"(proposal 144)"
+"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing (proposal "
+"144)"
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:45
@@ -12258,8 +10883,8 @@ msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:54
 msgid ""
-"Hidden Services Manager: Fixes for changing shared client options, "
-"prevent changing certain options while tunnel is running"
+"Hidden Services Manager: Fixes for changing shared client options, prevent "
+"changing certain options while tunnel is running"
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:55
@@ -12420,27 +11045,16 @@ msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:16
 msgid ""
-"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by "
-"default for some services.\n"
+"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by default for some services.\n"
 "The Sybil analysis and blocking tool is now enabled by default."
-msgstr ""
-"Wersja 0.9.47 domyślnie włącza nowy protokół szyfrowania end-to-end "
-"(propozycja 144) na niektórych usługach. Narzędzie do analizy i "
-"blokowania ataków Sybil jest teraz domyślnie włączone."
+msgstr "Wersja 0.9.47 domyślnie włącza nowy protokół szyfrowania end-to-end (propozycja 144) na niektórych usługach. Narzędzie do analizy i blokowania ataków Sybil jest teraz domyślnie włączone."
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:21
 msgid ""
 "Java 8 or higher is now required.\n"
-"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and "
-"Precise, are no longer supported.\n"
-"Users on those platforms should upgrade so you may continue to receive "
-"I2P updates."
-msgstr ""
-"Wymagana jest wersja Javy w wersji 8 lub wyższej. Paczki dla Debiana w "
-"wersjach Wheezy i Stretch, oraz paczki dla Ubuntu w wersjach Trusty i "
-"Precise nie są już wspierane. Użytkownicy tych platform powinni dokonać "
-"aktualizacji systemu do nowej wersji, aby móc dalej otrzymywać "
-"aktualizacje I2P."
+"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and Precise, are no longer supported.\n"
+"Users on those platforms should upgrade so you may continue to receive I2P updates."
+msgstr "Wymagana jest wersja Javy w wersji 8 lub wyższej. Paczki dla Debiana w wersjach Wheezy i Stretch, oraz paczki dla Ubuntu w wersjach Trusty i Precise nie są już wspierane. Użytkownicy tych platform powinni dokonać aktualizacji systemu do nowej wersji, aby móc dalej otrzymywać aktualizacje I2P."
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:37
 msgid "Java 8 now required"
@@ -12448,8 +11062,8 @@ msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:42
 msgid ""
-"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared "
-"clients, HTTP proxy, and new tunnels"
+"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared clients, "
+"HTTP proxy, and new tunnels"
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:43
@@ -12461,7 +11075,8 @@ msgid "Enable Sybil analysis and blocking tool by default"
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:51
-msgid "Hidden Services Manager: Fix missing server tunnel length configuration"
+msgid ""
+"Hidden Services Manager: Fix missing server tunnel length configuration"
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:52
@@ -12510,26 +11125,16 @@ msgstr "Wersja 0.9.48 z poprawkami wydajności"
 
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:16
 msgid ""
-"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for "
-"most services.\n"
-"We have added preliminary support for new tunnel build message encryption"
-" (proposal 152).\n"
+"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for most services.\n"
+"We have added preliminary support for new tunnel build message encryption (proposal 152).\n"
 "There are significant performance improvements throughout the router."
-msgstr ""
-"Wersja 0.9.48 wprowadza nowy protokół szyfrowania (propozycja 144) dla "
-"większości usług. Dodano wstępne wsparcie dla szyfrowania wiadomości "
-"tworzenia nowego tunelu (propozycja 152). Wprowadzono znaczne poprawki "
-"wydajności oprogramowania węzła."
+msgstr "Wersja 0.9.48 wprowadza nowy protokół szyfrowania (propozycja 144) dla większości usług. Dodano wstępne wsparcie dla szyfrowania wiadomości tworzenia nowego tunelu (propozycja 152). Wprowadzono znaczne poprawki wydajności oprogramowania węzła."
 
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:22
 msgid ""
 "Packages for Ubuntu Xenial (16.04 LTS) are no longer supported.\n"
-"Users on that platform should upgrade so you may continue to receive I2P "
-"updates."
-msgstr ""
-"Porzucono wsparcie dla paczek Ubuntu Xenial (16.04 LTS). Użytkownicy tego"
-" systemu powinni dokonać jego aktualizacji, aby móc dalej otrzymywać "
-"aktualizacje I2P."
+"Users on that platform should upgrade so you may continue to receive I2P updates."
+msgstr "Porzucono wsparcie dla paczek Ubuntu Xenial (16.04 LTS). Użytkownicy tego systemu powinni dokonać jego aktualizacji, aby móc dalej otrzymywać aktualizacje I2P."
 
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:37
 msgid "Avoid old DSA-SHA1 routers for lookups, stores, and tunnel peers"
@@ -12678,33 +11283,25 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:21
 msgid ""
-"For over a decade, I2P has relied on the venerable Monotone service to "
-"support\n"
-"its version control needs, but during the past few years, most of the "
-"world has\n"
+"For over a decade, I2P has relied on the venerable Monotone service to support\n"
+"its version control needs, but during the past few years, most of the world has\n"
 "moved on to the now-universal Git version control system. In that same\n"
-"time, the I2P Network has become faster and more reliable, and accessible"
-"\n"
+"time, the I2P Network has become faster and more reliable, and accessible\n"
 "workarounds to Git's non-resumability have been developed."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:29
 msgid ""
-"Today marks a significant occasion for I2P, as we switched off the old "
-"mtn\n"
-"i2p.i2p branch, and moved the development of the core Java I2P libraries "
-"from\n"
+"Today marks a significant occasion for I2P, as we switched off the old mtn\n"
+"i2p.i2p branch, and moved the development of the core Java I2P libraries from\n"
 "Monotone to Git officially."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:35
 msgid ""
-"While our use of mtn has been questioned in the past, and it's not always"
-" been a\n"
-"popular choice, I'd like to take this moment, as perhaps the very last "
-"project to use\n"
-"Monotone to thank the Monotone developers, current and former, wherever "
-"they are,\n"
+"While our use of mtn has been questioned in the past, and it's not always been a\n"
+"popular choice, I'd like to take this moment, as perhaps the very last project to use\n"
+"Monotone to thank the Monotone developers, current and former, wherever they are,\n"
 "for the software they created."
 msgstr ""
 
@@ -12714,12 +11311,9 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:49
 msgid ""
-"Checkins to the I2P Project repositories require you to configure GPG "
-"signing for\n"
-"your git commits, including Merge Requests and Pull Requests. Please "
-"configure\n"
-"your git client for GPG signing before you fork i2p.i2p and check "
-"anything in."
+"Checkins to the I2P Project repositories require you to configure GPG signing for\n"
+"your git commits, including Merge Requests and Pull Requests. Please configure\n"
+"your git client for GPG signing before you fork i2p.i2p and check anything in."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:55
@@ -12728,32 +11322,24 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:60
 msgid ""
-"The official repository is the one hosted at https://i2pgit.org/i2p-"
-"hackers/i2p.i2p\n"
-"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\""
-" available\n"
+"The official repository is the one hosted at https://i2pgit.org/i2p-hackers/i2p.i2p\n"
+"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\" available\n"
 "at Github at https://github.com/i2p/i2p.i2p."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:66
 msgid ""
-"Now that we're on git, we can synchronize repositories from our own self-"
-"hosted Gitlab\n"
-"instance, to Github, and back again. This means that it is possible to "
-"create and submit\n"
-"a merge request on Gitlab and when it is merged, the result will be "
-"synced with Github,\n"
+"Now that we're on git, we can synchronize repositories from our own self-hosted Gitlab\n"
+"instance, to Github, and back again. This means that it is possible to create and submit\n"
+"a merge request on Gitlab and when it is merged, the result will be synced with Github,\n"
 "and a Pull Request on Github, when merged, will appear on Gitlab."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:73
 msgid ""
-"This means that it's possible to submit code to us through our Gitlab "
-"instance or through\n"
-"Github depending on what you prefer, however, more of the I2P developers "
-"are regularly\n"
-"monitoring Gitlab than Github. MR's to Gitlab are more likely to be "
-"merged sooner\n"
+"This means that it's possible to submit code to us through our Gitlab instance or through\n"
+"Github depending on what you prefer, however, more of the I2P developers are regularly\n"
+"monitoring Gitlab than Github. MR's to Gitlab are more likely to be merged sooner\n"
 "than PR's to Github."
 msgstr ""
 
@@ -12763,14 +11349,10 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:85
 msgid ""
-"Congratulations and thanks to everyone who helped in the git migration, "
-"especially\n"
-"zzz, eche|on, nextloop, and our site mirror operators! While some of us "
-"will miss\n"
-"Monotone, it has become a barrier for new and existing participants in "
-"I2P development\n"
-"and we're excited to join the world of developers using Git to manage "
-"their distributed\n"
+"Congratulations and thanks to everyone who helped in the git migration, especially\n"
+"zzz, eche|on, nextloop, and our site mirror operators! While some of us will miss\n"
+"Monotone, it has become a barrier for new and existing participants in I2P development\n"
+"and we're excited to join the world of developers using Git to manage their distributed\n"
 "projects."
 msgstr ""
 
@@ -12785,55 +11367,28 @@ msgstr "Wersja 0.9.49: poprawki SSU i szybsza kryptografia"
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:16
 msgid ""
 "0.9.49 continues the work to make I2P faster and more secure.\n"
-"We have several improvements and fixes for the SSU (UDP) transport that "
-"should result in faster speeds.\n"
-"This release also starts the migration to new, faster ECIES-X25519 "
-"encryption for routers.\n"
+"We have several improvements and fixes for the SSU (UDP) transport that should result in faster speeds.\n"
+"This release also starts the migration to new, faster ECIES-X25519 encryption for routers.\n"
 "(Destinations have been using this encryption for a few releases now)\n"
-"We've been working on the specifications and protocols for new encryption"
-" for several years,\n"
-"and we are getting close to the end of it! The migration will take "
-"several releases to complete."
-msgstr ""
-"W wersji 0.9.49 kontynuujemy prace nad polepszeniem szybkości i "
-"bezpieczeństwa sieci I2P. Wprowadzono szereg ulepszeń i poprawek dla "
-"transportu SSU (UDP), co powinno pozwolić osiągać większą szybkość "
-"działania. To wydanie rozpoczyna migrację na nowe, szybsze szyfrowanie "
-"ECIES-X25519 dla węzłów. (Szyfrowanie to jest już obecnie używane dla "
-"adresów celów.) Prace nad specyfikacjami i protokołami nowego szyfrowania"
-" prowadzimy od lat i zbliżamy się ku końcowi! Migracja potrwa przez kilka"
-" następnych wydań."
+"We've been working on the specifications and protocols for new encryption for several years,\n"
+"and we are getting close to the end of it! The migration will take several releases to complete."
+msgstr "W wersji 0.9.49 kontynuujemy prace nad polepszeniem szybkości i bezpieczeństwa sieci I2P. Wprowadzono szereg ulepszeń i poprawek dla transportu SSU (UDP), co powinno pozwolić osiągać większą szybkość działania. To wydanie rozpoczyna migrację na nowe, szybsze szyfrowanie ECIES-X25519 dla węzłów. (Szyfrowanie to jest już obecnie używane dla adresów celów.) Prace nad specyfikacjami i protokołami nowego szyfrowania prowadzimy od lat i zbliżamy się ku końcowi! Migracja potrwa przez kilka następnych wydań."
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:25
 msgid ""
-"For this release, to minimize disruption, only new installs and a very "
-"small percentage of existing installs\n"
+"For this release, to minimize disruption, only new installs and a very small percentage of existing installs\n"
 "(randomly selected at restart) will be using the new encryption.\n"
-"If your router does \"rekey\" to use the new encryption, it may have "
-"lower traffic or less reliability than usual for several days after you "
-"restart.\n"
+"If your router does \"rekey\" to use the new encryption, it may have lower traffic or less reliability than usual for several days after you restart.\n"
 "This is normal, because your router has generated a new identity.\n"
 "Your performance should recover after a while."
-msgstr ""
-"Aby nie spowodować chaosu, nowe szyfrowanie zostanie włączone tylko dla "
-"nowych instalacji i niewielkiego procenta obecnych instalacji (z pewnym "
-"prawdopodobieństwem podczas startu węzła). Jeżeli Twój węzeł dokona "
-"zmiany klucza na nowe szyfrowanie, przez kilka dni od restartu możesz "
-"doświadczyć niższego transferu i niezawodności. Jest to normalne, "
-"ponieważ Twój węzeł wygeneruje nową tożsamość. Wydajność powinna powrócić"
-" po pewnym czasie."
+msgstr "Aby nie spowodować chaosu, nowe szyfrowanie zostanie włączone tylko dla nowych instalacji i niewielkiego procenta obecnych instalacji (z pewnym prawdopodobieństwem podczas startu węzła). Jeżeli Twój węzeł dokona zmiany klucza na nowe szyfrowanie, przez kilka dni od restartu możesz doświadczyć niższego transferu i niezawodności. Jest to normalne, ponieważ Twój węzeł wygeneruje nową tożsamość. Wydajność powinna powrócić po pewnym czasie."
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:33
 msgid ""
-"We have \"rekeyed\" the network twice before, when changing the default "
-"signature type,\n"
+"We have \"rekeyed\" the network twice before, when changing the default signature type,\n"
 "but this is the first time we've changed the default encryption type.\n"
 "Hopefully it will all go smoothly, but we're starting slowly to be sure."
-msgstr ""
-"Zmiana kluczy nastąpiła w sieci I2P jeż dwa razy podczas zmiany "
-"domyślnego typu podpisu, ale po raz pierwszy zmieniamy domyślny typ "
-"szyfrowania. Miejmy nadzieję, że zmiana przebiegnie bezproblemowo, ale z "
-"ostrożności wprowadzamy ją pomału."
+msgstr "Zmiana kluczy nastąpiła w sieci I2P jeż dwa razy podczas zmiany domyślnego typu podpisu, ale po raz pierwszy zmieniamy domyślny typ szyfrowania. Miejmy nadzieję, że zmiana przebiegnie bezproblemowo, ale z ostrożności wprowadzamy ją pomału."
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:49
 msgid "Build: Git migration"
@@ -12896,7 +11451,8 @@ msgid "Crypto: Increase ratchet tag window to prevent message loss"
 msgstr ""
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:68
-msgid "I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys"
+msgid ""
+"I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys"
 msgstr ""
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:69
@@ -12965,31 +11521,18 @@ msgstr "Wersja 0.9.50 z usprawnieniami IPv6"
 
 #: i2p2www/blog/2021/05/17/0.9.50-Release.rst:16
 msgid ""
-"0.9.50 continues the transition to ECIES-X25519 for router encryption "
-"keys.\n"
-"We have enabled DNS over HTTPS for reseeding to protect users from "
-"passive DNS snooping.\n"
-"There are numerous fixes and improvements for IPv6 addresses, including "
-"new UPnP support."
-msgstr ""
-"Wersja 0.9.50 kontynuuje migrację kluczy szyfrujących węzłów na algorytm "
-"ECIES-X25519. WÅ‚Ä…czono DNS przez HTTPS dla operacji reseedowania, aby "
-"chronić użytkowników przed nasłuchem zapytań DNS. Wprowadzono szereg "
-"poprawek i ulepszeń dla adresów IPv6, wliczając wsparcie dla UPnP."
+"0.9.50 continues the transition to ECIES-X25519 for router encryption keys.\n"
+"We have enabled DNS over HTTPS for reseeding to protect users from passive DNS snooping.\n"
+"There are numerous fixes and improvements for IPv6 addresses, including new UPnP support."
+msgstr "Wersja 0.9.50 kontynuuje migrację kluczy szyfrujących węzłów na algorytm ECIES-X25519. Włączono DNS przez HTTPS dla operacji reseedowania, aby chronić użytkowników przed nasłuchem zapytań DNS. Wprowadzono szereg poprawek i ulepszeń dla adresów IPv6, wliczając wsparcie dla UPnP."
 
 #: i2p2www/blog/2021/05/17/0.9.50-Release.rst:22
 msgid ""
 "We have finally fixed some longstanding SusiMail corruption bugs.\n"
-"Changes to the bandwidth limiter should improve network tunnel "
-"performance.\n"
+"Changes to the bandwidth limiter should improve network tunnel performance.\n"
 "There are several improvements in our Docker containers.\n"
-"We have improved our defenses for possible malicious and buggy routers in"
-" the network."
-msgstr ""
-"W końcu naprawiono występujące od dawna błędy w SusiMail. Zmiany w "
-"ograniczniku przepustowości powinny poprawić wydajność tuneli. "
-"Wprowadzono szereg poprawek w kontenerach Dockera. Usprawniliśmy ochronę "
-"przed potencjalnie złośliwymi i kłopotliwymi węzłami w sieci."
+"We have improved our defenses for possible malicious and buggy routers in the network."
+msgstr "W końcu naprawiono występujące od dawna błędy w SusiMail. Zmiany w ograniczniku przepustowości powinny poprawić wydajność tuneli. Wprowadzono szereg poprawek w kontenerach Dockera. Usprawniliśmy ochronę przed potencjalnie złośliwymi i kłopotliwymi węzłami w sieci."
 
 #: i2p2www/blog/2021/05/17/0.9.50-Release.rst:39
 msgid "Docker improvements"
@@ -13137,31 +11680,17 @@ msgstr "Wersja 1.5.0 wprowadza nowe wiadomości tworzenia tuneli"
 
 #: i2p2www/blog/2021/08/23/1.5.0-Release.rst:16
 msgid ""
-"Yes, that's right, after 9 years of 0.9.x releases, we are going straight"
-" from 0.9.50 to 1.5.0.\n"
-"This does not signify a major API change, or a claim that development is "
-"now complete.\n"
-"It is simply a recognition of almost 20 years of work to provide "
-"anonymity and security for our users."
-msgstr ""
-"Zgadza się (!) – po 9 latach wydawania wersji 0.9.x przechodzimy prosto z"
-" wersji 0.9.50 na 1.5.0. Nie oznacza to jakieÅ› znaczÄ…cej zmiany w API, "
-"ani też ukończenia prac nad I2P. Jest to po prostu sygnał tego, że od "
-"prawie 20 lat zapewniamy anonimowość i bezpieczeństwo naszym "
-"użytkownikom."
+"Yes, that's right, after 9 years of 0.9.x releases, we are going straight from 0.9.50 to 1.5.0.\n"
+"This does not signify a major API change, or a claim that development is now complete.\n"
+"It is simply a recognition of almost 20 years of work to provide anonymity and security for our users."
+msgstr "Zgadza się (!) – po 9 latach wydawania wersji 0.9.x przechodzimy prosto z wersji 0.9.50 na 1.5.0. Nie oznacza to jakieś znaczącej zmiany w API, ani też ukończenia prac nad I2P. Jest to po prostu sygnał tego, że od prawie 20 lat zapewniamy anonimowość i bezpieczeństwo naszym użytkownikom."
 
 #: i2p2www/blog/2021/08/23/1.5.0-Release.rst:22
 msgid ""
-"This release finishes implementation of smaller tunnel build messages to "
-"reduce bandwidth.\n"
-"We continue the transition of the network's routers to X25519 encryption."
-"\n"
+"This release finishes implementation of smaller tunnel build messages to reduce bandwidth.\n"
+"We continue the transition of the network's routers to X25519 encryption.\n"
 "Of course there are also numerous bug fixes and performance improvements."
-msgstr ""
-"W tym wydaniu ukończono prace nad mniejszymi wiadomościami tworzenia "
-"tuneli, aby zmniejszyć wykorzystywaną przepustowość. Kontynuujemy "
-"migrację węzłów na szyfrowanie X25519. Jak zwykle poprawiono kilka błędów"
-" i poprawiono wydajność."
+msgstr "W tym wydaniu ukończono prace nad mniejszymi wiadomościami tworzenia tuneli, aby zmniejszyć wykorzystywaną przepustowość. Kontynuujemy migrację węzłów na szyfrowanie X25519. Jak zwykle poprawiono kilka błędów i poprawiono wydajność."
 
 #: i2p2www/blog/2021/08/23/1.5.0-Release.rst:39
 msgid "Tunnels: Finish support for new build messages (proposal 157)"
@@ -13221,33 +11750,22 @@ msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:16
 msgid ""
-"It's hard to believe, but I2P has been around for nearly 20 years! From "
-"its\n"
-"beginning as a C project which provided anonymous access to IRC, we've "
-"had\n"
-"hundreds of contributors, accepted checkins from dozens of coders, used 2"
-"\n"
-"main languages, 3 version control systems, experienced a migration of its"
-"\n"
-"crypography, and multiple soft-forks. There have been around 500 "
-"registered\n"
-"sites on the Invisible Web, and countless unregistered I2P sites that "
-"were only\n"
+"It's hard to believe, but I2P has been around for nearly 20 years! From its\n"
+"beginning as a C project which provided anonymous access to IRC, we've had\n"
+"hundreds of contributors, accepted checkins from dozens of coders, used 2\n"
+"main languages, 3 version control systems, experienced a migration of its\n"
+"crypography, and multiple soft-forks. There have been around 500 registered\n"
+"sites on the Invisible Web, and countless unregistered I2P sites that were only\n"
 "accessible via their cryptographic hostnames."
 msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:26
 msgid ""
-"Thanks to the participation of users like you, the network has grown from"
-" a tiny\n"
-"group of power users to over 75,000 nodes operated from all over the "
-"world,\n"
-"made of I2P routers bundled in perhaps dozens of applications. Today I2P "
-"is\n"
-"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, "
-"OpenBSD, and\n"
-"many other systems. I2P can run on phones and even in SOHO routers "
-"(thanks to the\n"
+"Thanks to the participation of users like you, the network has grown from a tiny\n"
+"group of power users to over 75,000 nodes operated from all over the world,\n"
+"made of I2P routers bundled in perhaps dozens of applications. Today I2P is\n"
+"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, OpenBSD, and\n"
+"many other systems. I2P can run on phones and even in SOHO routers (thanks to the\n"
 "independent C++ implementation of the protocol, i2pd)."
 msgstr ""
 
@@ -13257,28 +11775,20 @@ msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:40
 msgid ""
-"Even before other anonymity projects were providing their own application"
-"\n"
-"bundles, I2P was a tool for building applications that were configured "
-"for\n"
-"anonymity. Over the years, we've leaned on this strength, by expanding "
-"our\n"
+"Even before other anonymity projects were providing their own application\n"
+"bundles, I2P was a tool for building applications that were configured for\n"
+"anonymity. Over the years, we've leaned on this strength, by expanding our\n"
 "APIs to support more and more versatile applications. Today, we're still\n"
 "developing new ways of building I2P into applications."
 msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:48
 msgid ""
-"Using the power of the Hidden Services Manager or the SAM API, developers"
-" of all\n"
-"kinds of applications can empower their users with anonymity using I2P. "
-"Exciting\n"
-"downstream projects like Monero's I2P-Zero have made it very easy for "
-"developers\n"
-"to help their users get connected to I2P. Today, I2P helps provide "
-"anonymity to\n"
-"dozens of applications including Bitcoin, IRC, email and multiple file-"
-"sharing\n"
+"Using the power of the Hidden Services Manager or the SAM API, developers of all\n"
+"kinds of applications can empower their users with anonymity using I2P. Exciting\n"
+"downstream projects like Monero's I2P-Zero have made it very easy for developers\n"
+"to help their users get connected to I2P. Today, I2P helps provide anonymity to\n"
+"dozens of applications including Bitcoin, IRC, email and multiple file-sharing\n"
 "protocols."
 msgstr ""
 
@@ -13288,35 +11798,26 @@ msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:62
 msgid ""
-"I2P has always been a decentralized network, because its obvious that "
-"providing\n"
-"an anonymity network is an intrinsically collaborative process. To "
-"illustrate\n"
+"I2P has always been a decentralized network, because its obvious that providing\n"
+"an anonymity network is an intrinsically collaborative process. To illustrate\n"
 "with the most extreme example, a single computer cannot provide itself\n"
-"with anonymity, nor can it be a useful network, by definiton. However, "
-"building\n"
+"with anonymity, nor can it be a useful network, by definiton. However, building\n"
 "I2P in this fully-decentralized manner hasn't always been easy."
 msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:70
 msgid ""
-"From the beginning, I2P would need to be scalable, and be able to balance"
-" itself\n"
-"so that  high-bandwidth nodes wouldn't be able to easily take over the "
-"network.\n"
-"Sybil attacks would leave the realm of academia and we would need to "
-"develop\n"
+"From the beginning, I2P would need to be scalable, and be able to balance itself\n"
+"so that  high-bandwidth nodes wouldn't be able to easily take over the network.\n"
+"Sybil attacks would leave the realm of academia and we would need to develop\n"
 "new defenses against them."
 msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:77
 msgid ""
-"We've worked very hard to never compromise on this stance, and today "
-"every I2P\n"
-"router helps participate in providing the network with bandwidth "
-"resources and\n"
-"providing the users with anonymity. In doing so, we've learned incredible"
-" things\n"
+"We've worked very hard to never compromise on this stance, and today every I2P\n"
+"router helps participate in providing the network with bandwidth resources and\n"
+"providing the users with anonymity. In doing so, we've learned incredible things\n"
 "and produced a network which at times has seemed inconceivable."
 msgstr ""
 
@@ -13326,12 +11827,9 @@ msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:89
 msgid ""
-"Over the next 2 weeks, we've planned some blog posts where we'll explore "
-"the past,\n"
-"present, and future of I2P, highlight applications and tools that build "
-"on\n"
-"and enhance I2P, and showcase the best of our community. Check back here "
-"for\n"
+"Over the next 2 weeks, we've planned some blog posts where we'll explore the past,\n"
+"present, and future of I2P, highlight applications and tools that build on\n"
+"and enhance I2P, and showcase the best of our community. Check back here for\n"
 "more in the coming days!"
 msgstr ""
 
@@ -13343,8 +11841,7 @@ msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:98
 msgid ""
-"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from "
-"Monero)\n"
+"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from Monero)\n"
 "  </en/blog/post/2021/09/08/I2P-Jpackage-Bundles-and-Zero>`_"
 msgstr ""
 
@@ -13356,8 +11853,8 @@ msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:102
 msgid ""
-"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for"
-" End-Users"
+"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for "
+"End-Users"
 msgstr ""
 
 #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:103
@@ -13377,7 +11874,8 @@ msgid "A history of I2P As We Know It"
 msgstr ""
 
 #: i2p2www/blog/2021/08/28/History-of-I2P.rst:11
-msgid "Invisibility is the best defense: building an internet within an internet"
+msgid ""
+"Invisibility is the best defense: building an internet within an internet"
 msgstr ""
 
 #: i2p2www/blog/2021/08/28/History-of-I2P.rst:16
@@ -13411,17 +11909,14 @@ msgstr ""
 #: i2p2www/blog/2021/08/28/History-of-I2P.rst:40
 msgid ""
 "“InvisibleNet is a research & development driven organization whose main\n"
-"    focus is the innovation of intelligent network technology. Our goal "
-"is\n"
-"    to provide the highest standards in security and privacy on the "
-"widely\n"
+"    focus is the innovation of intelligent network technology. Our goal is\n"
+"    to provide the highest standards in security and privacy on the widely\n"
 "    used, yet notoriously insecure Internet.\""
 msgstr ""
 
 #: i2p2www/blog/2021/08/28/History-of-I2P.rst:45
 msgid ""
-"\"The InvisibleNet team is comprised of a talented group of developers "
-"and\n"
+"\"The InvisibleNet team is comprised of a talented group of developers and\n"
 "    architects entirely dedicated to providing its users with both\n"
 "    convenience and the very best in secure communication.\""
 msgstr ""
@@ -13429,16 +11924,14 @@ msgstr ""
 #: i2p2www/blog/2021/08/28/History-of-I2P.rst:49
 msgid ""
 "\"Our technological ideals are reflected in the implementation of a\n"
-"    framework that is solid in design, and transparent in its "
-"application.\""
+"    framework that is solid in design, and transparent in its application.\""
 msgstr ""
 
 #: i2p2www/blog/2021/08/28/History-of-I2P.rst:52
 msgid ""
 "\"Here at InvisibleNet we strive towards the greatest level of quality\n"
 "    possible by keeping all areas of our research & development open and\n"
-"    available to the public for peer review, feedback, suggestions and "
-"new\n"
+"    available to the public for peer review, feedback, suggestions and new\n"
 "    ideas.”"
 msgstr ""
 
@@ -13463,12 +11956,10 @@ msgstr ""
 msgid ""
 "\"This, in essence will be an impenetrable neural-network, that is\n"
 "    self-driven, self-defensed, and completely seamless to already\n"
-"    applied protocols, specifically client to server (or agents as I call"
-"\n"
+"    applied protocols, specifically client to server (or agents as I call\n"
 "    them). It will be THE next transport layer, a layer on top of the\n"
 "    notoriously insecure Internet, to deliver full anonymity, privacy,\n"
-"    and security at the highest level possible. Decentralized and peer to"
-"\n"
+"    and security at the highest level possible. Decentralized and peer to\n"
 "    peer Internet, by the way, means no more worrying about your ISP\n"
 "    controlling your traffic. This will allow you to do seamless\n"
 "    activities and change the way we look at security and even the\n"
@@ -13833,8 +12324,7 @@ msgid ""
 "for its users was created in 2013. It was the first coin that provided\n"
 "built-in support for I2P, as well as Tor that makes it impossible to\n"
 "determine the IP address of the user. The developers, including meeh,\n"
-"also ran organizations like Privacy Solutions, and provided "
-"infrastructure\n"
+"also ran organizations like Privacy Solutions, and provided infrastructure\n"
 "support to the I2P network by running services like outproxies and\n"
 "reseed servers."
 msgstr ""
@@ -13908,11 +12398,9 @@ msgid ""
 "The new I2P transport protocol provides effective resistance against\n"
 "    DPI censorship. It also results in reduced CPU load because of the\n"
 "    faster, modern cryptography used. It makes I2P more likely to run on\n"
-"    low-end devices, such as smartphones and home routers. Both major I2P"
-"\n"
+"    low-end devices, such as smartphones and home routers. Both major I2P\n"
 "    implementations have full support for NTCP2 and it make NTCP2\n"
-"    available for use starting with version 0.9.36 (Java) and 2.20 (i2pd,"
-"\n"
+"    available for use starting with version 0.9.36 (Java) and 2.20 (i2pd,\n"
 "    C++)."
 msgstr ""
 
@@ -13925,8 +12413,7 @@ msgstr ""
 #: i2p2www/blog/2021/08/28/History-of-I2P.rst:415
 msgid ""
 "0.9.39 included extensive changes for new network database types\n"
-"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support"
-"\n"
+"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support\n"
 "development of RPC applications."
 msgstr ""
 
@@ -14072,18 +12559,12 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:16
 msgid ""
-"It has been said in the past that I2P emphasizes support for Hidden "
-"Services,\n"
-"which is true in many ways. However, what this means to users, "
-"developers, and\n"
-"hidden service administrators isn't always the same. Encrypted LeaseSets "
-"and\n"
-"their use-cases provide a unique, practical window into how I2P makes "
-"hidden\n"
-"services more versatile, easier to administer, and how I2P extends on the"
-"\n"
-"Hidden Service concept to provide security benefits for potentially "
-"interesting\n"
+"It has been said in the past that I2P emphasizes support for Hidden Services,\n"
+"which is true in many ways. However, what this means to users, developers, and\n"
+"hidden service administrators isn't always the same. Encrypted LeaseSets and\n"
+"their use-cases provide a unique, practical window into how I2P makes hidden\n"
+"services more versatile, easier to administer, and how I2P extends on the\n"
+"Hidden Service concept to provide security benefits for potentially interesting\n"
 "use-cases."
 msgstr ""
 
@@ -14095,33 +12576,22 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:31
 msgid ""
-"When you create a hidden service, you publish something called a "
-"\"LeaseSet\" to\n"
-"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P"
-" users\n"
-"need to discover \"where\" your hidden service is on the I2P Network. It "
-"contains\n"
-"\"Leases\" which identify tunnels that can be used to reach your hidden "
-"service,\n"
-"and the public key of your destination, which clients will encrypt "
-"messages to.\n"
-"This type of hidden service is reachable by anyone who has the address, "
-"which\n"
+"When you create a hidden service, you publish something called a \"LeaseSet\" to\n"
+"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P users\n"
+"need to discover \"where\" your hidden service is on the I2P Network. It contains\n"
+"\"Leases\" which identify tunnels that can be used to reach your hidden service,\n"
+"and the public key of your destination, which clients will encrypt messages to.\n"
+"This type of hidden service is reachable by anyone who has the address, which\n"
 "is probably the most common use case for now."
 msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:41
 msgid ""
-"Sometimes, you might not want to allow your hidden services to be "
-"accessible by\n"
-"anyone, though. Some people use hidden services as a way of accessing an "
-"SSH\n"
-"server on a home PC, or to stitch together a network of IOT Devices. In "
-"these\n"
-"cases it's not necessary, and may be counter-productive, to make your "
-"hidden\n"
-"service accessible to everyone one the I2P Network. This is where "
-"\"Encrypted\n"
+"Sometimes, you might not want to allow your hidden services to be accessible by\n"
+"anyone, though. Some people use hidden services as a way of accessing an SSH\n"
+"server on a home PC, or to stitch together a network of IOT Devices. In these\n"
+"cases it's not necessary, and may be counter-productive, to make your hidden\n"
+"service accessible to everyone one the I2P Network. This is where \"Encrypted\n"
 "LeaseSets\" come into play."
 msgstr ""
 
@@ -14134,33 +12604,22 @@ msgstr ""
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:55
 msgid ""
 "Encrypted LeaseSets are LeaseSets which are published to the NetDB in an\n"
-"encrypted form, where none of the Leases or public keys are visible "
-"unless\n"
-"the client has the keys required to decrypt the LeaseSet inside of it. "
-"Only\n"
-"clients you share keys with(For PSK Encrypted LeaseSets), or who share "
-"their\n"
-"keys with you(For DH Encrypted LeaseSets), will be able to see the "
-"destination\n"
+"encrypted form, where none of the Leases or public keys are visible unless\n"
+"the client has the keys required to decrypt the LeaseSet inside of it. Only\n"
+"clients you share keys with(For PSK Encrypted LeaseSets), or who share their\n"
+"keys with you(For DH Encrypted LeaseSets), will be able to see the destination\n"
 "and no one else."
 msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:64
 msgid ""
-"I2P Supports several strategies for Encrypted LeaseSets. The key "
-"characteristics\n"
-"of each strategy are important to understand when deciding which one to "
-"use. If\n"
-"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the "
-"server\n"
-"will generate a key(or keys) which the server operator then shares with "
-"each\n"
-"client. Of course, this exchange must happen out-of-band, possibly via an"
-"\n"
-"exchange on IRC for example. This version of Encrypted LeaseSets is sort "
-"of\n"
-"like logging into Wi-Fi with a password. Except, what you're logging into"
-" is\n"
+"I2P Supports several strategies for Encrypted LeaseSets. The key characteristics\n"
+"of each strategy are important to understand when deciding which one to use. If\n"
+"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the server\n"
+"will generate a key(or keys) which the server operator then shares with each\n"
+"client. Of course, this exchange must happen out-of-band, possibly via an\n"
+"exchange on IRC for example. This version of Encrypted LeaseSets is sort of\n"
+"like logging into Wi-Fi with a password. Except, what you're logging into is\n"
 "a Hidden Service."
 msgstr ""
 
@@ -14168,27 +12627,19 @@ msgstr ""
 msgid ""
 "If an Encrypted LeaseSet uses a \"Diffie-Hellman(DH)\n"
 "strategy, then they keys are generated on the client instead. When a\n"
-"Diffie-Hellman client connects to a destination with an Encrypted "
-"LeaseSet, they\n"
-"must first share their keys with the server operator. The server operator"
-" then\n"
-"decides whether to authorize the DH client. This version of Encrypted "
-"LeaseSets\n"
-"is sort of like SSH with an `authorized_keys` file. Except, what you're "
-"logging\n"
+"Diffie-Hellman client connects to a destination with an Encrypted LeaseSet, they\n"
+"must first share their keys with the server operator. The server operator then\n"
+"decides whether to authorize the DH client. This version of Encrypted LeaseSets\n"
+"is sort of like SSH with an `authorized_keys` file. Except, what you're logging\n"
 "into is a Hidden Service."
 msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:85
 msgid ""
-"By Encrypting your LeaseSet, you not only make it impossible for "
-"unauthorized\n"
-"users to connect to your destination, you make it impossible for "
-"unauthorized\n"
-"visitors to even discover the real destination of the I2P Hidden Service."
-" Some\n"
-"readers have probably already considered a use-case for their own "
-"Encrypted\n"
+"By Encrypting your LeaseSet, you not only make it impossible for unauthorized\n"
+"users to connect to your destination, you make it impossible for unauthorized\n"
+"visitors to even discover the real destination of the I2P Hidden Service. Some\n"
+"readers have probably already considered a use-case for their own Encrypted\n"
 "LeaseSet."
 msgstr ""
 
@@ -14200,50 +12651,35 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:98
 msgid ""
-"As a general rule, the more complex information a service has access to "
-"about\n"
-"your device, the more dangerous it is to expose that service to the "
-"Internet or\n"
-"indeed, to a Hidden Service network like I2P. If you want to expose such "
-"a\n"
-"service, you need to protect it with something like a password, or, in "
-"the case\n"
-"of I2P, a much more thorough and secure option could be an Encrypted "
-"LeaseSet."
+"As a general rule, the more complex information a service has access to about\n"
+"your device, the more dangerous it is to expose that service to the Internet or\n"
+"indeed, to a Hidden Service network like I2P. If you want to expose such a\n"
+"service, you need to protect it with something like a password, or, in the case\n"
+"of I2P, a much more thorough and secure option could be an Encrypted LeaseSet."
 msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:106
 msgid ""
-"**Before continuing, please read and understand that if you do the "
-"following**\n"
-"**procedure without an Encrypted LeaseSet, you will be defeating the "
-"security of**\n"
-"**your I2P router. Do not configure access to your router console over "
-"I2P without**\n"
-"**an Encrypted LeaseSet. Additionally, do not share your Encrypted "
-"LeaseSet PSK's**\n"
+"**Before continuing, please read and understand that if you do the following**\n"
+"**procedure without an Encrypted LeaseSet, you will be defeating the security of**\n"
+"**your I2P router. Do not configure access to your router console over I2P without**\n"
+"**an Encrypted LeaseSet. Additionally, do not share your Encrypted LeaseSet PSK's**\n"
 "**with any devices you do not control.**"
 msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:114
 msgid ""
-"One such service which is useful to share over I2P, but ONLY with an "
-"Encrypted\n"
-"LeaseSet, is the I2P router console itself. Exposing the I2P router "
-"console on\n"
-"one machine to I2P with an Encrypted LeaseSet allows another machine with"
-" a\n"
-"browser to administer the remote I2P instance. I find this useful for "
-"remotely\n"
-"monitoring my regular I2P Services. It could also be used to monitor a "
-"server\n"
+"One such service which is useful to share over I2P, but ONLY with an Encrypted\n"
+"LeaseSet, is the I2P router console itself. Exposing the I2P router console on\n"
+"one machine to I2P with an Encrypted LeaseSet allows another machine with a\n"
+"browser to administer the remote I2P instance. I find this useful for remotely\n"
+"monitoring my regular I2P Services. It could also be used to monitor a server\n"
 "which is used to seed a torrent long-term as a way to access I2PSnark."
 msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:123
 msgid ""
-"For as long as it takes to explain them, setting up an Encrypted LeaseSet"
-" is\n"
+"For as long as it takes to explain them, setting up an Encrypted LeaseSet is\n"
 "straightforward to configure via the Hidden Services Manager UI."
 msgstr ""
 
@@ -14255,23 +12691,17 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:137
 msgid ""
-"Start by opening the Hidden Services Manager at "
-"http://127.0.0.1:7657/i2ptunnelmgr\n"
-"and scroll to the bottom of the section that says \"I2P Hidden "
-"Services.\" Create\n"
-"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" "
-"with these\n"
+"Start by opening the Hidden Services Manager at http://127.0.0.1:7657/i2ptunnelmgr\n"
+"and scroll to the bottom of the section that says \"I2P Hidden Services.\" Create\n"
+"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" with these\n"
 "\"Tunnel Cryptography Options\" and save the hidden service."
 msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:148
 msgid ""
-"Then, select your new tunnel from the Hidden Services Manager main page. "
-"The\n"
-"Tunnel Cryptography Options should now include your first Pre-Shared Key."
-" Copy\n"
-"this down for the next step, along with the Encrypted Base32 Address of "
-"your\n"
+"Then, select your new tunnel from the Hidden Services Manager main page. The\n"
+"Tunnel Cryptography Options should now include your first Pre-Shared Key. Copy\n"
+"this down for the next step, along with the Encrypted Base32 Address of your\n"
 "tunnel."
 msgstr ""
 
@@ -14283,16 +12713,11 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:164
 msgid ""
-"Now switch computers to the client which will connect to the hidden "
-"service,\n"
-"and visit the Keyring Configuration at "
-"http://127.0.0.1:7657/configkeyring to\n"
-"add the keys from earlier. Start by pasting the Base32 from the Server "
-"into\n"
-"the field labeled: \"Full destination, name, Base32, or hash.\" Next, "
-"paste the\n"
-"Pre-Shared Key from the server into the \"Encryption Key\" field. Click "
-"save,\n"
+"Now switch computers to the client which will connect to the hidden service,\n"
+"and visit the Keyring Configuration at http://127.0.0.1:7657/configkeyring to\n"
+"add the keys from earlier. Start by pasting the Base32 from the Server into\n"
+"the field labeled: \"Full destination, name, Base32, or hash.\" Next, paste the\n"
+"Pre-Shared Key from the server into the \"Encryption Key\" field. Click save,\n"
 "and you're ready to securely visit the Hidden Service using an Encrypted\n"
 "LeaseSet."
 msgstr ""
@@ -14305,22 +12730,14 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:183
 msgid ""
-"As you can see, I2P offers unique capabilities to Hidden Service "
-"Administrators\n"
-"which empower them to securely manage their I2P connections from anywhere"
-" in the\n"
-"world. Other Encrypted LeaseSets I keep on the same device for the same "
-"reason\n"
-"point to the SSH server, the Portainer instance I user to manage my "
-"service\n"
-"containers, and my personal NextCloud instance. With I2P, truly private, "
-"always\n"
-"reachable Self-Hosting is an achievable goal, in fact I think it's one of"
-" the\n"
-"things we're uniquely suited to, because of Encrypted LeaseSets. With "
-"them, I2P\n"
-"could become the key to securing self-hosted home automation or simply "
-"become\n"
+"As you can see, I2P offers unique capabilities to Hidden Service Administrators\n"
+"which empower them to securely manage their I2P connections from anywhere in the\n"
+"world. Other Encrypted LeaseSets I keep on the same device for the same reason\n"
+"point to the SSH server, the Portainer instance I user to manage my service\n"
+"containers, and my personal NextCloud instance. With I2P, truly private, always\n"
+"reachable Self-Hosting is an achievable goal, in fact I think it's one of the\n"
+"things we're uniquely suited to, because of Encrypted LeaseSets. With them, I2P\n"
+"could become the key to securing self-hosted home automation or simply become\n"
 "the backbone of a new more private peer-to-peer web."
 msgstr ""
 
@@ -14336,36 +12753,24 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:11
 msgid ""
-"For the majority of I2P's existence, it's been an application that runs "
-"with the\n"
-"help of a Java Virtual Machine that is already installed on the platform."
-" This\n"
-"has always been the normal way to distribute Java applications, but it "
-"leads to\n"
-"a complicated installation procedure for many people. To make things even"
-" more\n"
-"complicated, the \"right answer\" to making I2P easy to install on any "
-"given\n"
-"platform might not be the same as any other platform. For example, I2P is"
-" quite\n"
-"simple to install with standard tools on Debian and Ubuntu based "
-"operating\n"
-"systems, because we can simply list the required Java components as "
-"\"Required\"\n"
-"by our package, however on Windows or OSX, there is no such system "
-"allowing us to make\n"
+"For the majority of I2P's existence, it's been an application that runs with the\n"
+"help of a Java Virtual Machine that is already installed on the platform. This\n"
+"has always been the normal way to distribute Java applications, but it leads to\n"
+"a complicated installation procedure for many people. To make things even more\n"
+"complicated, the \"right answer\" to making I2P easy to install on any given\n"
+"platform might not be the same as any other platform. For example, I2P is quite\n"
+"simple to install with standard tools on Debian and Ubuntu based operating\n"
+"systems, because we can simply list the required Java components as \"Required\"\n"
+"by our package, however on Windows or OSX, there is no such system allowing us to make\n"
 "sure that a compatible Java is installed."
 msgstr ""
 
 #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:24
 msgid ""
-"The obvious solution would be to manage the Java installation ourselves, "
-"but\n"
-"this used to a problem in-and-of-itself, outside of the scope of I2P. "
-"However,\n"
+"The obvious solution would be to manage the Java installation ourselves, but\n"
+"this used to a problem in-and-of-itself, outside of the scope of I2P. However,\n"
 "in recent Java versions, a new set of options has emerged which has the\n"
-"potential to solve this problem for many Java software. This exciting "
-"tool is\n"
+"potential to solve this problem for many Java software. This exciting tool is\n"
 "called **\"Jpackage.\"**"
 msgstr ""
 
@@ -14375,31 +12780,21 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:37
 msgid ""
-"The first very successful effort at building a dependency-free I2P "
-"Package was\n"
-"I2P-Zero, which was created by the Monero project originally for use with"
-" the\n"
-"Monero cryptocurrency. This project got us very excited because of it's "
-"success\n"
-"in creating a general-purpose I2P router which could easily packaged with"
-" an\n"
-"I2P application. Especially on Reddit, many people express their "
-"preference for\n"
+"The first very successful effort at building a dependency-free I2P Package was\n"
+"I2P-Zero, which was created by the Monero project originally for use with the\n"
+"Monero cryptocurrency. This project got us very excited because of it's success\n"
+"in creating a general-purpose I2P router which could easily packaged with an\n"
+"I2P application. Especially on Reddit, many people express their preference for\n"
 "the simplicity of setting up an I2P-Zero router."
 msgstr ""
 
 #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:46
 msgid ""
-"This really proved to us that a dependency-free I2P Package which was "
-"easy to\n"
-"install was possible using modern Java tools, but I2P-Zero's use case was"
-" a\n"
-"little bit different than ours. It is best for embedded apps that need an"
-" I2P\n"
-"router that they can easily control using it's convenient control port on"
-" port\n"
-"\"8051\". Our next step would be to adapt the technology to the general-"
-"purpose\n"
+"This really proved to us that a dependency-free I2P Package which was easy to\n"
+"install was possible using modern Java tools, but I2P-Zero's use case was a\n"
+"little bit different than ours. It is best for embedded apps that need an I2P\n"
+"router that they can easily control using it's convenient control port on port\n"
+"\"8051\". Our next step would be to adapt the technology to the general-purpose\n"
 "I2P Application."
 msgstr ""
 
@@ -14409,26 +12804,18 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:60
 msgid ""
-"The issue became more pressing in recent versions of Mac OSX, where it is"
-" no\n"
-"longer straightforward to use the \"Classic\" installer which comes in "
-"the .jar\n"
-"format. This is because the application is not \"Notarized\" by Apple "
-"authorities\n"
-"and it is deemed a security risk. **However**, Jpackage can produce a "
-".dmg file,\n"
-"which can be notarized by Apple authorities, conveniently solving our "
-"problem."
+"The issue became more pressing in recent versions of Mac OSX, where it is no\n"
+"longer straightforward to use the \"Classic\" installer which comes in the .jar\n"
+"format. This is because the application is not \"Notarized\" by Apple authorities\n"
+"and it is deemed a security risk. **However**, Jpackage can produce a .dmg file,\n"
+"which can be notarized by Apple authorities, conveniently solving our problem."
 msgstr ""
 
 #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:68
 msgid ""
-"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to "
-"install on\n"
-"OSX than ever, no longer requiring users to install Java themselves and "
-"using\n"
-"standard OSX installation tools in their prescribed ways. The new .dmg "
-"installer\n"
+"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to install on\n"
+"OSX than ever, no longer requiring users to install Java themselves and using\n"
+"standard OSX installation tools in their prescribed ways. The new .dmg installer\n"
 "makes setting up I2P on Mac OSX easier than it's ever been."
 msgstr ""
 
@@ -14438,30 +12825,18 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:84
 msgid ""
-"One of the things I hear from users the most is that if I2P wants "
-"adoption, it\n"
-"needs to be easy to use for people. Many of them want a \"Tor Browser "
-"Like\" user\n"
-"experience, to quote or paraphrase many familiar Redditors. Installation "
-"should\n"
-"not require complicated and error-prone \"post-installation\" steps. Many"
-" new\n"
-"users are not prepared to deal with their browser configuration in a "
-"thorough\n"
-"and complete way. To address this problem, we created the I2P Profile "
-"Bundle\n"
-"which configured Firefox so that it would automatically \"Just Work\" for"
-" I2P.\n"
-"As it's developed, it's added security features and improved integration "
-"with\n"
-"I2P itself. In it's latest version, it **also** bundles a complete, "
-"Jpackage\n"
-"powered I2P Router. The I2P Firefox Profile is now a fully-fledged "
-"distribution\n"
-"of I2P for Windows, with the only remaining dependency being Firefox "
-"itself.\n"
-"This should provide an unprecedented level of convenience for I2P users "
-"on\n"
+"One of the things I hear from users the most is that if I2P wants adoption, it\n"
+"needs to be easy to use for people. Many of them want a \"Tor Browser Like\" user\n"
+"experience, to quote or paraphrase many familiar Redditors. Installation should\n"
+"not require complicated and error-prone \"post-installation\" steps. Many new\n"
+"users are not prepared to deal with their browser configuration in a thorough\n"
+"and complete way. To address this problem, we created the I2P Profile Bundle\n"
+"which configured Firefox so that it would automatically \"Just Work\" for I2P.\n"
+"As it's developed, it's added security features and improved integration with\n"
+"I2P itself. In it's latest version, it **also** bundles a complete, Jpackage\n"
+"powered I2P Router. The I2P Firefox Profile is now a fully-fledged distribution\n"
+"of I2P for Windows, with the only remaining dependency being Firefox itself.\n"
+"This should provide an unprecedented level of convenience for I2P users on\n"
 "Windows."
 msgstr ""
 
@@ -14475,16 +12850,11 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:11
 msgid ""
-"An event months in the making, Bitcoin Core has added official support "
-"for I2P!\n"
-"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin "
-"nodes,\n"
-"using the help of nodes that operate within both I2P and the clearnet, "
-"making\n"
-"them first-class participants in the Bitcoin network. It's exciting to "
-"see\n"
-"large communities like Bitcoin taking notice of the advantages I2P can "
-"bring\n"
+"An event months in the making, Bitcoin Core has added official support for I2P!\n"
+"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin nodes,\n"
+"using the help of nodes that operate within both I2P and the clearnet, making\n"
+"them first-class participants in the Bitcoin network. It's exciting to see\n"
+"large communities like Bitcoin taking notice of the advantages I2P can bring\n"
 "to them providing privacy and reachability to people all over the world."
 msgstr ""
 
@@ -14494,13 +12864,10 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:25
 msgid ""
-"I2P support is automatic, via the SAM API. This is also exciting news, "
-"because\n"
-"it highlights some of the things I2P is singularly good at, like "
-"empowering \n"
+"I2P support is automatic, via the SAM API. This is also exciting news, because\n"
+"it highlights some of the things I2P is singularly good at, like empowering \n"
 "application developers to build I2P connections programmatically and\n"
-"conveniently. Bitcoin-over-I2P users can use I2P with no manual "
-"configuration by\n"
+"conveniently. Bitcoin-over-I2P users can use I2P with no manual configuration by\n"
 "enabling the SAM API and running Bitcoin with I2P enabled."
 msgstr ""
 
@@ -14510,23 +12877,17 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:38
 msgid ""
-"In order to set up an I2P Router to provide anonymous connectivity to "
-"bitcoin,\n"
-"the SAM API needs to be enabled. In Java I2P, you should go to "
-"`http://127.0.0.1:7657/configclients\n"
-"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application "
-"Bridge\n"
-"with the \"Start\" button. You may also want to enable the SAM "
-"Application Bridge\n"
-"by default by checking the \"Run at Startup\" box and clicking \"Save "
-"Client\n"
+"In order to set up an I2P Router to provide anonymous connectivity to bitcoin,\n"
+"the SAM API needs to be enabled. In Java I2P, you should go to `http://127.0.0.1:7657/configclients\n"
+"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application Bridge\n"
+"with the \"Start\" button. You may also want to enable the SAM Application Bridge\n"
+"by default by checking the \"Run at Startup\" box and clicking \"Save Client\n"
 "Configuration.\""
 msgstr ""
 
 #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:47
 msgid ""
-"On i2pd, the SAM API is normally enabled by default, but if it isn't, you"
-" should\n"
+"On i2pd, the SAM API is normally enabled by default, but if it isn't, you should\n"
 "set::\n"
 "\n"
 "  sam.enabled=true\n"
@@ -14540,69 +12901,52 @@ msgstr ""
 
 #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:61
 msgid ""
-"Getting Bitcoin itself launched in an anonymous mode still requires "
-"editing some\n"
-"configuration files in the Bitcoin Data Directory, which is "
-"%APPDATA%\\Bitcoin on\n"
-"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ "
-"on Mac\n"
-"OSX. It also requires at least version 22.0.0 for I2P support to be "
-"present."
+"Getting Bitcoin itself launched in an anonymous mode still requires editing some\n"
+"configuration files in the Bitcoin Data Directory, which is %APPDATA%\\Bitcoin on\n"
+"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ on Mac\n"
+"OSX. It also requires at least version 22.0.0 for I2P support to be present."
 msgstr ""
 
 #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:68
 msgid ""
 "After following these instructions, you should have a private Bitcoin\n"
 "node which uses I2P for I2P connections, and Tor for .onion and clearnet\n"
-"connections, so that all your connections are anonymous. For convenience,"
-"\n"
-"Windows users should open their Bitcoin Data Directory by opening the "
-"start menu\n"
-"and searching for \"Run.\" Inside the run prompt, type "
-"\"%APPDATA%\\Bitcoin\" and\n"
+"connections, so that all your connections are anonymous. For convenience,\n"
+"Windows users should open their Bitcoin Data Directory by opening the start menu\n"
+"and searching for \"Run.\" Inside the run prompt, type \"%APPDATA%\\Bitcoin\" and\n"
 "press enter."
 msgstr ""
 
 #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:77
 msgid ""
-"In that directory create a file called \"i2p.conf.\" On Windows, you "
-"should make\n"
-"sure that you've add quotes around the file when you save it, in order to"
-"\n"
-"prevent Windows from adding a default file extension to the file. The "
-"file\n"
+"In that directory create a file called \"i2p.conf.\" On Windows, you should make\n"
+"sure that you've add quotes around the file when you save it, in order to\n"
+"prevent Windows from adding a default file extension to the file. The file\n"
 "should contain the following I2P-Related Bitcoin configuration options::\n"
 "\n"
 "  i2psam=127.0.0.1:7656\n"
 "  i2pacceptincoming=true\n"
 "  onlynet=i2p\n"
 "\n"
-"Next, you should create another file called \"tor.conf.\" The file should"
-" contain\n"
+"Next, you should create another file called \"tor.conf.\" The file should contain\n"
 "the following Tor related configuration options::\n"
 "\n"
 "  proxy=127.0.0.1:9050\n"
 "  onion=127.0.0.1:9050\n"
 "  onlynet=tor\n"
 "\n"
-"Finally, you'll need to \"include\" these configuration options in your "
-"Bitcoin\n"
-"configuration file, called \"bitcoin.conf\" in the Data Directory. Add "
-"these two\n"
+"Finally, you'll need to \"include\" these configuration options in your Bitcoin\n"
+"configuration file, called \"bitcoin.conf\" in the Data Directory. Add these two\n"
 "lines to your bitcoin.conf file::\n"
 "\n"
 "  includeconf=i2p.conf\n"
 "  includeconf=tor.conf\n"
 "\n"
-"Now your Bitcoin node is configured to only use anonymous connections. In"
-" order\n"
-"to enable direct connections to remote nodes, remove the lines beginning "
-"in::\n"
+"Now your Bitcoin node is configured to only use anonymous connections. In order\n"
+"to enable direct connections to remote nodes, remove the lines beginning in::\n"
 "\n"
 "  onlynet=\n"
 "\n"
-"You can do this if you do not require your Bitcoin node to be anonymous, "
-"and\n"
+"You can do this if you do not require your Bitcoin node to be anonymous, and\n"
 "it helps anonymous users connect to the rest of the Bitcoin network."
 msgstr ""
-
diff --git a/i2p2www/translations/pl/LC_MESSAGES/comparison.po b/i2p2www/translations/pl/LC_MESSAGES/comparison.po
index b64039d064bbc82941137021c8acdbd3aba081f9..07bb952fca1a23a3ed8c3618c9c55f4645df4bc2 100644
--- a/i2p2www/translations/pl/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/pl/LC_MESSAGES/comparison.po
@@ -1,25 +1,24 @@
-# Polish translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
-# kRkk <krkkx@protonmail.com>, 2018
-# Verdulo :-), 2016
+# Karol Kosek, 2018
+# ☆Verdulo, 2016
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2018-10-04 00:20+0000\n"
-"Last-Translator: erinm\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Karol Kosek, 2018\n"
 "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n"
-"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && "
-"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && "
-"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: pl\n"
+"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -27,82 +26,39 @@ msgstr "I2P w porównaniu z Freenetem"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
-msgstr ""
-"Freenet jest w pełni rozproszoną, anonimową, \"publikującą\" siecią peer-"
-"to-peer, która umożliwia w bezpieczny sposób na przechowywanie danych, i "
-"także stara się rozwiązać problem przeciążenia serwerów wynikającego z "
-"nagłego wzrostu zainteresowania daną treścią. Podczas gdy Freenet został "
-"zaprojektowany jako rozproszony magazyn plików, powstały aplikacje "
-"pracujące na nim i pozwalające na bardziej ogólne sposoby anonimowej "
-"komunikacji, takie jak statyczne strony i listy dyskusyjne."
+msgstr "Freenet jest w pełni rozproszoną, anonimową, \"publikującą\" siecią peer-to-peer, która umożliwia w bezpieczny sposób na przechowywanie danych, i także stara się rozwiązać problem przeciążenia serwerów wynikającego z nagłego wzrostu zainteresowania daną treścią. Podczas gdy Freenet został zaprojektowany jako rozproszony magazyn plików, powstały aplikacje pracujące na nim i pozwalające na bardziej ogólne sposoby anonimowej komunikacji, takie jak statyczne strony i listy dyskusyjne."
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
-msgstr ""
-"W porównaniu do I2P, Freenet ma takie zalety jak: jest rozproszonym "
-"magazynem plików w przeciwieństwie do I2P, co pozwala na dostęp do "
-"udostępnionych treści, nawet gdy udostępniający nie jest już połączony do"
-" sieci. Dodatkowo pozwala to rozpowszechniać popularne dane niezwykle "
-"efektywnie. I2P nie oferuje tej funkcji. Z drugiej strony jest to "
-"obciążenie dla tych osób, które chcą po prostu anonimowej komunikacji z "
-"innymi poprzez strony, listy dyskusyjne, wymianę plików, itd. Są próby "
-"stworzenia rozproszonego magazynu plików działającego na sieci I2P, "
-"(ostatnio przeportowano <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), ale nie "
-"jest jeszcze gotowy do powszechnego użytku."
+msgstr "W porównaniu do I2P, Freenet ma takie zalety jak: jest rozproszonym magazynem plików w przeciwieństwie do I2P, co pozwala na dostęp do udostępnionych treści, nawet gdy udostępniający nie jest już połączony do sieci. Dodatkowo pozwala to rozpowszechniać popularne dane niezwykle efektywnie. I2P nie oferuje tej funkcji. Z drugiej strony jest to obciążenie dla tych osób, które chcą po prostu anonimowej komunikacji z innymi poprzez strony, listy dyskusyjne, wymianę plików, itd. Są próby stworzenia rozproszonego magazynu plików działającego na sieci I2P, (ostatnio przeportowano <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), ale nie jest jeszcze gotowy do powszechnego użytku."
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
-msgstr ""
-"Jednakże, nawet pomijając kwestie implementacji, rozważa się problemy "
-"dotyczące algorytmów Freeneetu mając na uwadze zarówno skalowalność jak i"
-" anonimowość, głównie heurestyczne trasowanie Freenetu. Współistnienie "
-"różnych technik ma za zadanie udaremnić ataki, i być może niektóre "
-"aspekty algorytmów trasowania mają dać skalowalność. Niestety niewiele "
-"analiz algorytmów dało pozytywne wyniki, ale wciąż jest nadzieja. "
-"Ostatecznie Freenet zapewnia znaczącą ochronę anonimowości, dopóki "
-"przeciwnik nie dysponuje zasobami pozwalajÄ…cymi na dalszÄ… analizÄ™."
+msgstr "Jednakże, nawet pomijając kwestie implementacji, rozważa się problemy dotyczące algorytmów Freeneetu mając na uwadze zarówno skalowalność jak i anonimowość, głównie heurestyczne trasowanie Freenetu. Współistnienie różnych technik ma za zadanie udaremnić ataki, i być może niektóre aspekty algorytmów trasowania mają dać skalowalność. Niestety niewiele analiz algorytmów dało pozytywne wyniki, ale wciąż jest nadzieja. Ostatecznie Freenet zapewnia znaczącą ochronę anonimowości, dopóki przeciwnik nie dysponuje zasobami pozwalającymi na dalszą analizę."
 
 #: i2p2www/pages/site/comparison/index.html:2
 msgid "Comparing I2P to other projects"
@@ -110,15 +66,11 @@ msgstr "Porównywanie I2P do innych projektów"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -133,10 +85,8 @@ msgstr ""
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
@@ -154,52 +104,38 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
 msgstr ""
 
@@ -207,19 +143,15 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
@@ -231,32 +163,20 @@ msgstr ""
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
 msgstr ""
 
@@ -265,36 +185,23 @@ msgstr ""
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
 msgstr ""
 
@@ -302,10 +209,8 @@ msgstr ""
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
 msgstr ""
@@ -319,7 +224,7 @@ msgstr ""
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
@@ -454,7 +359,7 @@ msgstr "Ukryta usługa"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
+msgid "I2P Site or Destination"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
@@ -525,8 +430,7 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
 msgstr ""
@@ -545,10 +449,8 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:93
@@ -556,7 +458,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:96
@@ -595,8 +498,8 @@ msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:121
@@ -733,4 +636,3 @@ msgid ""
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
 msgstr ""
-
diff --git a/i2p2www/translations/pl/LC_MESSAGES/docs.po b/i2p2www/translations/pl/LC_MESSAGES/docs.po
index beac317eaa894de3cdece39ab0fe21648c331967..0632252192b717b15ac6296e303d9d1f5781bc46 100644
--- a/i2p2www/translations/pl/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/pl/LC_MESSAGES/docs.po
@@ -1,25 +1,24 @@
-# Polish translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Karol Kosek, 2018
 # Taporpo Ne <taporpone@gmail.com>, 2017
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-09-13 22:25+0000\n"
-"Last-Translator: Giovanni Pellerano <giovanni.pellerano@evilaliv3.org>\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Karol Kosek, 2018\n"
 "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n"
-"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && "
-"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && "
-"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: pl\n"
+"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n"
 
 #: i2p2www/pages/site/docs/index.html:2 i2p2www/pages/site/docs/index.html:24
 msgid "Index to Technical Documentation"
@@ -34,16 +33,14 @@ msgid ""
 "This index is ordered from the highest to lowest layers.\n"
 "The higher layers are for \"clients\" or applications;\n"
 "the lower layers are inside the router itself.\n"
-"The interface between applications and the router is the I2CP (I2P "
-"Control\n"
+"The interface between applications and the router is the I2CP (I2P Control\n"
 "Protocol) API."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:18
 #, python-format
 msgid ""
-"The I2P Project is committed to maintaining accurate, current "
-"documentation.\n"
+"The I2P Project is committed to maintaining accurate, current documentation.\n"
 "If you find any inaccuracies in the documents linked below, please\n"
 "<a href=\"%(trac)s\">enter a ticket identifying the problem</a>."
 msgstr ""
@@ -100,8 +97,8 @@ msgstr "Prezentacje, artykuły, poradniki, video i wywiady"
 #: i2p2www/pages/site/docs/index.html:36
 #, python-format
 msgid ""
-"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a>"
-" August 28, 2003 (pdf)"
+"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a> "
+"August 28, 2003 (pdf)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:39
@@ -130,7 +127,8 @@ msgstr "Specyfikacja wtyczek"
 msgid "Managed Clients"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:47 i2p2www/pages/site/docs/index.html:240
+#: i2p2www/pages/site/docs/index.html:47
+#: i2p2www/pages/site/docs/index.html:240
 msgid "Embedding the router in your application"
 msgstr ""
 
@@ -147,7 +145,8 @@ msgstr ""
 msgid "hostsdb.blockfile Format"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:51 i2p2www/pages/site/docs/index.html:206
+#: i2p2www/pages/site/docs/index.html:51
+#: i2p2www/pages/site/docs/index.html:206
 msgid "Configuration File Format"
 msgstr "Format pliku konfiguracji"
 
@@ -224,8 +223,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:101
 msgid ""
-"The lowest-level API used for clients (applications) to send and receive "
-"traffic to a router.\n"
+"The lowest-level API used for clients (applications) to send and receive traffic to a router.\n"
 "Traditionally used only by Java applications and higher-level APIs."
 msgstr ""
 
@@ -284,8 +282,7 @@ msgstr "Baza danych sieci"
 
 #: i2p2www/pages/site/docs/index.html:127
 msgid ""
-"Distributed storage and retrieval of information about routers and "
-"clients."
+"Distributed storage and retrieval of information about routers and clients."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:129
@@ -347,8 +344,8 @@ msgstr "Tunele"
 
 #: i2p2www/pages/site/docs/index.html:154
 msgid ""
-"Selecting peers, requesting tunnels through those peers, and encrypting "
-"and routing messages through these tunnels."
+"Selecting peers, requesting tunnels through those peers, and encrypting and "
+"routing messages through these tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:156
@@ -403,7 +400,8 @@ msgid "Transport Layer"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:171
-msgid "The protocols for direct (point-to-point) router to router communication."
+msgid ""
+"The protocols for direct (point-to-point) router to router communication."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:173
@@ -541,31 +539,27 @@ msgstr ""
 msgid "Bug tracker"
 msgstr "Tracker błędów"
 
-#: i2p2www/pages/site/docs/index.html:257
-msgid "Viewmtn inside I2P"
-msgstr ""
-
-#: i2p2www/pages/site/docs/index.html:260
+#: i2p2www/pages/site/docs/index.html:256
 msgid "I2P Source exported to GitHub"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:262
+#: i2p2www/pages/site/docs/index.html:258
 msgid "I2P Source Git Repo inside I2P"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:264
+#: i2p2www/pages/site/docs/index.html:260
 msgid "Source translation at Transifex"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:266
+#: i2p2www/pages/site/docs/index.html:262
 msgid "Roadmap"
 msgstr "Plany na przyszłość"
 
-#: i2p2www/pages/site/docs/index.html:268
+#: i2p2www/pages/site/docs/index.html:264
 msgid "To Do List"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:268
+#: i2p2www/pages/site/docs/index.html:264
 msgid "not current"
 msgstr ""
 
@@ -573,43 +567,30 @@ msgstr ""
 msgid ""
 "I2P ships with a generic naming library and a base implementation \n"
 "designed to work off a local name to destination mapping, as well as an\n"
-"add-on application called the <a href=\"#addressbook\">address book</a>."
-" \n"
-"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to "
-"Tor's .onion addresses."
+"add-on application called the <a href=\"#addressbook\">address book</a>. \n"
+"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to Tor's .onion addresses."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:15
 msgid ""
 "The address book is a web-of-trust\n"
-"driven secure, distributed, and human readable naming system, sacrificing"
-" only\n"
-"the call for all human readable names to be globally unique by mandating "
-"only\n"
-"local uniqueness.  While all messages in I2P are cryptographically "
-"addressed\n"
-"by their destination, different people can have local address book "
-"entries for\n"
-"\"Alice\" which refer to different destinations.  People can still "
-"discover new\n"
-"names by importing published address books of peers specified in their "
-"web of trust,\n"
-"by adding in the entries provided through a third party, or (if some "
-"people organize\n"
-"a series of published address books using a first come first serve "
-"registration\n"
-"system) people can choose to treat these address books as name servers, "
-"emulating\n"
+"driven secure, distributed, and human readable naming system, sacrificing only\n"
+"the call for all human readable names to be globally unique by mandating only\n"
+"local uniqueness.  While all messages in I2P are cryptographically addressed\n"
+"by their destination, different people can have local address book entries for\n"
+"\"Alice\" which refer to different destinations.  People can still discover new\n"
+"names by importing published address books of peers specified in their web of trust,\n"
+"by adding in the entries provided through a third party, or (if some people organize\n"
+"a series of published address books using a first come first serve registration\n"
+"system) people can choose to treat these address books as name servers, emulating\n"
 "traditional DNS."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:29
 #, python-format
 msgid ""
-"NOTE: For the reasoning behind the I2P naming system, common arguments "
-"against it\n"
-"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming"
-" discussion</a>\n"
+"NOTE: For the reasoning behind the I2P naming system, common arguments against it\n"
+"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming discussion</a>\n"
 "page."
 msgstr ""
 
@@ -639,34 +620,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:55
 msgid ""
-"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for "
-"lookups and points\n"
+"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for lookups and points\n"
 "the user to remote jump services to assist with failed lookups."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:59
 msgid ""
-"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to "
-"add hosts to their local hosts.txt"
+"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to add "
+"hosts to their local hosts.txt"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:62
 msgid ""
-"HTTP <a href=\"#jump-services\">jump services</a> which provide their own"
-" lookups and redirection."
+"HTTP <a href=\"#jump-services\">jump services</a> which provide their own "
+"lookups and redirection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:65
 msgid ""
-"The <a href=\"#addressbook\">address book</a> application which merges "
-"external\n"
+"The <a href=\"#addressbook\">address book</a> application which merges external\n"
 "host lists, retrieved via HTTP, with the local list."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:69
 msgid ""
-"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web "
-"front-end\n"
+"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web front-end\n"
 "for address book configuration and viewing of the local host lists."
 msgstr ""
 
@@ -678,15 +656,11 @@ msgstr ""
 #, python-format
 msgid ""
 "All destinations in I2P are 516-byte (or longer) keys.\n"
-"(To be more precise, it is a 256-byte public key plus a 128-byte signing "
-"key\n"
-"plus a 3-or-more byte certificate, which in Base64 representation is 516 "
-"or more bytes.\n"
-"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> "
-"are in use now\n"
+"(To be more precise, it is a 256-byte public key plus a 128-byte signing key\n"
+"plus a 3-or-more byte certificate, which in Base64 representation is 516 or more bytes.\n"
+"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> are in use now\n"
 "for signature type indication.\n"
-"Therefore, certificates in recently-generated destinations are more than "
-"3 bytes."
+"Therefore, certificates in recently-generated destinations are more than 3 bytes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:87
@@ -705,8 +679,7 @@ msgid ""
 "The hosts.txt Naming Service does a simple linear search through\n"
 "text files. This naming service was the default until\n"
 "release 0.8.8 when it was replaced by the Blockfile Naming Service.\n"
-"The hosts.txt format had become too slow after the file grew to thousands"
-" of entries."
+"The hosts.txt format had become too slow after the file grew to thousands of entries."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:102
@@ -714,8 +687,7 @@ msgstr ""
 msgid ""
 "It does a linear search through three local files, in order, to\n"
 "look up host names and convert them to a 516-byte destination key.\n"
-"Each file is in a simple <a href=\"%(configuration)s\">configuration file"
-" format</a>, with hostname=base64, one per line.\n"
+"Each file is in a simple <a href=\"%(configuration)s\">configuration file format</a>, with hostname=base64, one per line.\n"
 "The files are:"
 msgstr ""
 
@@ -725,8 +697,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:116
 msgid ""
-"The Blockfile Naming Service stores multiple \"address books\" in a "
-"single\n"
+"The Blockfile Naming Service stores multiple \"address books\" in a single\n"
 "database file named hostsdb.blockfile.\n"
 "This Naming Service is the default since release 0.8.8."
 msgstr ""
@@ -734,32 +705,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:122
 #, python-format
 msgid ""
-"A blockfile is simply on-disk storage of multiple sorted maps (key-value "
-"pairs),\n"
+"A blockfile is simply on-disk storage of multiple sorted maps (key-value pairs),\n"
 "implemented as skiplists.\n"
-"The blockfile format is specified on the <a "
-"href=\"%(blockfile)s\">Blockfile page</a>.\n"
-"It provides fast Destination lookup in a compact format. While the "
-"blockfile overhead is substantial,\n"
-"the destinations are stored in binary rather than in Base 64 as in the "
-"hosts.txt format.\n"
-"In addition, the blockfile provides the capability of arbitrary metadata "
-"storage\n"
-"(such as added date, source, and comments) for each entry to implement "
-"advanced address book features.\n"
-"The blockfile storage requirement is a modest increase over the hosts.txt"
-" format, and the blockfile provides\n"
+"The blockfile format is specified on the <a href=\"%(blockfile)s\">Blockfile page</a>.\n"
+"It provides fast Destination lookup in a compact format. While the blockfile overhead is substantial,\n"
+"the destinations are stored in binary rather than in Base 64 as in the hosts.txt format.\n"
+"In addition, the blockfile provides the capability of arbitrary metadata storage\n"
+"(such as added date, source, and comments) for each entry to implement advanced address book features.\n"
+"The blockfile storage requirement is a modest increase over the hosts.txt format, and the blockfile provides\n"
 "approximately 10x reduction in lookup times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:134
 msgid ""
-"On creation, the naming service imports entries from the three files used"
-" by the hosts.txt Naming Service.\n"
-"The blockfile mimics the previous implementation by maintaining three "
-"maps that\n"
-"are searched in-order, named privatehosts.txt, userhosts.txt, and "
-"hosts.txt.\n"
+"On creation, the naming service imports entries from the three files used by the hosts.txt Naming Service.\n"
+"The blockfile mimics the previous implementation by maintaining three maps that\n"
+"are searched in-order, named privatehosts.txt, userhosts.txt, and hosts.txt.\n"
 "It also maintains a reverse-lookup map to implement rapid reverse lookups."
 msgstr ""
 
@@ -789,31 +750,24 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:158
 #, python-format
 msgid ""
-"The naming service is specified with the configuration property "
-"<tt>i2p.naming.impl=class</tt>.\n"
+"The naming service is specified with the configuration property <tt>i2p.naming.impl=class</tt>.\n"
 "Other implementations are possible. For example,\n"
-"there is an experimental facility for real-time lookups (a la DNS) over "
-"the network within the router.\n"
-"For more information see the <a "
-"href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion"
-" page</a>."
+"there is an experimental facility for real-time lookups (a la DNS) over the network within the router.\n"
+"For more information see the <a href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:165
 msgid ""
-"The HTTP proxy does a lookup via the router for all hostnames ending in "
-"'.i2p'.\n"
+"The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'.\n"
 "Otherwise, it forwards the request to a configured HTTP outproxy.\n"
-"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-"
-"Top Level Domain '.i2p'."
+"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:171
 #, python-format
 msgid ""
 "We have <a href=\"%(i2ptld)s\">applied to reserve the .i2p TLD</a>\n"
-"following the procedures specified in <a href=\"%(rfc6761)s\">RFC "
-"6761</a>."
+"following the procedures specified in <a href=\"%(rfc6761)s\">RFC 6761</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:177
@@ -852,14 +806,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:202
 msgid ""
 "For this reason, the only subscription configured by\n"
-"default is <code>http://i2p-projekt.i2p/hosts.txt "
-"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>,"
-" \n"
+"default is <code>http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>, \n"
 "which contains a copy of the hosts.txt included\n"
 "in the I2P release.\n"
 "Users must configure additional subscriptions in their\n"
-"local address book application (via subscriptions.txt or <a "
-"href=\"#susidns\">SusiDNS</a>)."
+"local address book application (via subscriptions.txt or <a href=\"#susidns\">SusiDNS</a>)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:211
@@ -868,8 +819,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:218
 msgid ""
-"The operators of these services may have various policies for listing "
-"hosts.\n"
+"The operators of these services may have various policies for listing hosts.\n"
 "Presence on this list does not imply endorsement."
 msgstr ""
 
@@ -880,12 +830,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:224
 msgid ""
-"While there are hopefully not any technical limitations within I2P on "
-"host names,\n"
+"While there are hopefully not any technical limitations within I2P on host names,\n"
 "the address book enforces several restrictions on host names\n"
 "imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with "
-"browsers,\n"
+"It does this for basic typographical sanity and compatibility with browsers,\n"
 "and for security.\n"
 "The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
 "Any hostnames violating these rules may not be propagated\n"
@@ -898,13 +846,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:243
 msgid ""
-"Names are checked for conflict with existing names in the existing "
-"userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
 "(but not privatehosts.txt) after conversion to lower case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:248
-msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgid ""
+"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:252
@@ -940,8 +888,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:280
 msgid ""
 "Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
-"*.console.i2p, and others)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:285
@@ -964,8 +911,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:302
 msgid ""
-"Any name received via subscription that passes all the checks is added "
-"via the local naming service."
+"Any name received via subscription that passes all the checks is added via "
+"the local naming service."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:306
@@ -982,19 +929,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:317
 msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
-"form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location "
-"bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
 "add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:323
 msgid ""
-"As the address book application does not use privatehosts.txt at all, in "
-"practice\n"
-"this file is the only place where it is appropriate to place private "
-"aliases or\n"
+"As the address book application does not use privatehosts.txt at all, in practice\n"
+"this file is the only place where it is appropriate to place private aliases or\n"
 "\"pet names\" for sites already in hosts.txt."
 msgstr ""
 
@@ -1009,16 +952,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:338
 msgid ""
 "Address Book will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local I2P Site's home directory) to be "
-"accessed by others\n"
+"(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others\n"
 "for their subscriptions.\n"
 "This step is optional and is disabled by default."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:346
 msgid ""
-"The address book application, together with eepget, saves the Etag and/or"
-" Last-Modified\n"
+"The address book application, together with eepget, saves the Etag and/or Last-Modified\n"
 "information returned by the web server of the subscription.\n"
 "This greatly reduces the bandwidth required, as the web server will\n"
 "return a '304 Not Modified' on the next fetch if nothing has changed."
@@ -1035,8 +976,7 @@ msgid ""
 "Hosts serving a static hosts.txt or an equivalent CGI application\n"
 "are strongly encouraged to deliver\n"
 "a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when "
-"appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
 "This will dramatically reduce the network bandwidth, and\n"
 "reduce chances of corruption."
 msgstr ""
@@ -1047,8 +987,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:368
 msgid ""
-"A host add service is a simple CGI application that takes a hostname and "
-"a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
 "and adds that to its local hosts.txt.\n"
 "If other routers subscribe to that hosts.txt, the new hostname/key\n"
 "will be propagated through the network."
@@ -1056,10 +995,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:375
 msgid ""
-"It is recommended that host add services impose, at a minimum, the "
-"restrictions imposed by the address book application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and "
-"keys, for example:"
+"It is recommended that host add services impose, at a minimum, the restrictions imposed by the address book application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and keys, for example:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:380
@@ -1112,10 +1049,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:426
 msgid ""
-"A jump service is a simple CGI application that takes a hostname as a "
-"parameter\n"
-"and returns a 301 redirect to the proper URL with a "
-"<code>?i2paddresshelper=key</code>\n"
+"A jump service is a simple CGI application that takes a hostname as a parameter\n"
+"and returns a 301 redirect to the proper URL with a <code>?i2paddresshelper=key</code>\n"
 "string appended.\n"
 "The HTTP proxy will interpret the appended string and\n"
 "use that key as the actual destination.\n"
@@ -1138,16 +1073,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:448
 msgid ""
-"SusiDNS is simply a web interface front-end to configuring address book "
-"subscriptions\n"
+"SusiDNS is simply a web interface front-end to configuring address book subscriptions\n"
 "and accessing the four address book files.\n"
 "All the real work is done by the 'address book' application."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:454
 msgid ""
-"Currently, there is little enforcement of address book naming rules "
-"within SusiDNS,\n"
+"Currently, there is little enforcement of address book naming rules within SusiDNS,\n"
 "so a user may enter hostnames locally that would be rejected by\n"
 "the address book subscription rules."
 msgstr ""
@@ -1161,36 +1094,29 @@ msgid ""
 "I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
 "Base32 addresses are much shorter and easier to handle than the\n"
 "full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: "
-"<code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>"
+"Example: <code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:468
 #, python-format
 msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
-"hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
 "I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
 "The form is {52 chars}.b32.i2p.\n"
 "Tor has a\n"
-"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94"
-"-december-4th-2013\">proposal</a>\n"
-"to convert to an identical format of {52 chars}.onion for their hidden "
-"services.\n"
+"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-december-4th-2013\">proposal</a>\n"
+"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
 "Base32 is implemented in the naming service, which queries the\n"
 "router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and "
-"publishing\n"
+"Base32 lookups will only be successful when the Destination is up and publishing\n"
 "a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take "
-"significantly\n"
+"Because resolution may require a network database lookup, it may take significantly\n"
 "longer than a local address book lookup."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:483
 msgid ""
-"Base32 addresses can be used in most places where hostnames or full "
-"destinations\n"
+"Base32 addresses can be used in most places where hostnames or full destinations\n"
 "are used, however there are some exceptions where they may fail if the\n"
 "name does not immediately resolve. I2PTunnel will fail, for example, if\n"
 "the name does not resolve to a destination."
@@ -1216,8 +1142,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:12
 msgid ""
-"There are now plugins available that support distributed email, blogs, "
-"IRC\n"
+"There are now plugins available that support distributed email, blogs, IRC\n"
 "clients, distributed file storage, wikis, and more."
 msgstr ""
 
@@ -1237,8 +1162,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:31
 msgid ""
-"Support large or special-purpose applications that would never be bundled"
-"\n"
+"Support large or special-purpose applications that would never be bundled\n"
 "with the I2P installation"
 msgstr ""
 
@@ -1252,8 +1176,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:44
 msgid ""
-"Separate initial install and update packages, if desired, for smaller "
-"update downloads"
+"Separate initial install and update packages, if desired, for smaller update"
+" downloads"
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:48
@@ -1283,7 +1207,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:70
-msgid "Automatic integration and startup of webapps into console Jetty instance"
+msgid ""
+"Automatic integration and startup of webapps into console Jetty instance"
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:74
@@ -1323,32 +1248,21 @@ msgstr "Instalacja"
 
 #: i2p2www/pages/site/docs/plugins.html:101
 msgid ""
-"To install and start a plugin, copy the <code>.xpi2p</code> install link "
-"to\n"
+"To install and start a plugin, copy the <code>.xpi2p</code> install link to\n"
 "the form at the bottom of\n"
-"<a "
-"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp"
-" in\n"
-"your router console</a> and click the \"install plugin\" button.  After a"
-"\n"
-"plugin is installed and started, a link to the plugin will usually appear"
-" at\n"
+"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp in\n"
+"your router console</a> and click the \"install plugin\" button.  After a\n"
+"plugin is installed and started, a link to the plugin will usually appear at\n"
 "the top of your summary bar."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:110
 msgid ""
-"To update a plugin to the latest version, just click the update button on"
-"\n"
-"<a "
-"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>."
-"\n"
-"There is also a button to check if the plugin has a more recent version, "
-"as\n"
-"well as a button to check for updates for all plugins.  Plugins will be "
-"checked\n"
-"for updates automatically when updating to a new I2P release (not "
-"including dev\n"
+"To update a plugin to the latest version, just click the update button on\n"
+"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>.\n"
+"There is also a button to check if the plugin has a more recent version, as\n"
+"well as a button to check for updates for all plugins.  Plugins will be checked\n"
+"for updates automatically when updating to a new I2P release (not including dev\n"
 "builds)."
 msgstr ""
 
@@ -1359,25 +1273,21 @@ msgstr ""
 #: i2p2www/pages/site/docs/plugins.html:121
 #, python-format
 msgid ""
-"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and "
-"the\n"
+"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and the\n"
 "<a href=\"http://%(zzz)s/forums/16\">plugin forum</a> on %(zzz)s."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:126
 #, python-format
 msgid ""
-"See also the sources for plugins developed by various people.  Some "
-"plugins, such\n"
-"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were "
-"developed\n"
+"See also the sources for plugins developed by various people.  Some plugins, such\n"
+"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were developed\n"
 "specifically as examples."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:132
 msgid ""
-"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P"
-"\n"
+"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P\n"
 "or easily add some feature."
 msgstr ""
 
@@ -1389,8 +1299,7 @@ msgstr "Pierwsze kroki"
 #, python-format
 msgid ""
 "To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in "
-"monotone</a>."
+"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in monotone</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:144
@@ -1406,8 +1315,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/plugins.html:151
 msgid ""
 "Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush"
-" the\n"
+"the plugin was already run, as it requires class loader trickery to flush the\n"
 "class cache; a full router restart is required."
 msgstr ""
 
@@ -1417,32 +1325,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:161
 msgid ""
-"Plugins running in a separate JVM create a <code>logs/</code> directory "
-"in\n"
+"Plugins running in a separate JVM create a <code>logs/</code> directory in\n"
 "<code>$CWD</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:166
 msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using "
-"the\n"
+"No initial keys are present, except for those of jrandom and zzz (using the\n"
 "same keys as for router update), so the first key seen for a signer is\n"
 "automatically accepted&mdash;there is no signing key authority."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:172
 msgid ""
-"When deleting a plugin, the directory is not always deleted, especially "
-"on\n"
+"When deleting a plugin, the directory is not always deleted, especially on\n"
 "Windows."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:177
 msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
-"in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file "
-"is used."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:182
@@ -1459,8 +1362,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/ports.html:7
 msgid ""
-"These are the ports used or reserved by I2P, including those for known "
-"plugins,\n"
+"These are the ports used or reserved by I2P, including those for known plugins,\n"
 "common alternates,\n"
 "and some typical related applications."
 msgstr ""
@@ -1485,8 +1387,8 @@ msgid "Reseed Hosts"
 msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:3
-msgid "January 2016"
-msgstr "Styczeń 2016"
+msgid "September 2021"
+msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:8
 msgid "About Reseed hosts"
@@ -1494,49 +1396,57 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:10
 msgid ""
-"Reseed hosts are needed to for bootstrapping, that is, providing the "
-"initial set of I2P nodes for your I2P node to talk to. Depending on the "
-"status of your node it may need to bootstrap every now and then if many "
-"of the nodes it knows of aren't contactable."
+"Reseed hosts are needed to for bootstrapping, that is, providing the initial set\n"
+"of I2P nodes for your I2P node to talk to. Depending on the status of your node\n"
+"it may need to bootstrap every now and then if many of the nodes it knows of\n"
+"aren't contactable."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:14
+#: i2p2www/pages/site/docs/reseed.html:17
 msgid ""
-"Reseeding is done over an encrypted connection and all of the bootstrap "
-"information is signed by the reseed host you connect to, making it "
-"impossible for an unauthenticated source to provide you with false "
-"information."
+"Reseeding is done over an encrypted connection and all of the bootstrap\n"
+"information is signed by the reseed host you connect to, making it impossible\n"
+"for an unauthenticated source to provide you with false information."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:19
+#: i2p2www/pages/site/docs/reseed.html:24
 msgid "Running a Reseed host"
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:21
+#: i2p2www/pages/site/docs/reseed.html:26
 msgid ""
-"The more reseed hosts that are run, the more resilient the I2P network "
-"becomes, and the harder it is to prevent users of I2P from connecting to "
-"the network."
+"Operating a reseed server can be accessible to any sysadmin familiar\n"
+"with I2P, and we encourage new reseed operators to get in contact with us at\n"
+"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed hosts that\n"
+"are run, the more resilient the I2P network becomes, and the harder it is to\n"
+"prevent users of I2P from connecting to the network."
+msgstr ""
+
+#: i2p2www/pages/site/docs/reseed.html:39
+msgid "Other ways of Reseeding"
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:25
+#: i2p2www/pages/site/docs/reseed.html:42
 msgid ""
-"There have also been cases where the reseed hosts we had, have been under"
-" heavy load due to botnet activities."
+"In order to make I2P more reslient, other kinds of reseeding are possible. One\n"
+"important way of carrying out a reseed is the file-based reseed, where a user\n"
+"with a running I2P router generates a reseed file for a friend and transfers it\n"
+"to them as a .zip file. Others use cloud-based infrastructure to resist\n"
+"censorship. These reseed methods provide functionality which aids people in\n"
+"situations where reseeds are restricted."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:33
-msgid "Thank you"
+#: i2p2www/pages/site/docs/reseed.html:58
+msgid "Thank you Reseed Operators"
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:35
+#: i2p2www/pages/site/docs/reseed.html:60
 msgid ""
-"If you are running a reseed server, We would like to thank you for "
-"helping to\n"
+"If you are running a reseed server, We would like to thank you for helping to\n"
 "make the I2P network stronger and more resilient than ever."
 msgstr ""
 
-#: i2p2www/pages/site/docs/reseed.html:41
+#: i2p2www/pages/site/docs/reseed.html:66
 msgid "Thank you."
 msgstr "Dziękujemy."
 
@@ -1546,12 +1456,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:12
 msgid ""
-"At this point, most of the good ideas from BOB have been incorporated "
-"into\n"
-"SAMv3, which has more features and more real-world use. BOB still works, "
-"but it\n"
-"is not gaining the advanced features available to SAMv3 and is "
-"essentially\n"
+"At this point, most of the good ideas from BOB have been incorporated into\n"
+"SAMv3, which has more features and more real-world use. BOB still works, but it\n"
+"is not gaining the advanced features available to SAMv3 and is essentially\n"
 "unsupported at this time."
 msgstr ""
 
@@ -1566,27 +1473,25 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/bob.html:35
 msgid ""
 "<code>ERROR</code> as is implied returns the message <code>\"ERROR "
-"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what"
-" went wrong."
+"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what "
+"went wrong."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:38
 msgid ""
-"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be "
-"returned, it is on the same line. <code>OK</code> means the command is "
-"finished."
+"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be returned, "
+"it is on the same line. <code>OK</code> means the command is finished."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:41
 msgid ""
-"<code>DATA</code> lines contain information that you requested. There may"
-" be multiple <code>DATA</code> lines per request."
+"<code>DATA</code> lines contain information that you requested. There may be"
+" multiple <code>DATA</code> lines per request."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:45
 msgid ""
-"<b>NOTE:</b> The help command is the ONLY command that has an exception "
-"to\n"
+"<b>NOTE:</b> The help command is the ONLY command that has an exception to\n"
 "the rules... it can actually return nothing! This is intentional, since\n"
 "help is a HUMAN and not an APPLICATION command."
 msgstr ""
@@ -1597,8 +1502,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:53
 msgid ""
-"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated,"
-" depending on the system.\n"
+"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated, depending on the system.\n"
 "On connection, BOB outputs two lines:"
 msgstr ""
 
@@ -1608,8 +1512,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:67
 msgid ""
-"Note that previous versions used upper-case hex digits and did not "
-"conform to I2P versioning standards.\n"
+"Note that previous versions used upper-case hex digits and did not conform to I2P versioning standards.\n"
 "It is recommended that subsequent versions use digits 0-9 only."
 msgstr ""
 
@@ -1645,16 +1548,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/bob.html:91
 msgid ""
 "<b>PLEASE NOTE:</b>\n"
-"For CURRENT details on the commands PLEASE use the built-in help command."
-"\n"
-"Just telnet to localhost 2827 and type help and you can get full "
-"documentation on each command."
+"For CURRENT details on the commands PLEASE use the built-in help command.\n"
+"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:97
 msgid ""
-"Commands never get obsoleted or changed, however new commands do get "
-"added from time to time."
+"Commands never get obsoleted or changed, however new commands do get added "
+"from time to time."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:102
@@ -1671,36 +1572,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:130
 msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is "
-"no need for any\n"
-"additional messages to/from the command channel. This allows the router "
-"to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on "
-"attempting to shove\n"
-"many streams in or out one socket -- that can't scale when you have alot "
-"of connections!"
+"Once set up, all TCP sockets can and will block as needed, and there is no need for any\n"
+"additional messages to/from the command channel. This allows the router to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on attempting to shove\n"
+"many streams in or out one socket -- that can't scale when you have alot of connections!"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:137
 msgid ""
-"What is also nice about this particular interface is that writing "
-"anything to interface\n"
-"to it, is much much easier than SAM. There is no other processing to do "
-"after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc "
-"(netcat) can be used\n"
-"to point to some application. The value there is that one could schedule "
-"up and down times\n"
-"for an application, and not have to change the application to do that, or"
-" to even have\n"
-"to stop that application. Instead, you can literally \"unplug\" the "
-"destination, and\n"
-"\"plug it in\" again. As long as the same IP/port addresses and "
-"destination keys are used\n"
-"when bringing the bridge up, the normal TCP application won't care, and "
-"won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that "
-"nothing is coming in."
+"What is also nice about this particular interface is that writing anything to interface\n"
+"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used\n"
+"to point to some application. The value there is that one could schedule up and down times\n"
+"for an application, and not have to change the application to do that, or to even have\n"
+"to stop that application. Instead, you can literally \"unplug\" the destination, and\n"
+"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used\n"
+"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:149
@@ -1709,12 +1597,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:151
 msgid ""
-"For the following example, we'll setup a very simple local loopback "
-"connection,\n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service "
-"from\n"
-"the INET superserver daemon. Destination \"ear\" will be a local port "
-"that you\n"
+"For the following example, we'll setup a very simple local loopback connection,\n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service from\n"
+"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
 "can telnet into, and watch the pretty ASCII test puke forth."
 msgstr ""
 
@@ -1763,30 +1648,28 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:186
 msgid ""
-"At this point, there was no error, a destination with a nickname of "
-"\"mouth\"\n"
-"is set up. When you contact the destination provided, you actually "
-"connect\n"
+"At this point, there was no error, a destination with a nickname of \"mouth\"\n"
+"is set up. When you contact the destination provided, you actually connect\n"
 "to the <code>CHARGEN</code> service on <code>19/TCP</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:192
-msgid "Now for the other half, so that we can actually contact this destination."
+msgid ""
+"Now for the other half, so that we can actually contact this destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:214
 msgid ""
 "Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from address book we want to "
-"contact.\n"
+"send the destination key or host address from address book we want to contact.\n"
 "In this case, we want to contact \"mouth\", all we do is paste in the\n"
 "key and it goes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:221
 msgid ""
-"<b>NOTE:</b> The \"quit\" command in the command channel does NOT "
-"disconnect the tunnels like SAM."
+"<b>NOTE:</b> The \"quit\" command in the command channel does NOT disconnect"
+" the tunnels like SAM."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:238
@@ -1803,14 +1686,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:291
 msgid ""
-"Pretty cool isn't it? Try some other well known I2P SITES if you like, "
-"nonexistent ones,\n"
-"etc, to get a feel for what kind of output to expect in different "
-"situations.\n"
-"For the most part, it is suggested that you ignore any of the error "
-"messages.\n"
-"They would be meaningless to the application, and are only presented for "
-"human debugging."
+"Pretty cool isn't it? Try some other well known I2P SITES if you like, nonexistent ones,\n"
+"etc, to get a feel for what kind of output to expect in different situations.\n"
+"For the most part, it is suggested that you ignore any of the error messages.\n"
+"They would be meaningless to the application, and are only presented for human debugging."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:298
@@ -1827,8 +1706,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:328
 msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too "
-"fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
 "and shows you what typical ERROR messages looks like."
 msgstr ""
 
@@ -1883,16 +1761,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/datagrams.html:7
 #, python-format
 msgid ""
-"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide "
-"authenticated\n"
-"and repliable messages in a standard format.  This lets applications "
-"reliably read\n"
-"the \"from\" address out of a datagram and know that the address really "
-"sent the\n"
-"message.  This is necessary for some applications since the base I2P "
-"message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets).  In "
-"addition, the\n"
+"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide authenticated\n"
+"and repliable messages in a standard format.  This lets applications reliably read\n"
+"the \"from\" address out of a datagram and know that the address really sent the\n"
+"message.  This is necessary for some applications since the base I2P message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets).  In addition, the\n"
 "message and sender are authenticated by signing the payload."
 msgstr ""
 
@@ -1901,8 +1774,7 @@ msgstr ""
 msgid ""
 "Datagrams, like <a href=\"%(streaming)s\">streaming library packets</a>,\n"
 "are an application-level construct.\n"
-"These protocols are independent of the low-level <a "
-"href=\"%(transports)s\">transports</a>;\n"
+"These protocols are independent of the low-level <a href=\"%(transports)s\">transports</a>;\n"
 "the protocols are converted to I2NP messages by the router, and\n"
 "either protocol may be carried by either transport."
 msgstr ""
@@ -1918,8 +1790,7 @@ msgid ""
 "<a href=\"%(url)s\">datagram API</a>,\n"
 "while applications in other languages \n"
 "can use <a href=\"%(sam)s\">SAM</a>'s datagram support.\n"
-"There is also limited support in i2ptunnel in the <a "
-"href=\"%(socks)s\">SOCKS proxy</a>,\n"
+"There is also limited support in i2ptunnel in the <a href=\"%(socks)s\">SOCKS proxy</a>,\n"
 "the 'streamr' tunnel types, and udpTunnel classes."
 msgstr ""
 
@@ -1929,34 +1800,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:38
 msgid ""
-"The application designer should carefully consider the tradeoff of "
-"repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel"
-" fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of "
-"them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not "
-"recommended.\n"
+"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
 "Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
-"chances even more."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:47
 #, python-format
 msgid ""
-"Also note that the various overheads added by lower layers, in particular"
-" asymmetric\n"
-"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on "
-"intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are "
-"currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number"
-"\n"
-"of session tags delivered, and a short session tag lifetime, for example."
-"\n"
-"There are currently no configuration parameters available within I2CP to "
-"tune\n"
+"Also note that the various overheads added by lower layers, in particular asymmetric\n"
+"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number\n"
+"of session tags delivered, and a short session tag lifetime, for example.\n"
+"There are currently no configuration parameters available within I2CP to tune\n"
 "the ElGamal Session Tag parameters."
 msgstr ""
 
@@ -1969,38 +1829,30 @@ msgid ""
 "The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
 "Applications may or may not choose to set the\n"
 "protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on "
-"the same Destination."
+"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:65
 #, python-format
 msgid ""
 "As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or "
-"communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or communications sessions,\n"
 "as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
-"described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
 "the <a href=\"%(i2cp)s#format\">I2CP page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:73
 #, python-format
 msgid ""
-"There is no method within the datagram API to specify whether it is non-"
-"repliable (raw)\n"
-"or repliable. The application should be designed to expect the "
-"appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
+"or repliable. The application should be designed to expect the appropriate type.\n"
 "The I2CP protocol number or port should be used by the application to\n"
 "indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
-"are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
 "<a href=\"%(i2psession)s\">I2PSession API</a>\n"
-"for this purpose. A common design pattern in client/server datagram "
-"applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw "
-"datagram\n"
+"for this purpose. A common design pattern in client/server datagram applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
 "for the reply, returning the nonce from the request."
 msgstr ""
 
@@ -2034,19 +1886,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/datagrams.html:107
 #, python-format
 msgid ""
-"Each datagram is sent through I2P as a single message (or as an "
-"individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
 "<a href=\"%(garlicrouting)s\">Garlic Message</a>).\n"
 "Message encapsulation is implemented in the underlying\n"
 "<a href=\"%(i2cp)s\">I2CP</a>,\n"
 "<a href=\"%(i2np)s\">I2NP</a>, and\n"
 "<a href=\"%(tunnelmessage)s\">tunnel message</a> layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram "
-"protocol."
+"There is no packet delimiter mechanism or length field in the datagram protocol."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:120
-#: i2p2www/pages/site/docs/transport/ssu.html:675
+#: i2p2www/pages/site/docs/transport/ssu.html:680
 msgid "Specification"
 msgstr ""
 
@@ -2061,17 +1911,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:5
 #, python-format
 msgid ""
-"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-"
-"RPC\">JSONRPC2</a> interface via the plugin <a "
-"href=\"%(itoopie)s\">I2PControl</a>.\n"
-"The aim of the interface is to provide simple way to interface with a "
-"running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is "
-"provided by the java libraries <a href=\"http://software.dzhuvinov.com"
-"/json-rpc-2.0.html\">JSON-RPC 2.0</a>.  \n"
-"A list of implementations of JSON-RPC for various languages can be found "
-"at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC "
-"wiki</a>."
+"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-RPC\">JSONRPC2</a> interface via the plugin <a href=\"%(itoopie)s\">I2PControl</a>.\n"
+"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries <a href=\"http://software.dzhuvinov.com/json-rpc-2.0.html\">JSON-RPC 2.0</a>.  \n"
+"A list of implementations of JSON-RPC for various languages can be found at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC wiki</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:12
@@ -2126,8 +1969,8 @@ msgstr "Opis"
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:48
 msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate'"
-" RPC method)"
+"Token used for authenticating every request (excluding the 'Authenticate' "
+"RPC method)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:56
@@ -2136,8 +1979,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:57
 msgid ""
-"Creates and returns an authentication token used for further "
-"communication."
+"Creates and returns an authentication token used for further communication."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:59
@@ -2170,8 +2012,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:117
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:163
 msgid ""
-"Token used for authenticating the client. Is provided by the server via "
-"the 'Authenticate' RPC method."
+"Token used for authenticating the client. Is provided by the server via the "
+"'Authenticate' RPC method."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:73
@@ -2233,7 +2075,8 @@ msgid "Returns true if any changes were made."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:98
-msgid "Returns true if any changes requiring a restart to take effect were made."
+msgid ""
+"Returns true if any changes requiring a restart to take effect were made."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:101
@@ -2306,8 +2149,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:157
 msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote "
-"host."
+"Initiates a router reseed, fetching peers into our NetDB from a remote host."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:158
@@ -2316,8 +2158,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:159
 msgid ""
-"Restarts the router gracefully (waits for participating tunnels to "
-"expire)."
+"Restarts the router gracefully (waits for participating tunnels to expire)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:160
@@ -2363,7 +2204,8 @@ msgid "<b>Blocking</b>. If requested, returns the status of the the update"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:175
-msgid "Fetches or sets various network related settings. Ports, addresses etc."
+msgid ""
+"Fetches or sets various network related settings. Ports, addresses etc."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:177
@@ -2374,8 +2216,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:178
 msgid ""
-"What hostname is used for the TCP transport. If null is submitted, "
-"current setting will be returned."
+"What hostname is used for the TCP transport. If null is submitted, current "
+"setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:179
@@ -2392,8 +2234,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:181
 msgid ""
-"What hostname is used for the UDP transport. If null is submitted, "
-"current setting will be returned."
+"What hostname is used for the UDP transport. If null is submitted, current "
+"setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:182
@@ -2407,19 +2249,20 @@ msgid "What ip has been detected by the UDP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:184
-msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
+msgid ""
+"Is UPnP enabled. If null is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:185
 msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If "
-"null is submitted, current setting will be returned."
+"How many percent of bandwidth is usable for participating tunnels. If null "
+"is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:186
 msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
-"current setting will be returned."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
+" setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:187
@@ -2430,15 +2273,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:188
 msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP "
-"changes ). If null is submitted, current setting will be returned."
+"Is laptop mode enabled (change router identity and UDP port when IP changes "
+"). If null is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:189
 msgid ""
-"Token used for authenticating the client. Is provided by the server via "
-"the 'Authenticate' RPC method. If null is submitted, current setting will"
-" be returned."
+"Token used for authenticating the client. Is provided by the server via the "
+"'Authenticate' RPC method. If null is submitted, current setting will be "
+"returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:192
@@ -2451,8 +2294,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:194
 msgid ""
-"If requested, returns the method used for automatically detecting ip for "
-"the TCP transport."
+"If requested, returns the method used for automatically detecting ip for the"
+" TCP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:195
@@ -2465,8 +2308,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:197
 msgid ""
-"If requested, returns methods used for detecting the ip address of the "
-"UDP transport."
+"If requested, returns methods used for detecting the ip address of the UDP "
+"transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:198
@@ -2597,34 +2440,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:237
 msgid ""
-"The version of the I2PControl API used wasn't specified, but is required "
-"to be specified."
+"The version of the I2PControl API used wasn't specified, but is required to "
+"be specified."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:238
 msgid ""
-"The version of the I2PControl API specified is not supported by "
-"I2PControl."
+"The version of the I2PControl API specified is not supported by I2PControl."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:8
 #, python-format
 msgid ""
 "I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a <a "
-"href=\"%(naming)s\">hostname</a>,\n"
-"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination "
-"key.\n"
-"An established I2PTunnel will be available on your client machine as "
-"localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create "
-"I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key "
-"will be generated\n"
+"Destination of an I2PTunnel can be defined using a <a href=\"%(naming)s\">hostname</a>,\n"
+"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination key.\n"
+"An established I2PTunnel will be available on your client machine as localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
 "for the service and it will become avaliable throughout I2P.\n"
 "A web interface for I2PTunnel management is avaliable on\n"
-"<a "
-"href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>."
+"<a href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:20
@@ -2638,8 +2474,7 @@ msgstr "Tunele serwerów"
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:23
 msgid ""
 "<b>I2P Webserver</b> - A tunnel pointed to a Jetty webserver run\n"
-"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient "
-"and quick hosting on I2P.\n"
+"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient and quick hosting on I2P.\n"
 "<br>The document root is:"
 msgstr ""
 
@@ -2649,10 +2484,8 @@ msgstr "Tunele klienta"
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:33
 msgid ""
-"A HTTP proxy used for browsing I2P and the regular internet anonymously "
-"through I2P. \n"
-"Browsing internet through I2P uses a random proxy specified by the "
-"\"Outproxies:\" option."
+"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n"
+"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:37
@@ -2695,31 +2528,26 @@ msgstr "Standardowy"
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:56
 msgid ""
-"Opens a local TCP port that connects to a service (like HTTP, FTP or "
-"SMTP) on a destination inside of I2P.\n"
-"The tunnel is directed to a random host from the comma seperated (\", \")"
-" list of destinations."
+"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n"
+"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:62
 msgid ""
-"A HTTP-client tunnel. The tunnel connects to the destination specified by"
-" the URL\n"
-"in a HTTP request. Supports proxying onto internet if an outproxy is "
-"provided. Strips HTTP connections of the following headers:"
+"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n"
+"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:67
 msgid ""
 "<b>Accept, Accept-Charset, Accept-Language\n"
-" and Accept-Ranges</b> as they vary greatly between browsers and can be "
-"used as an identifier."
+" and Accept-Ranges</b> as they vary greatly between browsers and can be used as an identifier."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:90
 msgid ""
-"Depending on if the tunnel is using an outproxy or not it will append the"
-" following User-Agent:"
+"Depending on if the tunnel is using an outproxy or not it will append the "
+"following User-Agent:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:94
@@ -2732,10 +2560,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:100
 msgid ""
-"Creates a connection to a random IRC server specified by the comma "
-"seprated (\", \") \n"
-"list of destinations. Only a whitelisted subset of IRC commands are "
-"allowed due to anonymity concerns."
+"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n"
+"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:105
@@ -2748,8 +2574,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:144
 msgid ""
-"Enables using the I2P router as a SOCKS proxy with the command whitelist "
-"specified by\n"
+"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n"
 "<a href=\"#client-mode-irc\">IRC</a> client mode."
 msgstr ""
 
@@ -2761,8 +2586,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:156
 msgid ""
-"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr "
-"client tunnel will \n"
+"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n"
 "subscribe to a streamr server tunnel."
 msgstr ""
 
@@ -2776,32 +2600,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:171
 msgid ""
-"Creates a destination to a local HTTP server ip:port. Supports gzip for "
-"requests with \n"
-"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in"
-" such a request."
+"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n"
+"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:177
 msgid ""
-"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client "
-"with no outproxying\n"
-"capabilities. An example application would be a web application that does"
-" client-type\n"
+"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n"
+"capabilities. An example application would be a web application that does client-type\n"
 "requests, or loopback-testing an I2P Site as a diagnostic tool."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:184
 msgid ""
-"Creates a destination that filters the reqistration sequence of a client "
-"and passes \n"
+"Creates a destination that filters the reqistration sequence of a client and passes \n"
 "the clients destination key as a hostname to the IRC-server."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:190
 msgid ""
-"A UDP-client that connects to a media server is created. The UDP-Client "
-"is coupled with a Streamr server I2PTunnel."
+"A UDP-client that connects to a media server is created. The UDP-Client is "
+"coupled with a Streamr server I2PTunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:2
@@ -2818,14 +2637,11 @@ msgstr "Uwaga"
 msgid ""
 "The ministreaming library has been enhanced and extended by the\n"
 "\"full\" <a href=\"%(streaming)s\">streaming library</a>.\n"
-"Ministreaming is deprecated and is incompatible with today's "
-"applications.\n"
+"Ministreaming is deprecated and is incompatible with today's applications.\n"
 "The following documentation is old.\n"
-"Also note that streaming extends ministreaming in the same Java package "
-"(net.i2p.client.streaming),\n"
+"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n"
 "so the current <a href=\"%(api)s\">API documentation</a> contains both.\n"
-"Obsolete ministreaming classes and methods are clearly marked as "
-"deprecated in the Javadocs."
+"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:19
@@ -2833,17 +2649,12 @@ msgstr ""
 msgid ""
 "\n"
 "The ministreaming library is a layer on top of the core \n"
-"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and "
-"authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and "
-"unauthenticated \n"
+"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and unauthenticated \n"
 "message layer.  Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations "
-"available, but\n"
-"rather than embed that functionality into the base I2P code, it has been "
-"factored\n"
-"off into its own library both to keep the TCP-esque complexities separate"
-" and to\n"
+"functionality has a whole series of tradeoffs and optimizations available, but\n"
+"rather than embed that functionality into the base I2P code, it has been factored\n"
+"off into its own library both to keep the TCP-esque complexities separate and to\n"
 "allow alternative optimized implementations."
 msgstr ""
 
@@ -2851,42 +2662,29 @@ msgstr ""
 #, python-format
 msgid ""
 "The ministreaming library was written by mihi as a part of his \n"
-"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out"
-" and released\n"
-"under the BSD license.  It is called the \"mini\"streaming library "
-"because it makes\n"
-"some simplifications in the implementation, while a more robust streaming"
-" library\n"
-"could be further optimized for operation over I2P.  The two main issues "
-"with \n"
+"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out and released\n"
+"under the BSD license.  It is called the \"mini\"streaming library because it makes\n"
+"some simplifications in the implementation, while a more robust streaming library\n"
+"could be further optimized for operation over I2P.  The two main issues with \n"
 "the ministreaming library are its use of the traditional TCP two phase \n"
-"establishment protocol and the current fixed window size of 1.  The "
-"establishment\n"
-"issue is minor for long lived streams, but for short ones, such as quick "
-"HTTP\n"
-"requests, the impact can be <a href=\"%(minwww)s\">significant</a>.  As "
-"for the window\n"
-"size, the ministreaming library doesn't maintain any ID or ordering "
-"within the \n"
-"messages sent (or include any application level ACK or SACK), so it must "
-"wait \n"
-"on average twice the time it takes to send a message before sending "
-"another."
+"establishment protocol and the current fixed window size of 1.  The establishment\n"
+"issue is minor for long lived streams, but for short ones, such as quick HTTP\n"
+"requests, the impact can be <a href=\"%(minwww)s\">significant</a>.  As for the window\n"
+"size, the ministreaming library doesn't maintain any ID or ordering within the \n"
+"messages sent (or include any application level ACK or SACK), so it must wait \n"
+"on average twice the time it takes to send a message before sending another."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:45
 #, python-format
 msgid ""
-"Even with those issues, the ministreaming library performs quite well in "
-"many\n"
+"Even with those issues, the ministreaming library performs quite well in many\n"
 "situations, and its <a href=\"%(api)s\">API</a>\n"
-"is both quite simple and capable of remaining unchanged as different "
-"streaming\n"
+"is both quite simple and capable of remaining unchanged as different streaming\n"
 "implementations are introduced.  The library is deployed in its own \n"
 "ministreaming.jar.\n"
 "Developers in Java who would like to use it can\n"
-"access the API directly, while developers in other languages can use it "
-"through\n"
+"access the API directly, while developers in other languages can use it through\n"
 "<a href=\"%(samv3)s\">SAM</a>'s streaming support."
 msgstr ""
 
@@ -2925,8 +2723,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/socks.html:5
 msgid ""
 "\n"
-"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are "
-"supported.\n"
+"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n"
 "Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n"
 "Both shared-clients and non-shared are supported.\n"
 "There is no SOCKS outproxy so it is of limited use."
@@ -2947,8 +2744,7 @@ msgid ""
 "information as content, I2P has no way to protect your anonymity.  For\n"
 "example, some mail applications will send the IP address of the machine\n"
 "they are running on to a mail server. There is no way for I2P to filter\n"
-"this, thus using I2P to 'socksify' existing applications is possible, but"
-"\n"
+"this, thus using I2P to 'socksify' existing applications is possible, but\n"
 "extremely dangerous."
 msgstr ""
 
@@ -3027,47 +2823,34 @@ msgstr ""
 #, python-format
 msgid ""
 "The streaming library is a layer on top of the core \n"
-"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and "
-"authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and "
-"unauthenticated \n"
+"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and unauthenticated \n"
 "message layer.  Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations "
-"available, but\n"
-"rather than embed that functionality into the base I2P code, it has been "
-"factored\n"
-"off into its own library both to keep the TCP-esque complexities separate"
-" and to\n"
+"functionality has a whole series of tradeoffs and optimizations available, but\n"
+"rather than embed that functionality into the base I2P code, it has been factored\n"
+"off into its own library both to keep the TCP-esque complexities separate and to\n"
 "allow alternative optimized implementations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:29
 msgid ""
 "In consideration of the relatively high cost of messages, \n"
-"the streaming library's protocol for scheduling and delivering those "
-"messages has been optimized to\n"
-"allow individual messages passed to contain as much information as is "
-"available.\n"
-"For instance, a small HTTP transaction proxied through the streaming "
-"library can\n"
-"be completed in a single round trip - the first messages bundle a SYN, "
-"FIN, and\n"
+"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n"
+"allow individual messages passed to contain as much information as is available.\n"
+"For instance, a small HTTP transaction proxied through the streaming library can\n"
+"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n"
 "the small HTTP request payload, and the reply bundles the SYN,\n"
 "FIN, ACK, and the HTTP response payload.  While an additional\n"
-"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has "
-"been\n"
-"received, the local HTTP proxy can often deliver the full response to the"
-" browser \n"
+"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n"
+"received, the local HTTP proxy can often deliver the full response to the browser \n"
 "immediately."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:42
 msgid ""
 "The streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control "
-"algorithms\n"
-"(both slow start and congestion avoidance), and general packet behavior "
-"(ACK,\n"
+"abstraction of TCP, with its sliding windows, congestion control algorithms\n"
+"(both slow start and congestion avoidance), and general packet behavior (ACK,\n"
 "SYN, FIN, RST, rto calculation, etc)."
 msgstr ""
 
@@ -3087,29 +2870,21 @@ msgstr "API"
 #: i2p2www/pages/site/docs/api/streaming.html:60
 #, python-format
 msgid ""
-"The streaming library API provides a standard socket paradigm to Java "
-"applications.\n"
-"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, "
-"except that\n"
-"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> "
-"through the\n"
+"The streaming library API provides a standard socket paradigm to Java applications.\n"
+"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, except that\n"
+"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> through the\n"
 "streaming library, to be interpreted by I2CP."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:67
 #, python-format
 msgid ""
-"The standard interface to the streaming lib is for the application to use"
-" the\n"
+"The standard interface to the streaming lib is for the application to use the\n"
 "<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a> to create an\n"
-"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks "
-"the\n"
-"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will "
-"cause\n"
-"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The "
-"application\n"
-"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> "
-"or\n"
+"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks the\n"
+"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will cause\n"
+"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The application\n"
+"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> or\n"
 "receive connections with an <a href=\"%(i2psskt)s\">I2PServerSocket</a>."
 msgstr ""
 
@@ -3130,17 +2905,12 @@ msgstr ""
 #, python-format
 msgid ""
 "The options and current default values are listed below.\n"
-"Options are case-sensitive and may be set for the whole router, for a "
-"particular client, or for an individual socket on a\n"
+"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n"
 "per-connection basis.\n"
-"Many values are tuned for HTTP performance over typical I2P conditions. "
-"Other applications such\n"
+"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n"
 "as peer-to-peer services are strongly encouraged to\n"
-"modify as necessary, by setting the options and passing them via the call"
-" to\n"
-"<a "
-"href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost,"
-" _i2cpPort, opts).\n"
+"modify as necessary, by setting the options and passing them via the call to\n"
+"<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost, _i2cpPort, opts).\n"
 "Time values are in ms."
 msgstr ""
 
@@ -3148,17 +2918,14 @@ msgstr ""
 #, python-format
 msgid ""
 "Note that higher-layer APIs, such as <a href=\"%(samv3)s\">SAM</a>,\n"
-"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,"
-"\n"
+"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
 "may override these defaults with their own defaults.\n"
-"Also note that many options only apply to servers listening for incoming "
-"connections."
+"Also note that many options only apply to servers listening for incoming connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:110
 msgid ""
-"As of release 0.9.1, most, but not all, options may be changed on an "
-"active socket manager or session.\n"
+"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n"
 "See the javadocs for details."
 msgstr ""
 
@@ -3182,8 +2949,8 @@ msgstr "Uwagi"
 
 #: i2p2www/pages/site/docs/api/streaming.html:119
 msgid ""
-"Comma- or space-separated list of Base64 peer Hashes used for either "
-"access list or blacklist."
+"Comma- or space-separated list of Base64 peer Hashes used for either access "
+"list or blacklist."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:121
@@ -3233,24 +3000,21 @@ msgstr ""
 msgid ""
 "Comma- or space-separated list of Base64 peer Hashes to be\n"
 "blacklisted for incoming connections to ALL destinations in the context.\n"
-"This option must be set in the context properties, NOT in the "
-"createManager() options argument.\n"
-"Note that setting this in the router context will not affect clients "
-"outside the\n"
+"This option must be set in the context properties, NOT in the createManager() options argument.\n"
+"Note that setting this in the router context will not affect clients outside the\n"
 "router in a separate JVM and context."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:175
 msgid ""
-"How much transmit data (in bytes) will be accepted that hasn't been "
-"written out yet."
+"How much transmit data (in bytes) will be accepted that hasn't been written "
+"out yet."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:179
 msgid ""
 "When we're in congestion avoidance, we grow the window size at the rate\n"
-"of <code>1/(windowSize*factor)</code>.  In standard TCP, window sizes are"
-" in bytes,\n"
+"of <code>1/(windowSize*factor)</code>.  In standard TCP, window sizes are in bytes,\n"
 "while in I2P, window sizes are in messages.\n"
 "A higher number means slower growth."
 msgstr ""
@@ -3259,16 +3023,15 @@ msgstr ""
 msgid ""
 "How long to wait after instantiating a new con \n"
 "before actually attempting to connect.  If this is\n"
-"&lt;= 0, connect immediately with no initial data.  If greater than 0, "
-"wait\n"
+"&lt;= 0, connect immediately with no initial data.  If greater than 0, wait\n"
 "until the output stream is flushed, the buffer fills, \n"
 "or that many milliseconds pass, and include any initial data with the SYN."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:194
 msgid ""
-"How long to block on connect, in milliseconds. Negative means "
-"indefinitely. Default is 5 minutes."
+"How long to block on connect, in milliseconds. Negative means indefinitely. "
+"Default is 5 minutes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:198
@@ -3281,30 +3044,24 @@ msgstr ""
 msgid ""
 "Comma- or space-separated list of Base64 peer Hashes or host names to be\n"
 "contacted using an alternate DSA destination.\n"
-"Only applies if multisession is enabled and the primary session is non-"
-"DSA\n"
+"Only applies if multisession is enabled and the primary session is non-DSA\n"
 "(generally for shared clients only).\n"
-"This option must be set in the context properties, NOT in the "
-"createManager() options argument.\n"
-"Note that setting this in the router context will not affect clients "
-"outside the\n"
+"This option must be set in the context properties, NOT in the createManager() options argument.\n"
+"Note that setting this in the router context will not affect clients outside the\n"
 "router in a separate JVM and context."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:216
 msgid ""
 "Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier "
-"than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this "
-"Destination."
+"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this Destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:226
 msgid ""
 "(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a "
-"duplicate ack."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:232
@@ -3317,8 +3074,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:237
 msgid ""
-"The initial value of the resend delay field in the packet header, times "
-"1000.\n"
+"The initial value of the resend delay field in the packet header, times 1000.\n"
 "Not fully implemented; see below."
 msgstr ""
 
@@ -3341,8 +3097,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:255
 msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
-"are in messages."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
+"in messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:279
@@ -3384,12 +3140,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:333
 msgid ""
 "(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than "
-"1 will cause an error."
+"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:338
-msgid "How long to block on read, in milliseconds. Negative means indefinitely."
+msgid ""
+"How long to block on read, in milliseconds. Negative means indefinitely."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:342
@@ -3432,19 +3188,15 @@ msgstr "Konfiguracja"
 
 #: i2p2www/pages/site/docs/api/streaming.html:387
 msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
-"may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
-" may contain the initial response data as well."
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:392
 msgid ""
-"The initiator may send additional data packets, up to the initial window "
-"size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
 "These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short "
-"period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
 "arrive out of order, in advance of the SYNCHRONIZE packet."
 msgstr ""
 
@@ -3454,33 +3206,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:400
 msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the"
-" lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
-" will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
 "a large amount of overhead.\n"
 "The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K "
-"I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
 "including overhead for the typical case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:417
 msgid ""
-"The first message in a connection includes a 387 byte (typical) "
-"Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
-"the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
-"was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
-"I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation "
-"of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important "
-"factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived "
-"connections."
+"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:428
@@ -3494,14 +3236,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:436
 #, python-format
 msgid ""
-"Each packet is sent through I2P as a single message (or as an individual "
-"clove in a\n"
-"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation "
-"is implemented\n"
-"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a "
-"href=\"%(i2np)s\">I2NP</a>, and\n"
-"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no "
-"packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
+"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation is implemented\n"
+"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a href=\"%(i2np)s\">I2NP</a>, and\n"
+"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no packet delimiter\n"
 "mechanism or payload length field in the streaming protocol."
 msgstr ""
 
@@ -3511,17 +3249,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:447
 msgid ""
-"Data packets may include an optional delay field specifying the requested"
-" delay,\n"
+"Data packets may include an optional delay field specifying the requested delay,\n"
 "in ms, before the receiver should ack the packet.\n"
 "Valid values are 0 to 60000 inclusive.\n"
 "A value of 0 requests an immediate ack.\n"
 "This is advisory only, and receivers should delay slightly so that\n"
 "additional packets may be acknowledged with a single ack.\n"
-"Some implementations may include an advisory value of (measured RTT / 2) "
-"in this field.\n"
-"For nonzero optional delay values, receivers should limit the maximum "
-"delay\n"
+"Some implementations may include an advisory value of (measured RTT / 2) in this field.\n"
+"For nonzero optional delay values, receivers should limit the maximum delay\n"
 "before sending an ack to a few seconds at most.\n"
 "Optional delay values greater than 60000 indicate choking, see below."
 msgstr ""
@@ -3533,46 +3268,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:462
 msgid ""
 "TCP headers include the receive window in bytes.\n"
-"The streaming protocol does not contain a receive window, it uses only a "
-"simple choke/unchoke indication.\n"
-"Each endpoint must maintain its own estimate of the far-end receive "
-"window, in either bytes or packets.\n"
-"The recommended minimum buffer size for receiver implementations is 128 "
-"packets or 217 KB (approximately 128x1730).\n"
-"Because of I2P netowrk latency, packet drops, and the resulting "
-"congestion control,\n"
+"The streaming protocol does not contain a receive window, it uses only a simple choke/unchoke indication.\n"
+"Each endpoint must maintain its own estimate of the far-end receive window, in either bytes or packets.\n"
+"The recommended minimum buffer size for receiver implementations is 128 packets or 217 KB (approximately 128x1730).\n"
+"Because of I2P netowrk latency, packet drops, and the resulting congestion control,\n"
 "a buffer of this size is rarely filled.\n"
-"Overflow is, however, likely to occur on high-bandwidth \"local "
-"loopback\" (same-router) connections."
+"Overflow is, however, likely to occur on high-bandwidth \"local loopback\" (same-router) connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:471
 msgid ""
 "To quickly indicate and smoothly recover from overflow conditions,\n"
 "there is a simple mechanism for pushback in the streaming protocol.\n"
-"If a packet is received with an optional delay field of value of 60001 or"
-" higher,\n"
+"If a packet is received with an optional delay field of value of 60001 or higher,\n"
 "that indicates \"choking\" or a receive window of zero.\n"
-"A packet with an optional delay field of value of 60000 or less indicates"
-" \"unchoking\".\n"
-"Packets without an optional delay field do not affect the choke/unchoke "
-"state."
+"A packet with an optional delay field of value of 60000 or less indicates \"unchoking\".\n"
+"Packets without an optional delay field do not affect the choke/unchoke state."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:479
 msgid ""
-"After being choked, no more packets with data should be sent until the "
-"transmitter is unchoked,\n"
-"except for occasional \"probe\" data packets to compensate for possible "
-"lost unchoke packets.\n"
-"The choked endpoint should start a \"persist timer\" to control the "
-"probing, as in TCP.\n"
+"After being choked, no more packets with data should be sent until the transmitter is unchoked,\n"
+"except for occasional \"probe\" data packets to compensate for possible lost unchoke packets.\n"
+"The choked endpoint should start a \"persist timer\" to control the probing, as in TCP.\n"
 "The unchoking endpoint should send several packets with this field set,\n"
-"or continue sending them periodically until data packets are received "
-"again.\n"
+"or continue sending them periodically until data packets are received again.\n"
 "Maximum time to wait for unchoking is implementation-dependent.\n"
-"Transmitter window size and congestion control strategy after being "
-"unchoked is implementation-dependent."
+"Transmitter window size and congestion control strategy after being unchoked is implementation-dependent."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:490
@@ -3581,8 +3303,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:491
 msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) "
-"and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
 "phases, with exponential backoff.\n"
 "Windowing and acknowledgments use packet count, not byte count."
 msgstr ""
@@ -3593,53 +3314,44 @@ msgstr "Zamknij"
 
 #: i2p2www/pages/site/docs/api/streaming.html:499
 msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the "
-"CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag."
-"\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag.\n"
 "CLOSE packets may contain data as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:507
 msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
-"in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
 "This function is provided in streaming.\n"
 "Pings and pongs may not be combined with a standard streaming packet;\n"
 "if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are "
-"ignored."
+"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are ignored."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:515
 msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
-"flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is "
-"ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
 "The sendStreamId may or may not correspond to an existing connection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:521
 msgid ""
 "A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the "
-"sendStreamId from the ping.\n"
-"Prior to release 0.9.18, the pong packet does not include any payload "
-"that was contained in the ping."
+"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
+"Prior to release 0.9.18, the pong packet does not include any payload that was contained in the ping."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:527
 msgid ""
 "As of release 0.9.18, pings and pongs may contain a payload.\n"
-"The payload in the ping, up to a maximum of 32 bytes, is returned in the "
-"pong."
+"The payload in the ping, up to a maximum of 32 bytes, is returned in the pong."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:532
 msgid ""
-"Streaming may be configured to disable sending pongs with the "
-"configuration i2p.streaming.answerPings=false."
+"Streaming may be configured to disable sending pongs with the configuration "
+"i2p.streaming.answerPings=false."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:537
@@ -3655,8 +3367,7 @@ msgid ""
 "This is used for \"temporal\" sharing at connection open/close time,\n"
 "not \"ensemble\" sharing during a connection (See\n"
 "<a href=\"http://www.ietf.org/rfc/rfc2140.txt\">RFC 2140</a>).\n"
-"There is a separate share per ConnectionManager (i.e. per local "
-"Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
 "so that there is no information leakage to other Destinations on the\n"
 "same router.\n"
 "The share data for a given peer expires after a few minutes.\n"
@@ -3669,8 +3380,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:560
 msgid ""
-"The following parameters are hardcoded, but may be of interest for "
-"analysis:"
+"The following parameters are hardcoded, but may be of interest for analysis:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:579
@@ -3680,25 +3390,16 @@ msgstr "Historia"
 
 #: i2p2www/pages/site/docs/api/streaming.html:580
 msgid ""
-"The streaming library has grown organically for I2P - first mihi "
-"implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
-"window\n"
-"size of 1 message (requiring an ACK before sending the next one), and "
-"then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets)"
-" and the\n"
-"full streaming implementation was deployed with a sliding window protocol"
-" and \n"
-"optimizations to take into account the high bandwidth x delay product.  "
-"Individual\n"
-"streams may adjust the maximum packet size and other options. The default"
-"\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
-"\n"
+"The streaming library has grown organically for I2P - first mihi implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
+"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
+"full streaming implementation was deployed with a sliding window protocol and \n"
+"optimizations to take into account the high bandwidth x delay product.  Individual\n"
+"streams may adjust the maximum packet size and other options. The default\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
 "and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple "
-"messages."
+"retransmitting lost messages, and the latency and overhead of multiple messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:594
@@ -3710,7 +3411,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:975
 #: i2p2www/pages/site/docs/protocol/i2np.html:233
 #: i2p2www/pages/site/docs/transport/ntcp.html:544
-#: i2p2www/pages/site/docs/transport/ssu.html:610
+#: i2p2www/pages/site/docs/transport/ssu.html:615
 #: i2p2www/pages/site/docs/tunnels/implementation.html:506
 msgid "Future Work"
 msgstr ""
@@ -3729,20 +3430,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:604
 #, python-format
 msgid ""
-"Another area for research is the interaction of the streaming lib with "
-"the\n"
+"Another area for research is the interaction of the streaming lib with the\n"
 "NTCP and SSU transport layers.\n"
 "See <a href=\"%(ntcpdisc)s\">the NTCP discussion page</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:609
 msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly"
-" affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a "
-"pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller "
-"window\n"
+"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller window\n"
 "sizes than would otherwise be the case. The router currently routes \n"
 "messages for a single from/to destination pair through a consistent set \n"
 "of tunnels, until tunnel expiration or delivery failure. The router's \n"
@@ -3777,11 +3474,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:636
 msgid ""
-"zzz has added debug code to the streaming library to log packets in a "
-"wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
 "(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters "
-"to TCP fields."
+"The format may require enhancement to map more streaming lib parameters to TCP fields."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:641
@@ -3800,18 +3495,15 @@ msgstr ""
 msgid ""
 "There are several bittorrent clients and trackers on I2P.\n"
 "As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P."
-"\n"
+"changes are required to tracker and client software for operation on I2P.\n"
 "These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients "
-"and trackers."
+"Note carefully the guidelines for compatibility with older I2P clients and trackers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:15
 msgid ""
 "This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or "
-"protocols."
+"Specific clients and trackers may implement other unique features or protocols."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:20
@@ -3824,8 +3516,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:27
 msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for"
-" compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
 "Trackers may ignore the port parameter, and should not require it."
 msgstr ""
 
@@ -3837,8 +3528,7 @@ msgid ""
 "using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for "
-"compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
 "Trackers should not require an appended \".i2p\"."
 msgstr ""
 
@@ -3848,18 +3538,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:46
 msgid ""
-"Current Destinations for clients are 387 or more bytes (516 or more in "
-"Base 64 encoding).\n"
+"Current Destinations for clients are 387 or more bytes (516 or more in Base 64 encoding).\n"
 "A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see "
-"below),\n"
+"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
 "the tracker should probably decode and reject bad Base64 when announced."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:53
 msgid ""
-"The default response type is non-compact. Clients may request a compact "
-"response with\n"
+"The default response type is non-compact. Clients may request a compact response with\n"
 "the parameter compact=1. A tracker may, but is not required to, return\n"
 "a compact response when requested."
 msgstr ""
@@ -3867,10 +3554,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:59
 msgid ""
 "Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel "
-"rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and "
-"it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
 "destination enforcement by the tracker (see below)."
 msgstr ""
 
@@ -3892,8 +3577,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:76
 msgid ""
-"Trackers generally include a fake port key, or use the port from the "
-"announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
 "Clients must ignore the port parameter, and should not require it."
 msgstr ""
 
@@ -3901,10 +3585,8 @@ msgstr ""
 #, python-format
 msgid ""
 "The value of the ip key is the base 64 of the client's\n"
-"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as "
-"described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it "
-"wasn't in the announce ip, for compatibility with older clients.\n"
+"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
 "Clients should not require an appended \".i2p\" in the responses."
 msgstr ""
 
@@ -3919,26 +3601,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:95
 #, python-format
 msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a "
-"single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
 "whose length is a multiple of 32 bytes.\n"
 "This string contains the concatenated\n"
 "<a href=\"%(commonstructures)s#type_Hash\">32-byte SHA-256 Hashes</a>\n"
 "of the binary\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement"
-"\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-"
-"DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
 "or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
 "The peers key may be absent, or the peers value may be zero-length."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:109
 msgid ""
-"While compact response support is optional for both clients and trackers,"
-" it is highly\n"
+"While compact response support is optional for both clients and trackers, it is highly\n"
 "recommended as it reduces the nominal response size by over 90&#37;."
 msgstr ""
 
@@ -3949,34 +3627,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:117
 #, python-format
 msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own "
-"tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying "
-"the\n"
+"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
 "client's\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n"
 "using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
-"are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
 "different formats for the same information.\n"
 "These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce "
-"parameter at all."
+"A tracker enforcing destinations need not require the ip announce parameter at all."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:129
 msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for "
-"announces,\n"
-"destination enforcement will prevent usage by those clients unless or "
-"until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
+"destination enforcement will prevent usage by those clients unless or until\n"
 "those clients are converted to announcing over their own tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:135
 msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,"
-"\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
 "so we expect that all trackers will eventually enforce destinations.\n"
 "Both tracker and client developers should anticipate it."
 msgstr ""
@@ -3990,12 +3661,9 @@ msgstr ""
 msgid ""
 "Announce URL host names in torrent files generally follow the\n"
 "<a href=\"%(naming)s\">I2P naming standards</a>.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 "
-"hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
-"should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these "
-"formats."
+"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these formats."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:152
@@ -4017,27 +3685,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:165
 #, python-format
 msgid ""
-"I2P uses 387+ byte <a "
-"href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
+"I2P uses 387+ byte <a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "for addresses, as explained above."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:170
 msgid ""
-"If the client has only the hash of the destination (such as from a "
-"compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
-"Naming Service,\n"
+"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
 "which will return the full Destination if available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:176
 msgid ""
-"If the client has a peer's full Destination it received in a non-compact "
-"response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
 "directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is "
-"quite inefficient."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:183
@@ -4047,40 +3710,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:184
 msgid ""
 "To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer"
-" connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
 "I2P HTTP outproxies often block announces.\n"
 "There are no known SOCKS outproxies supporting bittorrent traffic."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:191
 msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
-"often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
 "block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
-"and not deliver them in responses."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:200
 #, python-format
 msgid ""
 "I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex "
-"available,\n"
+"As there does not appear to be a formal specification of ut_pex available,\n"
 "it may be necessary to review the libtorrent source for assistance.\n"
 "It is an extension message, identified as \"i2p_pex\" in\n"
-"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension "
-"handshake</a>.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", "
-"\"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length "
-"is a multiple of 32 bytes.\n"
+"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
 "These byte strings are the concatenated SHA-256 Hashes of the binary\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact "
-"response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
 "The added.f value, if present, is the same as in ut_pex."
 msgstr ""
 
@@ -4095,13 +3750,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:226
 msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
-" or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
 "It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension "
-"handshake</a>.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
-"both integers."
+"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:235
@@ -4135,14 +3787,12 @@ msgstr ""
 msgid ""
 "Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
 "instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a"
-" single compact peer info."
+"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:264
 msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
-"2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
 "instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
 "In a response, the \"nodes\" key is a\n"
 "single byte string with concatenated compact node info."
@@ -4151,10 +3801,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:271
 msgid ""
 "Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the "
-"destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of "
-"the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of the\n"
 "destination hash exclusive-ORed with the port."
 msgstr ""
 
@@ -4179,51 +3827,38 @@ msgid ""
 "Preliminary differences from\n"
 "<a href=\"http://www.bittorrent.org/beps/bep_0015.html\">BEP 15</a>\n"
 "are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker "
-"supporting datagram announces."
+"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:299
 msgid ""
 "A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive "
-"repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
-" the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
 "The response port is arbitrary.\n"
 "A client sends and receives on a single port only.\n"
 "It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they "
-"contain tokens sent in the query, and need not be signed."
+"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:309
 msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
-" the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
 "although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
-" 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source "
-"port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, "
-"and error response are the same as in BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:317
 msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a "
-"simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
 "with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to "
-"the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
 "and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an "
-"existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
-"prefix.\n"
-"The URL for a modified 2-packet-mode tracker would require a different "
-"prefix if both modes are supported in I2P."
+"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix.\n"
+"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:330
@@ -4263,19 +3898,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:8
 msgid ""
-"This page is about bundling the entire I2P router binary with your "
-"application.\n"
-"It is not about writing an application to work with I2P (either bundled "
-"or external)."
+"This page is about bundling the entire I2P router binary with your application.\n"
+"It is not about writing an application to work with I2P (either bundled or external)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:13
 msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's "
-"great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
 "If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the "
-"complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
 "This page discusses some general guidelines."
 msgstr ""
 
@@ -4285,10 +3916,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:24
 msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the "
-"most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for "
-"everyone."
+"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for everyone."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:30
@@ -4297,11 +3926,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:31
 msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the "
-"Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
 "If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
-"the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
 "Some of the following only applies to the Java router."
 msgstr ""
 
@@ -4310,7 +3937,8 @@ msgid "Licensing"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid "Ensure you meet the license requirements of the software you are bundling."
+msgid ""
+"Ensure you meet the license requirements of the software you are bundling."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:45
@@ -4319,29 +3947,22 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:46
 msgid ""
-"A correct default configuration is crucial. Most users will not change "
-"the defaults.\n"
-"The defaults for your application may need to be different than the "
-"defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change the defaults.\n"
+"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
 "Override the router defaults if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:51
 msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and "
-"length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of "
-"your app."
+"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of your app."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:55
 msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute "
-"to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it "
-"would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for "
-"example."
+"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:62
@@ -4351,32 +3972,25 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:63
 msgid ""
 "It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, "
-"setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful "
-"shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful shutdown,\n"
 "your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating "
-"tunnels."
+"However, there's lots of reasons why you should allow participating tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:70
 msgid ""
-"First of all, the router doesn't work that well if it doesn't have a "
-"chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
 "which is helped tremendously by others building tunnels through you."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:74
 msgid ""
-"Secondly, over 90&#37; of the routers in the current network allow "
-"participating traffic.\n"
+"Secondly, over 90&#37; of the routers in the current network allow participating traffic.\n"
 "It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, "
-"then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
 "and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for"
-" people to enable relaying."
+"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:81
@@ -4387,10 +4001,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:84
 msgid ""
-"We strongly discourage you from disabling participating traffic by "
-"default.\n"
-"If you do this and your application gets hugely popular, it could break "
-"the network."
+"We strongly discourage you from disabling participating traffic by default.\n"
+"If you do this and your application gets hugely popular, it could break the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:90
@@ -4399,12 +4011,9 @@ msgstr "Zachowaj"
 
 #: i2p2www/pages/site/docs/applications/embedding.html:91
 msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs"
-" of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge"
-" load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best "
-"performance."
+"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:99
@@ -4413,12 +4022,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:100
 msgid ""
-"Give your users a way to change the configuration of the important "
-"settings.\n"
-"We understand that you will probably want to hide most of I2P's "
-"complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, "
-"IP/port may be helpful."
+"Give your users a way to change the configuration of the important settings.\n"
+"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:108
@@ -4427,12 +4033,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:109
 msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, "
-"your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at "
-"least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your "
-"fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
 "It also depends on the typical uptime for your application."
 msgstr ""
 
@@ -4443,8 +4046,7 @@ msgstr "Ponowne seedowanie"
 #: i2p2www/pages/site/docs/applications/embedding.html:120
 msgid ""
 "Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your "
-"source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
 "Be aware of possible blocking by hostile governments."
 msgstr ""
 
@@ -4454,12 +4056,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:130
 msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle "
-"and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement "
-"some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the "
-"tunnel, even in the presence of some background DHT activity."
+"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:138
@@ -4468,16 +4067,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:139
 msgid ""
-"Have an auto-update feature if at all possible, or at least auto-"
-"notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be "
-"updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical "
-"to the health of the network that the users keep up.\n"
-"We usually have over 80&#37; of the network on the latest release within "
-"6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update"
-" function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
+"We usually have over 80&#37; of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
 "which you presumably are not bundling."
 msgstr ""
 
@@ -4488,17 +4082,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:151
 msgid ""
 "Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques "
-"per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much "
-"issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth "
-"distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is "
-"significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
 "we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this "
-"checklist is."
+"The bigger your growth plans, the more important everthing else in this checklist is."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:163
@@ -4508,10 +4097,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:164
 msgid ""
 "Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even "
-"more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong "
-"solution."
+"It may be several minutes after startup before it works well, and even more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong solution."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:172
@@ -4520,8 +4107,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:173
 msgid ""
-"Provide some indication to the user that the application tunnels are "
-"ready. Encourage patience."
+"Provide some indication to the user that the application tunnels are ready. "
+"Encourage patience."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:178
@@ -4531,8 +4118,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:179
 msgid ""
 "If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to "
-"confirm."
+"Don't let your users break tunnels easily, or at least ask them to confirm."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:185
@@ -4541,8 +4127,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:186
 msgid ""
-"It would be nice if you give your users links to learn more about I2P and"
-" to donate."
+"It would be nice if you give your users links to learn more about I2P and to"
+" donate."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:192
@@ -4552,8 +4138,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:193
 msgid ""
 "Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an "
-"external router."
+"it may be helpful to provide an option or a separate package to use an external router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:200
@@ -4562,8 +4147,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:201
 msgid ""
-"If you plan to use or link to other common I2P services (news feeds, "
-"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
 "make sure you aren't overloading them,\n"
 "and talk to the people who are running them to make sure it's ok."
 msgstr ""
@@ -4575,10 +4159,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:210
 msgid ""
 "I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. "
-"You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system "
-"clock is correct."
+"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system clock is correct."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:218
@@ -4587,41 +4169,30 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:219
 msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
-"mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
 "You may omit the two streaming jars for a datagram-only app.\n"
 "Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
-"to make the crypto much faster.\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
 "Java 7 or higher is required to build.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P "
-"package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, "
-"and i2psnark, for example."
+"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:228
 msgid ""
-"The following files should be included in the I2P installation directory,"
-" specified with the \"i2p.dir.base\" property.\n"
-"Don't forget the certificates/ directory, which is required for "
-"reseeding, and blocklist.txt for IP validation.\n"
-"The geoip directory is optional, but recommended so the router can make "
-"decisions based on location.\n"
-"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that"
-" directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz)."
-"\n"
-"The hosts.txt file may be necessary, you may modify it to include any "
-"hosts your application uses.\n"
-"You may add a router.config file to the base directory to override "
-"initial defaults.\n"
+"The following files should be included in the I2P installation directory, specified with the \"i2p.dir.base\" property.\n"
+"Don't forget the certificates/ directory, which is required for reseeding, and blocklist.txt for IP validation.\n"
+"The geoip directory is optional, but recommended so the router can make decisions based on location.\n"
+"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz).\n"
+"The hosts.txt file may be necessary, you may modify it to include any hosts your application uses.\n"
+"You may add a router.config file to the base directory to override initial defaults.\n"
 "Review and edit or remove the clients.config and i2ptunnel.config files."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:237
 msgid ""
-"License requirements may require you to include the LICENSES.txt file and"
-" the licenses directory."
+"License requirements may require you to include the LICENSES.txt file and "
+"the licenses directory."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:243
@@ -4639,17 +4210,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:255
 msgid ""
 "Our Android router app may be shared by multiple clients.\n"
-"If it is not installed, the user will be prompted when he starts a client"
-" app."
+"If it is not installed, the user will be prompted when he starts a client app."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:259
 msgid ""
-"Some developers have expressed concern that this is a poor user "
-"experience,\n"
+"Some developers have expressed concern that this is a poor user experience,\n"
 "and they wish to embed the router in their app.\n"
-"We do have an Android router service library on our roadmap, which could "
-"make embedding easier.\n"
+"We do have an Android router service library on our roadmap, which could make embedding easier.\n"
 "More information needed."
 msgstr ""
 
@@ -4664,11 +4232,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:272
 msgid ""
-"We have a limited number of our jars on <a "
-"href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven"
-" Central</a>.\n"
-"There are numerous trac tickets for us to address that will improve and "
-"expand the released jars on Maven Central."
+"We have a limited number of our jars on <a href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven Central</a>.\n"
+"There are numerous trac tickets for us to address that will improve and expand the released jars on Maven Central."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:282
@@ -4678,17 +4243,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:283
 msgid ""
 "If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and "
-"increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and increase reliability.\n"
 "This may take some time and experimentation to get working well.\n"
 "Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the "
-"same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
 "Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs "
-"(iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you "
-"have several."
+"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:296
@@ -4698,8 +4259,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:297
 msgid ""
 "Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return "
-"the favor."
+"Give us your Twitter handle and start tweeting about it, we will return the favor."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:303
@@ -4718,8 +4278,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:311
 msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an I2P "
-"Site about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project.\n"
 "Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
 "We can help get you users, testers, translators, or even coders."
 msgstr ""
@@ -4730,12 +4289,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:320
 msgid ""
-"You may wish to install and play with the I2P Android app, and look at "
-"its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
 "See what we expose to the user and what we hide.\n"
 "Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
-" and Monero."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:328
@@ -4750,10 +4307,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:359
 msgid ""
-"This code is for the case where your application starts the router, as in"
-" our Android app.\n"
-"You could also have the router start the application via the "
-"clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in our Android app.\n"
+"You could also have the router start the application via the clients.config and i2ptunnel.config files,\n"
 "together with Jetty webapps,\n"
 "as is done in our Java packages.\n"
 "As always, state management is the difficult part."
@@ -4771,13 +4326,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:7
 msgid ""
-"Cloning large software repositories over I2P can be difficult, and using "
-"git can sometimes make this harder. Fortunately, it can also sometimes "
-"make it easier. Git has a <code>git bundle</code> command which can be "
-"used to turn a git repository into a file which git can then clone, "
-"fetch, or import from a location on your local disk. By combining this "
-"capability with bittorrent downloads, we can solve our remaining problems"
-" with <code>git clone</code>."
+"Cloning large software repositories over I2P can be difficult, and using git"
+" can sometimes make this harder. Fortunately, it can also sometimes make it "
+"easier. Git has a <code>git bundle</code> command which can be used to turn "
+"a git repository into a file which git can then clone, fetch, or import from"
+" a location on your local disk. By combining this capability with bittorrent"
+" downloads, we can solve our remaining problems with <code>git clone</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:8
@@ -4786,13 +4340,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:9
 msgid ""
-"If you intend to generate a git bundle, you <strong>must</strong> already"
-" possess a full copy of the <strong>git</strong> repository, not the mtn "
-"repository. You can get it from github or from git.idk.i2p, but a shallow"
-" clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will"
-" fail silently, creating what looks like a bundle, but when you try to "
-"clone it it will fail. If you are just retrieving a pre-generated git "
-"bundle, then this section does not apply to you."
+"If you intend to generate a git bundle, you <strong>must</strong> already "
+"possess a full copy of the <strong>git</strong> repository, not the mtn "
+"repository. You can get it from github or from git.idk.i2p, but a shallow "
+"clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will "
+"fail silently, creating what looks like a bundle, but when you try to clone "
+"it it will fail. If you are just retrieving a pre-generated git bundle, then"
+" this section does not apply to you."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:10
@@ -4802,23 +4356,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git-bundle.html:11
 msgid ""
 "Someone will need to supply you with a torrent file or a magnet link "
-"corresponding to an existing <code>git bundle</code> that they have "
-"already generated for you. A recent, correctly-generated bundle of the "
-"mainline i2p.i2p source code as-of Wednesday, March 18, 2020, can be "
-"found inside of I2P at my pastebin <a "
+"corresponding to an existing <code>git bundle</code> that they have already "
+"generated for you. A recent, correctly-generated bundle of the mainline "
+"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside of "
+"I2P at my pastebin <a "
 "href=\"http://paste.idk.i2p/f/4h137i\">paste.idk.i2p/f/4hq37i</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:12
 msgid ""
 "Once you have a bundle, you will need to use git to create a working "
-"repository from it. If you’re using GNU/Linux and i2psnark, the git "
-"bundle should be located in $HOME/.i2p/i2psnark or, as a service on "
-"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on "
-"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/” instead. The "
-"examples here assume I2PSnark on GNU/Linux, if you use something else, "
-"replace the path to the bundle with the download directory preferred by "
-"your client and platform."
+"repository from it. If you’re using GNU/Linux and i2psnark, the git bundle "
+"should be located in $HOME/.i2p/i2psnark or, as a service on Debian, "
+"/var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on GNU/Linux, it "
+"is probably at “$HOME/BiglyBT Downloads/” instead. The examples here assume "
+"I2PSnark on GNU/Linux, if you use something else, replace the path to the "
+"bundle with the download directory preferred by your client and platform."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:13
@@ -4831,8 +4384,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:16
 msgid ""
-"If you get the following error, try using git init and git fetch manually"
-" instead."
+"If you get the following error, try using git init and git fetch manually "
+"instead."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:18
@@ -4867,10 +4420,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:29
 msgid ""
-"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you "
-"have a successfully <code>--unshallow</code>ed clone of clone of the "
-"i2p.i2p repository. If you already have a clone, make sure you run "
-"<code>git fetch --unshallow</code> before you generate a torrent bundle."
+"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you have "
+"a successfully <code>--unshallow</code>ed clone of clone of the i2p.i2p "
+"repository. If you already have a clone, make sure you run <code>git fetch "
+"--unshallow</code> before you generate a torrent bundle."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:30
@@ -4879,8 +4432,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:32
 msgid ""
-"and copy the resulting bundle into your I2PSnark downloads directory. For"
-" instance:"
+"and copy the resulting bundle into your I2PSnark downloads directory. For "
+"instance:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:34
@@ -4891,14 +4444,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:7
 msgid ""
-"Tutorial for setting up git access through an I2P Tunnel. This tunnel "
-"will act as your access point to a single git service on I2P."
+"Tutorial for setting up git access through an I2P Tunnel. This tunnel will "
+"act as your access point to a single git service on I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:8
 msgid ""
-"If you intend to use the service at i2pgit.org/git.idk.i2p, then you "
-"probably already have a tunnel configured and much of this\n"
+"If you intend to use the service at i2pgit.org/git.idk.i2p, then you probably already have a tunnel configured and much of this\n"
 "tutorial will not apply to you."
 msgstr ""
 
@@ -4909,22 +4461,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git.html:11
 msgid ""
 "To create your repositories on a remote git service, sign up for a user "
-"account at that service. Of course it’s also possible to create "
-"repositories locally and push them to a remote git service, but most will"
-" require an account and for you to create a space for the repository on "
-"the server. Gitlab has a very simple sign-up form:"
+"account at that service. Of course it’s also possible to create repositories"
+" locally and push them to a remote git service, but most will require an "
+"account and for you to create a space for the repository on the server. "
+"Gitlab has a very simple sign-up form:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:12
 msgid ""
-"These are generic instructions for any in-i2p Git instance with HTTP and "
-"SSH gateways.\n"
-"If you intend to contribute to I2P, you should create an account at the "
-"I2P gitlab, which is open to the\n"
-"community. Account registration may take a few days to complete, as the "
-"admin needs to sort through a large\n"
-"number of spam registrations. You can help this by getting in touch with "
-"the admin to confirm you are human\n"
+"These are generic instructions for any in-i2p Git instance with HTTP and SSH gateways.\n"
+"If you intend to contribute to I2P, you should create an account at the I2P gitlab, which is open to the\n"
+"community. Account registration may take a few days to complete, as the admin needs to sort through a large\n"
+"number of spam registrations. You can help this by getting in touch with the admin to confirm you are human\n"
 "using the instructions on the home page."
 msgstr ""
 
@@ -4938,10 +4486,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:27
 msgid ""
-"To make sure the setup process works, it helps to make a repository to "
-"test with from the server, and for the sake of this tutorial, we’re going"
-" to use a fork of the I2P router. First, browse to the i2p-"
-"hackers/i2p.i2p repository:"
+"To make sure the setup process works, it helps to make a repository to test "
+"with from the server, and for the sake of this tutorial, we’re going to use "
+"a fork of the I2P router. First, browse to the i2p-hackers/i2p.i2p "
+"repository:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:34
@@ -4950,20 +4498,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:42
 msgid ""
-"To have read-write access to my server, you’ll need to set up a tunnel "
-"for your SSH client. As an example, we’re going to use the HTTP tunnel "
-"instead, but if all you need is read-only, HTTP/S cloning, then you can "
-"skip all this and just use the http_proxy environment variable to "
-"configure git to use the pre-configured I2P HTTP Proxy. For example:"
+"To have read-write access to my server, you’ll need to set up a tunnel for "
+"your SSH client. As an example, we’re going to use the HTTP tunnel instead, "
+"but if all you need is read-only, HTTP/S cloning, then you can skip all this"
+" and just use the http_proxy environment variable to configure git to use "
+"the pre-configured I2P HTTP Proxy. For example:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:50
 msgid ""
-"Then, add the address you will be pushing and pulling from. Note that "
-"this example address is for Read-Only HTTP-over-I2P clones, if your admin"
-" does not allow the git HTTP(Smart HTTP) protocol, then you will need to "
-"get the SSH clone base32 from them. If you have an SSH clone base32, "
-"substitute it for the base32 in this step, which will fail."
+"Then, add the address you will be pushing and pulling from. Note that this "
+"example address is for Read-Only HTTP-over-I2P clones, if your admin does "
+"not allow the git HTTP(Smart HTTP) protocol, then you will need to get the "
+"SSH clone base32 from them. If you have an SSH clone base32, substitute it "
+"for the base32 in this step, which will fail."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:54
@@ -4991,8 +4539,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git.html:68
 msgid ""
 "Git Privacy: Committing to git adds a timestamp to git commit messages, "
-"which may be configured to reflect your local time zone. To enforce the "
-"use of UTC for all commits, you are advised to use a git alias, such as:"
+"which may be configured to reflect your local time zone. To enforce the use "
+"of UTC for all commits, you are advised to use a git alias, such as:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:70
@@ -5010,33 +4558,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git.html:78
 msgid ""
 "You might get an error where the remote end hangs up unexpectedly. "
-"Unfortunately git still doesn’t support resumable cloning. Until it does,"
-" there are a couple fairly easy ways to handle this. The first and "
-"easiest is to try and clone to a shallow depth:"
+"Unfortunately git still doesn’t support resumable cloning. Until it does, "
+"there are a couple fairly easy ways to handle this. The first and easiest is"
+" to try and clone to a shallow depth:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:81
 msgid ""
-"Once you’ve performed a shallow clone, you can fetch the rest resumably "
-"by changing to the repo directory and running:"
+"Once you’ve performed a shallow clone, you can fetch the rest resumably by "
+"changing to the repo directory and running:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:83
 msgid ""
-"At this point, you still don’t have all your branches yet. You can get "
-"them by running the following commands:"
+"At this point, you still don’t have all your branches yet. You can get them "
+"by running the following commands:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:86
 msgid ""
-"Which tells git to alter the repository configuration so that fetching "
-"from origin fetches all branches."
+"Which tells git to alter the repository configuration so that fetching from "
+"origin fetches all branches."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:87
 msgid ""
-"If that doesn’t work, you can try opening the tunnel configuration menu "
-"and adding some backup tunnels."
+"If that doesn’t work, you can try opening the tunnel configuration menu and "
+"adding some backup tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:91
@@ -5054,26 +4602,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:96
 msgid ""
-"Revision control can make your life easier, but it works best if you use "
-"it well! In light of this, we strongly suggest a fork-first, feature-"
-"branch workflow as many are familiar with from Github. In such a "
-"workflow, the master branch is used as a sort of “Trunk” for updates and "
-"is never touched by the programmmer, instead, all changes to the master "
-"are merged from branches. In order to do set up your workspace for this, "
-"take the following steps:"
+"Revision control can make your life easier, but it works best if you use it "
+"well! In light of this, we strongly suggest a fork-first, feature-branch "
+"workflow as many are familiar with from Github. In such a workflow, the "
+"master branch is used as a sort of “Trunk” for updates and is never touched "
+"by the programmmer, instead, all changes to the master are merged from "
+"branches. In order to do set up your workspace for this, take the following "
+"steps:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:98
 msgid ""
-"<strong>Never make changes to the Master Branch</strong>. You will be "
-"using the master branch to periodially obtain updates to the official "
-"source code. All changes should be made in feature branches."
+"<strong>Never make changes to the Master Branch</strong>. You will be using "
+"the master branch to periodially obtain updates to the official source code."
+" All changes should be made in feature branches."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:101
 msgid ""
-"Set up a second remote in your local repository using the upstream source"
-" code."
+"Set up a second remote in your local repository using the upstream source "
+"code."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:103
@@ -5082,33 +4630,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:105
 msgid ""
-"Before making any changes to the source code, check out a new feature "
-"branch to develop on:"
+"Before making any changes to the source code, check out a new feature branch"
+" to develop on:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:107
 msgid ""
-"When you’re done with your changes, commit them and push them to your "
-"branch"
+"When you’re done with your changes, commit them and push them to your branch"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:110
 msgid ""
-"Submit a merge request. When the merge request is approved and brought "
-"into the upstream master, check out the master locally and pull in the "
-"changes:"
+"Submit a merge request. When the merge request is approved and brought into "
+"the upstream master, check out the master locally and pull in the changes:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:113
 msgid ""
-"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, "
-"you can update your master code using this procedure as well."
+"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, you "
+"can update your master code using this procedure as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:117
 msgid ""
-"The git utccommit alias solution to git timestamp issue was arrived at "
-"from the information first published here"
+"The git utccommit alias solution to git timestamp issue was arrived at from "
+"the information first published here"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:6
@@ -5117,22 +4663,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:7
 msgid ""
-"Mirror I2P Git repositories and Bridge Non-private internet.repositories "
-"for others."
+"Mirror I2P Git repositories and Bridge Non-private internet.repositories for"
+" others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:10
 msgid ""
-"This is the setup process I use for configuring Gitlab and I2P, with "
-"Docker in place to manage the service itself. Gitlab is very easy to host"
-" on I2P in this fashion, it can be administered by one person without "
-"much difficulty. In my configuration, I use a Debian VM to host docker "
-"containers and an I2P router, on a Debian Host system, however, this may "
-"be more than necessary for some people. These instructions should work on"
-" any Debian-based system, regardless of whether it is in a VM or not, and"
-" should easily translate to any system where Docker and an I2P router are"
-" available. This guide starts at Docker and does not assume any VM "
-"underneath."
+"This is the setup process I use for configuring Gitlab and I2P, with Docker "
+"in place to manage the service itself. Gitlab is very easy to host on I2P in"
+" this fashion, it can be administered by one person without much difficulty."
+" In my configuration, I use a Debian VM to host docker containers and an I2P"
+" router, on a Debian Host system, however, this may be more than necessary "
+"for some people. These instructions should work on any Debian-based system, "
+"regardless of whether it is in a VM or not, and should easily translate to "
+"any system where Docker and an I2P router are available. This guide starts "
+"at Docker and does not assume any VM underneath."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:11
@@ -5141,15 +4686,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:12
 msgid ""
-"Because Gitlab runs in a container, we only need to install the "
-"dependencies required for the container on our main system. Conveniently,"
-" you can install everything you need with:"
+"Because Gitlab runs in a container, we only need to install the dependencies"
+" required for the container on our main system. Conveniently, you can "
+"install everything you need with:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:14
 msgid ""
-"on an otherwise unmodified Debian system, or if you have added Docker’s "
-"own “Community” Debian repository, you may use:"
+"on an otherwise unmodified Debian system, or if you have added Docker’s own "
+"“Community” Debian repository, you may use:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:16
@@ -5162,62 +4707,61 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:18
 msgid ""
-"Once you have docker installed, you can fetch the docker containers "
-"required for gitlab. <em>Don’t run them yet.</em>"
+"Once you have docker installed, you can fetch the docker containers required"
+" for gitlab. <em>Don’t run them yet.</em>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:20
 msgid ""
-"For those who are concerned, the gitlab-ce Docker image is built using "
-"only Ubuntu Docker images as a parent, which are built from scratch "
-"images. Since there are no third-party images involved here, updates "
-"should come as soon as they are available in the host images. To review "
-"the Dockerfile for yourself, visit the <a href=\"https://gitlab.com"
-"/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile\">Gitlab "
-"source code</a>."
+"For those who are concerned, the gitlab-ce Docker image is built using only "
+"Ubuntu Docker images as a parent, which are built from scratch images. Since"
+" there are no third-party images involved here, updates should come as soon "
+"as they are available in the host images. To review the Dockerfile for "
+"yourself, visit the <a href=\"https://gitlab.com/gitlab-org/omnibus-"
+"gitlab/-/blob/master/docker/Dockerfile\">Gitlab source code</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:21
 msgid ""
-"Set up an I2P HTTP Proxy for Gitlab to use(Important information, "
-"optional steps)"
+"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional "
+"steps)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:22
 msgid ""
 "Gitlab servers inside of I2P can be run with or without the ability to "
-"interact with servers on the internet outside of I2P. In the case where "
-"the Gitlab server is <em>not allowed</em> to interact with servers "
-"outside of I2P, they cannot be de-anonymized by cloning a git repository "
-"from a git server on the internet outside of I2P. They can, however, "
-"export and mirror repositories from other git services inside of I2P."
+"interact with servers on the internet outside of I2P. In the case where the "
+"Gitlab server is <em>not allowed</em> to interact with servers outside of "
+"I2P, they cannot be de-anonymized by cloning a git repository from a git "
+"server on the internet outside of I2P. They can, however, export and mirror "
+"repositories from other git services inside of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:23
 msgid ""
 "In the case where the Gitlab server is <em>allowed</em> to interact with "
-"servers outside of I2P, it can act as a “Bridge” for the users, who can "
-"use it to mirror content outside I2P to an I2P-accessible source, however"
-" it <em>is not anonymous</em> in this case. Git services on the non-"
-"anonymous internet will be connected to directly."
+"servers outside of I2P, it can act as a “Bridge” for the users, who can use "
+"it to mirror content outside I2P to an I2P-accessible source, however it "
+"<em>is not anonymous</em> in this case. Git services on the non-anonymous "
+"internet will be connected to directly."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:24
 msgid ""
-"<strong>If you want to have a bridged, non-anonymous Gitlab instance with"
-" access to</strong> <strong>web repositories,</strong> no further "
+"<strong>If you want to have a bridged, non-anonymous Gitlab instance with "
+"access to</strong> <strong>web repositories,</strong> no further "
 "modification is necessary."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:25
 msgid ""
-"<strong>If you want to have an I2P-Only Gitlab instance with no access to"
-" Web-Only</strong> <strong>Repositories</strong>, you will need to "
-"configure Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP "
-"proxy only listens on <code>127.0.0.1</code>, you will need to set up a "
-"new one for Docker that listens on the Host/Gateway address of the Docker"
-" network, which is usually <code>172.17.0.1</code>. I configure mine on "
-"port <code>4446</code>."
+"<strong>If you want to have an I2P-Only Gitlab instance with no access to "
+"Web-Only</strong> <strong>Repositories</strong>, you will need to configure "
+"Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP proxy only "
+"listens on <code>127.0.0.1</code>, you will need to set up a new one for "
+"Docker that listens on the Host/Gateway address of the Docker network, which"
+" is usually <code>172.17.0.1</code>. I configure mine on port "
+"<code>4446</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:26
@@ -5233,8 +4777,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/gitlab.html:37
 msgid ""
 "Visit your Local Gitlab instance and set up your admin account. Choose a "
-"strong password, and configure user account limits to match your "
-"resources."
+"strong password, and configure user account limits to match your resources."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:38
@@ -5245,21 +4788,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:39
 msgid ""
-"It’s also possible to apply your HTTP Proxy settings in a more granular "
-"way, so that you can only allow users to mirror repositories from the "
-"domains that you choose. Since the domain is presumably operated by an "
-"organization, you can use this to ensure that repositories that are "
-"mirrorable follow a reasonable set of policies. After all, there is far "
-"more abusive content on the non-anonymous internet than there is on I2P, "
-"we wouldn’t want to make it too easy to introduce abusive content from "
-"such a nefarious place."
+"It’s also possible to apply your HTTP Proxy settings in a more granular way,"
+" so that you can only allow users to mirror repositories from the domains "
+"that you choose. Since the domain is presumably operated by an organization,"
+" you can use this to ensure that repositories that are mirrorable follow a "
+"reasonable set of policies. After all, there is far more abusive content on "
+"the non-anonymous internet than there is on I2P, we wouldn’t want to make it"
+" too easy to introduce abusive content from such a nefarious place."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:40
 msgid ""
-"Add the following lines to your gitlab.rb file inside the "
-"/src/gitlab/config container. These settings will take effect when you "
-"restart in a moment."
+"Add the following lines to your gitlab.rb file inside the /src/gitlab/config"
+" container. These settings will take effect when you restart in a moment."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:56
@@ -5268,10 +4809,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:57
 msgid ""
-"Once you have Gitlab set up locally, go to the I2P Router console. You "
-"will need to set up two server tunnels, one leading to the Gitlab "
-"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH interface"
-" on TCP Port 8022."
+"Once you have Gitlab set up locally, go to the I2P Router console. You will "
+"need to set up two server tunnels, one leading to the Gitlab web(HTTP) "
+"interface on TCP port 8080, and one to the Gitlab SSH interface on TCP Port "
+"8022."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:58
@@ -5282,8 +4823,7 @@ msgstr ""
 msgid ""
 "For the Web interface, use an “HTTP” server tunnel. From <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" launch the “New Tunnel Wizard” and enter the following values at each "
-"step:"
+" launch the “New Tunnel Wizard” and enter the following values at each step:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:61
@@ -5301,8 +4841,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:64
 msgid ""
-"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the"
-" port."
+"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the "
+"port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:65
@@ -5321,19 +4861,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:69
 msgid ""
-"Web services on I2P can register hostnames for themselves by providing an"
-" authentication string to a jump service provider like <a "
+"Web services on I2P can register hostnames for themselves by providing an "
+"authentication string to a jump service provider like <a "
 "href=\"http://stats.i2p\">stats.i2p</a>. To do this, open the <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" again and click on the “Gitlab Web Service” item you just set up. Scroll"
-" to the bottom of the “Edit Server Settings” section and click "
-"Registration Authentication. Copy the field that says “Authentication for"
-" adding Hostname” and visit <a "
+" again and click on the “Gitlab Web Service” item you just set up. Scroll to"
+" the bottom of the “Edit Server Settings” section and click Registration "
+"Authentication. Copy the field that says “Authentication for adding "
+"Hostname” and visit <a "
 "href=\"http://stats.i2p/i2p/addkey.html\">stats.i2p</a> to add your "
-"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then"
-" you will have to use the correct authentication string for your "
-"subdomain, which is a little bit more complicated and merits it’s own "
-"instructions."
+"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then "
+"you will have to use the correct authentication string for your subdomain, "
+"which is a little bit more complicated and merits it’s own instructions."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:70
@@ -5344,8 +4883,7 @@ msgstr ""
 msgid ""
 "For the SSH interface, use a “Standard” server tunnel. From <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" launch the “New Tunnel Wizard” and enter the following values at each "
-"step:"
+" launch the “New Tunnel Wizard” and enter the following values at each step:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:74
@@ -5358,8 +4896,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:76
 msgid ""
-"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the"
-" port."
+"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the "
+"port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:80
@@ -5368,9 +4906,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:81
 msgid ""
-"Finally, if you either modified <code>gitlab.rb</code> or you registered "
-"a hostname, you will need to re-start the gitlab service for the settings"
-" to take effect."
+"Finally, if you either modified <code>gitlab.rb</code> or you registered a "
+"hostname, you will need to re-start the gitlab service for the settings to "
+"take effect."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:2
@@ -5388,20 +4926,16 @@ msgstr "Klienty"
 #: i2p2www/pages/site/docs/applications/irc.html:15
 msgid ""
 " There are many IRC clients that can be used with I2P. In\n"
-"fact, all IRC clients can be connected to the Irc2P Service by connecting"
-"\n"
+"fact, all IRC clients can be connected to the Irc2P Service by connecting\n"
 "them to the IRC Tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:28
 msgid ""
 "To configure any IRC client to chat on Irc2P, first, make sure that\n"
-"your IRC tunnel is available. Visit the <a "
-"href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n"
-"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" "
-"indicator on\n"
-"the right-hand side is yellow or green, your Irc2P tunnel is ready and "
-"you should \n"
+"your IRC tunnel is available. Visit the <a href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n"
+"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" indicator on\n"
+"the right-hand side is yellow or green, your Irc2P tunnel is ready and you should \n"
 "proceed to the next step."
 msgstr ""
 
@@ -5418,12 +4952,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:42
 msgid ""
 "Pidgin is a very popular Instant Messaging client with built-in IRC\n"
-"support. It is also possible to use it with many other kinds of chat "
-"service, and\n"
-"it supports using multiple accounts at once and has a variety of plugin-"
-"ins. There\n"
-"is a similar application for OSX called \"Adium.\" The instructions for "
-"Pidgin are\n"
+"support. It is also possible to use it with many other kinds of chat service, and\n"
+"it supports using multiple accounts at once and has a variety of plugin-ins. There\n"
+"is a similar application for OSX called \"Adium.\" The instructions for Pidgin are\n"
 "similar in Adium.\n"
 msgstr ""
 
@@ -5439,8 +4970,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:52
 msgid ""
 "After launching Pidgin, you should see a \"Buddy List\" window. From\n"
-"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage"
-" Accounts\" to\n"
+"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage Accounts\" to\n"
 "begin configuring your I2P account."
 msgstr ""
 
@@ -5455,10 +4985,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:59
 msgid ""
 "Click the \"Add\" button. In the window that opens, select \"IRC\" under\n"
-"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and"
-" password. IRC\n"
-"does not require you to register a nickname to join, but you may if you "
-"wish, after\n"
+"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and password. IRC\n"
+"does not require you to register a nickname to join, but you may if you wish, after\n"
 "you connect to Irc2P."
 msgstr ""
 
@@ -5473,8 +5001,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:67
 msgid ""
 "Navigate to the \"Advanced\" tab and set the \"Port\" field to 6668 and\n"
-"make sure that SSL is <em>disabled</em>, since your tunnel has encryption"
-" provided\n"
+"make sure that SSL is <em>disabled</em>, since your tunnel has encryption provided\n"
 "by I2P."
 msgstr ""
 
@@ -5518,8 +5045,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:87
 msgid ""
 "Change the value in \"Servers\" from the default to `localhost/6669`,\n"
-"and configure the default channels you want to join. I suggest #i2p and "
-"#i2p-dev\n"
+"and configure the default channels you want to join. I suggest #i2p and #i2p-dev\n"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:92
@@ -5619,8 +5145,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:143
 msgid ""
 "Revolution IRC is an easy to use IRC client for Android. It's able to\n"
-"handle multiple accounts on multiple services, so you can use it for "
-"Irc2P and for\n"
+"handle multiple accounts on multiple services, so you can use it for Irc2P and for\n"
 "your non-I2P IRC networks as well."
 msgstr ""
 
@@ -5681,15 +5206,13 @@ msgstr "Serwery"
 #: i2p2www/pages/site/docs/applications/irc.html:196
 msgid ""
 "Eris is an easy-to-configure IRC server with self-configuring support\n"
-"for I2P. If you want to run a private IRC server it's one of the easiest "
-"ways."
+"for I2P. If you want to run a private IRC server it's one of the easiest ways."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:199
 msgid ""
 " This is a valid configuration of the Eris IRC server, but it uses a\n"
-"default password for the admin account(admin). You should change the "
-"operator.admin.password\n"
+"default password for the admin account(admin). You should change the operator.admin.password\n"
 "and account.admin.password before deploying to a real service."
 msgstr ""
 
@@ -5714,24 +5237,18 @@ msgstr ""
 msgid ""
 "As of release 0.9.4, the router supports managed clients.\n"
 "Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives "
-"updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state "
-"tracking\n"
-"and to start and stop a client. It also is much easier to avoid static "
-"references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state tracking\n"
+"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
 "which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router "
-"console,\n"
+"Managed clients may be started and stopped by the user in the router console,\n"
 "and are stopped at router shutdown."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:31
 msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or "
-"net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following "
-"constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following constructor:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:38
@@ -5750,12 +5267,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:49
 msgid ""
-"If the main class specified in the clients.config file does not implement"
-" a managed interface,\n"
+"If the main class specified in the clients.config file does not implement a managed interface,\n"
 "it will be started with main() with the arguments specified,\n"
 "and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via "
-"the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via the static main() method.\n"
 "The console cannot provide accurate state information to the user."
 msgstr ""
 
@@ -5765,8 +5280,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:58
 msgid ""
-"Clients, whether managed or unmanaged, may register with the "
-"ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
 "so that other clients may retrieve a reference to them.\n"
 "Registration is by name.\n"
 "Known registered clients are:"
@@ -5778,12 +5292,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:69
 msgid ""
-"The router also provides a simple mechanism for clients to find an "
-"internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an internal socket service,\n"
 "such as the HTTP proxy. This is provided by the Port Mapper.\n"
 "Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on "
-"that port."
+"Clients that register generally provide an internal emulated socket on that port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:2
@@ -5793,8 +5305,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:4
 #, python-format
 msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming "
-"system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
 "common arguments and possible alternatives.\n"
 "See <a href=\"%(naming)s\">the naming page</a> for current documentation."
 msgstr ""
@@ -5805,72 +5316,49 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:12
 msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning "
-"with\n"
-"advocates across the spectrum of possibilities.  However, given I2P's "
-"inherent\n"
-"demand for secure communication and decentralized operation, the "
-"traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting "
-"systems."
+"Naming within I2P has been an oft-debated topic since the very beginning with\n"
+"advocates across the spectrum of possibilities.  However, given I2P's inherent\n"
+"demand for secure communication and decentralized operation, the traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:19
 msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage "
-"done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no"
-"\n"
-"value.  DNSsec itself still falls back on registrars and certificate "
-"authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or "
-"the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a "
-"destination\n"
-"itself is just a pair of public keys and a certificate.  DNS-style "
-"systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount "
-"simple denial\n"
-"of service and spoofing attacks.  Adding on a certificate authenticating "
-"the\n"
-"responses as signed by some centralized certificate authority would "
-"address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well"
-" as \n"
+"I2P does not promote the use of DNS-like services though, as the damage done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no\n"
+"value.  DNSsec itself still falls back on registrars and certificate authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
+"itself is just a pair of public keys and a certificate.  DNS-style systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount simple denial\n"
+"of service and spoofing attacks.  Adding on a certificate authenticating the\n"
+"responses as signed by some centralized certificate authority would address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well as \n"
 "hostile certificate authority attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:33
 msgid ""
-"Voting style naming is dangerous as well, especially given the "
-"effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an "
-"arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name.  "
-"Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows "
-"the load\n"
-"required to contact everyone to conduct online voting is implausible, or "
-"if the\n"
+"Voting style naming is dangerous as well, especially given the effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name.  Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows the load\n"
+"required to contact everyone to conduct online voting is implausible, or if the\n"
 "full network is not queried, different sets of answers may be reachable."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:42
 msgid ""
-"As with the Internet however, I2P is keeping the design and operation of "
-"a \n"
-"naming system out of the (IP-like) communication layer.  The bundled "
-"naming library\n"
-"includes a simple service provider interface which <a "
-"href=\"#alternatives\">alternate naming systems</a> can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they"
-" prefer."
+"As with the Internet however, I2P is keeping the design and operation of a \n"
+"naming system out of the (IP-like) communication layer.  The bundled naming library\n"
+"includes a simple service provider interface which <a href=\"#alternatives\">alternate naming systems</a> can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:50
 msgid ""
-"See also <a href=\"https://zooko.com/distnames.html\">Names: "
-"Decentralized, Secure, Human-Meaningful: Choose Two</a>."
+"See also <a href=\"https://zooko.com/distnames.html\">Names: Decentralized, "
+"Secure, Human-Meaningful: Choose Two</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:55
@@ -5881,36 +5369,26 @@ msgstr ""
 msgid ""
 "Q:\n"
 "What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are"
-" not? \n"
+"do not agree on one address and if some addresses are working, others are not? \n"
 "Who is the right source of a name?"
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:64
 msgid ""
 "A:\n"
-"You don't. This is actually a critical difference between names on I2P "
-"and how \n"
-"DNS works - names in I2P are human readable, secure, but <b>not globally"
-" \n"
-"unique</b>.  This is by design, and an inherent part of our need for "
-"security."
+"You don't. This is actually a critical difference between names on I2P and how \n"
+"DNS works - names in I2P are human readable, secure, but <b>not globally \n"
+"unique</b>.  This is by design, and an inherent part of our need for security."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:70
 msgid ""
-"If I could somehow convince you to change the destination associated with"
-" some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances"
-" is that \n"
-"acceptable.  Instead, what we do is make names <b>locally unique</b>: "
-"they are \n"
-"what <i>you</i> use to call a site, just as how you can call things "
-"whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM "
-"client's \n"
-"buddy list.  Who you call \"Boss\" may be who someone else calls "
-"\"Sally\"."
+"If I could somehow convince you to change the destination associated with some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
+"acceptable.  Instead, what we do is make names <b>locally unique</b>: they are \n"
+"what <i>you</i> use to call a site, just as how you can call things whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM client's \n"
+"buddy list.  Who you call \"Boss\" may be who someone else calls \"Sally\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:78
@@ -5926,44 +5404,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:89
 msgid ""
 "<b>Inefficiency:</b>\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
-"the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
 "It's about 400K right now for almost 800 hosts."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:94
 msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is "
-"itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic "
-"routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it "
-"averages out to about 10 bytes/sec."
+"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:99
 msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here "
-"between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous"
-" because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
 "last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump"
-" services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
 "in a more automated fashion), possibly at a further cost in anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:106
 #, python-format
 msgid ""
-"Possible improvements would be a replacement or supplement to address "
-"book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n"
-"or something simple like subscribing to http://example.i2p/cgi-"
-"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
-"hours, for example,\n"
-"that could be both more efficient and more anonymous than the current "
-"hosts.txt with last-modified and etag."
+"Possible improvements would be a replacement or supplement to address book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n"
+"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
+"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:112
@@ -5973,17 +5440,14 @@ msgid ""
 "<a href=\"%(url)s\">%(url)s</a>.\n"
 "This script returns an Etag with a timestamp.\n"
 "When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not "
-"Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber"
-"\n"
+"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber\n"
 "does not know about, in an address book-compatible manner."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:121
 msgid ""
-"So the inefficiency is not a big issue and there are several ways to "
-"improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to improve things without\n"
 "radical change."
 msgstr ""
 
@@ -5997,38 +5461,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:132
 msgid ""
 "As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for"
-"\n"
-"a key, you need to have the whole set of keys stored locally, at a cost "
-"of about 500 bytes per key."
+"But unless you're going to do a slow real-time query over the network for\n"
+"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:139
 msgid ""
 "<b>Requires configuration and \"trust\":</b>\n"
-"Out-of-the-box address book is only subscribed to "
-"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box address book is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
 "leading to poor new-user experience."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:144
 msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a "
-"hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
 "provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of "
-"trust in an anonymous network."
+"The configuration step attempts to force users to think about issues of trust in an anonymous network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:149
 msgid ""
-"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy"
-"\n"
-"lists some jump services, but doesn't \"recommend\" any one in "
-"particular,\n"
+"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy\n"
+"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
 "and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but "
-"not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but not enough to\n"
 "automatically go fetch the key from them."
 msgstr ""
 
@@ -6045,14 +5501,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:166
 msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down "
-"web browsing."
+"Unfortunately real-time lookups over i2p would significantly slow down web "
+"browsing."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:169
 msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, "
-"while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
 "keys are permanent."
 msgstr ""
 
@@ -6071,26 +5526,21 @@ msgid ""
 "Yes it depends on a few servers that you have configured.\n"
 "Within i2p, servers and services come and go.\n"
 "Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is "
-"authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" "
-"solution, or by\n"
-"something even simpler, like a script that adds everybody in your "
-"hosts.txt to your address book."
+"have the same problem. A completely decentralized system (everybody is authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
+"something even simpler, like a script that adds everybody in your hosts.txt to your address book."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:190
 msgid ""
-"People advocating all-authoritative solutions generally haven't thought "
-"through\n"
+"People advocating all-authoritative solutions generally haven't thought through\n"
 "the issues of conflicts and hijacking, however."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:196
 msgid ""
 "<b>Awkward, not real-time:</b>\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
-" service providers,\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
 "I2P Site status reporters.\n"
 "Jump servers and subscriptions are a pain, it should just work like DNS."
 msgstr ""
@@ -6101,8 +5551,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:207
 msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, "
-"or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
 "and proposals to \"just use DNS\" aren't well thought-through."
 msgstr ""
 
@@ -6112,8 +5561,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:213
 msgid ""
-"The I2P source contains several pluggable naming systems and supports "
-"configuration options\n"
+"The I2P source contains several pluggable naming systems and supports configuration options\n"
 "to enable experimentation with naming systems."
 msgstr ""
 
@@ -6135,8 +5583,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:234
 msgid ""
-"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/"
-" directory."
+"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/ "
+"directory."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:237
@@ -6161,8 +5609,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:253
 msgid ""
-"The current naming system can be changed with the advanced config option "
-"'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
 "(restart required).\n"
 "See core/java/src/net/i2p/client/naming for details."
 msgstr ""
@@ -6170,8 +5617,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:258
 msgid ""
 "Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the address book subscription functions, "
-"since address book\n"
+"implement local storage and/or the address book subscription functions, since address book\n"
 "only knows about the hosts.txt files and format."
 msgstr ""
 
@@ -6181,50 +5627,40 @@ msgstr "Certyfikaty"
 
 #: i2p2www/pages/site/docs/discussions/naming.html:265
 msgid ""
-"I2P destinations contain a certificate, however at the moment that "
-"certificate\n"
+"I2P destinations contain a certificate, however at the moment that certificate\n"
 "is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending "
-"in \"AAAA\",\n"
-"and this is checked in the address book merge mechanism, and possibly "
-"other places.\n"
-"Also, there is no method available to generate a certificate or add it to"
-" a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
+"and this is checked in the address book merge mechanism, and possibly other places.\n"
+"Also, there is no method available to generate a certificate or add it to a\n"
 "destination. So these will have to be updated to implement certificates."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:273
 #, python-format
 msgid ""
-"One possible use of certificates is for <a "
-"href=\"%(todo)s#hashcash\">proof of work</a>."
+"One possible use of certificates is for <a href=\"%(todo)s#hashcash\">proof "
+"of work</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:276
 msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such "
-"thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's "
-"keys."
+"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:280
 msgid ""
-"With any certificate implementation must come the method for verifying "
-"the\n"
+"With any certificate implementation must come the method for verifying the\n"
 "certificates.\n"
 "Presumably this would happen in the address book merge code.\n"
-"Is there a method for multiple types of certificates, or multiple "
-"certificates?"
+"Is there a method for multiple types of certificates, or multiple certificates?"
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:286
 msgid ""
 "Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would "
-"address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well"
-" as \n"
+"responses as signed by some centralized certificate authority would address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well as \n"
 "hostile certificate authority attacks."
 msgstr ""
 
@@ -6243,91 +5679,58 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:11
 msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple "
-"combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data "
-"confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred"
-" \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
-"describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
 "the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:19
 #: i2p2www/pages/site/docs/how/tech-intro.html:508
 msgid ""
-"The first time a router wants to encrypt a garlic message to another "
-"router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal "
-"and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal "
-"block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains "
-"the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a "
-"number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender "
-"wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal "
-"encrypt \n"
-"a new session key they simply pick one of the previously delivered "
-"session \n"
-"tags and AES encrypt the payload like before, using the session key used "
-"with \n"
-"that session tag, prepended with the session tag itself. When a router "
-"receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it "
-"matches \n"
-"an available session tag - if it does, they simply AES decrypt the "
-"message, \n"
+"The first time a router wants to encrypt a garlic message to another router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
+"a new session key they simply pick one of the previously delivered session \n"
+"tags and AES encrypt the payload like before, using the session key used with \n"
+"that session tag, prepended with the session tag itself. When a router receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
+"an available session tag - if it does, they simply AES decrypt the message, \n"
 "but if it does not, they ElGamal decrypt the first block."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:35
 #: i2p2www/pages/site/docs/how/tech-intro.html:524
 msgid ""
-"Each session tag can be used only once so as to prevent internal "
-"adversaries \n"
-"from unnecessarily correlating different messages as being between the "
-"same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
-"chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough "
-"tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful "
-"tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery "
-"status \n"
-"message\") - when the garlic message arrives at the intended recipient "
-"and \n"
-"is decrypted successfully, this small delivery status message is one of "
-"the \n"
-"cloves exposed and has instructions for the recipient to send the clove "
-"back \n"
-"to the original sender (through an inbound tunnel, of course). When the "
-"original \n"
-"sender receives this delivery status message, they know that the session "
-"tags \n"
+"Each session tag can be used only once so as to prevent internal adversaries \n"
+"from unnecessarily correlating different messages as being between the same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery status \n"
+"message\") - when the garlic message arrives at the intended recipient and \n"
+"is decrypted successfully, this small delivery status message is one of the \n"
+"cloves exposed and has instructions for the recipient to send the clove back \n"
+"to the original sender (through an inbound tunnel, of course). When the original \n"
+"sender receives this delivery status message, they know that the session tags \n"
 "bundled in the garlic message were successfully delivered."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:50
 msgid ""
 "Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is "
-"limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or "
-"old \n"
-"messages may be dropped. The sender keeps track whether messages using "
-"session \n"
-"tags are getting through, and if there isn't sufficient communication it "
-"may \n"
-"drop the ones previously assumed to be properly delivered, reverting back"
-" \n"
+"discarded if not used. In addition, the quantity stored for each key is limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or old \n"
+"messages may be dropped. The sender keeps track whether messages using session \n"
+"tags are getting through, and if there isn't sufficient communication it may \n"
+"drop the ones previously assumed to be properly delivered, reverting back \n"
 "to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or "
-"expire."
+"A session will continue to exist until all its tags are exhausted or expire."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:61
@@ -6342,8 +5745,7 @@ msgid ""
 "between a Router and a Destination.\n"
 "Each Router and Destination maintains its own Session Key Manager to\n"
 "keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple "
-"Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple Destinations\n"
 "to each other or a Router by adversaries."
 msgstr ""
 
@@ -6364,14 +5766,14 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgid ""
+"It is for a new session and contains both ElGamal and AES encrypted blocks"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:88
 msgid ""
 "When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt "
-"the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
 "If that fails, it will assume it is for a new session and attempt to\n"
 "decrypt it using ElGamal."
 msgstr ""
@@ -6382,8 +5784,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:98
 msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
-"block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
 "and an encrypted AES block."
 msgstr ""
 
@@ -6409,8 +5810,7 @@ msgid ""
 "The 32-byte\n"
 "<a href=\"%(commonstructures)s#type_SessionKey\">Session Key</a>\n"
 "is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
-" follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
 "the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
 msgstr ""
 
@@ -6439,18 +5839,16 @@ msgstr ""
 #, python-format
 msgid ""
 "The data is then <a href=\"%(cryptography)s\">AES Encrypted</a>,\n"
-"using the session key and IV (calculated from the pre-IV) from the "
-"ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16"
-" bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
 "</p>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:266
 #, python-format
 msgid ""
-"Actual max payload length, and max block length, is less than 64 KB; see "
-"the <a href=\"%(i2np)s\">I2NP Overview</a>."
+"Actual max payload length, and max block length, is less than 64 KB; see the"
+" <a href=\"%(i2np)s\">I2NP Overview</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:269
@@ -6479,18 +5877,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:318
 msgid ""
 "The session tag also serves as\n"
-"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the "
-"sessionTag."
+"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:323
 msgid ""
-"To decode a message from an existing session, a router looks up the "
-"Session Tag to find an\n"
-"associated Session Key. If the Session Tag is found, the AES block is "
-"decrypted using the associated Session Key.\n"
-"If the tag is not found, the message is assumed to be a <a "
-"href=\"#new\">New Session Message</a>."
+"To decode a message from an existing session, a router looks up the Session Tag to find an\n"
+"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n"
+"If the tag is not found, the message is assumed to be a <a href=\"#new\">New Session Message</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:331
@@ -6500,38 +5894,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:332
 #, python-format
 msgid ""
-"As of release 0.9.2, the client may configure the default number of "
-"Session Tags to send\n"
+"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
 "and the low tag threshold for the current session.\n"
-"For brief streaming connections or datagrams, these options may be used "
-"to significantly reduce bandwidth.\n"
-"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for "
-"details.\n"
+"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n"
+"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n"
 "The session settings may also be overridden on a per-message basis.\n"
-"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message"
-" Expires specification</a> for details."
+"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:353
 msgid ""
-"There are many possible areas to tune the Session Key Manager's "
-"algorithms;\n"
-"some may interact with the streaming library behavior, or have "
-"significant\n"
+"There are many possible areas to tune the Session Key Manager's algorithms;\n"
+"some may interact with the streaming library behavior, or have significant\n"
 "impact on overall performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:360
 msgid ""
-"The number of tags delivered could depend on message size, keeping in "
-"mind\n"
+"The number of tags delivered could depend on message size, keeping in mind\n"
 "the eventual padding to 1KB at the tunnel message layer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:365
 msgid ""
-"Clients could send an estimate of session lifetime to the router, as an "
-"advisory\n"
+"Clients could send an estimate of session lifetime to the router, as an advisory\n"
 "on the number of tags required."
 msgstr ""
 
@@ -6543,15 +5929,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:374
 msgid ""
-"The router may assume delivery of Session Tags, or await acknowledgement "
-"before using them;\n"
+"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n"
 "there are tradeoffs for each strategy."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:379
 msgid ""
-"For very brief messages, almost the full 222 bytes of the pre-IV and "
-"padding fields in the ElGamal block\n"
+"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n"
 "could be used for the entire message, instead of establishing a session."
 msgstr ""
 
@@ -6563,10 +5947,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:389
 msgid ""
-"Perhaps things could be more efficient if the Session Tag system was "
-"bidirectional,\n"
-"so tags delivered in the 'forward' path could be used in the 'reverse' "
-"path,\n"
+"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n"
+"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n"
 "thus avoiding ElGamal in the initial response.\n"
 "The router currently plays some tricks like this when sending\n"
 "tunnel test messages to itself."
@@ -6584,12 +5966,9 @@ msgstr ""
 msgid ""
 "Several of these ideas may require a new I2NP message type, or\n"
 "set a flag in the\n"
-"<a "
-"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery"
-" Instructions</a>,\n"
+"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery Instructions</a>,\n"
 "or set a magic number in the first few bytes of the Session Key field\n"
-"and accept a small risk of the random Session Key matching the magic "
-"number."
+"and accept a small risk of the random Session Key matching the magic number."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:2
@@ -6606,8 +5985,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:7
 msgid ""
-"The terms \"garlic routing\" and \"garlic encryption\" are often used "
-"rather loosely when referring to I2P's technology.\n"
+"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n"
 "Here, we explain the history of the terms, the various meanings, and\n"
 "the usage of \"garlic\" methods in I2P."
 msgstr ""
@@ -6617,20 +5995,16 @@ msgid ""
 "\"Garlic routing\" was first coined by\n"
 "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>\n"
 "in Roger Dingledine's Free Haven \n"
-"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> "
-"Section 8.1.1 (June 2000), as derived from \n"
+"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> Section 8.1.1 (June 2000), as derived from \n"
 "<a href=\"http://www.onion-router.net/\">Onion Routing</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:21
 msgid ""
-"\"Garlic\" may have been used originally by I2P developers because I2P "
-"implements a form of\n"
-"bundling as Freedman describes, or simply to emphasize general "
-"differences from Tor.\n"
+"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n"
+"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n"
 "The specific reasoning may be lost to history.\n"
-"Generally, when referring to I2P, the term \"garlic\" may mean one of "
-"three things:"
+"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:28
@@ -6649,54 +6023,39 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:33
 msgid ""
-"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven "
-"years has not always been precise; therefore the reader is\n"
+"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n"
 "cautioned when encountering the term.\n"
 "Hopefully, the explanation below will make things clear."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:40
 msgid ""
-"Onion routing is a technique for building paths, or tunnels, through a "
-"series of peers,\n"
+"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n"
 "and then using that tunnel.\n"
-"Messages are repeatedly encrypted by the originator, and then decrypted "
-"by each hop.\n"
-"During the building phase, only the routing instructions for the next hop"
-" are exposed to each peer.\n"
-"During the operating phase, messages are passed through the tunnel, and "
-"the\n"
-"message and its routing instructions are only exposed to the endpoint of "
-"the tunnel."
+"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n"
+"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n"
+"During the operating phase, messages are passed through the tunnel, and the\n"
+"message and its routing instructions are only exposed to the endpoint of the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:49
 #, python-format
 msgid ""
 "This is similar to the way Mixmaster\n"
-"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages "
-"- taking a message, encrypting it\n"
-"to the recipient's public key, taking that encrypted message and "
-"encrypting\n"
-"it (along with instructions specifying the next hop), and then taking "
-"that\n"
-"resulting encrypted message and so on, until it has one layer of "
-"encryption\n"
+"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages - taking a message, encrypting it\n"
+"to the recipient's public key, taking that encrypted message and encrypting\n"
+"it (along with instructions specifying the next hop), and then taking that\n"
+"resulting encrypted message and so on, until it has one layer of encryption\n"
 "per hop along the path."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:58
 msgid ""
-"In this sense, \"garlic routing\" as a general concept is identical to "
-"\"onion routing\".\n"
-"As implemented in I2P, of course, there are several differences from the "
-"implementation in Tor; see below.\n"
-"Even so, there are substantial similarities such that I2P benefits from a"
-"\n"
-"<a href=\"http://www.onion-router.net/Publications.html\">large amount of"
-" academic research on onion routing</a>,\n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar "
-"mixnets</a>."
+"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n"
+"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n"
+"Even so, there are substantial similarities such that I2P benefits from a\n"
+"<a href=\"http://www.onion-router.net/Publications.html\">large amount of academic research on onion routing</a>,\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar mixnets</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:67
@@ -6705,15 +6064,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:68
 msgid ""
-"Michael Freedman defined \"garlic routing\" as an extension to onion "
-"routing,\n"
+"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n"
 "in which multiple messages are bundled together.\n"
 "He called each message a \"bulb\".\n"
-"All the messages, each with its own delivery instructions, are exposed at"
-" the\n"
+"All the messages, each with its own delivery instructions, are exposed at the\n"
 "endpoint.\n"
-"This allows the efficient bundling of an onion routing \"reply block\" "
-"with the original message."
+"This allows the efficient bundling of an onion routing \"reply block\" with the original message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:77
@@ -6722,10 +6078,8 @@ msgid ""
 "Our term for garlic \"bulbs\" is \"cloves\".\n"
 "Any number of messages can be\n"
 "contained, instead of just a single message.\n"
-"This is a significant distinction from the onion routing implemented in "
-"Tor.\n"
-"However, it is only one of many major architectural differences between "
-"I2P and Tor;\n"
+"This is a significant distinction from the onion routing implemented in Tor.\n"
+"However, it is only one of many major architectural differences between I2P and Tor;\n"
 "perhaps it is not, by itself, enough to justify a change in terminology."
 msgstr ""
 
@@ -6733,10 +6087,8 @@ msgstr ""
 msgid ""
 "Another difference\n"
 "from the method described by Freedman\n"
-"is that the path is unidirectional - there is no \"turning point\" as "
-"seen in onion routing\n"
-"or mixmaster reply blocks, which greatly simplifies the algorithm and "
-"allows for more flexible\n"
+"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n"
+"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n"
 "and reliable delivery."
 msgstr ""
 
@@ -6770,16 +6122,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:113
 msgid ""
-"For publishing some network database entries (dampening the probability "
-"of a successful traffic analysis attack) (ElGamal/AES)"
+"For publishing some network database entries (dampening the probability of a"
+" successful traffic analysis attack) (ElGamal/AES)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:116
 msgid ""
-"There are also significant ways that this technique can be used to "
-"improve the performance of the network, \n"
-"exploiting transport latency/throughput tradeoffs, and branching data "
-"through redundant paths to increase reliability."
+"There are also significant ways that this technique can be used to improve the performance of the network, \n"
+"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:122
@@ -6790,8 +6140,7 @@ msgstr ""
 msgid ""
 "In I2P, tunnels are unidirectional. Each party builds two tunnels,\n"
 "one for outbound and one for inbound traffic.\n"
-"Therefore, four tunnels are required for a single round-trip message and "
-"reply."
+"Therefore, four tunnels are required for a single round-trip message and reply."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:129
@@ -6811,12 +6160,10 @@ msgstr ""
 msgid ""
 "Tunnels are a general-purpose mechanism to transport all\n"
 "<a href=\"%(i2np)s\">I2NP messages</a>, and\n"
-"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to "
-"build tunnels.\n"
+"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to build tunnels.\n"
 "We do not bundle multiple\n"
 "<a href=\"%(i2np)s\">I2NP messages</a> into a single\n"
-"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at "
-"the outbound tunnel endpoint;\n"
+"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at the outbound tunnel endpoint;\n"
 "the tunnel encryption is sufficient."
 msgstr ""
 
@@ -6830,14 +6177,12 @@ msgid ""
 "At the layer above tunnels, I2P delivers end-to-end messages between\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>.\n"
 "Just as within a single tunnel, we use\n"
-"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption."
-"\n"
+"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption.\n"
 "Each client message as delivered to the router through the\n"
 "<a href=\"%(i2cp)s\">I2CP interface</a> becomes a single\n"
 "<a href=\"%(i2npspec)s#struct_GarlicClove\">Garlic Clove</a>\n"
 "with its own\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>,\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>,\n"
 "inside a\n"
 "<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a>.\n"
 "Delivery Instructions may specify a Destination, Router, or Tunnel."
@@ -6860,18 +6205,13 @@ msgid ""
 "A\n"
 "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">Delivery Status Message</a>,\n"
 "with\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>\n"
-"specifying that it be sent back to the originating router as an "
-"acknowledgment.\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n"
+"specifying that it be sent back to the originating router as an acknowledgment.\n"
 "This is similar to the \"reply block\" or \"reply onion\"\n"
 "described in the references.\n"
-"It is used for determining the success or failure of end to end message "
-"delivery.\n"
-"The originating router may, upon failure to receive the Delivery Status "
-"Message\n"
-"within the expected time period, modify the routing to the far-end "
-"Destination,\n"
+"It is used for determining the success or failure of end to end message delivery.\n"
+"The originating router may, upon failure to receive the Delivery Status Message\n"
+"within the expected time period, modify the routing to the far-end Destination,\n"
 "or take other actions."
 msgstr ""
 
@@ -6883,16 +6223,12 @@ msgid ""
 "containing a\n"
 "<a href=\"%(commonstructures)s#struct_LeaseSet\">LeaseSet</a>\n"
 "for the originating Destination, with\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n"
 "specifying the far-end destination's router.\n"
-"By periodically bundling a LeaseSet, the router ensures that the far-end "
-"will be able\n"
+"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n"
 "to maintain communications.\n"
-"Otherwise the far-end would have to query a floodfill router for the "
-"network database entry,\n"
-"and all LeaseSets would have to be published to the network database, as "
-"explained on the\n"
+"Otherwise the far-end would have to query a floodfill router for the network database entry,\n"
+"and all LeaseSets would have to be published to the network database, as explained on the\n"
 "<a href=\"%(netdb)s\">network database page</a>."
 msgstr ""
 
@@ -6902,31 +6238,24 @@ msgid ""
 "By default, the Delivery Status and Database Store Messages\n"
 "are bundled when the local LeaseSet changes, when additional\n"
 "<a href=\"%(commonstructures)s#type_SessionTag\">Session Tags</a>\n"
-"are delivered, or if the messages have not been bundled in the previous "
-"minute.\n"
-"As of release 0.9.2, the client may configure the default number of "
-"Session Tags to send\n"
+"are delivered, or if the messages have not been bundled in the previous minute.\n"
+"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
 "and the low tag threshold for the current session.\n"
-"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for "
-"details.\n"
+"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n"
 "The session settings may also be overridden on a per-message basis.\n"
-"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message"
-" Expires specification</a> for details."
+"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:224
 msgid ""
-"Obviously, the additional messages are currently bundled for specific "
-"purposes,\n"
+"Obviously, the additional messages are currently bundled for specific purposes,\n"
 "and not part of a general-purpose routing scheme."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:229
 msgid ""
-"As of release 0.9.12, the Delivery Status Message is wrapped in another "
-"Garlic Message\n"
-"by the originator so that the contents are encrypted and not visible to "
-"routers on the return path."
+"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n"
+"by the originator so that the contents are encrypted and not visible to routers on the return path."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:235
@@ -6950,35 +6279,26 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/garlic-routing.html:252
 #, python-format
 msgid ""
-"The Garlic Message mechanism is very flexible and provides a structure "
-"for\n"
+"The Garlic Message mechanism is very flexible and provides a structure for\n"
 "implementing many types of mixnet delivery methods.\n"
 "Together with the unused delay option in the\n"
-"<a "
-"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel"
-" message Delivery Instructions</a>,\n"
-"a wide spectrum of batching, delay, mixing, and routing strategies are "
-"possible."
+"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel message Delivery Instructions</a>,\n"
+"a wide spectrum of batching, delay, mixing, and routing strategies are possible."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:260
 msgid ""
-"In particular, there is potential for much more flexibility at the "
-"outbound tunnel endpoint.\n"
+"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n"
 "Messages could possibly be routed from there to one of several tunnels\n"
-"(thus minimizing point-to-point connections), or multicast to several "
-"tunnels\n"
+"(thus minimizing point-to-point connections), or multicast to several tunnels\n"
 "for redundancy, or streaming audio and video."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:267
 msgid ""
-"Such experiments may conflict with the need to ensure security and "
-"anonymity, such\n"
-"as limiting certain routing paths, restricting the types of I2NP messages"
-" that may\n"
-"be forwarded along various paths, and enforcing certain message "
-"expiration times."
+"Such experiments may conflict with the need to ensure security and anonymity, such\n"
+"as limiting certain routing paths, restricting the types of I2NP messages that may\n"
+"be forwarded along various paths, and enforcing certain message expiration times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:273
@@ -6987,11 +6307,9 @@ msgid ""
 "As a part of\n"
 "<a href=\"%(elgamalaes)s\">ElGamal/AES encryption</a>,\n"
 "a garlic message contains a sender\n"
-"specified amount of padding data, allowing the sender to take active "
-"countermeasures \n"
+"specified amount of padding data, allowing the sender to take active countermeasures \n"
 "against traffic analysis.\n"
-"This is not currently used, beyond the requirement to pad to a multiple "
-"of 16 bytes."
+"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:282
@@ -7008,10 +6326,8 @@ msgstr "Polecane"
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:292
 msgid ""
-"The term garlic routing was first coined in Roger Dingledine's Free Haven"
-" \n"
-"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> "
-"(June 2000),\n"
+"The term garlic routing was first coined in Roger Dingledine's Free Haven \n"
+"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> (June 2000),\n"
 "see Section 8.1.1 authored by\n"
 "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>."
 msgstr ""
@@ -7041,8 +6357,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:313
 msgid ""
-"Onion routing was first described in <a href=\"http://www.onion-"
-"router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n"
+"Onion routing was first described in <a href=\"http://www.onion-router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n"
 "by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996."
 msgstr ""
 
@@ -7052,79 +6367,51 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:4
 msgid ""
-"I2P is a project to build, deploy, and maintain a network supporting "
-"secure and anonymous\n"
-"communication. People using I2P are in control of the tradeoffs between "
-"anonymity, reliability,\n"
-"bandwidth usage, and latency. There is no central point in the network on"
-" which pressure can be\n"
-"exerted to compromise the integrity, security, or anonymity of the "
-"system. The network supports\n"
-"dynamic reconfiguration in response to various attacks, and has been "
-"designed to make use of\n"
-"additional resources as they become available. Of course, all aspects of "
-"the network are open and\n"
+"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n"
+"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n"
+"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n"
+"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n"
+"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n"
+"additional resources as they become available. Of course, all aspects of the network are open and\n"
 "freely available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:14
 msgid ""
-"Unlike many other anonymizing networks, I2P doesn't try to provide "
-"anonymity by hiding the\n"
-"originator of some communication and not the recipient, or the other way "
-"around. I2P is designed to\n"
-"allow peers using I2P to communicate with each other anonymously &mdash; "
-"both sender and recipient\n"
-"are unidentifiable to each other as well as to third parties. For "
-"example, today there are both\n"
-"in-I2P web sites (allowing anonymous publishing / hosting) as well as "
-"HTTP proxies to the normal web\n"
-"(allowing anonymous web browsing). Having the ability to run servers "
-"within I2P is essential, as it\n"
-"is quite likely that any outbound proxies to the normal Internet will be "
-"monitored, disabled, or\n"
+"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n"
+"originator of some communication and not the recipient, or the other way around. I2P is designed to\n"
+"allow peers using I2P to communicate with each other anonymously &mdash; both sender and recipient\n"
+"are unidentifiable to each other as well as to third parties. For example, today there are both\n"
+"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n"
+"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n"
+"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n"
 "even taken over to attempt more malicious attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:25
 #, python-format
 msgid ""
-"The network itself is message oriented - it is essentially a secure and "
-"anonymous IP layer, where\n"
-"messages are addressed to cryptographic keys (Destinations) and can be "
-"significantly larger than IP\n"
-"packets. Some example uses of the network include \"I2P Sites\" "
-"(webservers hosting normal web\n"
-"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a "
-"distributed data store. With the\n"
-"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are "
-"able to stream traditional\n"
-"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even "
-"streaming audio. Most people\n"
-"will not use I2P directly, or even need to know they're using it. Instead"
-" their view will be of one\n"
-"of the I2P enabled applications, or perhaps as a little controller app to"
-" turn on and off various\n"
+"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n"
+"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n"
+"packets. Some example uses of the network include \"I2P Sites\" (webservers hosting normal web\n"
+"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n"
+"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are able to stream traditional\n"
+"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n"
+"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n"
+"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n"
 "proxies to enable the anonymizing functionality."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:37
 #, python-format
 msgid ""
-"An essential part of designing, developing, and testing an anonymizing "
-"network is to define the <a\n"
-"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing "
-"as \"true\" anonymity, just\n"
-"increasingly expensive costs to identify someone. Briefly, I2P's intent "
-"is to allow people to\n"
-"communicate in arbitrarily hostile environments by providing good "
-"anonymity, mixed in with\n"
-"sufficient cover traffic provided by the activity of people who require "
-"less anonymity. This way,\n"
-"some users can avoid detection by a very powerful adversary, while others"
-" will try to evade a weaker\n"
-"entity, <i>all on the same network</i>, where each one's messages are "
-"essentially indistinguishable\n"
+"An essential part of designing, developing, and testing an anonymizing network is to define the <a\n"
+"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing as \"true\" anonymity, just\n"
+"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n"
+"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n"
+"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n"
+"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n"
+"entity, <i>all on the same network</i>, where each one's messages are essentially indistinguishable\n"
 "from the others."
 msgstr ""
 
@@ -7135,12 +6422,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/intro.html:49
 #, python-format
 msgid ""
-"There are a multitude of reasons why we need a system to support "
-"anonymous communication, and\n"
-"everyone has their own personal rationale. There are many <a "
-"href=\"%(comparisons)s\">other\n"
-"efforts</a> working on finding ways to provide varying degrees of "
-"anonymity to people through the\n"
+"There are a multitude of reasons why we need a system to support anonymous communication, and\n"
+"everyone has their own personal rationale. There are many <a href=\"%(comparisons)s\">other\n"
+"efforts</a> working on finding ways to provide varying degrees of anonymity to people through the\n"
 "Internet, but we could not find any that met our needs or threat model."
 msgstr ""
 
@@ -7151,23 +6435,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/intro.html:58
 #, python-format
 msgid ""
-"The network at a glance is made up of a set of nodes (\"routers\") with a"
-" number of unidirectional\n"
-"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a "
-"href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is "
-"identified by a cryptographic RouterIdentity which is\n"
-"typically long lived. These routers communicate with each other through "
-"existing transport\n"
-"mechanisms (TCP, UDP, etc), passing various messages. Client applications"
-" have their own\n"
-"cryptographic identifier (\"Destination\") which enables it to send and "
-"receive messages. These\n"
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels\n"
-"that will be used for sending and receiving messages through the network."
-" I2P has its own internal\n"
-"<a href=\"%(netdb)s\">network database</a> (using a modification of the "
-"Kademlia algorithm) for\n"
+"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n"
+"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is identified by a cryptographic RouterIdentity which is\n"
+"typically long lived. These routers communicate with each other through existing transport\n"
+"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n"
+"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n"
+"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n"
+"that will be used for sending and receiving messages through the network. I2P has its own internal\n"
+"<a href=\"%(netdb)s\">network database</a> (using a modification of the Kademlia algorithm) for\n"
 "distributing routing and contact information securely."
 msgstr ""
 
@@ -7177,91 +6452,62 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:73
 msgid ""
-"In the above, Alice, Bob, Charlie, and Dave are all running routers with "
-"a single Destination on\n"
-"their local router. They each have a pair of 2-hop inbound tunnels per "
-"destination (labeled 1, 2, 3,\n"
-"4, 5 and 6), and a small subset of each of those router's outbound tunnel"
-" pool is shown with 2-hop\n"
-"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's "
-"outbound tunnels are not\n"
-"shown, nor are the rest of each router's outbound tunnel pool (typically "
-"stocked with a few tunnels\n"
-"at a time). When Alice and Bob talk to each other, Alice sends a message "
-"out one of her (pink)\n"
-"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3"
-" or 4). She knows to send\n"
-"to those tunnels on the correct router by querying the network database, "
-"which is constantly updated\n"
+"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n"
+"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n"
+"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n"
+"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n"
+"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n"
+"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n"
+"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n"
+"to those tunnels on the correct router by querying the network database, which is constantly updated\n"
 "as new leases are authorized and old ones expire."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:85
 #, python-format
 msgid ""
-"If Bob wants to reply to Alice, he simply goes through the same process -"
-" send a message out one of\n"
-"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 "
-"or 2). To make things\n"
-"easier, most messages sent between Alice and Bob are <a "
-"href=\"%(garlicrouting)s\">garlic</a>\n"
-"wrapped, bundling the sender's own current lease information so that the "
-"recipient can reply\n"
-"immediately without having to look in the network database for the "
-"current data."
+"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n"
+"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n"
+"easier, most messages sent between Alice and Bob are <a href=\"%(garlicrouting)s\">garlic</a>\n"
+"wrapped, bundling the sender's own current lease information so that the recipient can reply\n"
+"immediately without having to look in the network database for the current data."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:93
 #, python-format
 msgid ""
-"To deal with a wide range of attacks, I2P is fully distributed with no "
-"centralized resources - and\n"
-"hence there are no directory servers keeping statistics regarding the "
-"performance and reliability of\n"
-"routers within the network. As such, each router must keep and maintain "
-"profiles of various routers\n"
-"and is responsible for selecting appropriate peers to meet the anonymity,"
-" performance, and\n"
-"reliability needs of the users, as described in the <a "
-"href=\"%(peerselection)s\">peer selection</a>\n"
+"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n"
+"hence there are no directory servers keeping statistics regarding the performance and reliability of\n"
+"routers within the network. As such, each router must keep and maintain profiles of various routers\n"
+"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n"
+"reliability needs of the users, as described in the <a href=\"%(peerselection)s\">peer selection</a>\n"
 "page."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:102
 #, python-format
 msgid ""
-"The network itself makes use of a significant number of <a "
-"href=\"%(cryptography)s\">cryptographic\n"
-"techniques and algorithms</a> - a full laundry list includes 2048bit "
-"ElGamal encryption, 256bit AES\n"
-"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, "
-"2048bit Diffie-Hellman\n"
-"negotiated connections with station to station authentication, and <a "
-"href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>."
+"The network itself makes use of a significant number of <a href=\"%(cryptography)s\">cryptographic\n"
+"techniques and algorithms</a> - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n"
+"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n"
+"negotiated connections with station to station authentication, and <a href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:110
 msgid ""
-"Content sent over I2P is encrypted through three layers garlic encryption"
-" (used to verify the\n"
-"delivery of the message to the recipient), tunnel encryption (all "
-"messages passing through a tunnel\n"
-"is encrypted by the tunnel gateway to the tunnel endpoint), and inter "
-"router transport layer\n"
+"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n"
+"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n"
+"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n"
 "encryption (e.g. the TCP transport uses AES256 with ephemeral keys)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:117
 msgid ""
 "End-to-end (I2CP) encryption (client application to\n"
-"server application) was disabled in I2P release 0.6; end-to-end (garlic) "
-"encryption (I2P client router\n"
-"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" "
-"remains. Notice the different use of\n"
-"terms! All data from a to h is end-to-end encrypted, but the I2CP "
-"connection between the I2P router and\n"
-"the applications is not end-to-end encrypted! A and h are the routers of "
-"Alice and Bob, while Alice and\n"
+"server application) was disabled in I2P release 0.6; end-to-end (garlic) encryption (I2P client router\n"
+"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" remains. Notice the different use of\n"
+"terms! All data from a to h is end-to-end encrypted, but the I2CP connection between the I2P router and\n"
+"the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and\n"
 "Bob in following chart are the applications running atop of I2P."
 msgstr ""
 
@@ -7278,32 +6524,22 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:132
 msgid ""
-"The two main mechanisms for allowing people who need strong anonymity to "
-"use the network are\n"
-"explicitly delayed garlic routed messages and more comprehensive tunnels "
-"to include support for\n"
-"pooling and mixing messages. These are currently planned for release 3.0,"
-" but garlic routed messages\n"
-"with no delays and FIFO tunnels are currently in place. Additionally, the"
-" 2.0 release will allow\n"
-"people to set up and operate behind restricted routes (perhaps with "
-"trusted peers), as well as the\n"
+"The two main mechanisms for allowing people who need strong anonymity to use the network are\n"
+"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n"
+"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n"
+"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n"
+"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n"
 "deployment of more flexible and anonymous transports."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:141
 #, python-format
 msgid ""
-"Some questions have been raised with regards to the scalability of I2P, "
-"and reasonably so. There\n"
-"will certainly be more analysis over time, but peer lookup and "
-"integration should be bounded by\n"
-"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network "
-"database</a>'s algorithm, while end\n"
-"to end messages should be <code>O(1)</code> (scale free), since messages "
-"go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no "
-"longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n"
+"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network database</a>'s algorithm, while end\n"
+"to end messages should be <code>O(1)</code> (scale free), since messages go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
 "the network (N) bears no impact."
 msgstr ""
 
@@ -7315,13 +6551,10 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P initially began in Feb 2003 as a proposed modification to <a\n"
-"href=\"http://freenetproject.org\">Freenet</a> to allow it to use "
-"alternate transports, such as <a\n"
+"href=\"http://freenetproject.org\">Freenet</a> to allow it to use alternate transports, such as <a\n"
 "href=\"%(jms)s\">JMS</a>, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code "
-"being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the"
-" <a href=\"%(roadmap)s\">roadmap</a>."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the <a href=\"%(roadmap)s\">roadmap</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:161
@@ -7331,22 +6564,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/intro.html:162
 #, python-format
 msgid ""
-"We have a small <a href=\"%(team)s\">team</a> spread around several "
-"continents, working to advance\n"
-"different aspects of the project. We are very open to other developers "
-"who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as "
-"critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is "
-"open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix "
-"licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
-"written in Java (1.5+),\n"
-"though some third party applications are being written in Python and "
-"other languages. The code works\n"
-"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual"
-" Machines."
+"We have a small <a href=\"%(team)s\">team</a> spread around several continents, working to advance\n"
+"different aspects of the project. We are very open to other developers who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
+"though some third party applications are being written in Python and other languages. The code works\n"
+"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual Machines."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:173
@@ -7356,12 +6581,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/intro.html:174
 #, python-format
 msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
-"concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
-" currently no\n"
-"scheduled development meetings, however <a href=\"%(meetings)s\">archives"
-" are available</a>."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
+"scheduled development meetings, however <a href=\"%(meetings)s\">archives are available</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:180
@@ -7385,39 +6607,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:8
 msgid ""
 "I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (<b>RouterInfos</b>) "
-"and destination contact\n"
-"information (<b>LeaseSets</b>). Each piece of data is signed by the "
-"appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness "
-"information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to "
-"replace\n"
+"just two types of data - router contact information (<b>RouterInfos</b>) and destination contact\n"
+"information (<b>LeaseSets</b>). Each piece of data is signed by the appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
 "older ones, and protection against certain classes of attack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:17
 msgid ""
 "The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains "
-"the distributed database."
+"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:25
 msgid ""
-"When an I2P router wants to contact another router, they need to know "
-"some \n"
-"key pieces of data - all of which are bundled up and signed by the router"
-" into\n"
-"a structure called the \"RouterInfo\", which is distributed with the "
-"SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know some \n"
+"key pieces of data - all of which are bundled up and signed by the router into\n"
+"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
 "as the key. The structure itself contains:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:32
 msgid ""
-"The router's identity (an encryption key, a signing key, and a "
-"certificate)"
+"The router's identity (an encryption key, a signing key, and a certificate)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:33
@@ -7448,8 +6661,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:47
 msgid ""
-"Capabilities flags - used to indicate floodfill participation, "
-"approximate bandwidth, and perceived reachability"
+"Capabilities flags - used to indicate floodfill participation, approximate "
+"bandwidth, and perceived reachability"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:49
@@ -7508,23 +6721,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:76
 msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers "
-"published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
 "and only sent tunnel requests to peers whose uptime was more than 60m"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:82
 msgid ""
 "These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel "
-"through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine "
-"whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine whether\n"
 "the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or "
-"trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging"
-" and network analysis."
+"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging and network analysis."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:102
@@ -7535,13 +6743,11 @@ msgstr "Dodatkowe Opcje"
 #, python-format
 msgid ""
 "Additional text options include\n"
-"a small number of statistics about the router's health, which are "
-"aggregated by\n"
+"a small number of statistics about the router's health, which are aggregated by\n"
 "sites such as <a href=\"http://%(stats)s/\">%(stats)s</a>\n"
 "for network performance analysis and debugging.\n"
 "These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such "
-"data\n"
+"such as tunnel build success rates, while balancing the need for such data\n"
 "with the side-effects that could result from revealing this data.\n"
 "Current statistics are limited to:"
 msgstr ""
@@ -7556,18 +6762,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:119
 msgid ""
-"Floodfill routers publish additional data on the number of entries in "
-"their network database."
+"Floodfill routers publish additional data on the number of entries in their "
+"network database."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:123
 msgid ""
 "The data published can be seen in the router's user interface,\n"
 "but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the "
-"published\n"
-"statistics to improve anonymity, and we plan to remove more in future "
-"releases."
+"As the network has matured, we have gradually removed most of the published\n"
+"statistics to improve anonymity, and we plan to remove more in future releases."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:130
@@ -7576,8 +6780,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:132
 msgid ""
-"As of release 0.9.24, routers may declare that they are part of a "
-"\"family\", operated by the same entity.\n"
+"As of release 0.9.24, routers may declare that they are part of a \"family\", operated by the same entity.\n"
 "Multiple routers in the same family will not be used in a single tunnel."
 msgstr ""
 
@@ -7596,16 +6799,15 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:159
 msgid ""
 "RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the "
-"frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
 "with memory or disk usage.\n"
 "In the current implementation, there are the following general policies:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:166
 msgid ""
-"There is no expiration during the first hour of uptime, as the persistent"
-" stored data may be old."
+"There is no expiration during the first hour of uptime, as the persistent "
+"stored data may be old."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:169
@@ -7614,25 +6816,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:172
 msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in"
-" an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 "
-"routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
 "while expiration time with 300 routers is around 30 hours."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:177
 #, python-format
 msgid ""
-"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in "
-"about an hour, as\n"
+"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in about an hour, as\n"
 "the introducer list expires in about that time."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:181
 msgid ""
-"Floodfills use a short expiration time (1 hour) for all local "
-"RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
 "be frequently republished to them."
 msgstr ""
 
@@ -7648,8 +6846,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:192
 msgid ""
-"It may be desirable to persistently store Meta LeaseSets with long "
-"expirations.\n"
+"It may be desirable to persistently store Meta LeaseSets with long expirations.\n"
 "This is implementation-dependent."
 msgstr ""
 
@@ -7663,10 +6860,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:212
 msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
-"documenting\n"
-"a group of <b>tunnel entry points (leases)</b> for a particular client "
-"destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
+"a group of <b>tunnel entry points (leases)</b> for a particular client destination.\n"
 "Each of these leases specify the following information:"
 msgstr ""
 
@@ -7692,8 +6887,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:454
 msgid ""
 "One exception is for Encrypted LeaseSets (LS2), as of release 0.9.38.\n"
-"The SHA256 of the type byte (3) followed by the blinded public key is "
-"used for the DHT key,\n"
+"The SHA256 of the type byte (3) followed by the blinded public key is used for the DHT key,\n"
 "and then rotated as usual."
 msgstr ""
 
@@ -7707,14 +6901,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:239
 msgid ""
-"The destination itself (an encryption key, a signing key and a "
-"certificate)"
+"The destination itself (an encryption key, a signing key and a certificate)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:240
 msgid ""
-"Additional encryption public key: used for end-to-end encryption of "
-"garlic messages"
+"Additional encryption public key: used for end-to-end encryption of garlic "
+"messages"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:241
@@ -7725,8 +6918,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:242
 msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination "
-"published the LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination published "
+"the LeaseSet."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:246
@@ -7757,13 +6950,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:263
 msgid ""
-"A LeaseSet for a destination used only for outgoing connections is "
-"<i>unpublished</i>.\n"
+"A LeaseSet for a destination used only for outgoing connections is <i>unpublished</i>.\n"
 "It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
-"unpublished.\n"
-"Servers will still be able to send messages back to those unpublished "
-"destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
+"Servers will still be able to send messages back to those unpublished destinations,\n"
 "because of <a href=\"#lsp\">I2NP storage messages</a>."
 msgstr ""
 
@@ -7773,24 +6963,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:274
 msgid ""
-"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero "
-"leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet."
-"\n"
-"Revocations are not fully implemented, and it is unclear if they have any"
-" practical use.\n"
-"This is the only planned use for that signing key, so it is currently "
-"unused."
+"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet.\n"
+"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
+"This is the only planned use for that signing key, so it is currently unused."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:283
 msgid ""
 "As of release 0.9.38, floodfills support a new LeaseSet2 structure.\n"
-"This structure is very similar to the old LeaseSet structure, and serves "
-"the same purpose.\n"
+"This structure is very similar to the old LeaseSet structure, and serves the same purpose.\n"
 "The new structure provides the flexibility required to support new\n"
-"encryption types, multiple encryption types, options, offline signing "
-"keys,\n"
+"encryption types, multiple encryption types, options, offline signing keys,\n"
 "and other features.\n"
 "See proposal 123 for details."
 msgstr ""
@@ -7799,15 +6983,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:715
 msgid ""
 "As of release 0.9.38, floodfills support a new Meta LeaseSet structure.\n"
-"This structure provides a tree-like structure in the DHT, to refer to "
-"other LeaseSets.\n"
-"Using Meta LeaseSets, a site may implement large multihomed services, "
-"where several\n"
+"This structure provides a tree-like structure in the DHT, to refer to other LeaseSets.\n"
+"Using Meta LeaseSets, a site may implement large multihomed services, where several\n"
 "different Destinations are used to provide a common service.\n"
 "The entries in a Meta LeaseSet are Destinations or other Meta LeaseSets,\n"
 "and may have long expirations, up to 18.2 hours.\n"
-"Using this facility, it should be possible to run hundreds or thousands "
-"of Destinations hosting a common service.\n"
+"Using this facility, it should be possible to run hundreds or thousands of Destinations hosting a common service.\n"
 "See proposal 123 for details."
 msgstr ""
 
@@ -7825,29 +7006,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:313
 msgid ""
-"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate"
-" key.\n"
-"The leases may only be decoded, and thus the destination may only be "
-"contacted,\n"
+"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate key.\n"
+"The leases may only be decoded, and thus the destination may only be contacted,\n"
 "by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is "
-"encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future "
-"work to\n"
-"research whether the user interface and implementation of encrypted "
-"LeaseSets could be improved."
+"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
+"research whether the user interface and implementation of encrypted LeaseSets could be improved."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:324
 msgid ""
-"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet "
-"structure.\n"
-"The Destination is hidden, and only a blinded public key and an "
-"expiration\n"
+"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet structure.\n"
+"The Destination is hidden, and only a blinded public key and an expiration\n"
 "are visible to the floodfill.\n"
 "Only those that have the full Destination may decrypt the structure.\n"
-"The structure is stored at a DHT location based on the hash of the "
-"blinded public key,\n"
+"The structure is stored at a DHT location based on the hash of the blinded public key,\n"
 "not the hash of the Destination.\n"
 "See proposal 123 for details."
 msgstr ""
@@ -7858,12 +7031,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:336
 msgid ""
-"For regular LeaseSets, the expiration is the time of the latest "
-"expiration of its leases.\n"
-"For the new LeaseSet2 data structures, the expiration is specified in the"
-" header.\n"
-"For LeaseSet2, the expiration should match the latest expiration of its "
-"leases.\n"
+"For regular LeaseSets, the expiration is the time of the latest expiration of its leases.\n"
+"For the new LeaseSet2 data structures, the expiration is specified in the header.\n"
+"For LeaseSet2, the expiration should match the latest expiration of its leases.\n"
 "For EncryptedLeaseSet and MetaLeaseSet, the expiration may vary,\n"
 "and maximum expiration may be enforced, to be determined."
 msgstr ""
@@ -7874,8 +7044,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:346
 msgid ""
-"No persistent storage of LeaseSet data is required, since they expire so "
-"quickly.\n"
+"No persistent storage of LeaseSet data is required, since they expire so quickly.\n"
 "Howewver, persistent storage of EncryptedLeaseSet and MetaLeaseSet data\n"
 "with long expirations may be advisable."
 msgstr ""
@@ -7901,42 +7070,30 @@ msgstr ""
 msgid ""
 "The netDb is decentralized, however you do need at\n"
 "least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the "
-"RouterInfo\n"
-"of an active peer - specifically, by retrieving their "
-"<code>routerInfo-$hash.dat</code>\n"
-"file and storing it in your <code>netDb/</code> directory. Anyone can "
-"provide\n"
-"you with those files - you can even provide them to others by exposing "
-"your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
+"of an active peer - specifically, by retrieving their <code>routerInfo-$hash.dat</code>\n"
+"file and storing it in your <code>netDb/</code> directory. Anyone can provide\n"
+"you with those files - you can even provide them to others by exposing your own\n"
 "netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular "
-"(non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
 "and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches "
-"from\n"
+"When the router starts up for the first time, it automatically fetches from\n"
 "one of these URLs, selected at random."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:379
 msgid ""
-"The floodfill netDb is a simple distributed storage mechanism.  The "
-"storage\n"
-"algorithm is simple: send the data to the closest peer that has "
-"advertised\n"
-"itself as a floodfill router. When the peer in the floodfill netDb "
-"receives a\n"
-"netDb store from a peer not in the floodfill netDb, they send it to a "
-"subset of\n"
-"the floodfill netDb-peers. The peers selected are the ones closest "
-"(according\n"
+"The floodfill netDb is a simple distributed storage mechanism.  The storage\n"
+"algorithm is simple: send the data to the closest peer that has advertised\n"
+"itself as a floodfill router. When the peer in the floodfill netDb receives a\n"
+"netDb store from a peer not in the floodfill netDb, they send it to a subset of\n"
+"the floodfill netDb-peers. The peers selected are the ones closest (according\n"
 "to the <a href=\"#kad\">XOR-metric</a>) to a specific key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:388
 msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed"
-" in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
 "router's published routerInfo as a capability."
 msgstr ""
 
@@ -7966,15 +7123,13 @@ msgid ""
 "Routers with high bandwidth limits (which must be manually configured,\n"
 "as the default is much lower) are presumed to be on lower-latency\n"
 "connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 "
-"KBytes/sec."
+"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:419
 msgid ""
 "In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation "
-"is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
 "automatically enabled."
 msgstr ""
 
@@ -8001,13 +7156,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:441
 msgid ""
-"A floodfill router's only services that are in addition to those of non-"
-"floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
 "are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to "
-"participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to "
-"their distributed database services."
+"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:449
@@ -8016,33 +7168,24 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:450
 msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
-"\n"
-"To create a Kademlia key, the SHA256 hash of the RouterIdentity or "
-"Destination is computed."
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"To create a Kademlia key, the SHA256 hash of the RouterIdentity or Destination is computed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:459
 msgid ""
-"A modification to this algorithm is done to increase the costs of <a href"
-"=\"#sybil-partial\">Sybil attacks</a>.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the "
-"SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented "
-"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight "
-"UTC.\n"
-"Only the search key is modified in this way, not the floodfill router "
-"hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace "
-"rotation\",\n"
+"A modification to this algorithm is done to increase the costs of <a href=\"#sybil-partial\">Sybil attacks</a>.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
+"Only the search key is modified in this way, not the floodfill router hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
 "although it isn't strictly a rotation."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:469
 msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are "
-"only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
 "determination of distance."
 msgstr ""
 
@@ -8057,8 +7200,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:479
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local "
-"RouterInfo are exchanged with peers\n"
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
 "as a part of the initialization of a <a href=\"%(ntcp)s\">NTCP</a>\n"
 "or <a href=\"%(ssu)s\">SSU</a> transport connection."
 msgstr ""
@@ -8070,46 +7212,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:487
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local "
-"LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the "
-"related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an "
-"appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating "
-"Destinations to have published LeaseSets at all."
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:495
 msgid ""
 "The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
 "to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local "
-"database.\n"
-"Even if that floodfill is not actually closest, it will flood it "
-"\"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local database.\n"
+"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
 "sending it to multiple other floodfills.\n"
 "This provides a high degree of fault-tolerance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:504
 msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before"
-" inserting\n"
-"an item in the DHT to the closest target. As the verify operation will "
-"tend to\n"
-"discover closer floodfills if they are present, a router will quickly "
-"improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
-"LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes "
-"necessary,\n"
-"a router may simply do an iterative search for a key with the least "
-"significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the "
-"DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-"
-"distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
+"an item in the DHT to the closest target. As the verify operation will tend to\n"
+"discover closer floodfills if they are present, a router will quickly improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
+"a router may simply do an iterative search for a key with the least significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-distant peer had\n"
 "the netdb item."
 msgstr ""
 
@@ -8120,11 +7248,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:518
 #, python-format
 msgid ""
-"A router publishes its own RouterInfo by directly connecting to a "
-"floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
 "and sending it a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic "
-"encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
 "as this is a direct connection, so there are no intervening routers\n"
 "(and no need to hide this data anyway).\n"
 "The floodfill router replies with a\n"
@@ -8138,8 +7264,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:533
 msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
-"router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
 "must take care that the LeaseSet cannot be associated with the router."
 msgstr ""
 
@@ -8148,10 +7273,8 @@ msgstr ""
 msgid ""
 "A router publishes a local LeaseSet by\n"
 "sending a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that "
-"Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's "
-"Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
 "to hide the message from the tunnel's outbound endpoint.\n"
 "The floodfill router replies with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DeliveryStatusMessage,\n"
@@ -8167,17 +7290,12 @@ msgstr ""
 #, python-format
 msgid ""
 "After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored "
-"in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
 "local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
-"floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the "
-"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the "
-"floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good "
-"knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good knowledge of the\n"
 "DHT \"neighborhood\" for the routing key."
 msgstr ""
 
@@ -8199,17 +7317,15 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:574
 #, python-format
 msgid ""
-"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to "
-"request a netdb entry from a floodfill router.\n"
+"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
 "Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound "
-"exploratory tunnels."
+"The replies are specified to return via one of the router's inbound exploratory tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:580
 msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't "
-"fail) floodfill routers closest to the requested key, in parallel."
+"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
+" floodfill routers closest to the requested key, in parallel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:584
@@ -8217,8 +7333,7 @@ msgstr ""
 msgid ""
 "If the key is found locally by the floodfill router, it responds with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with"
-" a\n"
+"If the key is not found locally by the floodfill router, it responds with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n"
 "containing a list of other floodfill routers close to the key."
 msgstr ""
@@ -8226,22 +7341,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:592
 msgid ""
 "LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
-"by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
-"encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
 "RouterInfo lookup encryption may be enabled in a future release."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:599
 msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
-" or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
 "will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
-"\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
-" encryption."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:606
@@ -8255,41 +7365,31 @@ msgstr ""
 msgid ""
 "Due to the relatively small size of the network and flooding redundancy,\n"
 "lookups are usually O(1) rather than O(log n).\n"
-"A router is highly likely to know a floodfill router close enough to the "
-"key to get the answer on the first try.\n"
+"A router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
 "In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and"
-"\n"
-"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was "
-"implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and\n"
+"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was implemented.\n"
 "Queries were sent through <i>multiple routes simultaneously</i>\n"
 "to <i>reduce the chance of query failure</i>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:621
 msgid ""
-"As of release 0.8.9, <i>iterative lookups</i> are implemented with no "
-"lookup redundancy.\n"
+"As of release 0.8.9, <i>iterative lookups</i> are implemented with no lookup redundancy.\n"
 "This is a more efficient and reliable lookup that will work much better\n"
 "when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows "
-"only a small\n"
+"limitation to network growth. As the network grows and each router knows only a small\n"
 "subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup"
-" continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious "
-"floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total "
-"lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
 "or the maximum number of peers is queried."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:633
 msgid ""
-"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash "
-"directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally "
-"ignored.\n"
+"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally ignored.\n"
 "Given the current size of the network, a router has\n"
 "<i>detailed knowledge of the neighborhood of the destination ID space</i>."
 msgstr ""
@@ -8301,8 +7401,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:643
 #, python-format
 msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
-"prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
 "the attack described in the paper\n"
 "<a href=\"%(egger2013)s\">Practical Attacks Against the I2P Network</a>.\n"
 "It is not clear if verification can be redesigned to be done safely."
@@ -8310,13 +7409,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:650
 msgid ""
-"To verify a storage was successful, a router simply waits about 10 "
-"seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 seconds,\n"
 "then sends a lookup to another floodfill router close to the key\n"
 "(but not the one the store was sent to).\n"
 "Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the "
-"outbound endpoint(OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:658
@@ -8325,22 +7422,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:659
 msgid ""
-"To verify a storage was successful, a router simply waits about 10 "
-"seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 seconds,\n"
 "then sends a lookup to another floodfill router close to the key\n"
 "(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination "
-"of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
 "To prevent snooping by the OBEP of the outbound tunnel,\n"
 "lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound "
-"tunnels."
+"The replies are specified to return via one of the client's inbound tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:669
 msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
-"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
 "will be encrypted,\n"
 "to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
 msgstr ""
@@ -8352,23 +7445,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:678
 #, python-format
 msgid ""
-"<i>Exploration</i> is a special form of netdb lookup, where a router "
-"attempts to learn about\n"
+"<i>Exploration</i> is a special form of netdb lookup, where a router attempts to learn about\n"
 "new routers.\n"
-"It does this by sending a floodfill router a <a "
-"href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random "
-"key.\n"
+"It does this by sending a floodfill router a <a href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random key.\n"
 "As this lookup will fail, the floodfill would normally respond with a\n"
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing "
-"hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already "
-"knows those floodfills,\n"
-"and it would be impractical to add all floodfill routers to the \"don't "
-"include\" field of the DatabaseLookup Message.\n"
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
+"and it would be impractical to add all floodfill routers to the \"don't include\" field of the DatabaseLookup Message.\n"
 "For an exploration query, the requesting router sets a special flag in\n"
 "the DatabaseLookup Message.\n"
-"The floodfill will then respond only with non-floodfill routers close to "
-"the requested key."
+"The floodfill will then respond only with non-floodfill routers close to the requested key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:692
@@ -8377,14 +7463,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:693
 msgid ""
-"The response to a lookup request is either a Database Store Message (on "
-"success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' "
-"router hash field\n"
+"The response to a lookup request is either a Database Store Message (on success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
 "to indicate the source of the reply; the DSM does not.\n"
 "The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple "
-"requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
 "difficult to monitor the performance of the various floodfill routers."
 msgstr ""
 
@@ -8394,19 +7477,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:705
 msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using "
-"the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
 "private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the"
-" floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer "
-"requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
-"instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that."
-"\n"
-"The multihoming function has been verified and is in use by several "
-"services on the network."
+"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that.\n"
+"The multihoming function has been verified and is in use by several services on the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:727
@@ -8436,8 +7513,7 @@ msgstr ""
 #, python-format
 msgid ""
 "There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less "
-"impact,\n"
+"Most of the following attacks will become more difficult, or have less impact,\n"
 "as the network size and number of floodfill routers increase."
 msgstr ""
 
@@ -8448,8 +7524,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:748
 #, python-format
 msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
-" routers closest to the key."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
+"routers closest to the key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:753
@@ -8470,8 +7546,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Each router maintains an expanded set of statistics in the\n"
-"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,"
-"\n"
+"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,\n"
 "covering various quality metrics for that peer.\n"
 "The set includes:"
 msgstr ""
@@ -8502,14 +7577,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:775
 msgid ""
-"Each time a router needs to make a determination on which floodfill "
-"router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
 "it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are "
-"relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
 "are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and "
-"avoided,\n"
+"While a completely unresponsive router will quickly be identified and avoided,\n"
 "routers that are only sometimes malicious may be much harder to deal with."
 msgstr ""
 
@@ -8521,8 +7593,7 @@ msgstr ""
 #, python-format
 msgid ""
 "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n"
-"by creating a large number of floodfill routers spread throughout the "
-"keyspace."
+"by creating a large number of floodfill routers spread throughout the keyspace."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:791
@@ -8530,35 +7601,29 @@ msgstr ""
 msgid ""
 "(In a related example, a researcher recently created a\n"
 "<a href=\"%(url)s\">large number of Tor relays</a>.)\n"
-"If successful, this could be an effective DOS attack on the entire "
-"network."
+"If successful, this could be an effective DOS attack on the entire network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:797
 msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as "
-"\"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
 "metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the "
-"suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
 "can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however "
-"none of them is completely satisfactory:"
+"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:805
 msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through"
-" various means\n"
-"(console news, website, forum, etc.); users would have to manually "
-"download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
+"(console news, website, forum, etc.); users would have to manually download the list and\n"
 "add it to their local \"blacklist\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:810
 msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil "
-"with more Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil with "
+"more Sybil)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:811
@@ -8567,8 +7632,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:812
 msgid ""
-"Release a new software version that improves the peer profile metrics and"
-" thresholds,\n"
+"Release a new software version that improves the peer profile metrics and thresholds,\n"
 "in an attempt to automatically identify the \"bad\" peers."
 msgstr ""
 
@@ -8580,12 +7644,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:817
 msgid ""
-"Implement an automatic subscription-based blacklist controlled by a "
-"single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" "
-"model.\n"
-"Unfortunately it would also give a single individual or group the power "
-"to\n"
+"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" model.\n"
+"Unfortunately it would also give a single individual or group the power to\n"
 "block participation of any particular router or IP in the network,\n"
 "or even to completely shutdown or destroy the entire network."
 msgstr ""
@@ -8602,25 +7663,19 @@ msgstr ""
 #, python-format
 msgid ""
 "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n"
-"by creating a small number (8-15) of floodfill routers clustered closely "
-"in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
 "and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed"
-"\n"
+"Then, all lookups and stores for a key in that keyspace would be directed\n"
 "to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular I2P "
-"Site, for example."
+"If successful, this could be an effective DOS attack on a particular I2P Site, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:842
 msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
-"\n"
-"an attacker must use a brute-force method to repeatedly generate router "
-"hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
+"an attacker must use a brute-force method to repeatedly generate router hashes\n"
 "until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent "
-"on network\n"
+"The amount of computational power required for this, which is dependent on network\n"
 "size, is unknown."
 msgstr ""
 
@@ -8628,14 +7683,10 @@ msgstr ""
 msgid ""
 "As a partial defense against this attack,\n"
 "the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
-"\n"
-"we use the Hash of the key appended with the current date string, i.e. "
-"H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which "
-"transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
-"midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
+"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
 "Any partial-keyspace attack would have to be regenerated every day, for\n"
 "after the rotation, the attacking routers would no longer be close\n"
 "to the target key, or to each other."
@@ -8644,8 +7695,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:862
 msgid ""
 "This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not "
-"particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
 "An attacker can precompute numerous router hashes in advance,\n"
 "and only a few routers are sufficient to \"eclipse\" a portion\n"
 "of the keyspace within a half hour after rotation."
@@ -8653,11 +7703,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:870
 msgid ""
-"One consequence of daily keyspace rotation is that the distributed "
-"network database\n"
+"One consequence of daily keyspace rotation is that the distributed network database\n"
 "may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a "
-"store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a store yet.\n"
 "The extent of the issue, and methods for mitigation\n"
 "(for example netdb \"handoffs\" at midnight)\n"
 "are a topic for further study."
@@ -8720,24 +7768,19 @@ msgstr ""
 #, python-format
 msgid ""
 "See also <a href=\"#lookup\">lookup</a>\n"
-"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections "
-"2.2-2.3 for terms below in italics)"
+"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections 2.2-2.3 for terms below in italics)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:926
 msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could"
-" attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their "
-"references."
+"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their references."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:931
 msgid ""
-"This is unlikely to work via exploration, because exploration is a low-"
-"frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel"
-" building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
 "Exploration results are generally limited to a few router hashes,\n"
 "and each exploration query is directed to a random floodfill router."
 msgstr ""
@@ -8749,18 +7792,13 @@ msgid ""
 "For floodfill router references returned in a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n"
 "response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to"
-" the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to the lookup key.\n"
 "The requesting router does not trust that the references are\n"
 "closer to the key (i.e. they are <i>verifiably correct</i>.\n"
-"The lookup also does not stop when no closer key is found, but continues "
-"by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is "
-"reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key "
-"space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a "
-"router info\n"
+"The lookup also does not stop when no closer key is found, but continues by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
 "within the desired key space region.\n"
 "This design ensures that the query capture attack described in\n"
 "<a href=\"%(pdf)s\">Hashing it out in Public</a>\n"
@@ -8798,43 +7836,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:973
 #, python-format
 msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
-"by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of "
-"DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network "
-"database lookups are only\n"
-"loosely correlated to the <a href=\"%(peerselection)s\">peer "
-"selection</a> and\n"
-"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only "
-"previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
+"loosely correlated to the <a href=\"%(peerselection)s\">peer selection</a> and\n"
+"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only previously-known peers\n"
 "are used for tunnels.\n"
 "Also, peer selection is unrelated to any notion of DHT key-closeness."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:984
 msgid ""
-"Some of this may actually be more interesting when the I2P network gets "
-"much larger.\n"
-"Right now, each router knows a large proportion of the network, so "
-"looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a "
-"future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, "
-"the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that "
-"much harder."
+"Some of this may actually be more interesting when the I2P network gets much larger.\n"
+"Right now, each router knows a large proportion of the network, so looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that much harder."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:992
 #, python-format
 msgid ""
-"However, the general issue of DHT information leakage in I2P needs "
-"further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather "
-"information.\n"
-"Certainly, at a level of <i>f</i> = 0.2 (20&#37; malicious nodes, as "
-"specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather information.\n"
+"Certainly, at a level of <i>f</i> = 0.2 (20&#37; malicious nodes, as specifed in the paper)\n"
 "we expect that many of the Sybil threats we describe\n"
 "(<a href=\"%(threatmodel)s#sybil\">here</a>,\n"
 "<a href=\"#sybil\">here</a> and\n"
@@ -8869,11 +7894,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:10
 #, python-format
 msgid ""
-"<b>Peer profiling</b> is the process of collecting data based on the "
-"<b>observed</b> performance\n"
+"<b>Peer profiling</b> is the process of collecting data based on the <b>observed</b> performance\n"
 "of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does <b>not</b> use any claimed performance data published by "
-"the peer itself\n"
+"Profiling does <b>not</b> use any claimed performance data published by the peer itself\n"
 "in the <a href=\"%(netdb)s\">network database</a>."
 msgstr ""
 
@@ -8888,8 +7911,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:20
 #, python-format
 msgid ""
-"Choosing peers from the set of floodfill routers to use for network "
-"database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
 "which is discussed on the <a href=\"%(netdb)s\">network database</a> page"
 msgstr ""
 
@@ -8902,11 +7924,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:28
 msgid ""
 "<b>Peer selection</b> is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers "
-"will we \n"
+"on the network we want to relay our messages to go through (which peers will we \n"
 "ask to join our tunnels).  To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how"
-" \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how \n"
 "fast they are, how often they will be able to accept our requests, and \n"
 "whether they seem to be overloaded or otherwise unable to perform what\n"
 "they agree to reliably."
@@ -8916,8 +7936,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is <b>only</b> used to avoid those "
-"peers\n"
+"claimed bandwidth is untrusted and is <b>only</b> used to avoid those peers\n"
 "advertising very low bandwidth insufficient for routing tunnels.\n"
 "All peer selection is done through profiling.\n"
 "This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -8929,10 +7948,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:50
 msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large"
-" number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
-"minutes."
+"Peer selection is done quite frequently, as a router may maintain a large number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:56
@@ -8943,11 +7960,9 @@ msgstr ""
 #, python-format
 msgid ""
 "For more information see the paper\n"
-"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous "
-"Network</a>\n"
+"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>\n"
 "presented at <a href=\"%(url)s\">PET-CON 2009.1</a>.\n"
-"See <a href=\"#notes\">below</a> for notes on minor changes since the "
-"paper was published."
+"See <a href=\"#notes\">below</a> for notes on minor changes since the paper was published."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:65
@@ -8957,30 +7972,21 @@ msgstr "Profile"
 #: i2p2www/pages/site/docs/how/peer-selection.html:66
 #, python-format
 msgid ""
-"Each peer has a set of data points collected about them, including "
-"statistics \n"
-"about how long it takes for them to reply to a network database query, "
-"how \n"
-"often their tunnels fail, and how many new peers they are able to "
-"introduce \n"
-"us to, as well as simple data points such as when we last heard from them"
-" or\n"
-"when the last communication error occurred.  The specific data points "
-"gathered\n"
+"Each peer has a set of data points collected about them, including statistics \n"
+"about how long it takes for them to reply to a network database query, how \n"
+"often their tunnels fail, and how many new peers they are able to introduce \n"
+"us to, as well as simple data points such as when we last heard from them or\n"
+"when the last communication error occurred.  The specific data points gathered\n"
 "can be found in the <a href=\"%(url)s\">code</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:75
 msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile"
-" expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
 "lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written "
-"to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all"
-" profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after "
-"startup."
+"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after startup."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:85
@@ -8990,10 +7996,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:86
 msgid ""
 "While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary "
-"down \n"
-"into four simple values, representing the peer's speed, its capacity, how"
-" well \n"
+"performance, to allow for effective peer selection we break each summary down \n"
+"into four simple values, representing the peer's speed, its capacity, how well \n"
 "integrated into the network it is, and whether it is failing."
 msgstr ""
 
@@ -9005,8 +8009,7 @@ msgstr "Prędkość"
 msgid ""
 "The speed calculation\n"
 "simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute.  For "
-"this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute.  For this estimate it just looks at\n"
 "performance in the previous minute."
 msgstr ""
 
@@ -9018,13 +8021,11 @@ msgstr "Wydajność"
 msgid ""
 "The capacity calculation\n"
 "simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period.  For this "
-"estimate it looks at \n"
+"would agree to participate in over a given time period.  For this estimate it looks at \n"
 "how many tunnel build requests\n"
 "the peer has accepted, rejected, and dropped, and how many\n"
 "of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts "
-"more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
 "statistics up to 48 hours old may be included."
 msgstr ""
 
@@ -9032,10 +8033,8 @@ msgstr ""
 msgid ""
 "Recognizing and avoiding unreliable and unreachable\n"
 "peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the "
-"participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build "
-"request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
 "The router assigns a probability of failure to each of the\n"
 "peers, and uses that probability in the capacity calculation.\n"
 "Drops and test failures are weighted much higher than rejections."
@@ -9047,10 +8046,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:124
 msgid ""
-"As mentioned above, we drill through each peer's profile to come up with "
-"a \n"
-"few key calculations, and based upon those, we organize each peer into "
-"three\n"
+"As mentioned above, we drill through each peer's profile to come up with a \n"
+"few key calculations, and based upon those, we organize each peer into three\n"
 "groups - fast, high capacity, and standard."
 msgstr ""
 
@@ -9060,15 +8057,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:134
 msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets "
-"or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
 "exceeds the median of all peers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:138
 msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and "
-"their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
 "speed calculation meets or exceeds the median of all peers."
 msgstr ""
 
@@ -9094,25 +8089,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:156
 msgid ""
 "The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are "
-"placed in the group."
+"If there would be more, only the ones with the highest speed rating are placed in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:160
 msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)"
-"\n"
-"If there would be more, only the ones with the highest capacity rating "
-"are placed in the group."
+"The high capacity group is limited to 75 peers (including the fast group)\n"
+"If there would be more, only the ones with the highest capacity rating are placed in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:164
 msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the "
-"number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
 "stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 "
-"RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
 "(including those in the fast and high capacity groups)"
 msgstr ""
 
@@ -9128,16 +8118,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:177
 msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\""
-" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
 "at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through"
-" them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
 "which reinforces their presence in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid "The router selects peers from the above groups to build tunnels through."
+msgid ""
+"The router selects peers from the above groups to build tunnels through."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:193
@@ -9146,19 +8135,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:194
 msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies"
-" and web servers."
+"Client tunnels are used for application traffic, such as for HTTP proxies "
+"and web servers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:198
 msgid ""
-"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog"
-"/one-cell-enough\">some attacks</a>,\n"
+"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog/one-cell-enough\">some attacks</a>,\n"
 "and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest "
-"group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants"
-" in a tunnel for the same client."
+"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:206
@@ -9167,35 +8153,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:207
 msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as "
-"network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
 "and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected "
-"routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
 "they are called \"exploratory\".\n"
 "These tunnels are usually low-bandwidth."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:215
 msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from"
-" the standard group.\n"
-"If the success rate of these build attempts is low compared to the client"
-" tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high"
-" capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network "
-"performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants"
-" in an exploratory tunnel."
+"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
+"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:223
 msgid ""
-"As the standard group includes a very large subset of all peers the "
-"router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of "
-"all peers,\n"
+"As the standard group includes a very large subset of all peers the router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of all peers,\n"
 "until the build success rate becomes too low."
 msgstr ""
 
@@ -9205,8 +8182,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:232
 msgid ""
-"To prevent some simple attacks, and for performance, there are the "
-"following restrictions:"
+"To prevent some simple attacks, and for performance, there are the following"
+" restrictions:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:236
@@ -9215,8 +8192,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:239
 msgid ""
-"A peer may participate in a maximum of 33&#37; of all tunnels created by "
-"the router."
+"A peer may participate in a maximum of 33&#37; of all tunnels created by the"
+" router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:242
@@ -9237,18 +8214,18 @@ msgid ""
 "Peers are ordered within tunnels to\n"
 "to deal with the <a href=\"%(pdf)s\">predecessor attack</a>\n"
 "<a href=\"%(pdf2008)s\">(2008 update)</a>.\n"
-"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel "
-"page</a>."
+"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid "Continue to analyze an tune speed and capacity calculations as necessary"
+msgid ""
+"Continue to analyze an tune speed and capacity calculations as necessary"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:271
 msgid ""
-"Implement a more aggressive ejection strategy if necessary to control "
-"memory usage as the network grows"
+"Implement a more aggressive ejection strategy if necessary to control memory"
+" usage as the network grows"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:274
@@ -9263,10 +8240,8 @@ msgstr ""
 #, python-format
 msgid ""
 "For those reading the paper\n"
-"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous "
-"Network</a>,\n"
-"please keep in mind the following minor changes in I2P since the paper's "
-"publication:"
+"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>,\n"
+"please keep in mind the following minor changes in I2P since the paper's publication:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:289
@@ -9332,24 +8307,18 @@ msgstr "Kryptografia"
 #: i2p2www/pages/site/docs/how/tech-intro.html:21
 msgid ""
 "I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security "
-"conscious \n"
-"applications can operate. Each of these applications may make their own "
-"anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper "
-"implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the "
-"larger \n"
+"network layer, upon which any number of different anonymity or security conscious \n"
+"applications can operate. Each of these applications may make their own anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the larger \n"
 "anonymity set of users already running on top of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:30
 msgid ""
-"Applications available already provide the full range of typical Internet"
-" activities -\n"
+"Applications available already provide the full range of typical Internet activities -\n"
 "<b>anonymous</b> web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other "
-"applications under development."
+"blogging and content syndication, newsgroups, as well as several other applications under development."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:36
@@ -9362,29 +8331,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:38
 msgid ""
-"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a "
-"href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n"
-"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a "
-"href=\"#app.i2pbt\">I2P-bt</a>\n"
+"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n"
+"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a href=\"#app.i2pbt\">I2P-bt</a>\n"
 "and others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:43
 msgid ""
-"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a href=\"#app.i2pbote"
-"\">I2P-Bote</a>."
+"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a "
+"href=\"#app.i2pbote\">I2P-Bote</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:44
 msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software "
-"<a href=\"#app.syndie\">Syndie</a>."
+"Blog: using e.g. the pebble plugin or the distributed blogging software <a "
+"href=\"#app.syndie\">Syndie</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:45
 msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
-"cloud over I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
+"over I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:46
@@ -9393,77 +8360,47 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:49
 msgid ""
-"Unlike web sites hosted within content distribution networks like <a "
-"href=\"#similar.freenet\">Freenet</a> \n"
-"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services "
-"hosted on \n"
-"I2P are fully interactive - there are traditional web-style search "
-"engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and "
-"bridges \n"
-"to query static systems like Freenet without needing to install it "
-"locally."
+"Unlike web sites hosted within content distribution networks like <a href=\"#similar.freenet\">Freenet</a> \n"
+"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services hosted on \n"
+"I2P are fully interactive - there are traditional web-style search engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
+"to query static systems like Freenet without needing to install it locally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:57
 msgid ""
 "With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to "
-"send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes"
-" care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a"
-" \n"
-"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's "
-"anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, "
-"transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high "
-"bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS "
-"proxies \n"
-"available to tie existing applications into the network, their value has "
-"been \n"
-"limited as nearly every application routinely exposes what, in an "
-"anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully "
-"audit \n"
-"an application to ensure proper operation and to assist in that we "
-"provide \n"
-"a series of APIs in various languages which can be used to make the most "
-"out \n"
+"of the message oriented middleware - applications say that they want to send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a \n"
+"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS proxies \n"
+"available to tie existing applications into the network, their value has been \n"
+"limited as nearly every application routinely exposes what, in an anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully audit \n"
+"an application to ensure proper operation and to assist in that we provide \n"
+"a series of APIs in various languages which can be used to make the most out \n"
 "of the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:74
 #, python-format
 msgid ""
-"I2P is not a research project - academic, commercial, or governmental, "
-"but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to "
-"provide \n"
-"a sufficient level of anonymity to those who need it. It has been in "
-"active \n"
-"development since early 2003 with one full time developer and a dedicated"
-" \n"
-"group of part time contributors from all over the world. All of the work "
-"done \n"
-"on I2P is open source and freely available on the <a "
-"href=\"%(site)s\">website</a>, \n"
-"with the majority of the code released outright into the public domain, "
-"though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The "
-"people \n"
-"working on I2P do not control what people release client applications "
-"under, \n"
-"and there are several GPL'ed applications available (<a "
-"href=\"#app.i2ptunnel\">I2PTunnel</a>, \n"
-"<a href=\"#app.i2pmail\">susimail</a>, <a "
-"href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-"
-"Bote</a>, \n"
+"I2P is not a research project - academic, commercial, or governmental, but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
+"a sufficient level of anonymity to those who need it. It has been in active \n"
+"development since early 2003 with one full time developer and a dedicated \n"
+"group of part time contributors from all over the world. All of the work done \n"
+"on I2P is open source and freely available on the <a href=\"%(site)s\">website</a>, \n"
+"with the majority of the code released outright into the public domain, though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The people \n"
+"working on I2P do not control what people release client applications under, \n"
+"and there are several GPL'ed applications available (<a href=\"#app.i2ptunnel\">I2PTunnel</a>, \n"
+"<a href=\"#app.i2pmail\">susimail</a>, <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-Bote</a>, \n"
 "<a href=\"#app.i2phex\">I2Phex</a> and others.).\n"
-"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from "
-"donations,\n"
+"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from donations,\n"
 "and does not receive any tax breaks in any jurisdiction at this time,\n"
 "as many of the developers are themselves anonymous."
 msgstr ""
@@ -9474,40 +8411,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:94
 msgid ""
-"To understand I2P's operation, it is essential to understand a few key "
-"concepts. \n"
-"First, I2P makes a strict separation between the software participating "
-"in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
-" associated \n"
-"with individual applications. The fact that someone is running I2P is not"
-" \n"
-"usually a secret. What is hidden is information on what the user is "
-"doing, \n"
-"if anything at all, as well as what router a particular destination is "
-"connected \n"
-"to. End users will typically have several local destinations on their "
-"router \n"
-"- for instance, one proxying in to IRC servers, another supporting the "
-"user's \n"
-"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, "
-"another for \n"
+"To understand I2P's operation, it is essential to understand a few key concepts. \n"
+"First, I2P makes a strict separation between the software participating in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
+"with individual applications. The fact that someone is running I2P is not \n"
+"usually a secret. What is hidden is information on what the user is doing, \n"
+"if anything at all, as well as what router a particular destination is connected \n"
+"to. End users will typically have several local destinations on their router \n"
+"- for instance, one proxying in to IRC servers, another supporting the user's \n"
+"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, another for \n"
 "torrents, etc."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:107
 msgid ""
 "Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of "
-"routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a "
-"single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
 "The decrypted information contains the IP of the next router, along with\n"
 "the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as "
-"\"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages "
-"back,\n"
+"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages back,\n"
 "another tunnel is required."
 msgstr ""
 
@@ -9527,15 +8451,12 @@ msgid ""
 "while <b>\"inbound\" tunnels</b> bring messages to the tunnel creator.\n"
 "Combining these two tunnels allows users to send messages to each other.\n"
 "The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound "
-"tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user"
-"\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user\n"
 "and will send them on until the endpoint (\"Bob\").\n"
 "The endpoint of the outbound tunnel will need to send the message\n"
 "on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted "
-"message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
 "Once the endpoint of the outbound tunnel decrypts the message,\n"
 "it will have instructions to forward the message to the correct\n"
 "inbound gateway (the gateway to \"Bob\")."
@@ -9543,25 +8464,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:140
 msgid ""
-"A third critical concept to understand is I2P's <b>\"network "
-"database\"</b> (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of "
-"metadata \n"
-"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the "
-"routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, "
-"transport \n"
-"addresses, etc), while the leaseSet gives routers the information "
-"necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of "
-"\"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a "
-"specific destination.\n"
+"A third critical concept to understand is I2P's <b>\"network database\"</b> (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of metadata \n"
+"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, transport \n"
+"addresses, etc), while the leaseSet gives routers the information necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
 "The full information contained in a lease:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:151
-msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
+msgid ""
+"Inbound gateway for a tunnel that allows reaching a specific destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:152
@@ -9576,10 +8491,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:155
 msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while "
-"leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router "
-"with his leaseSets)."
+"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:160
@@ -9590,13 +8503,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:164
 msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in "
-"the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
 "This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the "
-"construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has"
-" been constructed."
+"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has been constructed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:171
@@ -9613,30 +8523,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:178
 msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the"
-" \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
-"gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it "
-"with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on"
-" \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
-"endpoint \n"
-"receives those instructions, it forwards the message as requested, and "
-"when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
-" \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, "
-"she \n"
-"needs to transmit her own destination explicitly as part of the message "
-"itself.\n"
-"This can be done by introducing a higher-level layer, which is done in "
-"the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
+"receives those instructions, it forwards the message as requested, and when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
+"needs to transmit her own destination explicitly as part of the message itself.\n"
+"This can be done by introducing a higher-level layer, which is done in the\n"
 "<a href=\"#app.streaming\">streaming</a> library.\n"
 "Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
-"lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
 "for it when he wants to reply, but this is optional."
 msgstr ""
 
@@ -9654,208 +8553,126 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:200
 msgid ""
-"While the tunnels themselves have layered encryption to prevent "
-"unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself "
-"does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is "
-"necessary \n"
-"to add an additional end to end layer of encryption to hide the message "
-"from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a "
-"href=\"#op.garlic\">garlic \n"
-"encryption</a>\" lets Alice's router wrap up multiple messages into a "
-"single \n"
-"\"garlic message\", encrypted to a particular public key so that "
-"intermediary \n"
-"peers cannot determine either how many messages are within the garlic, "
-"what \n"
-"those messages say, or where those individual cloves are destined. For "
-"typical \n"
-"end to end communication between Alice and Bob, the garlic will be "
-"encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be"
-" \n"
+"While the tunnels themselves have layered encryption to prevent unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
+"to add an additional end to end layer of encryption to hide the message from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a href=\"#op.garlic\">garlic \n"
+"encryption</a>\" lets Alice's router wrap up multiple messages into a single \n"
+"\"garlic message\", encrypted to a particular public key so that intermediary \n"
+"peers cannot determine either how many messages are within the garlic, what \n"
+"those messages say, or where those individual cloves are destined. For typical \n"
+"end to end communication between Alice and Bob, the garlic will be encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be \n"
 "encrypted without giving out the public key to Bob's own router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:215
 msgid ""
-"Another important fact to keep in mind is that I2P is entirely message "
-"based \n"
-"and that some messages may be lost along the way. Applications using I2P "
-"can \n"
-"use the message oriented interfaces and take care of their own congestion"
-" \n"
-"control and reliability needs, but most would be best served by reusing "
-"the \n"
-"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as "
-"a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message based \n"
+"and that some messages may be lost along the way. Applications using I2P can \n"
+"use the message oriented interfaces and take care of their own congestion \n"
+"control and reliability needs, but most would be best served by reusing the \n"
+"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n"
 "based network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:225
 msgid ""
 "Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually "
-"preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that "
-"preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel "
-"participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate "
-"before \n"
-"forward it on to the next peer. Eventually, the message arrives at the "
-"endpoint \n"
-"where the messages are split out again and forwarded on as requested. The"
-" \n"
-"difference arises in what the tunnel's creator does - for inbound "
-"tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers "
-"added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-"
-"decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption "
-"are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate before \n"
+"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
+"where the messages are split out again and forwarded on as requested. The \n"
+"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption are \n"
 "added, the message arrives in the clear at the tunnel endpoint."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:240
 msgid ""
-"The choice of specific peers to pass on messages as well as their "
-"particular \n"
-"ordering is important to understanding both I2P's anonymity and "
-"performance \n"
-"characteristics. While the network database (below) has its own criteria "
-"for \n"
-"picking what peers to query and store entries on, tunnel creators may use"
-" any peers \n"
-"in the network in any order (and even any number of times) in a single "
-"tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and "
-"ordering \n"
-"would be driven by the particular needs of the client in tandem with "
-"their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to "
-"gather \n"
-"anonymously, and depending upon untrusted peers to provide this "
-"information \n"
+"The choice of specific peers to pass on messages as well as their particular \n"
+"ordering is important to understanding both I2P's anonymity and performance \n"
+"characteristics. While the network database (below) has its own criteria for \n"
+"picking what peers to query and store entries on, tunnel creators may use any peers \n"
+"in the network in any order (and even any number of times) in a single tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and ordering \n"
+"would be driven by the particular needs of the client in tandem with their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
+"anonymously, and depending upon untrusted peers to provide this information \n"
 "has its own serious anonymity implications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:253
 msgid ""
-"From an anonymity perspective, the simplest technique would be to pick "
-"peers \n"
-"randomly from the entire network, order them randomly and use those peers"
-" \n"
-"in that order for all eternity. From a performance perspective, the "
-"simplest \n"
-"technique would be to pick the fastest peers with the necessary spare "
-"capacity, \n"
-"spreading the load across different peers to handle transparent failover,"
-" \n"
-"and to rebuild the tunnel whenever capacity information changes. While "
-"the \n"
-"former is both brittle and inefficient, the later requires inaccessible "
-"information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a "
-"range \n"
-"of peer selection strategies, coupled with anonymity aware measurement "
-"code \n"
+"From an anonymity perspective, the simplest technique would be to pick peers \n"
+"randomly from the entire network, order them randomly and use those peers \n"
+"in that order for all eternity. From a performance perspective, the simplest \n"
+"technique would be to pick the fastest peers with the necessary spare capacity, \n"
+"spreading the load across different peers to handle transparent failover, \n"
+"and to rebuild the tunnel whenever capacity information changes. While the \n"
+"former is both brittle and inefficient, the later requires inaccessible information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a range \n"
+"of peer selection strategies, coupled with anonymity aware measurement code \n"
 "to organize the peers by their profiles."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:266
 msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts"
-" \n"
-"with by measuring their indirect behavior - for instance, when a peer "
-"responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
-"the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and "
-"outbound) \n"
-"through which the request and response passed, as well as the queried "
-"peer's \n"
-"profile. Direct measurement, such as transport layer latency or "
-"congestion, \n"
-"is not used as part of the profile, as it can be manipulated and "
-"associated \n"
-"with the measuring router, exposing them to trivial attacks. While "
-"gathering \n"
-"these profiles, a series of calculations are run on each to summarize its"
-" \n"
-"performance - its latency, capacity to handle lots of activity, whether "
-"they \n"
-"are currently overloaded, and how well integrated into the network they "
-"seem \n"
-"to be. These calculations are then compared for active peers to organize "
-"the \n"
-"routers into four tiers - fast and high capacity, high capacity, not "
-"failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, "
-"and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts \n"
+"with by measuring their indirect behavior - for instance, when a peer responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
+"through which the request and response passed, as well as the queried peer's \n"
+"profile. Direct measurement, such as transport layer latency or congestion, \n"
+"is not used as part of the profile, as it can be manipulated and associated \n"
+"with the measuring router, exposing them to trivial attacks. While gathering \n"
+"these profiles, a series of calculations are run on each to summarize its \n"
+"performance - its latency, capacity to handle lots of activity, whether they \n"
+"are currently overloaded, and how well integrated into the network they seem \n"
+"to be. These calculations are then compared for active peers to organize the \n"
+"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, and \n"
 "while they currently use fairly simple algorithms, alternatives exist."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:284
 msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy "
-"is to\n"
-"pick peers randomly from the top tier (fast and high capacity), and this "
-"is\n"
-"currently deployed for client tunnels. Exploratory tunnels (used for "
-"netDb and\n"
-"tunnel management) pick peers randomly from the \"not failing\" tier "
-"(which\n"
+"Using this profile data, the simplest reasonable peer selection strategy is to\n"
+"pick peers randomly from the top tier (fast and high capacity), and this is\n"
+"currently deployed for client tunnels. Exploratory tunnels (used for netDb and\n"
+"tunnel management) pick peers randomly from the \"not failing\" tier (which\n"
 "includes routers in 'better' tiers as well), allowing the peer to sample\n"
-"routers more widely, in effect optimizing the peer selection through "
-"randomized\n"
-"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill "
-"climbing</a>. These\n"
+"routers more widely, in effect optimizing the peer selection through randomized\n"
+"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill climbing</a>. These\n"
 "strategies alone do however leak information regarding the peers in the\n"
-"router's top tier through predecessor and netDb harvesting attacks. In "
-"turn,\n"
-"several alternatives exist which, while not balancing the load as evenly,"
-" will\n"
+"router's top tier through predecessor and netDb harvesting attacks. In turn,\n"
+"several alternatives exist which, while not balancing the load as evenly, will\n"
 "address the attacks mounted by particular classes of adversaries."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:298
 msgid ""
-"By picking a random key and ordering the peers according to their XOR "
-"distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting "
-"attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple"
-" \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the "
-"inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
-"deal \n"
-"with predecessor attacks for adversaries which the client contacts, the "
-"outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to "
-"fix \n"
-"on the most exposed point would of course need to have a limit to the "
-"duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted "
-"or \n"
-"proactively avoided to mimic a measured mean time between failures of "
-"other \n"
-"routers. These two strategies can in turn be combined, using a fixed "
-"exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more "
-"rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, "
-"only \n"
-"using individual peers if all of them agree to participate in the same "
-"way \n"
-"each time. This varies from the XOR based ordering in that the "
-"predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes "
-"sure \n"
+"By picking a random key and ordering the peers according to their XOR distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
+"with predecessor attacks for adversaries which the client contacts, the outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
+"on the most exposed point would of course need to have a limit to the duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted or \n"
+"proactively avoided to mimic a measured mean time between failures of other \n"
+"routers. These two strategies can in turn be combined, using a fixed exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
+"using individual peers if all of them agree to participate in the same way \n"
+"each time. This varies from the XOR based ordering in that the predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes sure \n"
 "their order doesn't change."
 msgstr ""
 
@@ -9864,10 +8681,8 @@ msgstr ""
 msgid ""
 "As mentioned before, I2P currently (release 0.8) includes the tiered \n"
 "random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, "
-"management, \n"
-"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel "
-"spec</a>."
+"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
+"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:326
@@ -9881,27 +8696,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:332
 msgid ""
 "A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast "
-"enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing "
-"floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
 "drops too low."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:339
 #, python-format
 msgid ""
-"Other I2P routers will store their data and lookup data by sending simple"
-" 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the "
-"information to other floodfill routers\n"
-"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia "
-"algorithm</a>.\n"
-"The 'lookup' queries currently function differently, to avoid an "
-"important\n"
+"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
+"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algorithm</a>.\n"
+"The 'lookup' queries currently function differently, to avoid an important\n"
 "<a href=\"%(netdb)s#lookup\">security issue</a>.\n"
-"When a lookup is done, the floodfill router will not forward the lookup "
-"to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
 "but will always answer by itself (if it has the requested data)."
 msgstr ""
 
@@ -9911,8 +8719,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:353
 msgid ""
-"A <b>RouterInfo</b> stores information on a specific I2P router and how "
-"to contact it"
+"A <b>RouterInfo</b> stores information on a specific I2P router and how to "
+"contact it"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:354
@@ -9923,14 +8731,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:356
 msgid ""
-"All of this information is signed by the publishing party and verified by"
-" any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of "
-"old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the "
-"correct time, occasionally querying some SNTP servers \n"
-"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by"
-" default)\n"
+"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
+"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n"
 "and detecting skew between routers at the transport layer."
 msgstr ""
 
@@ -9945,10 +8749,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:370
 msgid ""
 "One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will"
-" however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
-" decoded by people with access to the decryption key."
+"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:377
@@ -9957,13 +8759,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:378
 msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive"
-" a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
 "it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to "
-"make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo "
-"files and bootstrap."
+"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:386
@@ -9973,26 +8772,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:387
 msgid ""
 "Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very "
-"large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will"
-" be present\n"
-"on each netDb router. This will cause a deterioration of the percentage "
-"of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next "
-"releases."
+"Currently, this is not a major problem, since the network is not very large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
+"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next releases."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:398
 msgid ""
-"Communication between routers needs to provide confidentiality and "
-"integrity \n"
-"against external adversaries while authenticating that the router "
-"contacted \n"
-"is the one who should receive a given message. The particulars of how "
-"routers \n"
-"communicate with other routers aren't critical - three separate protocols"
-" \n"
+"Communication between routers needs to provide confidentiality and integrity \n"
+"against external adversaries while authenticating that the router contacted \n"
+"is the one who should receive a given message. The particulars of how routers \n"
+"communicate with other routers aren't critical - three separate protocols \n"
 "have been used at different points to provide those bare necessities."
 msgstr ""
 
@@ -10000,12 +8791,9 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree "
-"communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved"
-" \n"
-"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - "
-"\"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved \n"
+"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n"
 "Semireliable UDP\", or \"SSU\"."
 msgstr ""
 
@@ -10017,46 +8805,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:418
 msgid ""
 "The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal "
-"amount \n"
-"of data easily discernible to third parties. It should support high "
-"degree \n"
-"communication as well as TCP-friendly congestion control and may include"
-" \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at "
-"rates \n"
-"sufficient for home users. In addition, it should support techniques for "
-"addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal amount \n"
+"of data easily discernible to third parties. It should support high degree \n"
+"communication as well as TCP-friendly congestion control and may include \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
+"sufficient for home users. In addition, it should support techniques for addressing \n"
 "network obstacles, like most NATs or firewalls."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:428
 #, python-format
 msgid ""
-"Following the introduction of SSU, after issues with congestion collapse"
-" \n"
-"appeared, a new NIO-based TCP transport called <a "
-"href=\"%(ntcp)s\">NTCP</a> \n"
-"was implemented. It is enabled by default for outbound connections only. "
-"Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify"
-" \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
-"inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
-" \n"
+"Following the introduction of SSU, after issues with congestion collapse \n"
+"appeared, a new NIO-based TCP transport called <a href=\"%(ntcp)s\">NTCP</a> \n"
+"was implemented. It is enabled by default for outbound connections only. Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
 "per connection issues of the old TCP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:438
 msgid ""
 "I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids"
-" for \n"
-"the connection and the relative value of these bids assigns the priority."
-" \n"
-"Transports may reply with different bids, depending on whether there is "
-"already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids for \n"
+"the connection and the relative value of these bids assigns the priority. \n"
+"Transports may reply with different bids, depending on whether there is already \n"
 "an established connection to the peer."
 msgstr ""
 
@@ -10064,38 +8838,25 @@ msgstr ""
 #, python-format
 msgid ""
 "The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both "
-"outbound \n"
-"and inbound connections. Your firewall and your I2P router must be "
-"configured \n"
-"to allow inbound NTCP connections. For further information see the <a "
-"href=\"%(ntcp)s\">NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both outbound \n"
+"and inbound connections. Your firewall and your I2P router must be configured \n"
+"to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n"
 "page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:455
 msgid ""
 "A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the "
-"lowest \n"
-"level, inter router communication is protected by the transport layer "
-"security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
-"MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
-"2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other"
-" \n"
-"router's DSA key, plus each network message has their own hash for local "
-"integrity \n"
-"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the "
-"transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and "
-"verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other "
-"messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with "
-"ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
+"level, inter router communication is protected by the transport layer security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other \n"
+"router's DSA key, plus each network message has their own hash for local integrity \n"
+"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
 "(explained below)."
 msgstr ""
 
@@ -10105,51 +8866,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:471
 msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, "
-"allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully "
-"formed \n"
-"messages alongside their own instructions for delivery. Messages are "
-"wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in "
-"cleartext \n"
-"through a peer who should not have access to the information - for "
-"instance, \n"
-"when a router wants to ask another router to participate in a tunnel, "
-"they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving "
-"router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another "
-"example \n"
-"is when a client wants to send a message to a destination - the sender's "
-"router \n"
-"will wrap up that data message (alongside some other messages) into a "
-"garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the "
-"recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
+"messages alongside their own instructions for delivery. Messages are wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in cleartext \n"
+"through a peer who should not have access to the information - for instance, \n"
+"when a router wants to ask another router to participate in a tunnel, they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
+"is when a client wants to send a message to a destination - the sender's router \n"
+"will wrap up that data message (alongside some other messages) into a garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
 "leaseSet, and forward it through the appropriate tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:486
 msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer "
-"includes \n"
-"the ability to request that the clove be forwarded locally, to a remote "
-"router, \n"
-"or to a remote tunnel on a remote router. There are fields in those "
-"instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain "
-"time \n"
-"or condition has been met, though they won't be honored until the <a "
-"href=\"#future.variablelatency\">nontrivial \n"
-"delays</a> are deployed. It is possible to explicitly route garlic "
-"messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel "
-"messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops "
-"prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques "
-"are \n"
+"The \"instructions\" attached to each clove inside the encryption layer includes \n"
+"the ability to request that the clove be forwarded locally, to a remote router, \n"
+"or to a remote tunnel on a remote router. There are fields in those instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain time \n"
+"or condition has been met, though they won't be honored until the <a href=\"#future.variablelatency\">nontrivial \n"
+"delays</a> are deployed. It is possible to explicitly route garlic messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques are \n"
 "not currently used in the existing implementation."
 msgstr ""
 
@@ -10159,54 +8900,35 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:500
 msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple "
-"combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data "
-"confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred"
-" \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
-"describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
 "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:539
 msgid ""
-"Session tags themselves have a very short lifetime, after which they are"
-" \n"
-"discarded if not used. In addition, the quantity stored for each key is "
-"limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or "
-"old \n"
-"messages may be dropped. The sender keeps track whether messages using "
-"session \n"
-"tags are getting through, and if there isn't sufficient communication it "
-"may \n"
-"drop the ones previously assumed to be properly delivered, reverting back"
-" \n"
+"Session tags themselves have a very short lifetime, after which they are \n"
+"discarded if not used. In addition, the quantity stored for each key is limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or old \n"
+"messages may be dropped. The sender keeps track whether messages using session \n"
+"tags are getting through, and if there isn't sufficient communication it may \n"
+"drop the ones previously assumed to be properly delivered, reverting back \n"
 "to the full expensive ElGamal encryption."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:549
 msgid ""
-"One alternative is to transmit only a single session tag, and from that,"
-" \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By "
-"keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the "
-"recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of "
-"periodically \n"
-"bundling a large number of tags is removed, allowing more options in the "
-"space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions "
-"necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the "
-"necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount"
-" \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the "
-"moment, \n"
+"One alternative is to transmit only a single session tag, and from that, \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
+"bundling a large number of tags is removed, allowing more options in the space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
 "there are no immediate plans to move towards these synchronized PRNGs."
 msgstr ""
 
@@ -10216,12 +8938,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:563
 msgid ""
-"While I2P is currently functional and sufficient for many scenarios, "
-"there \n"
-"are several areas which require further improvement to meet the needs of "
-"those \n"
-"facing more powerful adversaries as well as substantial user experience "
-"optimization."
+"While I2P is currently functional and sufficient for many scenarios, there \n"
+"are several areas which require further improvement to meet the needs of those \n"
+"facing more powerful adversaries as well as substantial user experience optimization."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:569
@@ -10230,106 +8949,64 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:570
 msgid ""
-"I2P is an overlay network designed to be run on top of a functional "
-"packet \n"
-"switched network, exploiting the end to end principle to offer anonymity "
-"and \n"
-"security. While the Internet no longer fully embraces the end to end "
-"principle\n"
+"I2P is an overlay network designed to be run on top of a functional packet \n"
+"switched network, exploiting the end to end principle to offer anonymity and \n"
+"security. While the Internet no longer fully embraces the end to end principle\n"
 "(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - "
-"there \n"
-"may be a number of peers along the edges running using restricted routes,"
-" \n"
-"but I2P does not include an appropriate routing algorithm for the "
-"degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a"
-" \n"
+"I2P does require a substantial portion of the network to be reachable - there \n"
+"may be a number of peers along the edges running using restricted routes, \n"
+"but I2P does not include an appropriate routing algorithm for the degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a \n"
 "network employing such an algorithm."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:582
 msgid ""
-"Restricted route operation, where there are limits to what peers are "
-"reachable \n"
-"directly, has several different functional and anonymity implications, "
-"dependent \n"
-"upon how the restricted routes are handled. At the most basic level, "
-"restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow"
-" \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
-"integrating \n"
-"distributed hole punching into the transport layer, allowing people "
-"behind \n"
-"most NATs and firewalls to receive unsolicited connections without any "
-"configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to "
-"routers \n"
-"inside the network, as they can simply get introduced to the peer through"
-" \n"
+"Restricted route operation, where there are limits to what peers are reachable \n"
+"directly, has several different functional and anonymity implications, dependent \n"
+"upon how the restricted routes are handled. At the most basic level, restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
+"distributed hole punching into the transport layer, allowing people behind \n"
+"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to routers \n"
+"inside the network, as they can simply get introduced to the peer through \n"
 "the published introducer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:595
 msgid ""
-"Beyond the functional handling of restricted routes, there are two levels"
-" \n"
-"of restricted operation that can be used to limit the exposure of one's "
-"IP \n"
-"address - using router-specific tunnels for communication, and offering "
-"'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels "
-"or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of "
-"them \n"
-"as part of their routerInfo in place of their transport addresses. When a"
-" \n"
-"peer wants to get in touch with them, they see those tunnel gateways in "
-"the \n"
-"netDb and simply send the relevant message to them through one of the "
-"published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may "
-"do \n"
-"so either directly (if they are willing to expose their IP to the peer) "
-"or \n"
-"indirectly through their outbound tunnels. When the routers that the peer"
-" \n"
-"has direct connections to want to reach it (to forward tunnel messages, "
-"for \n"
-"instance), they simply prioritize their direct connection over the "
-"published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the "
-"restricted \n"
-"route by not publishing any router addresses. Such a router would not "
-"even \n"
-"need to publish their routerInfo in the netDb, merely providing their "
-"self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the "
-"router's \n"
-"public keys). Both levels of restricted route operation are planned for "
-"I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels \n"
+"of restricted operation that can be used to limit the exposure of one's IP \n"
+"address - using router-specific tunnels for communication, and offering 'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
+"as part of their routerInfo in place of their transport addresses. When a \n"
+"peer wants to get in touch with them, they see those tunnel gateways in the \n"
+"netDb and simply send the relevant message to them through one of the published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
+"so either directly (if they are willing to expose their IP to the peer) or \n"
+"indirectly through their outbound tunnels. When the routers that the peer \n"
+"has direct connections to want to reach it (to forward tunnel messages, for \n"
+"instance), they simply prioritize their direct connection over the published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
+"route by not publishing any router addresses. Such a router would not even \n"
+"need to publish their routerInfo in the netDb, merely providing their self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
+"public keys). Both levels of restricted route operation are planned for I2P \n"
 "2.0."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:617
 msgid ""
-"There are tradeoffs for those behind restricted routes, as they would "
-"likely \n"
-"participate in other people's tunnels less frequently, and the routers "
-"which \n"
-"they are connected to would be able to infer traffic patterns that would "
-"not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is "
-"less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, "
-"of \n"
-"course, assumes that the peers that the router behind a restricted route "
-"contacts \n"
-"are not hostile - either the network is large enough that the probability"
-" \n"
-"of using a hostile peer to get connected is small enough, or trusted (and"
-" \n"
+"There are tradeoffs for those behind restricted routes, as they would likely \n"
+"participate in other people's tunnels less frequently, and the routers which \n"
+"they are connected to would be able to infer traffic patterns that would not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, of \n"
+"course, assumes that the peers that the router behind a restricted route contacts \n"
+"are not hostile - either the network is large enough that the probability \n"
+"of using a hostile peer to get connected is small enough, or trusted (and \n"
 "perhaps temporary) peers are used instead."
 msgstr ""
 
@@ -10339,45 +9016,28 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:630
 msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency "
-"communication, \n"
-"it was designed with variable latency services in mind from the "
-"beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the"
-" \n"
-"anonymity of medium and high latency communication while still blending "
-"their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can "
-"offer \n"
-"its own medium and high latency communication through the garlic "
-"encryption \n"
-"- specifying that the message should be sent after a certain delay, at a "
-"certain \n"
-"time, after a certain number of messages have passed, or another mix "
-"strategy. \n"
-"With the layered encryption, only the router that the clove exposed the "
-"delay \n"
-"request would know that the message requires high latency, allowing the "
-"traffic \n"
-"to blend in further with the low latency traffic. Once the transmission "
-"precondition \n"
-"is met, the router holding on to the clove (which itself would likely be "
-"a \n"
-"garlic message) simply forwards it as requested - to a router, to a "
-"tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
+"it was designed with variable latency services in mind from the beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the \n"
+"anonymity of medium and high latency communication while still blending their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
+"its own medium and high latency communication through the garlic encryption \n"
+"- specifying that the message should be sent after a certain delay, at a certain \n"
+"time, after a certain number of messages have passed, or another mix strategy. \n"
+"With the layered encryption, only the router that the clove exposed the delay \n"
+"request would know that the message requires high latency, allowing the traffic \n"
+"to blend in further with the low latency traffic. Once the transmission precondition \n"
+"is met, the router holding on to the clove (which itself would likely be a \n"
+"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
 "or, most likely, to a remote client destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:647
 msgid ""
-"There are a substantial number of ways to exploit this capacity for high"
-" \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for "
-"the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
-" \n"
-"latency comm can offer should look towards the application layer to "
-"provide \n"
+"There are a substantial number of ways to exploit this capacity for high \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
+"latency comm can offer should look towards the application layer to provide \n"
 "it."
 msgstr ""
 
@@ -10411,18 +9071,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:665
 msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware,"
-" \n"
-"the topology of DHTs, the anonymity and cryptography of free route "
-"mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not "
-"from \n"
-"novel concepts of algorithms though, but from careful engineering "
-"combining \n"
-"the research results of existing systems and papers. While there are a "
-"few \n"
-"similar efforts worth reviewing, both for technical and functional "
-"comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware, \n"
+"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not from \n"
+"novel concepts of algorithms though, but from careful engineering combining \n"
+"the research results of existing systems and papers. While there are a few \n"
+"similar efforts worth reviewing, both for technical and functional comparisons, \n"
 "two in particular are pulled out here - Tor and Freenet."
 msgstr ""
 
@@ -10439,209 +9093,127 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:682
 msgid ""
 "At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the "
-"early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing "
-"and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an "
-"essentially \n"
-"trusted, centralized system with directory servers, I2P has a self "
-"organizing \n"
-"network database with each peer taking on the responsibility of profiling"
-" \n"
-"other routers to determine how best to exploit available resources. "
-"Another \n"
-"key difference is that while both I2P and Tor use layered and ordered "
-"paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
-"network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to "
-"transparently \n"
-"route around congestion or other network failures, operate redundant "
-"pathways, \n"
-"and load balance the data across available resources. While Tor offers "
-"the \n"
-"useful outproxy functionality by offering integrated outproxy discovery "
-"and \n"
-"selection, I2P leaves such application layer decisions up to applications"
-" \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like "
-"streaming \n"
-"library itself to the application layer, allowing developers to "
-"experiment \n"
-"with different strategies, exploiting their domain specific knowledge to "
-"offer \n"
+"similarities. While I2P's development began before we were aware of the early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
+"trusted, centralized system with directory servers, I2P has a self organizing \n"
+"network database with each peer taking on the responsibility of profiling \n"
+"other routers to determine how best to exploit available resources. Another \n"
+"key difference is that while both I2P and Tor use layered and ordered paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
+"route around congestion or other network failures, operate redundant pathways, \n"
+"and load balance the data across available resources. While Tor offers the \n"
+"useful outproxy functionality by offering integrated outproxy discovery and \n"
+"selection, I2P leaves such application layer decisions up to applications \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
+"library itself to the application layer, allowing developers to experiment \n"
+"with different strategies, exploiting their domain specific knowledge to offer \n"
 "better performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:703
 msgid ""
-"From an anonymity perspective, there is much similarity when the core "
-"networks \n"
-"are compared. However, there are a few key differences. When dealing with"
-" \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels"
-" \n"
-"expose half as much traffic data than would be exposed with Tor's duplex "
-"circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response "
-"would \n"
-"follow the same path in Tor, while in I2P the packets making up the "
-"request \n"
-"would go out through one or more outbound tunnels and the packets making "
-"up \n"
-"the response would come back through one or more different inbound "
-"tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently "
-"address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be "
-"necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same "
-"routers."
+"From an anonymity perspective, there is much similarity when the core networks \n"
+"are compared. However, there are a few key differences. When dealing with \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
+"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response would \n"
+"follow the same path in Tor, while in I2P the packets making up the request \n"
+"would go out through one or more outbound tunnels and the packets making up \n"
+"the response would come back through one or more different inbound tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same routers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:717
 msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel "
-"creation, \n"
-"as simple packet counting and timing measurements as the cells in a "
-"circuit \n"
-"pass through an adversary's node exposes statistical information "
-"regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel "
-"creation \n"
-"with a single message so that this data is not exposed. Protecting the "
-"position \n"
-"in a tunnel is important, as an adversary would otherwise be able to "
-"mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation "
-"attacks."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
+"as simple packet counting and timing measurements as the cells in a circuit \n"
+"pass through an adversary's node exposes statistical information regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
+"with a single message so that this data is not exposed. Protecting the position \n"
+"in a tunnel is important, as an adversary would otherwise be able to mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:727
 msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-"
-"trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will "
-"not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
 "offer this topology until <a href=\"#future.restricted\">2.0</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:733
 msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor "
-"works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P "
-"works \n"
-"towards offering a decentralized resilient network in itself. In theory, "
-"both \n"
-"can be used to achieve both purposes, but given limited development "
-"resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have "
-"considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but "
-"concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet "
-"switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P works \n"
+"towards offering a decentralized resilient network in itself. In theory, both \n"
+"can be used to achieve both purposes, but given limited development resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
 "architecture will be able to exploit scarce resources more effectively."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:747
 msgid ""
-"Freenet played a large part in the initial stages of I2P's design - "
-"giving \n"
-"proof to the viability of a vibrant pseudonymous community completely "
-"contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies"
-" \n"
-"could be avoided. The first seed of I2P began as a replacement "
-"communication \n"
-"layer for Freenet, attempting to factor out the complexities of a "
-"scalable, \n"
-"anonymous and secure point to point communication from the complexities "
-"of \n"
-"a censorship resistant distributed data store. Over time however, some of"
-" \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms "
-"made \n"
-"it clear that I2P's focus should stay strictly on providing a generic "
-"anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the "
-"years, \n"
-"the Freenet developers have come to see the weaknesses in the older "
-"design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to "
-"offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a "
-"mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
-"through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data "
-"according \n"
+"Freenet played a large part in the initial stages of I2P's design - giving \n"
+"proof to the viability of a vibrant pseudonymous community completely contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies \n"
+"could be avoided. The first seed of I2P began as a replacement communication \n"
+"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
+"anonymous and secure point to point communication from the complexities of \n"
+"a censorship resistant distributed data store. Over time however, some of \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
+"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the years, \n"
+"the Freenet developers have come to see the weaknesses in the older design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
 "to Freenet's heuristic distributed data storage algorithms."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:766
 msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet "
-"natively \n"
-"provides many of the tools for operating medium and high latency systems,"
-" \n"
-"while I2P natively provides the low latency mix network suitable for "
-"offering \n"
-"adequate anonymity. The logic of separating the mixnet from the "
-"censorship-\n"
-"resistant distributed data store still seems self-evident from an "
-"engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully "
-"the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing"
-" \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
+"provides many of the tools for operating medium and high latency systems, \n"
+"while I2P natively provides the low latency mix network suitable for offering \n"
+"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
+"resistant distributed data store still seems self-evident from an engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing \n"
 "(or helping to improve, as necessary) existing mixnets like I2P or Tor."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:777
 msgid ""
 "It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using "
-"restricted \n"
-"routes between peers of various trust. While insufficient information has"
-" \n"
-"been made publicly available regarding how such a system would operate "
-"for \n"
-"a full review, from what has been said the anonymity and scalability "
-"claims \n"
-"seem highly dubious. In particular, the appropriateness for use in "
-"hostile \n"
-"regimes against state level adversaries has been tremendously overstated,"
-" \n"
-"and any analysis on the implications of resource scarcity upon the "
-"scalability \n"
-"of the network has seemingly been avoided. Further questions regarding "
-"susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth"
-" \n"
-"review of this \"globally scalable darknet\" will have to wait until the "
-"Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
+"routes between peers of various trust. While insufficient information has \n"
+"been made publicly available regarding how such a system would operate for \n"
+"a full review, from what has been said the anonymity and scalability claims \n"
+"seem highly dubious. In particular, the appropriateness for use in hostile \n"
+"regimes against state level adversaries has been tremendously overstated, \n"
+"and any analysis on the implications of resource scarcity upon the scalability \n"
+"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
+"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
 "team makes more information available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:793
 msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote "
-"destinations \n"
-"and receives messages targeting local destinations - most of the "
-"interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an "
-"anonymous \n"
-"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming"
-" library</a> \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. "
-"Beyond \n"
-"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP "
-"proxying \n"
-"system for either getting into or out of the I2P network, plus a variety "
-"of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
+"and receives messages targeting local destinations - most of the interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
+"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming library</a> \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
+"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP proxying \n"
+"system for either getting into or out of the I2P network, plus a variety of \n"
 "network applications provide further functionality for end users."
 msgstr ""
 
@@ -10651,51 +9223,34 @@ msgstr "Biblioteka strumieniowania"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:805
 msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface "
-"(mirroring TCP sockets),\n"
-"and the implementation supports a <a "
-"href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding "
-"window protocol</a>\n"
-"with several optimizations, to take into account the high delay over I2P."
-"\n"
+"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
+"and the implementation supports a <a href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding window protocol</a>\n"
+"with several optimizations, to take into account the high delay over I2P.\n"
 "Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable "
-"tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the "
-"latency \n"
+"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the latency \n"
 "of multiple messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:815
 msgid ""
 "In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering "
-"messages \n"
-"has been optimized to allow individual messages passed to contain as much"
-" \n"
-"information as is available. For instance, a small HTTP transaction "
-"proxied \n"
-"through the streaming library can be completed in a single round trip - "
-"the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request "
-"typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
-" \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell "
-"the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
-"can \n"
+"messages, the streaming library's protocol for scheduling and delivering messages \n"
+"has been optimized to allow individual messages passed to contain as much \n"
+"information as is available. For instance, a small HTTP transaction proxied \n"
+"through the streaming library can be completed in a single round trip - the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
 "deliver the full response to the browser immediately."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:828
 msgid ""
-"On the whole, however, the streaming library bears much resemblance to an"
-" \n"
-"abstraction of TCP, with its sliding windows, congestion control "
-"algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior "
-"(ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an \n"
+"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
 "SYN, FIN, RST, etc)."
 msgstr ""
 
@@ -10725,227 +9280,142 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:842
 msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning"
-" \n"
-"with advocates across the spectrum of possibilities. However, given I2P's"
-" \n"
-"inherent demand for secure communication and decentralized operation, the"
-" \n"
-"traditional DNS-style naming system is clearly out, as are \"majority "
-"rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a "
-"base \n"
-"implementation designed to work off a local name to destination mapping, "
-"as \n"
-"well as an optional add-on application called the \"Address Book\". The "
-"address book \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming "
-"system, \n"
-"sacrificing only the call for all human readable names to be globally "
-"unique \n"
-"by mandating only local uniqueness. While all messages in I2P are "
-"cryptographically \n"
-"addressed by their destination, different people can have local address "
-"book \n"
-"entries for \"Alice\" which refer to different destinations. People can "
-"still \n"
-"discover new names by importing published address books of peers "
-"specified \n"
-"in their web of trust, by adding in the entries provided through a third "
-"party, \n"
-"or (if some people organize a series of published address books using a "
-"first \n"
-"come first serve registration system) people can choose to treat these "
-"address books \n"
+"Naming within I2P has been an oft-debated topic since the very beginning \n"
+"with advocates across the spectrum of possibilities. However, given I2P's \n"
+"inherent demand for secure communication and decentralized operation, the \n"
+"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a base \n"
+"implementation designed to work off a local name to destination mapping, as \n"
+"well as an optional add-on application called the \"Address Book\". The address book \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
+"sacrificing only the call for all human readable names to be globally unique \n"
+"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
+"addressed by their destination, different people can have local address book \n"
+"entries for \"Alice\" which refer to different destinations. People can still \n"
+"discover new names by importing published address books of peers specified \n"
+"in their web of trust, by adding in the entries provided through a third party, \n"
+"or (if some people organize a series of published address books using a first \n"
+"come first serve registration system) people can choose to treat these address books \n"
 "as name servers, emulating traditional DNS."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:862
 msgid ""
 "I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations "
-"have \n"
-"no value. DNSsec itself still falls back on registrars and certificate "
-"authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or "
-"the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, "
-"and \n"
-"a destination itself is just a pair of public keys and a certificate. "
-"DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup "
-"path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a "
-"certificate \n"
-"authenticating the responses as signed by some centralized certificate "
-"authority \n"
-"would address many of the hostile nameserver issues but would leave open "
-"replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations have \n"
+"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, and \n"
+"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
+"authenticating the responses as signed by some centralized certificate authority \n"
+"would address many of the hostile nameserver issues but would leave open replay \n"
 "attacks as well as hostile certificate authority attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:876
 msgid ""
-"Voting style naming is dangerous as well, especially given the "
-"effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an"
-" \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a "
-"given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as"
-" \n"
-"the network grows the load required to contact everyone to conduct online"
-" \n"
-"voting is implausible, or if the full network is not queried, different "
-"sets \n"
+"Voting style naming is dangerous as well, especially given the effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as \n"
+"the network grows the load required to contact everyone to conduct online \n"
+"voting is implausible, or if the full network is not queried, different sets \n"
 "of answers may be reachable."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:886
 msgid ""
-"As with the Internet however, I2P is keeping the design and operation of"
-" \n"
-"a naming system out of the (IP-like) communication layer. The bundled "
-"naming \n"
-"library includes a simple service provider interface which alternate "
-"naming \n"
-"systems can plug into, allowing end users to drive what sort of naming "
-"tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of \n"
+"a naming system out of the (IP-like) communication layer. The bundled naming \n"
+"library includes a simple service provider interface which alternate naming \n"
+"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
 "they prefer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:895
 msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which"
-"\n"
-"is distributed separately. For more information see the <a "
-"href=\"http://syndie.i2p2.de/\">Syndie</a>\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
+"is distributed separately. For more information see the <a href=\"http://syndie.i2p2.de/\">Syndie</a>\n"
 "pages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:901
 msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content "
-"aggregation \n"
-"system. It lets you create information, share it with others, and read "
-"posts \n"
-"from those you're interested in, all while taking into consideration your"
-" \n"
-"needs for security and anonymity. Rather than building its own content "
-"distribution \n"
-"network, Syndie is designed to run on top of existing networks, "
-"syndicating \n"
-"content through I2P Sites, Tor hidden services, Freenet freesites, normal"
-" websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
-"Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or "
-"archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
+"system. It lets you create information, share it with others, and read posts \n"
+"from those you're interested in, all while taking into consideration your \n"
+"needs for security and anonymity. Rather than building its own content distribution \n"
+"network, Syndie is designed to run on top of existing networks, syndicating \n"
+"content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
 "it."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:916
 msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client "
-"application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel"
-" \n"
-"can be viewed as four separate proxying applications - a \"client\" which"
-" receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an "
-"\"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
-"requests to \n"
-"the appropriate I2P destination (after querying the naming service if "
-"necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a "
-"destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which "
-"extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer "
-"operation. \n"
-"There is an additional \"socksclient\" application, but its use is not "
-"encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
+"can be viewed as four separate proxying applications - a \"client\" which receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
+"the appropriate I2P destination (after querying the naming service if necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
+"There is an additional \"socksclient\" application, but its use is not encouraged \n"
 "for reasons previously mentioned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:930
 msgid ""
-"I2P itself is not an outproxy network - the anonymity and security "
-"concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have "
-"kept \n"
-"I2P's design focused on providing an anonymous network which capable of "
-"meeting \n"
-"the user's needs without requiring external resources. However, the "
-"I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the "
-"hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-"
-"provided \n"
-"set of outproxies and forwards the request to them. These destinations "
-"are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have "
-"explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running "
-"an \n"
-"outproxy doesn't automatically tell other people to proxy through you. "
-"While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of "
-"concept \n"
-"for using I2P and provide some functionality under a threat model which "
-"may \n"
+"I2P itself is not an outproxy network - the anonymity and security concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have kept \n"
+"I2P's design focused on providing an anonymous network which capable of meeting \n"
+"the user's needs without requiring external resources. However, the I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
+"set of outproxies and forwards the request to them. These destinations are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running an \n"
+"outproxy doesn't automatically tell other people to proxy through you. While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
+"for using I2P and provide some functionality under a threat model which may \n"
 "be sufficient for some users."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:946
 msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" "
-"pointing \n"
-"at a webserver lets anyone run their own anonymous website (or \"I2P "
-"Site\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can"
-" \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously "
-"hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their "
-"local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. "
-"End \n"
-"users also have \"client\" tunnels pointing at <a "
-"href=\"#app.i2pmail\">I2Pmail's</a> \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
-" pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
-"I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run "
-"\"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
+"at a webserver lets anyone run their own anonymous website (or \"I2P Site\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
+"users also have \"client\" tunnels pointing at <a href=\"#app.i2pmail\">I2Pmail's</a> \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run \"client\" \n"
 "proxies to access the \"server\" instances pointing at an NNTP server."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:963
 msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the"
-" \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded "
-"through \n"
-"the eepproxy to I2P Sites specified in the torrent file while tracker "
-"responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open "
-"up \n"
-"a <a href=\"#app.streaming\">streaming lib</a> connection to query them "
-"for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
+"the eepproxy to I2P Sites specified in the torrent file while tracker responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
+"a <a href=\"#app.streaming\">streaming lib</a> connection to query them for \n"
 "blocks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:972
 msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
-" \n"
-"a few modifications as necessary to strip any anonymity-compromising "
-"information \n"
-"from the application and to take into consideration the fact that IPs "
-"cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
+"a few modifications as necessary to strip any anonymity-compromising information \n"
+"from the application and to take into consideration the fact that IPs cannot \n"
 "be used for identifying peers."
 msgstr ""
 
@@ -10958,10 +9428,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:986
 msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous "
-"BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality "
-"through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality through \n"
 "a plain HTML web interface."
 msgstr ""
 
@@ -10969,9 +9437,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Robert is a Bittorrent client written in Python.\n"
-"It is hosted on <a "
-"href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- "
-"TODO: expand -->"
+"It is hosted on <a href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- TODO: expand -->"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1003
@@ -10983,12 +9449,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1011
 msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
-" \n"
-"run entirely on top of I2P. While it has disabled some of Phex's "
-"functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and "
-"chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
+"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
 "system is fully functional."
 msgstr ""
 
@@ -11001,62 +9464,39 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:1029
 #, python-format
 msgid ""
-"I2Pmail is more a service than an application - postman offers both "
-"internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances"
-" \n"
-"accessing a series of components developed with mastiejaner, allowing "
-"people \n"
-"to use their preferred mail clients to send and receive mail "
-"pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information,"
-" \n"
-"I2P bundles susi23's web based susimail client which has been built "
-"specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
-"transparent \n"
-"virus filtering as well as denial of service prevention with hashcash "
-"augmented \n"
-"quotas. In addition, each user has control of their batching strategy "
-"prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the "
-"mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate "
-"with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
-"those \n"
-"non-anonymous locations does not give access to the mail accounts or "
-"activity \n"
-"patterns of the user. At the moment the developers work on a "
-"decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the I2P "
-"Site \n"
+"I2Pmail is more a service than an application - postman offers both internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances \n"
+"accessing a series of components developed with mastiejaner, allowing people \n"
+"to use their preferred mail clients to send and receive mail pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information, \n"
+"I2P bundles susi23's web based susimail client which has been built specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
+"virus filtering as well as denial of service prevention with hashcash augmented \n"
+"quotas. In addition, each user has control of their batching strategy prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
+"non-anonymous locations does not give access to the mail accounts or activity \n"
+"patterns of the user. At the moment the developers work on a decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the I2P Site \n"
 "<a href=\"http://%(postman)s/\">%(postman)s</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1051
 msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the "
-"traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a "
-"server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
 "Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the "
-"e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically "
-"encrypted end-to-end. <br>\n"
-"Furthermore, I2P-Bote offers a remailer function on top of I2P, for "
-"increased high-latency anonymity."
+"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
+"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. <br>\n"
+"Furthermore, I2P-Bote offers a remailer function on top of I2P, for increased high-latency anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1061
 msgid ""
-"I2P-Messenger is an end-to-end encrypted serverless communication "
-"application.\n"
-"For communication between two users, they need to give each other their "
-"destination keys, to allow the other to connect.\n"
-"It supports file transfer and has a search for other users, based on "
-"Seedless."
+"I2P-Messenger is an end-to-end encrypted serverless communication application.\n"
+"For communication between two users, they need to give each other their destination keys, to allow the other to connect.\n"
+"It supports file transfer and has a search for other users, based on Seedless."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:2
@@ -11206,18 +9646,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:71
 msgid ""
 "Your level of anonymity can be described as \"how hard it is for someone\n"
-"to find out information you don't want them to know?\" - who you are, "
-"where\n"
-"you are located, who you communicate with, or even when you communicate."
-"  \n"
-"\"Perfect\" anonymity is not a useful concept here - software will not "
-"make \n"
-"you indistinguishable from people that don't use computers or who are not"
-" on\n"
-"the Internet.  Instead, we are working to provide sufficient anonymity to"
-" meet the\n"
-"real needs of whomever we can - from those simply browsing websites, to "
-"those exchanging\n"
+"to find out information you don't want them to know?\" - who you are, where\n"
+"you are located, who you communicate with, or even when you communicate.  \n"
+"\"Perfect\" anonymity is not a useful concept here - software will not make \n"
+"you indistinguishable from people that don't use computers or who are not on\n"
+"the Internet.  Instead, we are working to provide sufficient anonymity to meet the\n"
+"real needs of whomever we can - from those simply browsing websites, to those exchanging\n"
 "data, to those fearful of discovery by powerful organizations or states."
 msgstr ""
 
@@ -11225,17 +9659,14 @@ msgstr ""
 msgid ""
 "The question of whether I2P provides sufficient anonymity for your \n"
 "particular needs is a hard one, but this page will hopefully assist in \n"
-"answering that question by exploring how I2P operates under various "
-"attacks\n"
+"answering that question by exploring how I2P operates under various attacks\n"
 "so that you may decide whether it meets your needs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:89
 msgid ""
-"We welcome further research and analysis on I2P's resistance to the "
-"threats described below.\n"
-"More review of existing literature (much of it focused on Tor) and "
-"original\n"
+"We welcome further research and analysis on I2P's resistance to the threats described below.\n"
+"More review of existing literature (much of it focused on Tor) and original\n"
 "work focused on I2P is needed."
 msgstr ""
 
@@ -11247,69 +9678,52 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n"
-"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in"
-" mind when \n"
+"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in mind when \n"
 "reviewing related literature:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:102
 msgid ""
-"<b>I2P is a free route mixnet</b> - the message creator explicitly "
-"defines the\n"
-"path that messages will be sent out (the outbound tunnel), and the "
-"message \n"
-"recipient explicitly defines the path that messages will be received on "
-"(the\n"
+"<b>I2P is a free route mixnet</b> - the message creator explicitly defines the\n"
+"path that messages will be sent out (the outbound tunnel), and the message \n"
+"recipient explicitly defines the path that messages will be received on (the\n"
 "inbound tunnel)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:108
 msgid ""
-"<b>I2P has no official entry and exit points</b> - all peers fully "
-"participate in the \n"
+"<b>I2P has no official entry and exit points</b> - all peers fully participate in the \n"
 "mix, and there are no network layer in- or out-proxies (however, at the \n"
 "application layer, a few proxies do exist)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:113
 msgid ""
-"<b>I2P is fully distributed</b> - there are no central controls or "
-"authorities.\n"
-"One could modify some routers to operate mix cascades (building tunnels "
-"and giving\n"
-"out the keys necessary to control the forwarding at the tunnel endpoint) "
-"or directory \n"
-"based profiling and selection, all without breaking compatibility with "
-"the rest of \n"
-"the network, but doing so is of course not necessary (and may even harm "
-"one's\n"
+"<b>I2P is fully distributed</b> - there are no central controls or authorities.\n"
+"One could modify some routers to operate mix cascades (building tunnels and giving\n"
+"out the keys necessary to control the forwarding at the tunnel endpoint) or directory \n"
+"based profiling and selection, all without breaking compatibility with the rest of \n"
+"the network, but doing so is of course not necessary (and may even harm one's\n"
 "anonymity)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:123
 #, python-format
 msgid ""
-"We have documented plans to implement <a "
-"href=\"%(todo)s#stop\">nontrivial delays</a>\n"
+"We have documented plans to implement <a href=\"%(todo)s#stop\">nontrivial delays</a>\n"
 "and <a href=\"%(todo)s#batching\">batching strategies</a> \n"
-"whose existence is only known to the particular hop or tunnel gateway "
-"that \n"
-"receives the message, allowing a mostly low latency mixnet to provide "
-"cover \n"
+"whose existence is only known to the particular hop or tunnel gateway that \n"
+"receives the message, allowing a mostly low latency mixnet to provide cover \n"
 "traffic for higher latency communication (e.g. email).\n"
-"However we are aware that significant delays are required to provide "
-"meaningful\n"
-"protection, and that implementation of such delays will be a significant "
-"challenge.\n"
-"It is not clear at this time whether we will actually implement these "
-"delay features."
+"However we are aware that significant delays are required to provide meaningful\n"
+"protection, and that implementation of such delays will be a significant challenge.\n"
+"It is not clear at this time whether we will actually implement these delay features."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:134
 msgid ""
 "In theory, routers along the message path may inject an \n"
-"arbitrary number of hops before forwarding the message to the next peer, "
-"though\n"
+"arbitrary number of hops before forwarding the message to the next peer, though\n"
 "the current implementation does not."
 msgstr ""
 
@@ -11323,8 +9737,7 @@ msgid ""
 "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n"
 "<a href=\"http://freenetproject.org/\">[Freenet]</a>, and\n"
 "<a href=\"https://www.torproject.org/\">[Tor]</a>.\n"
-"Our design benefits substantially from the research published around that"
-" time.\n"
+"Our design benefits substantially from the research published around that time.\n"
 "I2P uses several onion routing techniques, so we continue to benefit\n"
 "from the significant academic interest in Tor."
 msgstr ""
@@ -11332,12 +9745,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:152
 msgid ""
 "Taking from the attacks and analysis put forth in the \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity "
-"literature</a> (largely \n"
-"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: "
-"Protocols, Attacks, Design \n"
-"Issues and Open Problems</a>), the following briefly describes a wide "
-"variety \n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity literature</a> (largely \n"
+"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: Protocols, Attacks, Design \n"
+"Issues and Open Problems</a>), the following briefly describes a wide variety \n"
 "of attacks as well as many of I2Ps defenses.  We update\n"
 "this list to include new attacks as they are identified."
 msgstr ""
@@ -11365,66 +9775,46 @@ msgstr ""
 msgid ""
 "The\n"
 "<a href=\"%(comparisons)s\">network comparisons</a> and\n"
-"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also "
-"be helpful\n"
+"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also be helpful\n"
 "to review."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:210
 msgid ""
-"A brute force attack can be mounted by a global passive or active "
-"adversary, \n"
-"watching all the messages pass between all of the nodes and attempting to"
-" correlate\n"
-"which message follows which path.  Mounting this attack against I2P "
-"should be \n"
-"nontrivial, as all peers in the network are frequently sending messages "
-"(both\n"
-"end to end and network maintenance messages), plus an end to end message "
-"changes\n"
-"size and data along its path.  In addition, the external adversary does "
-"not have\n"
-"access to the messages either, as inter-router communication is both "
-"encrypted\n"
-"and streamed (making two 1024 byte messages indistinguishable from one "
-"2048 byte\n"
+"A brute force attack can be mounted by a global passive or active adversary, \n"
+"watching all the messages pass between all of the nodes and attempting to correlate\n"
+"which message follows which path.  Mounting this attack against I2P should be \n"
+"nontrivial, as all peers in the network are frequently sending messages (both\n"
+"end to end and network maintenance messages), plus an end to end message changes\n"
+"size and data along its path.  In addition, the external adversary does not have\n"
+"access to the messages either, as inter-router communication is both encrypted\n"
+"and streamed (making two 1024 byte messages indistinguishable from one 2048 byte\n"
 "message)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:222
 msgid ""
-"However, a powerful attacker can use brute force to detect trends - if "
-"they \n"
-"can send 5GB to an I2P destination and monitor everyone's network "
-"connection,\n"
-"they can eliminate all peers who did not receive 5GB of data.  Techniques"
-" to \n"
+"However, a powerful attacker can use brute force to detect trends - if they \n"
+"can send 5GB to an I2P destination and monitor everyone's network connection,\n"
+"they can eliminate all peers who did not receive 5GB of data.  Techniques to \n"
 "defeat this attack exist, but may be prohibitively expensive (see: \n"
-"<a "
-"href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s "
-"mimics\n"
-"or constant rate traffic).  Most users are not concerned with this "
-"attack, as \n"
-"the cost of mounting it are extreme (and often require illegal activity)."
-"  \n"
+"<a href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s mimics\n"
+"or constant rate traffic).  Most users are not concerned with this attack, as \n"
+"the cost of mounting it are extreme (and often require illegal activity).  \n"
 "However, the attack is still possible, for example by an observer at\n"
 "a large ISP or an Internet exchange point.\n"
 "Those who want to defend against it \n"
 "would want to take appropriate countermeasures, such as\n"
-"setting low bandwidth limits, and using unpublished or encrypted "
-"leasesets for I2P Sites.\n"
-"Other countermeasures, such as nontrivial delays and restricted routes, "
-"are\n"
+"setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites.\n"
+"Other countermeasures, such as nontrivial delays and restricted routes, are\n"
 "not currently implemented."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:239
 #, python-format
 msgid ""
-"As a partial defense against a single router or group of routers trying "
-"to route all the network's traffic,\n"
-"routers contain limits as to how many tunnels can be routed through a "
-"single peer.\n"
+"As a partial defense against a single router or group of routers trying to route all the network's traffic,\n"
+"routers contain limits as to how many tunnels can be routed through a single peer.\n"
 "As the network grows, these limits are subject to further adjustment.\n"
 "Other mechanisms for peer rating, selection and avoidance\n"
 "are discussed on the\n"
@@ -11433,51 +9823,34 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:254
 msgid ""
-"I2P's messages are unidirectional and do not necessarily imply that a "
-"reply\n"
+"I2P's messages are unidirectional and do not necessarily imply that a reply\n"
 "will be sent.  However, applications on top of I2P will most likely have\n"
-"recognizable patterns within the frequency of their messages - for "
-"instance, an \n"
-"HTTP request will be a small message with a large sequence of reply "
-"messages \n"
-"containing the HTTP response.  Using this data as well as a broad view of"
-" the \n"
-"network topology, an attacker may be able to disqualify some links as "
-"being too \n"
+"recognizable patterns within the frequency of their messages - for instance, an \n"
+"HTTP request will be a small message with a large sequence of reply messages \n"
+"containing the HTTP response.  Using this data as well as a broad view of the \n"
+"network topology, an attacker may be able to disqualify some links as being too \n"
 "slow to have passed the message along."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:264
 msgid ""
-"This sort of attack is powerful, but its applicability to I2P is non "
-"obvious,\n"
-"as the variation on message delays due to queuing, message processing, "
-"and \n"
-"throttling will often meet or exceed the time of passing a message along "
-"a \n"
-"single link - even when the attacker knows that a reply will be sent as "
-"soon as\n"
-"the message is received.  There are some scenarios which will expose "
-"fairly \n"
-"automatic replies though - the streaming library does (with the SYN+ACK) "
-"as does the \n"
-"message mode of guaranteed delivery (with the "
-"DataMessage+DeliveryStatusMessage)."
+"This sort of attack is powerful, but its applicability to I2P is non obvious,\n"
+"as the variation on message delays due to queuing, message processing, and \n"
+"throttling will often meet or exceed the time of passing a message along a \n"
+"single link - even when the attacker knows that a reply will be sent as soon as\n"
+"the message is received.  There are some scenarios which will expose fairly \n"
+"automatic replies though - the streaming library does (with the SYN+ACK) as does the \n"
+"message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:274
 #, python-format
 msgid ""
-"Without protocol scrubbing or higher latency, global active adversaries "
-"can \n"
-"gain substantial information.  As such, people concerned with these "
-"attacks could\n"
-"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial "
-"delays</a> or \n"
-"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol "
-"scrubbing, or\n"
-"other advanced tunnel routing <a "
-"href=\"%(todo)s#batching\">techniques</a>,\n"
+"Without protocol scrubbing or higher latency, global active adversaries can \n"
+"gain substantial information.  As such, people concerned with these attacks could\n"
+"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial delays</a> or \n"
+"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol scrubbing, or\n"
+"other advanced tunnel routing <a href=\"%(todo)s#batching\">techniques</a>,\n"
 "but these are unimplemented in I2P."
 msgstr ""
 
@@ -11490,25 +9863,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:291
 msgid ""
-"Intersection attacks against low latency systems are extremely powerful -"
-"\n"
-"periodically make contact with the target and keep track of what peers "
-"are on\n"
+"Intersection attacks against low latency systems are extremely powerful -\n"
+"periodically make contact with the target and keep track of what peers are on\n"
 "the network.  Over time, as node churn occurs the attacker will gain \n"
-"significant information about the target by simply intersecting the sets "
-"of\n"
-"peers that are online when a message successfully goes through.  The cost"
-" of \n"
-"this attack is significant as the network grows, but may be feasible in "
-"some\n"
+"significant information about the target by simply intersecting the sets of\n"
+"peers that are online when a message successfully goes through.  The cost of \n"
+"this attack is significant as the network grows, but may be feasible in some\n"
 "scenarios."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:301
 #, python-format
 msgid ""
-"In summary, if an attacker is at both ends of your tunnel at the same "
-"time,\n"
+"In summary, if an attacker is at both ends of your tunnel at the same time,\n"
 "he may be successful.\n"
 "I2P does not have a full defense to this for low latency communication.\n"
 "This is an inherent weakness of low-latency onion routing.\n"
@@ -11527,8 +9894,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:316
 #, python-format
 msgid ""
-"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a "
-"small group that changes slowly"
+"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a small "
+"group that changes slowly"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:319
@@ -11551,8 +9918,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:332
 msgid ""
 "Even in total, these defenses are not a complete solution.\n"
-"Also, we have made some design choices that may significantly increase "
-"our vulnerability:"
+"Also, we have made some design choices that may significantly increase our vulnerability:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:337
@@ -11561,8 +9927,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:340
 msgid ""
-"We use tunnel pools comprised of several tunnels, and traffic can shift "
-"from tunnel to tunnel."
+"We use tunnel pools comprised of several tunnels, and traffic can shift from"
+" tunnel to tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:343
@@ -11572,8 +9938,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:346
 msgid ""
 "Tunnel lengths are configurable.\n"
-"While 3-hop tunnels are recommended for full protection, several "
-"applications and\n"
+"While 3-hop tunnels are recommended for full protection, several applications and\n"
 "services use 2-hop tunnels by default."
 msgstr ""
 
@@ -11581,14 +9946,10 @@ msgstr ""
 #, python-format
 msgid ""
 "In the future, it could\n"
-"for peers who can afford significant delays (per <a "
-"href=\"%(todo)s#stop\">nontrivial\n"
-"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>).  "
-"In addition,\n"
-"this is only relevant for destinations that other people know about - a "
-"private\n"
-"group whose destination is only known to trusted peers does not have to "
-"worry,\n"
+"for peers who can afford significant delays (per <a href=\"%(todo)s#stop\">nontrivial\n"
+"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>).  In addition,\n"
+"this is only relevant for destinations that other people know about - a private\n"
+"group whose destination is only known to trusted peers does not have to worry,\n"
 "as an adversary can't \"ping\" them to mount the attack.</p>"
 msgstr ""
 
@@ -11599,8 +9960,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:369
 msgid ""
-"There are a whole slew of denial of service attacks available against "
-"I2P,\n"
+"There are a whole slew of denial of service attacks available against I2P,\n"
 "each with different costs and consequences:"
 msgstr ""
 
@@ -11623,10 +9983,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:387
 msgid ""
 "Provide easy configuration options so that users may increase their\n"
-"contribution (share percentage) to the network. Display easy-to-"
-"understand\n"
-"metrics such as \"share ratio\" so that users may see what they are "
-"contributing."
+"contribution (share percentage) to the network. Display easy-to-understand\n"
+"metrics such as \"share ratio\" so that users may see what they are contributing."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:392
@@ -11638,29 +9996,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:399
 #, python-format
 msgid ""
-"<b>Starvation attack:</b> A hostile user may attempt to harm the network "
-"by\n"
-"creating a significant number of peers in the network who are not "
-"identified as\n"
-"being under control of the same entity (as with Sybil). These nodes then"
-" \n"
-"decide not to provide any resources to the network, causing existing "
-"peers \n"
-"to search through a larger network database or request more tunnels than"
-" \n"
+"<b>Starvation attack:</b> A hostile user may attempt to harm the network by\n"
+"creating a significant number of peers in the network who are not identified as\n"
+"being under control of the same entity (as with Sybil). These nodes then \n"
+"decide not to provide any resources to the network, causing existing peers \n"
+"to search through a larger network database or request more tunnels than \n"
 "should be necessary. \n"
-"Alternatively, the nodes may provide intermittent service by periodically"
-"\n"
+"Alternatively, the nodes may provide intermittent service by periodically\n"
 "dropping selected traffic, or refusing connections to certain peers.\n"
-"This behavior may be indistinguishable from that of a heavily-loaded or "
-"failing node.\n"
-"I2P addresses these issues by maintaining <a "
-"href=\"%(peerselection)s\">profiles</a> on the \n"
+"This behavior may be indistinguishable from that of a heavily-loaded or failing node.\n"
+"I2P addresses these issues by maintaining <a href=\"%(peerselection)s\">profiles</a> on the \n"
 "peers, attempting to identify underperforming ones and simply ignoring \n"
 "them, or using them rarely.\n"
 "We have significantly enhanced the\n"
-"ability to recognize and avoid troublesome peers; however there are still"
-"\n"
+"ability to recognize and avoid troublesome peers; however there are still\n"
 "significant efforts required in this area."
 msgstr ""
 
@@ -11668,30 +10017,18 @@ msgstr ""
 #, python-format
 msgid ""
 "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n"
-"a peer, a destination, or a tunnel.  Network and peer flooding is "
-"possible,\n"
-"and I2P does nothing to prevent standard IP layer flooding.  The flooding"
-" of\n"
-"a destination with messages by sending a large number to the target's "
-"various\n"
-"inbound tunnel gateways is possible, but the destination will know this "
-"both\n"
-"by the contents of the message and because the tunnel's tests will fail."
-"  The\n"
-"same goes for flooding just a single tunnel.  I2P has no defenses for a "
-"network\n"
-"flooding attack.  For a destination and tunnel flooding attack, the "
-"target\n"
-"identifies which tunnels are unresponsive and builds new ones.  New code "
-"could\n"
-"also be written to add even more tunnels if the client wishes to handle "
-"the\n"
-"larger load.  If, on the other hand, the load is more than the client can"
-"\n"
-"deal with, they can instruct the tunnels to throttle the number of "
-"messages or\n"
-"bytes they should pass on (once the <a "
-"href=\"%(todo)s#batching\">advanced tunnel\n"
+"a peer, a destination, or a tunnel.  Network and peer flooding is possible,\n"
+"and I2P does nothing to prevent standard IP layer flooding.  The flooding of\n"
+"a destination with messages by sending a large number to the target's various\n"
+"inbound tunnel gateways is possible, but the destination will know this both\n"
+"by the contents of the message and because the tunnel's tests will fail.  The\n"
+"same goes for flooding just a single tunnel.  I2P has no defenses for a network\n"
+"flooding attack.  For a destination and tunnel flooding attack, the target\n"
+"identifies which tunnels are unresponsive and builds new ones.  New code could\n"
+"also be written to add even more tunnels if the client wishes to handle the\n"
+"larger load.  If, on the other hand, the load is more than the client can\n"
+"deal with, they can instruct the tunnels to throttle the number of messages or\n"
+"bytes they should pass on (once the <a href=\"%(todo)s#batching\">advanced tunnel\n"
 "operation</a> is implemented)."
 msgstr ""
 
@@ -11699,13 +10036,10 @@ msgstr ""
 msgid ""
 "<b>CPU load attack:</b> There are currently some methods for people to \n"
 "remotely request that a peer perform some cryptographically expensive \n"
-"operation, and a hostile attacker could use these to flood that peer with"
-"\n"
-"a large number of them in an attempt to overload the CPU.  Both using "
-"good \n"
+"operation, and a hostile attacker could use these to flood that peer with\n"
+"a large number of them in an attempt to overload the CPU.  Both using good \n"
 "engineering practices and potentially requiring nontrivial certificates \n"
-"(e.g. HashCash) to be attached to these expensive requests should "
-"mitigate\n"
+"(e.g. HashCash) to be attached to these expensive requests should mitigate\n"
 "the issue, though there may be room for an attacker to exploit various\n"
 "bugs in the implementation."
 msgstr ""
@@ -11713,8 +10047,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:451
 #, python-format
 msgid ""
-"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the "
-"network by\n"
+"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by\n"
 "becoming a floodfill router. The current defenses against unreliable,\n"
 "intermittent, or malicious floodfill routers are poor.\n"
 "A floodfill router may provide bad or no response to lookups, and\n"
@@ -11729,134 +10062,86 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:470
 #, python-format
 msgid ""
-"Tagging attacks - modifying a message so that it can later be identified"
-" \n"
-"further along the path - are by themselves impossible in I2P, as messages"
-" \n"
-"passed through tunnels are signed.  However, if an attacker is the "
-"inbound \n"
-"tunnel gateway as well as a participant further along in that tunnel, "
-"with\n"
-"collusion they can identify the fact that they are in the same tunnel "
-"(and \n"
-"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and "
-"other updates,\n"
-"colluding peers within the same tunnel can recognize that fact without "
-"any \n"
-"effort).  An attacker in an outbound tunnel and any part of an inbound "
-"tunnel cannot \n"
-"collude however, as the tunnel encryption pads and modifies the data "
-"separately\n"
-"for the inbound and outbound tunnels.  External attackers cannot do "
-"anything,\n"
+"Tagging attacks - modifying a message so that it can later be identified \n"
+"further along the path - are by themselves impossible in I2P, as messages \n"
+"passed through tunnels are signed.  However, if an attacker is the inbound \n"
+"tunnel gateway as well as a participant further along in that tunnel, with\n"
+"collusion they can identify the fact that they are in the same tunnel (and \n"
+"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and other updates,\n"
+"colluding peers within the same tunnel can recognize that fact without any \n"
+"effort).  An attacker in an outbound tunnel and any part of an inbound tunnel cannot \n"
+"collude however, as the tunnel encryption pads and modifies the data separately\n"
+"for the inbound and outbound tunnels.  External attackers cannot do anything,\n"
 "as the links are encrypted and messages signed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:488
 msgid ""
-"Partitioning attacks - finding ways to segregate (technically or "
-"analytically)\n"
-"the peers in a network - are important to keep in mind when dealing with "
-"a \n"
-"powerful adversary, since the size of the network plays a key role in "
-"determining\n"
-"your anonymity.  Technical partitioning by cutting links between peers to"
-" create\n"
-"fragmented networks is addressed by I2P's built in network database, "
-"which \n"
-"maintains statistics about various peers so as to allow any existing "
-"connections\n"
-"to other fragmented sections to be exploited so as to heal the network.  "
-"However,\n"
-"if the attacker does disconnect all links to uncontrolled peers, "
-"essentially\n"
-"isolating the target, no amount of network database healing will fix it."
-"  At\n"
-"that point, the only thing the router can hope to do is notice that a "
-"significant\n"
-"number of previously reliable peers have become unavailable and alert the"
-" client\n"
-"that it is temporarily disconnected (this detection code is not "
-"implemented at\n"
+"Partitioning attacks - finding ways to segregate (technically or analytically)\n"
+"the peers in a network - are important to keep in mind when dealing with a \n"
+"powerful adversary, since the size of the network plays a key role in determining\n"
+"your anonymity.  Technical partitioning by cutting links between peers to create\n"
+"fragmented networks is addressed by I2P's built in network database, which \n"
+"maintains statistics about various peers so as to allow any existing connections\n"
+"to other fragmented sections to be exploited so as to heal the network.  However,\n"
+"if the attacker does disconnect all links to uncontrolled peers, essentially\n"
+"isolating the target, no amount of network database healing will fix it.  At\n"
+"that point, the only thing the router can hope to do is notice that a significant\n"
+"number of previously reliable peers have become unavailable and alert the client\n"
+"that it is temporarily disconnected (this detection code is not implemented at\n"
 "the moment)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:504
 #, python-format
 msgid ""
-"Partitioning the network analytically by looking for differences in how "
-"routers \n"
-"and destinations behave and grouping them accordingly is also a very "
-"powerful\n"
-"attack.  For instance, an attacker <a href=\"#harvesting\">harvesting</a>"
-" the network\n"
-"database will know when a particular destination has 5 inbound tunnels in"
-" their\n"
-"LeaseSet while others have only 2 or 3, allowing the adversary to "
-"potentially \n"
-"partition clients by the number of tunnels selected.  Another partition "
-"is \n"
-"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial "
-"delays</a> and \n"
-"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel "
-"gateways and the\n"
-"particular hops with non-zero delays will likely stand out.  However, "
-"this data\n"
-"is only exposed to those specific hops, so to partition effectively on "
-"that \n"
-"matter, the attacker would need to control a significant portion of the "
-"network\n"
-"(and still that would only be a probabilistic partition, as they wouldn't"
-" know\n"
+"Partitioning the network analytically by looking for differences in how routers \n"
+"and destinations behave and grouping them accordingly is also a very powerful\n"
+"attack.  For instance, an attacker <a href=\"#harvesting\">harvesting</a> the network\n"
+"database will know when a particular destination has 5 inbound tunnels in their\n"
+"LeaseSet while others have only 2 or 3, allowing the adversary to potentially \n"
+"partition clients by the number of tunnels selected.  Another partition is \n"
+"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial delays</a> and \n"
+"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel gateways and the\n"
+"particular hops with non-zero delays will likely stand out.  However, this data\n"
+"is only exposed to those specific hops, so to partition effectively on that \n"
+"matter, the attacker would need to control a significant portion of the network\n"
+"(and still that would only be a probabilistic partition, as they wouldn't know\n"
 "which other tunnels or messages have those delays)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:520
 #, python-format
 msgid ""
-"Also discussed on the <a href=\"%(netdb)s#threat\">network database "
-"page</a> (bootstrap attack)."
+"Also discussed on the <a href=\"%(netdb)s#threat\">network database page</a>"
+" (bootstrap attack)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:528
 msgid ""
-"The predecessor attack is passively gathering statistics in an attempt to"
-" see\n"
-"what peers are 'close' to the destination by participating in their "
-"tunnels and\n"
-"keeping track of the previous or next hop (for outbound or inbound "
-"tunnels, \n"
-"respectively).  Over time, using a perfectly random sample of peers and "
-"random\n"
-"ordering, an attacker would be able to see which peer shows up as "
-"'closer' \n"
-"statistically more than the rest, and that peer would in turn be where "
-"the\n"
+"The predecessor attack is passively gathering statistics in an attempt to see\n"
+"what peers are 'close' to the destination by participating in their tunnels and\n"
+"keeping track of the previous or next hop (for outbound or inbound tunnels, \n"
+"respectively).  Over time, using a perfectly random sample of peers and random\n"
+"ordering, an attacker would be able to see which peer shows up as 'closer' \n"
+"statistically more than the rest, and that peer would in turn be where the\n"
 "target is located."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:538
 #, python-format
 msgid ""
-"I2P avoids this in four ways: first, the peers selected to participate in"
-"\n"
-"tunnels are not randomly sampled throughout the network - they are "
-"derived from\n"
-"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which "
-"breaks them\n"
-"into tiers.  Second, with <a href=\"%(tunnelimpl)s#ordering\">strict "
-"ordering</a> of peers\n"
-"in a tunnel, the fact that a peer shows up more frequently does not mean "
-"they're\n"
-"the source.  Third, with <a href=\"%(tunnelimpl)s#length\">permuted "
-"tunnel length</a>\n"
+"I2P avoids this in four ways: first, the peers selected to participate in\n"
+"tunnels are not randomly sampled throughout the network - they are derived from\n"
+"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which breaks them\n"
+"into tiers.  Second, with <a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers\n"
+"in a tunnel, the fact that a peer shows up more frequently does not mean they're\n"
+"the source.  Third, with <a href=\"%(tunnelimpl)s#length\">permuted tunnel length</a>\n"
 "(not enabled by default)\n"
 "even 0 hop tunnels can provide plausible deniability as the occasional \n"
 "variation of the gateway will look like normal tunnels.  Fourth, with \n"
-"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> "
-"(unimplemented), only the peer with\n"
-"a restricted connection to the target will ever contact the target, while"
-" \n"
+"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> (unimplemented), only the peer with\n"
+"a restricted connection to the target will ever contact the target, while \n"
 "attackers will merely run into that gateway."
 msgstr ""
 
@@ -11894,8 +10179,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:587
 msgid ""
-"Network growth will make it more difficult to obtain a given proportion "
-"of the network"
+"Network growth will make it more difficult to obtain a given proportion of "
+"the network"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:590
@@ -11904,10 +10189,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:593
 msgid ""
-"\"Hidden mode\", which prevents a router from publishing its information "
-"to the netDb,\n"
-"(but also prevents it from relaying data) is not widely used now but "
-"could be."
+"\"Hidden mode\", which prevents a router from publishing its information to the netDb,\n"
+"(but also prevents it from relaying data) is not widely used now but could be."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:599
@@ -11915,19 +10198,15 @@ msgstr ""
 msgid ""
 "In future implementations,\n"
 "<a href=\"%(todo)s#nat\">basic</a> and \n"
-"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted "
-"routes,\n"
-"this attack loses much of its power, as the \"hidden\" peers do not "
-"publish their\n"
-"contact addresses in the network database - only the tunnels through "
-"which \n"
+"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted routes,\n"
+"this attack loses much of its power, as the \"hidden\" peers do not publish their\n"
+"contact addresses in the network database - only the tunnels through which \n"
 "they can be reached (as well as their public keys, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:608
 msgid ""
-"In the future, routers could use GeoIP to identify if they are in a "
-"particular\n"
+"In the future, routers could use GeoIP to identify if they are in a particular\n"
 "country where identification as an I2P node would be risky.\n"
 "In that case, the router could automatically enable hidden mode, or\n"
 "enact other restricted route methods."
@@ -11938,10 +10217,8 @@ msgstr ""
 msgid ""
 "By inspecting the traffic into and out of a router, a malicious ISP\n"
 "or state-level firewall could identify that a computer is running I2P.\n"
-"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically "
-"designed\n"
-"to hide that a computer is running I2P. However, several design decisions"
-" made\n"
+"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically designed\n"
+"to hide that a computer is running I2P. However, several design decisions made\n"
 "in the design of the\n"
 "<a href=\"%(transport)s\">transport layer and protocols</a>\n"
 "make it somewhat difficult to identify I2P traffic:"
@@ -11957,8 +10234,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:636
 msgid ""
-"DH key exchange with no protocol bytes or other unencrypted constant "
-"fields"
+"DH key exchange with no protocol bytes or other unencrypted constant fields"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:639
@@ -11967,14 +10243,13 @@ msgid ""
 "Simultaneous use of both\n"
 "<a href=\"%(ntcp)s\">TCP</a> and\n"
 "<a href=\"%(ssu)s\">UDP</a> transports.\n"
-"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to"
-" track."
+"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:647
 msgid ""
-"In the near future, we plan to directly address traffic analysis issues "
-"by further obfuscation of I2P transport protocols, possibly including:"
+"In the near future, we plan to directly address traffic analysis issues by "
+"further obfuscation of I2P transport protocols, possibly including:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:651
@@ -11991,20 +10266,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:657
 msgid ""
-"Development of additional transport methods that mimic SSL or other "
-"common protocols"
+"Development of additional transport methods that mimic SSL or other common "
+"protocols"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:660
 msgid ""
-"Review of padding strategies at higher layers to see how they affect "
-"packet sizes at the transport layer"
+"Review of padding strategies at higher layers to see how they affect packet "
+"sizes at the transport layer"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:663
 msgid ""
-"Review of methods implemented by various state-level firewalls to block "
-"Tor"
+"Review of methods implemented by various state-level firewalls to block Tor"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:666
@@ -12020,36 +10294,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:680
 msgid ""
-"Sybil describes a category of attacks where the adversary creates "
-"arbitrarily\n"
+"Sybil describes a category of attacks where the adversary creates arbitrarily\n"
 "large numbers of colluding nodes and uses the increased numbers to help \n"
-"mounting other attacks.  For instance, if an attacker is in a network "
-"where peers\n"
-"are selected randomly and they want an 80&#37; chance to be one of those "
-"peers, they\n"
-"simply create five times the number of nodes that are in the network and "
-"roll \n"
-"the dice.  When identity is free, Sybil can be a very potent technique "
-"for a \n"
-"powerful adversary.  The primary technique to address this is simply to "
-"make \n"
-"identity 'non free' - <a "
-"href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n"
+"mounting other attacks.  For instance, if an attacker is in a network where peers\n"
+"are selected randomly and they want an 80&#37; chance to be one of those peers, they\n"
+"simply create five times the number of nodes that are in the network and roll \n"
+"the dice.  When identity is free, Sybil can be a very potent technique for a \n"
+"powerful adversary.  The primary technique to address this is simply to make \n"
+"identity 'non free' - <a href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n"
 "(among others) uses the fact that IP addresses are limited, while \n"
 "IIP used \n"
-"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for "
-"creating a new\n"
-"identity.  We currently have not implemented any particular technique to "
-"address\n"
+"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for creating a new\n"
+"identity.  We currently have not implemented any particular technique to address\n"
 "Sybil, but do include placeholder certificates in the router's and \n"
-"destination's data structures which can contain a HashCash certificate of"
-" \n"
-"appropriate value when necessary (or some other certificate proving "
-"scarcity)."
+"destination's data structures which can contain a HashCash certificate of \n"
+"appropriate value when necessary (or some other certificate proving scarcity)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:698
-msgid "Requiring HashCash Certificates in various places has two major problems:"
+msgid ""
+"Requiring HashCash Certificates in various places has two major problems:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:702
@@ -12059,17 +10323,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:705
 msgid ""
 "The classic HashCash problem -\n"
-"selecting HashCash values that are meaningful proofs of work on high-end "
-"machines,\n"
+"selecting HashCash values that are meaningful proofs of work on high-end machines,\n"
 "while still being feasible on low-end machines such as mobile devices."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:712
 msgid ""
-"Various limitations on the number of routers in a given IP range restrict"
-"\n"
-"the vulnerability to attackers that don't have the ability to put "
-"machines\n"
+"Various limitations on the number of routers in a given IP range restrict\n"
+"the vulnerability to attackers that don't have the ability to put machines\n"
 "in several IP blocks.\n"
 "However, this is not a meaningful defense against a powerful adversary."
 msgstr ""
@@ -12091,22 +10352,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:733
 #, python-format
 msgid ""
-"By refusing to accept or forward tunnel build requests, except to a "
-"colluding peer, a router could ensure\n"
+"By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure\n"
 "that a tunnel is formed wholly from its set of colluding routers.\n"
-"The chances of success are enhanced if there is a large number of "
-"colluding routers,\n"
+"The chances of success are enhanced if there is a large number of colluding routers,\n"
 "i.e. a <a href=\"#sybil\">Sybil attack</a>.\n"
 "This is somewhat mitigated by our\n"
-"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor "
-"the performance\n"
+"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor the performance\n"
 "of peers.\n"
 "However, this is a powerful attack as the number of routers approaches\n"
 "<i>f</i> = 0.2, or 20&#37; malicious nodes, as specifed in the paper.\n"
-"The malicous routers could also maintain connections to the target router"
-" and provide\n"
-"excellent forwarding bandwidth for traffic over those connections, in an "
-"attempt\n"
+"The malicous routers could also maintain connections to the target router and provide\n"
+"excellent forwarding bandwidth for traffic over those connections, in an attempt\n"
 "to manipulate the profiles managed by the target and appear attractive.\n"
 "Further research and defenses may be necessary."
 msgstr ""
@@ -12115,38 +10371,29 @@ msgstr ""
 #, python-format
 msgid ""
 "We use strong cryptography with long keys, and\n"
-"we assume the security of the industry-standard cryptographic primitives "
-"used in I2P, as documented\n"
+"we assume the security of the industry-standard cryptographic primitives used in I2P, as documented\n"
 "<a href=\"%(cryptography)s\">on the low-level cryptography page</a>. \n"
 "Security features include the immediate detection of \n"
-"altered messages along the path, the inability to decrypt messages not "
-"addressed to you,\n"
+"altered messages along the path, the inability to decrypt messages not addressed to you,\n"
 "and defense against man-in-the-middle attacks.\n"
-"The key sizes chosen in 2003 were quite conservative at the time, and are"
-" still longer than\n"
-"those used in <a href=\"https://torproject.org/\">other anonymity "
-"networks</a>.\n"
+"The key sizes chosen in 2003 were quite conservative at the time, and are still longer than\n"
+"those used in <a href=\"https://torproject.org/\">other anonymity networks</a>.\n"
 "We don't think the current key lengths are our biggest weakness,\n"
 "especially for traditional, non-state-level adversaries;\n"
 "bugs and the small size of the network are much more worrisome.\n"
-"Of course, all cryptographic algorithms eventually become obsolete due to"
-"\n"
-"the advent of faster processors, cryptographic research, and advancements"
-" in\n"
+"Of course, all cryptographic algorithms eventually become obsolete due to\n"
+"the advent of faster processors, cryptographic research, and advancements in\n"
 "methods such as rainbow tables, clusters of video game hardware, etc.\n"
-"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys"
-" or change\n"
+"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change\n"
 "shared secret values while maintaining backward compatibility."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:773
 #, python-format
 msgid ""
-"Upgrading the various data structures and protocols to support longer "
-"keys\n"
+"Upgrading the various data structures and protocols to support longer keys\n"
 "will have to be tackled eventually, and this will be a\n"
-"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be "
-"for \n"
+"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be for \n"
 "<a href=\"https://torproject.org/\">others</a>.\n"
 "Hopefully, through careful planning, we can minimize the disruption, and\n"
 "implement mechanisms to make it easier for future transitions."
@@ -12155,12 +10402,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:782
 msgid ""
 "In the future, several I2P protocols and data structures\n"
-"support securely padding messages to arbitrary sizes, so messages could "
-"be made constant\n"
-"size or garlic messages could be modified randomly so that some cloves "
-"appear to contain\n"
-"more subcloves than they actually do.  At the moment, however, garlic, "
-"tunnel, and \n"
+"support securely padding messages to arbitrary sizes, so messages could be made constant\n"
+"size or garlic messages could be modified randomly so that some cloves appear to contain\n"
+"more subcloves than they actually do.  At the moment, however, garlic, tunnel, and \n"
 "end to end messages include simple random padding."
 msgstr ""
 
@@ -12174,18 +10418,14 @@ msgid ""
 "In addition to the floodfill DOS attacks described\n"
 "<a href=\"#ffdos\">above</a>, floodfill routers are uniquely positioned\n"
 "to learn about network participants, due to their role\n"
-"in the netDb, and the high frequency of communication with those "
-"participants.\n"
-"This is somewhat mitigated because floodfill routers only manage a "
-"portion\n"
+"in the netDb, and the high frequency of communication with those participants.\n"
+"This is somewhat mitigated because floodfill routers only manage a portion\n"
 "of the total keyspace, and the keyspace rotates daily, as explained \n"
 "on the <a href=\"%(netdb)s#threat\">network database page</a>.\n"
-"The specific mechanisms by which routers communicate with floodfills have"
-" been\n"
+"The specific mechanisms by which routers communicate with floodfills have been\n"
 "<a href=\"%(netdb)s#delivery\">carefully designed</a>.\n"
 "However, these threats should be studied further.\n"
-"The specific potential threats and corresponding defenses are a topic for"
-" future research."
+"The specific potential threats and corresponding defenses are a topic for future research."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:812
@@ -12204,33 +10444,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:826
 msgid ""
-"There are a few centralized or limited resources (some inside I2P, some "
-"not)\n"
+"There are a few centralized or limited resources (some inside I2P, some not)\n"
 "that could be attacked or used as a vector for attacks.\n"
-"The absence of jrandom starting November 2007, followed by the loss of "
-"the i2p.net hosting service in January 2008,\n"
-"highlighted numerous centralized resources in the development and "
-"operation of the I2P network,\n"
+"The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,\n"
+"highlighted numerous centralized resources in the development and operation of the I2P network,\n"
 "most of which are now distributed.\n"
-"Attacks on externally-reachable resources mainly affect the ability of "
-"new users to find us,\n"
+"Attacks on externally-reachable resources mainly affect the ability of new users to find us,\n"
 "not the operation of the network itself."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:836
 #, python-format
 msgid ""
-"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin"
-" for external public access."
+"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin "
+"for external public access."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:839
 #, python-format
 msgid ""
-"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed "
-"locations</a>,\n"
-"however more reseed hosts may be needed, and the handling of unreliable "
-"or malicious\n"
+"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed locations</a>,\n"
+"however more reseed hosts may be needed, and the handling of unreliable or malicious\n"
 "reseed hosts may need improvement."
 msgstr ""
 
@@ -12246,10 +10480,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:851
 msgid ""
-"Routers now better handle <a href=\"#ffdos\">multiple unreliable "
-"floodfill peers</a>.\n"
-"Malicious floodfills <a href=\"#ffdos\">needs</a> <a "
-"href=\"#floodfill\">more</a> study."
+"Routers now better handle <a href=\"#ffdos\">multiple unreliable floodfill peers</a>.\n"
+"Malicious floodfills <a href=\"#ffdos\">needs</a> <a href=\"#floodfill\">more</a> study."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:855
@@ -12261,47 +10493,35 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:858
 msgid ""
-"Routers rely on a single news host, but there is a hardcoded backup URL "
-"pointing to a different host.\n"
+"Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.\n"
 "A malicious news host could feed a huge file, need to limit the size."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:862
 #, python-format
 msgid ""
-"<a href=\"%(naming)s\">Naming system services</a>, including address book"
-" subscription providers, add-host services,\n"
-"and jump services, could be malicious. Substantial protections for "
-"subscriptions were implemented\n"
-"in release 0.6.1.31, with additional enhancements in subsequent releases."
-"\n"
+"<a href=\"%(naming)s\">Naming system services</a>, including address book subscription providers, add-host services,\n"
+"and jump services, could be malicious. Substantial protections for subscriptions were implemented\n"
+"in release 0.6.1.31, with additional enhancements in subsequent releases.\n"
 "However, all naming services require some measure of trust, see\n"
 "<a href=\"%(naming)s\">the naming page</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:869
 msgid ""
-"We remain reliant on the DNS service for i2p2.de, losing this would cause"
-" substantial\n"
+"We remain reliant on the DNS service for i2p2.de, losing this would cause substantial\n"
 "disruption in our ability to attract new users,\n"
-"and would shrink the network (in the short-to-medium term), just as the "
-"loss of i2p.net did."
+"and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:881
 msgid ""
-"These attacks aren't directly on the network, but instead go after its "
-"development team \n"
-"by either introducing legal hurdles on anyone contributing to the "
-"development\n"
-"of the software, or by using whatever means are available to get the "
-"developers to \n"
-"subvert the software.  Traditional technical measures cannot defeat these"
-" attacks, and\n"
-"if someone threatened the life or livelihood of a developer (or even just"
-" issuing a \n"
-"court order along with a gag order, under threat of prison), we would "
-"have a big problem."
+"These attacks aren't directly on the network, but instead go after its development team \n"
+"by either introducing legal hurdles on anyone contributing to the development\n"
+"of the software, or by using whatever means are available to get the developers to \n"
+"subvert the software.  Traditional technical measures cannot defeat these attacks, and\n"
+"if someone threatened the life or livelihood of a developer (or even just issuing a \n"
+"court order along with a gag order, under threat of prison), we would have a big problem."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:890
@@ -12311,26 +10531,19 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:894
 #, python-format
 msgid ""
-"All components of the network must be open source to enable inspection, "
-"verification, \n"
-"modification, and improvement.  If a developer is compromised, once it is"
-" noticed \n"
-"the community should demand explanation and cease to accept that "
-"developer's work.\n"
-"All checkins to our <a href=\"%(monotone)s\">distributed source control "
-"system</a>\n"
-"are cryptographically signed, and the release packagers use a trust-list "
-"system\n"
+"All components of the network must be open source to enable inspection, verification, \n"
+"modification, and improvement.  If a developer is compromised, once it is noticed \n"
+"the community should demand explanation and cease to accept that developer's work.\n"
+"All checkins to our <a href=\"%(monotone)s\">distributed source control system</a>\n"
+"are cryptographically signed, and the release packagers use a trust-list system\n"
 "to restrict modifications to those previously approved."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:902
 #, python-format
 msgid ""
-"Development over the network itself, allowing developers to stay "
-"anonymous but still \n"
-"secure the development process.  All I2P development can occur through "
-"I2P - using\n"
+"Development over the network itself, allowing developers to stay anonymous but still \n"
+"secure the development process.  All I2P development can occur through I2P - using\n"
 "a <a href=\"%(monotone)s\">distributed source control system</a>,\n"
 "a distributed source control system, IRC chat,\n"
 "public web servers,\n"
@@ -12340,8 +10553,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:913
 msgid ""
-"We also maintain relationships with various organizations that offer "
-"legal advice,\n"
+"We also maintain relationships with various organizations that offer legal advice,\n"
 "should any defense be necessary."
 msgstr ""
 
@@ -12351,52 +10563,38 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:922
 msgid ""
-"Try as we might, most nontrivial applications include errors in the "
-"design or \n"
-"implementation, and I2P is no exception.  There may be bugs that could be"
-" exploited to \n"
-"attack the anonymity or security of the communication running over I2P in"
-" unexpected \n"
-"ways.  To help withstand attacks against the design or protocols in use, "
-"we publish \n"
+"Try as we might, most nontrivial applications include errors in the design or \n"
+"implementation, and I2P is no exception.  There may be bugs that could be exploited to \n"
+"attack the anonymity or security of the communication running over I2P in unexpected \n"
+"ways.  To help withstand attacks against the design or protocols in use, we publish \n"
 "all designs and documentation and solicit review and criticism with \n"
 "the hope that many eyes will improve the system.\n"
 "We do not believe in\n"
-"<a href=\"http://www.haystacknetwork.com/\">security through "
-"obscurity</a>."
+"<a href=\"http://www.haystacknetwork.com/\">security through obscurity</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:933
 msgid ""
 "In addition, the code is being \n"
-"treated the same way, with little aversion towards reworking or throwing "
-"out \n"
-"something that isn't meeting the needs of the software system (including "
-"ease of \n"
-"modification).  Documentation for the design and implementation of the "
-"network and \n"
-"the software components are an essential part of security, as without "
-"them it is \n"
-"unlikely that developers would be willing to spend the time to learn the "
-"software \n"
+"treated the same way, with little aversion towards reworking or throwing out \n"
+"something that isn't meeting the needs of the software system (including ease of \n"
+"modification).  Documentation for the design and implementation of the network and \n"
+"the software components are an essential part of security, as without them it is \n"
+"unlikely that developers would be willing to spend the time to learn the software \n"
 "enough to identify shortcomings and bugs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:943
 msgid ""
-"Our software is likely, in particular, to contain bugs related to denial "
-"of service\n"
-"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues  "
-"in the router console,\n"
-"and other vulnerabilities to non-standard inputs via the various "
-"protocols."
+"Our software is likely, in particular, to contain bugs related to denial of service\n"
+"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues  in the router console,\n"
+"and other vulnerabilities to non-standard inputs via the various protocols."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:949
 #, python-format
 msgid ""
-"I2P is still a small network with a small development community and "
-"almost no\n"
+"I2P is still a small network with a small development community and almost no\n"
 "interest from academic or research groups.\n"
 "Therefore we lack the analysis that\n"
 "<a href=\"https://torproject.org/\">other anonymity networks</a>\n"
@@ -12410,18 +10608,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:963
 msgid ""
-"To some extent, I2P could be enhanced to avoid peers operating at IP "
-"addresses\n"
-"listed in a blocklist. Several blocklists are commonly available in "
-"standard formats,\n"
-"listing anti-P2P organizations, potential state-level adversaries, and "
-"others."
+"To some extent, I2P could be enhanced to avoid peers operating at IP addresses\n"
+"listed in a blocklist. Several blocklists are commonly available in standard formats,\n"
+"listing anti-P2P organizations, potential state-level adversaries, and others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:969
 msgid ""
-"To the extent that active peers actually do show up in the actual "
-"blocklist,\n"
+"To the extent that active peers actually do show up in the actual blocklist,\n"
 "blocking by only a subset of peers would tend to segment the network,\n"
 "exacerbate reachability problems, and decrease overall reliability.\n"
 "Therefore we would want to agree on a particular blocklist and\n"
@@ -12430,8 +10624,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:977
 msgid ""
-"Blocklists are only a part (perhaps a small part) of an array of defenses"
-"\n"
+"Blocklists are only a part (perhaps a small part) of an array of defenses\n"
 "against maliciousness.\n"
 "In large part the profiling system does a good job of measuring\n"
 "router behavior so that we don't need to trust anything in netDb.\n"
@@ -12444,8 +10637,7 @@ msgid ""
 "If a blocklist is hosted at a central location with automatic updates\n"
 "the network is vulnerable to a\n"
 "<a href=\"#central\">central resource attack</a>.\n"
-"Automatic subscription to a list gives the list provider the power to "
-"shut\n"
+"Automatic subscription to a list gives the list provider the power to shut\n"
 "the i2p network down. Completely."
 msgstr ""
 
@@ -12454,8 +10646,7 @@ msgid ""
 "Currently, a default blocklist is distributed with our software,\n"
 "listing only the IPs of past DOS sources.\n"
 "There is no automatic update mechanism.\n"
-"Should a particular IP range implement serious attacks on the I2P "
-"network,\n"
+"Should a particular IP range implement serious attacks on the I2P network,\n"
 "we would have to ask people to update their blocklist manually through\n"
 "out-of-band mechanisms such as forums, blogs, etc."
 msgstr ""
@@ -12470,30 +10661,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:7
 msgid ""
-"This page contains an overview of I2P tunnel terminology and operation, "
-"with\n"
+"This page contains an overview of I2P tunnel terminology and operation, with\n"
 "links to more technical pages, details, and specifications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:12
 #, python-format
 msgid ""
-"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P "
-"builds virtual \"tunnels\" -\n"
-"temporary and unidirectional paths through a sequence of routers.  These"
-" \n"
+"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P builds virtual \"tunnels\" -\n"
+"temporary and unidirectional paths through a sequence of routers.  These \n"
 "tunnels are classified as either inbound tunnels (where everything \n"
 "given to it goes towards the creator of the tunnel) or outbound tunnels\n"
 "(where the tunnel creator shoves messages away from them).  When Alice\n"
 "wants to send a message to Bob, she will (typically) send it out one of\n"
-"her existing outbound tunnels with instructions for that tunnel's "
-"endpoint\n"
+"her existing outbound tunnels with instructions for that tunnel's endpoint\n"
 "to forward it to the gateway router for one of Bob's current inbound \n"
 "tunnels, which in turn passes it to Bob."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:25
-msgid "Alice connecting through her outbound tunnel to Bob via his inbound tunnel"
+msgid ""
+"Alice connecting through her outbound tunnel to Bob via his inbound tunnel"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:27
@@ -12529,8 +10717,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:38
 #, python-format
 msgid ""
-"<b>Tunnel gateway</b> - the first router in a tunnel.  For inbound "
-"tunnels,\n"
+"<b>Tunnel gateway</b> - the first router in a tunnel.  For inbound tunnels,\n"
 "this is the one mentioned in the LeaseSet published in the\n"
 "<a href=\"%(netdb)s\">network database</a>.  For outbound tunnels, the\n"
 "gateway is the originating router.  (e.g. both A and D above)"
@@ -12538,21 +10725,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:44
 msgid ""
-"<b>Tunnel endpoint</b> - the last router in a tunnel.  (e.g. both C and F"
-" above)"
+"<b>Tunnel endpoint</b> - the last router in a tunnel.  (e.g. both C and F "
+"above)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:45
 msgid ""
-"<b>Tunnel participant</b> - all routers in a tunnel except for the "
-"gateway or\n"
+"<b>Tunnel participant</b> - all routers in a tunnel except for the gateway or\n"
 "endpoint (e.g. both B and E above)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:49
 msgid ""
-"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router "
-"jumps, e.g.:"
+"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router jumps,"
+" e.g.:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:51
@@ -12567,8 +10753,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:53
 msgid ""
-"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one "
-"intermediate\n"
+"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one intermediate\n"
 "tunnel participant. (the above diagram includes two 2-hop tunnels - one\n"
 "outbound from Alice, one inbound to Bob)"
 msgstr ""
@@ -12576,10 +10761,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:60
 #, python-format
 msgid ""
-"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 "
-"byte integer</a>\n"
-"different for each hop in a tunnel, and unique among all tunnels on a "
-"router.\n"
+"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 byte integer</a>\n"
+"different for each hop in a tunnel, and unique among all tunnels on a router.\n"
 "Chosen randomly by the tunnel creator."
 msgstr ""
 
@@ -12590,8 +10773,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:68
 #, python-format
 msgid ""
-"Routers performing the three roles (gateway, participant, endpoint) are "
-"given\n"
+"Routers performing the three roles (gateway, participant, endpoint) are given\n"
 "different pieces of data in the initial\n"
 "<a href=\"%(tunnelcreation)s\">Tunnel Build Message</a>\n"
 "to accomplish their tasks:"
@@ -12605,9 +10787,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:97
 #, python-format
 msgid ""
-"<b>tunnel encryption key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"encrypting\n"
+"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n"
 "messages and instructions to the next hop"
 msgstr ""
 
@@ -12615,9 +10795,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:101
 #, python-format
 msgid ""
-"<b>tunnel IV key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"double-encrypting\n"
+"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n"
 "the IV to the next hop"
 msgstr ""
 
@@ -12625,9 +10803,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:105
 #, python-format
 msgid ""
-"<b>reply key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for "
-"encrypting\n"
+"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n"
 "the reply to the tunnel build request"
 msgstr ""
 
@@ -12644,8 +10820,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:91
 msgid ""
-"<b>next hop</b> - what router is the next one in the path (unless this is"
-" a 0-hop tunnel, and the gateway is also the endpoint)"
+"<b>next hop</b> - what router is the next one in the path (unless this is a "
+"0-hop tunnel, and the gateway is also the endpoint)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:92
@@ -12672,27 +10848,21 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:117
 #, python-format
 msgid ""
-"<b>tunnel encryption key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"encrypting\n"
+"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n"
 "messages and instructions to the the endpoint (itself)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:121
 #, python-format
 msgid ""
-"<b>tunnel IV key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"double-encrypting\n"
+"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n"
 "the IV to the endpoint (itself)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:125
 #, python-format
 msgid ""
-"<b>reply key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for "
-"encrypting\n"
+"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n"
 "the reply to the tunnel build request (outbound endpoints only)"
 msgstr ""
 
@@ -12708,8 +10878,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:131
 msgid ""
-"<b>reply router</b> - the inbound gateway of the tunnel to send the reply"
-" through (outbound endpoints only)"
+"<b>reply router</b> - the inbound gateway of the tunnel to send the reply "
+"through (outbound endpoints only)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:132
@@ -12732,8 +10902,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:143
 #, python-format
 msgid ""
-"Several tunnels for a particular purpose may be grouped into a \"tunnel "
-"pool\",\n"
+"Several tunnels for a particular purpose may be grouped into a \"tunnel pool\",\n"
 "as described in the\n"
 "<a href=\"%(tunnelimpl)s#tunnel.pooling\">tunnel specification</a>.\n"
 "This provides redundancy and additional bandwidth.\n"
@@ -12748,20 +10917,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:155
 #, python-format
 msgid ""
-"As mentioned above, each client requests that their router provide "
-"tunnels to\n"
+"As mentioned above, each client requests that their router provide tunnels to\n"
 "include at least a certain number of hops.\n"
 "The decision as to how many routers\n"
-"to have in one's outbound and inbound tunnels has an important effect "
-"upon the\n"
-"latency, throughput, reliability, and anonymity provided by I2P - the "
-"more peers\n"
-"that messages have to go through, the longer it takes to get there and "
-"the more\n"
-"likely that one of those routers will fail prematurely.  The less routers"
-" in a\n"
-"tunnel, the easier it is for an adversary to mount traffic analysis "
-"attacks and\n"
+"to have in one's outbound and inbound tunnels has an important effect upon the\n"
+"latency, throughput, reliability, and anonymity provided by I2P - the more peers\n"
+"that messages have to go through, the longer it takes to get there and the more\n"
+"likely that one of those routers will fail prematurely.  The less routers in a\n"
+"tunnel, the easier it is for an adversary to mount traffic analysis attacks and\n"
 "pierce someone's anonymity.\n"
 "Tunnel lengths are specified by clients via\n"
 "<a href=\"%(i2cp)s#options\">I2CP options</a>.\n"
@@ -12775,18 +10938,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:172
 msgid ""
 "With no remote routers in a tunnel, the user has very basic plausible\n"
-"deniability (since no one knows for sure that the peer that sent them the"
-"\n"
-"message wasn't simply just forwarding it on as part of the tunnel). "
-"However, it\n"
-"would be fairly easy to mount a statistical analysis attack and notice "
-"that\n"
-"messages targeting a specific destination are always sent through a "
-"single\n"
-"gateway.  Statistical analysis against outbound 0-hop tunnels are more "
-"complex,\n"
-"but could show similar information (though would be slightly harder to "
-"mount)."
+"deniability (since no one knows for sure that the peer that sent them the\n"
+"message wasn't simply just forwarding it on as part of the tunnel). However, it\n"
+"would be fairly easy to mount a statistical analysis attack and notice that\n"
+"messages targeting a specific destination are always sent through a single\n"
+"gateway.  Statistical analysis against outbound 0-hop tunnels are more complex,\n"
+"but could show similar information (though would be slightly harder to mount)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:182
@@ -12797,14 +10954,10 @@ msgstr ""
 #, python-format
 msgid ""
 "With only one remote router in a tunnel, the user has both plausible\n"
-"deniability and basic anonymity, as long as they are not up against an "
-"internal\n"
-"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>)."
-" However,\n"
-"if the adversary ran a sufficient number of routers such that the single "
-"remote\n"
-"router in the tunnel is often one of those compromised ones, they would "
-"be able\n"
+"deniability and basic anonymity, as long as they are not up against an internal\n"
+"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>). However,\n"
+"if the adversary ran a sufficient number of routers such that the single remote\n"
+"router in the tunnel is often one of those compromised ones, they would be able\n"
 "to mount the above statistical traffic analysis attack."
 msgstr ""
 
@@ -12814,10 +10967,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:193
 msgid ""
-"With two or more remote routers in a tunnel, the costs of mounting the "
-"traffic\n"
-"analysis attack increases, since many remote routers would have to be "
-"compromised\n"
+"With two or more remote routers in a tunnel, the costs of mounting the traffic\n"
+"analysis attack increases, since many remote routers would have to be compromised\n"
 "to mount it."
 msgstr ""
 
@@ -12831,8 +10982,7 @@ msgid ""
 "To reduce the susceptibility to <a href=\"%(url)s\">some attacks</a>,\n"
 "3 or more hops are recommended for the highest level of protection.\n"
 "<a href=\"%(url)s\">Recent studies</a>\n"
-"also conclude that more than 3 hops does not provide additional "
-"protection."
+"also conclude that more than 3 hops does not provide additional protection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:208
@@ -12856,15 +11006,12 @@ msgstr ""
 #, python-format
 msgid ""
 "All tunnels are periodically tested by their creator by sending a\n"
-"DeliveryStatusMessage out an outbound tunnel and bound for another "
-"inbound tunnel\n"
-"(testing both tunnels at once).  If either fails a number of consecutive "
-"tests, it is marked as no longer\n"
+"DeliveryStatusMessage out an outbound tunnel and bound for another inbound tunnel\n"
+"(testing both tunnels at once).  If either fails a number of consecutive tests, it is marked as no longer\n"
 "functional. If it was used for a client's inbound tunnel, a new leaseSet\n"
 "is created.\n"
 "Tunnel test failures are also reflected in the\n"
-"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer "
-"profile</a>."
+"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer profile</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:230
@@ -12874,14 +11021,10 @@ msgstr "Kreator Tunelu"
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:231
 #, python-format
 msgid ""
-"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic "
-"routing</a>\n"
-"a Tunnel Build Message to a router, requesting that they participate in "
-"the\n"
-"tunnel (providing them with all of the appropriate information, as above,"
-" along\n"
-"with a certificate, which right now is a 'null' cert, but will support "
-"hashcash\n"
+"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic routing</a>\n"
+"a Tunnel Build Message to a router, requesting that they participate in the\n"
+"tunnel (providing them with all of the appropriate information, as above, along\n"
+"with a certificate, which right now is a 'null' cert, but will support hashcash\n"
 "or other non-free certificates when necessary).\n"
 "That router forwards the message to the next hop in the tunnel.\n"
 "Details are in the\n"
@@ -12891,8 +11034,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:245
 #, python-format
 msgid ""
-"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic"
-" encryption</a>\n"
+"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic encryption</a>\n"
 "of tunnel messages.\n"
 "Details are in the\n"
 "<a href=\"%(tunnelimpl)s\">tunnel specification</a>.\n"
@@ -12913,8 +11055,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:267
 msgid ""
 "In a distant future release,\n"
-"options specifying the pooling, mixing, and chaff generation settings may"
-" be implemented."
+"options specifying the pooling, mixing, and chaff generation settings may be implemented."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:272
@@ -12957,20 +11098,14 @@ msgstr "Parametry I2CP"
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:6
 msgid ""
-"The I2P Client Protocol (I2CP) exposes a strong separation of concerns "
-"between\n"
-"the router and any client that wishes to communicate over the network.  "
-"It enables\n"
-"secure and asynchronous messaging by sending and receiving messages over "
-"a \n"
+"The I2P Client Protocol (I2CP) exposes a strong separation of concerns between\n"
+"the router and any client that wishes to communicate over the network.  It enables\n"
+"secure and asynchronous messaging by sending and receiving messages over a \n"
 "single TCP socket.\n"
 "With I2CP, a client application tells the\n"
-"router who they are (their \"destination\"), what anonymity, reliability,"
-" and \n"
-"latency tradeoffs to make, and where to send messages.  In turn the "
-"router uses\n"
-"I2CP to tell the client when any messages have arrived, and to request "
-"authorization\n"
+"router who they are (their \"destination\"), what anonymity, reliability, and \n"
+"latency tradeoffs to make, and where to send messages.  In turn the router uses\n"
+"I2CP to tell the client when any messages have arrived, and to request authorization\n"
 "for some tunnels to be used."
 msgstr ""
 
@@ -12979,10 +11114,8 @@ msgstr ""
 msgid ""
 "The protocol itself is implemented in Java, to provide the\n"
 "<a href=\"%(url)s\">Client SDK</a>.\n"
-"This SDK is exposed in the i2p.jar package, which implements the client-"
-"side of I2CP.\n"
-"Clients should never need to access the router.jar package, which "
-"contains the\n"
+"This SDK is exposed in the i2p.jar package, which implements the client-side of I2CP.\n"
+"Clients should never need to access the router.jar package, which contains the\n"
 "router itself and the router-side of I2CP.\n"
 "There is also a <a href=\"%(libi2cp)s\">C library implementation</a>.\n"
 "A non-Java client would also have to implement the\n"
@@ -12993,45 +11126,35 @@ msgstr ""
 #, python-format
 msgid ""
 "Applications can take advantage of the base I2CP plus the \n"
-"<a href=\"%(streaming)s\">streaming</a> and <a "
-"href=\"%(datagrams)s\">datagram</a> libraries\n"
-"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a "
-"href=\"%(bob)s\">BOB</a> protocols,\n"
+"<a href=\"%(streaming)s\">streaming</a> and <a href=\"%(datagrams)s\">datagram</a> libraries\n"
+"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a href=\"%(bob)s\">BOB</a> protocols,\n"
 "which do not require clients to deal with any sort of cryptography.\n"
 "Also, clients may access the network by one of several proxies -\n"
 "HTTP, CONNECT, and SOCKS 4/4a/5.\n"
-"Alternatively, Java clients may access those libraries in "
-"ministreaming.jar and streaming.jar.\n"
+"Alternatively, Java clients may access those libraries in ministreaming.jar and streaming.jar.\n"
 "So there are several options for both Java and non-Java applications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:43
 #, python-format
 msgid ""
-"Client-side end-to-end encryption (encrypting the data over the I2CP "
-"connection)\n"
+"Client-side end-to-end encryption (encrypting the data over the I2CP connection)\n"
 "was disabled in I2P release 0.6,\n"
-"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end "
-"encryption</a>\n"
+"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end encryption</a>\n"
 "which is implemented in the router.\n"
 "The only cryptography that client libraries must still implement is\n"
 "<a href=\"%(cryptography)s#DSA\">DSA public/private key signing</a>\n"
 "for <a href=\"%(i2cp)s#msg_CreateLeaseSet\">LeaseSets</a> and\n"
-"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and"
-" management of those keys."
+"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and management of those keys."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:56
 msgid ""
-"In a standard I2P installation, port 7654 is used by external java "
-"clients to communicate\n"
+"In a standard I2P installation, port 7654 is used by external java clients to communicate\n"
 "with the local router via I2CP.\n"
-"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, "
-"set the\n"
-"router advanced configuration option "
-"<tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n"
-"Clients in the same JVM as the router pass messages directly to the "
-"router\n"
+"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n"
+"router advanced configuration option <tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n"
+"Clients in the same JVM as the router pass messages directly to the router\n"
 "through an internal JVM interface."
 msgstr ""
 
@@ -13039,13 +11162,10 @@ msgstr ""
 #, python-format
 msgid ""
 "The router also supports external connections over SSL.\n"
-"While SSL is not the default, it is strongly recommended for any traffic "
-"that may\n"
-"be exposed to the open Internet. The authorization user/password (if "
-"any), the\n"
+"While SSL is not the default, it is strongly recommended for any traffic that may\n"
+"be exposed to the open Internet. The authorization user/password (if any), the\n"
 "<a href=\"%(commonstructures)s#type_PrivateKey\">Private Key</a> and\n"
-"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private "
-"Key</a> for the\n"
+"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private Key</a> for the\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n"
 "are all transmitted in-the-clear unless SSL is enabled."
 msgstr ""
@@ -13066,19 +11186,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:82
 #, python-format
 msgid ""
-"When a client connects to the router, it first sends a single protocol "
-"version byte (0x2A).\n"
-"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and "
-"waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> "
-"response.\n"
-"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession "
-"Message</a> containing the session configuration.\n"
-"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet"
-" Message</a> from the router, indicating that inbound tunnels\n"
-"have been built, and responds with a CreateLeaseSetMessage containing the"
-" signed LeaseSet.\n"
-"The client may now initiate or receive connections from other I2P "
-"destinations."
+"When a client connects to the router, it first sends a single protocol version byte (0x2A).\n"
+"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> response.\n"
+"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> containing the session configuration.\n"
+"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet Message</a> from the router, indicating that inbound tunnels\n"
+"have been built, and responds with a CreateLeaseSetMessage containing the signed LeaseSet.\n"
+"The client may now initiate or receive connections from other I2P destinations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:91
@@ -13094,10 +11207,7 @@ msgstr ""
 #, python-format
 msgid ""
 "The following options are traditionally passed to the router via\n"
-"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained "
-"in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or "
-"a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession "
-"Message</a>."
+"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession Message</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:104
@@ -13130,14 +11240,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:167
 msgid ""
 "Number of ElGamal/AES Session Tags to send at a time.\n"
-"For clients with relatively low bandwidth per-client-pair (IRC, some UDP "
-"apps), this may be set lower."
+"For clients with relatively low bandwidth per-client-pair (IRC, some UDP apps), this may be set lower."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:179
 msgid ""
-"Comma-separated list of Base 64 Hashes of peers to build tunnels through;"
-" for debugging only"
+"Comma-separated list of Base 64 Hashes of peers to build tunnels through; "
+"for debugging only"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:188
@@ -13154,17 +11263,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:322
 msgid ""
 "Guaranteed is disabled;\n"
-"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1,"
-" the client side default is None as of 0.9.4"
+"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1, the client side default is None as of 0.9.4"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:334
 msgid ""
 "For authorization, if required by the router.\n"
-"If the client is running in the same JVM as a router, this option is not "
-"required.\n"
-"Warning - username and password are sent in the clear to the router, "
-"unless using SSL (i2cp.SSL=true).\n"
+"If the client is running in the same JVM as a router, this option is not required.\n"
+"Warning - username and password are sent in the clear to the router, unless using SSL (i2cp.SSL=true).\n"
 "Authorization is only recommended when using SSL."
 msgstr ""
 
@@ -13238,8 +11344,7 @@ msgid ""
 "Random amount to add or subtract to the length of tunnels in.\n"
 "A positive number x means add a random amount from 0 to x inclusive.\n"
 "A negative number -x means add a random amount from -x to x inclusive.\n"
-"The router will limit the total length of the tunnel to 0 to 7 inclusive."
-"\n"
+"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n"
 "The default variance was 1 prior to release 0.7.6."
 msgstr ""
 
@@ -13248,16 +11353,14 @@ msgid ""
 "Random amount to add or subtract to the length of tunnels out.\n"
 "A positive number x means add a random amount from 0 to x inclusive.\n"
 "A negative number -x means add a random amount from -x to x inclusive.\n"
-"The router will limit the total length of the tunnel to 0 to 7 inclusive."
-"\n"
+"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n"
 "The default variance was 1 prior to release 0.7.6."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:464
 msgid ""
 "Name of tunnel - generally used in routerconsole, which will\n"
-"use the first few characters of the Base64 hash of the destination by "
-"default."
+"use the first few characters of the Base64 hash of the destination by default."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:476
@@ -13273,8 +11376,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:497
 msgid ""
 "Number of tunnels in.\n"
-"Limit was increased from 6 to 16 in release 0.9; however, numbers higher "
-"than 6 are\n"
+"Limit was increased from 6 to 16 in release 0.9; however, numbers higher than 6 are\n"
 "incompatible with older releases."
 msgstr ""
 
@@ -13289,32 +11391,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:538
 msgid ""
 "Any other options prefixed with \"inbound.\" are stored\n"
-"in the \"unknown options\" properties of the inbound tunnel pool's "
-"settings."
+"in the \"unknown options\" properties of the inbound tunnel pool's settings."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:550
 msgid ""
 "Any other options prefixed with \"outbound.\" are stored\n"
-"in the \"unknown options\" properties of the outbound tunnel pool's "
-"settings."
+"in the \"unknown options\" properties of the outbound tunnel pool's settings."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:562
 msgid ""
 "Set to false to disable ever bundling a reply LeaseSet.\n"
 "For clients that do not publish their LeaseSet, this option must be true\n"
-"for any reply to be possible. \"true\" is also recommended for multihomed"
-" servers\n"
+"for any reply to be possible. \"true\" is also recommended for multihomed servers\n"
 "with long connection times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:569
 msgid ""
-"Setting to \"false\" may save significant outbound bandwidth, especially "
-"if\n"
-"the client is configured with a large number of inbound tunnels (Leases)."
-"\n"
+"Setting to \"false\" may save significant outbound bandwidth, especially if\n"
+"the client is configured with a large number of inbound tunnels (Leases).\n"
 "If replies are still required, this may shift the bandwidth burden to\n"
 "the far-end client and the floodfill.\n"
 "There are several cases where \"false\" may be appropriate:"
@@ -13330,14 +11427,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:579
 msgid ""
-"LeaseSet is published, client is a \"server\", all connections are "
-"inbound\n"
-"so the connecting far-end destination obviously has the leaseset already."
-"\n"
-"Connections are either short, or it is acceptable for latency on a long-"
-"lived\n"
-"connection to temporarily increase while the other end re-fetches the "
-"LeaseSet\n"
+"LeaseSet is published, client is a \"server\", all connections are inbound\n"
+"so the connecting far-end destination obviously has the leaseset already.\n"
+"Connections are either short, or it is acceptable for latency on a long-lived\n"
+"connection to temporarily increase while the other end re-fetches the LeaseSet\n"
 "after expiration.\n"
 "HTTP servers may fit these requirements."
 msgstr ""
@@ -13351,15 +11444,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:596
 #, python-format
 msgid ""
-"Note: As of release 0.7.7, option names and values must use UTF-8 "
-"encoding.\n"
+"Note: As of release 0.7.7, option names and values must use UTF-8 encoding.\n"
 "This is primarily useful for nicknames.\n"
-"Prior to that release, options with multi-byte characters were corrupted."
-"\n"
-"Since options are encoded in a <a "
-"href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n"
-"all option names and values are limited to 255 bytes (not characters) "
-"maximum."
+"Prior to that release, options with multi-byte characters were corrupted.\n"
+"Since options are encoded in a <a href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n"
+"all option names and values are limited to 255 bytes (not characters) maximum."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:610
@@ -13370,8 +11459,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:611
 msgid ""
 "The following options are interpreted on the client side,\n"
-"and will be interpreted if passed to the I2PSession via the "
-"I2PClient.createSession() call.\n"
+"and will be interpreted if passed to the I2PSession via the I2PClient.createSession() call.\n"
 "The streaming lib should also pass these options through to I2CP.\n"
 "Other implementations may have different defaults."
 msgstr ""
@@ -13447,28 +11535,24 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:871
 msgid ""
 "Connect to the router using SSL.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:883
 msgid ""
 "Router hostname.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:895
 msgid ""
 "Router I2CP port.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:902
 msgid ""
-"Note: All arguments, including numbers, are strings. True/false values "
-"are case-insensitive strings.\n"
+"Note: All arguments, including numbers, are strings. True/false values are case-insensitive strings.\n"
 "Anything other than case-insensitive \"true\" is interpreted as false.\n"
 "All option names are case-sensitive."
 msgstr ""
@@ -13480,28 +11564,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:909
 #, python-format
 msgid ""
-"The end-to-end messages handled by I2CP (i.e. the data sent by the client"
-" in a\n"
+"The end-to-end messages handled by I2CP (i.e. the data sent by the client in a\n"
 "<a href=\"%(i2cp)s#msg_SendMessage\">SendMessageMessage</a>\n"
 "and received by the client in a\n"
 "<a href=\"%(i2cp)s#msg_MessagePayload\">MessagePayloadMessage</a>)\n"
 "are gzipped with a standard 10-byte gzip\n"
 "header beginning with 0x1F 0x8B 0x08 as\n"
-"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC "
-"1952</a>.\n"
-"As of release 0.7.1, I2P uses ignored portions of the gzip header to "
-"include\n"
-"protocol, from-port, and to-port information, thus supporting streaming "
-"and\n"
-"datagrams on the same destination, and allowing query/response using "
-"datagrams\n"
+"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC 1952</a>.\n"
+"As of release 0.7.1, I2P uses ignored portions of the gzip header to include\n"
+"protocol, from-port, and to-port information, thus supporting streaming and\n"
+"datagrams on the same destination, and allowing query/response using datagrams\n"
 "to work reliably in the presence of multiple channels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:923
 msgid ""
-"The gzip function cannot be completely turned off, however setting "
-"i2cp.gzip=false\n"
+"The gzip function cannot be completely turned off, however setting i2cp.gzip=false\n"
 "turns the gzip effort setting to 0, which may save a little CPU."
 msgstr ""
 
@@ -13535,7 +11613,8 @@ msgid "Gzip xflags"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:960
-msgid "I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)"
+msgid ""
+"I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:969
@@ -13560,8 +11639,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:987
 #, python-format
 msgid ""
-"Some improvements may be able to use messages previously defined but not "
-"implemented.\n"
+"Some improvements may be able to use messages previously defined but not implemented.\n"
 "For reference, here is the\n"
 "<a href=\"%(pdf1)s\">I2CP Protocol Specification Version 0.9</a>\n"
 "(PDF) dated August 28, 2003.\n"
@@ -13580,12 +11658,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2np.html:6
 msgid ""
 "The I2P Network Protocol (I2NP),\n"
-"which is sandwiched between I2CP and the various I2P transport protocols,"
-" manages the\n"
-"routing and mixing of messages between routers, as well as the selection "
-"of what\n"
-"transports to use when communicating with a peer for which there are "
-"multiple\n"
+"which is sandwiched between I2CP and the various I2P transport protocols, manages the\n"
+"routing and mixing of messages between routers, as well as the selection of what\n"
+"transports to use when communicating with a peer for which there are multiple\n"
 "common transports supported."
 msgstr ""
 
@@ -13595,20 +11670,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:15
 msgid ""
-"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-"
-"router, point-to-point messages.\n"
-"By encrypting and wrapping messages in other messages, they can be sent "
-"in a secure way\n"
+"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-router, point-to-point messages.\n"
+"By encrypting and wrapping messages in other messages, they can be sent in a secure way\n"
 "through multiple hops to the ultimate destination.\n"
-"Priority is only used locally at the origin, i.e. when queuing for "
-"outbound delivery."
+"Priority is only used locally at the origin, i.e. when queuing for outbound delivery."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:22
 #, python-format
 msgid ""
-"The priorities listed below may not be current and are subject to change."
-"\n"
+"The priorities listed below may not be current and are subject to change.\n"
 "See the <a href=\"%(outnetmessage)s\">OutNetMessage Javadocs</a>\n"
 "for the current priority settings.\n"
 "Priority queueing implementation may vary."
@@ -13620,8 +11691,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:31
 msgid ""
-"The following table specifies the traditional 16-byte header used in "
-"NTCP.\n"
+"The following table specifies the traditional 16-byte header used in NTCP.\n"
 "The SSU and NTCP2 transports use modified headers."
 msgstr ""
 
@@ -13658,23 +11728,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2np.html:46
 #, python-format
 msgid ""
-"While the maximum payload size is nominally 64KB, the size is further "
-"constrained by the\n"
-"method of fragmenting I2NP messages into multiple 1KB tunnel messages as "
-"described on\n"
+"While the maximum payload size is nominally 64KB, the size is further constrained by the\n"
+"method of fragmenting I2NP messages into multiple 1KB tunnel messages as described on\n"
 "<a href=\"%(tunnelimpl)s\">the tunnel implementation page</a>.\n"
-"The maximum number of fragments is 64, and the message may not be "
-"perfectly aligned,\n"
+"The maximum number of fragments is 64, and the message may not be perfectly aligned,\n"
 "So the message must nominally fit in 63 fragments."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:54
 msgid ""
-"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL "
-"delivery mode);\n"
+"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL delivery mode);\n"
 "the maximum size of a follow-on fragment is 996 bytes.\n"
-"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 "
-"bytes, or 61.2 KB."
+"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 bytes, or 61.2 KB."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:60
@@ -13682,16 +11747,13 @@ msgid ""
 "In addition, the transports may have additional restrictions.\n"
 "The NTCP limit is 16KB - 6 = 16378 bytes.\n"
 "The SSU limit is approximately 32 KB.\n"
-"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher"
-" than what a tunnel can support."
+"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher than what a tunnel can support."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:67
 msgid ""
-"Note that these are not the limits for datagrams that the client sees, as"
-" the\n"
-"router may bundle a reply leaseset and/or session tags together with the "
-"client message\n"
+"Note that these are not the limits for datagrams that the client sees, as the\n"
+"router may bundle a reply leaseset and/or session tags together with the client message\n"
 "in a garlic message. The leaseset and tags together may add about 5.5KB.\n"
 "Therefore the current datagram limit is about 10KB. This limit will be\n"
 "increased in a future release."
@@ -13748,8 +11810,7 @@ msgid ""
 "Priority may vary.\n"
 "Size is 898 bytes for a typical 2-lease leaseSet.\n"
 "RouterInfo structures are compressed, and size varies; however\n"
-"there is a continuing effort to reduce the amount of data published in a "
-"RouterInfo\n"
+"there is a continuing effort to reduce the amount of data published in a RouterInfo\n"
 "as we approach release 1.0."
 msgstr ""
 
@@ -13759,8 +11820,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:150
 msgid ""
-"Used for message replies, and for testing tunnels - generally wrapped in "
-"a GarlicMessage"
+"Used for message replies, and for testing tunnels - generally wrapped in a "
+"GarlicMessage"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:158
@@ -13771,8 +11832,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:185
 msgid ""
-"The most common message. Priority for tunnel participants, outbound "
-"endpoints, and inbound gateways was\n"
+"The most common message. Priority for tunnel participants, outbound endpoints, and inbound gateways was\n"
 "reduced to 200 as of release 0.6.1.33.\n"
 "Outbound gateway messages (i.e. those originated locally) remains at 400."
 msgstr ""
@@ -13803,16 +11863,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(i2npspec)s\">On the I2NP Specification page</a>.\n"
 "See also the\n"
-"<a href=\"%(commonstructures)s\">Common Data Structure Specification "
-"page</a>."
+"<a href=\"%(commonstructures)s\">Common Data Structure Specification page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:234
 msgid ""
-"It isn't clear whether the current priority scheme is generally "
-"effective,\n"
-"and whether the priorities for various messages should be adjusted "
-"further.\n"
+"It isn't clear whether the current priority scheme is generally effective,\n"
+"and whether the priorities for various messages should be adjusted further.\n"
 "This is a topic for further research, analysis and testing."
 msgstr ""
 
@@ -13834,8 +11891,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:12
 msgid ""
 "Each of the layers in the stack provides extra capabilities.\n"
-"The capabilities are listed below, starting at the bottom of the protocol"
-" stack."
+"The capabilities are listed below, starting at the bottom of the protocol stack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:18
@@ -13844,8 +11900,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:20
 msgid ""
-"IP: Internet Protocol, allow addressing hosts on the regular internet and"
-" routing packets across the internet using best-effort delivery."
+"IP: Internet Protocol, allow addressing hosts on the regular internet and "
+"routing packets across the internet using best-effort delivery."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:23
@@ -13866,11 +11922,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:30
 msgid ""
-"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P "
-"routers. These are not anonymous yet, this is strictly a hop-to-hop "
-"connection.\n"
-"Two protocols are implemented to provide these capabilities. NTCP builds "
-"on top of TCP, while SSU uses UDP."
+"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P routers. These are not anonymous yet, this is strictly a hop-to-hop connection.\n"
+"Two protocols are implemented to provide these capabilities. NTCP builds on top of TCP, while SSU uses UDP."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:35
@@ -13888,20 +11941,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:42
 #, python-format
 msgid ""
-"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are "
-"large messages containing encrypted I2NP (see below) messages and "
-"encrypted instructions for their delivery.\n"
-"The encryption is layered. The first hop will decrypt the tunnel message "
-"and read a part. Another part can still be encrypted (with another key),"
-"\n"
+"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are large messages containing encrypted I2NP (see below) messages and encrypted instructions for their delivery.\n"
+"The encryption is layered. The first hop will decrypt the tunnel message and read a part. Another part can still be encrypted (with another key),\n"
 "so it will be forwarded."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:48
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are"
-" used to pass messages through multiple routers. These I2NP messages are "
+"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are "
+"used to pass messages through multiple routers. These I2NP messages are "
 "combined in tunnel messages."
 msgstr ""
 
@@ -13914,54 +11963,51 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:55
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are"
-" wrapped in each other and used to ensure encryption between two tunnels "
-"and are passed along from source to destination, keeping both anonymous."
+"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are "
+"wrapped in each other and used to ensure encryption between two tunnels and "
+"are passed along from source to destination, keeping both anonymous."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:61
 msgid ""
-"The following layers are strictly speaking no longer part of the I2P "
-"Protocol stack, they are not part of the core 'I2P router' functionality."
-"\n"
-"However, each of these layers adds additional functionality, to allow "
-"applications simple and convenient I2P usage."
+"The following layers are strictly speaking no longer part of the I2P Protocol stack, they are not part of the core 'I2P router' functionality.\n"
+"However, each of these layers adds additional functionality, to allow applications simple and convenient I2P usage."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:67
 msgid ""
-"<b>I2P Client Layer:</b> allow any client to use I2P functionality, "
-"without requiring the direct use of the router API."
+"<b>I2P Client Layer:</b> allow any client to use I2P functionality, without "
+"requiring the direct use of the router API."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:69
 #, python-format
 msgid ""
 "<a href=\"%(i2cp)s\">I2CP</a>: I2P Client Protocol, allows secure and "
-"asynchronous messaging over I2P by communicating messages over the I2CP "
-"TCP socket."
+"asynchronous messaging over I2P by communicating messages over the I2CP TCP "
+"socket."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:74
 msgid ""
-"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like "
-"functionality on top of I2P."
+"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like functionality "
+"on top of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:76
 #, python-format
 msgid ""
-"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of "
-"TCP-like streams over I2P. This allows easier porting of existing "
-"applications to I2P."
+"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of TCP-"
+"like streams over I2P. This allows easier porting of existing applications "
+"to I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:80
 #, python-format
 msgid ""
 "<a href=\"%(datagrams)s\">Datagram Library</a>: an implementation of UDP-"
-"like messages over I2P. This allows easier porting of existing "
-"applications to I2P."
+"like messages over I2P. This allows easier porting of existing applications "
+"to I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:85
@@ -13981,8 +12027,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:99
 msgid ""
-"Finally, what could be considered the <b>'I2P application layer'</b>, is "
-"a large number of applications on top of I2P.\n"
+"Finally, what could be considered the <b>'I2P application layer'</b>, is a large number of applications on top of I2P.\n"
 "We can order this based on the I2P stack layer they use."
 msgstr ""
 
@@ -14034,12 +12079,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:8
 msgid ""
-"A \"transport\" in I2P is a method for direct, point-to-point "
-"communication\n"
+"A \"transport\" in I2P is a method for direct, point-to-point communication\n"
 "between two routers.\n"
 "Transports must provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router "
-"contacted \n"
+"against external adversaries while authenticating that the router contacted \n"
 "is the one who should receive a given message."
 msgstr ""
 
@@ -14093,8 +12136,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:44
 msgid ""
 "Maintain a set of router addresses, one or more for each transport,\n"
-"that the router publishes as its global contact information (the "
-"RouterInfo).\n"
+"that the router publishes as its global contact information (the RouterInfo).\n"
 "Each transport may connect using one of these addresses, which may be\n"
 "IPv4 or (as of version 0.9.8) IPv6."
 msgstr ""
@@ -14123,10 +12165,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:55
 msgid ""
-"Maintenance of connection limits for each transport, implementation of "
-"various thresholds for these limits,\n"
-"and communication of threshold status to the router so it may make "
-"operational changes based on the status"
+"Maintenance of connection limits for each transport, implementation of various thresholds for these limits,\n"
+"and communication of threshold status to the router so it may make operational changes based on the status"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:59
@@ -14145,27 +12185,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:62
 msgid ""
-"Coordination of firewall status and local IP, and changes to either, "
-"among the transports"
+"Coordination of firewall status and local IP, and changes to either, among "
+"the transports"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:63
 #: i2p2www/pages/site/docs/transport/ssu.html:35
 msgid ""
-"Communication of firewall status and local IP, and changes to either, to "
-"the router and the user interface"
+"Communication of firewall status and local IP, and changes to either, to the"
+" router and the user interface"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:64
 msgid ""
-"Determination of a consensus clock, which is used to periodically update "
-"the router's clock, as a backup for NTP"
+"Determination of a consensus clock, which is used to periodically update the"
+" router's clock, as a backup for NTP"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:65
 msgid ""
-"Maintenance of status for each peer, including whether it is connected, "
-"whether it was recently connected,\n"
+"Maintenance of status for each peer, including whether it is connected, whether it was recently connected,\n"
 "and whether it was reachable in the last attempt"
 msgstr ""
 
@@ -14175,8 +12214,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:70
 msgid ""
-"Honoring the automated and manual lists of banned peers maintained by the"
-" router,\n"
+"Honoring the automated and manual lists of banned peers maintained by the router,\n"
 "and refusing outbound and inbound connections to those peers"
 msgstr ""
 
@@ -14186,10 +12224,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:79
 msgid ""
-"The transport subsystem maintains a set of router addresses, each of "
-"which lists a transport method, IP, and port.\n"
-"These addresses constitute the advertised contact points, and are "
-"published by the router to the network database.\n"
+"The transport subsystem maintains a set of router addresses, each of which lists a transport method, IP, and port.\n"
+"These addresses constitute the advertised contact points, and are published by the router to the network database.\n"
 "Addresses may also contain an arbitrary set of additional options."
 msgstr ""
 
@@ -14210,16 +12246,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:92
 #, python-format
 msgid ""
-"A router is firewalled, and therefore publishes an SSU address which "
-"contains a list of cooperating\n"
-"peers or \"introducers\" who will assist in NAT traversal (see <a "
-"href=\"%(ssu)s\">the SSU spec</a> for details)"
+"A router is firewalled, and therefore publishes an SSU address which contains a list of cooperating\n"
+"peers or \"introducers\" who will assist in NAT traversal (see <a href=\"%(ssu)s\">the SSU spec</a> for details)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:96
 msgid ""
-"A router is not firewalled or its NAT ports  are open; it publishes both "
-"NTCP and SSU addresses containing\n"
+"A router is not firewalled or its NAT ports  are open; it publishes both NTCP and SSU addresses containing\n"
 "directly-accessible IP and ports."
 msgstr ""
 
@@ -14230,10 +12263,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:104
 #, python-format
 msgid ""
-"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> "
-"only. The transport selected for any message is\n"
-"independent of the upper-layer protocols and contents (router or client "
-"messages, whether an external application was using\n"
+"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> only. The transport selected for any message is\n"
+"independent of the upper-layer protocols and contents (router or client messages, whether an external application was using\n"
 "TCP or UDP to connect to I2P, whether the upper layer was using\n"
 "<a href=\"%(streaming)s\">the streaming library</a>\n"
 "streaming\n"
@@ -14245,15 +12276,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:118
 msgid ""
-"For each outgoing message, the transport system solicits \"bids\" from "
-"each transport.\n"
-"The transport bidding the lowest (best) value wins the bid and receives "
-"the message for delivery.\n"
+"For each outgoing message, the transport system solicits \"bids\" from each transport.\n"
+"The transport bidding the lowest (best) value wins the bid and receives the message for delivery.\n"
 "A transport may refuse to bid."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:124
-msgid "Whether a transport bids, and with what value, depend on numerous factors:"
+msgid ""
+"Whether a transport bids, and with what value, depend on numerous factors:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:128
@@ -14276,8 +12306,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:132
 msgid ""
-"The size of the message, as different transports have different size "
-"limits"
+"The size of the message, as different transports have different size limits"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:133
@@ -14287,7 +12316,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:134
-msgid "Whether the connection would be indirect (requiring introducers) or direct"
+msgid ""
+"Whether the connection would be indirect (requiring introducers) or direct"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:135
@@ -14296,8 +12326,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:138
 msgid ""
-"In general, the bid values are selected so that two routers are only "
-"connected by a single transport\n"
+"In general, the bid values are selected so that two routers are only connected by a single transport\n"
 "at any one time. However, this is not a requirement."
 msgstr ""
 
@@ -14315,8 +12344,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:153
 msgid ""
-"An \"indirect\" transport for routers that are not reachable by all other"
-" routers (one form of \"restricted routes\")"
+"An \"indirect\" transport for routers that are not reachable by all other "
+"routers (one form of \"restricted routes\")"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:154
@@ -14325,31 +12354,24 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:157
 msgid ""
-"Work continues on adjusting default connection limits for each transport."
-"\n"
-"I2P is designed as a \"mesh network\", where it is assumed that any "
-"router can connect to any other router.\n"
-"This assumption may be broken by routers that have exceeded their "
-"connection limits, and by\n"
+"Work continues on adjusting default connection limits for each transport.\n"
+"I2P is designed as a \"mesh network\", where it is assumed that any router can connect to any other router.\n"
+"This assumption may be broken by routers that have exceeded their connection limits, and by\n"
 "routers that are behind restrictive state firewalls (restricted routes)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:164
 msgid ""
-"The current connection limits are higher for SSU than for NTCP, based on "
-"the assumption that\n"
-"the memory requirements for an NTCP connection are higher than that for "
-"SSU.\n"
-"However, as NTCP buffers are partially in the kernel and SSU buffers are "
-"on the Java heap,\n"
+"The current connection limits are higher for SSU than for NTCP, based on the assumption that\n"
+"the memory requirements for an NTCP connection are higher than that for SSU.\n"
+"However, as NTCP buffers are partially in the kernel and SSU buffers are on the Java heap,\n"
 "that assumption is difficult to verify."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:171
 #, python-format
 msgid ""
-"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol "
-"Obfuscation</a>\n"
+"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol Obfuscation</a>\n"
 "and see how transport-layer padding may improve things."
 msgstr ""
 
@@ -14360,11 +12382,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:6
 #, python-format
 msgid ""
-"The others are <a href=\"%(ssu)s\">SSU</a> and <a "
-"href=\"%(ntcp2)s\">NTCP2</a>.\n"
+"The others are <a href=\"%(ssu)s\">SSU</a> and <a href=\"%(ntcp2)s\">NTCP2</a>.\n"
 "NTCP is a Java NIO-based transport introduced in I2P release 0.6.1.22.\n"
-"Java NIO (new I/O) does not suffer from the 1 thread per connection "
-"issues of the old TCP transport.\n"
+"Java NIO (new I/O) does not suffer from the 1 thread per connection issues of the old TCP transport.\n"
 "NTCP-over-IPv6 is supported as of version 0.9.8."
 msgstr ""
 
@@ -14379,8 +12399,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:21
 msgid ""
-"The NTCP code within I2P is relatively lightweight (1/4 the size of the "
-"SSU code)\n"
+"The NTCP code within I2P is relatively lightweight (1/4 the size of the SSU code)\n"
 "because it uses the underlying Java TCP transport for reliable delivery."
 msgstr ""
 
@@ -14405,21 +12424,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:47
 msgid ""
 "After establishment,\n"
-"the NTCP transport sends individual I2NP messages, with a simple "
-"checksum.\n"
+"the NTCP transport sends individual I2NP messages, with a simple checksum.\n"
 "The unencrypted message is encoded as follows:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:65
 msgid ""
-"The data is then AES/256/CBC encrypted. The session key for the "
-"encryption\n"
+"The data is then AES/256/CBC encrypted. The session key for the encryption\n"
 "is negotiated during establishment (using Diffie-Hellman 2048 bit).\n"
-"The establishment between two routers is implemented in the "
-"EstablishState class\n"
+"The establishment between two routers is implemented in the EstablishState class\n"
 "and detailed below.\n"
-"The IV for AES/256/CBC encryption is the last 16 bytes of the previous "
-"encrypted message."
+"The IV for AES/256/CBC encryption is the last 16 bytes of the previous encrypted message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:73
@@ -14443,8 +12458,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:93
 msgid ""
-"Total length: 16 bytes. The time sync message is sent at approximately 15"
-" minute intervals.\n"
+"Total length: 16 bytes. The time sync message is sent at approximately 15 minute intervals.\n"
 "The message is encrypted just as standard messages are."
 msgstr ""
 
@@ -14467,14 +12481,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:107
 #: i2p2www/pages/site/docs/transport/ssu.html:188
 msgid ""
-"Idle timeout and connection close is at the discretion of each endpoint "
-"and may vary.\n"
-"The current implementation lowers the timeout as the number of "
-"connections approaches the\n"
-"configured maximum, and raises the timeout when the connection count is "
-"low.\n"
-"The recommended minimum timeout is two minutes or more, and the "
-"recommended\n"
+"Idle timeout and connection close is at the discretion of each endpoint and may vary.\n"
+"The current implementation lowers the timeout as the number of connections approaches the\n"
+"configured maximum, and raises the timeout when the connection count is low.\n"
+"The recommended minimum timeout is two minutes or more, and the recommended\n"
 "maximum timeout is ten minutes or more."
 msgstr ""
 
@@ -14485,12 +12495,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:117
 msgid ""
 "After establishment, and every 30-60 minutes thereafter,\n"
-"the two routers should generally exchange RouterInfos using a "
-"DatabaseStoreMessage.\n"
-"However, Alice should check if the first queued message is a "
-"DatabaseStoreMessage\n"
-"so as not to send a duplicate message; this is often the case when "
-"connecting to a floodfill router."
+"the two routers should generally exchange RouterInfos using a DatabaseStoreMessage.\n"
+"However, Alice should check if the first queued message is a DatabaseStoreMessage\n"
+"so as not to send a duplicate message; this is often the case when connecting to a floodfill router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:125
@@ -14499,11 +12506,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:126
 msgid ""
-"In the establish state, there is a 4-phase message sequence to exchange "
-"DH keys and signatures.\n"
+"In the establish state, there is a 4-phase message sequence to exchange DH keys and signatures.\n"
 "In the first two messages there is a 2048-bit Diffie Hellman exchange.\n"
-"Then, signatures of the critical data are exchanged to confirm the "
-"connection."
+"Then, signatures of the critical data are exchanged to confirm the connection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:142
@@ -14541,15 +12546,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:159
 msgid ""
 "The DH key exchange consists of a number of steps, displayed below.\n"
-"The mapping between these steps and the messages sent between I2P "
-"routers,\n"
+"The mapping between these steps and the messages sent between I2P routers,\n"
 "is marked in bold."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:165
 msgid ""
-"Alice generates a secret integer x. She then calculates <code>X = g^x mod"
-" p</code>."
+"Alice generates a secret integer x. She then calculates <code>X = g^x mod "
+"p</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:166
@@ -14583,8 +12587,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:173
 #, python-format
 msgid ""
-"The sessionKey is then used to exchange identities in <b>Message 3</b> "
-"and <b>Message 4</b>.\n"
+"The sessionKey is then used to exchange identities in <b>Message 3</b> and <b>Message 4</b>.\n"
 "The exponent (x and y) length for the DH exchange is documented on the\n"
 "<a href=\"%(crypto)s#exponent\">cryptography page</a>."
 msgstr ""
@@ -14597,8 +12600,7 @@ msgstr ""
 #, python-format
 msgid ""
 "This is the DH request. Alice already has Bob's\n"
-"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router "
-"Identity</a>,\n"
+"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router Identity</a>,\n"
 "IP address, and port, as contained in his\n"
 "<a href=\"%(commonstructures)s#struct_RouterInfo\">Router Info</a>,\n"
 "which was published to the\n"
@@ -14678,8 +12680,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:312
 #, python-format
 msgid ""
-"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH "
-"session key and\n"
+"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
 "                  the last 16 bytes of Y as the IV"
 msgstr ""
 
@@ -14695,8 +12696,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:326
 msgid ""
-"This contains Alice's router identity, and a signature of the critical "
-"data. Alice sends Bob:"
+"This contains Alice's router identity, and a signature of the critical data."
+" Alice sends Bob:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:360
@@ -14716,17 +12717,14 @@ msgstr ""
 msgid ""
 "the `Signature` of the following concatenated data:\n"
 "             X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-"             Alice signs it with the `SigningPrivateKey` associated with "
-"the `SigningPublicKey` in her `RouterIdentity`"
+"             Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:389
 #, python-format
 msgid ""
-"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH"
-" session key and\n"
-"                  the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
-"of message #1) as the IV"
+"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
+"                  the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:400
@@ -14741,8 +12739,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:406
 msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this "
-"message as the IV for the next message."
+"Alice will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:430
@@ -14757,19 +12755,15 @@ msgstr ""
 msgid ""
 "the `Signature` of the following concatenated data:\n"
 "             X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-"             Bob signs it with the `SigningPrivateKey` associated with "
-"the `SigningPublicKey` in his `RouterIdentity`"
+"             Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:479
 #, python-format
 msgid ""
-"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH "
-"session key and\n"
-"                  the last 16 bytes of the encrypted contents of message "
-"#2 as the IV\n"
-"                  48 bytes for a DSA signature, may vary for other "
-"signature types"
+"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
+"                  the last 16 bytes of the encrypted contents of message #2 as the IV\n"
+"                  48 bytes for a DSA signature, may vary for other signature types"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:488
@@ -14778,8 +12772,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:491
 msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
+"Bob will use the last 16 bytes of the encrypted contents of this message as "
+"the IV for the next message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:506
@@ -14788,14 +12782,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:507
 msgid ""
-"The connection is established, and standard or time sync messages may be "
-"exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session"
-" key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 "
-"as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
-" the next IV."
+"The connection is established, and standard or time sync messages may be exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:516
@@ -14822,8 +12812,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:528
 msgid ""
-"that many bytes making up the local router's IP address (as reached by "
-"the remote side)"
+"that many bytes making up the local router's IP address (as reached by the "
+"remote side)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:529
@@ -14842,8 +12832,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:532
 msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 "
-"through bytes 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 through "
+"bytes 223"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:535
@@ -14866,11 +12856,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:550
 msgid ""
 "A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to"
-" \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
 "end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next "
-"16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
 "to create a limited number of message sizes."
 msgstr ""
 
@@ -14893,28 +12881,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:7
 #, python-format
 msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user "
-"interfaces)\n"
-"is one of three <a href=\"%(transports)s\">transports</a> currently "
-"implemented in I2P.\n"
-"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a "
-"href=\"%(ntcp2)s\">NTCP2</a>."
+"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
+"is one of three <a href=\"%(transports)s\">transports</a> currently implemented in I2P.\n"
+"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a href=\"%(ntcp2)s\">NTCP2</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:13
 msgid ""
 "SSU was introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for "
-"outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
 "SSU-over-IPv6 is supported as of version 0.9.8."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:19
 msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit "
-"unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is "
-"dropped."
+"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is dropped."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:24
@@ -14923,10 +12905,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:26
 msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
-"oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, "
-"including:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:32
@@ -14943,8 +12923,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:34
 msgid ""
-"Communication of firewall status and local IP, and changes to either to "
-"NTCP"
+"Communication of firewall status and local IP, and changes to either to NTCP"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:46
@@ -14979,26 +12958,20 @@ msgid ""
 "Packets are scheduled according to the router's policy, taking care\n"
 "not to exceed the router's outbound capacity or to exceed the measured \n"
 "capacity of the remote peer.  The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive "
-"increases\n"
-"to the sending capacity and multiplicative decreases in face of "
-"congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive increases\n"
+"to the sending capacity and multiplicative decreases in face of congestion.\n"
 "Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit"
-" \n"
+"a given period or number of retransmissions while continuing to transmit \n"
 "other messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:106
 msgid ""
 "The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message"
-"\n"
-"has a limited size - at most, 32KB.  To efficiently transmit this "
-"feedback\n"
+"message has its own unique and nonsequential identifier, and each message\n"
+"has a limited size - at most, 32KB.  To efficiently transmit this feedback\n"
 "to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received"
-"\n"
+"message identifiers and may also include bitfields for partially received\n"
 "messages, where each bit represents the reception of a fragment.  If \n"
 "duplicate fragments arrive, the message should be ACKed again, or if the\n"
 "message has still not been fully received, the bitfield should be \n"
@@ -15008,8 +12981,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:118
 msgid ""
 "The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment "
-"into\n"
+"any particular size, but instead just places a single message fragment into\n"
 "a packet and sends it off (careful not to exceed the MTU)."
 msgstr ""
 
@@ -15017,8 +12989,7 @@ msgstr ""
 msgid ""
 "As of router version 0.8.12,\n"
 "two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are "
-"retransmitted."
+"The MTU value is adjusted based on the percentage of packets that are retransmitted."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:131
@@ -15037,10 +13008,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:143
 msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP "
-"messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
-"to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
 "into a live network MTU anyway)."
 msgstr ""
 
@@ -15060,8 +13029,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:161
 msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than "
-"1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
 "it will publish that in the network database, and other routers should\n"
 "honor that when a connection is established."
 msgstr ""
@@ -15081,13 +13049,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:175
 msgid ""
 "While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or "
-"128.\n"
-"The current implementation, however, limits each message to a maximum of "
-"64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
+"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
 "which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical "
-"limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
 "at the application level is about 6KB lower, or about 26KB.\n"
 "Further work is necessary to raise the UDP transport limit above 32KB.\n"
 "For connections using the larger MTU, larger messages are possible."
@@ -15101,8 +13066,7 @@ msgstr "Klucze"
 msgid ""
 "All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
 "When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and "
-"are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
 "for the HMAC and encryption, respectively.  During the DH exchange, \n"
 "Bob's publicly knowable introKey is used for the MAC and encryption."
 msgstr ""
@@ -15119,8 +13083,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:216
 msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and"
-" port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
 "with all established sessions - if there are matches,\n"
 "that session's MAC keys are tested in the HMAC.  If none\n"
 "of those verify or if there are no matching IP addresses, the \n"
@@ -15210,8 +13173,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:296
 msgid ""
-"Direct session establishment is used when no third party is required for "
-"NAT traversal.\n"
+"Direct session establishment is used when no third party is required for NAT traversal.\n"
 "The message sequence is as follows:"
 msgstr ""
 
@@ -15231,10 +13193,8 @@ msgid ""
 "After the SessionConfirmed message is received, Bob sends a small\n"
 "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">DeliveryStatus message</a>\n"
 "as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the"
-"\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
-"\n"
+"In this message, the 4-byte message ID is set to a random number, and the\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
 "(i.e. 0x0000000000000002)."
 msgstr ""
 
@@ -15250,8 +13210,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:335
 msgid ""
-"It does not appear that the type of the status message or its contents "
-"matters.\n"
+"It does not appear that the type of the status message or its contents matters.\n"
 "It was originally added becasue the DatabaseStore message was delayed\n"
 "several seconds; since the store is now sent immediately, perhaps\n"
 "the status message can be eliminated."
@@ -15261,8 +13220,7 @@ msgstr ""
 msgid ""
 "Introduction keys are delivered through an external channel \n"
 "(the network database),\n"
-"where they have traditionally been identical to the router Hash through "
-"release 0.9.47,\n"
+"where they have traditionally been identical to the router Hash through release 0.9.47,\n"
 "but may be random as of release 0.9.48.\n"
 "They must be used when establishing a session key.  For the indirect\n"
 "address, the peer must first contact the relayhost and ask them for\n"
@@ -15281,24 +13239,16 @@ msgid ""
 "is necessary for efficient NAT traversal.  Charlie, a router behind a\n"
 "NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
 "first contacts a few peers, choosing some to serve as introducers.  Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
-"introduction\n"
-"tag - a 4 byte random number - which he then makes available to the "
-"public\n"
-"as methods of contacting him.  Alice, a router who has Charlie's "
-"published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the"
-" \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
+"tag - a 4 byte random number - which he then makes available to the public\n"
+"as methods of contacting him.  Alice, a router who has Charlie's published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the \n"
 "introducers, asking each to introduce her to Charlie (offering the \n"
 "introduction tag to identify Charlie).  Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends"
-"\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port"
-"\n"
-"number.  When Charlie receives the RelayIntro packet, he sends off a "
-"small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
-"\n"
+"packet to Charlie including Alice's public IP and port number, then sends\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
+"number.  When Charlie receives the RelayIntro packet, he sends off a small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
 "and when Alice receives Bob's RelayResponse packet, she begins a new \n"
 "full direction session establishment with the specified IP and port."
 msgstr ""
@@ -15308,20 +13258,21 @@ msgid "Connection establishment (indirect using an introducer)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:389
-msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
+msgid ""
+"Alice first connects to introducer Bob, who relays the request to Charlie."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:407
 msgid ""
-"After the hole punch, the session is established between Alice and "
-"Charlie as in a direct establishment."
+"After the hole punch, the session is established between Alice and Charlie "
+"as in a direct establishment."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:422
+#: i2p2www/pages/site/docs/transport/ssu.html:427
 msgid "Peer testing"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:424
+#: i2p2www/pages/site/docs/transport/ssu.html:429
 msgid ""
 "The automation of collaborative reachability testing for peers is\n"
 "enabled by a sequence of PeerTest messages.  With its proper \n"
@@ -15330,7 +13281,7 @@ msgid ""
 "quite simple:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:443
+#: i2p2www/pages/site/docs/transport/ssu.html:448
 msgid ""
 "Each of the PeerTest messages carry a nonce identifying the\n"
 "test series itself, as initialized by Alice.  If Alice doesn't \n"
@@ -15340,7 +13291,7 @@ msgid ""
 "that may be reached are as follows:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:453
+#: i2p2www/pages/site/docs/transport/ssu.html:458
 msgid ""
 "If she doesn't receive a response from Bob, she will retransmit\n"
 "up to a certain number of times, but if no response ever arrives,\n"
@@ -15350,7 +13301,7 @@ msgid ""
 "Charlie to reply."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:462
+#: i2p2www/pages/site/docs/transport/ssu.html:467
 msgid ""
 "If Alice doesn't receive a PeerTest message with the \n"
 "expected nonce from a third party (Charlie), she will retransmit\n"
@@ -15362,7 +13313,7 @@ msgid ""
 "IP and port that Bob offered up should be forwarded)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:473
+#: i2p2www/pages/site/docs/transport/ssu.html:478
 msgid ""
 "If Alice receives Bob's PeerTest message and both of Charlie's\n"
 "PeerTest messages but the enclosed IP and port numbers in Bob's \n"
@@ -15373,7 +13324,7 @@ msgid ""
 "remote connectivity, ignoring further port discovery."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:483
+#: i2p2www/pages/site/docs/transport/ssu.html:488
 msgid ""
 "If Alice receives Charlie's first message but not his second,\n"
 "she will retransmit her PeerTest message to Charlie up to a \n"
@@ -15381,7 +13332,7 @@ msgid ""
 "that Charlie is either confused or no longer online."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:491
+#: i2p2www/pages/site/docs/transport/ssu.html:496
 msgid ""
 "Alice should choose Bob arbitrarily from known peers who seem\n"
 "to be capable of participating in peer tests.  Bob in turn should\n"
@@ -15392,7 +13343,7 @@ msgid ""
 "to designate a new peer as Bob and try again with a different nonce."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:501
+#: i2p2www/pages/site/docs/transport/ssu.html:506
 msgid ""
 "Alice's introduction key is included in all of the PeerTest \n"
 "messages so that she doesn't need to already have an established\n"
@@ -15401,11 +13352,11 @@ msgid ""
 "with either Bob or Charlie, but it is not required."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:529
+#: i2p2www/pages/site/docs/transport/ssu.html:534
 msgid "Transmission window, ACKs and Retransmissions"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:530
+#: i2p2www/pages/site/docs/transport/ssu.html:535
 #, python-format
 msgid ""
 "The DATA message may contain ACKs of full messages and\n"
@@ -15415,26 +13366,24 @@ msgid ""
 "for details."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:538
+#: i2p2www/pages/site/docs/transport/ssu.html:543
 #, python-format
 msgid ""
-"The details of windowing, ACK, and retransmission strategies are not "
-"specified\n"
+"The details of windowing, ACK, and retransmission strategies are not specified\n"
 "here. See the Java code for the current implementation.\n"
 "During the establishment phase, and for peer testing, routers\n"
 "should implement exponential backoff for retransmission.\n"
 "For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to "
-"TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
 "or <a href=\"%(streaming)s\">streaming</a>.\n"
 "See the code for initial, min and max parameters."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:550
+#: i2p2www/pages/site/docs/transport/ssu.html:555
 msgid "Security"
 msgstr "Bezpieczeństwo"
 
-#: i2p2www/pages/site/docs/transport/ssu.html:551
+#: i2p2www/pages/site/docs/transport/ssu.html:556
 msgid ""
 "UDP source addresses may, of course, be spoofed.\n"
 "Additionally, the IPs and ports contained inside specific\n"
@@ -15443,108 +13392,98 @@ msgid ""
 "Also, certain actions and responses may need to be rate-limited."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:559
+#: i2p2www/pages/site/docs/transport/ssu.html:564
 msgid ""
 "The details of validation are not specified\n"
 "here. Implementers should add defenses where appropriate."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:565
+#: i2p2www/pages/site/docs/transport/ssu.html:570
 msgid "Peer capabilities"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:575
+#: i2p2www/pages/site/docs/transport/ssu.html:580
 msgid ""
 "If the peer address contains the 'B' capability, that means \n"
 "they are willing and able to participate in peer tests as\n"
 "a 'Bob' or 'Charlie'."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:612
+#: i2p2www/pages/site/docs/transport/ssu.html:617
 msgid ""
-"Analysis of current SSU performance, including assessment of window size "
-"adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to "
-"improve\n"
+"Analysis of current SSU performance, including assessment of window size adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to improve\n"
 "performance, is a topic for future work."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:618
+#: i2p2www/pages/site/docs/transport/ssu.html:623
 msgid ""
-"The current implementation repeatedly sends acknowledgments for the same "
-"packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same packets,\n"
 "which unnecessarily increases overhead."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:623
+#: i2p2www/pages/site/docs/transport/ssu.html:628
 msgid ""
-"The default small MTU value of 620 should be analyzed and possibly "
-"increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly increased.\n"
 "The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
-"Probably not."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:629
+#: i2p2www/pages/site/docs/transport/ssu.html:634
 msgid "The protocol should be extended to exchange MTUs during the setup."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:633
+#: i2p2www/pages/site/docs/transport/ssu.html:638
 msgid "Rekeying is currently unimplemented and may never be."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:637
+#: i2p2www/pages/site/docs/transport/ssu.html:642
 msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and "
-"RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is "
-"undocumented."
+"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:642
+#: i2p2www/pages/site/docs/transport/ssu.html:647
 msgid ""
 "Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same "
-"packet,\n"
+"strategy may be to bundle multiple message fragments into the same packet,\n"
 "so long as it doesn't exceed the MTU."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:648
+#: i2p2www/pages/site/docs/transport/ssu.html:653
 msgid ""
 "A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to"
-" \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
 "end padding should be sufficient for most needs until then."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:654
+#: i2p2www/pages/site/docs/transport/ssu.html:659
 msgid ""
-"Why are introduction keys the same as the router hash, should it be "
-"changed, would there be any benefit?"
+"Why are introduction keys the same as the router hash, should it be changed,"
+" would there be any benefit?"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:658
+#: i2p2www/pages/site/docs/transport/ssu.html:663
 msgid "Capacities appear to be unused."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:662
+#: i2p2www/pages/site/docs/transport/ssu.html:667
 msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be "
-"unused or unverified."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
+"or unverified."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:667
+#: i2p2www/pages/site/docs/transport/ssu.html:672
 msgid "Implementation Diagram"
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:668
+#: i2p2www/pages/site/docs/transport/ssu.html:673
 msgid ""
 "This diagram\n"
-"should accurately reflect the current implementation, however there may "
-"be small differences."
+"should accurately reflect the current implementation, however there may be small differences."
 msgstr ""
 
-#: i2p2www/pages/site/docs/transport/ssu.html:676
+#: i2p2www/pages/site/docs/transport/ssu.html:681
 msgid "Now on the SSU specification page"
 msgstr ""
 
@@ -15565,12 +13504,9 @@ msgid ""
 "Within I2P, messages are passed in one direction through a virtual\n"
 "tunnel of peers, using whatever means are available to pass the \n"
 "message on to the next hop.  Messages arrive at the tunnel's \n"
-"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel "
-"messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and "
-"verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, "
-"until\n"
+"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, until\n"
 "it reaches the tunnel endpoint.  That <i>endpoint</i> takes the messages\n"
 "bundled up by the gateway and forwards them as instructed - either\n"
 "to another router, to another tunnel on another router, or locally."
@@ -15592,12 +13528,9 @@ msgid ""
 "in the tunnel, and provides each with the necessary configuration\n"
 "data.  They may have any number of hops.\n"
 "It is the intent to make\n"
-"it hard for either participants or third parties to determine the length "
-"of \n"
-"a tunnel, or even for colluding participants to determine whether they "
-"are a\n"
-"part of the same tunnel at all (barring the situation where colluding "
-"peers are\n"
+"it hard for either participants or third parties to determine the length of \n"
+"a tunnel, or even for colluding participants to determine whether they are a\n"
+"part of the same tunnel at all (barring the situation where colluding peers are\n"
 "next to each other in the tunnel)."
 msgstr ""
 
@@ -15635,8 +13568,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:69
 #, python-format
 msgid ""
-"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are "
-"processed and passed through it.\n"
+"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are processed and passed through it.\n"
 "Tunnel operation has four distinct processes, taken on by various \n"
 "peers in the tunnel."
 msgstr ""
@@ -15663,8 +13595,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:89
 msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
-"messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
 "originally bundled by the gateway are reassembled and forwarded on as \n"
 "requested."
 msgstr ""
@@ -15724,11 +13655,13 @@ msgid "Decrypt (using an encryption operation)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgid ""
+"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgid ""
+"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:142
@@ -15789,10 +13722,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:181
 msgid ""
 "Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be "
-"forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they "
-"receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
 "on.  Tunnels themselves are short-lived (10 minutes).\n"
 "Even if subsequent tunnels are built using the same sequence of \n"
 "peers, each hop's tunnel ID will change."
@@ -15800,16 +13731,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:190
 msgid ""
-"To prevent adversaries from tagging the messages along the path by "
-"adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size.  To"
-" accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently,"
-" the\n"
-"gateway splits up the larger I2NP messages into fragments contained "
-"within each\n"
-"tunnel message.  The endpoint will attempt to rebuild the I2NP message "
-"from the\n"
+"To prevent adversaries from tagging the messages along the path by adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size.  To accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
+"gateway splits up the larger I2NP messages into fragments contained within each\n"
+"tunnel message.  The endpoint will attempt to rebuild the I2NP message from the\n"
 "fragments for a short period of time, but will discard them as necessary."
 msgstr ""
 
@@ -15826,30 +13752,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:207
 msgid ""
-"After the preprocessing of messages into a padded payload, the gateway "
-"builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel "
-"message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
-"message} to the next hop."
+"After the preprocessing of messages into a padded payload, the gateway builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:213
 msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an"
-"\n"
-"inbound or an outbound tunnel.  For inbound tunnels, they simply select a"
-" random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and"
-" using \n"
-"that IV along side their own layer key to encrypt the preprocessed data."
-"  For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and "
-"preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel.  The result "
-"of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will "
-"recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an\n"
+"inbound or an outbound tunnel.  For inbound tunnels, they simply select a random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
+"that IV along side their own layer key to encrypt the preprocessed data.  For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel.  The result of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
 "the initial preprocessed data."
 msgstr ""
 
@@ -15859,46 +13775,29 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:227
 msgid ""
-"When a peer receives a tunnel message, it checks that the message came "
-"from\n"
-"the same previous hop as before (initialized when the first message comes"
-" through\n"
-"the tunnel).  If the previous peer is a different router, or if the "
-"message has\n"
-"already been seen, the message is dropped.  The participant then encrypts"
-" the \n"
-"received IV with AES256/ECB using their IV key to determine the current "
-"IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts "
-"the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the "
-"tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop.  This double "
-"encryption\n"
+"When a peer receives a tunnel message, it checks that the message came from\n"
+"the same previous hop as before (initialized when the first message comes through\n"
+"the tunnel).  If the previous peer is a different router, or if the message has\n"
+"already been seen, the message is dropped.  The participant then encrypts the \n"
+"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop.  This double encryption\n"
 "of the IV (both before and after use) help address a certain class of\n"
 "confirmation attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:243
 msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on "
-"message\n"
-"IVs.  Each router maintains a single Bloom filter to contain the XOR of "
-"the IV and\n"
-"the first block of the message received for all of the tunnels it is "
-"participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
-"will have\n"
-"expired).  The size of the bloom filter and the parameters used are "
-"sufficient to\n"
-"more than saturate the router's network connection with a negligible "
-"chance of \n"
-"false positive.  The unique value fed into the Bloom filter is the XOR of"
-" the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the"
-" tunnel \n"
-"from tagging a message by resending it with the IV and first block "
-"switched."
+"Duplicate message detection is handled by a decaying Bloom filter on message\n"
+"IVs.  Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
+"the first block of the message received for all of the tunnels it is participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
+"expired).  The size of the bloom filter and the parameters used are sufficient to\n"
+"more than saturate the router's network connection with a negligible chance of \n"
+"false positive.  The unique value fed into the Bloom filter is the XOR of the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
+"from tagging a message by resending it with the IV and first block switched."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:256
@@ -15907,27 +13806,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:258
 msgid ""
-"After receiving and validating a tunnel message at the last hop in the "
-"tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon "
-"whether \n"
-"the tunnel is an inbound or an outbound tunnel.  For outbound tunnels, "
-"the \n"
-"endpoint encrypts the message with its layer key just like any other "
-"participant, \n"
-"exposing the preprocessed data.  For inbound tunnels, the endpoint is "
-"also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message,"
-" using the \n"
+"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
+"the tunnel is an inbound or an outbound tunnel.  For outbound tunnels, the \n"
+"endpoint encrypts the message with its layer key just like any other participant, \n"
+"exposing the preprocessed data.  For inbound tunnels, the endpoint is also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
 "layer and IV keys of each step in reverse order."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:268
 msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the "
-"gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards "
-"them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards them as\n"
 "requested in their delivery instructions."
 msgstr ""
 
@@ -15937,30 +13828,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:277
 msgid ""
-"When building a tunnel, the creator must send a request with the "
-"necessary\n"
-"configuration data to each of the hops and wait for all of them to agree "
-"before\n"
-"enabling the tunnel.  The requests are encrypted so that only the peers "
-"who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has "
-"that\n"
-"data.  In addition, only the tunnel creator will have access to the "
-"peer's\n"
-"reply.  There are three important dimensions to keep in mind when "
-"producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent "
-"(and \n"
+"When building a tunnel, the creator must send a request with the necessary\n"
+"configuration data to each of the hops and wait for all of them to agree before\n"
+"enabling the tunnel.  The requests are encrypted so that only the peers who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has that\n"
+"data.  In addition, only the tunnel creator will have access to the peer's\n"
+"reply.  There are three important dimensions to keep in mind when producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent (and \n"
 "replies received), and how they are maintained."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:291
 msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two "
-"styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
 "of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and "
-"tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and tunnel\n"
 "maintenance, while client tunnels are used for end to end client messages."
 msgstr ""
 
@@ -15970,18 +13852,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:301
 msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a "
-"subset\n"
-"of the network.  The particular subset varies on the local router and on "
-"what their\n"
-"tunnel routing needs are.  In general, the exploratory tunnels are built "
-"out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" "
-"profile\n"
-"category.  The secondary purpose of the tunnels, beyond merely tunnel "
-"routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted"
-" for\n"
+"Exploratory tunnels are built out of a random selection of peers from a subset\n"
+"of the network.  The particular subset varies on the local router and on what their\n"
+"tunnel routing needs are.  In general, the exploratory tunnels are built out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
+"category.  The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted for\n"
 "use in client tunnels."
 msgstr ""
 
@@ -15998,14 +13874,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:319
 msgid ""
-"Client tunnels are built with a more stringent set of requirements - the "
-"local\n"
-"router will select peers out of its \"fast and high capacity\" profile "
-"category so\n"
-"that performance and reliability will meet the needs of the client "
-"application.\n"
-"However, there are several important details beyond that basic selection "
-"that \n"
+"Client tunnels are built with a more stringent set of requirements - the local\n"
+"router will select peers out of its \"fast and high capacity\" profile category so\n"
+"that performance and reliability will meet the needs of the client application.\n"
+"However, there are several important details beyond that basic selection that \n"
 "should be adhered to, depending upon the client's anonymity needs."
 msgstr ""
 
@@ -16031,10 +13903,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:341
 msgid ""
 "To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -"
-"\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
-"after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
 "B is always C."
 msgstr ""
 
@@ -16043,18 +13913,15 @@ msgid ""
 "Ordering is implemented by generating a random 32-byte key for each\n"
 "tunnel pool at startup.\n"
 "Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both"
-"\n"
+"craft two router hashes far apart to maximize the chance of being at both\n"
 "ends of a tunnel.\n"
 "Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from "
-"the random key"
+"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:363
 msgid ""
-"Because each tunnel pool uses a different random key, ordering is "
-"consistent\n"
+"Because each tunnel pool uses a different random key, ordering is consistent\n"
 "within a single pool but not between different pools.\n"
 "New keys are generated at each router restart."
 msgstr ""
@@ -16066,8 +13933,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:372
 #, python-format
 msgid ""
-"A multi-hop tunnel is built using a single build message which is "
-"repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is repeatedly\n"
 "decrypted and forwarded. In the terminology of\n"
 "<a href=\"%(pdf)s\">Hashing it out in Public</a>,\n"
 "this is \"non-interactive\" telescopic tunnel building."
@@ -16078,38 +13944,28 @@ msgstr ""
 msgid ""
 "This tunnel request preparation, delivery, and response method is\n"
 "<a href=\"%(tunnelcreation)s\">designed</a> to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies "
-"proper\n"
-"connectivity, and avoids the message counting attack of traditional "
-"telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
+"connectivity, and avoids the message counting attack of traditional telescopic\n"
 "tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the "
-"already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
-"in\n"
+"(This method, which sends messages to extend a tunnel through the already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
 "the \"Hashing it out\" paper.)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:390
 #, python-format
 msgid ""
-"The details of tunnel request and response messages, and their "
-"encryption,\n"
+"The details of tunnel request and response messages, and their encryption,\n"
 "<a href=\"%(tunnelcreation)s\">are specified here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:395
 msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, "
-"though\n"
-"a series of four increasingly severe rejections are known: probabilistic "
-"rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of "
-"requests), \n"
-"transient overload, bandwidth overload, and critical failure.  When "
-"received, \n"
-"those four are interpreted by the tunnel creator to help adjust their "
-"profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, though\n"
+"a series of four increasingly severe rejections are known: probabilistic rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of requests), \n"
+"transient overload, bandwidth overload, and critical failure.  When received, \n"
+"those four are interpreted by the tunnel creator to help adjust their profile of\n"
 "the router in question."
 msgstr ""
 
@@ -16127,37 +13983,26 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:412
 #, python-format
 msgid ""
-"To allow efficient operation, the router maintains a series of tunnel "
-"pools,\n"
-"each managing a group of tunnels used for a specific purpose with their "
-"own\n"
-"configuration.  When a tunnel is needed for that purpose, the router "
-"selects one\n"
-"out of the appropriate pool at random.  Overall, there are two "
-"exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default "
-"configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel pools,\n"
+"each managing a group of tunnels used for a specific purpose with their own\n"
+"configuration.  When a tunnel is needed for that purpose, the router selects one\n"
+"out of the appropriate pool at random.  Overall, there are two exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default configuration.\n"
 "In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool.  Those pools use the "
-"configuration specified\n"
-"when the local destination connects to the router via <a "
-"href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool.  Those pools use the configuration specified\n"
+"when the local destination connects to the router via <a href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n"
 "not specified."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:424
 #, python-format
 msgid ""
-"Each pool has within its configuration a few key settings, defining how "
-"many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of "
-"failure,\n"
+"Each pool has within its configuration a few key settings, defining how many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
 "how long the tunnels should be, whether those\n"
 "lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual "
-"tunnels.\n"
-"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP "
-"page</a>."
+"well as any of the other settings allowed when configuring individual tunnels.\n"
+"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:434
@@ -16174,20 +14019,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:440
 msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they "
-"are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is "
-"essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local "
-"and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local and global\n"
 "network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build "
-"strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,"
-"\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,\n"
 "without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted"
-" build messages."
+"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:451
@@ -16195,8 +14034,7 @@ msgid ""
 "For each tuple {exploratory/client, in/out, length, length variance}\n"
 "the router maintains statistics on the time required for a successful\n"
 "tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's "
-"expiration\n"
+"Using these statistics, it calculates how long before a tunnel's expiration\n"
 "it should start attempting to build a replacement.\n"
 "As the expiration time approaches without a successful replacement,\n"
 "it starts multiple build attempts in parallel, and then\n"
@@ -16218,30 +14056,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:473
 msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit "
-"switched\n"
-"network, everything within I2P is strictly message based - tunnels are "
-"merely\n"
-"accounting tricks to help organize the delivery of messages.  No "
-"assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions "
-"are left\n"
-"to higher levels (e.g. I2P's client layer streaming library).  This "
-"allows I2P\n"
-"to take advantage of throttling techniques available to both packet "
-"switched and\n"
-"circuit switched networks.  For instance, each router may keep track of "
-"the \n"
-"moving average of how much data each tunnel is using, combine that with "
-"all of \n"
-"the averages used by other tunnels the router is participating in, and be"
-" able\n"
-"to accept or reject additional tunnel participation requests based on its"
-" \n"
-"capacity and utilization.  On the other hand, each router can simply drop"
-" \n"
-"messages that are beyond its capacity, exploiting the research used on "
-"the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
+"network, everything within I2P is strictly message based - tunnels are merely\n"
+"accounting tricks to help organize the delivery of messages.  No assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions are left\n"
+"to higher levels (e.g. I2P's client layer streaming library).  This allows I2P\n"
+"to take advantage of throttling techniques available to both packet switched and\n"
+"circuit switched networks.  For instance, each router may keep track of the \n"
+"moving average of how much data each tunnel is using, combine that with all of \n"
+"the averages used by other tunnels the router is participating in, and be able\n"
+"to accept or reject additional tunnel participation requests based on its \n"
+"capacity and utilization.  On the other hand, each router can simply drop \n"
+"messages that are beyond its capacity, exploiting the research used on the \n"
 "normal Internet."
 msgstr ""
 
@@ -16249,23 +14075,16 @@ msgstr ""
 msgid ""
 "In the current implementation, routers implement a\n"
 "weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and"
-" outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
 "the router will start randomly dropping a portion of messages as the\n"
 "bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are "
-"dropped.\n"
-"For an internal participant, all messages are fragmented and padded and "
-"therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping "
-"decision is made\n"
-"on the full (coalesced) message, and the message size is taken into "
-"account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
+"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
+"on the full (coalesced) message, and the message size is taken into account.\n"
 "Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint "
-"than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the "
-"network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
 "dropping those messages is lower."
 msgstr ""
 
@@ -16275,16 +14094,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:509
 msgid ""
-"What strategies could be used at the gateway and at each hop for "
-"delaying,\n"
-"reordering, rerouting, or padding messages?  To what extent should this "
-"be done\n"
-"automatically, how much should be configured as a per tunnel or per hop "
-"setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this "
-"operation?\n"
-"All of this is left as unknown, to be worked out for a distant future "
-"release."
+"What strategies could be used at the gateway and at each hop for delaying,\n"
+"reordering, rerouting, or padding messages?  To what extent should this be done\n"
+"automatically, how much should be configured as a per tunnel or per hop setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this operation?\n"
+"All of this is left as unknown, to be worked out for a distant future release."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:518
@@ -16293,13 +14107,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:519
 msgid ""
-"The padding strategies can be used on a variety of levels, addressing the"
-"\n"
+"The padding strategies can be used on a variety of levels, addressing the\n"
 "exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes.  Within this "
-"however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end "
-"to end \n"
+"The current fixed tunnel message size is 1024 bytes.  Within this however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end to end \n"
 "messages, they may be padded as part of the garlic wrapping."
 msgstr ""
 
@@ -16327,8 +14138,7 @@ msgstr "Listopad 2016"
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
 msgid ""
-"This page describes the origins and design of I2P's unidirectional "
-"tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional tunnels.\n"
 "For further information see:"
 msgstr ""
 
@@ -16362,8 +14172,7 @@ msgid ""
 "Several apps and protocols, notably HTTP,\n"
 "do transfer data in such manner. Having the traffic follow the same \n"
 "route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a"
-" \n"
+"attacker who has only timing and traffic volume data to infer the path a \n"
 "tunnel is taking.\n"
 "Having the response come back along a different path arguably \n"
 "makes it harder."
@@ -16372,42 +14181,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
 msgid ""
 "When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional "
-"tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional"
-" circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response "
-"would \n"
-"follow the same path in Tor, while in I2P the packets making up the "
-"request \n"
-"would go out through one or more outbound tunnels and the packets making "
-"up \n"
-"the response would come back through one or more different inbound "
-"tunnels."
+"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response would \n"
+"follow the same path in Tor, while in I2P the packets making up the request \n"
+"would go out through one or more outbound tunnels and the packets making up \n"
+"the response would come back through one or more different inbound tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
 msgid ""
 "The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have "
-"anonymity\n"
-"implications.  On the positive side, by using separate tunnels it lessens"
-" the\n"
-"traffic data exposed for analysis to participants in a tunnel - for "
-"instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic"
-" of\n"
+"communication is not the only technique available, and it does have anonymity\n"
+"implications.  On the positive side, by using separate tunnels it lessens the\n"
+"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic of\n"
 "an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel.  With bidirectional tunnels, all participants"
-" would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then "
-"100KB\n"
-"in the other.  On the negative side, using unidirectional tunnels means "
-"that\n"
-"there are two sets of peers which need to be profiled and accounted for, "
-"and\n"
-"additional care must be taken to address the increased speed of "
-"predecessor\n"
+"delivered along the tunnel.  With bidirectional tunnels, all participants would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
+"in the other.  On the negative side, using unidirectional tunnels means that\n"
+"there are two sets of peers which need to be profiled and accounted for, and\n"
+"additional care must be taken to address the increased speed of predecessor\n"
 "attacks.  The tunnel pooling and building process\n"
 "(peer selection and ordering strategies)\n"
 "should minimize the worries of the predecessor attack."
@@ -16421,28 +14215,22 @@ msgstr ""
 #, python-format
 msgid ""
 "A recent <a href=\"%(pdf)s\">paper by Hermann and Grothoff</a>\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design "
-"decision\"."
+"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
 msgid ""
 "The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is "
-"an \n"
-"advantage, but that an attacker can be more certain in the unidirectional"
-" case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a "
-"disadvantage, at least\n"
+"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
+"advantage, but that an attacker can be more certain in the unidirectional case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
 "with long-living I2P Sites."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
 msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional "
-"tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of "
-"the \n"
+"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of the \n"
 "attack in the paper\n"
 "with attacks on a bidirectional tunnel architecture."
 msgstr ""
@@ -16451,63 +14239,45 @@ msgstr ""
 msgid ""
 "This conclusion is based on an arbitrary certainty vs. time weighting \n"
 "(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas "
-"to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas to \n"
 "each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the I2P Site goes down or is slowed down. So "
-"close \n"
+"intersection attack see if the I2P Site goes down or is slowed down. So close \n"
 "may be good enough, or time may be more important."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
 msgid ""
-"The conclusion is based on a specific weighting of the importance of "
-"certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable,"
-" \n"
-"especially in a real world with subpoenas, search warrants, and other "
-"methods \n"
+"The conclusion is based on a specific weighting of the importance of certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
+"especially in a real world with subpoenas, search warrants, and other methods \n"
 "available for final confirmation."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
 msgid ""
 "A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done"
-" \n"
-"elsewhere. For example, how does this attack compare to the numerous "
-"possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors"
-" have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done \n"
+"elsewhere. For example, how does this attack compare to the numerous possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors have not\n"
 "done that analysis, if it's even possible to do it\n"
 "effectively."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
 msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
-" \n"
-"uses unidirectional tunnels and has had very little review. Does the lack"
-" of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor "
-"design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
+"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor design \n"
 "choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. "
-"The \n"
-"design intent (see references above) was that unidirectional tunnels are "
-"more \n"
-"resistant to timing attacks. However, the paper presents a somewhat "
-"different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
+"design intent (see references above) was that unidirectional tunnels are more \n"
+"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
 "attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
 "tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative "
-"that \n"
-"clearly needs further investigation and analysis? There are several other"
-" reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small "
-"network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels "
-"really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative that \n"
+"clearly needs further investigation and analysis? There are several other reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
 "reason?"
 msgstr ""
 
@@ -16518,4 +14288,3 @@ msgid ""
 "tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
 "conclusion is not supported by the paper."
 msgstr ""
-
diff --git a/i2p2www/translations/pl/LC_MESSAGES/get-involved.po b/i2p2www/translations/pl/LC_MESSAGES/get-involved.po
index 7ad7fe010cb9b9fd0e9410ffeaff9f7b14850c54..c605737715241466a1d19017b902d49b1e741b62 100644
--- a/i2p2www/translations/pl/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/pl/LC_MESSAGES/get-involved.po
@@ -1,26 +1,25 @@
-# Polish translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Karol Kosek, 2018,2020
 # Karol Kosek, 2020
 # sebx, 2015
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-05-01 16:48+0000\n"
-"Last-Translator: ☆Verdulo\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Karol Kosek, 2020\n"
 "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n"
-"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && "
-"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && "
-"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: pl\n"
+"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -35,12 +34,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -55,44 +51,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -131,10 +116,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -164,10 +147,8 @@ msgstr "Naklejki"
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -182,25 +163,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -226,8 +197,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -241,12 +211,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -257,18 +224,11 @@ msgstr "TÅ‚umaczenie"
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
-msgstr ""
-"Pomóż przetłumaczyć stronę internetową i oprogramowanie na swój język. "
-"Tłumacze są bardzo ważną częścią tego zdecentralizowanego projektu, a "
-"Twoja praca jest zawsze doceniana. Zobacz <a "
-"href=\"%(newtrans)s\">poradnik dla nowych tłumaczy</a>, aby dowiedzieć "
-"się więcej."
+msgstr "Pomóż przetłumaczyć stronę internetową i oprogramowanie na swój język. Tłumacze są bardzo ważną częścią tego zdecentralizowanego projektu, a Twoja praca jest zawsze doceniana. Zobacz <a href=\"%(newtrans)s\">poradnik dla nowych tłumaczy</a>, aby dowiedzieć się więcej."
 
 #: i2p2www/pages/site/get-involved/index.html:47
 msgid "Documentation"
@@ -276,17 +236,12 @@ msgstr "Dokumentacja"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -297,16 +252,11 @@ msgstr "TestujÄ™"
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -319,14 +269,10 @@ msgstr "Usługi"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -336,9 +282,9 @@ msgstr "Ponowne seedowanie"
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -382,8 +328,7 @@ msgstr ""
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -391,7 +336,7 @@ msgstr ""
 msgid "Roadmap"
 msgstr "Plany na przyszłość"
 
-#: i2p2www/pages/site/get-involved/roadmap.html:309
+#: i2p2www/pages/site/get-involved/roadmap.html:210
 #, python-format
 msgid ""
 "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info "
@@ -452,84 +397,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -538,17 +460,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -556,29 +473,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -586,42 +497,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -665,72 +567,52 @@ msgstr ""
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -740,8 +622,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -754,33 +636,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -801,76 +677,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -880,25 +737,18 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -909,29 +759,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -941,10 +783,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -952,13 +792,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -969,43 +806,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1020,28 +850,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1052,8 +874,7 @@ msgstr "Usunięto"
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1067,8 +888,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1087,14 +907,10 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1103,17 +919,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1123,8 +936,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1146,32 +958,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1180,47 +985,39 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1232,12 +1029,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1262,8 +1056,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1282,8 +1076,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1312,20 +1105,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1397,8 +1186,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1411,24 +1199,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1438,22 +1217,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1489,21 +1260,16 @@ msgstr ""
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1527,10 +1293,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1541,8 +1305,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1555,10 +1318,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1568,7 +1329,8 @@ msgid "Release Signing Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1589,7 +1351,8 @@ msgid "Download PGP public key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1597,13 +1360,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1611,7 +1375,8 @@ msgid "Security GPG Key"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1620,8 +1385,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1653,35 +1417,28 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1689,29 +1446,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1738,12 +1489,10 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1753,10 +1502,8 @@ msgstr "Społeczność"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1778,8 +1525,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1787,13 +1534,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1802,8 +1550,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1817,34 +1564,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1854,61 +1595,49 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1935,20 +1664,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1957,14 +1685,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1974,12 +1702,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1999,8 +1728,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2027,12 +1755,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2051,22 +1776,22 @@ msgstr "Używanie IDE do I2P"
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2083,8 +1808,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2101,14 +1826,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2187,34 +1912,26 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2224,20 +1941,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2254,22 +1967,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2281,10 +1991,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2294,38 +2002,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2343,23 +2043,17 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2373,11 +2067,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2388,34 +2079,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2428,18 +2112,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2453,16 +2133,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2482,67 +2160,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2566,8 +2234,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2583,44 +2251,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2628,8 +2286,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2638,64 +2295,59 @@ msgid "New Developer's Guide"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:6
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:32
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:31
 msgid "Basic study"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:7
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:46
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:45
 msgid "Getting the I2P code"
 msgstr "Uzyskiwanie kodu I2P"
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:9
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:52
 msgid "The new way: Git"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:10
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:11
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81
-msgid "The old way: Monotone"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:145
 msgid "Building I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:166
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:102
 msgid "Development ideas"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:174
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:110
 msgid "Making the results available"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:196
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
 msgid "Get to know us!"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:202
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
 msgid "Translations"
 msgstr "TÅ‚umaczenia"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:17
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:208
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
 msgid "Tools"
 msgstr "Narzędzia"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:22
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:21
 msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:26
 #, python-format
 msgid ""
 "\n"
@@ -2703,42 +2355,34 @@ msgid ""
 "Try <a href=\"%(volunteer)s\">getting involved</a> first."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:34
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:38
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:37
 #, python-format
 msgid ""
 "Study the <a href=\"%(intro)s\">how intro</a>,\n"
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:47
 msgid ""
 "For development on the I2P router or the embedded applications,\n"
 "there are two ways to get the source code:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
-msgid "The easy way: Git"
-msgstr "Łatwy sposób: Git"
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:55
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"For the time being, issues are still being manged on <a "
-"href=\"%(trac)s\">trac</a>."
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
+"issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:58
@@ -2751,143 +2395,31 @@ msgstr ""
 msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:84
-msgid ""
-"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n"
-"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to "
-"the source code (and for a lot of complicated things, but 'keeping track "
-"of changes' is the basic idea)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:89
-msgid ""
-"Skim over the <a "
-"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>,"
-" to make sure you understand the concepts."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:93
-msgid ""
-"If you want to remain anonymous, you need to do an additional step, to "
-"set up a connection to a monotone server over I2P:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
-#, python-format
-msgid ""
-"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port "
-"8998 pointing to mtn.i2p-projekt.i2p."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
-msgid ""
-"Pick a directory where you want to put all your I2P files, and create a "
-"monotone database:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
-msgid ""
-"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or"
-" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the "
-"following contents:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
-#, python-format
-msgid ""
-"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> "
-"into a new file (e.g. <code>keys.txt</code>) in the same directory\n"
-"  that <code>i2p.mtn</code> is in. Import the keys into your database "
-"with <br><code><pre>      mtn -d i2p.mtn read < keys.txt</pre></code>"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
-msgid ""
-"Pull the I2P sources to your machine. This may take a long time, "
-"especially if you are doing this over I2P!"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
-msgid "Anonymously:"
-msgstr "Anonimowo:"
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
-msgid "Non-anonymously:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
-msgid ""
-"All the sources are now present on your machine, in the database file. To"
-" make them available in a directory, you need to check them out:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:125
-msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the "
-"I2P sources."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
-msgid "Remarks"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
-msgid ""
-"\n"
-"To download the website files instead of the I2P source files, use "
-"'i2p.www' instead of 'i2p.i2p'."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:133
-msgid ""
-"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it"
-" left off.\n"
-"If you are in a hurry, use the non-anonymous access."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
-#, python-format
-msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on <a"
-" href=\"%(viewmtn)s\">viewmtn</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:141
-#, python-format
-msgid ""
-"A long explanation about using monotone is available on the <a "
-"href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:147
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:155
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:91
 msgid ""
 "To build or work on console translations, you need\n"
 "the xgettext, msgfmt, and msgmerge tools from the\n"
 "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:161
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
 #, python-format
 msgid ""
 "For development on new applications,\n"
 "see the <a href=\"%(apps)s\">application development guide</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:167
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
 #, python-format
 msgid ""
 "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n"
@@ -2896,93 +2428,42 @@ msgid ""
 "for ideas."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:176
-#, python-format
-msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:181
-msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:184
-msgid "use an empty passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:185
-msgid "enter a passphrase"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:186
-#, python-format
-msgid ""
-"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get "
-"push privileges"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:187
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get "
-"commit privileges - not required for website"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:188
-msgid "check in with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:189
-msgid "push with this key"
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:191
-#, python-format
-msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:197
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:203
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:209
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:217
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -3002,11 +2483,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3021,10 +2500,8 @@ msgstr ""
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3044,12 +2521,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3060,27 +2534,23 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
 msgstr ""
 
@@ -3096,10 +2566,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3117,8 +2585,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
 msgstr ""
 
@@ -3131,19 +2598,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3151,15 +2614,13 @@ msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3168,8 +2629,8 @@ msgstr "FAQ"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3185,67 +2646,65 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3270,10 +2729,8 @@ msgstr "PrzeglÄ…d"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3282,21 +2739,17 @@ msgstr "Wymagania"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3319,8 +2772,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3330,18 +2782,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3351,10 +2798,8 @@ msgstr "Polityka Prywatności"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3363,17 +2808,15 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3382,10 +2825,8 @@ msgstr "Pierwsze kroki"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3396,18 +2837,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr ""
-
diff --git a/i2p2www/translations/pl/LC_MESSAGES/priority.po b/i2p2www/translations/pl/LC_MESSAGES/priority.po
index 40bb1a51b86fb62818191c2e0f8fa5cec00c9e2c..675d8036167dc8fe820fe93d683f62f9f0982530 100644
--- a/i2p2www/translations/pl/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/pl/LC_MESSAGES/priority.po
@@ -1,7 +1,7 @@
-# Polish translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Tomasz Ciborski <zenji.yamada.nihon@gmail.com>, 2015
 # Karolina <karolina@bitwylesne.pl>, 2014
@@ -14,19 +14,18 @@
 # Tracerneo <ziolkoneo@gmail.com>, 2013
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-10-11 16:27+0000\n"
-"PO-Revision-Date: 2021-11-28 20:00+0000\n"
-"Last-Translator: ☆Verdulo\n"
+"PO-Revision-Date: 2013-02-03 00:02+0000\n"
+"Last-Translator: ☆Verdulo, 2021\n"
 "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n"
-"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && "
-"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && "
-"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: pl\n"
+"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n"
 
 #: i2p2www/pages/blog/category.html:2
 msgid "Blog Category"
@@ -65,16 +64,10 @@ msgstr "Autor:"
 
 #: i2p2www/pages/downloads/browser-content.html:1
 msgid ""
-"Your web browser will need to be configured in order to browse web sites "
-"on I2P\n"
-"and to utilize the outproxies available within I2P. Below are "
-"walkthroughs for\n"
+"Your web browser will need to be configured in order to browse web sites on I2P\n"
+"and to utilize the outproxies available within I2P. Below are walkthroughs for\n"
 "some of the most popular browsers."
-msgstr ""
-"Będziesz musiał(a) skonfigurować swoją przeglądarkę do przeglądania "
-"ukrytych stron w sieci I2P i zwykłych stron poprzez proxy wyjściowe. "
-"Poniżej znajdują się opisy konfiguracji najpopularniejszych przeglądarek "
-"internetowych."
+msgstr "Będziesz musiał(a) skonfigurować swoją przeglądarkę do przeglądania ukrytych stron w sieci I2P i zwykłych stron poprzez proxy wyjściowe. Poniżej znajdują się opisy konfiguracji najpopularniejszych przeglądarek internetowych."
 
 #: i2p2www/pages/downloads/browser-content.html:7
 msgid "Firefox Profile for Windows"
@@ -83,23 +76,15 @@ msgstr "Profil dla Firefoksa pod Windowsem"
 #: i2p2www/pages/downloads/browser-content.html:8
 #, python-format
 msgid ""
-"If you are using Windows, the recommended way of accessing I2P is using "
-"the\n"
+"If you are using Windows, the recommended way of accessing I2P is using the\n"
 "<a href='%(profile)s'>Firefox profile</a>."
-msgstr ""
-"Jeżeli korzystasz z systemu Windows, zalecaną metodą przeglądania zasobów"
-" sieci I2P jest nasz <a href='%(profile)s'>profil przeglÄ…darki "
-"Firefox</a>."
+msgstr "Jeżeli korzystasz z systemu Windows, zalecaną metodą przeglądania zasobów sieci I2P jest nasz <a href='%(profile)s'>profil przeglądarki Firefox</a>."
 
 #: i2p2www/pages/downloads/browser-content.html:12
 msgid ""
-"If you do not wish to use that profile or are not on Windows, you need to"
-"\n"
+"If you do not wish to use that profile or are not on Windows, you need to\n"
 "configure your browser yourself.  Read below on how to that."
-msgstr ""
-"Jeżeli nie chcesz korzystać z tego profilu bądź nie korzystasz z "
-"Windowsa, musisz samodzielnie skonfigurować przeglądarkę. Instrukcje "
-"znajdują się poniżej."
+msgstr "Jeżeli nie chcesz korzystać z tego profilu bądź nie korzystasz z Windowsa, musisz samodzielnie skonfigurować przeglądarkę. Instrukcje znajdują się poniżej."
 
 #: i2p2www/pages/downloads/browser-content.html:17
 msgid "How to configure your browser"
@@ -118,39 +103,23 @@ msgstr "Konfiguracja z użyciem eksperymentalnego rozszerzenia"
 #: i2p2www/pages/downloads/browser-content.html:30
 msgid ""
 "A new way of automatically configuring the I2P Browser is\n"
-"currently being tested. It uses the Firefox's \"Container Tabs\" to build"
-" private\n"
+"currently being tested. It uses the Firefox's \"Container Tabs\" to build private\n"
 "browsing tools for use with I2P and I2P applications."
-msgstr ""
-"Trwają testy nowego sposobu na automatyczne skonfigurowanie „przeglądarki"
-" I2P”. Korzysta ono z funkcji Firefoksa „karty z kontekstem”, aby "
-"utworzyć prywatną przeglądarkę do użytku ze stronami i aplikacjami I2P. "
+msgstr "Trwają testy nowego sposobu na automatyczne skonfigurowanie „przeglądarki I2P”. Korzysta ono z funkcji Firefoksa „karty z kontekstem”, aby utworzyć prywatną przeglądarkę do użytku ze stronami i aplikacjami I2P. "
 
 #: i2p2www/pages/downloads/browser-content.html:33
 msgid ""
 "It does pre-configuration of your browser by enabling some of\n"
-"the privacy Browser Settings like ResistFingerprinting, and enforces "
-"WebRTC proxy\n"
-"obedience. It also contains menus, shortcuts, and monitoring tools "
-"improving\n"
-"Firefox's integration with I2P. It is a by-product of the I2P Browser "
-"project.\n"
-msgstr ""
-"Rozszerzenie to konfiguruje przeglądarkę aktywując kilka ustawień "
-"prywatności, takich jak „privacy.resistFingerprinting” czy wymuszenie "
-"działania WebRTC przez proxy. Zawiera również menu, zakładki i narzędzia "
-"monitorujące zwiększające integrację przeglądarki Firefox z I2P. Jest to "
-"efekt uboczny prac nad „Przeglądarką I2P”.\n"
+"the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy\n"
+"obedience. It also contains menus, shortcuts, and monitoring tools improving\n"
+"Firefox's integration with I2P. It is a by-product of the I2P Browser project.\n"
+msgstr "Rozszerzenie to konfiguruje przeglądarkę aktywując kilka ustawień prywatności, takich jak „privacy.resistFingerprinting” czy wymuszenie działania WebRTC przez proxy. Zawiera również menu, zakładki i narzędzia monitorujące zwiększające integrację przeglądarki Firefox z I2P. Jest to efekt uboczny prac nad „Przeglądarką I2P”.\n"
 
 #: i2p2www/pages/downloads/browser-content.html:38
 msgid ""
-"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon"
-"/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n"
+"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n"
 "can be obtained from the Mozilla addon store.\n"
-msgstr ""
-"Rozszerzenie <a href=\"https://addons.mozilla.org/pl/firefox/addon/i2p-"
-"in-private-browsing/\">I2P in Private Browsing</a> można poprać z "
-"repozytorium rozszerzeń Mozilli.\n"
+msgstr "Rozszerzenie <a href=\"https://addons.mozilla.org/pl/firefox/addon/i2p-in-private-browsing/\">I2P in Private Browsing</a> można poprać z repozytorium rozszerzeń Mozilli.\n"
 
 #: i2p2www/pages/downloads/browser-content.html:41
 msgid "Instructions for Firefox 57 and above:"
@@ -159,13 +128,9 @@ msgstr "Instrukcja dla Firefoksa 57 i nowszych:"
 #: i2p2www/pages/downloads/browser-content.html:42
 msgid ""
 "From the Menu button in the top right, select <em>Preferences</em>.\n"
-"Scroll down until you see the <em>Network Proxy</em> section, as shown in"
-" the\n"
+"Scroll down until you see the <em>Network Proxy</em> section, as shown in the\n"
 "screenshot below. Click on <em>Settings</em>"
-msgstr ""
-"Kliknij w menu ☰ w prawym górnym rogu, wybierz <em>Preferencje</em>. "
-"Następnie przewiń w dół do sekcji <em>Sieć</em> i wybierz "
-"<em>Ustawienia</em>"
+msgstr "Kliknij w menu ☰ w prawym górnym rogu, wybierz <em>Preferencje</em>. Następnie przewiń w dół do sekcji <em>Sieć</em> i wybierz <em>Ustawienia</em>"
 
 #: i2p2www/pages/downloads/browser-content.html:48
 msgid "Firefox57 Network Options"
@@ -175,13 +140,9 @@ msgstr "Firefox 57: opcje sieci"
 msgid ""
 "In the <em>Connection Settings</em> pop-up, select <em>Manual proxy\n"
 "    configuration</em>. Set both the HTTP and SSL Proxy to address\n"
-"<code>127.0.0.1</code> with port <code>4444</code> as shown in the "
-"following\n"
+"<code>127.0.0.1</code> with port <code>4444</code> as shown in the following\n"
 "screenshot."
-msgstr ""
-"W oknie <em>Ustawienia połączenia</em> wybierz <em>Ręczna konfiguracja "
-"serwerów proxy</em>, ustaw proxy HTTP i HTTPS na <code>127.0.0.1</code>, "
-"port <code>4444</code>, tak jak widnieje to na poniższym zrzucie ekranu."
+msgstr "W oknie <em>Ustawienia połączenia</em> wybierz <em>Ręczna konfiguracja serwerów proxy</em>, ustaw proxy HTTP i HTTPS na <code>127.0.0.1</code>, port <code>4444</code>, tak jak widnieje to na poniższym zrzucie ekranu."
 
 #: i2p2www/pages/downloads/browser-content.html:56
 msgid ""
@@ -197,10 +158,7 @@ msgstr "Firefox 57: ustawienia połączenia"
 msgid ""
 "Finally, go to the address <em>about:config</em> and find the property\n"
 "media.peerConnection.ice.proxy_only. Ensure that this setting is True."
-msgstr ""
-"Następnie przejdź na stronę <em>about:config</em> i znajdź ustawienie "
-"„media.peerconnection.ice.proxy_only” i upewnij się, że ma przypisaną "
-"wartość „True”."
+msgstr "Następnie przejdź na stronę <em>about:config</em> i znajdź ustawienie „media.peerconnection.ice.proxy_only” i upewnij się, że ma przypisaną wartość „True”."
 
 #: i2p2www/pages/downloads/browser-content.html:63
 msgid ""
@@ -219,26 +177,12 @@ msgstr " Chrome"
 #: i2p2www/pages/downloads/browser-content.html:69
 msgid ""
 "An experimental, partially-automated configuration process for\n"
-"Chrome is available. In order to configure it, create a new "
-"<em>Profile</em>\n"
-"especially for your I2P browsing, separate from the default profile. Then"
-" install\n"
-"this <a "
-"href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a>"
-" in your newly-created profile. This profile\n"
-"is now configured to use I2P. Highly detailed instructions are available "
-"at the\n"
-"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-"
-"Chromium\">homepage.</a>\n"
-msgstr ""
-"Eksperymentalna, częściowo automatyczna metoda konfiguracji jest dostępna"
-" dl przeglądarki Chrome. Musisz utworzyć nowy <em>profil</em> specjalnie "
-"do przeglądania sieci I2P, oddzielny od zwykłego profilu. Następnie "
-"zainstaluj w tym profilu to <a \n"
-"href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>rozszerzenie</em></a>."
-" Profil jest już gotowy do pracy z siecią I2P. Dokładniejsze instrukcje "
-"znajdujÄ… siÄ™ na <a href=\"https://eyedeekay.github.io/I2P-Configuration-"
-"For-Chromium/\">tej stronie</a> (w j. angielskim).\n"
+"Chrome is available. In order to configure it, create a new <em>Profile</em>\n"
+"especially for your I2P browsing, separate from the default profile. Then install\n"
+"this <a href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a> in your newly-created profile. This profile\n"
+"is now configured to use I2P. Highly detailed instructions are available at the\n"
+"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-Chromium\">homepage.</a>\n"
+msgstr "Eksperymentalna, częściowo automatyczna metoda konfiguracji jest dostępna dl przeglądarki Chrome. Musisz utworzyć nowy <em>profil</em> specjalnie do przeglądania sieci I2P, oddzielny od zwykłego profilu. Następnie zainstaluj w tym profilu to <a \nhref=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>rozszerzenie</em></a>. Profil jest już gotowy do pracy z siecią I2P. Dokładniejsze instrukcje znajdują się na <a href=\"https://eyedeekay.github.io/I2P-Configuration-For-Chromium/\">tej stronie</a> (w j. angielskim).\n"
 
 #: i2p2www/pages/downloads/browser-content.html:76
 msgid "All Chrome Versions"
@@ -246,21 +190,12 @@ msgstr "Wszystkie wersje Chrome"
 
 #: i2p2www/pages/downloads/browser-content.html:77
 msgid ""
-"Chromium-Based Browsers like Chrome have slightly different places for "
-"their\n"
-"proxy settings depending on variant and platform. These instructions may "
-"be\n"
-"slightly different in Brave or Iridium, for instance. From the "
-"<em>Main</em>\n"
-"menu, navigate to the <em>Settings</em>, and search for the <em></em> "
-"menu item.\n"
+"Chromium-Based Browsers like Chrome have slightly different places for their\n"
+"proxy settings depending on variant and platform. These instructions may be\n"
+"slightly different in Brave or Iridium, for instance. From the <em>Main</em>\n"
+"menu, navigate to the <em>Settings</em>, and search for the <em></em> menu item.\n"
 "Clicking it will open the right settings for your platform."
-msgstr ""
-"Przeglądarki na silniku Chromium, takie jak Google Chrome mają różne "
-"umiejscowienie ustawień proxy w zależności od wariantu i platformy. "
-"Poniższe instrukcje mogą nieco się różnić dla przeglądarek Brave czy "
-"Iridium. W <em>menu głównym<em> otwórz <em>Ustawienia</em> i wyszukaj "
-"<em>proxy</em>. Kliknij, aby otworzyć ustawienia serwerów proxy."
+msgstr "Przeglądarki na silniku Chromium, takie jak Google Chrome mają różne umiejscowienie ustawień proxy w zależności od wariantu i platformy. Poniższe instrukcje mogą nieco się różnić dla przeglądarek Brave czy Iridium. W <em>menu głównym<em> otwórz <em>Ustawienia</em> i wyszukaj <em>proxy</em>. Kliknij, aby otworzyć ustawienia serwerów proxy."
 
 #: i2p2www/pages/downloads/browser-content.html:84
 msgid "Chrome Proxy Options"
@@ -268,16 +203,10 @@ msgstr "Chrome: ustawienia proxy"
 
 #: i2p2www/pages/downloads/browser-content.html:85
 msgid ""
-"On Windows, this button will launch you into the shared proxy settings "
-"used\n"
-"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure"
-" it by\n"
+"On Windows, this button will launch you into the shared proxy settings used\n"
+"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure it by\n"
 "following the Internet Explorer 8 guide."
-msgstr ""
-"Pod systemem Windows zostaną otwarte współdzielone ustawienia proxy "
-"używane przez przeglądarkę <a href=\"#ie8\"><em>Internet "
-"Explorer</em></a>, opis konfiguracji znajdziesz w instrukcji odnośnie "
-"konfiguracji przeglÄ…darki Internet Explorer 8."
+msgstr "Pod systemem Windows zostaną otwarte współdzielone ustawienia proxy używane przez przeglądarkę <a href=\"#ie8\"><em>Internet Explorer</em></a>, opis konfiguracji znajdziesz w instrukcji odnośnie konfiguracji przeglądarki Internet Explorer 8."
 
 #: i2p2www/pages/downloads/browser-content.html:92
 msgid " IceRaven and other Firefoxes for Android "
@@ -290,103 +219,54 @@ msgstr "Konfiguracja z użyciem rozszerzenia"
 #: i2p2www/pages/downloads/browser-content.html:94
 msgid ""
 "Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have\n"
-"an about:config page for you to configure proxy settings manually. It is "
-"further\n"
-"not possible to use most extensions in Fenix-based Firefoxes. It is "
-"possible to\n"
-"enable support about:config and enable more extensions in Firefox Nightly"
-" at the time \n"
-"of this writing, but it's a manual and difficult process. "
-"<em>IceRaven</em> is a fork\n"
-"of Firefox which enables a collection of extensions while Mozilla and the"
-" Mozilla\n"
-"Community work on adding support for extensions to Firefox for Android. "
-"It provides\n"
-"the easiest way of configuring a modern Firefox-based Browser for "
-"Android. It does\n"
-"not come from Mozilla and carries no guarantees from them. <em>Installing"
-" the extension\n"
+"an about:config page for you to configure proxy settings manually. It is further\n"
+"not possible to use most extensions in Fenix-based Firefoxes. It is possible to\n"
+"enable support about:config and enable more extensions in Firefox Nightly at the time \n"
+"of this writing, but it's a manual and difficult process. <em>IceRaven</em> is a fork\n"
+"of Firefox which enables a collection of extensions while Mozilla and the Mozilla\n"
+"Community work on adding support for extensions to Firefox for Android. It provides\n"
+"the easiest way of configuring a modern Firefox-based Browser for Android. It does\n"
+"not come from Mozilla and carries no guarantees from them. <em>Installing the extension\n"
 "in IceRaven will proxy all your IceRaven browsing over I2P.</em>"
-msgstr ""
-"Nowsze wersje przeglądarki Firefox („Fenix”) nie mają strony "
-"about:config, co uniemożliwia ręczną konfigurację. Ponadto większość "
-"rozszerzeń nie działa z wersjami Firefoksa „Fenix”. Jest możliwa "
-"aktywacja strony about:config i pobranie innych rozszerzeń w wersji "
-"Nightly w czasie pisania tej instrukcji, ale jest to żmudny i trudny "
-"proces. <em>IceRaven</em> jest odnogą Firefoksa umożliwiającą korzystanie"
-" z większej ilości rozszerzeń podczas gdy organizacja i społeczność "
-"Mozilli pracują nad dodaniem wsparcia dla rozszerzeń do Firefoksa na "
-"Androidzie. Jest to najłatwiejszy sposób na konfigurację nowszych wersji "
-"Firefoksa, ale aplikacja ta nie pochodzi od Mozilli i nie jest przez "
-"posiada aprobaty organizacji Mozilla. <em>Instalacja rozszerzenia w "
-"przeglądarce IceRaven umożliwi przekierowanie Twojego ruchu sieciowego do"
-" sieci I2P.</em>"
+msgstr "Nowsze wersje przeglądarki Firefox („Fenix”) nie mają strony about:config, co uniemożliwia ręczną konfigurację. Ponadto większość rozszerzeń nie działa z wersjami Firefoksa „Fenix”. Jest możliwa aktywacja strony about:config i pobranie innych rozszerzeń w wersji Nightly w czasie pisania tej instrukcji, ale jest to żmudny i trudny proces. <em>IceRaven</em> jest odnogą Firefoksa umożliwiającą korzystanie z większej ilości rozszerzeń podczas gdy organizacja i społeczność Mozilli pracują nad dodaniem wsparcia dla rozszerzeń do Firefoksa na Androidzie. Jest to najłatwiejszy sposób na konfigurację nowszych wersji Firefoksa, ale aplikacja ta nie pochodzi od Mozilli i nie jest przez posiada aprobaty organizacji Mozilla. <em>Instalacja rozszerzenia w przeglądarce IceRaven umożliwi przekierowanie Twojego ruchu sieciowego do sieci I2P.</em>"
 
 #: i2p2www/pages/downloads/browser-content.html:104
 msgid ""
-"If you have not installed IceRaven yet, go to the next step. If you have "
-"been\n"
-"using IceRaven for a while, go to the main menu, select the History tab, "
-"and make\n"
-"sure that you have cleared information about your past browsing by "
-"tapping the\n"
+"If you have not installed IceRaven yet, go to the next step. If you have been\n"
+"using IceRaven for a while, go to the main menu, select the History tab, and make\n"
+"sure that you have cleared information about your past browsing by tapping the\n"
 "\"Delete History\" button."
-msgstr ""
-"Jeżeli jeszcze nie posiadasz apki IceRaven, przejdź do następnego kroku. "
-"Jeżeli korzystałeś/korzystałaś przez pewien czas z IceRavena, otwórz "
-"kartę historii i wyczyść informacje o wcześniejszej aktywności "
-"przyciskiem „Wyczyść historię”."
+msgstr "Jeżeli jeszcze nie posiadasz apki IceRaven, przejdź do następnego kroku. Jeżeli korzystałeś/korzystałaś przez pewien czas z IceRavena, otwórz kartę historii i wyczyść informacje o wcześniejszej aktywności przyciskiem „Wyczyść historię”."
 
 #: i2p2www/pages/downloads/browser-content.html:108
 msgid ""
-"Open the IceRaven main menu, and scroll to the top until you see the "
-"\"Add-Ons\"\n"
-"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. "
-"Install\n"
+"Open the IceRaven main menu, and scroll to the top until you see the \"Add-Ons\"\n"
+"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. Install\n"
 "the extension named <em>I2P Proxy for Android and other Systems</em>.\n"
-msgstr ""
-"Otwórz menu główne przeglądarki IceRaven, przewiń do sekcji "
-"„Rozszerzenia”. Otwórz „Menadżera rozszerzeń” z menu i zainstaluj "
-"rozszerzenie <em>I2P Proxy for Android and other Systems</em>.\n"
+msgstr "Otwórz menu główne przeglądarki IceRaven, przewiń do sekcji „Rozszerzenia”. Otwórz „Menadżera rozszerzeń” z menu i zainstaluj rozszerzenie <em>I2P Proxy for Android and other Systems</em>.\n"
 
 #: i2p2www/pages/downloads/browser-content.html:112
 msgid "Your IceRaven browser is now configured to use I2P.\n"
-msgstr ""
-"Teraz Twoja przeglÄ…darka IceRaven jest skonfigurowana do przeglÄ…dania "
-"sieci I2P.\n"
+msgstr "Teraz Twoja przeglÄ…darka IceRaven jest skonfigurowana do przeglÄ…dania sieci I2P.\n"
 
 #: i2p2www/pages/downloads/browser-content.html:114
 msgid ""
 "This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based\n"
 "web browsers, if installed from the following addons.mozilla.org URL.\n"
-"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-"
-"proxy/\">I2P Proxy for Android and Other Systems</a><em>\n"
-msgstr ""
-"Rozszerzenie to działa także w przeglądarkach opartych na starszych (<68)"
-" wersji Firefoksa, jeżeli zostało zainstalowane z repozytorium Mozilli: "
-"<em><a href=\"https://addons.mozilla.org/pl/android/addon/i2p-"
-"proxy/\">I2P Proxy for Android and Other Systems</a><em>.\n"
+"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-proxy/\">I2P Proxy for Android and Other Systems</a><em>\n"
+msgstr "Rozszerzenie to działa także w przeglądarkach opartych na starszych (<68) wersji Firefoksa, jeżeli zostało zainstalowane z repozytorium Mozilli: <em><a href=\"https://addons.mozilla.org/pl/android/addon/i2p-proxy/\">I2P Proxy for Android and Other Systems</a><em>.\n"
 
 #: i2p2www/pages/downloads/browser-content.html:118
 msgid ""
-"This extension is identical to the Chromium extension and is built from "
-"the same source."
-msgstr ""
-"Rozszerzenie to jest takie same jak rozszerzenie do Chromium i jest "
-"skompilowane z tego samego kodu źródłowego."
+"This extension is identical to the Chromium extension and is built from the "
+"same source."
+msgstr "Rozszerzenie to jest takie same jak rozszerzenie do Chromium i jest skompilowane z tego samego kodu źródłowego."
 
 #: i2p2www/pages/downloads/browser-content.html:119
 msgid ""
-"In order to enable extension support in Firefox Nightly, you should "
-"follow\n"
-"the steps provided by Mozilla on their <a "
-"href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-"
-"support-in-firefox-for-android-nightly/\">Blog</a>"
-msgstr ""
-"Aby włączyć wsparcie rozszerzeń w Firefoksie Nightly, przeczytaj <a "
-"href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-"
-"support-in-firefox-for-android-nightly/\">następujący artykuł</a> (w j. "
-"angielskim) na blogu Mozilli."
+"In order to enable extension support in Firefox Nightly, you should follow\n"
+"the steps provided by Mozilla on their <a href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-support-in-firefox-for-android-nightly/\">Blog</a>"
+msgstr "Aby włączyć wsparcie rozszerzeń w Firefoksie Nightly, przeczytaj <a href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-support-in-firefox-for-android-nightly/\">następujący artykuł</a> (w j. angielskim) na blogu Mozilli."
 
 #: i2p2www/pages/downloads/browser-content.html:124
 msgid "Internet Explorer"
@@ -394,13 +274,10 @@ msgstr "Internet Explorer"
 
 #: i2p2www/pages/downloads/browser-content.html:125
 msgid ""
-"In the start menu search for the the \"Network and Internet Settings\" to"
-" open the\n"
+"In the start menu search for the the \"Network and Internet Settings\" to open the\n"
 "settings. The last entry in the menu is the Proxy Settings, click it to\n"
 "your proxy to connect to I2P."
-msgstr ""
-"W menu start wyszukaj „Sieć i internet”, aby otworzyć ustawienia. Kliknij"
-" ostatnią pozycję w menu – „Proxy”."
+msgstr "W menu start wyszukaj „Sieć i internet”, aby otworzyć ustawienia. Kliknij ostatnią pozycję w menu – „Proxy”."
 
 #: i2p2www/pages/downloads/browser-content.html:130
 msgid "IE Internet Options"
@@ -408,22 +285,12 @@ msgstr "Opcje internetowe IE"
 
 #: i2p2www/pages/downloads/browser-content.html:131
 msgid ""
-"Now set the checkmark at \"use a proxy server for your LAN\" and at the "
-"\"Bypass\n"
-"proxy server for local addresses\". With a click on Advanced-button you "
-"open the\n"
-"window to open the ports. Enter the values like on the picture, IP "
-"127.0.0.1\n"
-"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save "
-"the\n"
+"Now set the checkmark at \"use a proxy server for your LAN\" and at the \"Bypass\n"
+"proxy server for local addresses\". With a click on Advanced-button you open the\n"
+"window to open the ports. Enter the values like on the picture, IP 127.0.0.1\n"
+"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the\n"
 "settings and your browser is set to use the I2P proxy."
-msgstr ""
-"Następnie zaznacz „Użyj serwera proxy dla sieci LAN” i „Nie używaj "
-"serwera proxy dla adresów lokalnych”. Następnie kliknij przycisk "
-"„Zaawansowane” i wprowadź numery portów. Wprowadź wartości z poniższego "
-"obrazka, IP 127.0.0.1, port 4444 dla HTTP i 4445 dla HTTPS. Kliknij OK, "
-"aby zapisać ustawienia proxy, co sprawi, że Twoja przeglądarka będzie "
-"skonfigurowana do pracy z I2P."
+msgstr "Następnie zaznacz „Użyj serwera proxy dla sieci LAN” i „Nie używaj serwera proxy dla adresów lokalnych”. Następnie kliknij przycisk „Zaawansowane” i wprowadź numery portów. Wprowadź wartości z poniższego obrazka, IP 127.0.0.1, port 4444 dla HTTP i 4445 dla HTTPS. Kliknij OK, aby zapisać ustawienia proxy, co sprawi, że Twoja przeglądarka będzie skonfigurowana do pracy z I2P."
 
 #: i2p2www/pages/downloads/browser-content.html:138
 msgid "IE Proxy Settings"
@@ -431,67 +298,41 @@ msgstr "IE: ustawienia proxy"
 
 #: i2p2www/pages/downloads/browser-content.html:143
 msgid ""
-"Remember: I2P was not designed for creating proxies to the outer "
-"Internet.\n"
+"Remember: I2P was not designed for creating proxies to the outer Internet.\n"
 "Instead, it is meant to be used as an internal network."
-msgstr ""
-"Miej na uwadze fakt, że sieć I2P nie została zaprojektowana do tworzenia "
-"serwerów proxy do normalnego internetu. Celem I2P jest bycie zewnętrzną "
-"zamkniętą siecią."
+msgstr "Miej na uwadze fakt, że sieć I2P nie została zaprojektowana do tworzenia serwerów proxy do normalnego internetu. Celem I2P jest bycie zewnętrzną zamkniętą siecią."
 
 #: i2p2www/pages/downloads/browser-content.html:147
 msgid ""
-"<p><b>The I2P project itself does not run any proxies to the "
-"Internet.</b>\n"
+"<p><b>The I2P project itself does not run any proxies to the Internet.</b>\n"
 "The only outproxy is a service from the privacy solutions project.\n"
-"Consider donating to them for a continued stable service. Increased "
-"funding will\n"
+"Consider donating to them for a continued stable service. Increased funding will\n"
 "allow them to improve this service. </p>\n"
 "<a href=\"http://privacysolutions.no\"\n"
 "    target=\"_blank\">http://privacysolutions.no</a>"
-msgstr ""
-"<p><b>Projekt I2P nie jest operatorem serwerów proxy do zwykłego "
-"internetu<b> Jedyne proxy zewnętrzne jest udostępniane przez projekt "
-"Privacy Solutions. Prosimy rozważyć dotację dla nich, aby wciąż mogli "
-"oferować stabilną usługę. Większe fundusze pozwolą im na rozbudowanie "
-"usługi.</p>\n"
-"<a href=\"http://privacysolutions.no\" "
-"target=\"_blank\">http://privacysolutions.no</a>"
+msgstr "<p><b>Projekt I2P nie jest operatorem serwerów proxy do zwykłego internetu<b> Jedyne proxy zewnętrzne jest udostępniane przez projekt Privacy Solutions. Prosimy rozważyć dotację dla nich, aby wciąż mogli oferować stabilną usługę. Większe fundusze pozwolą im na rozbudowanie usługi.</p>\n<a href=\"http://privacysolutions.no\" target=\"_blank\">http://privacysolutions.no</a>"
 
 #: i2p2www/pages/downloads/browser-content.html:155
 #, python-format
 msgid ""
-"By default, I2P comes with two outproxies configured: "
-"<code>%(http)s</code>\n"
-"and <code>%(https)s</code>. Even the domain names are different, it's the"
-" same outproxy you hit.\n"
+"By default, I2P comes with two outproxies configured: <code>%(http)s</code>\n"
+"and <code>%(https)s</code>. Even the domain names are different, it's the same outproxy you hit.\n"
 "(multi-homed/keyed for better performance)"
-msgstr ""
-"Domyślnie węzeł I2P jest skonfigurowany z dwoma zewnętrznymi proxy: "
-"<code>%(http)s</code> i <code>%(https)s</code>. Mimo tego, że są to różne"
-" domeny jest to te same proxy zewnętrzne (wiele serwerów i kluczy dla "
-"zwiększenia wydajności)."
+msgstr "Domyślnie węzeł I2P jest skonfigurowany z dwoma zewnętrznymi proxy: <code>%(http)s</code> i <code>%(https)s</code>. Mimo tego, że są to różne domeny jest to te same proxy zewnętrzne (wiele serwerów i kluczy dla zwiększenia wydajności)."
 
 #: i2p2www/pages/downloads/browser-content.html:160
 msgid ""
 "Filtering is active on these outproxies (for example, mibbit and torrent\n"
 "tracker access is blocked). I2P Sites\n"
-"that are accessible via .i2p addresses are also not allowed via the "
-"outproxies.\n"
+"that are accessible via .i2p addresses are also not allowed via the outproxies.\n"
 "As a convenience, the outproxy blocks ad servers."
-msgstr ""
-"Proxy te filtrują połączenia (przykładowo Mibbit i trackery torrentów są "
-"zablokowane). Strony mające mirrory w domenie .i2p również są blokowane. "
-"Dla wygody blokowane są również serwery reklam."
+msgstr "Proxy te filtrują połączenia (przykładowo Mibbit i trackery torrentów są zablokowane). Strony mające mirrory w domenie .i2p również są blokowane. Dla wygody blokowane są również serwery reklam."
 
 #: i2p2www/pages/downloads/browser-content.html:166
 msgid ""
-"<a href=\"https://www.torproject.org\">Tor</a> is a good application to "
-"use as an\n"
+"<a href=\"https://www.torproject.org\">Tor</a> is a good application to use as an\n"
 "outproxy to the Internet."
-msgstr ""
-"Jeżeli chcesz proxy do zwykłego internetu, skorzystaj z <a "
-"href=\"https://www.torproject.org\">sieci Tor</a>."
+msgstr "Jeżeli chcesz proxy do zwykłego internetu, skorzystaj z <a href=\"https://www.torproject.org\">sieci Tor</a>."
 
 #: i2p2www/pages/downloads/config.html:2 i2p2www/pages/site/faq.html:19
 msgid "Configuration"
@@ -507,20 +348,11 @@ msgstr "Debian Buster, Ubuntu Bionic i nowsze"
 
 #: i2p2www/pages/downloads/debian.html:7
 msgid ""
-"I2P is available in the official repositories for Ubuntu Bionic and "
-"later, and Debian Buster and Sid.\n"
-"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have "
-"older I2P versions.\n"
+"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n"
+"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n"
 "If you are not running Debian Sid or the latest Ubuntu release,\n"
-"use our Debian repo or Launchpad PPA to ensure you're running the latest "
-"I2P version."
-msgstr ""
-"I2P jest dostępne w oficjalnych repozytoriach Ubuntu Bionic (18.04) lub "
-"późniejszych, w Debianie Buster i sid. Jednakże wersje w dystrybucjach "
-"Debian Buster i Ubuntu Bionic (LTS) mogą być przestarzałe. Jeżeli "
-"korzystasz z dystrybucji Debian sid lub najnowszego wydania Ubuntu, dodaj"
-" nasze repozytorium Debiana lub Launchpad PPA, aby otrzymać najnowszą "
-"wersjÄ™."
+"use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version."
+msgstr "I2P jest dostępne w oficjalnych repozytoriach Ubuntu Bionic (18.04) lub późniejszych, w Debianie Buster i sid. Jednakże wersje w dystrybucjach Debian Buster i Ubuntu Bionic (LTS) mogą być przestarzałe. Jeżeli korzystasz z dystrybucji Debian sid lub najnowszego wydania Ubuntu, dodaj nasze repozytorium Debiana lub Launchpad PPA, aby otrzymać najnowszą wersję."
 
 #: i2p2www/pages/downloads/debian.html:14
 msgid "Debian or Ubuntu, All Versions"
@@ -541,23 +373,16 @@ msgstr "<a href=\"#debian\">Debian</a> (Wheezy i nowsze)"
 #: i2p2www/pages/downloads/debian.html:23
 #, python-format
 msgid ""
-"The I2P packages <em>may</em> work on systems not listed above. Please "
-"report any issues\n"
+"The I2P packages <em>may</em> work on systems not listed above. Please report any issues\n"
 "with these packages on <a href=\"%(trac)s\">Trac</a> at\n"
 "<a href=\"%(trac)s\">https://trac.i2p2.de</a>."
-msgstr ""
-"Paczki I2P  <em>mogą</em> działać w systemach nie wymienionych poniżej. "
-"Prosimy o zgłaszanie wszelkich błędów związanych z tymi paczkami na "
-"naszym <a href=\"%(trac)s\">systemie śledzenia błędów</a> pod adresem <a "
-"href=\"%(trac)s\">https://trac.i2p2.de</a>."
+msgstr "Paczki I2P  <em>mogą</em> działać w systemach nie wymienionych poniżej. Prosimy o zgłaszanie wszelkich błędów związanych z tymi paczkami na naszym <a href=\"%(trac)s\">systemie śledzenia błędów</a> pod adresem <a href=\"%(trac)s\">https://trac.i2p2.de</a>."
 
 #: i2p2www/pages/downloads/debian.html:29
 msgid ""
 "Option 1: <a href=\"#ubuntu\">Recent versions</a> of Ubuntu and its "
 "derivatives (<em>Try this if you're not using Debian)</em>"
-msgstr ""
-"Opcja 1: <a href=\"#ubuntu\">aktualne wersje</a> Ubuntu i pochodne "
-"(<em>spróbuj tego jeśli nie używasz Debiana)</em>"
+msgstr "Opcja 1: <a href=\"#ubuntu\">aktualne wersje</a> Ubuntu i pochodne (<em>spróbuj tego jeśli nie używasz Debiana)</em>"
 
 #: i2p2www/pages/downloads/debian.html:30
 msgid "Option 2: <a href=\"#debian\">Debian</a> (including Debian-derivatives)"
@@ -565,9 +390,7 @@ msgstr "Opcja 2: <a href=\"#debian\">Debian</a> (Å‚Ä…cznie z  pochodnymi Debiana
 
 #: i2p2www/pages/downloads/debian.html:33
 msgid "Instructions for Ubuntu and derivatives like Linux Mint &amp; Trisquel"
-msgstr ""
-"Instrukcje dla Ubuntu i pochodnych dystrybucji takich jak Linux Mint czy "
-"Trisquel"
+msgstr "Instrukcje dla Ubuntu i pochodnych dystrybucji takich jak Linux Mint czy Trisquel"
 
 #: i2p2www/pages/downloads/debian.html:34
 msgid "Adding the PPA via the command line and installing I2P"
@@ -582,10 +405,7 @@ msgid ""
 "This command will add the PPA to /etc/apt/sources.list.d and fetch the\n"
 "gpg key that the repository has been signed with. The GPG key ensures\n"
 "that the packages have not been tampered with since being built."
-msgstr ""
-"To polecenie doda PPA do /etc/apt/sources.list.d i pobierze klucz GPG, "
-"którym repozytorium zostało podpisane. Klucz GPG zapewnia, że pakiety nie"
-" zostały naruszone przez kogoś w trakcie budowy."
+msgstr "To polecenie doda PPA do /etc/apt/sources.list.d i pobierze klucz GPG, którym repozytorium zostało podpisane. Klucz GPG zapewnia, że pakiety nie zostały naruszone przez kogoś w trakcie budowy."
 
 #: i2p2www/pages/downloads/debian.html:46
 msgid "Notify your package manager of the new PPA by entering:"
@@ -596,10 +416,7 @@ msgid ""
 "This command will retrieve the latest list of software from each\n"
 "repository that is enabled on your system, including the I2P PPA that\n"
 "was added with the earlier command."
-msgstr ""
-"Komenda ta pobierze najnowszą listę oprogramowania z każdego "
-"repozytorium, które jest aktywne w systemie, łącznie z PPA I2P dodane "
-"poprzednim poleceniem."
+msgstr "Komenda ta pobierze najnowszą listę oprogramowania z każdego repozytorium, które jest aktywne w systemie, łącznie z PPA I2P dodane poprzednim poleceniem."
 
 #: i2p2www/pages/downloads/debian.html:54
 msgid "You are now ready to install I2P!"
@@ -611,54 +428,36 @@ msgstr "Dodawanie PPA używając Synaptic"
 
 #: i2p2www/pages/downloads/debian.html:61
 msgid ""
-"Open Synaptic (System -&gt; Administration -&gt; Synaptic Package "
-"Manager)."
+"Open Synaptic (System -&gt; Administration -&gt; Synaptic Package Manager)."
 msgstr "Otwórz Synaptic (system → administracja → menadżer pakietów Synaptic)."
 
 #: i2p2www/pages/downloads/debian.html:66
 msgid ""
-"Once Synaptic opens, select <em>Repositories</em> from the "
-"<em>Settings</em> menu."
-msgstr ""
-"Kiedy Synaptic otworzy siÄ™, wybierz <em>repozytoria</em> z menu "
-"<em>ustawienia</em>."
+"Once Synaptic opens, select <em>Repositories</em> from the <em>Settings</em>"
+" menu."
+msgstr "Kiedy Synaptic otworzy siÄ™, wybierz <em>repozytoria</em> z menu <em>ustawienia</em>."
 
 #: i2p2www/pages/downloads/debian.html:71
 msgid ""
 "Click the <em>Other Sources</em> tab and click <em>Add</em>. Paste "
 "<code>ppa:i2p-maintainers/i2p</code> into the APT-line field and click "
-"<em>Add Source</em>. Click the <em>Close</em> button then "
-"<em>Reload</em>."
-msgstr ""
-"Kliknij w zakładkę <em>inne źródła</em>, następnie <em>dodaj</em> i wklej"
-" <code>ppa:i2p-maintainers/i2p</code> do pola APT i kliknij na <em>dodaj "
-"źródło</em>. Następnie kliknij przycisk <em>zamknij</em> i "
-"<em>odśwież</em>."
+"<em>Add Source</em>. Click the <em>Close</em> button then <em>Reload</em>."
+msgstr "Kliknij w zakładkę <em>inne źródła</em>, następnie <em>dodaj</em> i wklej <code>ppa:i2p-maintainers/i2p</code> do pola APT i kliknij na <em>dodaj źródło</em>. Następnie kliknij przycisk <em>zamknij</em> i <em>odśwież</em>."
 
 #: i2p2www/pages/downloads/debian.html:76
 msgid ""
 "In the Quick Filter box, type in <code>i2p</code> and press enter. When "
 "<code>i2p</code> is returned in the results list, right click "
-"<code>i2p</code> and select <em>Mark for Installation</em>. After doing "
-"so you may see a <em>Mark additional required changes?</em> popup. If so,"
-" click <em>Mark</em> then <em>Apply</em>."
-msgstr ""
-"W polu szybkiego filtrowania wpisz <code>i2p</code> i naciśnij enter. Gdy"
-" <code>i2p</code> pojawi się na liście wyników, kliknij go prawym "
-"przyciskiem myszy i wybierz <em>zaznacz w celu instalacji</em>. Po "
-"dokonaniu wyboru możesz zobaczyć okno: <em>zaznaczyć dodatkowe wymagane "
-"zmiany?</em>. Jeśli tak, wybierz <em>zaznacz</em> a następnie "
-"<em>zastosuj</em>."
+"<code>i2p</code> and select <em>Mark for Installation</em>. After doing so "
+"you may see a <em>Mark additional required changes?</em> popup. If so, click"
+" <em>Mark</em> then <em>Apply</em>."
+msgstr "W polu szybkiego filtrowania wpisz <code>i2p</code> i naciśnij enter. Gdy <code>i2p</code> pojawi się na liście wyników, kliknij go prawym przyciskiem myszy i wybierz <em>zaznacz w celu instalacji</em>. Po dokonaniu wyboru możesz zobaczyć okno: <em>zaznaczyć dodatkowe wymagane zmiany?</em>. Jeśli tak, wybierz <em>zaznacz</em> a następnie <em>zastosuj</em>."
 
 #: i2p2www/pages/downloads/debian.html:82
 msgid ""
 "After the installation process completes you can move on to the next\n"
-"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring "
-"it for your system."
-msgstr ""
-"Gdy proces instalacji się zakończy, możesz przejść do następnej części <a"
-" href=\"#Post-install_work\">uruchamianie I2P</a> i konfigurowanie go w "
-"systemie."
+"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your system."
+msgstr "Gdy proces instalacji się zakończy, możesz przejść do następnej części <a href=\"#Post-install_work\">uruchamianie I2P</a> i konfigurowanie go w systemie."
 
 #: i2p2www/pages/downloads/debian.html:87
 msgid "Instructions for Debian"
@@ -670,46 +469,30 @@ msgstr "Obecnie wspierane architektury"
 
 #: i2p2www/pages/downloads/debian.html:91
 msgid ""
-"Note: The steps below should be performed with root access (i.e., "
-"switching\n"
-"user to root with <code>su</code> or by prefixing each command with "
-"<code>sudo</code>)."
-msgstr ""
-"Uwaga: poniższe czynności powinny zostać uruchomione z uprawnieniami "
-"administratora (jednorazowo wpisując komendę <code>su</code> bądź też "
-"wpisując przed każdą komendą <code>sudo</code>)."
+"Note: The steps below should be performed with root access (i.e., switching\n"
+"user to root with <code>su</code> or by prefixing each command with <code>sudo</code>)."
+msgstr "Uwaga: poniższe czynności powinny zostać uruchomione z uprawnieniami administratora (jednorazowo wpisując komendę <code>su</code> bądź też wpisując przed każdą komendą <code>sudo</code>)."
 
 #: i2p2www/pages/downloads/debian.html:96
 msgid ""
 "Ensure that <code>apt-transport-https</code> and <code>curl</code> are "
 "installed."
-msgstr ""
-"Upewnij się, że pakiety <code>apt-transport-https</code> i "
-"<code>curl</code> sÄ… zainstalowane."
+msgstr "Upewnij się, że pakiety <code>apt-transport-https</code> i <code>curl</code> są zainstalowane."
 
 #: i2p2www/pages/downloads/debian.html:103
 #, python-format
 msgid ""
 "\n"
-"    Check which version of Debian you are using on this page at the <a "
-"href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n"
+"    Check which version of Debian you are using on this page at the <a href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n"
 "    and verify with <code>%(file2)s</code> on your system.\n"
 "    Then, add lines like the following to <code>%(file)s</code>."
-msgstr ""
-"\n"
-"Sprawdź używaną wersję Debiana na <a "
-"href=\"https://wiki.debian.org/LTS/\" "
-"target=\"_blank\">wiki.debian.org</a> i zweryfikuj to w pliku "
-"<code>%(file2)s</code>. Następnie dopisz następujące linijki do pliku  "
-"<code>%(file)s</code>:"
+msgstr "\nSprawdź używaną wersję Debiana na <a href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">wiki.debian.org</a> i zweryfikuj to w pliku <code>%(file2)s</code>. Następnie dopisz następujące linijki do pliku  <code>%(file)s</code>:"
 
 #: i2p2www/pages/downloads/debian.html:136
 msgid ""
 "Note: If you are running Debian Sid (testing), then you can install I2P "
 "directly from Debian's main repository"
-msgstr ""
-"Uwaga: jeżeli pracujesz na Debianie sid (wydanie testowe), możesz "
-"bezpośrednio zainstalować I2P z głównego repozytorium"
+msgstr "Uwaga: jeżeli pracujesz na Debianie sid (wydanie testowe), możesz bezpośrednio zainstalować I2P z głównego repozytorium"
 
 #: i2p2www/pages/downloads/debian.html:143
 #, python-format
@@ -731,33 +514,22 @@ msgstr "Powiadom menadżera paczek o nowym repozytorium wpisując:"
 #: i2p2www/pages/downloads/debian.html:175
 msgid ""
 "This command will retrieve the latest list of software from every\n"
-"repository enabled on your system, including the I2P repository added in "
-"step\n"
+"repository enabled on your system, including the I2P repository added in step\n"
 "1."
-msgstr ""
-"Komenda ta pobierze najnowszą listę oprogramowania z każdego "
-"repozytorium, które jest aktywne w systemie, łącznie z repozytorium I2P "
-"dodanym w kroku 1."
+msgstr "Komenda ta pobierze najnowszą listę oprogramowania z każdego repozytorium, które jest aktywne w systemie, łącznie z repozytorium I2P dodanym w kroku 1."
 
 #: i2p2www/pages/downloads/debian.html:181
 msgid ""
-"You are now ready to install I2P! Installing the <code>i2p-keyring</code>"
-"\n"
+"You are now ready to install I2P! Installing the <code>i2p-keyring</code>\n"
 "package will ensure that you receive updates to the repository's GPG key."
-msgstr ""
-"Jesteś już gotowy do instalacji I2P! Instalacja paczki  <code>i2p-"
-"keyring</code> zagwarantuje otrzymywanie aktualizacji klucza GPG "
-"repozytorium."
+msgstr "Jesteś już gotowy do instalacji I2P! Instalacja paczki  <code>i2p-keyring</code> zagwarantuje otrzymywanie aktualizacji klucza GPG repozytorium."
 
 #: i2p2www/pages/downloads/debian.html:191
 msgid ""
-"After the installation process completes you can move on to the next part"
-" of <a href=\"#Post-install_work\">starting I2P</a> and configuring it "
-"for your system."
-msgstr ""
-"Gdy zakończy się proces instalacji, możesz przejść do następnej części <a"
-" href=\"#Post-install_work\">uruchamiania</a> i konfigurowania I2P dla "
-"Twojego systemu."
+"After the installation process completes you can move on to the next part of"
+" <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your"
+" system."
+msgstr "Gdy zakończy się proces instalacji, możesz przejść do następnej części <a href=\"#Post-install_work\">uruchamiania</a> i konfigurowania I2P dla Twojego systemu."
 
 #: i2p2www/pages/downloads/debian.html:196
 #: i2p2www/pages/downloads/post-install.html:1
@@ -768,95 +540,52 @@ msgstr "Zadania poinstalacyjne"
 msgid ""
 "Using these I2P packages the I2P router can be started in the following\n"
 "three ways:"
-msgstr ""
-"Używając tych paczek I2P, węzeł I2P może zostać uruchomiony na trzy "
-"następujące sposoby:"
+msgstr "Używając tych paczek I2P, węzeł I2P może zostać uruchomiony na trzy następujące sposoby:"
 
 #: i2p2www/pages/downloads/debian.html:204
 msgid ""
-"&quot;on demand&quot; using the i2prouter script. Simply run "
-"&quot;<code>i2prouter\n"
-"start</code>&quot; from a command prompt. (Note: Do "
-"<strong><u>not</u></strong> use\n"
+"&quot;on demand&quot; using the i2prouter script. Simply run &quot;<code>i2prouter\n"
+"start</code>&quot; from a command prompt. (Note: Do <strong><u>not</u></strong> use\n"
 "sudo or run it as root!)"
-msgstr ""
-"„na żądanie” korzystając ze skryptu „i2prouter'” – wpisz w terminal:<br>\n"
-"<code>i2prouter start</code><br>\n"
-"(Uwaga: <strong><u>nie</strong></u> używaj sudo ani nie uruchomiaj jako "
-"root!)"
+msgstr "„na żądanie” korzystając ze skryptu „i2prouter'” – wpisz w terminal:<br>\n<code>i2prouter start</code><br>\n(Uwaga: <strong><u>nie</strong></u> używaj sudo ani nie uruchomiaj jako root!)"
 
 #: i2p2www/pages/downloads/debian.html:211
 msgid ""
-"&quot;on demand&quot; without the <a "
-"href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n"
-"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-"
-"nowrapper</code>\".\n"
+"&quot;on demand&quot; without the <a href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n"
+"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-nowrapper</code>\".\n"
 "(Note: Do <strong><u>not</u></strong>\n"
 "use sudo or run it as root!)"
-msgstr ""
-"„na żądanie” niekorzystając z <a "
-"href=\"http://wrapper.tanukisoftware.com/\">wrappera usługi Javy</a> "
-"(potrzebne na nie-Linuksowych/nie-x86 systemach) wpisujÄ…c w terminal:<br>"
-"\n"
-"<code>i2prouter-nowrapper</code><br>\n"
-"(Uwaga: <strong><u>nie</u></strong> używaj sudo ani nie uruchamiaj jako "
-"root!)"
+msgstr "„na żądanie” niekorzystając z <a href=\"http://wrapper.tanukisoftware.com/\">wrappera usługi Javy</a> (potrzebne na nie-Linuksowych/nie-x86 systemach) wpisując w terminal:<br>\n<code>i2prouter-nowrapper</code><br>\n(Uwaga: <strong><u>nie</u></strong> używaj sudo ani nie uruchamiaj jako root!)"
 
 #: i2p2www/pages/downloads/debian.html:219
 msgid ""
 "as a service that automatically runs when your system boots, even\n"
-"before logging in. The service can be enabled with \"<code>dpkg-"
-"reconfigure\n"
-"i2p</code>\" as root or using sudo. This is the recommended means of "
-"operation."
-msgstr ""
-"jako usługa, która automatycznie uruchamia się podczas startu systemu, "
-"nawet przed zalogowaniem; usługę można aktywować poleceniem:<br>\n"
-"<code>dpkg-reconfigure i2p</code><br>\n"
-"jako root lub używając sudo. To jest zalecany tryb działania."
+"before logging in. The service can be enabled with \"<code>dpkg-reconfigure\n"
+"i2p</code>\" as root or using sudo. This is the recommended means of operation."
+msgstr "jako usługa, która automatycznie uruchamia się podczas startu systemu, nawet przed zalogowaniem; usługę można aktywować poleceniem:<br>\n<code>dpkg-reconfigure i2p</code><br>\njako root lub używając sudo. To jest zalecany tryb działania."
 
 #: i2p2www/pages/downloads/debian.html:227
 msgid ""
-"When installing for the first time, please remember to <b>adjust your "
-"NAT/firewall</b>\n"
-"if you can. The ports to forward can be found on the <a "
-"href=\"http://127.0.0.1:7657/confignet\">\n"
-"network configuration page</a> in the router console. If guidance with "
-"respect to forwarding ports is needed,\n"
-"you may find <a href=\"http://portforward.com\">portforward.com</a> to be"
-" helpful."
-msgstr ""
-"Podczas pierwszej instalacji, proszę pamiętać aby <b>skonfigurować swój "
-"NAT/zaporę sieciową</b> w razie możliwości. Porty które należy "
-"przekierować znajdziesz na <a "
-"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji sieci</a> w"
-" konsoli węzła. Jeżeli będziesz potrzebował pomocy z przekierowaniem "
-"portów, to zajrzyj na stronę <a "
-"href=\"http://portforward.com\">portforward.com</a>."
+"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n"
+"if you can. The ports to forward can be found on the <a href=\"http://127.0.0.1:7657/confignet\">\n"
+"network configuration page</a> in the router console. If guidance with respect to forwarding ports is needed,\n"
+"you may find <a href=\"http://portforward.com\">portforward.com</a> to be helpful."
+msgstr "Podczas pierwszej instalacji, proszę pamiętać aby <b>skonfigurować swój NAT/zaporę sieciową</b> w razie możliwości. Porty które należy przekierować znajdziesz na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji sieci</a> w konsoli węzła. Jeżeli będziesz potrzebował pomocy z przekierowaniem portów, to zajrzyj na stronę <a href=\"http://portforward.com\">portforward.com</a>."
 
 #: i2p2www/pages/downloads/debian.html:234
 msgid ""
 "Please review and <b>adjust the bandwidth settings</b> on the\n"
 "<a href=\"http://127.0.0.1:7657/config.jsp\">configuration page</a>,\n"
-"as the default settings of 96 KB/s down / 40 KB/s up are fairly "
-"conservative."
-msgstr ""
-"Prosimy także o sprawdzenie i <b>dostosowanie ustawień przepustowości</b>"
-" na <a href=\"http://127.0.0.1:7657/config.jsp\">stronie "
-"konfiguracji</a>, ponieważ domyślne ustawienia 96 KB/s pobierania i 40 "
-"KB/s wysyłania są bardzo oszczędne."
+"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative."
+msgstr "Prosimy także o sprawdzenie i <b>dostosowanie ustawień przepustowości</b> na <a href=\"http://127.0.0.1:7657/config.jsp\">stronie konfiguracji</a>, ponieważ domyślne ustawienia 96 KB/s pobierania i 40 KB/s wysyłania są bardzo oszczędne."
 
 #: i2p2www/pages/downloads/debian.html:240
 #: i2p2www/pages/downloads/post-install.html:34
 #, python-format
 msgid ""
 "If you want to reach I2P Sites via your browser, have a look on the <a "
-"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy "
-"howto."
-msgstr ""
-"Jeżeli chcesz surfować po stronach .i2p, to zajrzyj na stronę <a "
-"href=\"%(browserconfig)s\">ustawień proxy przeglądarki</a> aby dowiedzieć"
-" siÄ™ co i jak."
+"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy howto."
+msgstr "Jeżeli chcesz surfować po stronach .i2p, to zajrzyj na stronę <a href=\"%(browserconfig)s\">ustawień proxy przeglądarki</a> aby dowiedzieć się co i jak."
 
 #: i2p2www/pages/downloads/docker.html:5
 msgid "Installing I2P in Docker"
@@ -890,9 +619,9 @@ msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:24
 msgid ""
-"<p>Note that this quick-start approach is not suitable for production "
-"use.  If you want to use I2P in production please read all the "
-"instructions on this page."
+"<p>Note that this quick-start approach is not suitable for production use.  "
+"If you want to use I2P in production please read all the instructions on "
+"this page."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:25
@@ -916,8 +645,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:30
 msgid ""
-"The container requires a volume for the configuration data to be mounted."
-" Optionally, you can mount a separate volume for torrent (“i2psnark”) "
+"The container requires a volume for the configuration data to be mounted. "
+"Optionally, you can mount a separate volume for torrent (“i2psnark”) "
 "downloads. See the example below."
 msgstr ""
 
@@ -938,8 +667,8 @@ msgstr "Porty"
 
 #: i2p2www/pages/downloads/docker.html:34
 msgid ""
-"There are several ports which are exposed by the image. You can choose "
-"which ones to publish depending on your specific needs."
+"There are several ports which are exposed by the image. You can choose which"
+" ones to publish depending on your specific needs."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:38
@@ -1013,11 +742,10 @@ msgstr ""
 #: i2p2www/pages/downloads/docker.html:96
 msgid ""
 "You probably want at least the Router Console (7657) and the HTTP Proxy "
-"(4444). If you want I2P to be able to receive incoming connections from "
-"the internet, and hence not think it’s firewalled, publish the I2NP "
-"Protocol port (12345) - but make sure you publish to a different random "
-"port, otherwise others may be able to guess you’re running I2P in a "
-"Docker image."
+"(4444). If you want I2P to be able to receive incoming connections from the "
+"internet, and hence not think it’s firewalled, publish the I2NP Protocol "
+"port (12345) - but make sure you publish to a different random port, "
+"otherwise others may be able to guess you’re running I2P in a Docker image."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:97
@@ -1027,9 +755,9 @@ msgstr "Przykład"
 #: i2p2www/pages/downloads/docker.html:98
 msgid ""
 "Here is an example container that mounts <code>i2phome</code> as home "
-"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, "
-"IRC, Router Console and I2NP Protocols. It also limits the memory "
-"available to the JVM to 256MB."
+"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, IRC,"
+" Router Console and I2NP Protocols. It also limits the memory available to "
+"the JVM to 256MB."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:6
@@ -1040,17 +768,12 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:7
 #, python-format
 msgid ""
-"This is an \"All-in-One\" installer for Windows 10 which includes the "
-"complete I2P\n"
-"desktop software and all of its dependencies in a single, easy-to-install"
-"\n"
-"package. It is built on the premise that I2P should be easy, and that we "
-"should\n"
-"help our users get their initial configuration in place instead of "
-"requiring an\n"
+"This is an \"All-in-One\" installer for Windows 10 which includes the complete I2P\n"
+"desktop software and all of its dependencies in a single, easy-to-install\n"
+"package. It is built on the premise that I2P should be easy, and that we should\n"
+"help our users get their initial configuration in place instead of requiring an\n"
 "elaborate install process. To learn more about the Firefox profile that\n"
-"comes bundled with this installer, visit <a href=\"%(firefox)s\">The "
-"Firefox\n"
+"comes bundled with this installer, visit <a href=\"%(firefox)s\">The Firefox\n"
 "Profile Page</a>."
 msgstr ""
 
@@ -1065,12 +788,9 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:19
 #, python-format
 msgid ""
-"This installer still requires Firefox to be installed on the system, it "
-"does not\n"
-"bundle a Firefox installer of its own. Please obtain Firefox from "
-"Mozilla, or\n"
-"Tor Browser from the Tor Project or one of their mirrors. If you would "
-"like to\n"
+"This installer still requires Firefox to be installed on the system, it does not\n"
+"bundle a Firefox installer of its own. Please obtain Firefox from Mozilla, or\n"
+"Tor Browser from the Tor Project or one of their mirrors. If you would like to\n"
 "discuss supporting other browsers, please join the discussionon the\n"
 "<a href=\"%(issueurl)s\">Gitlab Issue</a>. This is a Windows-only\n"
 "product."
@@ -1083,17 +803,12 @@ msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:28
 msgid ""
-"This installer package reduces the number of steps required to install an"
-" I2P\n"
-"router on Windows from about 30 to a matter of completing a single, "
-"familiar\n"
-"installer process, combining the I2P installation and Browser "
-"configuration into\n"
+"This installer package reduces the number of steps required to install an I2P\n"
+"router on Windows from about 30 to a matter of completing a single, familiar\n"
+"installer process, combining the I2P installation and Browser configuration into\n"
 "the same steps. Besides that, it launches the user directly into the\n"
-"automatically configured I2P browser with their applications ready-to-"
-"use, with\n"
-"no need to refer to potentially unhelpful system-wide Windows settings. "
-"The I2P\n"
+"automatically configured I2P browser with their applications ready-to-use, with\n"
+"no need to refer to potentially unhelpful system-wide Windows settings. The I2P\n"
 "it uses is otherwise identical to the \"regular\" I2P."
 msgstr ""
 
@@ -1107,32 +822,24 @@ msgstr "Jak siÄ™ z tego korzysta?"
 #, python-format
 msgid ""
 "First, download and install <a href=\"%(firefox)s\">Firefox</a>, then,\n"
-"just download and install <a href=\"%(postfilename)s\">this "
-"installer</a>. To\n"
+"just download and install <a href=\"%(postfilename)s\">this installer</a>. To\n"
 "start an installer, \"double-click\" the downloaded .exe file."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:43
 msgid ""
-"Running the installer will create a shortcut to start browsing I2P in "
-"your start\n"
-"menu and on your desktop. Clicking this shortcut will start I2P if "
-"necessary,\n"
-"then start an I2P Browser. On the first run, you will also be promted "
-"with the\n"
-"bandwidth wizard in your browser window. You will also see a \"Toopie\" "
-"icon in\n"
-"your taskbar to indicate that I2P is working when the browser window is "
-"closed."
+"Running the installer will create a shortcut to start browsing I2P in your start\n"
+"menu and on your desktop. Clicking this shortcut will start I2P if necessary,\n"
+"then start an I2P Browser. On the first run, you will also be promted with the\n"
+"bandwidth wizard in your browser window. You will also see a \"Toopie\" icon in\n"
+"your taskbar to indicate that I2P is working when the browser window is closed."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:50
 msgid ""
 "I2P Browsing uses a separate, I2P-Only Firefox\n"
-"profile, so it won't interfere with your regular Firefox use or require "
-"any\n"
-"special configuration. You don't even need to close existing Firefox "
-"windows."
+"profile, so it won't interfere with your regular Firefox use or require any\n"
+"special configuration. You don't even need to close existing Firefox windows."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:65
@@ -1156,9 +863,7 @@ msgstr ""
 msgid ""
 "The files are signed by %(signer)s,\n"
 "<a href=\"%(signingkey)s\">whose key is here</a>."
-msgstr ""
-"Pliki sÄ… podpisane przez programistÄ™ %(signer)s, <a "
-"href=\"%(signingkey)s\">którego klucz znajdziesz tutaj</a>."
+msgstr "Pliki są podpisane przez programistę %(signer)s, <a href=\"%(signingkey)s\">którego klucz znajdziesz tutaj</a>."
 
 #: i2p2www/pages/downloads/easyinstall.html:85
 #: i2p2www/pages/downloads/firefox.html:70
@@ -1174,10 +879,8 @@ msgstr ""
 #: i2p2www/pages/downloads/firefox.html:73
 msgid ""
 "The I2P router is \"jpackaged\" which means that it includes all\n"
-"the required Java components it needs to run successfully. It does not "
-"require\n"
-"a separate Java installation, because it bundles a Java 16 Runtime which "
-"is only\n"
+"the required Java components it needs to run successfully. It does not require\n"
+"a separate Java installation, because it bundles a Java 16 Runtime which is only\n"
 "used for I2P."
 msgstr ""
 
@@ -1189,16 +892,11 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:95
 #: i2p2www/pages/downloads/firefox.html:80
 msgid ""
-"The browser profile also includes both the NoScript and HTTPSEverywhere "
-"plugin for\n"
-"better protection Javascript based attacks and HTTPS support where "
-"available. It\n"
-"also keeps your I2P search activity separate from your visible internet "
-"search\n"
-"activity. The profile configures the I2P Proxy for all sites and browser "
-"features.\n"
-"I2P In Private Browsing is used to provide I2P-Specific browser "
-"integrations."
+"The browser profile also includes both the NoScript and HTTPSEverywhere plugin for\n"
+"better protection Javascript based attacks and HTTPS support where available. It\n"
+"also keeps your I2P search activity separate from your visible internet search\n"
+"activity. The profile configures the I2P Proxy for all sites and browser features.\n"
+"I2P In Private Browsing is used to provide I2P-Specific browser integrations."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:101
@@ -1209,19 +907,16 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:102
 #: i2p2www/pages/downloads/firefox.html:87
 msgid ""
-"If you would like to examine the source code for individual components, "
-"you may\n"
-"find it on i2pgit.org or github.com. The license for each respective "
-"component\n"
-"can be found in the license directory of the <code>i2p.firefox</code> "
-"project."
+"If you would like to examine the source code for individual components, you may\n"
+"find it on i2pgit.org or github.com. The license for each respective component\n"
+"can be found in the license directory of the <code>i2p.firefox</code> project."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:107
 #: i2p2www/pages/downloads/easyinstall.html:115
 #: i2p2www/pages/downloads/firefox.html:92
-#: i2p2www/pages/downloads/firefox.html:100 i2p2www/pages/downloads/mac.html:79
-#: i2p2www/pages/downloads/mac.html:86
+#: i2p2www/pages/downloads/firefox.html:100
+#: i2p2www/pages/downloads/mac.html:79 i2p2www/pages/downloads/mac.html:86
 msgid "Gitlab Repository"
 msgstr ""
 
@@ -1233,11 +928,9 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:109
 #: i2p2www/pages/downloads/firefox.html:94
 msgid ""
-"If you wish to file an issue about the Firefox profile, please use Gitlab"
-" to\n"
+"If you wish to file an issue about the Firefox profile, please use Gitlab to\n"
 "contact us. For security-sensitive issues, please remember to check the\n"
-"\"This issue is confidential and should only be visible to team members "
-"with at least Reporter access\"\n"
+"\"This issue is confidential and should only be visible to team members with at least Reporter access\"\n"
 "option when filing the issue."
 msgstr ""
 
@@ -1249,50 +942,34 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:117
 #: i2p2www/pages/downloads/firefox.html:102
 msgid ""
-"This is not a fork of Firefox. Instead, it is a browser profile with pre-"
-"configured\n"
-"settings, combined with an I2P router and some launcher scripts. That "
-"means that\n"
-"it requires Firefox(Or Tor Browser) to be installed before you can use "
-"it. This\n"
-"is for security reasons, it is important that you are able to recieve "
-"reliable\n"
+"This is not a fork of Firefox. Instead, it is a browser profile with pre-configured\n"
+"settings, combined with an I2P router and some launcher scripts. That means that\n"
+"it requires Firefox(Or Tor Browser) to be installed before you can use it. This\n"
+"is for security reasons, it is important that you are able to recieve reliable\n"
 "updates from a trustworthy vendor."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:124
 #: i2p2www/pages/downloads/firefox.html:109
 msgid ""
-"I2P routers are designed to have long uptimes, and so unlike Tor Browser,"
-" the\n"
-"lifetime of your I2P Router is not tied to the lifetime of your I2P "
-"browsing\n"
-"session. The browser profile will manage your history, your browser's "
-"local\n"
-"storage and cache, and your browsing context but it will never stop your "
-"I2P\n"
-"router on its own. You may stop the router using the web interface on the"
-"\n"
+"I2P routers are designed to have long uptimes, and so unlike Tor Browser, the\n"
+"lifetime of your I2P Router is not tied to the lifetime of your I2P browsing\n"
+"session. The browser profile will manage your history, your browser's local\n"
+"storage and cache, and your browsing context but it will never stop your I2P\n"
+"router on its own. You may stop the router using the web interface on the\n"
 "router console homepage."
 msgstr ""
 
 #: i2p2www/pages/downloads/firefox.html:7
 #, python-format
 msgid ""
-"The I2P Firefox Browser Profile has been expanded into the new I2P Easy "
-"Install\n"
-"Bundle, which is in Beta. If you already have an I2P Router installed, it"
-" is\n"
-"still safe to use this installer to configure your I2P Browser. Your "
-"existing\n"
-"I2P Settings will be left untouched. If you do not have an I2P router "
-"installed,\n"
-"then you do not need to install I2P. This package will install I2P at the"
-" same\n"
-"time it installs the browser profile. This page has been kept to document"
-" the\n"
-"motivations and design of the included Firefox profile. To learn more "
-"about the\n"
+"The I2P Firefox Browser Profile has been expanded into the new I2P Easy Install\n"
+"Bundle, which is in Beta. If you already have an I2P Router installed, it is\n"
+"still safe to use this installer to configure your I2P Browser. Your existing\n"
+"I2P Settings will be left untouched. If you do not have an I2P router installed,\n"
+"then you do not need to install I2P. This package will install I2P at the same\n"
+"time it installs the browser profile. This page has been kept to document the\n"
+"motivations and design of the included Firefox profile. To learn more about the\n"
 "new bundle, visit <a href=\"%(nsis)s\">The Easy Install Bundle Page</a>."
 msgstr ""
 
@@ -1302,30 +979,20 @@ msgstr "Profil I2P do przeglÄ…darki Firefox"
 
 #: i2p2www/pages/downloads/firefox.html:18
 msgid ""
-"Now that you have joined the I2P network, you will want to see I2P Sites "
-"and and \n"
-"other content that is hosted on the network. The Firefox browser profile "
-"is \n"
-"pre-configured to allow you to access the content available on the "
-"network."
+"Now that you have joined the I2P network, you will want to see I2P Sites and and \n"
+"other content that is hosted on the network. The Firefox browser profile is \n"
+"pre-configured to allow you to access the content available on the network."
 msgstr ""
 
 #: i2p2www/pages/downloads/firefox.html:24
 msgid ""
-"Browsers are highly complex and powerful engines for executing code and "
-"displaying\n"
-"information obtained mainly from strangers on the internet. By default, "
-"they\n"
-"tend to leak a great deal of information about the person using them to "
-"the servers\n"
-"they retrieve information from. Using this browser profile allows you to "
-"become\n"
-"part of a \"common\" set of very similar browser users, instead of "
-"appearing unique\n"
-"or revealing details of your hardware or software. Because this involves "
-"disabling \n"
-"some browser features, this also reduces the attack surface available to "
-"outsiders. \n"
+"Browsers are highly complex and powerful engines for executing code and displaying\n"
+"information obtained mainly from strangers on the internet. By default, they\n"
+"tend to leak a great deal of information about the person using them to the servers\n"
+"they retrieve information from. Using this browser profile allows you to become\n"
+"part of a \"common\" set of very similar browser users, instead of appearing unique\n"
+"or revealing details of your hardware or software. Because this involves disabling \n"
+"some browser features, this also reduces the attack surface available to outsiders. \n"
 "This keeps you safer while browsing the Invisible Web."
 msgstr ""
 
@@ -1358,12 +1025,8 @@ msgstr "Laboratorium"
 #, python-format
 msgid ""
 "\n"
-"If you would like to try the latest experimental I2P projects, visit the "
-"<a href = \"%(lab)s\">I2P Lab</a>\n"
-msgstr ""
-"\n"
-"Jeżeli chciał(a)byś wypróbować eksperymentalne projekty związane z I2P, "
-"zapraszamy do <a href = \"%(lab)s\">laboratorium I2P</a>\n"
+"If you would like to try the latest experimental I2P projects, visit the <a href = \"%(lab)s\">I2P Lab</a>\n"
+msgstr "\nJeżeli chciał(a)byś wypróbować eksperymentalne projekty związane z I2P, zapraszamy do <a href = \"%(lab)s\">laboratorium I2P</a>\n"
 
 #: i2p2www/pages/downloads/list.html:26
 msgid "Getting Started"
@@ -1377,9 +1040,7 @@ msgstr "Podstawowe kroki"
 msgid ""
 "For most platforms and systems, setting I2P installed and running will\n"
 "consist of up to three steps."
-msgstr ""
-"Na większości platform i systemów instalacja i konfiguracja I2P składa "
-"się z maksymalnie trzech kroków."
+msgstr "Na większości platform i systemów instalacja i konfiguracja I2P składa się z maksymalnie trzech kroków."
 
 #: i2p2www/pages/downloads/list.html:31
 msgid "Install Java: "
@@ -1389,8 +1050,7 @@ msgstr "Instalacja Javy: "
 #, python-format
 msgid ""
 " I2P is written in Java and requires\n"
-"a Java system to be installed to run. In addition to the I2P download, "
-"you need to install Java if you do not have it \n"
+"a Java system to be installed to run. In addition to the I2P download, you need to install Java if you do not have it \n"
 "already installed. I2P requires Java Runtime Version 7 or higher.\n"
 "(<a href=\"%(java)s\">Oracle</a>,\n"
 "<a href=\"%(openjdk)s\">OpenJDK</a>, or\n"
@@ -1401,21 +1061,8 @@ msgid ""
 "<br />\n"
 "<a href=\"%(detectjre)s\">Determine your installed Java version here</a>\n"
 "or type <tt>java -version</tt> at your command prompt.\n"
-"Only two platforms do not require Java to be installed before I2P is "
-"installed, those platforms are:"
-msgstr ""
-"I2P jest napisane w Javie i wymaga instalacji środowiska uruchomieniowego"
-" Java. Oprócz pobrania I2P, konieczna jest instalacja Javy, jeżeli "
-"jeszcze jej nie posiadasz. I2P wymaga środowiska Java Runtime w wersji 7 "
-"lub nowszej (zalecane <a href=\"%(java)s\">Oracle</a>, <a "
-"href=\"%(openjdk)s\">OpenJDK</a>, lub <a href=\"%(icedtea)s\">IcedTea</a>"
-" Java w wersji 7 lub 8, z wyjÄ…tkiem Raspberry Pi: <a "
-"href=\"%(arm8)s\">OpenJDK 9 dla ARM</a>, PowerPC: <a "
-"href=\"%(ibmsdk7)s\">IBM Java SE 7 lub 8</a>)\n"
-"<br />\n"
-"<a href=\"%(detectjre)s\">Sprawdź swoją wersję Javy tutaj</a> lub wpisz w"
-" konsolę: <tt>java -version</tt>. Tylko następujące dwie platformy nie "
-"wymagajÄ… instalacji Javy przed instalacjÄ… I2P:"
+"Only two platforms do not require Java to be installed before I2P is installed, those platforms are:"
+msgstr "I2P jest napisane w Javie i wymaga instalacji środowiska uruchomieniowego Java. Oprócz pobrania I2P, konieczna jest instalacja Javy, jeżeli jeszcze jej nie posiadasz. I2P wymaga środowiska Java Runtime w wersji 7 lub nowszej (zalecane <a href=\"%(java)s\">Oracle</a>, <a href=\"%(openjdk)s\">OpenJDK</a>, lub <a href=\"%(icedtea)s\">IcedTea</a> Java w wersji 7 lub 8, z wyjątkiem Raspberry Pi: <a href=\"%(arm8)s\">OpenJDK 9 dla ARM</a>, PowerPC: <a href=\"%(ibmsdk7)s\">IBM Java SE 7 lub 8</a>)\n<br />\n<a href=\"%(detectjre)s\">Sprawdź swoją wersję Javy tutaj</a> lub wpisz w konsolę: <tt>java -version</tt>. Tylko następujące dwie platformy nie wymagają instalacji Javy przed instalacją I2P:"
 
 #: i2p2www/pages/downloads/list.html:50
 msgid "Android: "
@@ -1424,13 +1071,9 @@ msgstr "Android: "
 #: i2p2www/pages/downloads/list.html:50
 msgid ""
 "Android comes with a Java virtual machine\n"
-"as part of the platform, which I2P for Android uses. Therefore it is not "
-"necessary to install Java to use\n"
+"as part of the platform, which I2P for Android uses. Therefore it is not necessary to install Java to use\n"
 "I2P for Android."
-msgstr ""
-"System Android dostarczany jest z wirtualną maszyną Javy, z której "
-"korzysta I2P. Nie jest więc konieczna instalacja Javy do korzystania z "
-"sieci I2P."
+msgstr "System Android dostarczany jest z wirtualną maszyną Javy, z której korzysta I2P. Nie jest więc konieczna instalacja Javy do korzystania z sieci I2P."
 
 #: i2p2www/pages/downloads/list.html:53
 msgid "Debian and Ubuntu: "
@@ -1439,11 +1082,8 @@ msgstr "Debian i Ubuntu: "
 #: i2p2www/pages/downloads/list.html:53
 msgid ""
 "On Debian and Ubuntu when using\n"
-"a .deb package to install, the system will automatically install and "
-"configure a Java environment for you."
-msgstr ""
-"Instalacja I2P na dystrybucjach Debian i Ubuntu za pomocą paczki .deb "
-"wymusi automatyczną instalację i konfigurację środowiska Java."
+"a .deb package to install, the system will automatically install and configure a Java environment for you."
+msgstr "Instalacja I2P na dystrybucjach Debian i Ubuntu za pomocą paczki .deb wymusi automatyczną instalację i konfigurację środowiska Java."
 
 #: i2p2www/pages/downloads/list.html:56
 msgid "Install I2P: "
@@ -1453,9 +1093,7 @@ msgstr "Instalacja I2P: "
 msgid ""
 "Once you have Java installed, you should\n"
 "run the I2P installer for your platform. This step applies to all systems."
-msgstr ""
-"Po instalacji Javy, uruchom instalkÄ™ I2P przeznaczonÄ… dla Twojej "
-"platformy."
+msgstr "Po instalacji Javy, uruchom instalkÄ™ I2P przeznaczonÄ… dla Twojej platformy."
 
 #: i2p2www/pages/downloads/list.html:58
 msgid "Install/Configure a Browser(Optional): "
@@ -1464,14 +1102,9 @@ msgstr "Instalacja/konfiguracja przeglÄ…darki (opcjonalne): "
 #: i2p2www/pages/downloads/list.html:58
 msgid ""
 "Finally, you'll need to\n"
-"configure applications to use I2P. Many applications can use I2P, but the"
-" first application most people configure is a Web\n"
+"configure applications to use I2P. Many applications can use I2P, but the first application most people configure is a Web\n"
 "Browser for browsing I2P sites. Detailed instructions are available on the"
-msgstr ""
-"Na koniec musisz skonfigurować aplikacje do działania z siecią I2P. Wiele"
-" aplikacji można skonfigurować do działania z I2P, jednak zazwyczaj "
-"pierwszą z nich będzie przeglądarka internetowa. Szczegółowe instrukcje "
-"znajdujÄ… siÄ™ na stronie"
+msgstr "Na koniec musisz skonfigurować aplikacje do działania z siecią I2P. Wiele aplikacji można skonfigurować do działania z I2P, jednak zazwyczaj pierwszą z nich będzie przeglądarka internetowa. Szczegółowe instrukcje znajdują się na stronie"
 
 #: i2p2www/pages/downloads/list.html:61
 msgid "Browser Page"
@@ -1516,10 +1149,8 @@ msgstr ""
 #: i2p2www/pages/downloads/list.html:106
 msgid ""
 "It's now possible to install all I2P components using\n"
-"      a single package(<strong>No Java Required</strong>). To try out the"
-" new installer, click here.\n"
-"      This bundle can also be used to configure a Firefox Profile. It "
-"will not\n"
+"      a single package(<strong>No Java Required</strong>). To try out the new installer, click here.\n"
+"      This bundle can also be used to configure a Firefox Profile. It will not\n"
 "      interfere with an existing I2P installation if one exists.\n"
 "      "
 msgstr ""
@@ -1534,8 +1165,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/list.html:116
 msgid ""
-"Here is a helpful guide to installing I2P for Windows using a separate "
-"Java installation and the classic installer."
+"Here is a helpful guide to installing I2P for Windows using a separate Java "
+"installation and the classic installer."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:120
@@ -1545,24 +1176,13 @@ msgstr "I2P dla systemu macOS"
 #: i2p2www/pages/downloads/list.html:122 i2p2www/pages/downloads/list.html:150
 #, python-format
 msgid ""
-"The most reliable way to launch the installer is from a terminal like "
-"this:\n"
-"    <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will "
-"launch the GUI installer.\n"
-"    Depending on how your computer is set up, you may be able to start "
-"the\n"
-"    installer by double-clicking the "
-"&quot;i2pinstall_%(i2pversion)s.jar&quot; file or\n"
+"The most reliable way to launch the installer is from a terminal like this:\n"
+"    <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will launch the GUI installer.\n"
+"    Depending on how your computer is set up, you may be able to start the\n"
+"    installer by double-clicking the &quot;i2pinstall_%(i2pversion)s.jar&quot; file or\n"
 "    right-clicking the file and selecting &quot;Open with Java&quot;.\n"
 "    Unfortunately, this behaviour is difficult to predict."
-msgstr ""
-"Najbardziej pewnÄ… metodÄ… uruchomienia instalatora jest wpisanie w "
-"terminalu: <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. Uruchomi"
-" to graficzny instalator. Zależnie od konfiguracji Twojego komputera, "
-"będziesz musiał(a) dwukrotnie kliknąć plik "
-"„i2pinstall_%(i2pversion)s.jar” bądź kliknąć plik prawym i wybierz "
-"„Uruchom za pomocą Java”. Niestety to zachowanie jest trudne do "
-"przewidzenia."
+msgstr "Najbardziej pewną metodą uruchomienia instalatora jest wpisanie w terminalu: <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. Uruchomi to graficzny instalator. Zależnie od konfiguracji Twojego komputera, będziesz musiał(a) dwukrotnie kliknąć plik „i2pinstall_%(i2pversion)s.jar” bądź kliknąć plik prawym i wybierz „Uruchom za pomocą Java”. Niestety to zachowanie jest trudne do przewidzenia."
 
 #: i2p2www/pages/downloads/list.html:131 i2p2www/pages/downloads/list.html:159
 msgid "Command line (headless) install:"
@@ -1571,20 +1191,12 @@ msgstr "Instalacja z linii komend:"
 #: i2p2www/pages/downloads/list.html:132 i2p2www/pages/downloads/list.html:160
 #, python-format
 msgid ""
-"I2P can also be installed in a terminal environment, which may be "
-"especially\n"
-"    useful for servers, containers, or certain virtual machines. If you "
-"wish to\n"
+"I2P can also be installed in a terminal environment, which may be especially\n"
+"    useful for servers, containers, or certain virtual machines. If you wish to\n"
 "    use the installer without a GUI, you can use the command \n"
-"    <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to "
-"follow\n"
+"    <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to follow\n"
 "    the install procedure in your terminal."
-msgstr ""
-"Węzeł I2P może zostać zainstalowany z poziomu terminala, co jest "
-"użyteczne przy serwerach i maszynach wirtualnych. Jeżeli chcesz uruchomić"
-" instalator w trybie terminala, użyj polecenia <code>java -jar "
-"i2pinstall_%(i2pversion)s.jar -console</code> i postępuj zgodnie z "
-"wyświetlanymi instrukcjami."
+msgstr "Węzeł I2P może zostać zainstalowany z poziomu terminala, co jest użyteczne przy serwerach i maszynach wirtualnych. Jeżeli chcesz uruchomić instalator w trybie terminala, użyj polecenia <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> i postępuj zgodnie z wyświetlanymi instrukcjami."
 
 #: i2p2www/pages/downloads/list.html:140
 msgid "DMG Bundle (Beta)"
@@ -1608,20 +1220,11 @@ msgstr "Paczki dla Debiana i Ubuntu są dostępne."
 
 #: i2p2www/pages/downloads/list.html:174
 msgid ""
-"I2P is available in the official repositories for Ubuntu Bionic and "
-"later, and Debian Buster and Sid.\n"
-"    However, Debian Buster and Ubuntu Bionic (LTS) distributions will "
-"have older I2P versions.\n"
+"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n"
+"    However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n"
 "    If you are not running Debian Sid or the latest Ubuntu release,\n"
-"    use our Debian repo or Launchpad PPA to ensure you're running the "
-"latest I2P version."
-msgstr ""
-"I2P jest dostępne w oficjalnych repozytoriach Ubuntu Bionic (18.04) lub "
-"późniejszych, w Debianie Buster i sid. Jednakże wersje w dystrybucjach "
-"Debian Buster i Ubuntu Bionic (LTS) mogą być przestarzałe. Jeżeli "
-"korzystasz z dystrybucji Debian sid lub najnowszego wydania Ubuntu, dodaj"
-" nasze repozytorium Debiana lub Launchpad PPA, aby otrzymać najnowszą "
-"wersjÄ™."
+"    use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version."
+msgstr "I2P jest dostępne w oficjalnych repozytoriach Ubuntu Bionic (18.04) lub późniejszych, w Debianie Buster i sid. Jednakże wersje w dystrybucjach Debian Buster i Ubuntu Bionic (LTS) mogą być przestarzałe. Jeżeli korzystasz z dystrybucji Debian sid lub najnowszego wydania Ubuntu, dodaj nasze repozytorium Debiana lub Launchpad PPA, aby otrzymać najnowszą wersję."
 
 #: i2p2www/pages/downloads/list.html:182
 msgid "I2P for Android"
@@ -1629,15 +1232,9 @@ msgstr "I2P dla systemu Android"
 
 #: i2p2www/pages/downloads/list.html:185
 msgid ""
-"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier "
-"installed\n"
-"      I2P, unfortunately this release fixes some IPC issues which will "
-"force you to uninstall your current installation before installing this."
-msgstr ""
-"Wymaga Androida 4.0 (Ice Cream Sandwich) lub nowszego. Jeśli wcześniej "
-"zainstalowałeś/aś I2P, niestety ta wersja rozwiązuje niektóre problemy z "
-"IPC, które zmuszają Cię do odinstalowania obecnej instalacji przed jej "
-"zainstalowaniem."
+"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier installed\n"
+"      I2P, unfortunately this release fixes some IPC issues which will force you to uninstall your current installation before installing this."
+msgstr "Wymaga Androida 4.0 (Ice Cream Sandwich) lub nowszego. Jeśli wcześniej zainstalowałeś/aś I2P, niestety ta wersja rozwiązuje niektóre problemy z IPC, które zmuszają Cię do odinstalowania obecnej instalacji przed jej zainstalowaniem."
 
 #: i2p2www/pages/downloads/list.html:189
 msgid "512 MB RAM minimum; 1 GB recommended."
@@ -1645,14 +1242,9 @@ msgstr "Minimalnie 512 MB RAM; zalecane 1 GB."
 
 #: i2p2www/pages/downloads/list.html:192
 msgid ""
-"The releases are not compatible with eachother, as they have different "
-"signatures. Uninstall them\n"
-"      completely before installing any other version. The apk's from "
-"download.i2p2.de are signed by idk."
-msgstr ""
-"Wersje te nie są ze sobą kompatybilne, są podpisane różnymi kluczami. "
-"Musisz odinstalować jedną aplikację, przed instalacją innej wersji. Pliki"
-" .apk z serwera download.i2p2.de sÄ… podpisane przez programistÄ™ idk."
+"The releases are not compatible with eachother, as they have different signatures. Uninstall them\n"
+"      completely before installing any other version. The apk's from download.i2p2.de are signed by idk."
+msgstr "Wersje te nie są ze sobą kompatybilne, są podpisane różnymi kluczami. Musisz odinstalować jedną aplikację, przed instalacją innej wersji. Pliki .apk z serwera download.i2p2.de są podpisane przez programistę idk."
 
 #: i2p2www/pages/downloads/list.html:199
 msgid "I2P for Docker"
@@ -1662,48 +1254,34 @@ msgstr "I2P dla Dockera"
 msgid ""
 "I2P is now available as a Docker package from the Docker Hub.\n"
 "    You may retrieve the image by running the 'docker pull' command."
-msgstr ""
-"I2P jest teraz dostępne jako paczka Dockera z Docker Hub. Możesz pobrać "
-"obraz instalacyjny poleceniem <code>docker pull</code>:"
+msgstr "I2P jest teraz dostępne jako paczka Dockera z Docker Hub. Możesz pobrać obraz instalacyjny poleceniem <code>docker pull</code>:"
 
 #: i2p2www/pages/downloads/list.html:213
 msgid "docker pull geti2p/i2p"
 msgstr "docker pull geti2p/i2p"
 
 #: i2p2www/pages/downloads/list.html:219
-msgid "Additional instructions for configuring your container can be found here."
+msgid ""
+"Additional instructions for configuring your container can be found here."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:224
 #, python-format
 msgid ""
-"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s"
-"#getting-the-i2p-code\">monotone</a>\n"
-"    or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a "
-"href=\"%(github)s\">Github</a>.\n"
+"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a>\n"
+"    or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a href=\"%(github)s\">Github</a>.\n"
 "    <br />\n"
-"    Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd "
-"i2p-%(i2pversion)s ; ant pkg)</code> then either\n"
+"    Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> then either\n"
 "    run the GUI installer or headless install as above."
-msgstr ""
-"Możesz też pobrać kod źródłowy z <a href=\"%(monotoneurl)s#getting-the-"
-"i2p-code\">monotone</a> lub przez Gita z <a "
-"href=\"%(gitrepo)s\">git.repo.i2p</a> lub <a "
-"href=\"%(github)s\">GitHuba</a>.\n"
-"<br />\n"
-"Wywołaj <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd "
-"i2p-%(i2pversion)s ; ant pkg)</code> lub uruchom graficzny instalator lub"
-" konsolowy jak wyżej."
+msgstr "Możesz też pobrać kod źródłowy z <a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a> lub przez Gita z <a href=\"%(gitrepo)s\">git.repo.i2p</a> lub <a href=\"%(github)s\">GitHuba</a>.\n<br />\nWywołaj <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> lub uruchom graficzny instalator lub konsolowy jak wyżej."
 
 #: i2p2www/pages/downloads/list.html:234
 #, python-format
 msgid ""
-"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-"
-"code\">git</a>\n"
+"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-code\">git</a>\n"
 "    and on <a href=\"%(github)s\">Github</a>.\n"
 "    Android builds require the I2P source.\n"
-"    See the documentation in the Android source for additional build "
-"requirements and instructions."
+"    See the documentation in the Android source for additional build requirements and instructions."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:251
@@ -1711,21 +1289,14 @@ msgstr ""
 msgid ""
 "The Windows installer is signed by %(signer)s,\n"
 "<a href=\"%(signingkey)s\">whose key is here</a>."
-msgstr ""
-"Instalator na systemy Windows został podpisany przez programistę "
-"%(signer)s, <a href=\"%(signingkey)s\">którego klucz znajduje się "
-"tutaj</a>."
+msgstr "Instalator na systemy Windows został podpisany przez programistę %(signer)s, <a href=\"%(signingkey)s\">którego klucz znajduje się tutaj</a>."
 
 #: i2p2www/pages/downloads/list.html:257
 #, python-format
 msgid ""
-"The Mac OS X native installer is signed by %(signer)s with his Apple "
-"Developer ID certificate,\n"
+"The Mac OS X native installer is signed by %(signer)s with his Apple Developer ID certificate,\n"
 "<a href=\"%(signingkey)s\">whose key is here</a>."
-msgstr ""
-"Natywny instalator dla systemu macOS został podpisany przez %(signer)s "
-"certyfikatem Apple Developer ID, <a href=\"%(signingkey)s\">którego klucz"
-" znajduje siÄ™ tutaj</a>."
+msgstr "Natywny instalator dla systemu macOS został podpisany przez %(signer)s certyfikatem Apple Developer ID, <a href=\"%(signingkey)s\">którego klucz znajduje się tutaj</a>."
 
 #: i2p2www/pages/downloads/list.html:263
 msgid "Updates from earlier releases:"
@@ -1738,41 +1309,25 @@ msgstr "Zarówno automatyczna i ręczna aktualizacja jest dostępna dla tej wers
 #: i2p2www/pages/downloads/list.html:270
 msgid ""
 "If you are running 0.7.5 or later, your router should detect the\n"
-"new release. To upgrade simply click the 'Download Update' button on your"
-" router console\n"
+"new release. To upgrade simply click the 'Download Update' button on your router console\n"
 "when it appears."
-msgstr ""
-"Jeśli masz uruchomioną wersję 0.7.5 lub późniejszą, Twój węzeł powinien "
-"wykryć dostępność nowych wersji. Aby aktualizować kliknij przycisk "
-"„pobierz aktualizację” w konsoli węzła, gdy się pojawi."
+msgstr "Jeśli masz uruchomioną wersję 0.7.5 lub późniejszą, Twój węzeł powinien wykryć dostępność nowych wersji. Aby aktualizować kliknij przycisk „pobierz aktualizację” w konsoli węzła, gdy się pojawi."
 
 #: i2p2www/pages/downloads/list.html:276
 msgid ""
-"Since 0.9.23, some releases are signed by str4d, whose signing key has "
-"been in the router\n"
-"since 0.9.9. Routers older than 0.9.9 will fail to verify update files "
-"signed by str4d,\n"
+"Since 0.9.23, some releases are signed by str4d, whose signing key has been in the router\n"
+"since 0.9.9. Routers older than 0.9.9 will fail to verify update files signed by str4d,\n"
 "and will need to be manually updated using the process below."
-msgstr ""
-"Od wersji 0.9.23 niektóre wydania są podpisane przez dewelopera str4d, "
-"którego klucz podpisujący dostarczany jest z oprogramowaniem od wersji "
-"0.9.9. Węzły starsze niż 0.9.9 nie zaktualizują się z powodu błędu "
-"podczas weryfikacji plików podpisanych przez str4d, wymagana będzie "
-"ręczna aktualizacja opisana poniżej."
+msgstr "Od wersji 0.9.23 niektóre wydania są podpisane przez dewelopera str4d, którego klucz podpisujący dostarczany jest z oprogramowaniem od wersji 0.9.9. Węzły starsze niż 0.9.9 nie zaktualizują się z powodu błędu podczas weryfikacji plików podpisanych przez str4d, wymagana będzie ręczna aktualizacja opisana poniżej."
 
 #: i2p2www/pages/downloads/list.html:287
 msgid ""
 "Download the file to your I2P\n"
 "    installation directory and <b>rename as i2pupdate.zip</b>.\n"
-"    (alternately, you can get the source as above and run \"ant "
-"updater\", then copy the\n"
+"    (alternately, you can get the source as above and run \"ant updater\", then copy the\n"
 "    resulting i2pupdate.zip to your I2P installation directory).  You do\n"
 "    NOT need to unzip the file."
-msgstr ""
-"Pobierz plik do Twojego folderu instalacyjnego I2P i <b>zmień nazwę na "
-"i2pupdate.zip</b>, (można również pobrać powyższe źródło i wywołać „ant "
-"updater”, a następnie skopiować i2pupdate.zip do katalogu instalacyjnego "
-"I2P). NIE musisz wypakowywać tego pliku."
+msgstr "Pobierz plik do Twojego folderu instalacyjnego I2P i <b>zmień nazwę na i2pupdate.zip</b>, (można również pobrać powyższe źródło i wywołać „ant updater”, a następnie skopiować i2pupdate.zip do katalogu instalacyjnego I2P). NIE musisz wypakowywać tego pliku."
 
 #: i2p2www/pages/downloads/list.html:296
 msgid "Click <a href=\"http://localhost:7657/configservice.jsp\">\"Restart\"</a>"
@@ -1787,9 +1342,7 @@ msgstr "Teraz idź zaparzyć sobie kawusię i wróć za 11 minut"
 msgid ""
 "The file is signed by %(signer)s,\n"
 "<a href=\"%(signingkey)s\">whose key is here</a>."
-msgstr ""
-"Ten plik jest podpisany przez programistÄ™ %(signer)s, <a "
-"href=\"%(signingkey)s\">którego klucz znajduje się tutaj</a>."
+msgstr "Ten plik jest podpisany przez programistę %(signer)s, <a href=\"%(signingkey)s\">którego klucz znajduje się tutaj</a>."
 
 #: i2p2www/pages/downloads/list.html:314
 msgid "Previous Releases"
@@ -1798,25 +1351,15 @@ msgstr "Poprzednie wydania"
 #: i2p2www/pages/downloads/list.html:316
 #, python-format
 msgid ""
-"Previous releases are available on <a "
-"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google "
-"Code</a>\n"
+"Previous releases are available on <a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code</a>\n"
 "and <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\n"
-"and within the I2P network on <a "
-"href=\"http://%(echelon)s/\">%(echelon)s</a>."
-msgstr ""
-"Poprzednie wersje są dostępne na <a "
-"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google "
-"Code</a> i <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a> \n"
-"oraz wewnÄ…trz sieci I2P na <a "
-"href=\"http://%(echelon)s/\">%(echelon)s</a>."
+"and within the I2P network on <a href=\"http://%(echelon)s/\">%(echelon)s</a>."
+msgstr "Poprzednie wersje są dostępne na <a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code</a> i <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a> \noraz wewnątrz sieci I2P na <a href=\"http://%(echelon)s/\">%(echelon)s</a>."
 
 #: i2p2www/pages/downloads/mac.html:7
 msgid ""
-"We are excited to offer you a DMG bundle for Mac OS.  It installs and "
-"behaves\n"
-"the same way many other Mac OS applications do and does not require a "
-"Java\n"
+"We are excited to offer you a DMG bundle for Mac OS.  It installs and behaves\n"
+"the same way many other Mac OS applications do and does not require a Java\n"
 "Runtime Environment to be available."
 msgstr ""
 
@@ -1824,61 +1367,44 @@ msgstr ""
 #, python-format
 msgid ""
 "This bundle is built for <code>x86_64(Intel)</code> Macs. It will run on\n"
-"<code>ARM(M1)</code> Macs in emulated mode, but the performance is "
-"unknown. M1 Mac\n"
-"users should report results to us at the <a href=\"%(perf)s\">Gitlab "
-"Repository</a>."
+"<code>ARM(M1)</code> Macs in emulated mode, but the performance is unknown. M1 Mac\n"
+"users should report results to us at the <a href=\"%(perf)s\">Gitlab Repository</a>."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:18
 msgid ""
-"Double-Click on the .dmg file, which you may download from this page. "
-"When a\n"
-"window appears with the I2P application inside it, \"drag\" the "
-"application to the\n"
-"\"Applications\" side of the window to install it. Once you're finished, "
-"I2P is\n"
-"installed and can be launched from Finder. This procedure is the same as "
-"any\n"
-"other Mac application. When you launch I2P, the I2P icon will appear on "
-"the Dock\n"
-"and a few seconds later a browser will open with the I2P console page, "
-"inviting\n"
+"Double-Click on the .dmg file, which you may download from this page. When a\n"
+"window appears with the I2P application inside it, \"drag\" the application to the\n"
+"\"Applications\" side of the window to install it. Once you're finished, I2P is\n"
+"installed and can be launched from Finder. This procedure is the same as any\n"
+"other Mac application. When you launch I2P, the I2P icon will appear on the Dock\n"
+"and a few seconds later a browser will open with the I2P console page, inviting\n"
 "you to complete the bandwidth setup wizard."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:27
 #, python-format
 msgid ""
-"If you want to browse hidden websites ('eepsites') on the I2P network, "
-"you need\n"
-"to configure your browser. Instructions for configuring a range of "
-"browsers are\n"
+"If you want to browse hidden websites ('eepsites') on the I2P network, you need\n"
+"to configure your browser. Instructions for configuring a range of browsers are\n"
 "available on <a href=\"%(browser)s\">the browser configuration\n"
 "page</a>."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:34
 msgid ""
-"Two important reasons, 1) because this package is a .dmg, it can be "
-"signed with\n"
-"a certificate which will be recognized by your computer. This means that "
-"your\n"
-"computer can automatically make sure that you've obtained I2P from the "
-"I2P\n"
-"Project, rather than a potentially altered or \"fake\" installer, and 2) "
-"because\n"
-"it makes I2P easier to install and work with on Apple computers by using "
-"tools\n"
+"Two important reasons, 1) because this package is a .dmg, it can be signed with\n"
+"a certificate which will be recognized by your computer. This means that your\n"
+"computer can automatically make sure that you've obtained I2P from the I2P\n"
+"Project, rather than a potentially altered or \"fake\" installer, and 2) because\n"
+"it makes I2P easier to install and work with on Apple computers by using tools\n"
 "that are familiar and built-into the operating system."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:61
 msgid ""
-"Download that file and double-click on it.  Accept the License Agreement,"
-" then\n"
-"drag the <code>I2P</code> icon on top of the <code>Applications</code> "
-"icon.\n"
+"Download that file and double-click on it.  Accept the License Agreement, then\n"
+"drag the <code>I2P</code> icon on top of the <code>Applications</code> icon.\n"
 "Launch I2P from Finder."
 msgstr ""
 
@@ -1888,18 +1414,14 @@ msgstr "Ograniczenia"
 
 #: i2p2www/pages/downloads/mac.html:69
 msgid ""
-"I2P will not install any launch agents on your Mac.  If you want I2P to "
-"start on\n"
-"system startup, you need to configure a launch agent yourself. You can "
-"configure\n"
-"I2P to launch when your user logs in by right-clicking on the I2P Dock "
-"icon."
+"I2P will not install any launch agents on your Mac.  If you want I2P to start on\n"
+"system startup, you need to configure a launch agent yourself. You can configure\n"
+"I2P to launch when your user logs in by right-clicking on the I2P Dock icon."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:75
 msgid ""
-"If you would like to examine the source code for individual components, "
-"you may\n"
+"If you would like to examine the source code for individual components, you may\n"
 "find it on i2pgit.org."
 msgstr ""
 
@@ -1907,76 +1429,45 @@ msgstr ""
 msgid ""
 "If you wish to file an issue about the DMG Bundle, please use Gitlab to\n"
 "contact us. For security-sensitive issues, please remember to check the\n"
-"\"This issue is confidential and should only be visible to team members "
-"with at\n"
+"\"This issue is confidential and should only be visible to team members with at\n"
 "least Reporter access\" option when filing the issue."
 msgstr ""
 
 #: i2p2www/pages/downloads/post-install.html:3
 msgid ""
-"After running the installer on windows, simply click on the \"Start I2P\""
-" button\n"
-"which will bring up the <a "
-"href=\"http://localhost:7657/index.jsp\">router console</a>,\n"
+"After running the installer on windows, simply click on the \"Start I2P\" button\n"
+"which will bring up the <a href=\"http://localhost:7657/index.jsp\">router console</a>,\n"
 "which has further instructions."
-msgstr ""
-"Po uruchomieniu instalatora pod Windowsem, kliknij w przycisk „start I2P”"
-" który wyświetli <a href=\"http://localhost:7657/index.jsp\">konsolę "
-"węzła</a> zawierającą dalsze instrukcje."
+msgstr "Po uruchomieniu instalatora pod Windowsem, kliknij w przycisk „start I2P” który wyświetli <a href=\"http://localhost:7657/index.jsp\">konsolę węzła</a> zawierającą dalsze instrukcje."
 
 #: i2p2www/pages/downloads/post-install.html:9
 msgid ""
 "On Unix-like systems, I2P can be started as a service\n"
-"using the \"i2prouter\" script, located in the directory you selected for"
-" I2P.\n"
-"Changing to that directory in a console and issuing \"sh i2prouter "
-"status\"\n"
-"should tell you the router's status. The arguments \"start\", \"stop\" "
-"and \"restart\"\n"
-"control the service. The <a "
-"href=\"http://localhost:7657/index.jsp\">router console</a>\n"
+"using the \"i2prouter\" script, located in the directory you selected for I2P.\n"
+"Changing to that directory in a console and issuing \"sh i2prouter status\"\n"
+"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n"
+"control the service. The <a href=\"http://localhost:7657/index.jsp\">router console</a>\n"
 "can be accessed at its usual location.\n"
-"For users on OpenSolaris and other systems for which the wrapper (i2psvc)"
-" is not supported,\n"
+"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n"
 "start the router with \"sh runplain.sh\" instead."
-msgstr ""
-"Na systemach uniksopodobnych, I2P może być uruchomiony jako usługa "
-"używając skryptu „i2prouter”, znajdującego się w katalogu który wybrałeś "
-"dla I2P. Po przejściu do tego katalogu w terminalu i wpisaniu „sh "
-"i2prouter status” powinno pokazać Ci jaki jest status węzła. Argumenty "
-"„start”, „stop” i „restart” kontrolują usługę. <a "
-"href=\"http://localhost:7657/index.jsp\">Konsola węzła</a> jest dostępna "
-"tam gdzie zawsze. Użytkownicy OpenSolaris i innych systemów dla których "
-"powłoka (i2psvc) jest nieobsługiwana, mogą uruchomić węzeł korzystając z "
-"„sh runplain.sh”."
+msgstr "Na systemach uniksopodobnych, I2P może być uruchomiony jako usługa używając skryptu „i2prouter”, znajdującego się w katalogu który wybrałeś dla I2P. Po przejściu do tego katalogu w terminalu i wpisaniu „sh i2prouter status” powinno pokazać Ci jaki jest status węzła. Argumenty „start”, „stop” i „restart” kontrolują usługę. <a href=\"http://localhost:7657/index.jsp\">Konsola węzła</a> jest dostępna tam gdzie zawsze. Użytkownicy OpenSolaris i innych systemów dla których powłoka (i2psvc) jest nieobsługiwana, mogą uruchomić węzeł korzystając z „sh runplain.sh”."
 
 #: i2p2www/pages/downloads/post-install.html:20
 #, python-format
 msgid ""
-"When installing for the first time, please remember to <b>adjust your "
-"NAT/firewall</b>\n"
+"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n"
 "if you can, bearing in mind the Internet-facing ports I2P uses,\n"
 "<a href=\"%(faq)s#ports\">described here</a> among other ports.\n"
-"If you have successfully opened your port to inbound TCP, also enable "
-"inbound TCP on the\n"
+"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n"
 "<a href=\"http://localhost:7657/confignet.jsp\">configuration page</a>."
-msgstr ""
-"Podczas pierwszej instalacji prosimy pamiętać o <b>skonfigurowaniu "
-"swojego NAT-u/zapory sieciowej</b> mając na uwadze porty używane przez "
-"I2P <a href=\"%(faq)s#ports\">opisane tutaj</a>. Jeśli pomyślnie "
-"otworzyłeś swój port TCP przychodzący, także aktywuj nasłuch na TCP na <a"
-" href=\"http://localhost:7657/confignet.jsp\">stronie konfiguracji</a>."
+msgstr "Podczas pierwszej instalacji prosimy pamiętać o <b>skonfigurowaniu swojego NAT-u/zapory sieciowej</b> mając na uwadze porty używane przez I2P <a href=\"%(faq)s#ports\">opisane tutaj</a>. Jeśli pomyślnie otworzyłeś swój port TCP przychodzący, także aktywuj nasłuch na TCP na <a href=\"http://localhost:7657/confignet.jsp\">stronie konfiguracji</a>."
 
 #: i2p2www/pages/downloads/post-install.html:28
 msgid ""
 "Also, please review and <b>adjust the bandwidth settings</b> on the\n"
 "<a href=\"http://localhost:7657/config.jsp\">configuration page</a>,\n"
 "as the default settings of 96 KBps down / 40 KBps up are fairly slow."
-msgstr ""
-"Prosimy także o sprawdzenie i <b>dostosowanie ustawień przepustowości</b>"
-" na <a href=\"http://localhost:7657/config.jsp\">stronie "
-"konfiguracji</a>, ponieważ domyślne ustawienia 96 KB/s pobierania i "
-"40 KB/s wysyłania są bardzo wolne."
+msgstr "Prosimy także o sprawdzenie i <b>dostosowanie ustawień przepustowości</b> na <a href=\"http://localhost:7657/config.jsp\">stronie konfiguracji</a>, ponieważ domyślne ustawienia 96 KB/s pobierania i 40 KB/s wysyłania są bardzo wolne."
 
 #: i2p2www/pages/downloads/redirect.html:2
 msgid "Downloading..."
@@ -1987,9 +1478,7 @@ msgstr "Pobieranie…"
 msgid ""
 "Your download will begin shortly. If it doesn't start within 5 seconds, "
 "click <a href=\"%(url)s\">here</a>."
-msgstr ""
-"Pobieranie powinno się wkrótce rozpocząć. Jeśli nie rozpocznie się w "
-"ciągu 5 sekund, kliknij <a href=\"%(url)s\">tu</a>."
+msgstr "Pobieranie powinno się wkrótce rozpocząć. Jeśli nie rozpocznie się w ciągu 5 sekund, kliknij <a href=\"%(url)s\">tu</a>."
 
 #: i2p2www/pages/downloads/select.html:2 i2p2www/pages/downloads/select.html:4
 msgid "Mirror selection"
@@ -2011,12 +1500,9 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:7
 msgid ""
-"This is the long way of installing I2P for Windows, using the IzPack "
-"based\n"
-"installer and a separate Java Virtual Machine installed on the host. If "
-"you're new to I2P, you may\n"
-"want to try the Beta installer, which requires fewer total steps and "
-"automatically configures a JVM,\n"
+"This is the long way of installing I2P for Windows, using the IzPack based\n"
+"installer and a separate Java Virtual Machine installed on the host. If you're new to I2P, you may\n"
+"want to try the Beta installer, which requires fewer total steps and automatically configures a JVM,\n"
 "I2P, and sets up a Firefox Profile in a single step."
 msgstr ""
 
@@ -2026,17 +1512,10 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:14
 msgid ""
-"This is a detailed, step-by-step guide to installing and configuring I2P,"
-" including\n"
-"all dependencies and setting up a browser, on a new Windows 10 system. "
-"Many users\n"
-"will be able to skip steps if they already have Java 8 or Firefox "
-"installed."
-msgstr ""
-"Znajdziesz tutaj szczegółową instrukcję instalacji i konfiguracji I2P, "
-"wliczając w to instalację zależności i konfigurację przeglądarki na "
-"świeżym systemie Windows 10. Możesz pominąć niektóre etapy, jeżeli masz "
-"już zainstalowaną Javę 8 bądź Firefoksa."
+"This is a detailed, step-by-step guide to installing and configuring I2P, including\n"
+"all dependencies and setting up a browser, on a new Windows 10 system. Many users\n"
+"will be able to skip steps if they already have Java 8 or Firefox installed."
+msgstr "Znajdziesz tutaj szczegółową instrukcję instalacji i konfiguracji I2P, wliczając w to instalację zależności i konfigurację przeglądarki na świeżym systemie Windows 10. Możesz pominąć niektóre etapy, jeżeli masz już zainstalowaną Javę 8 bądź Firefoksa."
 
 #: i2p2www/pages/downloads/windows.html:18
 msgid "So what are we going to do here?"
@@ -2068,15 +1547,10 @@ msgstr "Krok pierwszy: instalacja Javy"
 
 #: i2p2www/pages/downloads/windows.html:31
 msgid ""
-"In order to use I2P, you will need a suitable Java environment. On "
-"Windows, users should\n"
-"probably choose Oracle's Java 8 implementation. Please install it by "
-"following the\n"
+"In order to use I2P, you will need a suitable Java environment. On Windows, users should\n"
+"probably choose Oracle's Java 8 implementation. Please install it by following the\n"
 "instructions below:"
-msgstr ""
-"Aby korzystać z oprogramowania I2P niezbędne jest środowisko "
-"uruchomieniowe Java. Pod systemem Windows zaleca siÄ™ instalacjÄ™ Javy 8 od"
-" Oracle. Podążaj za poniższymi wskazówkami:"
+msgstr "Aby korzystać z oprogramowania I2P niezbędne jest środowisko uruchomieniowe Java. Pod systemem Windows zaleca się instalację Javy 8 od Oracle. Podążaj za poniższymi wskazówkami:"
 
 #: i2p2www/pages/downloads/windows.html:35
 msgid "If you already have Java installed, you may"
@@ -2084,22 +1558,15 @@ msgstr "Jeżeli masz już zainstalowaną Javę, możesz"
 
 #: i2p2www/pages/downloads/windows.html:38
 msgid ""
-"I2P requires Java to run, if you don't have Java installed, you will get "
-"an error\n"
+"I2P requires Java to run, if you don't have Java installed, you will get an error\n"
 "that looks like this:"
-msgstr ""
-"I2P wymaga do działania Javy, jeżeli nie masz jej zainstalowanej, "
-"otrzymasz taki błąd:"
+msgstr "I2P wymaga do działania Javy, jeżeli nie masz jej zainstalowanej, otrzymasz taki błąd:"
 
 #: i2p2www/pages/downloads/windows.html:43
 msgid ""
-"We appreciate that you have a wide range of choices in Java software, but"
-" the Oracle\n"
+"We appreciate that you have a wide range of choices in Java software, but the Oracle\n"
 "Java software is the easiest to install and use with I2P on Windows."
-msgstr ""
-"Doceniamy fakt, że jest dostępny szeroki wachlarz środowisk Java, ale "
-"Java od Oracle jest najłatwiejsza do instalacji i użytku z I2P pod "
-"systemem Windows."
+msgstr "Doceniamy fakt, że jest dostępny szeroki wachlarz środowisk Java, ale Java od Oracle jest najłatwiejsza do instalacji i użytku z I2P pod systemem Windows."
 
 #: i2p2www/pages/downloads/windows.html:48
 msgid "Download it from"
@@ -2107,21 +1574,15 @@ msgstr "Pobierz plik z"
 
 #: i2p2www/pages/downloads/windows.html:52
 msgid ""
-"Double-click the Java Installer you just downloaded. Don't set a custom "
-"path, just\n"
+"Double-click the Java Installer you just downloaded. Don't set a custom path, just\n"
 "use the default one."
-msgstr ""
-"Dwukrotnie kliknij pobrany plik. Nie wybieraj własnego katalogu, pozostaw"
-" domyślne ustawienia."
+msgstr "Dwukrotnie kliknij pobrany plik. Nie wybieraj własnego katalogu, pozostaw domyślne ustawienia."
 
 #: i2p2www/pages/downloads/windows.html:57
 msgid ""
-"Java will show you some information about what it is and where it runs "
-"while you\n"
+"Java will show you some information about what it is and where it runs while you\n"
 "wait for it to finish installing."
-msgstr ""
-"Instalator wyświetli trochę informacji czym jest Java, gdzie jest "
-"używana, itp., poczekaj aż instalacja się zakończy."
+msgstr "Instalator wyświetli trochę informacji czym jest Java, gdzie jest używana, itp., poczekaj aż instalacja się zakończy."
 
 #: i2p2www/pages/downloads/windows.html:62
 msgid "When you see this, Java is almost installed."
@@ -2144,7 +1605,8 @@ msgid "https://geti2p.net"
 msgstr "https://geti2p.net/pl"
 
 #: i2p2www/pages/downloads/windows.html:79
-msgid "'I2P is available in many languages. Pick one that is familiar to you.'"
+msgid ""
+"'I2P is available in many languages. Pick one that is familiar to you.'"
 msgstr "Wybierz język."
 
 #: i2p2www/pages/downloads/windows.html:83
@@ -2153,30 +1615,21 @@ msgstr "Na pierwszym ekranie jest wprowadzenie."
 
 #: i2p2www/pages/downloads/windows.html:87
 msgid ""
-"I2P is mostly public domain software, with permissive licenses and a "
-"small amount of GPL2'ed\n"
+"I2P is mostly public domain software, with permissive licenses and a small amount of GPL2'ed\n"
 "Free Software."
-msgstr ""
-"Oprogramowanie I2P w większości należy do domeny publicznej, częściowo na"
-" wolnych licencjach i z niewielkÄ… porcjÄ… kodu na licencji GPLv2."
+msgstr "Oprogramowanie I2P w większości należy do domeny publicznej, częściowo na wolnych licencjach i z niewielką porcją kodu na licencji GPLv2."
 
 #: i2p2www/pages/downloads/windows.html:92
 msgid ""
-"You should probably leave I2P installed at the default path, as it is "
-"easiest to work with this\n"
+"You should probably leave I2P installed at the default path, as it is easiest to work with this\n"
 "way."
-msgstr ""
-"Zaleca się instalację I2P w domyślnym katalogu, jest to najłatwiejszy "
-"sposób pracy."
+msgstr "Zaleca się instalację I2P w domyślnym katalogu, jest to najłatwiejszy sposób pracy."
 
 #: i2p2www/pages/downloads/windows.html:97
 msgid ""
-"Don't bother running it as a Windows service for now, an easy-to-use "
-"shortcut will be added to\n"
+"Don't bother running it as a Windows service for now, an easy-to-use shortcut will be added to\n"
 "the start menu for you to control I2P with."
-msgstr ""
-"Nie musisz uruchamiać I2P jako usługi systemowej, łatwy w użyciu skrót "
-"zostanie dodany do menu start, aby kontrolować I2P."
+msgstr "Nie musisz uruchamiać I2P jako usługi systemowej, łatwy w użyciu skrót zostanie dodany do menu start, aby kontrolować I2P."
 
 #: i2p2www/pages/downloads/windows.html:102
 msgid "I2P will copy it's files into the install location."
@@ -2184,11 +1637,9 @@ msgstr "Pliki I2P zostanÄ… skopiowane do docelowego katalogu."
 
 #: i2p2www/pages/downloads/windows.html:106
 msgid ""
-"I2P is now installed! You can start it using the \"Start I2P\" entries in"
-" your Start Menu and on your Desktop."
-msgstr ""
-"I2P zostało zainstalowane! Włącz je używając skrótu „Start I2P” w menu "
-"start lub na pulpicie."
+"I2P is now installed! You can start it using the \"Start I2P\" entries in "
+"your Start Menu and on your Desktop."
+msgstr "I2P zostało zainstalowane! Włącz je używając skrótu „Start I2P” w menu start lub na pulpicie."
 
 #: i2p2www/pages/downloads/windows.html:109
 msgid "Part Three: Install a Better Browser(Firefox or Tor Browser)"
@@ -2196,28 +1647,17 @@ msgstr "Krok trzeci: instalacja przeglądarki Firefox (bądź Tor Browser)"
 
 #: i2p2www/pages/downloads/windows.html:111
 msgid ""
-"If you already have either Firefox or Tor Browser installed, skip the "
-"first 2 steps."
-msgstr ""
-"Jeżeli masz już zainstalowaną przeglądarkę Firefox lub Tor Browser, pomiń"
-" dwa pierwsze kroki."
+"If you already have either Firefox or Tor Browser installed, skip the first "
+"2 steps."
+msgstr "Jeżeli masz już zainstalowaną przeglądarkę Firefox lub Tor Browser, pomiń dwa pierwsze kroki."
 
 #: i2p2www/pages/downloads/windows.html:113
 msgid ""
-"Unfortunately for Windows users, Microsoft Edge does not have proxy "
-"settings that are safe to use with I2P. The browser\n"
-"that is easiest to configure with I2P in a reasonably good way is "
-"Firefox(Although Chrome is possible, this procedure\n"
-"is only recommended for experts). I2P participants who want to browse I2P"
-" Sites can follow these steps to install\n"
+"Unfortunately for Windows users, Microsoft Edge does not have proxy settings that are safe to use with I2P. The browser\n"
+"that is easiest to configure with I2P in a reasonably good way is Firefox(Although Chrome is possible, this procedure\n"
+"is only recommended for experts). I2P participants who want to browse I2P Sites can follow these steps to install\n"
 "and configure Firefox for I2P."
-msgstr ""
-"Domyślna przeglądarka w systemach Windows – Microsoft Edge – niestety nie"
-" posiada ustawień proxy umożliwiających bezpieczne korzystanie z I2P. "
-"Najłatwiejszą przeglądarką do korzystania z I2P jest Firefox (możliwa "
-"jest również konfiguracja Google Chrome, ale jest to zalecane tylko dla "
-"zaawansowanych użytkowników). Poniżej znajduje się opis, co należy "
-"zrobić, aby móc przeglądać strony I2P za pomocą Firefoksa."
+msgstr "Domyślna przeglądarka w systemach Windows – Microsoft Edge – niestety nie posiada ustawień proxy umożliwiających bezpieczne korzystanie z I2P. Najłatwiejszą przeglądarką do korzystania z I2P jest Firefox (możliwa jest również konfiguracja Google Chrome, ale jest to zalecane tylko dla zaawansowanych użytkowników). Poniżej znajduje się opis, co należy zrobić, aby móc przeglądać strony I2P za pomocą Firefoksa."
 
 #: i2p2www/pages/downloads/windows.html:118
 msgid "If you already have Firefox installed, you may"
@@ -2245,14 +1685,9 @@ msgstr "Wybierz język używany podczas instalacji."
 
 #: i2p2www/pages/downloads/windows.html:142
 msgid ""
-"The Profile Bundle incorporates lots of external software, so it has a "
-"detailed license \n"
-"document. All of the external software is Free and Open Source, with the "
-"license included."
-msgstr ""
-"Przeglądarka I2P zawiera mnóstwo zewnętrznego oprogramowania, więc "
-"wyświetlana jest szczegółowa licencja. Całe zawarte oprogramowanie jest "
-"wolne i otwarte (WiOO)."
+"The Profile Bundle incorporates lots of external software, so it has a detailed license \n"
+"document. All of the external software is Free and Open Source, with the license included."
+msgstr "Przeglądarka I2P zawiera mnóstwo zewnętrznego oprogramowania, więc wyświetlana jest szczegółowa licencja. Całe zawarte oprogramowanie jest wolne i otwarte (WiOO)."
 
 #: i2p2www/pages/downloads/windows.html:147
 msgid "You now have a browser ready for I2P!"
@@ -2264,20 +1699,15 @@ msgstr "Krok czwarty: konfiguracja przepustowości I2P"
 
 #: i2p2www/pages/downloads/windows.html:153
 msgid ""
-"When you visit the I2P router console for the first time, it will "
-"automatically direct you to the bandwidth\n"
+"When you visit the I2P router console for the first time, it will automatically direct you to the bandwidth\n"
 "configuration wizard."
-msgstr ""
-"Podczas pierwszego otwarcia strony konsoli węzła, zostaniesz "
-"przekierowany/a do kreatora konfiguracji pasma."
+msgstr "Podczas pierwszego otwarcia strony konsoli węzła, zostaniesz przekierowany/a do kreatora konfiguracji pasma."
 
 #: i2p2www/pages/downloads/windows.html:158
 msgid ""
 "During the bandwidth test, we'll need to connect to the external M-Lab "
 "Service, which makes"
-msgstr ""
-"Podczas testu przepustowości, zostaniesz połączony/a z zewnętrzną stroną "
-"M-Lab, która przeprowadzi"
+msgstr "Podczas testu przepustowości, zostaniesz połączony/a z zewnętrzną stroną M-Lab, która przeprowadzi"
 
 #: i2p2www/pages/downloads/windows.html:162
 msgid "The bandwidth test takes about a minute to run completely."
@@ -2288,31 +1718,22 @@ msgid "Here we have an overview of the applications."
 msgstr "Tutaj przedstawione jest podsumowanie aplikacji I2P."
 
 #: i2p2www/pages/downloads/windows.html:170
-msgid "Now you have your bandwidth configured to efficiently contribute to I2P."
-msgstr ""
-"Teraz Twoje ustawienia przepustowości są skonfigurowane do wydajnego "
-"uczestnictwa w sieci I2P."
+msgid ""
+"Now you have your bandwidth configured to efficiently contribute to I2P."
+msgstr "Teraz Twoje ustawienia przepustowości są skonfigurowane do wydajnego uczestnictwa w sieci I2P."
 
 #: i2p2www/pages/downloads/windows.html:176
 msgid ""
-"If you want to re-run the welcome wizard after completing it, you can "
-"visit the page\n"
+"If you want to re-run the welcome wizard after completing it, you can visit the page\n"
 "on"
 msgstr "Jeżeli chcesz ponownie uruchomić kreator konfiguracji, odwiedź stronę"
 
 #: i2p2www/pages/downloads/windows.html:179
 msgid ""
-"That's it! You're now ready to use I2P. You can browse I2P Sites, "
-"download files, host services,\n"
-"e-mail and chat anonymously. Visit the <a "
-"href=\"https://localhost:7657/home\">router console homepage</a> to\n"
+"That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services,\n"
+"e-mail and chat anonymously. Visit the <a href=\"https://localhost:7657/home\">router console homepage</a> to\n"
 "get started."
-msgstr ""
-"Gotowe! Teraz jesteś gotowy/a do korzystania z I2P. Możesz przeglądać "
-"ukryte strony .i2p, pobierać pliki, zakładać własne usługi, korzystać z "
-"poczty elektronicznej i czatów, wszystko anonimowo. Odwiedź <a "
-"href=\"http://localhost:7657/home\">stronę startową węzła</a>, aby "
-"rozpocząć."
+msgstr "Gotowe! Teraz jesteś gotowy/a do korzystania z I2P. Możesz przeglądać ukryte strony .i2p, pobierać pliki, zakładać własne usługi, korzystać z poczty elektronicznej i czatów, wszystko anonimowo. Odwiedź <a href=\"http://localhost:7657/home\">stronę startową węzła</a>, aby rozpocząć."
 
 #: i2p2www/pages/global/error_404.html:3
 msgid "Not found"
@@ -2320,11 +1741,9 @@ msgstr "Nie znaleziono"
 
 #: i2p2www/pages/global/error_404.html:9
 msgid ""
-"Yep... the resource, you were searching for, is named differently, "
-"doesn't exist or was removed."
-msgstr ""
-"Niestety, ale źródło którego szukasz ma inną nazwę, nie istnieje lub "
-"zostało usunięte."
+"Yep... the resource, you were searching for, is named differently, doesn't "
+"exist or was removed."
+msgstr "Niestety, ale źródło którego szukasz ma inną nazwę, nie istnieje lub zostało usunięte."
 
 #: i2p2www/pages/global/error_500.html:5
 msgid "Server error"
@@ -2392,9 +1811,7 @@ msgstr "Projekt Niewidzialny Internet"
 msgid ""
 "This page was last updated in %(lastupdated)s and is accurate for router "
 "version %(accuratefor)s."
-msgstr ""
-"Ostatnia aktualizacja strony: %(lastupdated)s; zawarte informacje dotyczÄ…"
-" węzła w wersji %(accuratefor)s."
+msgstr "Ostatnia aktualizacja strony: %(lastupdated)s; zawarte informacje dotyczą węzła w wersji %(accuratefor)s."
 
 #: i2p2www/pages/global/layout.html:84
 #, python-format
@@ -2737,28 +2154,18 @@ msgstr "Spotkania I2P – subskrypcja ATOM"
 #: i2p2www/pages/meetings/index.html:7
 #, python-format
 msgid ""
-"Regularly scheduled project meetings are held on the first Tuesday of "
-"every month at 8 PM UTC.\n"
+"Regularly scheduled project meetings are held on the first Tuesday of every month at 8 PM UTC.\n"
 "Anyone can schedule and\n"
 "run a meeting, by posting the agenda in\n"
 "<a href=\"%(mtgforum)s\">the meetings forum</a>."
-msgstr ""
-"Narady projektu odbywają się regularnie w każdy pierwszy wtorek miesiąca "
-"o 20:00 UTC (21:00 CET). Każdy może zaplanować i poprowadzić naradę "
-"poprzez ustalenie porzÄ…dku obrad na <a href=\"%(mtgforum)s\">forum "
-"obrad</a>."
+msgstr "Narady projektu odbywają się regularnie w każdy pierwszy wtorek miesiąca o 20:00 UTC (21:00 CET). Każdy może zaplanować i poprowadzić naradę poprzez ustalenie porządku obrad na <a href=\"%(mtgforum)s\">forum obrad</a>."
 
 #: i2p2www/pages/meetings/index.html:14
 #, python-format
 msgid ""
-"If you have something to discuss, please find the developers on IRC in "
-"#i2p-dev.\n"
-"<a href=\"%(blogindex)s\">Status updates</a> from developers are also "
-"available."
-msgstr ""
-"Jeżeli masz coś do przedyskutowania, możesz znaleźć programistów I2P na "
-"kanale IRC #i2p-dev. Dostępne są także <a "
-"href=\"%(blogindex)s\">wieści</a> od twórców."
+"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n"
+"<a href=\"%(blogindex)s\">Status updates</a> from developers are also available."
+msgstr "Jeżeli masz coś do przedyskutowania, możesz znaleźć programistów I2P na kanale IRC #i2p-dev. Dostępne są także <a href=\"%(blogindex)s\">wieści</a> od twórców."
 
 #: i2p2www/pages/meetings/show.html:2
 #, python-format
@@ -2790,22 +2197,14 @@ msgid ""
 "<a href=\"%(bibtex)s\">BibTeX source page</a> for examples.<br />\n"
 "Remember to include URLs if possible:\n"
 "<a href=\"%(citeseer)s\">offline papers are less useful</a>."
-msgstr ""
-"Prosimy przesłać nowe lub poprawione wpisy na <a name=\"contact\"><span "
-"class=\"email\">%(email)s</span></a>.<br />\n"
-"Jeśli mógłbyś, zapisz je w formacie BibTeX, zobacz przykłady na <a "
-"href=\"%(bibtex)s\">stronie BibTeX-a</a>.<br />\n"
-"Pamiętaj aby umieścić odnośniki: <a href=\"%(citeseer)s\">dokumenty "
-"offline sÄ… mniej przydatne</a>."
+msgstr "Prosimy przesłać nowe lub poprawione wpisy na <a name=\"contact\"><span class=\"email\">%(email)s</span></a>.<br />\nJeśli mógłbyś, zapisz je w formacie BibTeX, zobacz przykłady na <a href=\"%(bibtex)s\">stronie BibTeX-a</a>.<br />\nPamiętaj aby umieścić odnośniki: <a href=\"%(citeseer)s\">dokumenty offline są mniej przydatne</a>."
 
 #: i2p2www/pages/papers/list.html:80
 #, python-format
 msgid ""
 "The source code for this page was adapted from\n"
 "<a href=\"%(anonbib)s\">Free Haven's anonymity bibliography</a>."
-msgstr ""
-"Kod źródłowy tej strony został zaadoptowany z <a "
-"href=\"%(anonbib)s\">Free Haven's anonymity bibliography</a>."
+msgstr "Kod źródłowy tej strony został zaadoptowany z <a href=\"%(anonbib)s\">Free Haven's anonymity bibliography</a>."
 
 #: i2p2www/pages/site/contact.html:4
 msgid "Email"
@@ -2815,10 +2214,7 @@ msgstr "E-poczta"
 msgid ""
 "Please do not use these email addresses for support requests.\n"
 "For contact specific to research, outreach and security please use:"
-msgstr ""
-"Prosimy nie używać poniższych adresów e‑poczty w celu uzyskania pomocy. "
-"Aby uzyskać informacje odnośnie badań naukowych, współpracy bądź luk "
-"bezpieczeństwa, prosimy o kontakt:"
+msgstr "Prosimy nie używać poniższych adresów e‑poczty w celu uzyskania pomocy. Aby uzyskać informacje odnośnie badań naukowych, współpracy bądź luk bezpieczeństwa, prosimy o kontakt:"
 
 #: i2p2www/pages/site/contact.html:24
 msgid "Please visit our I2P user forum -"
@@ -2828,22 +2224,16 @@ msgstr "Prosimy odwiedzić forum użytkowników I2P –"
 msgid ""
 "available on non-private internet at https://i2pforum.net and on I2P at "
 "http://i2pforum.i2p"
-msgstr ""
-"dostępne w nieanonimowym internecie: https://i2pforum.net i w sieci I2P: "
-"http://i2pforum.i2p"
+msgstr "dostępne w nieanonimowym internecie: https://i2pforum.net i w sieci I2P: http://i2pforum.i2p"
 
 #: i2p2www/pages/site/contact.html:26
 #, python-format
 msgid ""
 "Most of the discussion about I2P's development happens on the <a "
-"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from "
-"within I2P network). This is usually the best place to start with "
-"inquiries, if the dev IRC channel is inactive."
-msgstr ""
-"Większość dyskusji o rozwoju sieci I2P odbywa się na <a "
-"href=\"http://%(zzz)s\">forum dewelopera zzz</a> (dostępne tylko poprzez "
-"sieć I2P). Jest to najlepsze miejsce do zadawania pytań, gdy kanał IRC "
-"„i2p-dev” jest nieaktywny."
+"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from within "
+"I2P network). This is usually the best place to start with inquiries, if the"
+" dev IRC channel is inactive."
+msgstr "Większość dyskusji o rozwoju sieci I2P odbywa się na <a href=\"http://%(zzz)s\">forum dewelopera zzz</a> (dostępne tylko poprzez sieć I2P). Jest to najlepsze miejsce do zadawania pytań, gdy kanał IRC „i2p-dev” jest nieaktywny."
 
 #: i2p2www/pages/site/contact.html:30
 msgid "Social Media"
@@ -2852,42 +2242,19 @@ msgstr "Media społecznościowe"
 #: i2p2www/pages/site/contact.html:32
 msgid ""
 "<ul>\n"
-"  <li><a href=\"https://mastodon.social/@i2p\">Mastodon - "
-"https://mastodon.social/@i2p</a></li>\n"
-"  <li><a href=\"https://twitter.com/GetI2P\">Twitter - "
-"https://twitter.com/GetI2P</a></li>\n"
-"  <li><a href=\"https://old.reddit.com/i2p\">Reddit - "
-"https://old.reddit.com/i2p</a></li>\n"
-"</ul>"
-msgstr ""
-"<ul>\n"
-"  <li><a href=\"https://mastodon.social/@i2p\">Mastodon - "
-"https://mastodon.social/@i2p</a></li>\n"
-"  <li><a href=\"https://twitter.com/GetI2P\">Twitter - "
-"https://twitter.com/GetI2P</a></li>\n"
-"  <li><a href=\"https://old.reddit.com/i2p\">Reddit - "
-"https://old.reddit.com/i2p</a></li>\n"
+"  <li><a href=\"https://mastodon.social/@i2p\">Mastodon - https://mastodon.social/@i2p</a></li>\n"
+"  <li><a href=\"https://twitter.com/GetI2P\">Twitter - https://twitter.com/GetI2P</a></li>\n"
+"  <li><a href=\"https://old.reddit.com/i2p\">Reddit - https://old.reddit.com/i2p</a></li>\n"
 "</ul>"
+msgstr "<ul>\n  <li><a href=\"https://mastodon.social/@i2p\">Mastodon - https://mastodon.social/@i2p</a></li>\n  <li><a href=\"https://twitter.com/GetI2P\">Twitter - https://twitter.com/GetI2P</a></li>\n  <li><a href=\"https://old.reddit.com/i2p\">Reddit - https://old.reddit.com/i2p</a></li>\n</ul>"
 
 #: i2p2www/pages/site/contact.html:41
 msgid ""
-"Our primary IRC network is the Irc2P network within I2P; a default tunnel"
-" to this network is set up with new router installs.\n"
-"  We are also present on multiple standard networks like <a "
-"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n"
-"  <a href=\"http://www.einirc.de/\">EIN</a> and <a "
-"href=\"http://freenode.net/\">Freenode</a>.\n"
-"  All I2P-related channels on all these network are linked to the main "
-"channels on Irc2P via relay bots."
-msgstr ""
-"Naszą główną siecią IRC jest sieć Irc2P wewnątrz I2P; domyślny tunel do "
-"tej sieci jest skonfigurowany w każdej nowej instalacji węzła. Jesteśmy "
-"też obecni na kilku standardowych sieciach jak <a "
-"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n"
-"<a href=\"http://www.einirc.de/\">EIN</a> i <a "
-"href=\"http://freenode.net/\">Freenode</a>. Wszystkie kanały o I2P na "
-"tych sieciach są powiązane z głównymi kanałami na Irc2P poprzez boty "
-"przekaźnikowe."
+"Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs.\n"
+"  We are also present on multiple standard networks like <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n"
+"  <a href=\"http://www.einirc.de/\">EIN</a> and <a href=\"http://freenode.net/\">Freenode</a>.\n"
+"  All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots."
+msgstr "Naszą główną siecią IRC jest sieć Irc2P wewnątrz I2P; domyślny tunel do tej sieci jest skonfigurowany w każdej nowej instalacji węzła. Jesteśmy też obecni na kilku standardowych sieciach jak <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n<a href=\"http://www.einirc.de/\">EIN</a> i <a href=\"http://freenode.net/\">Freenode</a>. Wszystkie kanały o I2P na tych sieciach są powiązane z głównymi kanałami na Irc2P poprzez boty przekaźnikowe."
 
 #: i2p2www/pages/site/contact.html:49
 msgid "Channel list:"
@@ -2911,9 +2278,7 @@ msgstr "Listy dyskusyjne"
 
 #: i2p2www/pages/site/contact.html:58
 msgid "I2P has no active mailing lists, however archives can be accessed."
-msgstr ""
-"Obecnie nie ma aktywnych list dyskusyjnych o I2P, jednakże dostępne są "
-"archiwa."
+msgstr "Obecnie nie ma aktywnych list dyskusyjnych o I2P, jednakże dostępne są archiwa."
 
 #: i2p2www/pages/site/contact.html:62
 msgid "Lists"
@@ -2930,8 +2295,8 @@ msgstr "dyskusje deweloperów I2P – wszystko związane z rozwojem I2P"
 
 #: i2p2www/pages/site/contact.html:71 i2p2www/pages/site/contact.html:75
 msgid ""
-"General I2P discussion - anything that doesn't fit in a different list "
-"goes here"
+"General I2P discussion - anything that doesn't fit in a different list goes "
+"here"
 msgstr "ogólne dyskusje o I2P – wszystko co nie pasuje w innych listach leci tutaj"
 
 #: i2p2www/pages/site/contact.html:80
@@ -3103,7 +2468,8 @@ msgid "Product Development"
 msgstr "Menadżer rozwoju"
 
 #: i2p2www/pages/site/contact.html:186
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr "nadzorowanie projektów od etapu wczesnego planu aż do ukończenia"
 
 #: i2p2www/pages/site/contact.html:189
@@ -3150,9 +2516,7 @@ msgstr "Specjalista ds. dizajnu i użyteczności"
 
 #: i2p2www/pages/site/contact.html:216
 msgid "ongoing improvements to user experience for website and software"
-msgstr ""
-"ciągłe polepszanie doświadczenia użytkownika oprogramowania i strony "
-"internetowej"
+msgstr "ciągłe polepszanie doświadczenia użytkownika oprogramowania i strony internetowej"
 
 #: i2p2www/pages/site/contact.html:234
 msgid "Director of passion"
@@ -3195,9 +2559,7 @@ msgstr "wtyczka I2P-Bote"
 #: i2p2www/pages/site/contact.html:256
 #, python-format
 msgid "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a> lead"
-msgstr ""
-"Główny programista <a "
-"href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>"
+msgstr "Główny programista <a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>"
 
 #: i2p2www/pages/site/contact.html:258
 msgid "Maintains the integrated Bittorrent client"
@@ -3206,9 +2568,7 @@ msgstr "zarzÄ…dza rozwojem zintegrowanego klienta BitTorrent"
 #: i2p2www/pages/site/contact.html:261
 #, python-format
 msgid "<a href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a> lead"
-msgstr ""
-"Główny programista <a "
-"href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a>"
+msgstr "Główny programista <a href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a>"
 
 #: i2p2www/pages/site/contact.html:263
 msgid "Syndie development"
@@ -3276,9 +2636,7 @@ msgstr "tworzenie paczek Debiana/Ubuntu i zarzÄ…dzanie PPA"
 
 #: i2p2www/pages/site/contact.html:306
 msgid "Routerconsole backend and UI work, website revamp, unit tests work"
-msgstr ""
-"back-end i interfejs konsoli węzła, reorganizacja strony, testy "
-"jednostkowe"
+msgstr "back-end i interfejs konsoli węzła, reorganizacja strony, testy jednostkowe"
 
 #: i2p2www/pages/site/contact.html:311
 msgid "Help needed on many fronts!"
@@ -3358,7 +2716,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "rozwój jbigi, migracja wiki, uporządkowanie dokumentacji"
 
 #: i2p2www/pages/site/contact.html:393
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr "java-odpluskwianie i rozwój klienta I2PTunnel i konsoli węzła"
 
 #: i2p2www/pages/site/contact.html:397
@@ -3411,16 +2770,11 @@ msgstr ""
 
 #: i2p2www/pages/site/contact.html:475
 msgid ""
-"I2P welcomes all kinds of people, as long as they are friendly and "
-"helpful to each other.<br>\n"
+"I2P welcomes all kinds of people, as long as they are friendly and helpful to each other.<br>\n"
 "We disgrace hate, anger, racism, and bad speaking towards anyone.<br>\n"
-"We do support LBGT, suppressed minorites and other people, wether they "
-"need help in kind of our I2P software or not.<br>\n"
-"We work together to build a free world without hate, racism and "
-"violence.<br>\n"
-"The I2P router software was created in this spirit and should be used to "
-"help repressed people to regain their freedom of speech, while not "
-"suppressing others."
+"We do support LBGT, suppressed minorites and other people, wether they need help in kind of our I2P software or not.<br>\n"
+"We work together to build a free world without hate, racism and violence.<br>\n"
+"The I2P router software was created in this spirit and should be used to help repressed people to regain their freedom of speech, while not suppressing others."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:2
@@ -3441,11 +2795,8 @@ msgstr "Czy instalacja Javy jest wymagana aby korzystać z I2P?"
 
 #: i2p2www/pages/site/faq.html:10
 msgid ""
-"What is an \"I2P Site\" and how do I configure my browser so I can use "
-"them?"
-msgstr ""
-"Czym są strony .i2p i jak mam skonfigurować swoją przeglądarkę, aby móc "
-"je przeglądać?"
+"What is an \"I2P Site\" and how do I configure my browser so I can use them?"
+msgstr "Czym są strony .i2p i jak mam skonfigurować swoją przeglądarkę, aby móc je przeglądać?"
 
 #: i2p2www/pages/site/faq.html:11 i2p2www/pages/site/faq.html:109
 msgid "What do the Active x/y numbers mean in the router console?"
@@ -3458,11 +2809,9 @@ msgstr "Mój węzeł ma bardzo mało aktywnych uczestników, czy to jest OK?"
 
 #: i2p2www/pages/site/faq.html:13 i2p2www/pages/site/faq.html:117
 msgid ""
-"I am opposed to certain types of content. How do I keep from "
-"distributing, storing, or accessing them?"
-msgstr ""
-"Mam uprzedzenia do pewnych treści. Jak mogę się ustrzec przed "
-"rozsyłaniem, przechowywaniem i oglądaniem ich?"
+"I am opposed to certain types of content. How do I keep from distributing, "
+"storing, or accessing them?"
+msgstr "Mam uprzedzenia do pewnych treści. Jak mogę się ustrzec przed rozsyłaniem, przechowywaniem i oglądaniem ich?"
 
 #: i2p2www/pages/site/faq.html:14
 msgid "Is it possible to block I2P?"
@@ -3472,9 +2821,7 @@ msgstr "Czy można zablokować I2P?"
 msgid ""
 "In <code>wrapper.log</code> I see an error stating <code>Protocol family "
 "unavailable</code> when I2P is loading"
-msgstr ""
-"W <code>wrapper.log</code> zauważyłem błąd <code>Protocol family "
-"unavailable</code> podczas uruchamiania I2P"
+msgstr "W <code>wrapper.log</code> zauważyłem błąd <code>Protocol family unavailable</code> podczas uruchamiania I2P"
 
 #: i2p2www/pages/site/faq.html:16 i2p2www/pages/site/faq.html:189
 msgid "Most of the I2P Sites within I2P are down?"
@@ -3500,9 +2847,7 @@ msgstr "Jak założyć własną stronę w sieci I2P?"
 msgid ""
 "If I host a website at I2P at home, containing only HTML and CSS, is it "
 "dangerous?"
-msgstr ""
-"Czy hostowanie na komputerze w domu strony .i2p napisanÄ… tylko w HTML i "
-"CSS jest niebezpieczne?"
+msgstr "Czy hostowanie na komputerze w domu strony .i2p napisanÄ… tylko w HTML i CSS jest niebezpieczne?"
 
 #: i2p2www/pages/site/faq.html:25
 msgid "How Does I2P find \".i2p\" websites?"
@@ -3520,17 +2865,13 @@ msgstr "Jakich portów używa I2P?"
 msgid ""
 "I'm missing lots of hosts in my address book. What are some good "
 "subscription links?"
-msgstr ""
-"Brakuje mnóstwa adresów w mojej książce adresowej. Gdzie są jakieś dobre "
-"linki do subskrypcji?"
+msgstr "Brakuje mnóstwa adresów w mojej książce adresowej. Gdzie są jakieś dobre linki do subskrypcji?"
 
 #: i2p2www/pages/site/faq.html:29 i2p2www/pages/site/faq.html:558
 msgid ""
-"How can I access the web console from my other machines or password "
-"protect it?"
-msgstr ""
-"Jak mogę dostać się do konsoli węzła z innych komputerów lub zablokować "
-"dostęp hasłem?"
+"How can I access the web console from my other machines or password protect "
+"it?"
+msgstr "Jak mogę dostać się do konsoli węzła z innych komputerów lub zablokować dostęp hasłem?"
 
 #: i2p2www/pages/site/faq.html:30 i2p2www/pages/site/faq.html:622
 msgid "How can I use applications from my other machines?"
@@ -3542,11 +2883,8 @@ msgstr "Czy jest możliwe użycie I2P jako proxy SOCKS?"
 
 #: i2p2www/pages/site/faq.html:32 i2p2www/pages/site/faq.html:648
 msgid ""
-"How do I access IRC, BitTorrent, or other services on the regular "
-"Internet?"
-msgstr ""
-"Jak mogę połączyć się z IRC, BitTorrentem, lub innymi usługami w "
-"normalnym Internecie?"
+"How do I access IRC, BitTorrent, or other services on the regular Internet?"
+msgstr "Jak mogę połączyć się z IRC, BitTorrentem, lub innymi usługami w normalnym Internecie?"
 
 #: i2p2www/pages/site/faq.html:34
 msgid "Reseeds"
@@ -3556,9 +2894,7 @@ msgstr "Reseed"
 msgid ""
 "My router has been up for several minutes and has zero or very few "
 "connections"
-msgstr ""
-"Mój węzeł jest aktywny od kilku minut i nawiązał zero lub bardzo mało "
-"połączeń"
+msgstr "Mój węzeł jest aktywny od kilku minut i nawiązał zero lub bardzo mało połączeń"
 
 #: i2p2www/pages/site/faq.html:37 i2p2www/pages/site/faq.html:763
 msgid "How do I reseed manually?"
@@ -3572,9 +2908,7 @@ msgstr "Prywatność i bezpieczeństwo"
 msgid ""
 "Is my router an \"exit node\"(outproxy) to the regular Internet? I don't "
 "want it to be."
-msgstr ""
-"Czy mój węzeł jest „węzłem wyjściowym” (proxy wyjściowym - outproxy) do "
-"normalnego Internetu? Nie chcę aby nim był."
+msgstr "Czy mój węzeł jest „węzłem wyjściowym” (proxy wyjściowym - outproxy) do normalnego Internetu? Nie chcę aby nim był."
 
 #: i2p2www/pages/site/faq.html:42 i2p2www/pages/site/faq.html:695
 msgid "Is it easy to detect the use of I2P by analyzing network traffic?"
@@ -3586,11 +2920,9 @@ msgstr "Czy korzystanie z I2P jest bezpieczne?"
 
 #: i2p2www/pages/site/faq.html:44 i2p2www/pages/site/faq.html:685
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
-msgstr ""
-"Widzę adresy IP innych użytkowników sieci I2P w konsoli węzła. Czy to "
-"oznacza, że mój adres IP jest widoczny dla innych?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
+msgstr "Widzę adresy IP innych użytkowników sieci I2P w konsoli węzła. Czy to oznacza, że mój adres IP jest widoczny dla innych?"
 
 #: i2p2www/pages/site/faq.html:45 i2p2www/pages/site/faq.html:704
 msgid "Is using an outproxy safe?"
@@ -3616,18 +2948,13 @@ msgstr "Dlaczego mój węzeł wykorzystuje zbyt dużo mocy procesora?"
 msgid ""
 "My active peers / known peers / participating tunnels / connections / "
 "bandwidth vary dramatically over time! Is anything wrong?"
-msgstr ""
-"Moi aktywni uczestnicy / znani uczestnicy / uczestniczÄ…ce tunele / "
-"połączenia / przepustowość zmieniają się jak szalone z czasem! Czy jest "
-"coÅ› nie tak?"
+msgstr "Moi aktywni uczestnicy / znani uczestnicy / uczestniczące tunele / połączenia / przepustowość zmieniają się jak szalone z czasem! Czy jest coś nie tak?"
 
 #: i2p2www/pages/site/faq.html:55 i2p2www/pages/site/faq.html:963
 msgid ""
-"What makes downloads, torrents, web browsing, and everything else slower "
-"on I2P as compared to the regular internet?"
-msgstr ""
-"Dlaczego pobieranie plików, przeglądanie stron, ogółem wszystko jest "
-"wolniejsze w sieci I2P niż w normalnym internecie?"
+"What makes downloads, torrents, web browsing, and everything else slower on "
+"I2P as compared to the regular internet?"
+msgstr "Dlaczego pobieranie plików, przeglądanie stron, ogółem wszystko jest wolniejsze w sieci I2P niż w normalnym internecie?"
 
 #: i2p2www/pages/site/faq.html:59 i2p2www/pages/site/faq.html:1036
 msgid "I think I found a bug, where can I report it?"
@@ -3640,74 +2967,42 @@ msgstr "Mam pytanie!"
 #: i2p2www/pages/site/faq.html:69
 #, python-format
 msgid ""
-"I2P is written in the <a href=\"%(java)s\">Java programming language</a>."
-" \n"
+"I2P is written in the <a href=\"%(java)s\">Java programming language</a>. \n"
 "It has been tested on Windows, Linux, FreeBSD and OSX. \n"
 "An <a href=\"%(android)s\">Android port</a> is also available."
-msgstr ""
-"I2P jest napisane w języku programowania <a href=\"%(java)s\">Java</a>. "
-"Oprogramowanie zostało przetestowane na systemach Windows, Linux, FreeBSD"
-" i macOS. Dostępny jest również port na <a "
-"href=\"%(android)s\">Androida</a>."
+msgstr "I2P jest napisane w języku programowania <a href=\"%(java)s\">Java</a>. Oprogramowanie zostało przetestowane na systemach Windows, Linux, FreeBSD i macOS. Dostępny jest również port na <a href=\"%(android)s\">Androida</a>."
 
 #: i2p2www/pages/site/faq.html:76
 msgid ""
-"In terms of memory usage, I2P is configured to use 128 MB of RAM by "
-"default. \n"
-"This is sufficient for browsing and IRC usage. However, other activities "
-"may require greater memory allocation. \n"
-"For example, if one wishes to run a high-bandwidth router, participate in"
-" I2P torrents or serve high-traffic hidden services, \n"
+"In terms of memory usage, I2P is configured to use 128 MB of RAM by default. \n"
+"This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. \n"
+"For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, \n"
 "a higher amount of memory is required."
-msgstr ""
-"Odnośnie użycia pamięci: I2P jest domyślnie skonfigurowane do korzystania"
-" z 128 MB pamięci RAM. Jest to wystarczająco do przeglądania stron i IRC,"
-" ale inne aktywności mogą wymagać większej ilości pamięci. Do trasowania "
-"większych ilości danych, korzystania z BitTorrenta i hostowania "
-"intensywnie wykorzystywanych ukrytych usług, niezbędna jest większa ilość"
-" pamięci."
+msgstr "Odnośnie użycia pamięci: I2P jest domyślnie skonfigurowane do korzystania z 128 MB pamięci RAM. Jest to wystarczająco do przeglądania stron i IRC, ale inne aktywności mogą wymagać większej ilości pamięci. Do trasowania większych ilości danych, korzystania z BitTorrenta i hostowania intensywnie wykorzystywanych ukrytych usług, niezbędna jest większa ilość pamięci."
 
 #: i2p2www/pages/site/faq.html:81
 #, python-format
 msgid ""
-"In terms of CPU usage, I2P has been tested to run on modest systems such "
-"as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board "
-"computers.\n"
-"As I2P makes heavy use of cryptographic techniques, a stronger CPU will "
-"be better suited to handle the workload generated by I2P as well as tasks"
-" \n"
-"related to the rest of the system (i.e. Operating System, GUI, Other "
-"processes e.g. Web Browsing)."
-msgstr ""
-"Odnośnie zużycia procesora: działanie I2P zostało sprawdzone na leciwych "
-"systemach, takich jak komputery jednopłytkowe <a "
-"href=\"%(rpi)s\">Raspberry Pi</a>. Ponieważ I2P korzysta z zaawansowanej "
-"kryptografii, mocniejszy procesor byłby odpowiedniejszy do korzystania z "
-"systemu obciążonego I2P i reszty zadań (usługi systemu operacyjnego, "
-"powłoka, inne procesy, przeglądarka internetowa)."
+"In terms of CPU usage, I2P has been tested to run on modest systems such as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board computers.\n"
+"As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks \n"
+"related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing)."
+msgstr "Odnośnie zużycia procesora: działanie I2P zostało sprawdzone na leciwych systemach, takich jak komputery jednopłytkowe <a href=\"%(rpi)s\">Raspberry Pi</a>. Ponieważ I2P korzysta z zaawansowanej kryptografii, mocniejszy procesor byłby odpowiedniejszy do korzystania z systemu obciążonego I2P i reszty zadań (usługi systemu operacyjnego, powłoka, inne procesy, przeglądarka internetowa)."
 
 #: i2p2www/pages/site/faq.html:86
 #, python-format
 msgid ""
-"A comparison of some of the available Java Runtime Environments (JRE) is "
-"available here: \n"
+"A comparison of some of the available Java Runtime Environments (JRE) is available here: \n"
 "<a href=\"%(chart)s\">%(chart)s</a>.\n"
 "\n"
 "Using Sun/Oracle Java or OpenJDK is recommended."
-msgstr ""
-"Porównanie kilku dostępnych środowisk uruchomieniowych Javy (JRE) "
-"dostępne jest pod adresem: <a href=\"%(chart)s\">%(chart)s</a>. Zaleca "
-"siÄ™ korzystanie z Javy od Sun/Oracle lub z OpenJDK."
+msgstr "Porównanie kilku dostępnych środowisk uruchomieniowych Javy (JRE) dostępne jest pod adresem: <a href=\"%(chart)s\">%(chart)s</a>. Zaleca się korzystanie z Javy od Sun/Oracle lub z OpenJDK."
 
 #: i2p2www/pages/site/faq.html:95
 #, python-format
 msgid ""
-"While the main I2P client implementation requires Java, there are several"
-"\n"
+"While the main I2P client implementation requires Java, there are several\n"
 "<a href=\"%(alt)s\">alternative clients</a> which don't require Java."
-msgstr ""
-"Podczas gdy główna implementacja klienta I2P wymaga Javy, istnieje kilka "
-"<a href=\"%(alt)s\">alternatywnych klientów</a>, które jej nie wymagają."
+msgstr "Podczas gdy główna implementacja klienta I2P wymaga Javy, istnieje kilka <a href=\"%(alt)s\">alternatywnych klientów</a>, które jej nie wymagają."
 
 #: i2p2www/pages/site/faq.html:101
 msgid "What is an \"I2P Site?\""
@@ -3716,161 +3011,77 @@ msgstr "Czym jest strona .i2p?"
 #: i2p2www/pages/site/faq.html:103
 #, python-format
 msgid ""
-"Formerly called an eepSite, an I2P Site is a website that is hosted "
-"anonymously, a hidden service which is accessible through your web "
-"browser. \n"
-"It can be accessed by setting your web browser's HTTP proxy to use the "
-"I2P web proxy (typically it listens on localhost port 4444), and browsing"
-" to the site. Detailed instructions for configuring your browse can be "
-"found on the <a href=\"%(browsers)s\">browser configuration page</a>."
-msgstr ""
-"Strona w domenie .i2p jest anonimowo hostowanÄ… stronÄ… internetowÄ…, ukrytÄ…"
-" usługą dostępną poprzez przeglądarkę internetową. Można na nią wejść "
-"uprzednio konfigurujÄ…c proxy swojej przeglÄ…darki (zwykle na "
-"<tt>localhost</tt> i port <tt>4444</tt>). Szczegółowe instrukcje znajdują"
-" siÄ™ na <a href=\"%(browsers)s\">stronie konfiguracji przeglÄ…darki</a>."
+"Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. \n"
+"It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. Detailed instructions for configuring your browse can be found on the <a href=\"%(browsers)s\">browser configuration page</a>."
+msgstr "Strona w domenie .i2p jest anonimowo hostowaną stroną internetową, ukrytą usługą dostępną poprzez przeglądarkę internetową. Można na nią wejść uprzednio konfigurując proxy swojej przeglądarki (zwykle na <tt>localhost</tt> i port <tt>4444</tt>). Szczegółowe instrukcje znajdują się na <a href=\"%(browsers)s\">stronie konfiguracji przeglądarki</a>."
 
 #: i2p2www/pages/site/faq.html:111
 msgid ""
-"x is the number of peers you've sent or received a message from "
-"successfully in the last minute, y is the number of peers seen in the "
-"last hour or so. \n"
-"Try hovering your cursor over the other lines of information for a brief "
-"description."
-msgstr ""
-"X oznacza liczbę uczestników do których wysłałeś lub otrzymałeś wiadomość"
-" w przeciągu ostatniej minuty, Y oznacza liczbę uczestników z którymi "
-"kontaktowałeś się w ciągu ostatniej godziny. Najedź kursorem nad inne "
-"elementy, aby wyświetlić ich krótki opis."
+"x is the number of peers you've sent or received a message from successfully in the last minute, y is the number of peers seen in the last hour or so. \n"
+"Try hovering your cursor over the other lines of information for a brief description."
+msgstr "X oznacza liczbę uczestników do których wysłałeś lub otrzymałeś wiadomość w przeciągu ostatniej minuty, Y oznacza liczbę uczestników z którymi kontaktowałeś się w ciągu ostatniej godziny. Najedź kursorem nad inne elementy, aby wyświetlić ich krótki opis."
 
 #: i2p2www/pages/site/faq.html:119
 msgid ""
-"I2P is an anonymous network - it is designed to withstand attempts at "
-"blocking or censoring of content, thus providing a means for "
-"communication that anyone can use. \n"
-"I2P traffic that transits through your router is encrypted with several "
-"layers of encryption. \n"
-"Except in the case of a serious security vulnerability (of which none are"
-" currently known), \n"
-"it is not possible to know what the contents of the traffic are and thus "
-"not possible to distinguish between traffic which one is opposed to or "
-"not opposed to.  \n"
+"I2P is an anonymous network - it is designed to withstand attempts at blocking or censoring of content, thus providing a means for communication that anyone can use. \n"
+"I2P traffic that transits through your router is encrypted with several layers of encryption. \n"
+"Except in the case of a serious security vulnerability (of which none are currently known), \n"
+"it is not possible to know what the contents of the traffic are and thus not possible to distinguish between traffic which one is opposed to or not opposed to.  \n"
 "\n"
 " We consider the 3 parts of the question:"
-msgstr ""
-"I2P jest siecią anonimową – została zaprojektowana do walki z blokadą i "
-"cenzurą treści, i ma na celu umożliwienie komunikacji każdemu bez "
-"wyjątków. Ruch tunelowany przez Twój węzeł jest zabezpieczony kilkoma "
-"warstwami szyfrowania. Pomijając przypadek wystąpienia poważnej "
-"podatności bezpieczeństwa (żadna jest obecnie znana), nie jest możliwe "
-"ustalenie co jest przesyłane, więc nie ma możliwości rozróżnienia treści "
-"pożądanych od niepożądanych. Odpowiedź na to pytanie składa się z 3 "
-"części:"
+msgstr "I2P jest siecią anonimową – została zaprojektowana do walki z blokadą i cenzurą treści, i ma na celu umożliwienie komunikacji każdemu bez wyjątków. Ruch tunelowany przez Twój węzeł jest zabezpieczony kilkoma warstwami szyfrowania. Pomijając przypadek wystąpienia poważnej podatności bezpieczeństwa (żadna jest obecnie znana), nie jest możliwe ustalenie co jest przesyłane, więc nie ma możliwości rozróżnienia treści pożądanych od niepożądanych. Odpowiedź na to pytanie składa się z 3 części:"
 
 #: i2p2www/pages/site/faq.html:129
 msgid ""
 "<b>Distribution</b><br> \n"
-"All traffic on I2P is encrypted in multiple layers. You don't know a "
-"message's contents, source, or destination.\n"
-"All traffic you route is internal to the I2P network, you are not an <a "
-"href=\"#exit\">exit node</a> (referred to as an outproxy in our "
-"documentation).\n"
-"Your only alternative is to refuse to route <i>any</i> traffic, by "
-"setting your share bandwidth or maximum participating tunnels to 0 (see "
-"above).\n"
-"It would be nice if you didn't do this, you should help the network by "
-"routing traffic for others.\n"
+"All traffic on I2P is encrypted in multiple layers. You don't know a message's contents, source, or destination.\n"
+"All traffic you route is internal to the I2P network, you are not an <a href=\"#exit\">exit node</a> (referred to as an outproxy in our documentation).\n"
+"Your only alternative is to refuse to route <i>any</i> traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n"
+"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n"
 "Over 95&#37; of users route traffic for others."
-msgstr ""
-"<b>rozsyłanie</b><br> \n"
-"Cały ruch w sieci I2P jest szyfrowany kilkoma warstwami. Ni znasz "
-"zawartości, źródła ani przeznaczenia wiadomości. Cały ruch przesyłany "
-"przez Twój węzeł jest ruchem wewnętrznym sieci I2P, nie jesteś <a "
-"href=\"#exit\">węzłem wyjściowym</a> (dokładnie «outproxy» w terminologii"
-" I2P). Jedyną alternatywą jest odmowa przesyłania <i>całego</i> ruchu "
-"poprzez ustawienie opcji „udostępnij” (w zakładce „przepustowość”) lub "
-"parametru <tt>maxParticipatingTunnels</tt> (w zakładce „zaawansowane”) na"
-" 0. Byłoby miło, gdybyś tego nie robił i pomógł sieci poprzez "
-"uczestnictwo w przesyłaniu ruchu innych użytkowników. Ponad 95&#37; "
-"użytkowników uczestniczy w przesyłaniu ruchu innych użytkowników."
+msgstr "<b>rozsyłanie</b><br> \nCały ruch w sieci I2P jest szyfrowany kilkoma warstwami. Ni znasz zawartości, źródła ani przeznaczenia wiadomości. Cały ruch przesyłany przez Twój węzeł jest ruchem wewnętrznym sieci I2P, nie jesteś <a href=\"#exit\">węzłem wyjściowym</a> (dokładnie «outproxy» w terminologii I2P). Jedyną alternatywą jest odmowa przesyłania <i>całego</i> ruchu poprzez ustawienie opcji „udostępnij” (w zakładce „przepustowość”) lub parametru <tt>maxParticipatingTunnels</tt> (w zakładce „zaawansowane”) na 0. Byłoby miło, gdybyś tego nie robił i pomógł sieci poprzez uczestnictwo w przesyłaniu ruchu innych użytkowników. Ponad 95&#37; użytkowników uczestniczy w przesyłaniu ruchu innych użytkowników."
 
 #: i2p2www/pages/site/faq.html:139
 msgid ""
 "<b>Storage</b><br> \n"
-"I2P does not do distributed storage of content, this has to be "
-"specifically installed and configured by the user (with Tahoe-LAFS, for "
-"example). \n"
-"That is a feature of a different anonymous network, <a "
-"href=\"http://freenetproject.org/\">Freenet</a>.\n"
+"I2P does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). \n"
+"That is a feature of a different anonymous network, <a href=\"http://freenetproject.org/\">Freenet</a>.\n"
 "By running I2P, you are not storing content for anyone."
-msgstr ""
-"<b>przechowywanie</b><br>\n"
-"I2P nie jest rozproszonym magazynem treści, tego typu usługa musi być "
-"uprzednio zainstalowana przez użytkownika (przykładem jest Tahoe-LAFS). "
-"Rzoproszonym magazynem treści jest inna sieć anonimowa: <a "
-"href=\"http://freenetproject.org/\">Freenet</a>. Mając uruchomiony węzeł "
-"I2P, nie przechowujesz jakichkolwiek treści innych użytkowników."
+msgstr "<b>przechowywanie</b><br>\nI2P nie jest rozproszonym magazynem treści, tego typu usługa musi być uprzednio zainstalowana przez użytkownika (przykładem jest Tahoe-LAFS). Rzoproszonym magazynem treści jest inna sieć anonimowa: <a href=\"http://freenetproject.org/\">Freenet</a>. Mając uruchomiony węzeł I2P, nie przechowujesz jakichkolwiek treści innych użytkowników."
 
 #: i2p2www/pages/site/faq.html:147
 msgid ""
 "<b>Access</b><br>\n"
-"If there are hidden services which you dislike, you may refrain from "
-"visiting them.\n"
-"Your router will not request any content without your specific "
-"instruction to do so."
-msgstr ""
-"<b>oglÄ…danie</b><br>\n"
-"Jeżeli jest jakaś ukryta usługa z treściami co do których masz "
-"uprzedzenia, po prostu na nią nie wchodź. Twój węzeł nie będzie pobierał "
-"jakiejkolwiek treści bez Twojego żądania."
+"If there are hidden services which you dislike, you may refrain from visiting them.\n"
+"Your router will not request any content without your specific instruction to do so."
+msgstr "<b>oglądanie</b><br>\nJeżeli jest jakaś ukryta usługa z treściami co do których masz uprzedzenia, po prostu na nią nie wchodź. Twój węzeł nie będzie pobierał jakiejkolwiek treści bez Twojego żądania."
 
 #: i2p2www/pages/site/faq.html:155
 msgid ""
-"Yes, by far the easiest and most common way is by blocking bootstrap, or "
-"\"Reseed\" servers. Completely blocking all obfuscated traffic\n"
-"would work as well (although it would break many, many other things that "
-"are not I2P and most are not willing to go this far).\n"
-"In the case of reseed blocking, there is a reseed bundle on Github, "
-"blocking it will also block Github.\n"
-"You can reseed over a proxy (many can be found on Internet if you do not "
-"want to use Tor) or share reseed bundles on a friend-to-friend basis "
-"offline."
-msgstr ""
-"Tak, najprostszÄ… i najbardziej powszechnÄ… metodÄ… jest zablokowanie "
-"serwerów pozwalających znaleźć nowe węzły – tzw. «reseed». Całkowite "
-"zablokowanie całego szyfrowanego ruchu również działałoby (jednakże "
-"spowodowałoby to zablokowane wielu usług niezwiązanych z I2P). W "
-"przypadku zablokowania serwerów reseed, wciąż można byłoby pobrać paczkę "
-"reseed z GitHuba, którą można byłoby zablokować blokując całkowicie "
-"dostęp do GitHuba. Wciąż możliwe byłoby przeprowadzić reseedowanie przez "
-"serwer proxy (oprócz sieci Tor jest wiele innych serwerów dostępnych na "
-"sieci), bądź pobranie (lub wymiana offline) paczki reseed od znajomego."
+"Yes, by far the easiest and most common way is by blocking bootstrap, or \"Reseed\" servers. Completely blocking all obfuscated traffic\n"
+"would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).\n"
+"In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.\n"
+"You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline."
+msgstr "Tak, najprostszą i najbardziej powszechną metodą jest zablokowanie serwerów pozwalających znaleźć nowe węzły – tzw. «reseed». Całkowite zablokowanie całego szyfrowanego ruchu również działałoby (jednakże spowodowałoby to zablokowane wielu usług niezwiązanych z I2P). W przypadku zablokowania serwerów reseed, wciąż można byłoby pobrać paczkę reseed z GitHuba, którą można byłoby zablokować blokując całkowicie dostęp do GitHuba. Wciąż możliwe byłoby przeprowadzić reseedowanie przez serwer proxy (oprócz sieci Tor jest wiele innych serwerów dostępnych na sieci), bądź pobranie (lub wymiana offline) paczki reseed od znajomego."
 
 #: i2p2www/pages/site/faq.html:161
 msgid ""
 "In <code>wrapper.log</code> I see an error that states \"<code>Protocol "
 "family unavailable</code>\" when loading the Router Console"
-msgstr ""
-"W pliku<code>wrapper.log</code> pojawia się błąd: „<code>Protocol family "
-"unavailable</code>” podczas ładowania konsoli węzła."
+msgstr "W pliku<code>wrapper.log</code> pojawia się błąd: „<code>Protocol family unavailable</code>” podczas ładowania konsoli węzła."
 
 #: i2p2www/pages/site/faq.html:163
 msgid ""
-"Often this error will occur with any network enabled java software on "
-"some systems that are configured to use IPv6 by default. There are a few "
-"ways to solve this:"
-msgstr ""
-"Ten błąd często występuje z programami Java wykorzystujących sieć na "
-"niektórych systemach skonfigurowanych do używania domyślnie IPv6. Jest na"
-" to kilka sposobów:"
+"Often this error will occur with any network enabled java software on some "
+"systems that are configured to use IPv6 by default. There are a few ways to "
+"solve this:"
+msgstr "Ten błąd często występuje z programami Java wykorzystujących sieć na niektórych systemach skonfigurowanych do używania domyślnie IPv6. Jest na to kilka sposobów:"
 
 #: i2p2www/pages/site/faq.html:168
 msgid ""
 "On Linux based systems, you can <code>echo 0 > "
 "/proc/sys/net/ipv6/bindv6only</code>"
-msgstr ""
-"Na systemach linuksowych, wpisz code>echo 0 > "
-"/proc/sys/net/ipv6/bindv6only</code>"
+msgstr "Na systemach linuksowych, wpisz code>echo 0 > /proc/sys/net/ipv6/bindv6only</code>"
 
 #: i2p2www/pages/site/faq.html:170
 msgid "Look for the following lines in <code>wrapper.config</code>."
@@ -3878,48 +3089,32 @@ msgstr "Poszukaj następujących linii w <code>wrapper.config</code>:"
 
 #: i2p2www/pages/site/faq.html:174
 msgid ""
-"If the lines are there, uncomment them by removing the \"#\"s. If the "
-"lines are not there, add them without the \"#\"s."
-msgstr ""
-"Jeżeli je napotkasz, od-komentuj je poprzez usunięcie znaków „#”. Jeżeli "
-"ich nie ma, to je dodaj bez znaków „#”."
+"If the lines are there, uncomment them by removing the \"#\"s. If the lines "
+"are not there, add them without the \"#\"s."
+msgstr "Jeżeli je napotkasz, od-komentuj je poprzez usunięcie znaków „#”. Jeżeli ich nie ma, to je dodaj bez znaków „#”."
 
 #: i2p2www/pages/site/faq.html:177
 msgid ""
 "Another option would be to remove the <strong>::1</strong> from "
 "<code>~/.i2p/clients.config</code>"
-msgstr ""
-"Inną opcją jest usunięcie <strong>::1</strong> z "
-"<code>~/.i2p/clients.config</code>."
+msgstr "Inną opcją jest usunięcie <strong>::1</strong> z <code>~/.i2p/clients.config</code>."
 
 #: i2p2www/pages/site/faq.html:181
 msgid ""
-"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> "
-"to take effect, you must completely\n"
+"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> to take effect, you must completely\n"
 "stop the router and the wrapper. Clicking <em>Restart</em> on your\n"
 "router console will NOT reread this file! You must\n"
 "click <em>Shutdown</em>, wait 11 minutes, then start I2P."
-msgstr ""
-"<strong>UWAGA</strong>: wszelkie zmiany w <code>wrapper.config</code> "
-"wymagają całkowitego restartu węzła i wrappera. Samo kliknięcie "
-"<em>Restart</em> w konsoli węzła NIE przeładuje tego pliku! Musisz "
-"kliknąć <em>Zamknij</em>, poczekać 11 minut, i ponownie włączyć I2P."
+msgstr "<strong>UWAGA</strong>: wszelkie zmiany w <code>wrapper.config</code> wymagają całkowitego restartu węzła i wrappera. Samo kliknięcie <em>Restart</em> w konsoli węzła NIE przeładuje tego pliku! Musisz kliknąć <em>Zamknij</em>, poczekać 11 minut, i ponownie włączyć I2P."
 
 #: i2p2www/pages/site/faq.html:191
 #, python-format
 msgid ""
-"If you consider every I2P Site that has ever been created, yes, most of "
-"them are down.\n"
+"If you consider every I2P Site that has ever been created, yes, most of them are down.\n"
 "People and I2P Sites come and go.\n"
-"A good way to get started in I2P is check out a list of I2P Sites that "
-"are currently up.\n"
+"A good way to get started in I2P is check out a list of I2P Sites that are currently up.\n"
 "<a href=\"%(eepstatus)s\">%(eepstatus)s</a> tracks active I2P Sites."
-msgstr ""
-"Jeżeli weźmiemy pod uwagę wszystkie strony .i2p w historii, to tak, "
-"większość z nich jest martwych. Ludzie i strony I2P rodzą się i odchodzą."
-" Dobrym sposobem na rozpoczęcie przygody z I2P jest spojrzenie na listę "
-"czynnych stron .i2p. Strona <a href=\"%(eepstatus)s\">%(eepstatus)s</a> "
-"śledzi aktywne strony I2P."
+msgstr "Jeżeli weźmiemy pod uwagę wszystkie strony .i2p w historii, to tak, większość z nich jest martwych. Ludzie i strony I2P rodzą się i odchodzą. Dobrym sposobem na rozpoczęcie przygody z I2P jest spojrzenie na listę czynnych stron .i2p. Strona <a href=\"%(eepstatus)s\">%(eepstatus)s</a> śledzi aktywne strony I2P."
 
 #: i2p2www/pages/site/faq.html:199
 msgid "Why is I2P listening on port 32000?"
@@ -3927,106 +3122,49 @@ msgstr "Dlaczego I2P nasłuchuje na porcie 32000?"
 
 #: i2p2www/pages/site/faq.html:201
 msgid ""
-"The Tanuki java service wrapper that we use opens this port &mdash;bound "
-"to localhost&mdash; in order to communicate with software running inside "
-"the JVM. \n"
-"When the JVM is launched it is given a key so it can connect to the "
-"wrapper. \n"
-"After the JVM establishes its connection to the wrapper, the wrapper "
-"refuses any additional connections."
-msgstr ""
-"Usługa wrappera Javy „Tanuki” otwiera ten port – przypięty pod localhost "
-"– aby komunikować się z oprogramowaniem uruchomionym wewnątrz JVM. Kiedy "
-"maszyna wirtualna Javy jest uruchamiana, tworzony jest klucz, potrzebny "
-"do połączenia z wrapperem. Po tym jak JVM utworzy połączenie z wrapperem,"
-" wrapper odrzuca wszystkie następne połączenia."
+"The Tanuki java service wrapper that we use opens this port &mdash;bound to localhost&mdash; in order to communicate with software running inside the JVM. \n"
+"When the JVM is launched it is given a key so it can connect to the wrapper. \n"
+"After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections."
+msgstr "Usługa wrappera Javy „Tanuki” otwiera ten port – przypięty pod localhost – aby komunikować się z oprogramowaniem uruchomionym wewnątrz JVM. Kiedy maszyna wirtualna Javy jest uruchamiana, tworzony jest klucz, potrzebny do połączenia z wrapperem. Po tym jak JVM utworzy połączenie z wrapperem, wrapper odrzuca wszystkie następne połączenia."
 
 #: i2p2www/pages/site/faq.html:206
 msgid ""
 "More information can be found in the <a "
 "href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
 "port.html\">wrapper documentation</a>."
-msgstr ""
-"Więcej informacji jest dostępnych w <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
-"port.html\">dokumentacji wrappera</a>."
+msgstr "Więcej informacji jest dostępnych w <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">dokumentacji wrappera</a>."
 
 #: i2p2www/pages/site/faq.html:215
 #, python-format
 msgid ""
-"The proxy config for different browsers is on a <a "
-"href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n"
-"More advanced configs with external tools, such as the browser plug-in "
-"FoxyProxy or the proxy server Privoxy, are possible but could introduce "
-"leaks in your setup."
-msgstr ""
-"Instrukcje konfiguracji serwerów proxy dla różnych przeglądarek "
-"internetowych wraz z zrzutami ekranu znajdujÄ… siÄ™ na <a "
-"href=\"%(browserconfig)s\">osobnej stronie</a>. Bardziej zaawansowane "
-"konfiguracje z użyciem narzędzi zewnętrznych takich jak rozszerzenie do "
-"przeglądarek FoxyProxy bądź serwer Privoxy są możliwe, ale ich "
-"niepoprawna konfiguracja grozi wyciekiem Twoich danych."
+"The proxy config for different browsers is on a <a href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n"
+"More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup."
+msgstr "Instrukcje konfiguracji serwerów proxy dla różnych przeglądarek internetowych wraz z zrzutami ekranu znajdują się na <a href=\"%(browserconfig)s\">osobnej stronie</a>. Bardziej zaawansowane konfiguracje z użyciem narzędzi zewnętrznych takich jak rozszerzenie do przeglądarek FoxyProxy bądź serwer Privoxy są możliwe, ale ich niepoprawna konfiguracja grozi wyciekiem Twoich danych."
 
 #: i2p2www/pages/site/faq.html:223
 msgid ""
 "\n"
-"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is"
-" installed (see the <a "
-"href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel "
-"configuration page</a>), and is automatically started when the I2P router"
-" starts. \n"
-"To connect to it, tell your IRC client to connect to <code>localhost "
-"6668</code>. \n"
-"HexChat-like client users can create a new network with the server "
-"<code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if "
-"you have a proxy server configured).\n"
+"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the <a href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel configuration page</a>), and is automatically started when the I2P router starts. \n"
+"To connect to it, tell your IRC client to connect to <code>localhost 6668</code>. \n"
+"HexChat-like client users can create a new network with the server <code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if you have a proxy server configured).\n"
 "Weechat users can use the following command to add a new network:"
-msgstr ""
-"\n"
-"Tunel do głównego serwera IRC w sieci I2P – Irc2P – został utworzony "
-"podczas instalacji I2P (zajrzyj na <a "
-"href=\"http://localhost:7657/i2ptunnel/index.jsp\">stronÄ™ zarzÄ…dzania "
-"ukrytymi usługami</a>) i jest automatycznie uruchamiany podczas startu "
-"węzła. Aby się z nim połączyć, skonfiguruj swojego klienta IRC do "
-"łączenia się z serwerem <code>localhost 6668</code>. Użytkownicy programu"
-" HexChat mogą utworzyć nową sieć z serwerem <code>localhost/6668</code> "
-"(zaznacz „pomiń serwer proxy”, jeżeli masz skonfigurowany serwer proxy). "
-"Użytkownicy programu Weechat mogą wpisać następujące polecenie:"
+msgstr "\nTunel do głównego serwera IRC w sieci I2P – Irc2P – został utworzony podczas instalacji I2P (zajrzyj na <a href=\"http://localhost:7657/i2ptunnel/index.jsp\">stronę zarządzania ukrytymi usługami</a>) i jest automatycznie uruchamiany podczas startu węzła. Aby się z nim połączyć, skonfiguruj swojego klienta IRC do łączenia się z serwerem <code>localhost 6668</code>. Użytkownicy programu HexChat mogą utworzyć nową sieć z serwerem <code>localhost/6668</code> (zaznacz „pomiń serwer proxy”, jeżeli masz skonfigurowany serwer proxy). Użytkownicy programu Weechat mogą wpisać następujące polecenie:"
 
 #: i2p2www/pages/site/faq.html:238
 msgid ""
-"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the "
-"top of your router console for instructions."
-msgstr ""
-"Kliknij w odnośnik „<a href=\"http://localhost:7658/\">serwer www</a>” w "
-"konsoli Twojego węzła, aby dowiedzieć się więcej."
+"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the top "
+"of your router console for instructions."
+msgstr "Kliknij w odnośnik „<a href=\"http://localhost:7658/\">serwer www</a>” w konsoli Twojego węzła, aby dowiedzieć się więcej."
 
 #: i2p2www/pages/site/faq.html:243
 msgid ""
-"If you're hosting a personal blog or doing something otherwise non-"
-"sensitive, then you are obviously in little danger.\n"
-"If you have privacy needs that are basically non-specific, you are in "
-"little danger. If you are hosting something sensitive, then\n"
-"your services will go down at the same time that your router goes down. "
-"Someone who observes your downtime and correlates it to\n"
-"real-world events could probably de-anonymize you with enough effort. I2P"
-" has defenses available against this like multihoming or\n"
-"Tahoe-LAFS, but they require additional set up and are only appropriate "
-"for some threat models. There is no magic solution, protecting\n"
+"If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.\n"
+"If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then\n"
+"your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to\n"
+"real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or\n"
+"Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting\n"
 "yourself from a real threat will take real consideration in any case."
-msgstr ""
-"Jeżeli prowadzisz własny blog lub udostępniasz jakieś mało wrażliwe "
-"treści, to raczej nie jesteś w większym niebezpieczeństwie. Jeżeli "
-"potrzebujesz podstawowej prywatności, również nie jesteś w większym "
-"niebezpieczeństwie. Jeżeli hostujesz jakieś wrażliwe treści, Twoja usługa"
-" przestanie działać w tym samym momencie co Twój węzeł. Ktoś monitorujący"
-" czas niedostępności Twojej usługi może skorelować to z wydarzeniami w "
-"świecie rzeczywistym i zdeanonimizować Cię przy pewnych nakładach pracy. "
-"Można się przed tym bronić hostując usługę na wielu serwerach "
-"(multihoming) bądź korzystając z Tahoe-LAFS, ale wymaga do dodatkowej "
-"konfiguracji i jest odpowiednie tylko dla pewnego rodzaju zagrożeń. Nie "
-"istnieje jedno idealne rozwiÄ…zanie, ochrona przed inwigilacjÄ… wymaga "
-"rozważnych decyzji w każdym przypadku."
+msgstr "Jeżeli prowadzisz własny blog lub udostępniasz jakieś mało wrażliwe treści, to raczej nie jesteś w większym niebezpieczeństwie. Jeżeli potrzebujesz podstawowej prywatności, również nie jesteś w większym niebezpieczeństwie. Jeżeli hostujesz jakieś wrażliwe treści, Twoja usługa przestanie działać w tym samym momencie co Twój węzeł. Ktoś monitorujący czas niedostępności Twojej usługi może skorelować to z wydarzeniami w świecie rzeczywistym i zdeanonimizować Cię przy pewnych nakładach pracy. Można się przed tym bronić hostując usługę na wielu serwerach (multihoming) bądź korzystając z Tahoe-LAFS, ale wymaga do dodatkowej konfiguracji i jest odpowiednie tylko dla pewnego rodzaju zagrożeń. Nie istnieje jedno idealne rozwiązanie, ochrona przed inwigilacją wymaga rozważnych decyzji w każdym przypadku."
 
 #: i2p2www/pages/site/faq.html:250
 msgid "How Does I2P find \".i2p\" websites? "
@@ -4038,38 +3176,24 @@ msgstr "Jak można dodać adresy do książki adresowej?"
 
 #: i2p2www/pages/site/faq.html:254
 msgid ""
-"You cannot add an address without knowing at least the base32 or base64 "
-"of the site you want to visit. The \"hostname\" which is human-readable "
-"is only an alias for the cryptographic address, which corresponds to the "
-"base32 or base64. Without the cryptographic address, there is no way to "
-"access an I2P Site, this is by design. Distributing the address to people"
-" who do not know it yet is usually the responsibility of the Jump service"
-" provider. Visiting an I2P Site which is unknown will trigger the use of "
-"a Jump service. stats.i2p is the most reliable Jump service."
-msgstr ""
-"Nie można dodać adresu bez znajomości przynajmniej adresu Base32 lub "
-"Base64 strony. Łatwo zapamiętywalna nazwa hosta jest tylko aliasem adresu"
-" kryptograficznego, który odpowiada adresowi Base32/Base64. Bez tego "
-"adresu kryptograficznego nie ma możliwości odwiedzenia danej strony w "
-"sieci I2P. Rozpowszechnianiem adresów osobom, które jaszcze ich nie znają"
-" zajmują się „usługi skoków”. Przy wejściu na nieznany adres węzeł I2P "
-"zaproponuje użycia usługi skoków, z których stats.i2p jest najbardziej "
-"godnÄ… zaufania."
+"You cannot add an address without knowing at least the base32 or base64 of "
+"the site you want to visit. The \"hostname\" which is human-readable is only"
+" an alias for the cryptographic address, which corresponds to the base32 or "
+"base64. Without the cryptographic address, there is no way to access an I2P "
+"Site, this is by design. Distributing the address to people who do not know "
+"it yet is usually the responsibility of the Jump service provider. Visiting "
+"an I2P Site which is unknown will trigger the use of a Jump service. "
+"stats.i2p is the most reliable Jump service."
+msgstr "Nie można dodać adresu bez znajomości przynajmniej adresu Base32 lub Base64 strony. Łatwo zapamiętywalna nazwa hosta jest tylko aliasem adresu kryptograficznego, który odpowiada adresowi Base32/Base64. Bez tego adresu kryptograficznego nie ma możliwości odwiedzenia danej strony w sieci I2P. Rozpowszechnianiem adresów osobom, które jaszcze ich nie znają zajmują się „usługi skoków”. Przy wejściu na nieznany adres węzeł I2P zaproponuje użycia usługi skoków, z których stats.i2p jest najbardziej godną zaufania."
 
 #: i2p2www/pages/site/faq.html:256
 msgid ""
-"If you're hosting a site via i2ptunnel, then it won't have a registration"
-" with a jump service yet. To give it a URL locally, then visit the "
+"If you're hosting a site via i2ptunnel, then it won't have a registration "
+"with a jump service yet. To give it a URL locally, then visit the "
 "configuration page and click the button that says \"Add to Local Address "
-"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper"
-" URL and share it."
-msgstr ""
-"Hostowanie strony korzystając z wbudowanej aplikacji „i2ptunnel” nie "
-"spowoduje automatycznej rejestracji strony w usłudze skoków. Aby "
-"przydzielić nazwę lokalnie, wejdź na stronę konfiguracji i kliknij „dodaj"
-" do lokalnej książki adresowej”. Następnie przejdź do <a "
-"href=\"http://127.0.0.1:7657/dns\">http://127.0.0.1:7657/dns</a> i "
-"udostępnij innym odnośnik pomocniczy."
+"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper "
+"URL and share it."
+msgstr "Hostowanie strony korzystając z wbudowanej aplikacji „i2ptunnel” nie spowoduje automatycznej rejestracji strony w usłudze skoków. Aby przydzielić nazwę lokalnie, wejdź na stronę konfiguracji i kliknij „dodaj do lokalnej książki adresowej”. Następnie przejdź do <a href=\"http://127.0.0.1:7657/dns\">http://127.0.0.1:7657/dns</a> i udostępnij innym odnośnik pomocniczy."
 
 #: i2p2www/pages/site/faq.html:261
 msgid "The ports that are used by I2P can be divided into 2 sections:"
@@ -4091,18 +3215,10 @@ msgstr "Poniżej szczegółowy opis."
 
 #: i2p2www/pages/site/faq.html:275
 msgid ""
-"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not "
-"use port 8887; \n"
-"    a random port between 9000 and 31000 is selected when the program is "
-"run for the first time. \n"
-"    The selected port is shown on the router <a "
-"href=\"http://127.0.0.1:7657/confignet\">configuration page</a>."
-msgstr ""
-"Porty wystawione do internetu<br>\n"
-"Uwaga: od wersji 0.7.8 nowe instalacje nie wykorzystujÄ… portu 8887, tylko"
-" losowy port z przedziału &#91;9000, 31000&#93; wybrany podczas "
-"pierwszego uruchomienia węzła. Wybrany port jest wyświetlany na <a "
-"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> węzła."
+"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not use port 8887; \n"
+"    a random port between 9000 and 31000 is selected when the program is run for the first time. \n"
+"    The selected port is shown on the router <a href=\"http://127.0.0.1:7657/confignet\">configuration page</a>."
+msgstr "Porty wystawione do internetu<br>\nUwaga: od wersji 0.7.8 nowe instalacje nie wykorzystują portu 8887, tylko losowy port z przedziału &#91;9000, 31000&#93; wybrany podczas pierwszego uruchomienia węzła. Wybrany port jest wyświetlany na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> węzła."
 
 #: i2p2www/pages/site/faq.html:278
 msgid "OUTBOUND"
@@ -4111,12 +3227,9 @@ msgstr "WYCHODZÄ„CE"
 #: i2p2www/pages/site/faq.html:280
 msgid ""
 "UDP from the random port listed on the <a "
-"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to "
-"arbitrary remote UDP ports, allowing for replies"
-msgstr ""
-"UDP losowego portu wyświetlanego na <a "
-"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> do "
-"dowolnych zdalnych portów UDP, z możliwością odpowiedzi"
+"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to arbitrary"
+" remote UDP ports, allowing for replies"
+msgstr "UDP losowego portu wyświetlanego na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> do dowolnych zdalnych portów UDP, z możliwością odpowiedzi"
 
 #: i2p2www/pages/site/faq.html:281
 msgid "TCP from random high ports to arbitrary remote TCP ports"
@@ -4125,13 +3238,8 @@ msgstr "losowy wysoki TCP do dowolnych zdalnych portów TCP"
 #: i2p2www/pages/site/faq.html:282
 msgid ""
 "Outbound UDP on port 123, allowing for replies. \n"
-"        This is necessary for I2P's internal time sync (via SNTP - "
-"querying a random SNTP host in pool.ntp.org or another server you "
-"specify)"
-msgstr ""
-"UDP do portu 123, z możliwością odpowiedzi (jest to niezbędne do "
-"wewnętrznej usługi synchronizacji czasu I2P poprzez SNTP – odpytuje "
-"losowy serwer SNTP z pool.ntp.org lub inny wybrany przez użytkownika)"
+"        This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)"
+msgstr "UDP do portu 123, z możliwością odpowiedzi (jest to niezbędne do wewnętrznej usługi synchronizacji czasu I2P poprzez SNTP – odpytuje losowy serwer SNTP z pool.ntp.org lub inny wybrany przez użytkownika)"
 
 #: i2p2www/pages/site/faq.html:285
 msgid "INBOUND"
@@ -4142,36 +3250,26 @@ msgid ""
 "(Optional, recommended) UDP to the port noted on the <a "
 "href=\"http://127.0.0.1:7657/confignet\">configuration page</a> from "
 "arbitrary locations"
-msgstr ""
-"(opcjonalny, zalecany) UDP wyświetlany na <a "
-"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> z "
-"dowolnych zdalnych adresów"
+msgstr "(opcjonalny, zalecany) UDP wyświetlany na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> z dowolnych zdalnych adresów"
 
 #: i2p2www/pages/site/faq.html:288
 msgid ""
 "(Optional, recommended) TCP to the port noted on <a "
 "href=\"http://127.0.0.1:7657/confignet\">configuration page</a> from "
 "arbitrary locations"
-msgstr ""
-"(opcjonalny, zalecany) TCP wyświetlany na <a "
-"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> z "
-"dowolnych zdalnych adresów"
+msgstr "(opcjonalny, zalecany) TCP wyświetlany na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> z dowolnych zdalnych adresów"
 
 #: i2p2www/pages/site/faq.html:289
 msgid ""
 "Inbound TCP can be disabled on the <a "
 "href=\"http://127.0.0.1:7657/confignet\">configuration page</a>"
-msgstr ""
-"przychodzący TCP można dezaktywować na <a "
-"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a>"
+msgstr "przychodzący TCP można dezaktywować na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a>"
 
 #: i2p2www/pages/site/faq.html:292
 msgid ""
 "Local I2P ports, listening only to local connections by default, except "
 "where noted:"
-msgstr ""
-"Lokalne porty I2P, nasłuchujące domyślnie tylko lokalnych połączeń, o ile"
-" nie zanotowano inaczej:"
+msgstr "Lokalne porty I2P, nasłuchujące domyślnie tylko lokalnych połączeń, o ile nie zanotowano inaczej:"
 
 #: i2p2www/pages/site/faq.html:296
 msgid "PORT"
@@ -4189,204 +3287,106 @@ msgstr "OPIS"
 msgid ""
 "Cannot be changed. Binds to all interfaces. May be disabled on <a "
 "href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
-msgstr ""
-"Niezmienialny. Podpina się pod wszystkie interfejsy. Może zostać "
-"wyłączony na <a href=\"http://127.0.0.1:7657/confignet\">stronie "
-"konfiguracji „sieć”</a>."
+msgstr "Niezmienialny. Podpina się pod wszystkie interfejsy. Może zostać wyłączony na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji „sieć”</a>."
 
 #: i2p2www/pages/site/faq.html:324
 msgid ""
-"A higher level socket API for clients. Disabled by default. May be "
-"enabled/disabled on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
+"A higher level socket API for clients. Disabled by default. May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
 "          May be changed in the bob.config file."
-msgstr ""
-"Gniazdo wysokopoziomowego API dla aplikacji klienckich. Domyślnie "
-"wyłączone. Może zostać włączony/wyłączony na <a "
-"href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji "
-"„klienty”</a>. Można zmienić w pliku bob.config."
+msgstr "Gniazdo wysokopoziomowego API dla aplikacji klienckich. Domyślnie wyłączone. Może zostać włączony/wyłączony na <a href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji „klienty”</a>. Można zmienić w pliku bob.config."
 
 #: i2p2www/pages/site/faq.html:336 i2p2www/pages/site/faq.html:347
 #: i2p2www/pages/site/faq.html:358
 msgid ""
-"May be disabled or changed on the i2ptunnel page in the router console. "
-"May also be configured to be bound to a specific interface or all "
-"interfaces."
-msgstr ""
-"Może zostać wyłączony lub zmieniony na stronie „zarządzanie ukrytymi "
-"usługami” w konsoli węzła. Można również przypiąć do określonego lub "
-"wszystkich interfejsów sieciowych."
+"May be disabled or changed on the i2ptunnel page in the router console. May "
+"also be configured to be bound to a specific interface or all interfaces."
+msgstr "Może zostać wyłączony lub zmieniony na stronie „zarządzanie ukrytymi usługami” w konsoli węzła. Można również przypiąć do określonego lub wszystkich interfejsów sieciowych."
 
 #: i2p2www/pages/site/faq.html:369
 msgid ""
 "Binds to the LAN address. \n"
-"          May be changed with advanced config "
-"<code>i2np.upnp.HTTPPort=nnnn</code>. \n"
-"          May be disabled on <a "
-"href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
-msgstr ""
-"Podpina się pod adresy LAN. Może zostać zmieniony używając zaawansowanego"
-" ustawienia <code>i2np.upnp.HTTPPort=nnnn</code>. Może zostać wyłączony "
-"na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji "
-"„sieć”</a>."
+"          May be changed with advanced config <code>i2np.upnp.HTTPPort=nnnn</code>. \n"
+"          May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
+msgstr "Podpina się pod adresy LAN. Może zostać zmieniony używając zaawansowanego ustawienia <code>i2np.upnp.HTTPPort=nnnn</code>. Może zostać wyłączony na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji „sieć”</a>."
 
 #: i2p2www/pages/site/faq.html:382
 msgid ""
 "Binds to the LAN address. \n"
-"          May be changed with advanced config "
-"<code>i2np.upnp.SSDPPort=nnnn</code>. \n"
-"          May be disabled on <a "
-"href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
-msgstr ""
-"Podpina się pod adresy LAN. Może zostać zmieniony używając zaawansowanego"
-" ustawienia <code>i2np.upnp.SSDPPort=nnnn</code>. Może zostać wyłączony "
-"na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji "
-"„sieć”</a>."
+"          May be changed with advanced config <code>i2np.upnp.SSDPPort=nnnn</code>. \n"
+"          May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
+msgstr "Podpina się pod adresy LAN. Może zostać zmieniony używając zaawansowanego ustawienia <code>i2np.upnp.SSDPPort=nnnn</code>. Może zostać wyłączony na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji „sieć”</a>."
 
 #: i2p2www/pages/site/faq.html:395
 msgid ""
 "Used by client apps. \n"
-"          May be changed to a different port on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this "
-"is not recommended. \n"
-"          May be to bind to a different interface or all interfaces, or "
-"disabled, on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>."
-msgstr ""
-"Używane przez aplikacje klienckie. Można zmienić port na <a "
-"href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji "
-"„klienty”</a>, ale nie jest to zalecane. Można podpiąć do określonego lub"
-" wszystkich interfejsów sieciowych, lub zostać wyłączony."
+"          May be changed to a different port on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this is not recommended. \n"
+"          May be to bind to a different interface or all interfaces, or disabled, on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>."
+msgstr "Używane przez aplikacje klienckie. Można zmienić port na <a href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji „klienty”</a>, ale nie jest to zalecane. Można podpiąć do określonego lub wszystkich interfejsów sieciowych, lub zostać wyłączony."
 
 #: i2p2www/pages/site/faq.html:408
 msgid ""
-"A higher level socket API for clients Only opened when a SAM V3 client "
-"requests a UDP session. \n"
-"          May be enabled/disabled on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
-"          May be changed in the <code>clients.config</code> file with the"
-" SAM command line option <code>sam.udp.port=nnnn</code>."
-msgstr ""
-"Gniazdo wysokopoziomowego API dla aplikacji klienckich. Otwierany tylko "
-"gdy klient SAM v3 zażąda sesji UDP.  Może zostać włączony/wyłączony na <a"
-" href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji "
-"„klienty”</a>. Może zostać zmieniony w pliku <code>clients.config</code> "
-"w linijce <code>sam.udp.port=nnnn</code>."
+"A higher level socket API for clients Only opened when a SAM V3 client requests a UDP session. \n"
+"          May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
+"          May be changed in the <code>clients.config</code> file with the SAM command line option <code>sam.udp.port=nnnn</code>."
+msgstr "Gniazdo wysokopoziomowego API dla aplikacji klienckich. Otwierany tylko gdy klient SAM v3 zażąda sesji UDP.  Może zostać włączony/wyłączony na <a href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji „klienty”</a>. Może zostać zmieniony w pliku <code>clients.config</code> w linijce <code>sam.udp.port=nnnn</code>."
 
 #: i2p2www/pages/site/faq.html:421
 msgid ""
-"A higher level socket API for clients Disabled by default for new "
-"installs as of release 0.6.5. \n"
-"          May be enabled/disabled on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
+"A higher level socket API for clients Disabled by default for new installs as of release 0.6.5. \n"
+"          May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
 "          May be changed in the <code>clients.config</code> file."
-msgstr ""
-"Gniazdo wysokopoziomowego API dla aplikacji klienckich. Domyślnie "
-"wyłączony dla świeżych instalacji od wersji 0.6.5. Może zostać "
-"włączony/wyłączony na <a "
-"href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji "
-"„klienty”</a>. Może zostać zmieniony w pliku <code>clients.config</code>."
+msgstr "Gniazdo wysokopoziomowego API dla aplikacji klienckich. Domyślnie wyłączony dla świeżych instalacji od wersji 0.6.5. Może zostać włączony/wyłączony na <a href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji „klienty”</a>. Może zostać zmieniony w pliku <code>clients.config</code>."
 
 #: i2p2www/pages/site/faq.html:434
 msgid ""
 "May be disabled in the <code>clients.config</code>file. \n"
-"          May also be configured to be bound to a specific interface or "
-"all interfaces in that file."
-msgstr ""
-"Może zostać wyłączony w pliku <code>clients.config</code>. Może również "
-"zostać przypisany do określonego lub wszystkich interfejsów sieciowych w "
-"tym pliku konfiguracyjnym."
+"          May also be configured to be bound to a specific interface or all interfaces in that file."
+msgstr "Może zostać wyłączony w pliku <code>clients.config</code>. Może również zostać przypisany do określonego lub wszystkich interfejsów sieciowych w tym pliku konfiguracyjnym."
 
 #: i2p2www/pages/site/faq.html:446
 msgid ""
 "May be disabled in the <code>clients.config</code> file. \n"
-"          May also be configured to be bound to a specific interface or "
-"all interfaces in the <code>jetty.xml</code> file."
-msgstr ""
-"Może zostać wyłączony w pliku <code>clients.config</code>. Może również "
-"zostać przypisany do określonego lub wszystkich interfejsów sieciowych w "
-"pliku <code>jetty.xml</code>."
+"          May also be configured to be bound to a specific interface or all interfaces in the <code>jetty.xml</code> file."
+msgstr "Może zostać wyłączony w pliku <code>clients.config</code>. Może również zostać przypisany do określonego lub wszystkich interfejsów sieciowych w pliku <code>jetty.xml</code>."
 
 #: i2p2www/pages/site/faq.html:458 i2p2www/pages/site/faq.html:470
 #: i2p2www/pages/site/faq.html:482
 msgid ""
 "May be disabled or changed on the i2ptunnel page in the router console. \n"
-"          May also be configured to be bound to a specific interface or "
-"all interfaces."
-msgstr ""
-"Może zostać wyłączony lub zmieniony na stronie „zarządzanie ukrytymi "
-"usługami” w konsoli węzła. Można również przypiąć do określonego lub "
-"wszystkich interfejsów sieciowych."
+"          May also be configured to be bound to a specific interface or all interfaces."
+msgstr "Może zostać wyłączony lub zmieniony na stronie „zarządzanie ukrytymi usługami” w konsoli węzła. Można również przypiąć do określonego lub wszystkich interfejsów sieciowych."
 
 #: i2p2www/pages/site/faq.html:494
 msgid ""
 "Outbound to 32000 only, does not listen on this port. \n"
-"          Starts at 31000 and will increment until 31999 looking for a "
-"free port. \n"
-"          To change, see the <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
-"port.html\">wrapper documentation</a>. \n"
+"          Starts at 31000 and will increment until 31999 looking for a free port. \n"
+"          To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n"
 "          For more information see <a href=\"#port32000\">below</a>."
-msgstr ""
-"Wychodzący tylko na 32000, nie nasłuchuje na tym porcie. Rozpoczyna od "
-"31000 i kolejno szuka wolnego portu aż do 31999. Aby zmienić, zajrzyj do "
-"<a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
-"port.html\">dokumentacji wrappera</a>. Więcej informacji <a "
-"href=\"#port32000\">poniżej</a>."
+msgstr "Wychodzący tylko na 32000, nie nasłuchuje na tym porcie. Rozpoczyna od 31000 i kolejno szuka wolnego portu aż do 31999. Aby zmienić, zajrzyj do <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">dokumentacji wrappera</a>. Więcej informacji <a href=\"#port32000\">poniżej</a>."
 
 #: i2p2www/pages/site/faq.html:508
 msgid ""
-"To change, see the <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
-"port.html\">wrapper documentation</a>. \n"
+"To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n"
 "          For more information see <a href=\"#port32000\">below</a>."
-msgstr ""
-"Aby zmienić, zajrzyj do <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
-"port.html\">dokumentacji wrappera</a>. Więcej informacji <a "
-"href=\"#port32000\">poniżej</a>."
+msgstr "Aby zmienić, zajrzyj do <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">dokumentacji wrappera</a>. Więcej informacji <a href=\"#port32000\">poniżej</a>."
 
 #: i2p2www/pages/site/faq.html:516
 msgid ""
-"The local I2P ports and the I2PTunnel ports do not need to be reachable "
-"from \n"
-"remote machines, but *should* be reachable locally.  You can also create"
-" \n"
-"additional ports for I2PTunnel instances via "
-"http://localhost:7657/i2ptunnel/ \n"
-"(and in turn, would need to get your firewall to allow you local access, "
-"but \n"
+"The local I2P ports and the I2PTunnel ports do not need to be reachable from \n"
+"remote machines, but *should* be reachable locally.  You can also create \n"
+"additional ports for I2PTunnel instances via http://localhost:7657/i2ptunnel/ \n"
+"(and in turn, would need to get your firewall to allow you local access, but \n"
 "not remote access, unless desired)."
-msgstr ""
-"Lokalne porty i porty tuneli ukrytych usług I2P nie muszą być osiągalne "
-"ze zdalnych maszyn, ale <u>powinny</u> być osiągalne lokalnie. Możesz "
-"także potrzebować dodatkowych portów dla utworzonych tuneli ukrytych "
-"usług I2P na stronie „<a "
-"href=\"http://localhost:7657/i2ptunnel/\">zarzÄ…dzanie ukrytymi "
-"usługami</a> ”(które też wymagałyby lokalnego dostępu, ale nie zdalnego, "
-"o ile tego nie potrzebujesz)."
+msgstr "Lokalne porty i porty tuneli ukrytych usług I2P nie muszą być osiągalne ze zdalnych maszyn, ale <u>powinny</u> być osiągalne lokalnie. Możesz także potrzebować dodatkowych portów dla utworzonych tuneli ukrytych usług I2P na stronie „<a href=\"http://localhost:7657/i2ptunnel/\">zarządzanie ukrytymi usługami</a> ”(które też wymagałyby lokalnego dostępu, ale nie zdalnego, o ile tego nie potrzebujesz)."
 
 #: i2p2www/pages/site/faq.html:524
 msgid ""
-"So, to summarize, nothing needs to be reachable by unsolicited remote "
-"peers, but\n"
-"if you can configure your NAT/firewall to allow inbound UDP and TCP the "
-"<a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll"
-"\n"
-"get better performance.  You will also need to be able to send outbound "
-"UDP packets\n"
-"to arbitrary remote peers (blocking IPs randomly with something like "
-"PeerGuardian\n"
+"So, to summarize, nothing needs to be reachable by unsolicited remote peers, but\n"
+"if you can configure your NAT/firewall to allow inbound UDP and TCP the <a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll\n"
+"get better performance.  You will also need to be able to send outbound UDP packets\n"
+"to arbitrary remote peers (blocking IPs randomly with something like PeerGuardian\n"
 "only hurts you - don't do it)."
-msgstr ""
-"Podsumowując, żadne porty nie muszą być dostępne z zewnątrz, ale jeżeli "
-"potrafisz skonfigurować swój NAT/zaporę sieciową, aby przekierować "
-"przychodzące połączenia UDP i TCP do <a "
-"href=\"http://localhost:7657/config\">portu skonfigurowanego na tej "
-"stronie</a>, będziesz się cieszył(a) większą wydajnością. Musisz też "
-"zezwolić na wychodzące pakiety UDP do dowolnych zdalnych komputerów "
-"(blokowanie losowych IP narzędziami typu PeerGuardian tylko przynosi "
-"więcej szkody niż pożytku – nie rób tego)."
+msgstr "Podsumowując, żadne porty nie muszą być dostępne z zewnątrz, ale jeżeli potrafisz skonfigurować swój NAT/zaporę sieciową, aby przekierować przychodzące połączenia UDP i TCP do <a href=\"http://localhost:7657/config\">portu skonfigurowanego na tej stronie</a>, będziesz się cieszył(a) większą wydajnością. Musisz też zezwolić na wychodzące pakiety UDP do dowolnych zdalnych komputerów (blokowanie losowych IP narzędziami typu PeerGuardian tylko przynosi więcej szkody niż pożytku – nie rób tego)."
 
 #: i2p2www/pages/site/faq.html:534
 msgid "This question can be answered in 3 parts:"
@@ -4396,41 +3396,21 @@ msgstr "Odpowiedź na to pytanie składa się z 3 części:"
 msgid ""
 "My router often displays a message saying \"Website Not Found In Address "
 "Book\", why do I see this message?"
-msgstr ""
-"Mój węzeł często wyświetla komunikat „nie znaleziono strony www w książce"
-" adresowej”, jaka jest tego przyczyna?"
+msgstr "Mój węzeł często wyświetla komunikat „nie znaleziono strony www w książce adresowej”, jaka jest tego przyczyna?"
 
 #: i2p2www/pages/site/faq.html:540
 msgid ""
-"Human-readable addresses such as <i>http://website.i2p</i> are references"
-" to a long, random string known as a <b>destination</b>. \n"
-"    These references are registered and stored at address book services "
-"such as stats.i2p, which is run by zzz. \n"
-"    You will often encounter a \"b32\" address. A \"b32\" is a hash "
-"(specifically, a <a "
-"href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n"
-"    destination. This hash is appended with \".b32.i2p\" and serves as a "
-"convenient way to link to your hidden service, without requiring any "
-"registration on an address book service."
-msgstr ""
-"Czytelne dla ludzi adresy, takie jak <i>http://website.i2p</i> sÄ… "
-"odnośnikami do długich ciągów znaków określanych jako <b>miejsca "
-"przeznaczenia</b>. Te odnośniki są rejestrowane i przetrzymywane w "
-"usługach książek adresowych takich jak np. stats.i2p (zarządzana przez "
-"użytkownika zzz). Często spotkasz się z adresami „b32”. Adres „b32” jest "
-"zahaszowanym (dokładnie przez funkcję <a "
-"href=\"https://pl.wikipedia.org/wiki/SHA-2\">SHA256</a>) adresem miejsca "
-"przeznaczenia. Do tego haszu jest doklejony ciąg „.b32.i2p”, aby utworzyć"
-" klikalny odnośnik do ukrytej usługi, który nie wymaga rejestracji w "
-"książce adresowej."
+"Human-readable addresses such as <i>http://website.i2p</i> are references to a long, random string known as a <b>destination</b>. \n"
+"    These references are registered and stored at address book services such as stats.i2p, which is run by zzz. \n"
+"    You will often encounter a \"b32\" address. A \"b32\" is a hash (specifically, a <a href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n"
+"    destination. This hash is appended with \".b32.i2p\" and serves as a convenient way to link to your hidden service, without requiring any registration on an address book service."
+msgstr "Czytelne dla ludzi adresy, takie jak <i>http://website.i2p</i> są odnośnikami do długich ciągów znaków określanych jako <b>miejsca przeznaczenia</b>. Te odnośniki są rejestrowane i przetrzymywane w usługach książek adresowych takich jak np. stats.i2p (zarządzana przez użytkownika zzz). Często spotkasz się z adresami „b32”. Adres „b32” jest zahaszowanym (dokładnie przez funkcję <a href=\"https://pl.wikipedia.org/wiki/SHA-2\">SHA256</a>) adresem miejsca przeznaczenia. Do tego haszu jest doklejony ciąg „.b32.i2p”, aby utworzyć klikalny odnośnik do ukrytej usługi, który nie wymaga rejestracji w książce adresowej."
 
 #: i2p2www/pages/site/faq.html:544
 msgid ""
-"It is possible to add subscriptions to your router's configuration which "
-"may reduce the frequency of these messages."
-msgstr ""
-"Można dodać zasubskrybować adresy do książki adresowej Twojego węzła, aby"
-" komunikat ten pojawiał się rzadziej."
+"It is possible to add subscriptions to your router's configuration which may"
+" reduce the frequency of these messages."
+msgstr "Można dodać zasubskrybować adresy do książki adresowej Twojego węzła, aby komunikat ten pojawiał się rzadziej."
 
 #: i2p2www/pages/site/faq.html:545
 msgid "What is an address book subscription?"
@@ -4438,21 +3418,16 @@ msgstr "Czym jest subskrypcja książki adresowej?"
 
 #: i2p2www/pages/site/faq.html:546
 msgid ""
-"This is a list of files hosted on various I2P websites each of which "
-"contain a list of I2P hosts and their associated destinations."
-msgstr ""
-"Są to pliki hostowane na różnych witrynach w sieci I2P zawierające listy "
-"stron .i2p wraz z odpowiadajÄ…cymi im przeznaczeniami."
+"This is a list of files hosted on various I2P websites each of which contain"
+" a list of I2P hosts and their associated destinations."
+msgstr "Są to pliki hostowane na różnych witrynach w sieci I2P zawierające listy stron .i2p wraz z odpowiadającymi im przeznaczeniami."
 
 #: i2p2www/pages/site/faq.html:547
 msgid ""
 "The address book is located at <a "
 "href=\"http://localhost:7657/dns\">http://localhost:7657/dns</a> where "
 "further information can be found."
-msgstr ""
-"Książka adresowa znajduje się w konsoli węzła pod adresem <a "
-"href=\"http://localhost:7657/dns\">http://localhost:7657/dns</a>, gdzie "
-"znajdujÄ… siÄ™ dalsze informacje."
+msgstr "Książka adresowa znajduje się w konsoli węzła pod adresem <a href=\"http://localhost:7657/dns\">http://localhost:7657/dns</a>, gdzie znajdują się dalsze informacje."
 
 #: i2p2www/pages/site/faq.html:548
 msgid "What are some good address book subscription links?"
@@ -4464,14 +3439,10 @@ msgstr "Skorzystaj z następujących:"
 
 #: i2p2www/pages/site/faq.html:560
 msgid ""
-"For security purposes, the router's admin console by default only listens"
-" for connections on the local interface.  \n"
+"For security purposes, the router's admin console by default only listens for connections on the local interface.  \n"
 "\n"
 "There are two methods for accessing the console remotely:"
-msgstr ""
-"Ze względów bezpieczeństwa, konsola administracyjna węzła domyślnie "
-"nasłuchuje połączeń tylko na lokalnym interfejsie sieciowym. Są dwie "
-"metody na zdalny dostęp do konsoli węzła:"
+msgstr "Ze względów bezpieczeństwa, konsola administracyjna węzła domyślnie nasłuchuje połączeń tylko na lokalnym interfejsie sieciowym. Są dwie metody na zdalny dostęp do konsoli węzła:"
 
 #: i2p2www/pages/site/faq.html:566 i2p2www/pages/site/faq.html:572
 msgid "SSH Tunnel"
@@ -4481,9 +3452,7 @@ msgstr "Tunel SSH"
 msgid ""
 "Configuring your console to be available on a Public IP address with a "
 "username &amp; password"
-msgstr ""
-"Konfiguracja konsoli. aby była dostępna z zewnątrz z publicznego adresu "
-"IP i chroniona hasłem"
+msgstr "Konfiguracja konsoli. aby była dostępna z zewnątrz z publicznego adresu IP i chroniona hasłem"
 
 #: i2p2www/pages/site/faq.html:569
 msgid "These are detailed below:"
@@ -4491,25 +3460,15 @@ msgstr "Opisy poniżej:"
 
 #: i2p2www/pages/site/faq.html:573
 msgid ""
-"If you are running a Unix-like Operating System, this is the easiest "
-"method for remotely accessing your I2P console. \n"
-"      (Note: SSH server software is available for systems running "
-"Windows, for example <a "
-"href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)"
-msgstr ""
-"Na systemach uniksopodobnych, jest to najłatwiejszy sposób na zdalny "
-"dostęp do konsoli węzła I2P.<br>\n"
-"(Uwaga: serwer SSH jest również dostępny na system Windows, na przykład "
-"<a "
-"href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>.)"
+"If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. \n"
+"      (Note: SSH server software is available for systems running Windows, for example <a href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)"
+msgstr "Na systemach uniksopodobnych, jest to najłatwiejszy sposób na zdalny dostęp do konsoli węzła I2P.<br>\n(Uwaga: serwer SSH jest również dostępny na system Windows, na przykład <a href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>.)"
 
 #: i2p2www/pages/site/faq.html:575
 msgid ""
-"Once you have configured SSH access to your system, the '-L' flag is "
-"passed to SSH with appropriate arguments - for example:"
-msgstr ""
-"Po skonfigurowaniu dostępu do Twojego systemu przez SSH, użyj parametru "
-"„-L” z odpowiednimi argumentami, przykład:"
+"Once you have configured SSH access to your system, the '-L' flag is passed "
+"to SSH with appropriate arguments - for example:"
+msgstr "Po skonfigurowaniu dostępu do Twojego systemu przez SSH, użyj parametru „-L” z odpowiednimi argumentami, przykład:"
 
 #: i2p2www/pages/site/faq.html:593
 msgid "Open <code>~/.i2p/clients.config</code> and replace"
@@ -4517,429 +3476,215 @@ msgstr "Otwórz plik <code>~/.i2p/clients.config</code> i zastąp"
 
 #: i2p2www/pages/site/faq.html:607
 msgid ""
-"Go to <a "
-"href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a>"
-" and add a console username and password if desired - \n"
-"        Adding a username &amp; password is highly recommended to secure "
-"your I2P console from tampering, which could lead to de-anonymization."
-msgstr ""
-"Przejdź do <a "
-"href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a>"
-" i opcjonalnie zabezpiecz swoją konsolę węzła I2P nazwą użytkownika i "
-"hasłem – jest to szczególnie zalecane, aby ktoś nie namieszał w Twojej "
-"konsoli narażając Cię na demaskację."
+"Go to <a href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a> and add a console username and password if desired - \n"
+"        Adding a username &amp; password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization."
+msgstr "Przejdź do <a href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a> i opcjonalnie zabezpiecz swoją konsolę węzła I2P nazwą użytkownika i hasłem – jest to szczególnie zalecane, aby ktoś nie namieszał w Twojej konsoli narażając Cię na demaskację."
 
 #: i2p2www/pages/site/faq.html:609
 msgid ""
-"Go to <a "
-"href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and "
-"hit \"Graceful restart\", \n"
+"Go to <a href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and hit \"Graceful restart\", \n"
 "        which restarts the JVM and reloads the client applications"
-msgstr ""
-"Przejdź do <a "
-"href=\"http://localhost:7657/index\">http://localhost:7657/index</a> i "
-"kliknij „restart”, aby zrestartować JVM i przeładować aplikacje "
-"klienckie."
+msgstr "Przejdź do <a href=\"http://localhost:7657/index\">http://localhost:7657/index</a> i kliknij „restart”, aby zrestartować JVM i przeładować aplikacje klienckie."
 
 #: i2p2www/pages/site/faq.html:612
 msgid ""
-"After that fires up, you should now be able to reach your console "
-"remotely. \n"
-"      Load the router console at <code>http://(System_IP):7657</code> and"
-" you will be prompted for the username and password you specified in step"
-" 2 above if your browser supports the authentication popup."
-msgstr ""
-"Po restarcie, konsola powinna być dostępna zdalnie. Wejdź na swoją "
-"konsolÄ™ pod <code>http://(publiczny adres IP):7657</code> i wpisz "
-"uprzednio zdefiniowaną nazwę użytkownika i hasło, jeżeli Twoja "
-"przeglądarka obsługuje okienko uwierzytelniania."
+"After that fires up, you should now be able to reach your console remotely. \n"
+"      Load the router console at <code>http://(System_IP):7657</code> and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup."
+msgstr "Po restarcie, konsola powinna być dostępna zdalnie. Wejdź na swoją konsolę pod <code>http://(publiczny adres IP):7657</code> i wpisz uprzednio zdefiniowaną nazwę użytkownika i hasło, jeżeli Twoja przeglądarka obsługuje okienko uwierzytelniania."
 
 #: i2p2www/pages/site/faq.html:615
 msgid ""
 "NOTE: You can specify 0.0.0.0 in the above configuration. \n"
 "      This specifies an interface, not a network or netmask. \n"
-"      0.0.0.0 means \"bind to all interfaces\", so it can be reachable on"
-" 127.0.0.1:7657 as well as any LAN/WAN IP. \n"
-"      Be careful when using this option as the console will be available "
-"on ALL addresses configured on your system."
-msgstr ""
-"Uwaga: możesz wpisać w powyższej konfiguracji 0.0.0.0. Jest to określenie"
-" interfejsu sieciowego, nie sieci lub maski podsieci. 0.0.0.0 oznacza "
-"podpięcie się pod wszystkie interfejsy sieciowe, więc będzie osiągalne "
-"zarówno z 127.0.0.1:7657, z sieci lokalnej (LAN) i z internetu (WAN). "
-"Bądź ostrożny/a korzystając z tej opcji, ponieważ konsola będzie wtedy "
-"dostępna ze WSZYSTKICH adresów skonfigurowanych w systemie."
+"      0.0.0.0 means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. \n"
+"      Be careful when using this option as the console will be available on ALL addresses configured on your system."
+msgstr "Uwaga: możesz wpisać w powyższej konfiguracji 0.0.0.0. Jest to określenie interfejsu sieciowego, nie sieci lub maski podsieci. 0.0.0.0 oznacza podpięcie się pod wszystkie interfejsy sieciowe, więc będzie osiągalne zarówno z 127.0.0.1:7657, z sieci lokalnej (LAN) i z internetu (WAN). Bądź ostrożny/a korzystając z tej opcji, ponieważ konsola będzie wtedy dostępna ze WSZYSTKICH adresów skonfigurowanych w systemie."
 
 #: i2p2www/pages/site/faq.html:624
 msgid ""
-"Please see the previous answer for instructions on using SSH Port "
-"Forwarding, and also see this page in your console: \n"
-"<a "
-"href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>"
-msgstr ""
-"Przeczytaj odpowiedź na poprzednie pytanie odnośnie instrukcji "
-"przekierowania portów przez SSH, zajrzyj również na stronę w konsoli "
-"węzła: <a "
-"href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>."
+"Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: \n"
+"<a href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>"
+msgstr "Przeczytaj odpowiedź na poprzednie pytanie odnośnie instrukcji przekierowania portów przez SSH, zajrzyj również na stronę w konsoli węzła: <a href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>."
 
 #: i2p2www/pages/site/faq.html:632
 msgid ""
-"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are"
-" supported. \n"
-"I2P does not have a SOCKS outproxy so it is limited to use within I2P "
-"only."
-msgstr ""
-"Proxy SOCKS działa od wydania 0.7.1. Wspierane są SOCKS 4/4a/5. I2P nie "
-"ma proxy wyjściowego SOCKS, więc będzie to użyteczne tylko do "
-"przeglÄ…dania domen .i2p."
+"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. \n"
+"I2P does not have a SOCKS outproxy so it is limited to use within I2P only."
+msgstr "Proxy SOCKS działa od wydania 0.7.1. Wspierane są SOCKS 4/4a/5. I2P nie ma proxy wyjściowego SOCKS, więc będzie to użyteczne tylko do przeglądania domen .i2p."
 
 #: i2p2www/pages/site/faq.html:636
 msgid ""
-"Many applications leak sensitive information that could identify you on "
-"the Internet and this is a risk that one should be aware of when using "
-"the I2P SOCKS proxy. \n"
-"I2P only filters connection data, but if the program you intend to run "
-"sends this information as content, I2P has no way to protect your "
-"anonymity. \n"
-"For example, some mail applications will send the IP address of the "
-"machine they are running on to a mail server. \n"
-"There is no way for I2P to filter this, thus using I2P to 'socksify' "
-"existing applications is possible, but extremely dangerous."
-msgstr ""
-"Wiele aplikacji może powodować wyciek wrażliwych danych, które mogą Cię "
-"zdemaskować, więc zaleca się ostrożność podczas korzystania przez I2P z "
-"proxy SOCKS. I2P anonimizuje tylko informacje o połączeniu, ale jeżeli "
-"jakaś aplikacja przesyła te informacje w zawartości, oprogramowanie I2P "
-"nie ma możliwości chronić Twojej prywatności. Przykład: niektóre klienty "
-"pocztowe przesyłają adres IP systemu na którym pracują na serwera "
-"pocztowego. I2P nie ma możliwości odfiltrować tych informacji, więc "
-"używanie I2P jako proxy SOCKS dla aplikacji jest możliwe, ale niezwykle "
-"niebezpieczne."
+"Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. \n"
+"I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. \n"
+"For example, some mail applications will send the IP address of the machine they are running on to a mail server. \n"
+"There is no way for I2P to filter this, thus using I2P to 'socksify' existing applications is possible, but extremely dangerous."
+msgstr "Wiele aplikacji może powodować wyciek wrażliwych danych, które mogą Cię zdemaskować, więc zaleca się ostrożność podczas korzystania przez I2P z proxy SOCKS. I2P anonimizuje tylko informacje o połączeniu, ale jeżeli jakaś aplikacja przesyła te informacje w zawartości, oprogramowanie I2P nie ma możliwości chronić Twojej prywatności. Przykład: niektóre klienty pocztowe przesyłają adres IP systemu na którym pracują na serwera pocztowego. I2P nie ma możliwości odfiltrować tych informacji, więc używanie I2P jako proxy SOCKS dla aplikacji jest możliwe, ale niezwykle niebezpieczne."
 
 #: i2p2www/pages/site/faq.html:642
 #, python-format
 msgid ""
-"If you would like more information on the socks proxy application anyway,"
-"\n"
+"If you would like more information on the socks proxy application anyway,\n"
 "there are some helpful hints on the <a href=\"%(socks)s\">socks page</a>."
-msgstr ""
-"W każdym bądź razie, jeżeli chcesz więcej informacji o proxy SOCKS, kilka"
-" użytecznych wskazówek znajdziesz na <a href=\"%(socks)s\">tej "
-"stronie</a>."
+msgstr "W każdym bądź razie, jeżeli chcesz więcej informacji o proxy SOCKS, kilka użytecznych wskazówek znajdziesz na <a href=\"%(socks)s\">tej stronie</a>."
 
 #: i2p2www/pages/site/faq.html:650
 msgid ""
-"Unless an outproxy has been specifically set up for the service you want "
-"to connect to, this cannot be done. \n"
-"There are only three types of outproxies running right now: HTTP, HTTPS, "
-"and email. Note that there is no SOCKS outproxy. \n"
+"Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. \n"
+"There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. \n"
 "If this type of service is required, we recommend that you use Tor. \n"
 "\n"
-"Please be aware that the Tor project <a "
-"href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-"
-"idea\">recommends against using BitTorrent over Tor</a>, \n"
+"Please be aware that the Tor project <a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">recommends against using BitTorrent over Tor</a>, \n"
 "as there are serious anonymity-related issues associated with doing so."
-msgstr ""
-"O ile została założona usługa proxy wyjściowego do usługi z którą się "
-"chcesz połączyć, nie jest to możliwe. Obecnie są tylko trzy typy proxy "
-"wyjściowego w sieci I2P: HTTP, HTTPS, e-poczta. Nie ma obecnie proxy "
-"wyjściowego SOCKS. Jeżeli potrzebujesz z tego typu usługi, zainteresuj "
-"się siecią Tor. Proszę mieć na uwadze fakt, że programiści projektu Tor "
-"<a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-"
-"idea\">odradzajÄ… korzystanie z BitTorrenta poprzez Tor</a> z powodu "
-"poważnych problemów z bezpieczeństwem wynikających z takiego "
-"postępowania."
+msgstr "O ile została założona usługa proxy wyjściowego do usługi z którą się chcesz połączyć, nie jest to możliwe. Obecnie są tylko trzy typy proxy wyjściowego w sieci I2P: HTTP, HTTPS, e-poczta. Nie ma obecnie proxy wyjściowego SOCKS. Jeżeli potrzebujesz z tego typu usługi, zainteresuj się siecią Tor. Proszę mieć na uwadze fakt, że programiści projektu Tor <a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">odradzają korzystanie z BitTorrenta poprzez Tor</a> z powodu poważnych problemów z bezpieczeństwem wynikających z takiego postępowania."
 
 #: i2p2www/pages/site/faq.html:662
 msgid ""
-"Is my router an \"exit node\" to the regular Internet? I don't want it to"
-" be."
-msgstr ""
-"Czy mój węzeł jest „węzłem wyjściowym” do normalnego Internetu? Nie chcę "
-"aby nim był."
+"Is my router an \"exit node\" to the regular Internet? I don't want it to "
+"be."
+msgstr "Czy mój węzeł jest „węzłem wyjściowym” do normalnego Internetu? Nie chcę aby nim był."
 
 #: i2p2www/pages/site/faq.html:664
 #, python-format
 msgid ""
-"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit "
-"nodes\" - or \"outproxies\" as they are referred to on the I2P network -"
-" \n"
+"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit nodes\" - or \"outproxies\" as they are referred to on the I2P network - \n"
 "are not an inherent part of the network. \n"
-"Only volunteers who specifically set up and run separate applications "
-"will relay traffic to the regular Internet. \n"
+"Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. \n"
 "There are very, very few of these.\n"
 "\n"
-"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a "
-"single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n"
+"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n"
 "\n"
-"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our "
-"forums, if you would like to learn more about running an outproxy."
-msgstr ""
-"Nie. W przeciwieństwie do sieci <a "
-"href=\"https://www.torproject.org/\">Tor</a> „węzły wyjściowe” (a "
-"dokładniej „outproxy” w terminologii I2P) nie są niezbędną częścią sieci."
-" Tylko wolontariusze, którzy skonfigurowali specjalne oprogramowanie "
-"tworzą bramki do zwykłego internetu. Jest ich dosłownie kilku. Domyślnie "
-"proxy wyjściowe HTTP (skonfigurowane na porcie 4444) zawiera tylko jeden "
-"taki serwer: false.i2p. Jeżeli ciekawi Cię jak uruchomić własne proxy "
-"wyjściowe, na forum I2P znajduje się <a href=\"%(outproxy)s\">poradnik "
-"(en)</a>."
+"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our forums, if you would like to learn more about running an outproxy."
+msgstr "Nie. W przeciwieństwie do sieci <a href=\"https://www.torproject.org/\">Tor</a> „węzły wyjściowe” (a dokładniej „outproxy” w terminologii I2P) nie są niezbędną częścią sieci. Tylko wolontariusze, którzy skonfigurowali specjalne oprogramowanie tworzą bramki do zwykłego internetu. Jest ich dosłownie kilku. Domyślnie proxy wyjściowe HTTP (skonfigurowane na porcie 4444) zawiera tylko jeden taki serwer: false.i2p. Jeżeli ciekawi Cię jak uruchomić własne proxy wyjściowe, na forum I2P znajduje się <a href=\"%(outproxy)s\">poradnik (en)</a>."
 
 #: i2p2www/pages/site/faq.html:679
 msgid "I2P strives to be safe in it's default configuration for all users."
-msgstr ""
-"I2P usiłuje być bezpieczne w domyślnej konfiguracji dla większości "
-"użytkowników."
+msgstr "I2P usiłuje być bezpieczne w domyślnej konfiguracji dla większości użytkowników."
 
 #: i2p2www/pages/site/faq.html:681
 msgid ""
 " It may be dangerous to use I2P in what the project calls \"Strict "
-"Countries\" where the law may not be clear on anonymizing software and "
-"where risks are judged to be fairly high. Most I2P peers are not in those"
-" strict countries and the ones that are, are placed in \"Hidden Mode\" "
-"where they interact with the rest of the network in more limited ways, so"
-" that they are less visible to network observers.\n"
-msgstr ""
-"Może być niebezpieczne korzystanie z sieci I2P w tak zwanych „opresyjnych"
-" państwach”, gdzie prawo może zabraniać korzystania z oprogramowania "
-"anonimizującego. Większość użytkowników I2P nie znajduje się w takich "
-"państwach, a węzły użytkowników w opresyjnych państwach przechodzą w "
-"„tryb ukryty”, w którym interakcje z resztą sieci są ograniczone, aby "
-"byli mniej widoczni dla obserwujących sieć.\n"
+"Countries\" where the law may not be clear on anonymizing software and where"
+" risks are judged to be fairly high. Most I2P peers are not in those strict "
+"countries and the ones that are, are placed in \"Hidden Mode\" where they "
+"interact with the rest of the network in more limited ways, so that they are"
+" less visible to network observers.\n"
+msgstr "Może być niebezpieczne korzystanie z sieci I2P w tak zwanych „opresyjnych państwach”, gdzie prawo może zabraniać korzystania z oprogramowania anonimizującego. Większość użytkowników I2P nie znajduje się w takich państwach, a węzły użytkowników w opresyjnych państwach przechodzą w „tryb ukryty”, w którym interakcje z resztą sieci są ograniczone, aby byli mniej widoczni dla obserwujących sieć.\n"
 
 #: i2p2www/pages/site/faq.html:687
 msgid ""
-"Yes, and this is how a fully distributed peer-to-peer network works. "
-"Every node participates in routing packets for others, so your IP address"
-" must be known to establish connections."
-msgstr ""
-"Tak, w ten sposób działa w pełni rozproszona sieć P2P. Każdy uczestniczy "
-"w przesyłaniu pakietów innych użytkowników, więc Twój adres IP musi być "
-"znany innym, aby nawiązywać połączenia."
+"Yes, and this is how a fully distributed peer-to-peer network works. Every "
+"node participates in routing packets for others, so your IP address must be "
+"known to establish connections."
+msgstr "Tak, w ten sposób działa w pełni rozproszona sieć P2P. Każdy uczestniczy w przesyłaniu pakietów innych użytkowników, więc Twój adres IP musi być znany innym, aby nawiązywać połączenia."
 
 #: i2p2www/pages/site/faq.html:691
 msgid ""
-"While the fact that your computer runs I2P is public, nobody can see your"
-" activities in it. You can't say if a user behind this IP address is "
-"sharing files, hosting a website, doing research or just running a node "
-"to contribute bandwidth to the project."
-msgstr ""
-"Pomimo tego, że fakt korzystania przez Ciebie z sieci I2P jest jawny, "
-"inni nie mają wglądu co do tego co robisz w sieci I2P. Nie można "
-"stwierdzić, czy dany użytkownik sieci I2P dzieli się plikami, hostuje "
-"stronę, przegląda, czy tylko pośredniczy w ruchu innych użytkowników."
+"While the fact that your computer runs I2P is public, nobody can see your "
+"activities in it. You can't say if a user behind this IP address is sharing "
+"files, hosting a website, doing research or just running a node to "
+"contribute bandwidth to the project."
+msgstr "Pomimo tego, że fakt korzystania przez Ciebie z sieci I2P jest jawny, inni nie mają wglądu co do tego co robisz w sieci I2P. Nie można stwierdzić, czy dany użytkownik sieci I2P dzieli się plikami, hostuje stronę, przegląda, czy tylko pośredniczy w ruchu innych użytkowników."
 
 #: i2p2www/pages/site/faq.html:696
 msgid ""
-"It can be deduced that somebody is using the I2P network with some "
-"reliability, but it is a little difficult to know for sure.\n"
-"The most reliable way to know for sure would be to have a computer with a"
-" fairly stable IP address that you suspect is an I2P user, and a\n"
-"bunch of computers you control on different networks all running I2P. "
-"When one of them connects to your suspected computer, you will be able\n"
-"to see their I2P router in the netDB. This might take time, and it might "
-"never happen. You could also try blocking all obfuscated traffic\n"
-"on a particular network until you're sure every I2P router on that "
-"network has lost all of it's peers. At that point, they'll reach out\n"
-"to reseed servers to get more peers, which a network administrator can "
-"probably observe."
-msgstr ""
-"Można z pewnym prawdopodobieństwem wywnioskować czy ktoś korzysta z sieci"
-" I2P, ale ciężko być tego pewnym. Najpewniejszym sposobem byłoby "
-"znajomość adresu IP (o ile jest stały) komputera podejrzanego, a "
-"następnie posiadanie kilku monitorowanych węzłów sieci I2P w różnych "
-"sieciach. Kiedy jeden z nich połączy się z podejrzanym komputerem, jego "
-"węzeł I2P pojawi się w bazie węzłów. Może to zająć trochę czasu, a może "
-"wcale nie nastąpić. Możesz również całkowicie blokować szyfrowany ruch w "
-"określonej sieci, aby każdy węzeł I2P z tej sieci stracił wszystkich "
-"użytkowników. W tym momencie węzły te połączą się z serwerami "
-"reseedowania, co administrator sieci powinien z łatwością zaobserwować."
+"It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.\n"
+"The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a\n"
+"bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able\n"
+"to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic\n"
+"on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out\n"
+"to reseed servers to get more peers, which a network administrator can probably observe."
+msgstr "Można z pewnym prawdopodobieństwem wywnioskować czy ktoś korzysta z sieci I2P, ale ciężko być tego pewnym. Najpewniejszym sposobem byłoby znajomość adresu IP (o ile jest stały) komputera podejrzanego, a następnie posiadanie kilku monitorowanych węzłów sieci I2P w różnych sieciach. Kiedy jeden z nich połączy się z podejrzanym komputerem, jego węzeł I2P pojawi się w bazie węzłów. Może to zająć trochę czasu, a może wcale nie nastąpić. Możesz również całkowicie blokować szyfrowany ruch w określonej sieci, aby każdy węzeł I2P z tej sieci stracił wszystkich użytkowników. W tym momencie węzły te połączą się z serwerami reseedowania, co administrator sieci powinien z łatwością zaobserwować."
 
 #: i2p2www/pages/site/faq.html:706
 msgid ""
-"I2P does not encrypt the Internet, neither does Tor - for example, "
-"through <a "
-"href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport"
-" Layer Security (TLS)</a>. \n"
-"I2P and Tor both aim to transport your traffic as-is securely and "
-"anonymously over the corresponding network, to its destination. \n"
-"Any unencrypted traffic generated at your system will arrive at the "
-"outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n"
-"This means that you are vulnerable to snooping by the outproxy operators."
-" \n"
-"One way to protect your outproxy traffic against this is to ensure that "
-"any traffic that will be handled by the outproxy is encrypted with TLS."
-msgstr ""
-"I2P nie szyfruje transferu w internecie, sieć Tor także nie, np. "
-"korzystajÄ…c z <a "
-"href=\"https://pl.wikipedia.org/wiki/Transport_Layer_Security\">protokołu"
-" TLS</a>. Celem obydwu sieci jest przesłanie danych w postaci "
-"niezmienionej i anonimowo przez sieć do odbiorcy. Każdy nieszyfrowany "
-"ruch sieciowy generowany na Twoim systemie trafi w końcu do proxy/węzła "
-"wyjściowego jako nieszyfrowany. Oznacza to, że Twój ruch sieciowy może "
-"być przechwycony przez operatorów proxy/węzłów wyjściowych. Sposobem na "
-"ochronę ruchu przed tym zagrożeniem jest upewnienie się, że cały ruch do "
-"proxy wyjściowego będzie szyfrowany przez TLS."
+"I2P does not encrypt the Internet, neither does Tor - for example, through <a href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport Layer Security (TLS)</a>. \n"
+"I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. \n"
+"Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n"
+"This means that you are vulnerable to snooping by the outproxy operators. \n"
+"One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS."
+msgstr "I2P nie szyfruje transferu w internecie, sieć Tor także nie, np. korzystając z <a href=\"https://pl.wikipedia.org/wiki/Transport_Layer_Security\">protokołu TLS</a>. Celem obydwu sieci jest przesłanie danych w postaci niezmienionej i anonimowo przez sieć do odbiorcy. Każdy nieszyfrowany ruch sieciowy generowany na Twoim systemie trafi w końcu do proxy/węzła wyjściowego jako nieszyfrowany. Oznacza to, że Twój ruch sieciowy może być przechwycony przez operatorów proxy/węzłów wyjściowych. Sposobem na ochronę ruchu przed tym zagrożeniem jest upewnienie się, że cały ruch do proxy wyjściowego będzie szyfrowany przez TLS."
 
 #: i2p2www/pages/site/faq.html:714
 msgid ""
-"For more information, you may read the Tor FAQ's answer to this question:"
-"\n"
-"<a "
-"href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>"
-msgstr ""
-"Więcej informacji znajdziesz na stronie projektu Tor: <a "
-"href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>"
-" (w j. angielskim)."
+"For more information, you may read the Tor FAQ's answer to this question:\n"
+"<a href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>"
+msgstr "Więcej informacji znajdziesz na stronie projektu Tor: <a href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a> (w j. angielskim)."
 
 #: i2p2www/pages/site/faq.html:719
 #, python-format
 msgid ""
-"In addition, you may be vulnerable to collusion between the outproxy "
-"operator\n"
-"and operators of other I2P services, if you use the same tunnels "
-"(\"shared clients\").\n"
-"There is additional discussion about this on <a "
-"href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n"
-"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our "
-"forums</a> as well."
-msgstr ""
-"Ponadto, możesz być zagrożony na skutek zmowy pomiędzy operatorem proxy "
-"wyjściowego i innych usług w I2P, jeśli używasz tych samych tuneli (opcja"
-" „klient współdzielony)”. Dyskusja na ten temat została przeprowadzona na"
-" <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>. Wykonano również "
-"kopiÄ™ tej dyskusji na <a href=\"%(i2pforum)s>innym forums</a>."
+"In addition, you may be vulnerable to collusion between the outproxy operator\n"
+"and operators of other I2P services, if you use the same tunnels (\"shared clients\").\n"
+"There is additional discussion about this on <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n"
+"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our forums</a> as well."
+msgstr "Ponadto, możesz być zagrożony na skutek zmowy pomiędzy operatorem proxy wyjściowego i innych usług w I2P, jeśli używasz tych samych tuneli (opcja „klient współdzielony)”. Dyskusja na ten temat została przeprowadzona na <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>. Wykonano również kopię tej dyskusji na <a href=\"%(i2pforum)s>innym forums</a>."
 
 #: i2p2www/pages/site/faq.html:726
 #, python-format
 msgid ""
 "\n"
-"Ultimately, this is a question that only you can answer because the "
-"correct answer depends on your browsing behaviour, \n"
-"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you "
-"choose to trust the outproxy operator."
-msgstr ""
-"\n"
-"Podsumowując, na to pytanie możesz sobie odpowiedzieć tylko Ty sam, "
-"ponieważ odpowiedź zależy od Twoich nawyków przeglądania, przyjętego <a "
-"href=\"%(threatmodel)s\">modelu zagrożenia</a> i zaufania do operatora "
-"proxy wyjściowego."
+"Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, \n"
+"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you choose to trust the outproxy operator."
+msgstr "\nPodsumowując, na to pytanie możesz sobie odpowiedzieć tylko Ty sam, ponieważ odpowiedź zależy od Twoich nawyków przeglądania, przyjętego <a href=\"%(threatmodel)s\">modelu zagrożenia</a> i zaufania do operatora proxy wyjściowego."
 
 #: i2p2www/pages/site/faq.html:734
 msgid ""
-"Reducing anonymity is typically done by A) identifying characteristics "
-"that are consistent across anonymous identities or\n"
-"B) identifying ephemeral characteristics of repeated connections. We say "
-"\"reducing\" anonymity because many of these characteristics\n"
-"are shared by many of our users, making these anonymity \"sets,\" the "
-"smaller the anonymity set and the more small sets you belong to,\n"
+"Reducing anonymity is typically done by A) identifying characteristics that are consistent across anonymous identities or\n"
+"B) identifying ephemeral characteristics of repeated connections. We say \"reducing\" anonymity because many of these characteristics\n"
+"are shared by many of our users, making these anonymity \"sets,\" the smaller the anonymity set and the more small sets you belong to,\n"
 "the more brittle your anonymity."
-msgstr ""
-"Zmniejszenie anonimowości może nastąpić na skutek:<br>\n"
-"A) identyfikacji cech spójnych anonimowych tożsamości<br>\n"
-"B) identyfikacji cech ulotnych powtarzanych połączeń.<br>\n"
-"Mówimy tylko o zmniejszeniu anonimowości, ponieważ wiele z tych cech jest"
-" wspólnych dla wielu użytkowników tworzących „zbiór”. W im mniejszym "
-"zbiorze się znajdujesz i w jak wielu małych zbiorach się znajdujesz, tym "
-"mniejsza jest Twoja anonimowość."
+msgstr "Zmniejszenie anonimowości może nastąpić na skutek:<br>\nA) identyfikacji cech spójnych anonimowych tożsamości<br>\nB) identyfikacji cech ulotnych powtarzanych połączeń.<br>\nMówimy tylko o zmniejszeniu anonimowości, ponieważ wiele z tych cech jest wspólnych dla wielu użytkowników tworzących „zbiór”. W im mniejszym zbiorze się znajdujesz i w jak wielu małych zbiorach się znajdujesz, tym mniejsza jest Twoja anonimowość."
 
 #: i2p2www/pages/site/faq.html:741
 msgid ""
-"Attacks on I2P in the past have relied on correlating NetDB storage and "
-"verification, by randomizing \n"
-"the delay between storage and verification, we reduce the consistency "
-"with which that verification can be linked to I2P activity,\n"
+"Attacks on I2P in the past have relied on correlating NetDB storage and verification, by randomizing \n"
+"the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity,\n"
 "thereby limiting the utility of that data point."
-msgstr ""
-"W przeszłości ataki na sieć I2P polegały na korelacji bazy dany sieci i "
-"weryfikacji. Dodając element losowości pomiędzy bazą danych i weryfikacją"
-" zmniejszono prawdopodobieństwo powiązania z aktywnością w sieci I2P, "
-"zmniejszając tym samym skuteczność tego ataku."
+msgstr "W przeszłości ataki na sieć I2P polegały na korelacji bazy dany sieci i weryfikacji. Dodając element losowości pomiędzy bazą danych i weryfikacją zmniejszono prawdopodobieństwo powiązania z aktywnością w sieci I2P, zmniejszając tym samym skuteczność tego ataku."
 
 #: i2p2www/pages/site/faq.html:746
 msgid ""
-"Attacks on software configured to work with I2P are out of scope for I2P "
-"to solve. When browsing I2P or hosting\n"
-"I2P services, it's is the responsibility of the user to consider their "
-"threat model. Browsers are particularly problematic\n"
-"due to fingerprinting attacks, and the wide variety of information that "
-"can be gleaned from them. Using a standardized browsing\n"
+"Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P or hosting\n"
+"I2P services, it's is the responsibility of the user to consider their threat model. Browsers are particularly problematic\n"
+"due to fingerprinting attacks, and the wide variety of information that can be gleaned from them. Using a standardized browsing\n"
 "profile is thought to help mitigate the impact of fingerprinting."
-msgstr ""
-"Ataki na oprogramowanie skonfigurowane do pracy z sieciÄ… I2P sÄ… poza "
-"zakresem możliwości zespołu I2P. Użytkownik przeglądający strony .i2p "
-"bądź hostujący własną stronę w sieci I2P musi samodzielnie przemyśleć "
-"model zagrożenia. Przeglądarki internetowe są szczególnie problematyczne,"
-" ponieważ zostawiają „odcisk palca przeglądarki”. Korzystanie ze "
-"zestandaryzowanego profilu przeglądarki pozwala zmniejszyć to ryzyko."
+msgstr "Ataki na oprogramowanie skonfigurowane do pracy z siecią I2P są poza zakresem możliwości zespołu I2P. Użytkownik przeglądający strony .i2p bądź hostujący własną stronę w sieci I2P musi samodzielnie przemyśleć model zagrożenia. Przeglądarki internetowe są szczególnie problematyczne, ponieważ zostawiają „odcisk palca przeglądarki”. Korzystanie ze zestandaryzowanego profilu przeglądarki pozwala zmniejszyć to ryzyko."
 
 #: i2p2www/pages/site/faq.html:757
 msgid ""
-"New installations of I2P carry out the reseeding process automatically, "
-"as well as when the number of known peers falls to a drastically low "
-"value. \n"
-"If you need to carry out a reseed of your router, please see the <a "
-"href=\"#manual_reseed\">reseed instructions</a>."
-msgstr ""
-"Nowe instalacje I2P przeprowadzajÄ… proces reseedowania automatycznie "
-"kiedy liczba znanych uczestników spadnie do bardzo niskiej wartości. "
-"Jeżeli potrzebujesz ręcznie przeprowadzić reseedowanie swojego węzła, "
-"zajrzyj do <a href=\"#manual_reseed\">instrukcji reseedowania</a>."
+"New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. \n"
+"If you need to carry out a reseed of your router, please see the <a href=\"#manual_reseed\">reseed instructions</a>."
+msgstr "Nowe instalacje I2P przeprowadzają proces reseedowania automatycznie kiedy liczba znanych uczestników spadnie do bardzo niskiej wartości. Jeżeli potrzebujesz ręcznie przeprowadzić reseedowanie swojego węzła, zajrzyj do <a href=\"#manual_reseed\">instrukcji reseedowania</a>."
 
 #: i2p2www/pages/site/faq.html:765
 msgid ""
-"An I2P router only needs to be seeded once, to join the network for the "
-"first\n"
-"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled "
-"into a\n"
+"An I2P router only needs to be seeded once, to join the network for the first\n"
+"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled into a\n"
 "signed zip-file) from at least two predefined server URLs picked from a\n"
 "volunteer-run group of non-private internet HTTPS servers."
-msgstr ""
-"Węzeł I2P musi zostać reseedowany podczas pierwszego połączenia z siecią."
-" Reseedowanie polega na pobraniu kilku plików zawierających informacje o "
-"węzłach (zapakowanych w cyfrowo podpisany plik .zip) po HTTPS z co "
-"najmniej dwóch predefiniowanych serwerów prowadzonych przez wolontariuszy"
-" w zwykłym internecie."
+msgstr "Węzeł I2P musi zostać reseedowany podczas pierwszego połączenia z siecią. Reseedowanie polega na pobraniu kilku plików zawierających informacje o węzłach (zapakowanych w cyfrowo podpisany plik .zip) po HTTPS z co najmniej dwóch predefiniowanych serwerów prowadzonych przez wolontariuszy w zwykłym internecie."
 
 #: i2p2www/pages/site/faq.html:772
 msgid ""
-"A typical symptom of a failed reseed is the \"Known\" indicator (on the "
-"left\n"
-"sidebar of the router console) displaying a very small value (often less "
-"than\n"
-"5) which does not increase. This can occur, among other things, if your "
-"local\n"
-"firewall limits outbound traffic or if the reseed request is blocked "
-"entirely."
-msgstr ""
-"Typowym objawem nieudanego reseedowania jest wskaźnik „znani” (po lewej "
-"stronie konsoli węzła) wyświetlający bardzo małą wartość (często mnij niż"
-" 5), która nie rośnie. To może się zdarzyć, między innymi gdy Twoja "
-"zapora sieciowa blokuje ruch wychodzący lub żądanie reseedowania jest "
-"całkowicie zablokowane."
+"A typical symptom of a failed reseed is the \"Known\" indicator (on the left\n"
+"sidebar of the router console) displaying a very small value (often less than\n"
+"5) which does not increase. This can occur, among other things, if your local\n"
+"firewall limits outbound traffic or if the reseed request is blocked entirely."
+msgstr "Typowym objawem nieudanego reseedowania jest wskaźnik „znani” (po lewej stronie konsoli węzła) wyświetlający bardzo małą wartość (często mnij niż 5), która nie rośnie. To może się zdarzyć, między innymi gdy Twoja zapora sieciowa blokuje ruch wychodzący lub żądanie reseedowania jest całkowicie zablokowane."
 
 #: i2p2www/pages/site/faq.html:779
 msgid ""
-"If you are stuck behind an ISP firewall or filter, you can use the "
-"following\n"
+"If you are stuck behind an ISP firewall or filter, you can use the following\n"
 "manual method (non-automated technical solution) to join the I2P network."
-msgstr ""
-"Jeżeli utknąłeś za zaporą Twojego dostawcy internetu lub jakiegoś filtra,"
-" możesz ręcznie połączyć się z siecią I2P."
+msgstr "Jeżeli utknąłeś za zaporą Twojego dostawcy internetu lub jakiegoś filtra, możesz ręcznie połączyć się z siecią I2P."
 
 #: i2p2www/pages/site/faq.html:784
 #, python-format
 msgid ""
 "\n"
-"As of release 0.9.33, you may also configure your router to reseed "
-"through a proxy.\n"
-"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, "
-"hostname, and port."
-msgstr ""
-"\n"
-"Wraz z wydaniem 0.9.33 możesz także skonfigurować swój węzeł, aby "
-"reseedował przez proxy. Przejdź do <a href=\"%(url)s\">%(url)s</a> i "
-"skonfiguruj rodzaj proxy, nazwÄ™ hosta i port."
+"As of release 0.9.33, you may also configure your router to reseed through a proxy.\n"
+"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, hostname, and port."
+msgstr "\nWraz z wydaniem 0.9.33 możesz także skonfigurować swój węzeł, aby reseedował przez proxy. Przejdź do <a href=\"%(url)s\">%(url)s</a> i skonfiguruj rodzaj proxy, nazwę hosta i port."
 
 #: i2p2www/pages/site/faq.html:789
 msgid "Joining the I2P Network using a reseed file"
@@ -4947,28 +3692,14 @@ msgstr "Dołączanie do sieci I2P za pomocą pliku reseed"
 
 #: i2p2www/pages/site/faq.html:790
 msgid ""
-"Please contact a known trustworthy friend who has a running I2P router, "
-"and ask\n"
-"them for help with reseeding your I2P router. Request that they send you "
-"a\n"
-"reseed file exported from their running I2P router. It is vital that the "
-"file is\n"
-"exchanged over a secure channel, e.g. encrypted to avoid external "
-"tampering (PGP\n"
-"Sign, Encrypt and Verified with a trusted public key). The file itself is"
-"\n"
-"unsigned, so please accept files only from known trusted friends. Never "
-"import\n"
+"Please contact a known trustworthy friend who has a running I2P router, and ask\n"
+"them for help with reseeding your I2P router. Request that they send you a\n"
+"reseed file exported from their running I2P router. It is vital that the file is\n"
+"exchanged over a secure channel, e.g. encrypted to avoid external tampering (PGP\n"
+"Sign, Encrypt and Verified with a trusted public key). The file itself is\n"
+"unsigned, so please accept files only from known trusted friends. Never import\n"
 "a reseed file if you can not verify its source."
-msgstr ""
-"Skontaktuj się z zaufanym kolegą posiadającym węzeł I2P i poproś go o "
-"pomoc w reseedowaniu Twojego węzła I2P. Poproś go o przesłanie pliku "
-"reseed wyeksportowanego z jego węzła I2P. Jest ważne, aby ten plik został"
-" przesłany bezpiecznym kanałem, np. w postaci zaszyfrowanej (PGP,  "
-"podpisz, zaszyfruj i zweryfikuj zaufanym kluczem publicznym), aby nie "
-"został przez kogoś zmodyfikowany. Plik ten jest niepodpisany, więc ufaj "
-"tylko plikom od zaufanych osób. Nigdy nie importuj pliku reseed z "
-"nieznanego źródła."
+msgstr "Skontaktuj się z zaufanym kolegą posiadającym węzeł I2P i poproś go o pomoc w reseedowaniu Twojego węzła I2P. Poproś go o przesłanie pliku reseed wyeksportowanego z jego węzła I2P. Jest ważne, aby ten plik został przesłany bezpiecznym kanałem, np. w postaci zaszyfrowanej (PGP,  podpisz, zaszyfruj i zweryfikuj zaufanym kluczem publicznym), aby nie został przez kogoś zmodyfikowany. Plik ten jest niepodpisany, więc ufaj tylko plikom od zaufanych osób. Nigdy nie importuj pliku reseed z nieznanego źródła."
 
 #: i2p2www/pages/site/faq.html:800
 #, python-format
@@ -5004,11 +3735,9 @@ msgstr "Udostępnianie pliku reseed"
 
 #: i2p2www/pages/site/faq.html:812
 msgid ""
-"For trusted friends you can use your local I2P router to give them a jump"
-" start:"
-msgstr ""
-"Zaufani znajomi mogą wykorzystać Twój węzeł I2P, aby podłączyć się do "
-"sieci:"
+"For trusted friends you can use your local I2P router to give them a jump "
+"start:"
+msgstr "Zaufani znajomi mogą wykorzystać Twój węzeł I2P, aby podłączyć się do sieci:"
 
 #: i2p2www/pages/site/faq.html:815
 msgid "Under \"Create Reseed File\" click \"Create reseed file\""
@@ -5022,19 +3751,11 @@ msgstr "bezpiecznie wyślij plik %(filename)s swojemu znajomemu"
 #: i2p2www/pages/site/faq.html:818
 msgid ""
 "Do not reveal this file in any case to unknown users, since it contains\n"
-"sensitive private data (100 RouterInfo) from your own I2P router! In "
-"order to\n"
-"protect your anonymity: you may wait a few random hours/days before you "
-"share\n"
-"the file with your trusted friend. It is also advisable to use this "
-"procedure\n"
+"sensitive private data (100 RouterInfo) from your own I2P router! In order to\n"
+"protect your anonymity: you may wait a few random hours/days before you share\n"
+"the file with your trusted friend. It is also advisable to use this procedure\n"
 "sparingly (< 2 per week)."
-msgstr ""
-"Nie udostępniaj tego pliku nieznajomym gdyż zawiera on wrażliwe "
-"informacje prywatne (100 informacji o węzłach) z Twojego węzła I2P! Aby "
-"chronić swoją anonimowość możesz poczekać kilka godzin/dni zanim "
-"udostępnisz ten plik przyjacielowi. Zaleca się oszczędnie korzystać z tej"
-" procedury (< 2 razy na tydzień)."
+msgstr "Nie udostępniaj tego pliku nieznajomym gdyż zawiera on wrażliwe informacje prywatne (100 informacji o węzłach) z Twojego węzła I2P! Aby chronić swoją anonimowość możesz poczekać kilka godzin/dni zanim udostępnisz ten plik przyjacielowi. Zaleca się oszczędnie korzystać z tej procedury (< 2 razy na tydzień)."
 
 #: i2p2www/pages/site/faq.html:826
 msgid " General guidelines for manual reseeding of I2P "
@@ -5042,12 +3763,13 @@ msgstr "Ogólne wytyczne dotyczące ręcznego reseedu I2P"
 
 #: i2p2www/pages/site/faq.html:828
 msgid ""
-"Do not publicly publish the reseed file or share these files with a "
-"friend of a friend!"
+"Do not publicly publish the reseed file or share these files with a friend "
+"of a friend!"
 msgstr "Nie udostępniaj publicznie lub znajomemu znajomego pliku reseed!"
 
 #: i2p2www/pages/site/faq.html:829
-msgid "This file should be used only for a very limited number of friends (< 3)!"
+msgid ""
+"This file should be used only for a very limited number of friends (< 3)!"
 msgstr "Udostępniaj ten plik tylko ograniczonej liczbie osób (< 3)!"
 
 #: i2p2www/pages/site/faq.html:830
@@ -5056,77 +3778,34 @@ msgstr "Plik ten jest ważny tylko kilka dni (< 20)!"
 
 #: i2p2www/pages/site/faq.html:839
 msgid ""
-"I2P is primarily not intended, nor designed, to be used as a proxy to the"
-" regular internet. \n"
-"With that said, there are services which are provided by volunteers that "
-"act as proxies to non-private internet based content - these are referred"
-" to as \"outproxies\" on the I2P network. \n"
-"There is an outproxy configured by default in I2P's HTTP client tunnel - "
-"false.i2p. \n"
-"While this service does currently exist, there is no guarantee that it "
-"will always be there as it is not an official service provided by the I2P"
-" project. \n"
-"If your main requirement from an anonymous network is the ability to "
-"access non-private internet resources, we would recommend using <a "
-"href=\"https://www.torproject.org/\">Tor</a>."
-msgstr ""
-"Sieć I2P nie została zaprojektowana do bycia bramką do zwykłego "
-"internetu. Jak już wspomniano, istnieją usługi – uruchamiane przez "
-"wolontariuszy – umożliwiające dostęp do zwykłego internetu, tak zwane "
-"„outproxy”. Jest jedno proxy wyjściowe domyślnie skonfigurowane w tunelu "
-"klienckim HTTP: false.i2p. Usługa ta obecnie działa, ale nie "
-"gwarantujemy, że będzie zawsze działała, ponieważ nie jest to oficjalna "
-"usługa dostarczana przez projekt I2P. Jeżeli Twoim głównym celem jest "
-"dostęp do treści w zwykłym nieanonimowym internecie, zalecamy "
-"skorzystanie z projektu <a href=\"https://www.torproject.org/\">Tor</a>."
+"I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. \n"
+"With that said, there are services which are provided by volunteers that act as proxies to non-private internet based content - these are referred to as \"outproxies\" on the I2P network. \n"
+"There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. \n"
+"While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. \n"
+"If your main requirement from an anonymous network is the ability to access non-private internet resources, we would recommend using <a href=\"https://www.torproject.org/\">Tor</a>."
+msgstr "Sieć I2P nie została zaprojektowana do bycia bramką do zwykłego internetu. Jak już wspomniano, istnieją usługi – uruchamiane przez wolontariuszy – umożliwiające dostęp do zwykłego internetu, tak zwane „outproxy”. Jest jedno proxy wyjściowe domyślnie skonfigurowane w tunelu klienckim HTTP: false.i2p. Usługa ta obecnie działa, ale nie gwarantujemy, że będzie zawsze działała, ponieważ nie jest to oficjalna usługa dostarczana przez projekt I2P. Jeżeli Twoim głównym celem jest dostęp do treści w zwykłym nieanonimowym internecie, zalecamy skorzystanie z projektu <a href=\"https://www.torproject.org/\">Tor</a>."
 
 #: i2p2www/pages/site/faq.html:852
 msgid ""
 "Within I2P, there is no requirement to use HTTPS. \n"
-"    All traffic is encrypted end-to-end, any further encryption, e.g. "
-"with the use of HTTPS, doesn't create any further anonymity-related "
-"benefits.\n"
+"    All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n"
 "\n"
-"    However, if one would like to use HTTPS or has a requirement to do "
-"so, the existing default I2P HTTP Proxy has support for HTTPS traffic."
-"  \n"
-"    Any hidden service operator would have to specifically set up and "
-"enable HTTPS access."
-msgstr ""
-"WewnÄ…trz sieci I2P nie ma potrzeby korzystania z HTTPS. Wszystkie "
-"transfery są szyfrowane od-końca-do-końca, każda dodatkowa warstwa "
-"szyfrowania (np. HTTPS) nie zwiększa anonimowości. Jednakże jeżeli ktoś "
-"chciałby/musi skorzystać z HTTPS, domyślne proxy HTTP wspiera ruch HTTPS."
-" Operator ukrytej usługi musiałby specjalnie skonfigurować i aktywować "
-"dostęp po HTTPS."
+"    However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic.  \n"
+"    Any hidden service operator would have to specifically set up and enable HTTPS access."
+msgstr "Wewnątrz sieci I2P nie ma potrzeby korzystania z HTTPS. Wszystkie transfery są szyfrowane od-końca-do-końca, każda dodatkowa warstwa szyfrowania (np. HTTPS) nie zwiększa anonimowości. Jednakże jeżeli ktoś chciałby/musi skorzystać z HTTPS, domyślne proxy HTTP wspiera ruch HTTPS. Operator ukrytej usługi musiałby specjalnie skonfigurować i aktywować dostęp po HTTPS."
 
 #: i2p2www/pages/site/faq.html:861
 msgid ""
 "FTP is not supported for technical reasons.\n"
 "\n"
-"    There are no FTP \"outproxies\" to the Internet—it may not even be "
-"possible to set up one. \n"
-"    Any other kind of outproxy may work if it's set up with a standard "
-"tunnel. \n"
-"    If you would like to set up some type of outproxy, carefully research"
-" the potential risks. \n"
-"    The I2P community may or may not be able to help with the technical "
-"aspects, feel free to ask.\n"
+"    There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one. \n"
+"    Any other kind of outproxy may work if it's set up with a standard tunnel. \n"
+"    If you would like to set up some type of outproxy, carefully research the potential risks. \n"
+"    The I2P community may or may not be able to help with the technical aspects, feel free to ask.\n"
 "\n"
-"    As explained several times above, any existing outproxy isn't a core "
-"part of the network. \n"
-"    They are services run by individuals and they may or may not be "
-"operational at any given time."
-msgstr ""
-"FTP nie jest wspierane z powodów technicznych. Obecnie nie ma proxy "
-"wyjściowych FTP, być może nawet nie dałoby się utworzyć takiej usługi. "
-"Każdy inny rodzaj proxy wyjściowego powinno się dać utworzyć wybierając "
-"opcję tunelu „standardowy”. Jeżeli chciał(a)byś założyć własne outproxy, "
-"ostrożnie zapoznaj się z potencjalnymi zagrożeniami. Społeczność I2P być "
-"może będzie w stanie udzielić Ci porad technicznych, nie bój się pytać. "
-"Jak już wcześniej wspomniano, każda usługa proxy wyjściowego nie jest "
-"podstawową usługą sieci I2P. Są to usługi uruchamiane przez "
-"wolontariuszy, mogą one zniknąć w każdej chwili."
+"    As explained several times above, any existing outproxy isn't a core part of the network. \n"
+"    They are services run by individuals and they may or may not be operational at any given time."
+msgstr "FTP nie jest wspierane z powodów technicznych. Obecnie nie ma proxy wyjściowych FTP, być może nawet nie dałoby się utworzyć takiej usługi. Każdy inny rodzaj proxy wyjściowego powinno się dać utworzyć wybierając opcję tunelu „standardowy”. Jeżeli chciał(a)byś założyć własne outproxy, ostrożnie zapoznaj się z potencjalnymi zagrożeniami. Społeczność I2P być może będzie w stanie udzielić Ci porad technicznych, nie bój się pytać. Jak już wcześniej wspomniano, każda usługa proxy wyjściowego nie jest podstawową usługą sieci I2P. Są to usługi uruchamiane przez wolontariuszy, mogą one zniknąć w każdej chwili."
 
 #: i2p2www/pages/site/faq.html:876
 msgid "My router is using a large amount of CPU, what can I do about this?"
@@ -5142,16 +3821,10 @@ msgstr "JRE"
 
 #: i2p2www/pages/site/faq.html:883
 msgid ""
-"Try to use either OpenJDK or Sun/Oracle Java if it's available for your "
-"system. \n"
-"You can check which version of java you have installed by typing "
-"<code>java -version</code> at a command/shell prompt. \n"
+"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. \n"
+"You can check which version of java you have installed by typing <code>java -version</code> at a command/shell prompt. \n"
 "Performance tends to suffer with other implementations of java."
-msgstr ""
-"Spróbuj użyć albo OpenJDK albo Javy od Sun/Oracle jeżeli jest dostępna na"
-" Twój system. Możesz sprawdzić którą wersję Javy masz zainstalowaną "
-"wpisując <code>java -version</code> do konsoli/powłoki. Na innych "
-"implementacjach Javy wydajność jest słaba."
+msgstr "Spróbuj użyć albo OpenJDK albo Javy od Sun/Oracle jeżeli jest dostępna na Twój system. Możesz sprawdzić którą wersję Javy masz zainstalowaną wpisując <code>java -version</code> do konsoli/powłoki. Na innych implementacjach Javy wydajność jest słaba."
 
 #: i2p2www/pages/site/faq.html:888
 msgid "File sharing applications, e.g. BitTorrent"
@@ -5159,13 +3832,9 @@ msgstr "programy do wymiany plików, np. BitTorrent"
 
 #: i2p2www/pages/site/faq.html:889
 msgid ""
-"Are you running a BitTorrent client over I2P? Try reducing the number of "
-"torrents, the bandwidth limits,\n"
+"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n"
 "or try turning it off completely to see if that helps."
-msgstr ""
-"Masz włączony klient BitTorrent przez I2P? Spróbuj zredukować liczbę "
-"torrentów, limity pobierania, lub wyłącz go całkowicie aby sprawdzić czy "
-"to coś pomoże."
+msgstr "Masz włączony klient BitTorrent przez I2P? Spróbuj zredukować liczbę torrentów, limity pobierania, lub wyłącz go całkowicie aby sprawdzić czy to coś pomoże."
 
 #: i2p2www/pages/site/faq.html:895
 msgid "High bandwidth settings"
@@ -5173,15 +3842,9 @@ msgstr "wysokie ustawienia przepustowości"
 
 #: i2p2www/pages/site/faq.html:896
 msgid ""
-"Are your bandwidth limits set too high? It is possible that too much "
-"traffic is going through your I2P router and it is overloaded. \n"
-"Try reducing the setting for <em>share bandwidth percentage</em> on the "
-"<a href=\"http://localhost:7657/config\">configuration</a> page."
-msgstr ""
-"Może Twoje limity przepustowości są zbyt wysokie? Być może zbyt dużo "
-"transferu jest przesyłane przez Twój węzeł I2P i jest on przeciążony. "
-"Spróbuj zmniejszyć <em>procent udostępnianego pasma</em> na stronie <a "
-"href=\"http://localhost:7657/config\">konfiguracji</a>."
+"Are your bandwidth limits set too high? It is possible that too much traffic is going through your I2P router and it is overloaded. \n"
+"Try reducing the setting for <em>share bandwidth percentage</em> on the <a href=\"http://localhost:7657/config\">configuration</a> page."
+msgstr "Może Twoje limity przepustowości są zbyt wysokie? Być może zbyt dużo transferu jest przesyłane przez Twój węzeł I2P i jest on przeciążony. Spróbuj zmniejszyć <em>procent udostępnianego pasma</em> na stronie <a href=\"http://localhost:7657/config\">konfiguracji</a>."
 
 #: i2p2www/pages/site/faq.html:901
 msgid "I2P Version"
@@ -5189,11 +3852,9 @@ msgstr "wersja I2P"
 
 #: i2p2www/pages/site/faq.html:902
 msgid ""
-"Make sure that you're running the latest version of I2P to get the "
-"benefits of increased performance and bug fixes."
-msgstr ""
-"Upewnij się, że korzystasz z najnowszej wersji I2P aby czerpać korzyści z"
-" poprawek błędów i wydajnościowych."
+"Make sure that you're running the latest version of I2P to get the benefits "
+"of increased performance and bug fixes."
+msgstr "Upewnij się, że korzystasz z najnowszej wersji I2P aby czerpać korzyści z poprawek błędów i wydajnościowych."
 
 #: i2p2www/pages/site/faq.html:907
 msgid "Memory allocation"
@@ -5201,19 +3862,10 @@ msgstr "przydział pamięci"
 
 #: i2p2www/pages/site/faq.html:908
 msgid ""
-"Has enough memory been set aside for use by I2P? Look at the memory graph"
-" on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n"
-"to see if the memory usage is \"pegged\"&mdash;the JVM is spending most "
-"of its time in garbage collection. \n"
-"Increase the setting <code>wrapper.java.maxmemory</code> in the file "
-"<code>wrapper.config</code>."
-msgstr ""
-"Czy wystarczająca ilość pamięci została zarezerwowana dla I2P? Spójrz na "
-"wykres pamięci na <a href=\"http://localhost:7657/graphs\">stronie "
-"wykresów</a> i sprawdź, czy wykres nie jest „przycięty” – JVM spędza "
-"większość czasu na odśmiecaniu pamięci (ang. garbage collection). Zwiększ"
-" wartość <code>wrapper.java.maxmemory</code> w pliku "
-"<code>wrapper.config</code>."
+"Has enough memory been set aside for use by I2P? Look at the memory graph on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n"
+"to see if the memory usage is \"pegged\"&mdash;the JVM is spending most of its time in garbage collection. \n"
+"Increase the setting <code>wrapper.java.maxmemory</code> in the file <code>wrapper.config</code>."
+msgstr "Czy wystarczająca ilość pamięci została zarezerwowana dla I2P? Spójrz na wykres pamięci na <a href=\"http://localhost:7657/graphs\">stronie wykresów</a> i sprawdź, czy wykres nie jest „przycięty” – JVM spędza większość czasu na odśmiecaniu pamięci (ang. garbage collection). Zwiększ wartość <code>wrapper.java.maxmemory</code> w pliku <code>wrapper.config</code>."
 
 #: i2p2www/pages/site/faq.html:915
 #, python-format
@@ -5222,13 +3874,9 @@ msgstr "piki wysokiego użycia, czy stałe użycie CPU w 100%?"
 
 #: i2p2www/pages/site/faq.html:916
 msgid ""
-"Is the CPU usage simply higher than you would like, or is it pegged at "
-"100&#37; for a long time?\n"
+"Is the CPU usage simply higher than you would like, or is it pegged at 100&#37; for a long time?\n"
 "If it is pegged, this could be a bug. Look in the logs for clues."
-msgstr ""
-"Czy użycie procesora jest po prostu wyższe nie byś chciał(a), czy cały "
-"czas wynosi 100&#37;? Jeżeli stale wynosi 100&#37; to może to być jakiś "
-"błąd. Zajrzyj do dziennika węzła po dalsze informacje."
+msgstr "Czy użycie procesora jest po prostu wyższe nie byś chciał(a), czy cały czas wynosi 100&#37;? Jeżeli stale wynosi 100&#37; to może to być jakiś błąd. Zajrzyj do dziennika węzła po dalsze informacje."
 
 #: i2p2www/pages/site/faq.html:922
 msgid "Java-related"
@@ -5237,17 +3885,9 @@ msgstr "zwiÄ…zane z JavÄ…"
 #: i2p2www/pages/site/faq.html:923
 #, python-format
 msgid ""
-"You may be using the Java-based BigInteger library instead of the native "
-"version, especially if you are running on a new or unusual OS or hardware"
-" (OpenSolaris, mipsel, etc.).\n"
-"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on "
-"diagnosing, building, and testing methods."
-msgstr ""
-"Być może używasz opartej na Javie biblioteki BigInteger zamiast natywnej "
-"wersji, zwłaszcza jeżeli masz nowy lub nietypowy sprzęt lub system "
-"(OpenSolaris, mipsel, itp.). Zajrzyj na <a href=\"%(jbigi)s\">stronÄ™ "
-"jbigi</a> po instrukcje na temat diagnozowania, kompilacji i metod "
-"testowania."
+"You may be using the Java-based BigInteger library instead of the native version, especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n"
+"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on diagnosing, building, and testing methods."
+msgstr "Być może używasz opartej na Javie biblioteki BigInteger zamiast natywnej wersji, zwłaszcza jeżeli masz nowy lub nietypowy sprzęt lub system (OpenSolaris, mipsel, itp.). Zajrzyj na <a href=\"%(jbigi)s\">stronę jbigi</a> po instrukcje na temat diagnozowania, kompilacji i metod testowania."
 
 #: i2p2www/pages/site/faq.html:929
 msgid "Participating tunnels"
@@ -5255,231 +3895,109 @@ msgstr "tunele uczestniczÄ…ce"
 
 #: i2p2www/pages/site/faq.html:930
 msgid ""
-"If your native jbigi library is working fine, the biggest user of CPU may"
-" be routing traffic for participating tunnels. \n"
-"This uses CPU because at each hop a layer of encryption must be decoded. "
-"You can limit participating traffic in two ways -\n"
-"by reducing the share bandwidth on the <a "
-"href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n"
-"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a "
-"href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> "
-"page."
-msgstr ""
-"Jeżeli Twoja natywna biblioteka jbigi działa poprawnie, największym "
-"pożeraczem CPU prawdopodobnie jest przekazywany ruch uczestniczących "
-"tuneli. To wykorzystuje CPU, ponieważ przy każdym skoku każda kolejna "
-"warstwa szyfrowania musi zostać zdekodowana. Możesz zmniejszyć ruch "
-"uczestniczący na dwa sposoby – poprzez redukcję udostępnianej "
-"przepustowości na stronie <a "
-"href=\"http://localhost:7657/confignet.jsp\">confignet.jsp</a> lub "
-"poprzez ustawienie <tt>router.maxParticipatingTunnels=nnn</tt> na stronie"
-" <a "
-"href=\"http://localhost:7657/configadvanced.jsp\">configadvanced.jsp</a>."
+"If your native jbigi library is working fine, the biggest user of CPU may be routing traffic for participating tunnels. \n"
+"This uses CPU because at each hop a layer of encryption must be decoded. You can limit participating traffic in two ways -\n"
+"by reducing the share bandwidth on the <a href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n"
+"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> page."
+msgstr "Jeżeli Twoja natywna biblioteka jbigi działa poprawnie, największym pożeraczem CPU prawdopodobnie jest przekazywany ruch uczestniczących tuneli. To wykorzystuje CPU, ponieważ przy każdym skoku każda kolejna warstwa szyfrowania musi zostać zdekodowana. Możesz zmniejszyć ruch uczestniczący na dwa sposoby – poprzez redukcję udostępnianej przepustowości na stronie <a href=\"http://localhost:7657/confignet.jsp\">confignet.jsp</a> lub poprzez ustawienie <tt>router.maxParticipatingTunnels=nnn</tt> na stronie <a href=\"http://localhost:7657/configadvanced.jsp\">configadvanced.jsp</a>."
 
 #: i2p2www/pages/site/faq.html:942
 msgid ""
 "If your router has 10 or more active peers, everything is fine. \n"
 "The router should maintain connections to a few peers at all times. \n"
-"The best way to stay \"better-connected\" to the network is to share more"
-" bandwidth. \n"
-"The amount of bandwidth that is shared by the router can be changed on "
-"the configuration page: \n"
-"  <a "
-"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>"
-msgstr ""
-"Jeżeli Twój węzeł łączy się z 10 lub więcej aktywnymi uczestnikami, to "
-"wszystko jest w porządku. Węzeł I2P przez cały czas powinien utrzymywać "
-"łączność z kilkoma uczestnikami. Najlepszym sposobem na bycie „lepiej "
-"połączonym” z siecią jest udostępnianie większej ilości pasma. Ilość "
-"pasma udostępnianego przez węzeł można skonfigurować na stronie  <a "
-"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>."
+"The best way to stay \"better-connected\" to the network is to share more bandwidth. \n"
+"The amount of bandwidth that is shared by the router can be changed on the configuration page: \n"
+"  <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>"
+msgstr "Jeżeli Twój węzeł łączy się z 10 lub więcej aktywnymi uczestnikami, to wszystko jest w porządku. Węzeł I2P przez cały czas powinien utrzymywać łączność z kilkoma uczestnikami. Najlepszym sposobem na bycie „lepiej połączonym” z siecią jest udostępnianie większej ilości pasma. Ilość pasma udostępnianego przez węzeł można skonfigurować na stronie  <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>."
 
 #: i2p2www/pages/site/faq.html:953
 msgid ""
 "No, there isn't anything wrong. \n"
 "This is normal behavior. \n"
-"All routers adjust dynamically to changing network conditions and "
-"demands. \n"
-"Routers come online and go offline depending on whether the system it is "
-"installed on is operational or not, as well as whether there is an "
-"available network connection. \n"
+"All routers adjust dynamically to changing network conditions and demands. \n"
+"Routers come online and go offline depending on whether the system it is installed on is operational or not, as well as whether there is an available network connection. \n"
 "Your router is constantly updating its local Network Database. \n"
-"Tunnels which your router is participating in expire every 10 minutes and"
-" may or may not be rebuilt through your router."
-msgstr ""
-"Nie, to jest normalne zachowanie. Każdy węzeł dynamicznie dostosowuje się"
-" do zmieniających się warunków sieci i potrzeb. Węzły przyłączają i "
-"odłączają się od sieci w zależności od tego czy maszyny na których są "
-"zainstalowane są włączone/wyłączone i czy są połączone bądź odłączone od "
-"internetu. Twój węzeł na bieżąco aktualizuje swoją bazę danych sieci "
-"(NetDB). Tunele w których uczestniczy Twój węzeł wygasają po 10 minutach "
-"i mogą być odnowione przez Twój węzeł."
+"Tunnels which your router is participating in expire every 10 minutes and may or may not be rebuilt through your router."
+msgstr "Nie, to jest normalne zachowanie. Każdy węzeł dynamicznie dostosowuje się do zmieniających się warunków sieci i potrzeb. Węzły przyłączają i odłączają się od sieci w zależności od tego czy maszyny na których są zainstalowane są włączone/wyłączone i czy są połączone bądź odłączone od internetu. Twój węzeł na bieżąco aktualizuje swoją bazę danych sieci (NetDB). Tunele w których uczestniczy Twój węzeł wygasają po 10 minutach i mogą być odnowione przez Twój węzeł."
 
 #: i2p2www/pages/site/faq.html:965
 msgid ""
-"The encryption and routing within the I2P network adds a substantial "
-"amount of overhead and limits bandwidth. \n"
+"The encryption and routing within the I2P network adds a substantial amount of overhead and limits bandwidth. \n"
 "\n"
 "We can try to clarify this with the aid of a diagram:"
-msgstr ""
-"Szyfrowanie i trasowanie pakietów w sieci I2P stanowi znaczący narzut i "
-"zmniejsza dostępną przepustowość. Można to wyjaśnić za pomocą rysunku:"
+msgstr "Szyfrowanie i trasowanie pakietów w sieci I2P stanowi znaczący narzut i zmniejsza dostępną przepustowość. Można to wyjaśnić za pomocą rysunku:"
 
 #: i2p2www/pages/site/faq.html:973
 msgid ""
-"In this diagram, the path that some I2P traffic takes as it travels "
-"through the network is traced. \n"
-"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden "
-"Service (for example, the http://stats.i2p website) is labelled as 'B'."
-" \n"
-"Both the client and the server are using 3-hop tunnels, these hops are "
-"represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', "
-"'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'."
-msgstr ""
-"Na tym rysunku jest prześledzona droga wiadomości w sieci I2P. Węzeł "
-"użytkownika I2P jest oznaczony jako „A”, a ukryta usługa (przykładowo "
-"strona http://stats.i2p) jest oznaczony jako „B”. Zarówno klient jak i "
-"serwer korzystajÄ… z 3-skokowych tuneli, te skoki sÄ… reprezentowane  jako:"
-" „P”, „Q”, „R”, „X”, „Y”, „Z”, „P₁”, „Q₁”, „R₁”, „X₁”, „Y₁” i „Z₁”."
+"In this diagram, the path that some I2P traffic takes as it travels through the network is traced. \n"
+"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden Service (for example, the http://stats.i2p website) is labelled as 'B'. \n"
+"Both the client and the server are using 3-hop tunnels, these hops are represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', 'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'."
+msgstr "Na tym rysunku jest prześledzona droga wiadomości w sieci I2P. Węzeł użytkownika I2P jest oznaczony jako „A”, a ukryta usługa (przykładowo strona http://stats.i2p) jest oznaczony jako „B”. Zarówno klient jak i serwer korzystają z 3-skokowych tuneli, te skoki są reprezentowane  jako: „P”, „Q”, „R”, „X”, „Y”, „Z”, „P₁”, „Q₁”, „R₁”, „X₁”, „Y₁” i „Z₁”."
 
 #: i2p2www/pages/site/faq.html:979
 msgid ""
-"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A "
-"while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel"
-" for 'B'. \n"
-"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound "
-"tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent "
-"an inbound tunnel for 'A'. \n"
+"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel for 'B'. \n"
+"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. \n"
 "The arrows in between the boxes show the direction of traffic. \n"
-"The text above and below the arrows detail some example bandwidth between"
-" a pair of hops as well as example latencies."
-msgstr ""
-"„P”, „Q” i „R” reprezentują tunel wychodzący dla „A”; „X₁”, „Y₁” i „Z₁” "
-"reprezentują tunel wychodzący dla „B”. Analogicznie „X”, „Y” i „Z” "
-"reprezentują tunel przychodzący dla „B”, oraz  „P₁”, „Q₁” i „R₁” "
-"oznaczają tunel przychodzący dla „A”. Strzałki symbolizują kierunek ruchu"
-" pakietów. Teksty nad i pod strzałkami symbolizują przepustowość i "
-"opóźnienie pomiędzy parami skoków."
+"The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies."
+msgstr "„P”, „Q” i „R” reprezentują tunel wychodzący dla „A”; „X₁”, „Y₁” i „Z₁” reprezentują tunel wychodzący dla „B”. Analogicznie „X”, „Y” i „Z” reprezentują tunel przychodzący dla „B”, oraz  „P₁”, „Q₁” i „R₁” oznaczają tunel przychodzący dla „A”. Strzałki symbolizują kierunek ruchu pakietów. Teksty nad i pod strzałkami symbolizują przepustowość i opóźnienie pomiędzy parami skoków."
 
 #: i2p2www/pages/site/faq.html:986
 msgid ""
-"When both client and server are using 3-hop tunnels throughout, a total "
-"of 12 other I2P routers are involved in relaying traffic. \n"
-"6 peers relay traffic from the client to the server which is split into a"
-" 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound "
-"tunnel to 'B' ('X', 'Y', 'Z').  \n"
+"When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. \n"
+"6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z').  \n"
 "Similarly, 6 peers relay traffic from the server to back to the client."
-msgstr ""
-"Kiedy zarówno klient jak i serwer korzystają z 3‑skokowych tuneli, "
-"sumarycznie 12 innych węzłów sieci I2P tuneluje ruch. 6 uczestników "
-"pośredniczy w transferze od klienta do serwera, na transfer ten składa "
-"się 3‑skokowy tunel wychodzący z „A” („P”, „Q”, „R”) i 3‑skokowy tunel "
-"przychodzący do „B” („X”, „Y”, „Z”). W podobny sposób 6 uczestników "
-"pośredniczy w transferze od serwera do klienta."
+msgstr "Kiedy zarówno klient jak i serwer korzystają z 3‑skokowych tuneli, sumarycznie 12 innych węzłów sieci I2P tuneluje ruch. 6 uczestników pośredniczy w transferze od klienta do serwera, na transfer ten składa się 3‑skokowy tunel wychodzący z „A” („P”, „Q”, „R”) i 3‑skokowy tunel przychodzący do „B” („X”, „Y”, „Z”). W podobny sposób 6 uczestników pośredniczy w transferze od serwera do klienta."
 
 #: i2p2www/pages/site/faq.html:992
 msgid ""
-"First, we can consider latency - the time that it takes for a request "
-"from a client to traverse the I2P network, reach the the server and "
-"traverse back to the client. \n"
+"First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. \n"
 "Adding up all latencies we see that:"
-msgstr ""
-"Na początek rozważmy opóźnienie – czas potrzebny na wysłanie zapytania od"
-" klienta przez sieć I2P do serwera i wysłanie odpowiedzi z powrotem do "
-"klienta. Dodając opóźnienia otrzymujemy:"
+msgstr "Na początek rozważmy opóźnienie – czas potrzebny na wysłanie zapytania od klienta przez sieć I2P do serwera i wysłanie odpowiedzi z powrotem do klienta. Dodając opóźnienia otrzymujemy:"
 
 #: i2p2www/pages/site/faq.html:1006
 msgid ""
-"The total round-trip time in our example adds up to 740 ms - certainly "
-"much higher than what one would normally see while browsing regular "
-"internet websites."
-msgstr ""
-"W naszym przykładzie jest to 740 ms – zdecydowanie więcej niż podczas "
-"normalnego przeglÄ…dania internetu."
+"The total round-trip time in our example adds up to 740 ms - certainly much "
+"higher than what one would normally see while browsing regular internet "
+"websites."
+msgstr "W naszym przykładzie jest to 740 ms – zdecydowanie więcej niż podczas normalnego przeglądania internetu."
 
 #: i2p2www/pages/site/faq.html:1010
 msgid ""
 "Second, we can consider available bandwidth. \n"
-"This is determined through the slowest link between hops from the client "
-"and server as well as when traffic is being transmitted by the server to "
-"the client. \n"
-"For traffic going from the client to the server, we see that the "
-"available bandwidth in our example between hops 'R' &amp; 'X' as well as "
-"hops 'X' &amp; 'Y' is 32 KB/s. \n"
-"Despite higher available bandwidth between the other hops, these hops "
-"will act as a bottleneck and will limit the maximum available bandwidth "
-"for traffic from 'A' to 'B' at 32 KB/s. \n"
-"Similarly, tracing the path from server to client shows that there is "
-"maximum bandwidth of 64 KB/s - between hops 'Z_1' &amp; 'Y_1, 'Y_1' &amp;"
-" 'X_1' and 'Q_1' &amp; 'P_1'."
-msgstr ""
-"Teraz prześledźmy dostępną przepustowość. Jest ona zależna od "
-"najwolniejszego połączenia pomiędzy skokami od klienta do serwera, oraz "
-"także od serwera do klienta. Dostępna przepustowość dla ruchu "
-"wychodzącego od klienta do serwera w naszym przykładzie pomiędzy "
-"uczestnikami „R” i „X” oraz pomiędzy „X” i „Y” wynosi 32 KB/s. Pomimo "
-"większej dostępnej przepustowości pomiędzy innymi skokami, te skoki są "
-"wąskim gardłem i limitują maksymalną dostępną przepustowość od „A” do „B”"
-" na 32 KB/s. W podobny sposób można prześledzić trasę od serwera do "
-"klienta i wykazać, że dostępna przepustowość wynosi 64 KB/s – pomiędzy "
-"skokami „Z₁” i „Y₁” oraz „Y₁” i „X₁” oraz „Q₁” i „P₁”."
+"This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. \n"
+"For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' &amp; 'X' as well as hops 'X' &amp; 'Y' is 32 KB/s. \n"
+"Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. \n"
+"Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' &amp; 'Y_1, 'Y_1' &amp; 'X_1' and 'Q_1' &amp; 'P_1'."
+msgstr "Teraz prześledźmy dostępną przepustowość. Jest ona zależna od najwolniejszego połączenia pomiędzy skokami od klienta do serwera, oraz także od serwera do klienta. Dostępna przepustowość dla ruchu wychodzącego od klienta do serwera w naszym przykładzie pomiędzy uczestnikami „R” i „X” oraz pomiędzy „X” i „Y” wynosi 32 KB/s. Pomimo większej dostępnej przepustowości pomiędzy innymi skokami, te skoki są wąskim gardłem i limitują maksymalną dostępną przepustowość od „A” do „B” na 32 KB/s. W podobny sposób można prześledzić trasę od serwera do klienta i wykazać, że dostępna przepustowość wynosi 64 KB/s – pomiędzy skokami „Z₁” i „Y₁” oraz „Y₁” i „X₁” oraz „Q₁” i „P₁”."
 
 #: i2p2www/pages/site/faq.html:1018
 msgid ""
 "We recommend increasing your bandwidth limits. \n"
-"This helps the network by increasing the amount of available bandwidth "
-"which will in turn improve your I2P experience. \n"
-"Bandwidth settings are located on the <a "
-"href=\"http://localhost:7657/config\">http://localhost:7657/config</a> "
-"page. \n"
-"Please be aware of your internet connection's limits as determined by "
-"your ISP, and adjust your settings accordingly."
-msgstr ""
-"Zalecamy, abyś zwiększył(a) swoje limity przepustowości. Pomoże to sieci "
-"zwiększając dostępną przepustowość, co podniesie Twój komfort korzystania"
-" z sieci I2P. Ustawienia przepustowości są konfigurowalne na stronie <a "
-"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>. "
-"Proszę mieć na uwadze fakt, że limity połączenia internetowego zależą od "
-"dostawcy Å‚Ä…cza internetowego."
+"This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. \n"
+"Bandwidth settings are located on the <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a> page. \n"
+"Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly."
+msgstr "Zalecamy, abyś zwiększył(a) swoje limity przepustowości. Pomoże to sieci zwiększając dostępną przepustowość, co podniesie Twój komfort korzystania z sieci I2P. Ustawienia przepustowości są konfigurowalne na stronie <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>. Proszę mieć na uwadze fakt, że limity połączenia internetowego zależą od dostawcy łącza internetowego."
 
 #: i2p2www/pages/site/faq.html:1025
 msgid ""
-"We also recommend setting a sufficient amount of shared bandwidth - this "
-"allows for participating tunnels to be routed through your I2P router. \n"
-"Allowing participating traffic keeps your router well-integrated in the "
-"network and improves your transfer speeds."
-msgstr ""
-"Również zalecamy ustawienie wystarczającej ilości udostępnianego pasma – "
-"pozwala to na uczestnictwo w tunelowaniu ruchu innych uczestników przez "
-"Twój węzeł I2P. Tunelowanie ruchu innych sprawia, że Twój węzeł jest "
-"dobrze zintegrowany z siecią i zwiększa szybkości Twoich transferów."
+"We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. \n"
+"Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds."
+msgstr "Również zalecamy ustawienie wystarczającej ilości udostępnianego pasma – pozwala to na uczestnictwo w tunelowaniu ruchu innych uczestników przez Twój węzeł I2P. Tunelowanie ruchu innych sprawia, że Twój węzeł jest dobrze zintegrowany z siecią i zwiększa szybkości Twoich transferów."
 
 #: i2p2www/pages/site/faq.html:1030
 #, python-format
 msgid ""
-"I2P is a work in progress. Lots of improvements and fixes are being "
-"implemented, and, generally speaking, running the latest release will "
-"help your performance.\n"
-"If you haven't, <a href=\"%(downloadslist)s\">install the latest "
-"release</a>."
-msgstr ""
-"I2P jest wciąż w fazie rozwoju. Jest wprowadzane mnóstwo ulepszeń i "
-"poprawek, i ogólnie mówiąc, korzystanie z najnowszej wersji ma pozytywny "
-"wpływ na wydajność. Jeżeli tego nie zrobiłeś, to <a "
-"href=\"%(downloadslist)s\">zainstaluj najnowszÄ… wersjÄ™</a>."
+"I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance.\n"
+"If you haven't, <a href=\"%(downloadslist)s\">install the latest release</a>."
+msgstr "I2P jest wciąż w fazie rozwoju. Jest wprowadzane mnóstwo ulepszeń i poprawek, i ogólnie mówiąc, korzystanie z najnowszej wersji ma pozytywny wpływ na wydajność. Jeżeli tego nie zrobiłeś, to <a href=\"%(downloadslist)s\">zainstaluj najnowszą wersję</a>."
 
 #: i2p2www/pages/site/faq.html:1038
 msgid ""
-"You may report any bugs/issues that you encounter on our bugtracker, "
-"which is available over both non-private internet and I2P. \n"
-"We have a discussion forum, also available on I2P and non-private "
-"internet. You can join our IRC channel as well: \n"
+"You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. \n"
+"We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: \n"
 "either through our IRC network, IRC2P, or on Freenode."
-msgstr ""
-"Napotkane błędy/problemy można zgłaszać na naszym systemie śledzenia "
-"błędów, dostępnym zarówno z normalnego internetu jak i z I2P. Mamy "
-"również forum – dostępne z I2P i z normalnego internetu. Mamy również "
-"kanał IRC – dostępny poprzez I2P (Irc2P) lub poprzez Freenode."
+msgstr "Napotkane błędy/problemy można zgłaszać na naszym systemie śledzenia błędów, dostępnym zarówno z normalnego internetu jak i z I2P. Mamy również forum – dostępne z I2P i z normalnego internetu. Mamy również kanał IRC – dostępny poprzez I2P (Irc2P) lub poprzez Freenode."
 
 #: i2p2www/pages/site/faq.html:1044
 msgid "Our Bugtracker:"
@@ -5499,22 +4017,11 @@ msgstr "Forum:"
 
 #: i2p2www/pages/site/faq.html:1050
 msgid ""
-"You may paste any interesting logs to a paste service such as the non-"
-"private internet services listed on the \n"
-"  <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-"
-"Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n"
-"  <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this"
-" \n"
-"  <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and"
-" follow up on IRC in #i2p<"
-msgstr ""
-"Możesz wkleić powiązany dziennik zdarzeń do wklejarki (pastebin), listę "
-"wklejarek w zwykłym internecie znajdziesz na <a "
-"href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-"
-"Instances-Directory\">PrivateBin Wiki</a>; w sieci I2P dostępny jest <a "
-"href=\"http://paste.crypthost.i2p\">ten serwer PrivateBin</a> bądź <a "
-"href=\"http://pasta-nojs.i2p\">ten serwer niewymagajÄ…cy JavaScriptu</a>, "
-"a następnie wejdź na kanał #i2p na naszym IRC."
+"You may paste any interesting logs to a paste service such as the non-private internet services listed on the \n"
+"  <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n"
+"  <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this \n"
+"  <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and follow up on IRC in #i2p<"
+msgstr "Możesz wkleić powiązany dziennik zdarzeń do wklejarki (pastebin), listę wklejarek w zwykłym internecie znajdziesz na <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Instances-Directory\">PrivateBin Wiki</a>; w sieci I2P dostępny jest <a href=\"http://paste.crypthost.i2p\">ten serwer PrivateBin</a> bądź <a href=\"http://pasta-nojs.i2p\">ten serwer niewymagający JavaScriptu</a>, a następnie wejdź na kanał #i2p na naszym IRC."
 
 #: i2p2www/pages/site/faq.html:1054
 msgid "Join #i2p-dev Discuss with the developers on IRC"
@@ -5522,20 +4029,11 @@ msgstr "Porozmawiaj z programistami na IRC-u na kanale #i2p-dev"
 
 #: i2p2www/pages/site/faq.html:1058
 msgid ""
-"Please include relevant information from the router logs page which is "
-"available at: \n"
+"Please include relevant information from the router logs page which is available at: \n"
 "<a href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>.\n"
-"We request that you share all of the text under the 'I2P Version and "
-"Running Environment' \n"
-"section as well as any errors or warnings displayed in the various logs "
-"displayed on the page."
-msgstr ""
-"Prosimy zawrzeć powiązane informacje z dziennika zdarzeń węzła, który "
-"jest dostępny pod adresem <a "
-"href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>. "
-"Prosimy o udostępnienie całego tekstu z sekcji „wersja I2P i środowisko "
-"uruchomieniowe” wraz z błędami/ostrzeżeniami wyświetlanymi w dzienniku na"
-" stronie konsoli."
+"We request that you share all of the text under the 'I2P Version and Running Environment' \n"
+"section as well as any errors or warnings displayed in the various logs displayed on the page."
+msgstr "Prosimy zawrzeć powiązane informacje z dziennika zdarzeń węzła, który jest dostępny pod adresem <a href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>. Prosimy o udostępnienie całego tekstu z sekcji „wersja I2P i środowisko uruchomieniowe” wraz z błędami/ostrzeżeniami wyświetlanymi w dzienniku na stronie konsoli."
 
 #: i2p2www/pages/site/faq.html:1070
 #, python-format
@@ -5545,16 +4043,8 @@ msgid ""
 "  <li>on <code>irc.freenode.net</code> channel <code>#i2p</code></li>\n"
 "  <li>on <code>IRC2P</code> channel <code>#i2p</code></li>\n"
 "</ul>\n"
-"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it "
-"here (with the answer, hopefully)."
-msgstr ""
-"Åšwietnie! Znajdziesz nasz na IRC:\n"
-"<ul>\n"
-"  <li>na kanale <code>#i2p</code> na <code>irc.freenode.net</code></li>\n"
-"  <li>na kanale <code>#i2p</code> na <code>IRC2P</code></li>\n"
-"</ul>\n"
-"lub napisz na <a href=\"http://%(forum)s/\">forum I2P</a>, a my Ci "
-"odpiszemy."
+"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it here (with the answer, hopefully)."
+msgstr "Åšwietnie! Znajdziesz nasz na IRC:\n<ul>\n  <li>na kanale <code>#i2p</code> na <code>irc.freenode.net</code></li>\n  <li>na kanale <code>#i2p</code> na <code>IRC2P</code></li>\n</ul>\nlub napisz na <a href=\"http://%(forum)s/\">forum I2P</a>, a my Ci odpiszemy."
 
 #: i2p2www/pages/site/impressum.html:4
 msgid "German laws"
@@ -5567,13 +4057,9 @@ msgstr "Sieć Anonimowa I2P"
 #: i2p2www/pages/site/index.html:4
 msgid ""
 "Anonymous peer-to-peer distributed communication layer built with open "
-"source tools and designed to run any traditional Internet service such as"
-" email, IRC or web hosting."
-msgstr ""
-"Anonimowa rozproszona i bezpośrednia (peer-to-peer) warstwa komunikacji "
-"stworzona za pomocą otwartoźródłowego oprogramowania i przeznaczona do "
-"uruchamiania tradycyjnych usług internetowych jak e-mail, IRC i stron "
-"internetowych."
+"source tools and designed to run any traditional Internet service such as "
+"email, IRC or web hosting."
+msgstr "Anonimowa rozproszona i bezpośrednia (peer-to-peer) warstwa komunikacji stworzona za pomocą otwartoźródłowego oprogramowania i przeznaczona do uruchamiania tradycyjnych usług internetowych jak e-mail, IRC i stron internetowych."
 
 #: i2p2www/pages/site/index.html:8
 msgid "Welcome to the Invisible Internet"
@@ -5581,13 +4067,9 @@ msgstr "Witamy w niewidzialnym internecie"
 
 #: i2p2www/pages/site/index.html:9
 msgid ""
-"The Invisible Internet is a privacy by design, people-powered network. It"
-" is a truly free and anonymizing Internet alternative. Get I2P.\n"
+"The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P.\n"
 "  "
-msgstr ""
-"Projekt Niewidzialny Internet jest sieciÄ… tworzonÄ… przez wolontariuszy "
-"zaprojektowaną z myślą o prywatności. Jest to wolna i anonimowa "
-"alternatywa dla zwykłego internetu."
+msgstr "Projekt Niewidzialny Internet jest siecią tworzoną przez wolontariuszy zaprojektowaną z myślą o prywatności. Jest to wolna i anonimowa alternatywa dla zwykłego internetu."
 
 #: i2p2www/pages/site/index.html:11
 #, python-format
@@ -5601,21 +4083,11 @@ msgstr "Czym jest I2P?"
 #: i2p2www/pages/site/index.html:17
 msgid ""
 "\n"
-"        The Invisible Internet Project (I2P) is a fully encrypted private"
-" network layer.\n"
-"        It protects your activity and location. Every day people use the "
-"network to connect\n"
-"        with people without worry of being tracked or their data being "
-"collected. In some\n"
-"        cases people rely on the network when they need to be discrete or"
-" are doing sensitive work."
-msgstr ""
-"\n"
-"Projekt Niewidzialny Internet (|I2P) jest całkowicie szyfrowaną prywatną "
-"warstwą sieci. Zapewnia zarówno prywatność jak i anonimowość. Każdego "
-"dnia ludzie korzystają z niej, aby łączyć się z innymi ludźmi bez obaw o "
-"bycie śledzonymi. Niekiedy ludzie polegają na sieci I2P, kiedy potrzebują"
-" dyskrecji lub podczas wykonywania poufnych zadań."
+"        The Invisible Internet Project (I2P) is a fully encrypted private network layer.\n"
+"        It protects your activity and location. Every day people use the network to connect\n"
+"        with people without worry of being tracked or their data being collected. In some\n"
+"        cases people rely on the network when they need to be discrete or are doing sensitive work."
+msgstr "\nProjekt Niewidzialny Internet (|I2P) jest całkowicie szyfrowaną prywatną warstwą sieci. Zapewnia zarówno prywatność jak i anonimowość. Każdego dnia ludzie korzystają z niej, aby łączyć się z innymi ludźmi bez obaw o bycie śledzonymi. Niekiedy ludzie polegają na sieci I2P, kiedy potrzebują dyskrecji lub podczas wykonywania poufnych zadań."
 
 #: i2p2www/pages/site/index.html:23
 msgid "I2P Cares About Privacy"
@@ -5624,22 +4096,14 @@ msgstr "I2P troszczy się o prywatność"
 #: i2p2www/pages/site/index.html:25
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
-msgstr ""
-"Sieć I2P ukrywa serwer przed użytkownikiem i użytkownika przed serwerem. "
-"Cały ruch w sieci I2P to ruch wewnętrzny, niemający bezpośredniego "
-"kontaktu ze zwykłym internetem. Jest to warstwa sieci nad internetem. "
-"Sieć I2P wykorzystuje szyfrowane tunele jednokierunkowe pomiędzy Tobą i "
-"innymi użytkownikami. Nikt nie może zobaczyć skąd, dokąd i co jest "
-"przesyłane. Dodatkowo sieć oferuje ochronę przed rozpoznawaniem wzorców i"
-" przed blokadą cenzorów. Ponieważ sieć I2P wykorzystuje użytkowników do "
-"przesyłania ruchu, blokowanie lokalizacji jest również ograniczone."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
+msgstr "Sieć I2P ukrywa serwer przed użytkownikiem i użytkownika przed serwerem. Cały ruch w sieci I2P to ruch wewnętrzny, niemający bezpośredniego kontaktu ze zwykłym internetem. Jest to warstwa sieci nad internetem. Sieć I2P wykorzystuje szyfrowane tunele jednokierunkowe pomiędzy Tobą i innymi użytkownikami. Nikt nie może zobaczyć skąd, dokąd i co jest przesyłane. Dodatkowo sieć oferuje ochronę przed rozpoznawaniem wzorców i przed blokadą cenzorów. Ponieważ sieć I2P wykorzystuje użytkowników do przesyłania ruchu, blokowanie lokalizacji jest również ograniczone."
 
 #: i2p2www/pages/site/index.html:27
 msgid "Read more&hellip;"
@@ -5652,8 +4116,8 @@ msgstr "P2P"
 #: i2p2www/pages/site/index.html:33
 msgid ""
 "The network is people powered . Peers make a portion of their resources, "
-"particularly bandwidth, available to other network participants. This "
-"allows the network to function without relying on centralized servers."
+"particularly bandwidth, available to other network participants. This allows"
+" the network to function without relying on centralized servers."
 msgstr ""
 
 #: i2p2www/pages/site/index.html:33
@@ -5668,10 +4132,7 @@ msgstr "Zaprojektowana z myślą o prywatności i bezpieczeństwie"
 msgid ""
 "I2P has created transport protocols that resist DPI censorship, and "
 "continuously improves its end to end encryption."
-msgstr ""
-"Sieć I2P używa protokołów transportowych odpornych na głęboką inspekcję "
-"pakietów (DPI), a używane metody szyfrowania od-końca-do-końca są "
-"nieustannie ulepszane."
+msgstr "Sieć I2P używa protokołów transportowych odpornych na głęboką inspekcję pakietów (DPI), a używane metody szyfrowania od-końca-do-końca są nieustannie ulepszane."
 
 #: i2p2www/pages/site/index.html:37
 msgid "Read the I2P Transport Overview"
@@ -5687,9 +4148,7 @@ msgstr "I2P jest warstwą aplikacji z łatwym w użyciu "
 
 #: i2p2www/pages/site/index.html:40
 msgid "APIs for creating your own privacy - aware apps."
-msgstr ""
-"API umożliwiającym tworzenie własnych aplikacji nakierowanych na "
-"prywatność."
+msgstr "API umożliwiającym tworzenie własnych aplikacji nakierowanych na prywatność."
 
 #: i2p2www/pages/site/index.html:44
 msgid "News &amp; Updates"
@@ -5707,12 +4166,8 @@ msgstr "Polecane odnośniki i zasoby"
 #, python-format
 msgid ""
 "See also the page with\n"
-"<a href=\"%(media)s\">links to presentations, videos, and tutorials about"
-" I2P</a>."
-msgstr ""
-"Zobacz także stronę z\n"
-"<a href=\"%(media)s\">linkami do prezentacji, filmikami, i poradnikami o "
-"I2P</a>."
+"<a href=\"%(media)s\">links to presentations, videos, and tutorials about I2P</a>."
+msgstr "Zobacz także stronę z\n<a href=\"%(media)s\">linkami do prezentacji, filmikami, i poradnikami o I2P</a>."
 
 #: i2p2www/pages/site/links.html:12
 msgid "I2P on the web"
@@ -5737,4 +4192,3 @@ msgstr "Fora, nowości, inne"
 #: i2p2www/pages/site/links.html:51
 msgid "Very Old Stuff"
 msgstr "Starocie"
-
diff --git a/i2p2www/translations/ro/LC_MESSAGES/about.po b/i2p2www/translations/ro/LC_MESSAGES/about.po
index 825c034203e2ad5c03b3fa99fab63cfe964c1fe2..e5789b104f02fb5df99ed0a077ecabb1d763c856 100644
--- a/i2p2www/translations/ro/LC_MESSAGES/about.po
+++ b/i2p2www/translations/ro/LC_MESSAGES/about.po
@@ -1,25 +1,25 @@
-# Romanian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # polearnik <polearnik@mail.ru>, 2019
 # titus <titus0818@gmail.com>, 2015-2016
 # titus <titus0818@gmail.com>, 2015
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: polearnik <polearnik@mail.ru>\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: polearnik <polearnik@mail.ru>, 2019\n"
 "Language-Team: Romanian (http://www.transifex.com/otf/I2P/language/ro/)\n"
-"Plural-Forms: nplurals=3; "
-"plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1))\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ro\n"
+"Plural-Forms: nplurals=3; plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1));\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -29,15 +29,9 @@ msgstr "Clienți alternative I2P"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
-msgstr ""
-"Principala implementare a clientului I2P utilizează Java. Dacă pentru "
-"unii\n"
-"motiv pentru care nu puteți utiliza Java pe dispozitivul dvs., există "
-"implementări alternative\n"
-"dezvoltat de membrii comunității."
+msgstr "Principala implementare a clientului I2P utilizează Java. Dacă pentru unii\nmotiv pentru care nu puteți utiliza Java pe dispozitivul dvs., există implementări alternative\ndezvoltat de membrii comunității."
 
 #: i2p2www/pages/site/about/alternative-clients.html:12
 #, python-format
@@ -45,32 +39,21 @@ msgid ""
 "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n"
 "As of early 2016, i2pd is became stable enough to be used in \n"
 "production, and since summer 2016 it fully implements all I2P APIs."
-msgstr ""
-"<a href=\"%(i2pd)s\">i2pd</a> este o implementare a clientului I2P în C "
-"++.\n"
-"La începutul anului 2016, i2pd a devenit suficient de stabil pentru a fi "
-"utilizat în\n"
-"producție, iar din vara 2016 implementează integral toate API-urile I2P."
+msgstr "<a href=\"%(i2pd)s\">i2pd</a> este o implementare a clientului I2P în C ++.\nLa începutul anului 2016, i2pd a devenit suficient de stabil pentru a fi utilizat în\nproducție, iar din vara 2016 implementează integral toate API-urile I2P."
 
 #: i2p2www/pages/site/about/alternative-clients.html:19
 #, python-format
 msgid ""
 "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero "
 "cryptocurrency."
-msgstr ""
-"<a href=\"%(kovri)s\">Kovri</a> este o furcă activă i2pd dezvoltată "
-"pentru criptocurrency Monero."
+msgstr "<a href=\"%(kovri)s\">Kovri</a> este o furcă activă i2pd dezvoltată pentru criptocurrency Monero."
 
 #: i2p2www/pages/site/about/alternative-clients.html:24
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
-msgstr ""
-"<a href=\"%(go_i2p)s\">Go-I2P</a> este un client I2P dezvoltat folosind\n"
-"<a href=\"%(golang)s\">GO</a> limbaj de programare. Proiectul este în "
-"curs de dezvoltare."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
+msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> este un client I2P dezvoltat folosind\n<a href=\"%(golang)s\">GO</a> limbaj de programare. Proiectul este în curs de dezvoltare."
 
 #: i2p2www/pages/site/about/browser-config.html:2
 msgid "Web Browser Configuration"
@@ -82,11 +65,147 @@ msgstr "Glosar"
 
 #: i2p2www/pages/site/about/glossary.html:4
 msgid ""
-"This page lists often-used terminology when discussing I2P and "
+"This table lists often-used terminology when discussing I2P and "
 "cryptography."
 msgstr ""
-"Această pagină listează terminologia folosită frecvent atunci când "
-"discută despre I2P și criptografie."
+
+#: i2p2www/pages/site/about/glossary.html:9
+msgid ""
+"I2P: Invisible Internet Project: a project meant to\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
+"        range of applications."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:12
+msgid ""
+"Router: The core I2P software, which routes encrypted\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
+"        clients or servers connecting to the I2P network through the\n"
+"        router."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:17
+msgid ""
+"RouterIdentity: A collection of information required to\n"
+"        communicate directly with a router, such as its IP address and listening\n"
+"        port, public signing and encryption keys etc."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:20
+msgid ""
+"Tunnel: An anonymous communication pathway between a\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
+"        traffic and one for outbound traffic."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:24
+msgid ""
+"Destination: The cryptographic identity of a tunnel.\n"
+"        These are the identities of clients and servers within the I2P network,\n"
+"        and are analogous to the IP:port of a computer on the normal\n"
+"        internet."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:28
+msgid ""
+"LeaseSet: A collection of information required to\n"
+"        communicate with a client or server at a particular Destination, such as\n"
+"        the gateways of the inbound Tunnels for that\n"
+"        Destination."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:34
+msgid ""
+"This table lists definition of different networks and their components. These\n"
+"terms and the definitions provided are taken from\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
+"Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:40
+msgid ""
+"Decentralization: Network architecture that avoids\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:44
+msgid ""
+"Peer-to-Peer (p2p): Peers make a portion of their \n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
+"        central coordination by servers or stable hosts. Popularized by\n"
+"        BitTorrent, Napster, and Bitcoin."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:49
+msgid ""
+"Federated: Federation allows separate deployments of a\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
+"        Each deployment may host multiple users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:54
+msgid ""
+"Blockchain: A distributed ledger that can record\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
+"        and permanent way."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:57
+msgid ""
+"Distributed systems: Academic topic within the\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
+"        distributed systems architectures."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:62
+msgid ""
+"TCP/UDP: The two foundational transport protocols used\n"
+"        on the Internet. Common protocols used to send data between two\n"
+"        computers."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:65
+msgid ""
+"DHT: Distributed hash table, used in some projects to\n"
+"        connect peers to each other by storing information in the form of\n"
+"        key-value pairs in a distributed manner."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:68
+msgid ""
+"IP address: A number of a computer or network which is\n"
+"        unique and thus can be used to address it."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:70
+msgid ""
+"WebRTC: A protocol standard for establishing connections\n"
+"        in a web browser where data passes directly between\n"
+"        users."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:73
+msgid ""
+"Hash: A number, usually displayed as a string of letters\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
+"        data."
+msgstr ""
+
+#: i2p2www/pages/site/about/glossary.html:76
+msgid ""
+"UX: User experience, the overall experience of a person\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
+"        use."
+msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:2
 msgid "Hall Of Fame"
@@ -94,23 +213,11 @@ msgstr "Hall Of Fame"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
-msgstr ""
-"I2P este un proiect realizat complet de pasionații de timp liber. Dar un "
-"proiect mare de genul\n"
-"I2P nu este creat doar din software, trebuie să fie necesare mai multe "
-"servere, înregistrări de domenii și cafele\n"
-"fii plătit pentru a obține un rezultat excelent. Oamenii din întreaga "
-"lume doneaza I2P ajung la starea în care se află\n"
-"în prezent. Aici îi urmărim pe cei care ne-au dat un nume pentru a fi "
-"publicat într-o sală de faimă I2P."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
+msgstr "I2P este un proiect realizat complet de pasionații de timp liber. Dar un proiect mare de genul\nI2P nu este creat doar din software, trebuie să fie necesare mai multe servere, înregistrări de domenii și cafele\nfii plătit pentru a obține un rezultat excelent. Oamenii din întreaga lume doneaza I2P ajung la starea în care se află\nîn prezent. Aici îi urmărim pe cei care ne-au dat un nume pentru a fi publicat într-o sală de faimă I2P."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
 msgid "Big thanks go to the following people who have donated to I2P!"
@@ -119,22 +226,15 @@ msgstr "Mulțumiri mari mergeți următorilor oameni care au donat I2P!"
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
-msgstr ""
-"Dacă ați făcut o donație, vă rugăm să trimiteți un e-mail la <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
-"cu numele sau nick-ul (și, opțional, pagina principală), astfel încât să "
-"vă putem enumera aici."
+msgstr "Dacă ați făcut o donație, vă rugăm să trimiteți un e-mail la <a href=\"mailto:%(echelon)s\">echelon</a>\ncu numele sau nick-ul (și, opțional, pagina principală), astfel încât să vă putem enumera aici."
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
-msgstr ""
-"Lista nesortată a donatorilor I2P în 15 ani de istorie I2P, începând cu "
-"martie 2004 și martie 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
+msgstr "Lista nesortată a donatorilor I2P în 15 ani de istorie I2P, începând cu martie 2004 și martie 2019."
 
 #: i2p2www/pages/site/about/intro.html:2
 #: i2p2www/pages/site/about/software.html:2
@@ -147,12 +247,8 @@ msgstr "Proiectul Internet Invizibil"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -162,13 +258,13 @@ msgstr ""
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -177,15 +273,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -194,28 +290,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -224,38 +319,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
-msgstr ""
-"Văd adrese IP ale tuturor celorlalte noduri I2P în consola routerului. "
-"Asta înseamnă că adresa mea IP este vizibilă de alții?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
+msgstr "Văd adrese IP ale tuturor celorlalte noduri I2P în consola routerului. Asta înseamnă că adresa mea IP este vizibilă de alții?"
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -264,13 +356,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -279,35 +371,21 @@ msgstr "Comparații"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Există o mulțime de alte aplicații și proiecte ce lucrează asupra "
-"comunicării anonimă și I2P a fost inspirat de o mare parte a eforturilor "
-"lor. Aceasta nu este o listă completă a resurselor de anonimat - <a "
-"href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie "
-"Anonimatului</a> și de GNUnet <a href = \"https://www .gnunet.org/link-"
-"uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva "
-"sisteme se disting prin comparație continua. Următoarele pagini au "
-"comparații individuale :"
+msgstr "Există o mulțime de alte aplicații și proiecte ce lucrează asupra comunicării anonimă și I2P a fost inspirat de o mare parte a eforturilor lor. Aceasta nu este o listă completă a resurselor de anonimat - <a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie Anonimatului</a> și de GNUnet <a href = \"https://www .gnunet.org/link-uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva sisteme se disting prin comparație continua. Următoarele pagini au comparații individuale :"
 
 #: i2p2www/pages/site/about/intro.html:56
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte "
-"retele: </ a>"
+msgstr "Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte retele: </ a>"
 
 #: i2p2www/pages/site/about/media.html:2
 msgid "Presentations on I2P"
@@ -316,28 +394,20 @@ msgstr "Prezentări pe I2P"
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
-msgstr ""
-"Urmează link-uri către prezentări, videoclipuri și tutoriale despre I2P. "
-"Link-uri către lucrările de cercetare pe I2P sunt disponibile <a "
-"href=\"%(papers)s\">aici</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
+msgstr "Urmează link-uri către prezentări, videoclipuri și tutoriale despre I2P. Link-uri către lucrările de cercetare pe I2P sunt disponibile <a href=\"%(papers)s\">aici</a>."
 
 #: i2p2www/pages/site/about/media.html:8
 #, python-format
 msgid "To request an addition to this page, please send to %(email)s."
-msgstr ""
-"Pentru a solicita adăugarea la această pagină, vă rugăm să trimiteți la "
-"%(email)s."
+msgstr "Pentru a solicita adăugarea la această pagină, vă rugăm să trimiteți la %(email)s."
 
 #: i2p2www/pages/site/about/media.html:11
 msgid ""
 "\n"
 "Newest links are at the bottom of each section."
-msgstr ""
-"\n"
-"Cele mai noi legături se găsesc în partea de jos a fiecărei secțiuni."
+msgstr "\nCele mai noi legături se găsesc în partea de jos a fiecărei secțiuni."
 
 #: i2p2www/pages/site/about/media.html:16
 msgid "Presentations"
@@ -350,11 +420,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(transcript)s\">transcript</a>\n"
 "Lance James (0x90), February 2002."
-msgstr ""
-"Prezentare IIP la CodeCon\n"
-"<a href=\"%(mp3)s\">Audio MP3</a>\n"
-"<a href=\"%(transcript)s\">transcriere</a>\n"
-"Lance James (0x90), februarie 2002."
+msgstr "Prezentare IIP la CodeCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(transcript)s\">transcriere</a>\nLance James (0x90), februarie 2002."
 
 #: i2p2www/pages/site/about/media.html:27
 #, python-format
@@ -363,11 +429,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(slides)s\">slides</a>\n"
 "Lance James (0x90), September 2002."
-msgstr ""
-"Prezentare IIP la ToorCon\n"
-"<a href=\"%(mp3)s\">Audio MP3</a>\n"
-"<a href=\"%(slides)s\">slide-uri</a>\n"
-"Lance James (0x90), septembrie 2002."
+msgstr "Prezentare IIP la ToorCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(slides)s\">slide-uri</a>\nLance James (0x90), septembrie 2002."
 
 #: i2p2www/pages/site/about/media.html:35
 #, python-format
@@ -377,12 +439,7 @@ msgid ""
 "An introduction into anonymous communication with I2P.\n"
 "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n"
 "Jens Kubieziel, 24C3 Berlin, December 28, 2007."
-msgstr ""
-"<a href=\"%(video)s\">A fi sau I2P</a>\n"
-"(Video YouTube)\n"
-"O introducere în comunicarea anonimă cu I2P.\n"
-"<a href=\"%(pdf)s\">To Be or I2P (prezentare PDF)</a>,\n"
-"Jens Kubieziel, 24C3 Berlin, 28 decembrie 2007."
+msgstr "<a href=\"%(video)s\">A fi sau I2P</a>\n(Video YouTube)\nO introducere în comunicarea anonimă cu I2P.\n<a href=\"%(pdf)s\">To Be or I2P (prezentare PDF)</a>,\nJens Kubieziel, 24C3 Berlin, 28 decembrie 2007."
 
 #: i2p2www/pages/site/about/media.html:44
 #, python-format
@@ -390,17 +447,12 @@ msgid ""
 "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n"
 "Lars Schimmer,\n"
 "March 14-15, 2009"
-msgstr ""
-"<a href=\"%(video)s\">Videoclipul discuției I2P la Chemnitz Linux "
-"Tag</a>,\n"
-"Lars Schimmer,\n"
-"14-15 martie 2009"
+msgstr "<a href=\"%(video)s\">Videoclipul discuției I2P la Chemnitz Linux Tag</a>,\nLars Schimmer,\n14-15 martie 2009"
 
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -411,9 +463,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n"
 "Adrian Crenshaw. Schmoocon Firetalk, January 2011"
-msgstr ""
-"<a href=\"%(link)s\">În Darknetul I2P: Bine ați venit la Cipherspace</a>\n"
-"Adrian Crenshaw. Schmoocon Firetalk, ianuarie 2011"
+msgstr "<a href=\"%(link)s\">În Darknetul I2P: Bine ați venit la Cipherspace</a>\nAdrian Crenshaw. Schmoocon Firetalk, ianuarie 2011"
 
 #: i2p2www/pages/site/about/media.html:62
 #, python-format
@@ -421,115 +471,72 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
-msgstr ""
-"<a href=\"%(link)s\">Utilizarea tehnologiei pentru a avansa "
-"libertatea</a>\n"
-"(Video YouTube)\n"
-"Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 martie"
-" 2011.\n"
-"I2P acoperit de la 10:00 la 20:00 în videoclip."
+msgstr "<a href=\"%(link)s\">Utilizarea tehnologiei pentru a avansa libertatea</a>\n(Video YouTube)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 martie 2011.\nI2P acoperit de la 10:00 la 20:00 în videoclip."
 
 #: i2p2www/pages/site/about/media.html:70
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Puncte slabe obișnuite</a>\n"
-"(Video YouTube)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 "
-"iulie 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
+msgstr "<a href=\"%(link)s\">Puncte slabe obișnuite</a>\n(Video YouTube)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 iulie 2011."
 
 #: i2p2www/pages/site/about/media.html:76
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Note pentru atelierul I2P / To</a>r\n"
-"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 august 2011."
+msgstr "<a href=\"%(link)s\">Note pentru atelierul I2P / To</a>r\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 august 2011."
 
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011."
-msgstr ""
-"<a href=\"%(live)s\">Cipherspaces / Darknets: o imagine de ansamblu "
-"asupra strategiilor de atac -\n"
-"DEF CON Versiune live (Youtube Video)</a>,\n"
-"<a href=\"%(studio)s\">Versiunea „Studio” (Youtube Video)</a>,\n"
-"<a href=\"%(slides)s\">Diapozitive (ppt)</a>\n"
-"Adrian Crenshaw. DEF CON 19, Las Vegas, 7 august 2011."
+msgstr "<a href=\"%(live)s\">Cipherspaces / Darknets: o imagine de ansamblu asupra strategiilor de atac -\nDEF CON Versiune live (Youtube Video)</a>,\n<a href=\"%(studio)s\">Versiunea „Studio” (Youtube Video)</a>,\n<a href=\"%(slides)s\">Diapozitive (ppt)</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 7 august 2011."
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
-msgstr ""
-"<a href=\"http://0x375.org/\">Ecosisteme de criptare spațiale "
-"moderne</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4 noiembrie "
-"2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
+msgstr "<a href=\"http://0x375.org/\">Ecosisteme de criptare spațiale moderne</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4 noiembrie 2011."
 
 #: i2p2www/pages/site/about/media.html:95
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
-msgstr ""
-"<a href=\"%(link)s\">I2P - Rețeaua anonimă</a>\n"
-"(Video YouTube)\n"
-"Blair Dick, Universitatea din Abertay, Dundee Ethical Hacking Society, 25"
-" ianuarie 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
+msgstr "<a href=\"%(link)s\">I2P - Rețeaua anonimă</a>\n(Video YouTube)\nBlair Dick, Universitatea din Abertay, Dundee Ethical Hacking Society, 25 ianuarie 2012."
 
 #: i2p2www/pages/site/about/media.html:101
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2PCon 2015</a>\n"
 "Toronto, August 15-16, 2015"
-msgstr ""
-"<a href=\"%(link)s\">I2PCon 2015</a>\n"
-"Toronto, 15-16 august 2015"
+msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 august 2015"
 
 #: i2p2www/pages/site/about/media.html:106
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
-msgstr ""
-"<a href=\"%(link)s\">I2P - Încă viu! (Pdf)</a>\n"
-"<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 decembrie "
-"2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
+msgstr "<a href=\"%(link)s\">I2P - Încă viu! (Pdf)</a>\n<a href=\"%(link2)s\">(video)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 decembrie 2015"
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
-msgstr ""
-"Înlocuirea Weary Crypto: Modernizarea rețelei I2P cu primitive mai "
-"puternice\n"
-"<a href=\"%(link)s\">(Pdf)</a>\n"
-"<a href=\"%(link2)s\">(ODP)</a>\n"
-"str4d, Crypto Real World, Stanford, 8 ianuarie 2016"
+msgstr "Înlocuirea Weary Crypto: Modernizarea rețelei I2P cu primitive mai puternice\n<a href=\"%(link)s\">(Pdf)</a>\n<a href=\"%(link2)s\">(ODP)</a>\nstr4d, Crypto Real World, Stanford, 8 ianuarie 2016"
 
 #: i2p2www/pages/site/about/media.html:121
 #, python-format
@@ -537,14 +544,8 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
-msgstr ""
-"Ceapă și usturoi: protocoalele I2P\n"
-"<a href=\"%(link)s\">(Pdf)</a>\n"
-"<a href=\"%(link2)s\">(ODP)</a>\n"
-"str4d, COMPSCI 460: Rețele de calculatoare, Universitatea din Wisconsin "
-"Whitewater, 17 februarie 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
+msgstr "Ceapă și usturoi: protocoalele I2P\n<a href=\"%(link)s\">(Pdf)</a>\n<a href=\"%(link2)s\">(ODP)</a>\nstr4d, COMPSCI 460: Rețele de calculatoare, Universitatea din Wisconsin Whitewater, 17 februarie 2016"
 
 #: i2p2www/pages/site/about/media.html:129
 #, python-format
@@ -553,12 +554,7 @@ msgid ""
 "<a href=\"%(link)s\">(mp4)</a>\n"
 "<a href=\"%(link2)s\">(webm)</a>\n"
 "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018"
-msgstr ""
-"Proiectul de internet invizibil - o imagine de ansamblu și un ghid al "
-"tehnologiei\n"
-"<a href=\"%(link)s\">(Mp4)</a>\n"
-"<a href=\"%(link2)s\">(Webm)</a>\n"
-"Andrew Savchenko (bircoph), FOSDEM, Brussel, 4 februarie 2018"
+msgstr "Proiectul de internet invizibil - o imagine de ansamblu și un ghid al tehnologiei\n<a href=\"%(link)s\">(Mp4)</a>\n<a href=\"%(link2)s\">(Webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Brussel, 4 februarie 2018"
 
 #: i2p2www/pages/site/about/media.html:137
 #, python-format
@@ -578,11 +574,7 @@ msgid ""
 "(Youtube Video)\n"
 "This guide will show you how to install I2P in Windows XP.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Tutorial Windows I2P</a>\n"
-"(Video YouTube)\n"
-"Acest ghid vă va arăta cum să instalați I2P în Windows XP.\n"
-"De <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Tutorial Windows I2P</a>\n(Video YouTube)\nAcest ghid vă va arăta cum să instalați I2P în Windows XP.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:155
 #, python-format
@@ -591,11 +583,7 @@ msgid ""
 "(Youtube Video)\n"
 "This will guide you through how to install I2P on a Debian Linux System.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2P Debian Tutorial</a>\n"
-"(Video YouTube)\n"
-"Acest lucru vă va ghida cum să instalați I2P pe un sistem Linux Debian.\n"
-"De <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2P Debian Tutorial</a>\n(Video YouTube)\nAcest lucru vă va ghida cum să instalați I2P pe un sistem Linux Debian.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:162
 #, python-format
@@ -604,55 +592,33 @@ msgid ""
 "(Youtube Video)\n"
 "How to set up an anonymous web site in I2P.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Cum să configurați un site anonim în I2P</a>\n"
-"(Video YouTube)\n"
-"Cum să configurați un site web anonim în I2P.\n"
-"De <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Cum să configurați un site anonim în I2P</a>\n(Video YouTube)\nCum să configurați un site web anonim în I2P.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:169
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
-"(Video YouTube)\n"
-"Un tutorial despre cum să rulați i2p pe Mac OS X și cum să vă conectați "
-"la irc.telecomix.i2p.\n"
-"De <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n(Video YouTube)\nUn tutorial despre cum să rulați i2p pe Mac OS X și cum să vă conectați la irc.telecomix.i2p.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Felix Atari explică principiile de bază ale I2P</a>\n"
-"(Video YouTube)\n"
-"Agent Felix Atari al Biroului de muniții Crypto Telecomix.\n"
-"De <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Felix Atari explică principiile de bază ale I2P</a>\n(Video YouTube)\nAgent Felix Atari al Biroului de muniții Crypto Telecomix.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
-msgstr ""
-"<a href=\"%(link)s\">Cum să accesați I2P, anonimul P2P Darknet (instalare"
-" Windows)</a>\n"
-"(Video YouTube)\n"
-"Acest tutorial arată cum să instalați și să configurați software-ul "
-"necesar pentru a accesa I2P."
+"This tutorial shows how to install and configure software needed to access I2P."
+msgstr "<a href=\"%(link)s\">Cum să accesați I2P, anonimul P2P Darknet (instalare Windows)</a>\n(Video YouTube)\nAcest tutorial arată cum să instalați și să configurați software-ul necesar pentru a accesa I2P."
 
 #: i2p2www/pages/site/about/media.html:189
 #, python-format
@@ -660,10 +626,7 @@ msgid ""
 "<a href=\"%(link)s\">How to connect to I2P</a>\n"
 "(Youtube Video)\n"
 "How to install I2P on Ubuntu."
-msgstr ""
-"<a href=\"%(link)s\">Cum să vă conectați la I2P</a>\n"
-"(Video YouTube)\n"
-"Cum se instalează I2P pe Ubuntu."
+msgstr "<a href=\"%(link)s\">Cum să vă conectați la I2P</a>\n(Video YouTube)\nCum se instalează I2P pe Ubuntu."
 
 #: i2p2www/pages/site/about/media.html:195
 #, python-format
@@ -672,11 +635,7 @@ msgid ""
 "(Video)\n"
 "Adrian Crenshaw.\n"
 "January 2011"
-msgstr ""
-"<a href=\"%(link)s\">instalarea software-ului darknet I2P în Linux</a>\n"
-"(Video)\n"
-"Adrian Crenshaw.\n"
-"Ianuarie 2011"
+msgstr "<a href=\"%(link)s\">instalarea software-ului darknet I2P în Linux</a>\n(Video)\nAdrian Crenshaw.\nIanuarie 2011"
 
 #: i2p2www/pages/site/about/media.html:202
 #, python-format
@@ -684,10 +643,7 @@ msgid ""
 "<a href=\"%(link)s\">Short garlic routing animation</a>\n"
 "(Youtube Video)\n"
 "Adrian Crenshaw.\n"
-msgstr ""
-"<a href=\"%(link)s\">Animatie scurta de rutare a usturoiului</a>\n"
-"(Video YouTube)\n"
-"Adrian Crenshaw.\n"
+msgstr "<a href=\"%(link)s\">Animatie scurta de rutare a usturoiului</a>\n(Video YouTube)\nAdrian Crenshaw.\n"
 
 #: i2p2www/pages/site/about/media.html:210
 msgid "Articles and Interviews"
@@ -700,11 +656,7 @@ msgid ""
 "<a href=\"%(link1)s\">Part 1</a>\n"
 "<a href=\"%(link2)s\">Part 2</a>\n"
 "July 26, 2002."
-msgstr ""
-"Lance James (0x90) Intervievat de DistributedCity\n"
-"<a href=\"%(link1)s\">Partea 1</a>\n"
-"<a href=\"%(link2)s\">Partea 2</a>\n"
-"26 iulie 2002."
+msgstr "Lance James (0x90) Intervievat de DistributedCity\n<a href=\"%(link1)s\">Partea 1</a>\n<a href=\"%(link2)s\">Partea 2</a>\n26 iulie 2002."
 
 #: i2p2www/pages/site/about/media.html:221
 #, python-format
@@ -713,35 +665,22 @@ msgid ""
 "(original in Spanish)\n"
 "<a href=\"%(link)s\">English translation</a>\n"
 "October 31, 2002."
-msgstr ""
-"Lance James (0x90) Intervievat de El País\n"
-"(original în spaniolă)\n"
-"<a href=\"%(link)s\">traducere in engleza</a>\n"
-"31 octombrie 2002."
+msgstr "Lance James (0x90) Intervievat de El País\n(original în spaniolă)\n<a href=\"%(link)s\">traducere in engleza</a>\n31 octombrie 2002."
 
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
-msgstr ""
-"<a href=\"%(link)s\">2003 Business Week articol care face referire la "
-"invisiblenet</a>\n"
-"14 septembrie 2003."
+msgstr "<a href=\"%(link)s\">2003 Business Week articol care face referire la invisiblenet</a>\n14 septembrie 2003."
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
-msgstr ""
-"<a href=\"%(link)s\">Articolul despre Netzwelt.de despre a fi anonim pe "
-"Internet</a>\n"
-"(Limba germana)\n"
-"Noiembrie 2007."
+msgstr "<a href=\"%(link)s\">Articolul despre Netzwelt.de despre a fi anonim pe Internet</a>\n(Limba germana)\nNoiembrie 2007."
 
 #: i2p2www/pages/site/about/media.html:239
 #, python-format
@@ -749,27 +688,15 @@ msgid ""
 "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n"
 "March 2009\n"
 "<a href=\"%(german)s\">German translation</a>"
-msgstr ""
-"<a href=\"%(link)s\">zzz intervievat de gulli.com</a>\n"
-"Martie 2009\n"
-"<a href=\"%(german)s\">Traducere din germană</a>"
+msgstr "<a href=\"%(link)s\">zzz intervievat de gulli.com</a>\nMartie 2009\n<a href=\"%(german)s\">Traducere din germană</a>"
 
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz intervievat pe InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
-"18 august 2011\n"
-"(link mort, însămânțat în I2P la <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">trackerul"
-" poștașului</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz intervievat pe InfoSec Daily Podcast Ep. 454 (mp3)</a>\n18 august 2011\n(link mort, însămânțat în I2P la <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">trackerul poștașului</a>)"
 
 #: i2p2www/pages/site/about/media.html:252
 #, python-format
@@ -777,86 +704,52 @@ msgid ""
 "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n"
 "Jonathan Cox,\n"
 "November 11, 2011."
-msgstr ""
-"<a href=\"%(link)s\">I2P - Anonimatul maselor</a>,\n"
-"Jonathan Cox,\n"
-"11 noiembrie 2011."
+msgstr "<a href=\"%(link)s\">I2P - Anonimatul maselor</a>,\nJonathan Cox,\n11 noiembrie 2011."
 
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz și Lance James au intervievat pe InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
-"16 februarie 2012\n"
-"(link mort, însămânțat în I2P la <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">trackerul"
-" poștașului</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz și Lance James au intervievat pe InfoSec Daily Podcast Ep. 596 (mp3)</a>\n16 februarie 2012\n(link mort, însămânțat în I2P la <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">trackerul poștașului</a>)"
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff și Str4d au intervievat pe podcast-ul Brakeing "
-"Down Security Ep. 2015-010 (mp3)</a>\n"
-"Partea 1, 28 februarie 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff și Str4d au intervievat pe podcast-ul Brakeing Down Security Ep. 2015-010 (mp3)</a>\nPartea 1, 28 februarie 2015"
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
-msgstr ""
-"<a href=\"%(mp3)s\">Jeff și Str4d au intervievat pe podcast-ul Brakeing "
-"Down Security Ep. 2015-011 (mp3)</a>\n"
-"Partea 2, 6 martie 2015"
+msgstr "<a href=\"%(mp3)s\">Jeff și Str4d au intervievat pe podcast-ul Brakeing Down Security Ep. 2015-011 (mp3)</a>\nPartea 2, 6 martie 2015"
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
-msgstr ""
-"<a href=\"%(link)s\">Fireside With Lei - Episodul 18: Lance James. "
-"Succes, eșecuri, durere și budism</a>.\n"
-"<a href=\"%(archive)s\">(Archive.org)</a>\n"
-"<a href=\"%(mp3)s\">(Mp3)</a>\n"
-"Robert Lei, 31 decembrie 2018"
+msgstr "<a href=\"%(link)s\">Fireside With Lei - Episodul 18: Lance James. Succes, eșecuri, durere și budism</a>.\n<a href=\"%(archive)s\">(Archive.org)</a>\n<a href=\"%(mp3)s\">(Mp3)</a>\nRobert Lei, 31 decembrie 2018"
 
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
-"2019\n"
-msgstr ""
-"<a href=\"%(mhatta)s\">Articole ale colaboratorului I2P Masayuki Hatta pe"
-" Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
+msgstr "<a href=\"%(mhatta)s\">Articole ale colaboratorului I2P Masayuki Hatta pe Medium.com</a>\n2019\n"
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
-msgstr ""
-"<a href=\"%(ctrl)s\">Activarea traseului .onion și .i2p cu configurarea "
-"automată a proxy-ului</a>\n"
-"Daniel Aleksandersen, 7 februarie 2019"
+msgstr "<a href=\"%(ctrl)s\">Activarea traseului .onion și .i2p cu configurarea automată a proxy-ului</a>\nDaniel Aleksandersen, 7 februarie 2019"
 
 #: i2p2www/pages/site/about/media.html:295
 msgid "Other"
@@ -866,21 +759,61 @@ msgstr "Altceva"
 msgid ""
 "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n"
 "February 14, 2014"
-msgstr ""
-"I2P menționat în „Casa cărților” din Netflix, sezonul 2 episodul 2,\n"
-"14 februarie 2014"
+msgstr "I2P menționat în „Casa cărților” din Netflix, sezonul 2 episodul 2,\n14 februarie 2014"
 
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
+msgstr "<a href=\"%(meeh)s\">O listă tratată de către contribuitorul I2P meeh al implementărilor I2P, bibliotecilor, resurselor, proiectelor și lucruri strălucitoare</a>\n2019"
+
+#: i2p2www/pages/site/about/restrictive-countries.html:2
+msgid "Strict Countries"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:4
+msgid ""
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
+"countries will automatically be placed into \"Hidden\" mode."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:11
+msgid ""
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
+"Freedom score of 39 or less (not free)."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:18
+msgid "Hidden Mode Summary"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:19
+msgid ""
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
+"others."
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:26
+msgid "Strict Countries List as of 2020"
+msgstr ""
+
+#: i2p2www/pages/site/about/restrictive-countries.html:71
+msgid ""
+"If you think a country should be added to the strict countries, file an "
+"issue on the I2P gitlab."
 msgstr ""
-"<a href=\"%(meeh)s\">O listă tratată de către contribuitorul I2P meeh al "
-"implementărilor I2P, bibliotecilor, resurselor, proiectelor și lucruri "
-"strălucitoare</a>\n"
-"2019"
 
 #: i2p2www/pages/site/about/software.html:4
 msgid "The I2P Software"
@@ -890,18 +823,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -912,84 +842,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -1000,8 +907,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -1009,27 +915,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -1037,26 +939,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -1067,10 +960,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -1078,18 +969,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -1100,18 +988,11 @@ msgstr "Membri proiect I2P"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
-msgstr ""
-"Suntem un grup mic de oameni răspândiți pe mai multe continente, lucrând "
-"pentru\n"
-"avansați diferite aspecte ale proiectului și discutând despre proiectul\n"
-"reţea.\n"
-"<a href=\"%(volunteer)s\">Implicati-va!</a>"
+msgstr "Suntem un grup mic de oameni răspândiți pe mai multe continente, lucrând pentru\navansați diferite aspecte ale proiectului și discutând despre proiectul\nreţea.\n<a href=\"%(volunteer)s\">Implicati-va!</a>"
 
 #: i2p2www/pages/site/about/team.html:14
 msgid "Admin"
@@ -1280,7 +1161,8 @@ msgid "Product Development"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1520,7 +1402,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "dezvoltare jbigi, migrare wiki, curățare doc"
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr "depanare java și dezvoltare client pe I2PTunnel și consola de router"
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1570,55 +1453,27 @@ msgstr "… și multe altele"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
-msgstr ""
-"I2PCon 2015 a fost primul eveniment de acest gen. Avea două obiective pe "
-"termen scurt.\n"
-"În primul rând, pentru a oferi publicului larg un eveniment în care ar "
-"putea fi obținute cunoștințe despre confidențialitate.\n"
-"În al doilea rând, promovarea proiectului I2P și a comunității sale cu "
-"discuții tehnice\n"
-"despre criptografie, anonimat și subiecte centrate pe I2P."
+msgstr "I2PCon 2015 a fost primul eveniment de acest gen. Avea două obiective pe termen scurt.\nÎn primul rând, pentru a oferi publicului larg un eveniment în care ar putea fi obținute cunoștințe despre confidențialitate.\nÎn al doilea rând, promovarea proiectului I2P și a comunității sale cu discuții tehnice\ndespre criptografie, anonimat și subiecte centrate pe I2P."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
-msgstr ""
-"Un obiectiv mai mare și pe termen lung al acestui eveniment a fost "
-"construirea unei\n"
-"comuniune de persoane conștiente de confidențialitate. Prin conectarea "
-"oamenilor care recunosc\n"
-"importanța vieții private, am dorit să oferim un forum în care această "
-"comunitate să poată crește."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
+msgstr "Un obiectiv mai mare și pe termen lung al acestui eveniment a fost construirea unei\ncomuniune de persoane conștiente de confidențialitate. Prin conectarea oamenilor care recunosc\nimportanța vieții private, am dorit să oferim un forum în care această comunitate să poată crește."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
-msgstr ""
-"Ideea acestui eveniment a fost creată pentru prima dată de minunații "
-"noștri prieteni de la\n"
-"<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"Locația a fost asigurată de <a "
-"href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
-"Marketingul a fost condus de <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> și Siew.\n"
-"Fără ei acest eveniment nu ar fi fost posibil."
+msgstr "Ideea acestui eveniment a fost creată pentru prima dată de minunații noștri prieteni de la\n<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nLocația a fost asigurată de <a href=\"https://hacklab.to/\">Hacklab.to</a>.\nMarketingul a fost condus de <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> și Siew.\nFără ei acest eveniment nu ar fi fost posibil."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:32
 msgid "Slides and Video"
@@ -1634,8 +1489,8 @@ msgstr "Notă: Linkurile video vor fi postate pe măsură ce vor deveni disponib
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1670,22 +1525,13 @@ msgstr "Oratori"
 msgid ""
 "Colin Mahns has a strong interest in the use of anonymity and encryption "
 "technology to help preserve human rights in the digital age."
-msgstr ""
-"Colin Mahns are un interes puternic în utilizarea tehnologiei de anonimat"
-" și criptare pentru a ajuta la păstrarea drepturilor omului în era "
-"digitală."
+msgstr "Colin Mahns are un interes puternic în utilizarea tehnologiei de anonimat și criptare pentru a ajuta la păstrarea drepturilor omului în era digitală."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
-msgstr ""
-"David Dagon este un cercetător postdoc la Georgia Tech axat pe botnets, "
-"malware, securitatea rețelei și DNS.\n"
-"Interesul său pentru I2P este centrat pe păstrarea vieții private a "
-"utilizatorilor, filtrarea autonomă și anti-abuz."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
+msgstr "David Dagon este un cercetător postdoc la Georgia Tech axat pe botnets, malware, securitatea rețelei și DNS.\nInteresul său pentru I2P este centrat pe păstrarea vieții private a utilizatorilor, filtrarea autonomă și anti-abuz."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
 #: i2p2www/pages/site/about/i2pcon/2015.html:105
@@ -1698,26 +1544,12 @@ msgstr "J este șeful Toronto Crypto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
-msgstr ""
-"Lance James este fondatorul Proiectului IRV Invisibile, predecesorul I2P,"
-" încă din 2002.\n"
-"Și-a fondat propria companie de informații despre amenințări cibernetice "
-"în 2003\n"
-"De atunci, el este concentrat pe securitatea rețelei, cercetarea în "
-"domeniul malware și securitatea informațiilor.\n"
-"ÃŽn perioada 2011-2013, a fost director al Threat Intelligence pentru The "
-"Vigilant, care a fost achiziționat de Deloitte în 2013.\n"
-"El a părăsit recent Deloitte să facă consultanță prin intermediul "
-"companiei sale The James Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
+msgstr "Lance James este fondatorul Proiectului IRV Invisibile, predecesorul I2P, încă din 2002.\nȘi-a fondat propria companie de informații despre amenințări cibernetice în 2003\nDe atunci, el este concentrat pe securitatea rețelei, cercetarea în domeniul malware și securitatea informațiilor.\nÎn perioada 2011-2013, a fost director al Threat Intelligence pentru The Vigilant, care a fost achiziționat de Deloitte în 2013.\nEl a părăsit recent Deloitte să facă consultanță prin intermediul companiei sale The James Group."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
 msgid "Nicholas D. is a member of Hacklab Toronto."
@@ -1725,23 +1557,11 @@ msgstr "Nicholas D. este membru al Hacklab Toronto."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
-msgstr ""
-"Nicholas Johnston este profesor de securitate a informațiilor la Școala "
-"de calcul aplicat a Colegiului Sheridan în programul de licență InfoSec."
-"\n"
-"Cariera sa anterioară profesională a fost în criminalistică digitală și "
-"investigații.\n"
-"El este, de asemenea, un contractor specializat în răspunsul la incident."
-"\n"
-"Domeniile sale de cercetare includ dezvoltarea sigură de software și "
-"analiza datelor."
+msgstr "Nicholas Johnston este profesor de securitate a informațiilor la Școala de calcul aplicat a Colegiului Sheridan în programul de licență InfoSec.\nCariera sa anterioară profesională a fost în criminalistică digitală și investigații.\nEl este, de asemenea, un contractor specializat în răspunsul la incident.\nDomeniile sale de cercetare includ dezvoltarea sigură de software și analiza datelor."
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:124
 msgid "Psi is an I2P developer."
@@ -1793,14 +1613,9 @@ msgstr "Ziua 2"
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
-msgstr ""
-"Prima conferință dedicată I2P a avut loc la Toronto în perioada 15-16 "
-"august 2015.\n"
-"Consultați linkul de mai jos pentru mai multe informații și link-uri "
-"către diapozitive și videoclipuri."
+msgstr "Prima conferință dedicată I2P a avut loc la Toronto în perioada 15-16 august 2015.\nConsultați linkul de mai jos pentru mai multe informații și link-uri către diapozitive și videoclipuri."
 
 #: i2p2www/pages/site/about/i2pcon/index.html:9
 msgid "Past years"
@@ -1816,27 +1631,13 @@ msgstr "August 2010"
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
-msgstr ""
-"Există câteva tehnici majore care pot fi făcute pentru a îmbunătăți "
-"percepția\n"
-"performanța I2P - unele dintre următoarele sunt legate de procesor, "
-"altele de lățimea de bandă\n"
-", iar altele sunt în continuare legate de protocol. Cu toate acestea, "
-"toate acestea\n"
-"dimensiunile afectează latența, randamentul și performanța percepută a\n"
-"de rețea, deoarece reduc conținutul pentru resursele limitate. Această "
-"listă  desigur\n"
-"nu este cuprinzătoare, dar le acoperă pe cele majore văzute."
+msgstr "Există câteva tehnici majore care pot fi făcute pentru a îmbunătăți percepția\nperformanța I2P - unele dintre următoarele sunt legate de procesor, altele de lățimea de bandă\n, iar altele sunt în continuare legate de protocol. Cu toate acestea, toate acestea\ndimensiunile afectează latența, randamentul și performanța percepută a\nde rețea, deoarece reduc conținutul pentru resursele limitate. Această listă  desigur\nnu este cuprinzătoare, dar le acoperă pe cele majore văzute."
 
 #: i2p2www/pages/site/about/performance/future.html:15
 #: i2p2www/pages/site/about/performance/index.html:106
@@ -1844,9 +1645,7 @@ msgstr ""
 msgid ""
 "For past performance improvements see the <a href=\"%(history)s\">\n"
 "Performance History</a>."
-msgstr ""
-"Pentru îmbunătățiri ale performanței anterioare, consultați secțiunea\n"
-"<a href=\"%(history)s\">Istoricul performanțelor</a>."
+msgstr "Pentru îmbunătățiri ale performanței anterioare, consultați secțiunea\n<a href=\"%(history)s\">Istoricul performanțelor</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:20
 msgid "Better peer profiling and selection"
@@ -1855,27 +1654,13 @@ msgstr "Mai bună profilare și selecție de la egal la egal"
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
-msgstr ""
-"Probabil una dintre cele mai importante părți ale obținerii unei "
-"performanțe mai rapide o va face\n"
-"să îmbunătățească modul în care routerele aleg colegii prin care își "
-"construiesc tunelurile\n"
-"- asigurându-vă că nu folosesc colegi cu legături lente sau cele cu "
-"legături rapide care\n"
-"sunt supraîncărcate etc. În plus, trebuie să ne asigurăm că nu ne expunem"
-"\n"
-"noi înșine la un atac <a href=\"%(sybilpdf)s\">Sybil</a>\n"
-"de la un adversar puternic, cu o mulțime de mașini rapide."
+msgstr "Probabil una dintre cele mai importante părți ale obținerii unei performanțe mai rapide o va face\nsă îmbunătățească modul în care routerele aleg colegii prin care își construiesc tunelurile\n- asigurându-vă că nu folosesc colegi cu legături lente sau cele cu legături rapide care\nsunt supraîncărcate etc. În plus, trebuie să ne asigurăm că nu ne expunem\nnoi înșine la un atac <a href=\"%(sybilpdf)s\">Sybil</a>\nde la un adversar puternic, cu o mulțime de mașini rapide."
 
 #: i2p2www/pages/site/about/performance/future.html:30
 msgid "Network database tuning"
@@ -1883,36 +1668,15 @@ msgstr "Reglarea bazelor de date în rețea"
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
-msgstr ""
-"Vom dori să fim mai eficienți cu vindecarea bazei de date a rețelei\n"
-"și algoritmi de întreținere - în loc să exploreze constant spațiul cheie "
-"pentru noi\n"
-"colegii - provocând un număr semnificativ de mesaje de rețea și încărcare"
-" de router - noi\n"
-"poate încetini sau chiar opri explorarea până când detectăm că este ceva "
-"nou\n"
-"merită găsit (de exemplu, decăderea ratei de explorare în funcție de "
-"ultima dată pe cineva\n"
-"ne-a dat o referire la cineva despre care nu auzisem niciodată). Putem "
-"face și unele\n"
-"acordarea a ceea ce trimitem de fapt - câți colegi ne respingem înapoi "
-"(sau chiar dacă noi\n"
-"respingeți un răspuns), precum și câte căutări simultane efectuăm."
+msgstr "Vom dori să fim mai eficienți cu vindecarea bazei de date a rețelei\nși algoritmi de întreținere - în loc să exploreze constant spațiul cheie pentru noi\ncolegii - provocând un număr semnificativ de mesaje de rețea și încărcare de router - noi\npoate încetini sau chiar opri explorarea până când detectăm că este ceva nou\nmerită găsit (de exemplu, decăderea ratei de explorare în funcție de ultima dată pe cineva\nne-a dat o referire la cineva despre care nu auzisem niciodată). Putem face și unele\nacordarea a ceea ce trimitem de fapt - câți colegi ne respingem înapoi (sau chiar dacă noi\nrespingeți un răspuns), precum și câte căutări simultane efectuăm."
 
 #: i2p2www/pages/site/about/performance/future.html:42
 msgid "Session Tag Tuning and Improvements"
@@ -1921,55 +1685,24 @@ msgstr "Ajustarea și îmbunătățirile etichetelor de sesiune"
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
-msgstr ""
-"Modul în care algoritmul <a href=\"%(elgamalaes)s\">ElGamal / AES + "
-"SessionTag</a>\n"
-"funcționează este prin gestionarea unui set de matrițe aleatorii cu o "
-"singură dată, cu 32 de octeți, și expiră\n"
-"dacă nu sunt folosite destul de repede. Dacă le expirăm prea curând, "
-"suntem\n"
-"forțati să cadă din nou pe o criptare ElGamal (scumpă) completă, dar dacă"
-" nu\n"
-"expirați-le suficient de repede, trebuie să le reducem cantitatea, astfel"
-" încât să nu facem\n"
-"rămâne fără memorie (și dacă destinatarul este cumva corupt și pierde "
-"unele\n"
-"etichete, pot apărea chiar mai multe eșecuri de criptare înainte de "
-"detectare). Cu careva\n"
-"algoritmi mai activi de detecție și feedback, putem asigura în siguranță "
-"și mai mult\n"
-"reglați eficient durata de viață a etichetelor, înlocuind criptarea "
-"ElGamal cu\n"
-"o operație AES banală."
+msgstr "Modul în care algoritmul <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a>\nfuncționează este prin gestionarea unui set de matrițe aleatorii cu o singură dată, cu 32 de octeți, și expiră\ndacă nu sunt folosite destul de repede. Dacă le expirăm prea curând, suntem\nforțati să cadă din nou pe o criptare ElGamal (scumpă) completă, dar dacă nu\nexpirați-le suficient de repede, trebuie să le reducem cantitatea, astfel încât să nu facem\nrămâne fără memorie (și dacă destinatarul este cumva corupt și pierde unele\netichete, pot apărea chiar mai multe eșecuri de criptare înainte de detectare). Cu careva\nalgoritmi mai activi de detecție și feedback, putem asigura în siguranță și mai mult\nreglați eficient durata de viață a etichetelor, înlocuind criptarea ElGamal cu\no operație AES banală."
 
 #: i2p2www/pages/site/about/performance/future.html:55
 #, python-format
 msgid ""
 "Additional ideas for improving Session Tag delivery are described on the\n"
 "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>."
-msgstr ""
-"Idei suplimentare pentru îmbunătățirea livrării Etichetelor de sesiune "
-"sunt descrise pe document\n"
-"<a href=\"%(elgamalaes)s#future\">Pagina ElGamal / AES + SessionTag</a>."
+msgstr "Idei suplimentare pentru îmbunătățirea livrării Etichetelor de sesiune sunt descrise pe document\n<a href=\"%(elgamalaes)s#future\">Pagina ElGamal / AES + SessionTag</a>."
 
 #: i2p2www/pages/site/about/performance/future.html:61
 msgid "Migrate sessionTag to synchronized PRNG"
@@ -1980,71 +1713,29 @@ msgstr "Migrează sesiunea Tag către PRNG sincronizat"
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
-msgstr ""
-"ÃŽn acest moment, algoritmul <a href=\"%(elgamalaes)s\">ElGamal / AES + "
-"SessionTag</a>\n"
-" funcționează prin etichetarea fiecărui mesaj criptat cu un random unic\n"
-"32 byte nonce (o „etichetă de sesiune”), identificând mesajul ca fiind "
-"criptat\n"
-"cu cheia sesiunii AES asociate. Acest lucru împiedică semenii să distingă"
-"\n"
-"mesaje care fac parte din aceeași sesiune, deoarece fiecare mesaj are o \n"
-"etichetă complet nouă aleatorie. Pentru a realiza acest lucru, fiecare "
-"câteva mesaje conțin un \n"
-"nou întreg set de etichete de sesiune din mesajul criptat în sine, în mod"
-" transparent\n"
-"livrarea unei modalități de identificare a mesajelor viitoare. Atunci "
-"trebuie să urmărim\n"
-"ce mesaje sunt livrate cu succes, astfel încât să știm ce etichete\n"
-"putem folosi."
+msgstr "În acest moment, algoritmul <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a>\n funcționează prin etichetarea fiecărui mesaj criptat cu un random unic\n32 byte nonce (o „etichetă de sesiune”), identificând mesajul ca fiind criptat\ncu cheia sesiunii AES asociate. Acest lucru împiedică semenii să distingă\nmesaje care fac parte din aceeași sesiune, deoarece fiecare mesaj are o \netichetă complet nouă aleatorie. Pentru a realiza acest lucru, fiecare câteva mesaje conțin un \nnou întreg set de etichete de sesiune din mesajul criptat în sine, în mod transparent\nlivrarea unei modalități de identificare a mesajelor viitoare. Atunci trebuie să urmărim\nce mesaje sunt livrate cu succes, astfel încât să știm ce etichete\nputem folosi."
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
 "to handle out of order delivery)."
-msgstr ""
-"Acest lucru funcționează bine și este destul de robust, însă este "
-"ineficient din punct de vedere\n"
-"de utilizare a lățimii de bandă, deoarece necesită livrarea acestor "
-"etichete înainte\n"
-"timp (și nu toate etichetele pot fi necesare sau unele pot fi pierdute "
-"din cauza\n"
-"expirarii lor). Totuși, în medie, predelectarea costă eticheta de sesiune"
-"\n"
-"32 de octeți pe mesaj (dimensiunea unei etichete). După cum sugera Taral,"
-" totuși\n"
-"dimensiunea poate fi evitată înlocuind livrarea etichetelor cu una "
-"sincronizată\n"
-"PRNG - când se stabilește o nouă sesiune (printr-un cod ElGamal criptat\n"
-"bloc), ambele părți plantează un PRNG pentru utilizare și generează "
-"etichetele de sesiune\n"
-"la cerere (destinatarul precalculând următoarele câteva valori posibile\n"
-"să se ocupe de livrare fără comandă)."
+msgstr "Acest lucru funcționează bine și este destul de robust, însă este ineficient din punct de vedere\nde utilizare a lățimii de bandă, deoarece necesită livrarea acestor etichete înainte\ntimp (și nu toate etichetele pot fi necesare sau unele pot fi pierdute din cauza\nexpirarii lor). Totuși, în medie, predelectarea costă eticheta de sesiune\n32 de octeți pe mesaj (dimensiunea unei etichete). După cum sugera Taral, totuși\ndimensiunea poate fi evitată înlocuind livrarea etichetelor cu una sincronizată\nPRNG - când se stabilește o nouă sesiune (printr-un cod ElGamal criptat\nbloc), ambele părți plantează un PRNG pentru utilizare și generează etichetele de sesiune\nla cerere (destinatarul precalculând următoarele câteva valori posibile\nsă se ocupe de livrare fără comandă)."
 
 #: i2p2www/pages/site/about/performance/future.html:87
 msgid "Longer lasting tunnels"
@@ -2052,55 +1743,26 @@ msgstr "Tuneluri de durată mai lungă"
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
-msgstr ""
-"Cu toate acestea, durata actuală a tunelului implicită de 10 minute este "
-"destul de arbitrară\n"
-"se \"simte bine\". Odată ce avem cod de vindecare a tunelului și "
-"detectarea\n"
-" mai eficienta\n"
-" a eșecului, vom putea varia mai în siguranță aceste durate, reducând\n"
-"rețea și încărcarea procesorului (datorită mesajelor costisitoare de "
-"creare a tunelului)."
+msgstr "Cu toate acestea, durata actuală a tunelului implicită de 10 minute este destul de arbitrară\nse \"simte bine\". Odată ce avem cod de vindecare a tunelului și detectarea\n mai eficienta\n a eșecului, vom putea varia mai în siguranță aceste durate, reducând\nrețea și încărcarea procesorului (datorită mesajelor costisitoare de creare a tunelului)."
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
-msgstr ""
-"Aceasta pare a fi o soluție ușoară pentru încărcare mare pe routerele cu "
-"lățime mare de bandă, dar\n"
-"nu trebuie să recurgem la asta până nu am reglat mai departe algoritmii "
-"de construire a tunelului.\n"
-"Cu toate acestea, durata de viață a tunelului de 10 minute este codată în"
-" câteva locuri,\n"
-"astfel încât să fie nevoie de efort substanțial pentru modificarea "
-"duratei.\n"
-"De asemenea, ar fi dificil să se mențină compatibilitatea înapoi cu o "
-"astfel de modificare."
+"Also, it would be difficult to maintain backward compatibility with such a change."
+msgstr "Aceasta pare a fi o soluție ușoară pentru încărcare mare pe routerele cu lățime mare de bandă, dar\nnu trebuie să recurgem la asta până nu am reglat mai departe algoritmii de construire a tunelului.\nCu toate acestea, durata de viață a tunelului de 10 minute este codată în câteva locuri,\nastfel încât să fie nevoie de efort substanțial pentru modificarea duratei.\nDe asemenea, ar fi dificil să se mențină compatibilitatea înapoi cu o astfel de modificare."
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
-msgstr ""
-"În prezent, întrucât rata medie de succes a construirii tunelurilor din "
-"rețea este destul de mare,\n"
-"nu există planuri actuale de prelungire a duratei de viață a tunelului."
+msgstr "În prezent, întrucât rata medie de succes a construirii tunelurilor din rețea este destul de mare,\nnu există planuri actuale de prelungire a duratei de viață a tunelului."
 
 #: i2p2www/pages/site/about/performance/future.html:108
 msgid "Adjust the timeouts"
@@ -2108,47 +1770,22 @@ msgstr "Reglați intervalele de timp"
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
-msgstr ""
-"Cu toate acestea, alte lucruri destul de arbitrare, dar „bine”, le avem\n"
-"intervale de timp curente pentru diverse activități. De ce avem un coleg "
-"de 60 de secunde\n"
-"\"timeout\" de neatins? De ce încercăm să trimitem prin alt tunel care a\n"
-"LeaseSet face reclame după 10 secunde? De ce sunt interogările bazei de "
-"date din rețea\n"
-"delimitat cu 60 sau 20 de limite? De ce sunt configurate destinațiile "
-"pentru a cere a\n"
-"nou set de tunele la fiecare 10 minute? De ce permitem 60 de secunde "
-"pentru un coleg\n"
-"răspundeți la solicitarea noastră de a se alătura unui tunel? De ce "
-"considerăm un tunel care\n"
-"nu ne trece testul în 60 de secunde „mort”?"
+msgstr "Cu toate acestea, alte lucruri destul de arbitrare, dar „bine”, le avem\nintervale de timp curente pentru diverse activități. De ce avem un coleg de 60 de secunde\n\"timeout\" de neatins? De ce încercăm să trimitem prin alt tunel care a\nLeaseSet face reclame după 10 secunde? De ce sunt interogările bazei de date din rețea\ndelimitat cu 60 sau 20 de limite? De ce sunt configurate destinațiile pentru a cere a\nnou set de tunele la fiecare 10 minute? De ce permitem 60 de secunde pentru un coleg\nrăspundeți la solicitarea noastră de a se alătura unui tunel? De ce considerăm un tunel care\nnu ne trece testul în 60 de secunde „mort”?"
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
-msgstr ""
-"Fiecare dintre aceste necondiționate poate fi adresat și cu un cod mai "
-"adaptiv\n"
-"ca parametri reglabili care să permită compensări mai adecvate între\n"
-"lățimea de bandă, latența și utilizarea procesorului."
+msgstr "Fiecare dintre aceste necondiționate poate fi adresat și cu un cod mai adaptiv\nca parametri reglabili care să permită compensări mai adecvate între\nlățimea de bandă, latența și utilizarea procesorului."
 
 #: i2p2www/pages/site/about/performance/future.html:125
 msgid "Full streaming protocol improvements"
@@ -2158,51 +1795,33 @@ msgstr "Îmbunătățirea completă a protocolului de streaming"
 msgid ""
 "Perhaps re-enable the interactive stream profile (the \n"
 "current implementation only uses the bulk stream profile)."
-msgstr ""
-"Poate reactivă profilul fluxului interactiv (\n"
-"implementarea curentă folosește doar profilul fluxului în vrac)."
+msgstr "Poate reactivă profilul fluxului interactiv (\nimplementarea curentă folosește doar profilul fluxului în vrac)."
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
-msgstr ""
-"Limitarea lățimii de bandă la nivel de client (în oricare sau ambele "
-"direcții ale unui flux,\n"
-"sau posibil împărtășit pe mai multe fluxuri). Acest lucru ar fi în plus "
-"față de\n"
-"limitarea generală a lățimii de bandă a routerului, desigur."
+msgstr "Limitarea lățimii de bandă la nivel de client (în oricare sau ambele direcții ale unui flux,\nsau posibil împărtășit pe mai multe fluxuri). Acest lucru ar fi în plus față de\nlimitarea generală a lățimii de bandă a routerului, desigur."
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
-msgstr ""
-"Listele de control de acces (care permit doar fluxuri către sau din "
-"anumite destinații altor persoane cunoscute)."
+msgstr "Listele de control de acces (care permit doar fluxuri către sau din anumite destinații altor persoane cunoscute)."
 
 #: i2p2www/pages/site/about/performance/future.html:147
 msgid ""
 "Web controls and monitoring the health of the various streams, as well \n"
 "as the ability to explicitly close or throttle them."
-msgstr ""
-"Controale web și monitorizarea stării de sănătate a diferitelor fluxuri\n"
-"ca abilitatea de a le închide sau accelera explicit."
+msgstr "Controale web și monitorizarea stării de sănătate a diferitelor fluxuri\nca abilitatea de a le închide sau accelera explicit."
 
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
-msgstr ""
-"Idei suplimentare pentru îmbunătățirea bibliotecii de streaming sunt "
-"descrise pe site\n"
-" <a href=\"%(streaming)s#future\">pagina bibliotecii streaming</a>."
+msgstr "Idei suplimentare pentru îmbunătățirea bibliotecii de streaming sunt descrise pe site\n <a href=\"%(streaming)s#future\">pagina bibliotecii streaming</a>."
 
 #: i2p2www/pages/site/about/performance/history.html:2
 msgid "Performance History"
@@ -2211,17 +1830,10 @@ msgstr "Istoricul performanțelor"
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
-msgstr ""
-"Au fost realizate îmbunătățiri notabile ale performanței folosind "
-"tehnicile de mai jos.\n"
-"Mai sunt multe de făcut, consultați pagina<a "
-"href=\"%(performance)s\">Performanță</a>\n"
-"pentru problemele și gândurile actuale."
+msgstr "Au fost realizate îmbunătățiri notabile ale performanței folosind tehnicile de mai jos.\nMai sunt multe de făcut, consultați pagina<a href=\"%(performance)s\">Performanță</a>\npentru problemele și gândurile actuale."
 
 #: i2p2www/pages/site/about/performance/history.html:10
 msgid "Native math"
@@ -2238,52 +1850,25 @@ msgstr "implementat"
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
-msgstr ""
-"Când am profilat ultima dată codul I2P, marea majoritate a timpului a "
-"fost petrecută în interiorul\n"
-"singure funcției: java.math.BigInteger\n"
-"<a href=\"%(modpow)s\">modPow</a>.\n"
-"În loc să încercați să ajustați această metodă, vă vom adresa\n"
-"<a href=\"%(gmp)s\">GNU MP</a> - o bibliotecă matematică rapidă\n"
-"(cu montator reglat pentru multe arhitecturi). (<i>Editor: vezi\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger pentru o criptografie rapidă cu "
-"cheie publică</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
+msgstr "Când am profilat ultima dată codul I2P, marea majoritate a timpului a fost petrecută în interiorul\nsingure funcției: java.math.BigInteger\n<a href=\"%(modpow)s\">modPow</a>.\nÎn loc să încercați să ajustați această metodă, vă vom adresa\n<a href=\"%(gmp)s\">GNU MP</a> - o bibliotecă matematică rapidă\n(cu montator reglat pentru multe arhitecturi). (<i>Editor: vezi\n<a href=\"%(jbigi)s\">NativeBigInteger pentru o criptografie rapidă cu cheie publică</a></i>)"
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
-msgstr ""
-"\n"
-"ugha și rața lucrează la codul de clei C/JNI și la codul java existent\n"
-"este deja implementat cu hooks pentru asta, ori de câte ori este gata. "
-"Rezultate preliminare\n"
-"arata fantastic - rularea routerului cu modPow-ul GMP autohton este de "
-"acord\n"
-"o viteză de 800&#37 în performanțele de criptare, iar sarcina a fost "
-"redusă la jumătate. Acest\n"
-"a fost doar pe mașina unui utilizator, iar lucrurile nu sunt aproape gata"
-" de ambalare\n"
-"și implementare, încă."
+msgstr "\nugha și rața lucrează la codul de clei C/JNI și la codul java existent\neste deja implementat cu hooks pentru asta, ori de câte ori este gata. Rezultate preliminare\narata fantastic - rularea routerului cu modPow-ul GMP autohton este de acord\no viteză de 800&#37 în performanțele de criptare, iar sarcina a fost redusă la jumătate. Acest\na fost doar pe mașina unui utilizator, iar lucrurile nu sunt aproape gata de ambalare\nși implementare, încă."
 
 #: i2p2www/pages/site/about/performance/history.html:32
 msgid "Garlic wrapping a \"reply\" LeaseSet"
@@ -2295,95 +1880,42 @@ msgstr "implementat, dar are nevoie de reglare"
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
-msgstr ""
-"Acest tweak al algoritmului va fi relevant numai pentru aplicațiile care "
-"își doresc\n"
-"colegii să le răspundă (deși asta include tot ceea ce folosește I2PTunnel"
-" sau\n"
-"Mihi's ministreaming lib):"
+msgstr "Acest tweak al algoritmului va fi relevant numai pentru aplicațiile care își doresc\ncolegii să le răspundă (deși asta include tot ceea ce folosește I2PTunnel sau\nMihi's ministreaming lib):"
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
-msgstr ""
-"Anterior, când Alice i-a trimis lui Bob un mesaj, când Bob i-a răspuns că"
-" trebuie să facă o\n"
-"căutare în baza de date a rețelei - trimitând câteva solicitări pentru a "
-"primi Alice\n"
-"LeaseSet curent. Dacă are deja actualul LeaseSet al lui Alice, poate în "
-"schimb\n"
-"sa trimite imediat răspunsul său - acesta este (o parte din) de ce "
-"durează de obicei \n"
-"puțin sa vorbeasca cu cineva prima dată când vă conectați, dar ulterior\n"
-"comunicarea este mai rapidă. În prezent - pentru toți clienții - ne "
-"împachetăm\n"
-"actualul LeaseSet al expeditorului în usturoiul care este livrat "
-"destinatarului,\n"
-"astfel încât, atunci când vor răspunde, vor avea întotdeauna LeaseSet "
-"local\n"
-"stocat - eliminând complet orice nevoie pentru o căutare în baza de date "
-"a rețelei la răspunsuri.\n"
-"Aceasta tranzacționează o mare parte din lățimea de bandă a expeditorului"
-" pentru acea răspuns mai rapidă.\n"
-"Dacă nu am face acest lucru foarte des,\n"
-"utilizarea totală a lățimii de bandă a rețelei ar scădea, deoarece "
-"destinatarul nu\n"
-"trebuie să efectueze căutarea în baza de date a rețelei."
+msgstr "Anterior, când Alice i-a trimis lui Bob un mesaj, când Bob i-a răspuns că trebuie să facă o\ncăutare în baza de date a rețelei - trimitând câteva solicitări pentru a primi Alice\nLeaseSet curent. Dacă are deja actualul LeaseSet al lui Alice, poate în schimb\nsa trimite imediat răspunsul său - acesta este (o parte din) de ce durează de obicei \npuțin sa vorbeasca cu cineva prima dată când vă conectați, dar ulterior\ncomunicarea este mai rapidă. În prezent - pentru toți clienții - ne împachetăm\nactualul LeaseSet al expeditorului în usturoiul care este livrat destinatarului,\nastfel încât, atunci când vor răspunde, vor avea întotdeauna LeaseSet local\nstocat - eliminând complet orice nevoie pentru o căutare în baza de date a rețelei la răspunsuri.\nAceasta tranzacționează o mare parte din lățimea de bandă a expeditorului pentru acea răspuns mai rapidă.\nDacă nu am face acest lucru foarte des,\nutilizarea totală a lățimii de bandă a rețelei ar scădea, deoarece destinatarul nu\ntrebuie să efectueze căutarea în baza de date a rețelei."
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
-msgstr ""
-"Pentru LeaseSet-urile nepublicate, cum ar fi „clienții partajați”, "
-"aceasta este singura cale de a lua\n"
-" LeaseSet la Bob. Din păcate, acest pachet se adaugă de fiecare dată\n"
-"aproape 100% deasupra unei conexiuni cu lățime mare de bandă și mult mai "
-"mult\n"
-"o conexiune cu mesaje mai mici."
+msgstr "Pentru LeaseSet-urile nepublicate, cum ar fi „clienții partajați”, aceasta este singura cale de a lua\n LeaseSet la Bob. Din păcate, acest pachet se adaugă de fiecare dată\naproape 100% deasupra unei conexiuni cu lățime mare de bandă și mult mai mult\no conexiune cu mesaje mai mici."
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
-msgstr ""
-"Modificările programate pentru lansarea 0.6.2 vor include pachetul "
-"LeaseSet doar atunci când\n"
-"este necesar, la începutul unei conexiuni sau când se schimbă LeaseSet.\n"
-"Acest lucru va reduce substanțial cheltuielile totale ale mesajelor I2P."
+msgstr "Modificările programate pentru lansarea 0.6.2 vor include pachetul LeaseSet doar atunci când\neste necesar, la începutul unei conexiuni sau când se schimbă LeaseSet.\nAcest lucru va reduce substanțial cheltuielile totale ale mesajelor I2P."
 
 #: i2p2www/pages/site/about/performance/history.html:66
 msgid "More efficient TCP rejection"
@@ -2392,41 +1924,16 @@ msgstr "Respingerea TCP mai eficientă"
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
-msgstr ""
-"În momentul de față, toate conexiunile TCP fac toate validarea colegilor "
-"lor după\n"
-"parcurgerea strângerii de mână completă (scumpă) a lui Diffie-Hellman "
-"pentru a negocia o\n"
-"cheia sesiunii private. Aceasta înseamnă că dacă ceasul cuiva este într-"
-"adevăr greșit sau\n"
-"NAT / firewall / etc sunt necorespunzător configurate (sau pur și simplu "
-"rulează o\n"
-"versiunea incompatibilă a routerului), vor merge în mod constant (deși nu"
-"\n"
-"în mod constant, datorită listei ban)) provoca o criptografie inutilă "
-"scumpă\n"
-"operațiune pe toți colegii despre care știu. În timp ce vom dori să "
-"păstrăm unele\n"
-"verificari/validari în limita de criptare, vom dori să actualizăm\n"
-"protocol pentru a face o parte din acesta mai întâi, astfel încât să le "
-"putem respinge curat\n"
-"fără a irosi mult procesor sau alte resurse."
+msgstr "În momentul de față, toate conexiunile TCP fac toate validarea colegilor lor după\nparcurgerea strângerii de mână completă (scumpă) a lui Diffie-Hellman pentru a negocia o\ncheia sesiunii private. Aceasta înseamnă că dacă ceasul cuiva este într-adevăr greșit sau\nNAT / firewall / etc sunt necorespunzător configurate (sau pur și simplu rulează o\nversiunea incompatibilă a routerului), vor merge în mod constant (deși nu\nîn mod constant, datorită listei ban)) provoca o criptografie inutilă scumpă\noperațiune pe toți colegii despre care știu. În timp ce vom dori să păstrăm unele\nverificari/validari în limita de criptare, vom dori să actualizăm\nprotocol pentru a face o parte din acesta mai întâi, astfel încât să le putem respinge curat\nfără a irosi mult procesor sau alte resurse."
 
 #: i2p2www/pages/site/about/performance/history.html:81
 msgid "Adjust the tunnel testing"
@@ -2434,28 +1941,13 @@ msgstr "Reglați testarea tunelului"
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
-msgstr ""
-"În loc să mergem cu schema destul de aleatoare pe care o avem acum, ar "
-"trebui să folosim un\n"
-"algoritm mai conștient de context pentru testarea tunelurilor. de "
-"exemplu. dacă deja îl știm\n"
-"trecând corect datele valide, nu este nevoie să le testăm, deși dacă nu \n"
-"Am văzut recent date prin ea recent, poate merită să aruncă unele date\n"
-"cale. Acest lucru va reduce contenția tunelului din cauza excesului de "
-"mesaje, precum și\n"
-"îmbunătățește viteza cu care detectăm - și adresăm - tunelurile care nu "
-"au reușit."
+msgstr "În loc să mergem cu schema destul de aleatoare pe care o avem acum, ar trebui să folosim un\nalgoritm mai conștient de context pentru testarea tunelurilor. de exemplu. dacă deja îl știm\ntrecând corect datele valide, nu este nevoie să le testăm, deși dacă nu \nAm văzut recent date prin ea recent, poate merită să aruncă unele date\ncale. Acest lucru va reduce contenția tunelului din cauza excesului de mesaje, precum și\nîmbunătățește viteza cu care detectăm - și adresăm - tunelurile care nu au reușit."
 
 #: i2p2www/pages/site/about/performance/history.html:92
 msgid "Persistent Tunnel / Lease Selection"
@@ -2463,30 +1955,17 @@ msgstr "Selecția persistentă a tunelului / închirierii"
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
-msgstr ""
-"Selecția tunelului de ieșire implementată în 0.6.1.30, selecție de "
-"închiriere la intrare\n"
-"implementat în versiunea 0.6.2."
+msgstr "Selecția tunelului de ieșire implementată în 0.6.1.30, selecție de închiriere la intrare\nimplementat în versiunea 0.6.2."
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
-msgstr ""
-"Selectarea tunelurilor și închirierilor la întâmplare pentru fiecare "
-"mesaj creează un număr mare\n"
-"incidența livrării în afara comenzii, ceea ce împiedică difuzarea "
-"fluxului\n"
-"crescându-și dimensiunea ferestrei cât a putut. Prin persistarea cu\n"
-"aceleași selecții pentru o conexiune dată, rata de transfer este mult mai"
-" rapidă."
+msgstr "Selectarea tunelurilor și închirierilor la întâmplare pentru fiecare mesaj creează un număr mare\nincidența livrării în afara comenzii, ceea ce împiedică difuzarea fluxului\ncrescându-și dimensiunea ferestrei cât a putut. Prin persistarea cu\naceleași selecții pentru o conexiune dată, rata de transfer este mult mai rapidă."
 
 #: i2p2www/pages/site/about/performance/history.html:104
 msgid "Compress some data structures"
@@ -2494,36 +1973,15 @@ msgstr "Compresează unele structuri de date"
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
-msgstr ""
-"Mesajele I2NP și datele pe care le conțin sunt deja definite într-un mod "
-"echitabil\n"
-"structură compactă, deși un atribut al structurii RouterInfo nu este -\n"
-"\"opțiuni\" este un nume ASCII simplu = maparea valorilor. Momentan, îl "
-"completăm\n"
-"cu acele statistici publicate - în jur de 3300 de octeți pe egal. Trivial"
-" la\n"
-"implementarea compresiei GZip ar reduce aproape la 1/3 dimensiunea sa și "
-"când\n"
-"ia în considerare cât de des sunt trecute structurile RouterInfo prin "
-"rețea, adică\n"
-"economii semnificative - de fiecare dată când un router solicită unui alt"
-" router o rețeaDb\n"
-"intrare pe care parerea nu o are, trimite înapoi 3-10 RouterInfo din ele."
+msgstr "Mesajele I2NP și datele pe care le conțin sunt deja definite într-un mod echitabil\nstructură compactă, deși un atribut al structurii RouterInfo nu este -\n\"opțiuni\" este un nume ASCII simplu = maparea valorilor. Momentan, îl completăm\ncu acele statistici publicate - în jur de 3300 de octeți pe egal. Trivial la\nimplementarea compresiei GZip ar reduce aproape la 1/3 dimensiunea sa și când\nia în considerare cât de des sunt trecute structurile RouterInfo prin rețea, adică\neconomii semnificative - de fiecare dată când un router solicită unui alt router o rețeaDb\nintrare pe care parerea nu o are, trimite înapoi 3-10 RouterInfo din ele."
 
 #: i2p2www/pages/site/about/performance/history.html:117
 msgid "Update the ministreaming protocol"
@@ -2535,46 +1993,17 @@ msgstr "înlocuit cu protocolul de streaming complet"
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
-msgstr ""
-"ÃŽn prezent, biblioteca de  ministreaming a mihi are o negociere de flux "
-"destul de simplă\n"
-"protocol - Alice îi trimite lui Bob un mesaj SYN, apoi Bob răspunde cu un"
-" mesaj ACK\n"
-"Alice și Bob își transmit reciproc câteva date, până când unul dintre ei "
-"îi trimite celuilalt a\n"
-"Mesaj ÎNCHIS Pentru conexiuni de lungă durată (de exemplu, la un server "
-"IRC),\n"
-"că aerul general este neglijabil, dar pentru situații simple de "
-"solicitare / răspuns\n"
-"(de exemplu, o cerere / răspuns HTTP), adică mai mult de două ori mai "
-"multe mesaje decât\n"
-"necesar. Dacă totuși, Alice și-a asigurat prima sarcină utilă cu SYN\n"
-"mesaj, iar Bob și-a exprimat prima replică cu ACK - și poate, de asemenea"
-"\n"
-"a inclus indicatorul CLOSE - fluxuri tranzitorii, cum ar fi cererile HTTP"
-"\n"
-"redus la o pereche de mesaje, în loc de SYN + ACK + cerere + răspuns + "
-"ÃŽNCHIS."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
+msgstr "În prezent, biblioteca de  ministreaming a mihi are o negociere de flux destul de simplă\nprotocol - Alice îi trimite lui Bob un mesaj SYN, apoi Bob răspunde cu un mesaj ACK\nAlice și Bob își transmit reciproc câteva date, până când unul dintre ei îi trimite celuilalt a\nMesaj ÎNCHIS Pentru conexiuni de lungă durată (de exemplu, la un server IRC),\ncă aerul general este neglijabil, dar pentru situații simple de solicitare / răspuns\n(de exemplu, o cerere / răspuns HTTP), adică mai mult de două ori mai multe mesaje decât\nnecesar. Dacă totuși, Alice și-a asigurat prima sarcină utilă cu SYN\nmesaj, iar Bob și-a exprimat prima replică cu ACK - și poate, de asemenea\na inclus indicatorul CLOSE - fluxuri tranzitorii, cum ar fi cererile HTTP\nredus la o pereche de mesaje, în loc de SYN + ACK + cerere + răspuns + ÎNCHIS."
 
 #: i2p2www/pages/site/about/performance/history.html:132
 msgid "Implement full streaming protocol"
@@ -2582,59 +2011,26 @@ msgstr "Implementați protocolul de streaming complet"
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
-msgstr ""
-"Protocolul de  ministreaming profită de o decizie de proiectare "
-"deficitară în\n"
-"Protocolul client I2P (I2CP) - expunerea „mode = GARANȚIE”, permițând ce\n"
-"altfel ar fi un protocol fiabil, cu cel mai bun efort, bazat pe mesaje "
-"care trebuie utilizat\n"
-"pentru o funcționare fiabilă și de blocare (sub copertine, tot nu este "
-"sigur și\n"
-"bazat pe mesaje), routerul oferind garanții de livrare prin ambalarea "
-"usturoiului\n"
-"un mesaj \"ACK\" cu sarcina utilă, astfel încât odată ce datele ajung la "
-"țintă,\n"
-"Mesajul ACK este trimis înapoi către noi [prin tuneluri, desigur])."
+msgstr "Protocolul de  ministreaming profită de o decizie de proiectare deficitară în\nProtocolul client I2P (I2CP) - expunerea „mode = GARANȚIE”, permițând ce\naltfel ar fi un protocol fiabil, cu cel mai bun efort, bazat pe mesaje care trebuie utilizat\npentru o funcționare fiabilă și de blocare (sub copertine, tot nu este sigur și\nbazat pe mesaje), routerul oferind garanții de livrare prin ambalarea usturoiului\nun mesaj \"ACK\" cu sarcina utilă, astfel încât odată ce datele ajung la țintă,\nMesajul ACK este trimis înapoi către noi [prin tuneluri, desigur])."
 
 #: i2p2www/pages/site/about/performance/history.html:143
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
-msgstr ""
-"După cum <a href=\"%(link)s\">am spus</a>, a avea\n"
-"I2PTunnel (și ministreaming lib ) merg pe această rută a fost cel mai bun"
-" lucru\n"
-"s-ar putea face, dar sunt disponibile mecanisme mai eficiente. Când vom "
-"scoate\n"
-"Funcționalitatea „mode = GARANȚIE”, ne lăsăm în esență un an\n"
-"I2CP care arată ca un strat IP anonim și, ca atare, vom putea\n"
-"implementați biblioteca de streaming pentru a profita de experiențele de "
-"proiectare ale\n"
-"stratul TCP - ACK-uri selective, detecție de congestionare, agitatie etc."
+msgstr "După cum <a href=\"%(link)s\">am spus</a>, a avea\nI2PTunnel (și ministreaming lib ) merg pe această rută a fost cel mai bun lucru\ns-ar putea face, dar sunt disponibile mecanisme mai eficiente. Când vom scoate\nFuncționalitatea „mode = GARANȚIE”, ne lăsăm în esență un an\nI2CP care arată ca un strat IP anonim și, ca atare, vom putea\nimplementați biblioteca de streaming pentru a profita de experiențele de proiectare ale\nstratul TCP - ACK-uri selective, detecție de congestionare, agitatie etc."
 
 #: i2p2www/pages/site/about/performance/index.html:2
 msgid "Performance"
@@ -2644,103 +2040,44 @@ msgstr "Performanță"
 msgid ""
 "How does I2P work, why is it slow, and why does it not use my full "
 "bandwidth?"
-msgstr ""
-"Cum funcționează I2P, de ce este lent și de ce nu folosește lățimea de "
-"bandă completă?"
+msgstr "Cum funcționează I2P, de ce este lent și de ce nu folosește lățimea de bandă completă?"
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
-msgstr ""
-"Probabil unul dintre cele mai frecvente lucruri pe care oamenii le "
-"întreabă este „cât de repede este I2P?”,\n"
-"și nimeni nu pare să-i placă răspunsul - „depinde”. După ce am încercat "
-"I2P,\n"
-"următorul lucru pe care îl întreabă este „se va face mai repede?”, iar "
-"răspunsul la acesta este cel mai mult\n"
-"empatic <b>da</b>."
+msgstr "Probabil unul dintre cele mai frecvente lucruri pe care oamenii le întreabă este „cât de repede este I2P?”,\nși nimeni nu pare să-i placă răspunsul - „depinde”. După ce am încercat I2P,\nurmătorul lucru pe care îl întreabă este „se va face mai repede?”, iar răspunsul la acesta este cel mai mult\nempatic <b>da</b>."
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
-msgstr ""
-"I2P este o rețea dinamică completă. Fiecare client este cunoscut altor "
-"noduri și testează nodurile cunoscute locale pentru accesibilitate și "
-"capacitate.\n"
-"Doar nodurile accesibile și capabile sunt salvate într-un NetDB local (în"
-" general, este doar o porțiune a rețelei, aproximativ 500-1000).\n"
-"Când I2P construiește tuneluri, selectează cea mai bună resursă din acest"
-" pool. De exemplu, un mic subset de 20-50 de noduri sunt disponibile "
-"numai pentru a construi tunele cu.\n"
-"Deoarece testarea se întâmplă în fiecare minut, grupul de noduri folosite"
-" se schimbă în fiecare minut.\n"
-"Fiecare nod I2P cunoaște o parte diferită a plasei, ceea ce înseamnă că "
-"fiecare router are un set diferit de noduri I2P pentru a fi utilizate "
-"pentru tuneluri.\n"
-"Chiar dacă două routere au același subset de noduri cunoscute, testele "
-"privind accesibilitatea și capacitatea vor arăta probabil rezultate "
-"diferite, deoarece celelalte routere ar putea fi sub sarcină la fel ca "
-"testele unui router, dar să fie gratuite dacă al doilea test de router."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
+msgstr "I2P este o rețea dinamică completă. Fiecare client este cunoscut altor noduri și testează nodurile cunoscute locale pentru accesibilitate și capacitate.\nDoar nodurile accesibile și capabile sunt salvate într-un NetDB local (în general, este doar o porțiune a rețelei, aproximativ 500-1000).\nCând I2P construiește tuneluri, selectează cea mai bună resursă din acest pool. De exemplu, un mic subset de 20-50 de noduri sunt disponibile numai pentru a construi tunele cu.\nDeoarece testarea se întâmplă în fiecare minut, grupul de noduri folosite se schimbă în fiecare minut.\nFiecare nod I2P cunoaște o parte diferită a plasei, ceea ce înseamnă că fiecare router are un set diferit de noduri I2P pentru a fi utilizate pentru tuneluri.\nChiar dacă două routere au același subset de noduri cunoscute, testele privind accesibilitatea și capacitatea vor arăta probabil rezultate diferite, deoarece celelalte routere ar putea fi sub sarcină la fel ca testele unui router, dar să fie gratuite dacă al doilea test de router."
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
-msgstr ""
-"Cele de mai sus descriu de ce fiecare nod I2P are noduri diferite pentru "
-"a construi tuneluri.\n"
-"Deoarece fiecare nod I2P are o latență și o bandă diferită, tunelurile "
-"(care sunt construite prin acele noduri) au valori diferite de latență și"
-" de lățime de bandă.\n"
-"Și pentru că fiecare nod I2P are tuneluri diferite construite, nu există "
-"două noduri I2P nu au aceleași seturi de tunel."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
+msgstr "Cele de mai sus descriu de ce fiecare nod I2P are noduri diferite pentru a construi tuneluri.\nDeoarece fiecare nod I2P are o latență și o bandă diferită, tunelurile (care sunt construite prin acele noduri) au valori diferite de latență și de lățime de bandă.\nȘi pentru că fiecare nod I2P are tuneluri diferite construite, nu există două noduri I2P nu au aceleași seturi de tunel."
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
-msgstr ""
-"Un server / client este cunoscut sub numele de „destinație” și fiecare "
-"destinație are cel puțin un tun de intrare și unul de ieșire. Valoarea "
-"implicită este de 3 hamei pe tunel.\n"
-"Aceasta adaugă până la 12 hamei (de asemenea 12 noduri I2P diferite) "
-"pentru un roundtrip complet client-server-client ."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
+msgstr "Un server / client este cunoscut sub numele de „destinație” și fiecare destinație are cel puțin un tun de intrare și unul de ieșire. Valoarea implicită este de 3 hamei pe tunel.\nAceasta adaugă până la 12 hamei (de asemenea 12 noduri I2P diferite) pentru un roundtrip complet client-server-client ."
 
 #: i2p2www/pages/site/about/performance/index.html:34
 msgid ""
 "Each data package is sent through 6 other I2P nodes until it reaches the "
 "server:"
-msgstr ""
-"Fiecare pachet de date este trimis prin 6 alte noduri I2P până când "
-"ajunge la server:"
+msgstr "Fiecare pachet de date este trimis prin 6 alte noduri I2P până când ajunge la server:"
 
 #: i2p2www/pages/site/about/performance/index.html:40
 msgid "and on way back 6 different I2P nodes:"
@@ -2748,182 +2085,62 @@ msgstr "și la întoarcere 6 noduri I2P diferite:"
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
-msgstr ""
-"Deoarece majoritatea traficului pe I2P (www, torrent, ...) au nevoie de "
-"pachete ack până când sunt trimise date noi, trebuie să aștepte până când"
-" un pachet ack se întoarce de pe server.\n"
-"În final: trimiteți date, așteptați ack, trimiteți mai multe date, "
-"așteptați ack, ..\n"
-"Pe măsură ce RTT (RoundTripTime) se adaugă din latența fiecărui nod I2P "
-"individual și a fiecărei conexiuni de pe acest roundtrip, durează de "
-"obicei 1-3 secunde până când un pachet ack revine clientului.\n"
-"Cu unele interne ale transportului TCP și I2P, un pachet de date are o "
-"dimensiune limitată și nu poate fi la fel de mare pe cât ne dorim.\n"
-"Împreună, aceste condiții stabilesc o limită de lățime de bandă maximă pe"
-" tunel de 20-50 kbyte / sec.\n"
-"Dar, dacă NUMAI UN singur salt în tunel are doar o lățime de bandă de 5 "
-"kb / sec pentru a cheltui, întregul tunel este limitat la 5 kb / sec, "
-"independent de\n"
-"latența și alte limitări."
+msgstr "Deoarece majoritatea traficului pe I2P (www, torrent, ...) au nevoie de pachete ack până când sunt trimise date noi, trebuie să aștepte până când un pachet ack se întoarce de pe server.\nÎn final: trimiteți date, așteptați ack, trimiteți mai multe date, așteptați ack, ..\nPe măsură ce RTT (RoundTripTime) se adaugă din latența fiecărui nod I2P individual și a fiecărei conexiuni de pe acest roundtrip, durează de obicei 1-3 secunde până când un pachet ack revine clientului.\nCu unele interne ale transportului TCP și I2P, un pachet de date are o dimensiune limitată și nu poate fi la fel de mare pe cât ne dorim.\nÎmpreună, aceste condiții stabilesc o limită de lățime de bandă maximă pe tunel de 20-50 kbyte / sec.\nDar, dacă NUMAI UN singur salt în tunel are doar o lățime de bandă de 5 kb / sec pentru a cheltui, întregul tunel este limitat la 5 kb / sec, independent de\nlatența și alte limitări."
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
-msgstr ""
-"Datorită criptării utilizate și a altor setări în I2P (cum să construiți "
-"tuneluri, latență, ...), este destul de scump în timpul procesorului să "
-"construiți un tunel. Aceasta este\n"
-"de ce o destinație este permisă doar să aibă maxim 6 tunele IN și 6 OUT "
-"pentru a transporta date. Cu un maxim de 50 kb / sec pe tunel, o "
-"destinație ar putea\n"
-"utilizați aproximativ 300 kb / sec trafic combinat (în realitate ar putea"
-" fi mai mult dacă sunt utilizate tuneluri mai scurte cu anonimat scăzut "
-"sau nu există).\n"
-"Tunelurile folosite sunt aruncate la fiecare 10 minute și sunt construite"
-" altele noi.\n"
-"Această schimbare a tunelurilor (și uneori a clienților care se închid "
-"din greu datorită utilizării „închise simultan” sau a situațiilor în care"
-" există pierderi de energie)\n"
-"uneori rupe tuneluri și conexiuni, așa cum se vede în rețeaua IRC2P în "
-"pierderea conexiunii (ping timeout) sau pornit atunci când utilizați "
-"eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
+msgstr "Datorită criptării utilizate și a altor setări în I2P (cum să construiți tuneluri, latență, ...), este destul de scump în timpul procesorului să construiți un tunel. Aceasta este\nde ce o destinație este permisă doar să aibă maxim 6 tunele IN și 6 OUT pentru a transporta date. Cu un maxim de 50 kb / sec pe tunel, o destinație ar putea\nutilizați aproximativ 300 kb / sec trafic combinat (în realitate ar putea fi mai mult dacă sunt utilizate tuneluri mai scurte cu anonimat scăzut sau nu există).\nTunelurile folosite sunt aruncate la fiecare 10 minute și sunt construite altele noi.\nAceastă schimbare a tunelurilor (și uneori a clienților care se închid din greu datorită utilizării „închise simultan” sau a situațiilor în care există pierderi de energie)\nuneori rupe tuneluri și conexiuni, așa cum se vede în rețeaua IRC2P în pierderea conexiunii (ping timeout) sau pornit atunci când utilizați eepget."
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
-msgstr ""
-"Cu un set limitat de destinații și un set limitat de tunele pe "
-"destinație, un nod I2P folosește doar un set limitat de tuneluri pe alte "
-"noduri I2P.\n"
-"De exemplu, dacă un nod I2P este \"hop1\" în exemplul mic de mai sus, vom"
-" vedea doar 1 tunel participant provenind de la client.\n"
-"Dacă însumăm întreaga rețea I2P, numai un număr destul de limitat de "
-"tunele participante ar putea fi construite cu o cantitate limitată de "
-"lățime de bandă împreună.\n"
-"Dacă se distribuie aceste numere limitate între numărul de noduri I2P, "
-"există doar o fracțiune de lățime de bandă / capacitate disponibilă "
-"pentru utilizare."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
+msgstr "Cu un set limitat de destinații și un set limitat de tunele pe destinație, un nod I2P folosește doar un set limitat de tuneluri pe alte noduri I2P.\nDe exemplu, dacă un nod I2P este \"hop1\" în exemplul mic de mai sus, vom vedea doar 1 tunel participant provenind de la client.\nDacă însumăm întreaga rețea I2P, numai un număr destul de limitat de tunele participante ar putea fi construite cu o cantitate limitată de lățime de bandă împreună.\nDacă se distribuie aceste numere limitate între numărul de noduri I2P, există doar o fracțiune de lățime de bandă / capacitate disponibilă pentru utilizare."
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
-msgstr ""
-"Pentru a rămâne anonim un router nu trebuie utilizat de întreaga rețea "
-"pentru construirea de tuneluri.\n"
-"Dacă un router acționează ca un router tunel pentru TOATE nodurile I2P, "
-"acesta devine un punct central de eșec foarte real, precum și un punct "
-"central pentru a apuca IP-uri și date de la clienți. Acest lucru nu este "
-"bun.\n"
-"I2P încearcă să răspândească încărcarea pe o mulțime de noduri I2P din "
-"acest motiv."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
+msgstr "Pentru a rămâne anonim un router nu trebuie utilizat de întreaga rețea pentru construirea de tuneluri.\nDacă un router acționează ca un router tunel pentru TOATE nodurile I2P, acesta devine un punct central de eșec foarte real, precum și un punct central pentru a apuca IP-uri și date de la clienți. Acest lucru nu este bun.\nI2P încearcă să răspândească încărcarea pe o mulțime de noduri I2P din acest motiv."
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
-msgstr ""
-"Un alt punct este rețeaua de plasă completă. Fiecare conexiune hop-hop "
-"utilizează o conexiune TCP sau UDP pe nodurile I2P. Cu 1000 de conexiuni,"
-" se vede\n"
-"1000 de conexiuni TCP. Acest lucru este destul de mult, iar unele routere"
-" de birou pentru casă și pentru birouri mici (DSL, cablu, ..) permit doar"
-" un număr mic de conexiuni (sau pur și simplu înnebuniți dacă utilizați "
-"mai mult de conexiuni X).\n"
-"I2P încearcă să limiteze aceste conexiuni pentru a fi sub 1500 per UDP și"
-" per tip TCP.\n"
-"Acest lucru limitează și cantitatea de trafic parcursă pe nodul dvs. I2P."
+msgstr "Un alt punct este rețeaua de plasă completă. Fiecare conexiune hop-hop utilizează o conexiune TCP sau UDP pe nodurile I2P. Cu 1000 de conexiuni, se vede\n1000 de conexiuni TCP. Acest lucru este destul de mult, iar unele routere de birou pentru casă și pentru birouri mici (DSL, cablu, ..) permit doar un număr mic de conexiuni (sau pur și simplu înnebuniți dacă utilizați mai mult de conexiuni X).\nI2P încearcă să limiteze aceste conexiuni pentru a fi sub 1500 per UDP și per tip TCP.\nAcest lucru limitează și cantitatea de trafic parcursă pe nodul dvs. I2P."
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
-msgstr ""
-"În rezumat, I2P este foarte complex și nu există o modalitate ușoară de a"
-" identifica de ce nodul dvs. nu este utilizat.\n"
-"Dacă nodul dvs. este accesibil și are o setare de lățime de bandă> 128 "
-"kbyte / sec partajată și este accesibil 24/7, ar trebui să fie utilizat "
-"după ceva timp pentru traficul participant.\n"
-"Dacă este în intervalul intermediar, testarea nodului dvs. I2P efectuată "
-"de alți noduri le va spune: nu sunteți accesibil. Acest lucru vă "
-"blochează cel puțin nodul\n"
-"24h pe alte noduri. Deci, celelalte noduri care v-au testat în jos nu vă "
-"vor folosi nodul pentru 24 de ore pentru construirea de tuneluri. Acesta "
-"este motivul pentru care traficul dvs. va\n"
-"fiți mai jos după o repornire / oprire pentru cel puțin 24 de ore."
+msgstr "În rezumat, I2P este foarte complex și nu există o modalitate ușoară de a identifica de ce nodul dvs. nu este utilizat.\nDacă nodul dvs. este accesibil și are o setare de lățime de bandă> 128 kbyte / sec partajată și este accesibil 24/7, ar trebui să fie utilizat după ceva timp pentru traficul participant.\nDacă este în intervalul intermediar, testarea nodului dvs. I2P efectuată de alți noduri le va spune: nu sunteți accesibil. Acest lucru vă blochează cel puțin nodul\n24h pe alte noduri. Deci, celelalte noduri care v-au testat în jos nu vă vor folosi nodul pentru 24 de ore pentru construirea de tuneluri. Acesta este motivul pentru care traficul dvs. va\nfiți mai jos după o repornire / oprire pentru cel puțin 24 de ore."
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
-msgstr ""
-"De asemenea: alte noduri I2P trebuie să-ți cunoască routerul I2P pentru "
-"a-l testa pentru disponibilitate și capacitate. Este nevoie de timp "
-"pentru ca alte noduri să fie cunoscute de nodul dvs.\n"
-"Va fi mai rapid dacă utilizați I2P și construiți mai multe tuneluri, de "
-"ex. folosiți un torrent sau www de ceva timp."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
+msgstr "De asemenea: alte noduri I2P trebuie să-ți cunoască routerul I2P pentru a-l testa pentru disponibilitate și capacitate. Este nevoie de timp pentru ca alte noduri să fie cunoscute de nodul dvs.\nVa fi mai rapid dacă utilizați I2P și construiți mai multe tuneluri, de ex. folosiți un torrent sau www de ceva timp."
 
 #: i2p2www/pages/site/about/performance/index.html:99
 msgid "Performance Improvements"
@@ -2934,7 +2151,4 @@ msgstr "Imbunatatiri ale performantei"
 msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
-msgstr ""
-"Pentru posibile îmbunătățiri viitoare a performanței, a se vedea\n"
-"<a href=\"%(future)s\">Îmbunătățirile viitoare ale performanței</a>."
-
+msgstr "Pentru posibile îmbunătățiri viitoare a performanței, a se vedea\n<a href=\"%(future)s\">Îmbunătățirile viitoare ale performanței</a>."
diff --git a/i2p2www/translations/ro/LC_MESSAGES/blog.po b/i2p2www/translations/ro/LC_MESSAGES/blog.po
index 1a7be8cabe41b361b11ec42f2993e6be6b109e19..2eae4c9ae401467d82b0e6f2cbfc45428e06e9c2 100644
--- a/i2p2www/translations/ro/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/ro/LC_MESSAGES/blog.po
@@ -1,23 +1,23 @@
-# Romanian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Predator <Predator@windowslive.com>, 2017
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:56+0000\n"
-"Last-Translator: Inpresentia I.\n"
+"POT-Creation-Date: 2021-10-11 16:26+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Predator <Predator@windowslive.com>, 2017\n"
 "Language-Team: Romanian (http://www.transifex.com/otf/I2P/language/ro/)\n"
-"Plural-Forms: nplurals=3; "
-"plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1))\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ro\n"
+"Plural-Forms: nplurals=3; plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1));\n"
 
 #: i2p2www/blog/2011/10/11/0.8.9-Release.rst:24
 #: i2p2www/blog/2011/10/20/0.8.10-Release.rst:11
@@ -90,6 +90,8 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:33
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:33
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:45
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:35
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:34
 msgid "RELEASE DETAILS"
 msgstr ""
 
@@ -161,6 +163,8 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:49
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:51
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:64
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:51
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:43
 msgid "Bug Fixes"
 msgstr ""
 
@@ -222,6 +226,8 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:62
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:65
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:76
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:74
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:52
 msgid "Other"
 msgstr "Altul"
 
@@ -284,6 +290,8 @@ msgstr "Altul"
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:76
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:93
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:97
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:94
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:66
 msgid "SHA256 Checksums:"
 msgstr ""
 
@@ -314,11 +322,11 @@ msgstr ""
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:8
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:10
 msgid ""
-"0.9.2 includes extensive low-level changes to improve the performance and"
-" efficiency of the router. We have updated our UPnP library, to hopefully"
-" make UPnP work for more people. I2PSnark now has DHT support, but it is "
-"not yet enabled by default, as we plan to do more testing during the "
-"upcoming 0.9.3 development cycle."
+"0.9.2 includes extensive low-level changes to improve the performance and "
+"efficiency of the router. We have updated our UPnP library, to hopefully "
+"make UPnP work for more people. I2PSnark now has DHT support, but it is not "
+"yet enabled by default, as we plan to do more testing during the upcoming "
+"0.9.3 development cycle."
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:13
@@ -330,8 +338,8 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:27
 msgid ""
-"SSU: Fix several problems in our UDP transport, to improve efficiency and"
-" reliability for connection setup. Also improve defenses against various "
+"SSU: Fix several problems in our UDP transport, to improve efficiency and "
+"reliability for connection setup. Also improve defenses against various "
 "types of bad input."
 msgstr ""
 
@@ -349,9 +357,9 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:30
 msgid ""
-"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered "
-"are now much more flexible, which should lessen protocol overhead and "
-"reduce stalls caused by dropped tags."
+"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered are "
+"now much more flexible, which should lessen protocol overhead and reduce "
+"stalls caused by dropped tags."
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:31
@@ -362,16 +370,18 @@ msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:35
 msgid ""
-"Fix various issues affecting memory usage and performance on high-"
-"bandwidth routers"
+"Fix various issues affecting memory usage and performance on high-bandwidth "
+"routers"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:36
-msgid "Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
+msgid ""
+"Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:37
-msgid "Fix i2psnark bug that prevented a completion announcement to the tracker"
+msgid ""
+"Fix i2psnark bug that prevented a completion announcement to the tracker"
 msgstr ""
 
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:38
@@ -458,14 +468,14 @@ msgstr ""
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:8
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:10
 msgid ""
-"0.9.3 includes extensive low-level changes to the queueing of messages in"
-" the router.  We implement the CoDel Active Queue Management (AQM) "
-"algorithm.  We also unify the queueing and priority mechanisms in the "
-"transports to aid diagnosis and reduce network latency.  Work continues "
-"on fixing UDP transport bugs and making UDP more resistant to attacks.  "
-"There are more changes to improve the performance of the router and "
-"reduce its memory usage.  Also, we enable i2psnark's DHT support, "
-"introduced last release, by default."
+"0.9.3 includes extensive low-level changes to the queueing of messages in "
+"the router.  We implement the CoDel Active Queue Management (AQM) algorithm."
+"  We also unify the queueing and priority mechanisms in the transports to "
+"aid diagnosis and reduce network latency.  Work continues on fixing UDP "
+"transport bugs and making UDP more resistant to attacks.  There are more "
+"changes to improve the performance of the router and reduce its memory "
+"usage.  Also, we enable i2psnark's DHT support, introduced last release, by "
+"default."
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:27
@@ -483,8 +493,8 @@ msgstr ""
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:33
 msgid ""
 "Several SSU fixes including memory leak, and better handling of routers "
-"behind firewalls that change UDP ports; additional defenses for malicious"
-" packets."
+"behind firewalls that change UDP ports; additional defenses for malicious "
+"packets."
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:34
@@ -509,9 +519,8 @@ msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:42
 msgid ""
-"Fix streaming connection timeout back to 1 minute, was inadvertently "
-"changed to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was"
-" unlimited"
+"Fix streaming connection timeout back to 1 minute, was inadvertently changed"
+" to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was unlimited"
 msgstr ""
 
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:43
@@ -567,28 +576,24 @@ msgstr ""
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:8
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:10
 msgid ""
-"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, "
-"that was reducing network performance and reliability. It also includes "
-"major changes in the in-network update system, and adds the capability to"
-" update via in-network torrents."
+"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, that "
+"was reducing network performance and reliability. It also includes major "
+"changes in the in-network update system, and adds the capability to update "
+"via in-network torrents."
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:14
 msgid ""
-"We fixed several bugs in the i2psnark DHT implementation that was "
-"introduced\n"
+"We fixed several bugs in the i2psnark DHT implementation that was introduced\n"
 "last release. For those of you using console or http proxy passwords,\n"
-"we converted to the more-secure digest method and improved the security "
-"for console forms."
+"we converted to the more-secure digest method and improved the security for console forms."
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:20
 msgid ""
-"For those of you already running development builds, your router should "
-"automatically\n"
+"For those of you already running development builds, your router should automatically\n"
 "update to 0.9.4-0 using the new in-network torrent facility.\n"
-"For those running 0.9.3-0, you will update normally using in-network "
-"HTTP, and\n"
+"For those running 0.9.3-0, you will update normally using in-network HTTP, and\n"
 "we will have more information for you when we release 0.9.5."
 msgstr ""
 
@@ -604,12 +609,13 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:42
 msgid ""
-"Fix major bug that reduced SSU connection limits which reduced tunnel "
-"build success rates"
+"Fix major bug that reduced SSU connection limits which reduced tunnel build "
+"success rates"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:43
-msgid "Fix bug with external I2CP that prevented some external apps from working"
+msgid ""
+"Fix bug with external I2CP that prevented some external apps from working"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:44
@@ -642,8 +648,7 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:54
 msgid ""
-"More performance improvements, memory reduction, and object churn "
-"reduction"
+"More performance improvements, memory reduction, and object churn reduction"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:55
@@ -660,15 +665,15 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:58
 msgid ""
-"Convert http proxy and console from basic to digest authentication for "
-"added security"
+"Convert http proxy and console from basic to digest authentication for added"
+" security"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:59
 msgid ""
 "Improved verification of console form submissions, using jsp sessions. "
-"Cookies may now be required on forms, except when the console password is"
-" enabled"
+"Cookies may now be required on forms, except when the console password is "
+"enabled"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:60
@@ -687,8 +692,8 @@ msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:63
 msgid ""
-"Translation updates: Chinese, French, German, Italian, Polish, "
-"Portuguese, Swedish, and Ukrainian"
+"Translation updates: Chinese, French, German, Italian, Polish, Portuguese, "
+"Swedish, and Ukrainian"
 msgstr ""
 
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:65
@@ -706,24 +711,21 @@ msgstr ""
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:8
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:10
 msgid ""
-"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities"
-" that are being investigated by researchers at UCSB. We continue to work "
-"with them on additional improvements. This is a good opportunity to "
-"remind the community that while our network continues to grow rapidly, it"
-" is still relatively small. There may be multiple weaknesses or bugs that"
-" could compromise your anonymity. Help us grow the network by spreading "
-"the word and contributing where you can."
+"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities "
+"that are being investigated by researchers at UCSB. We continue to work with"
+" them on additional improvements. This is a good opportunity to remind the "
+"community that while our network continues to grow rapidly, it is still "
+"relatively small. There may be multiple weaknesses or bugs that could "
+"compromise your anonymity. Help us grow the network by spreading the word "
+"and contributing where you can."
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:14
 #, python-format
 msgid ""
-"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers "
-"running a\n"
-"development build) will attempt to update via the experimental in-network"
-" bittorrent\n"
-"with i2psnark. If this doesn't work, it should fall back to standard in-"
-"network HTTP update."
+"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers running a\n"
+"development build) will attempt to update via the experimental in-network bittorrent\n"
+"with i2psnark. If this doesn't work, it should fall back to standard in-network HTTP update."
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:28
@@ -768,8 +770,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:39
 msgid ""
-"Encrypt database lookup messages end-to-end when sent through exploratory"
-" tunnels"
+"Encrypt database lookup messages end-to-end when sent through exploratory "
+"tunnels"
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:40
@@ -814,8 +816,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53
 msgid ""
-"Translation updates: French, German, Hungarian, Italian, Norwegian, "
-"Polish, Portuguese, Russian, Swedish"
+"Translation updates: French, German, Hungarian, Italian, Norwegian, Polish, "
+"Portuguese, Russian, Swedish"
 msgstr ""
 
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:55
@@ -830,17 +832,15 @@ msgstr ""
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:10
 msgid ""
 "0.9.6 includes bug fixes and an update from Jetty 6.1.26 (2010-11-10) to "
-"Jetty 7.6.10 (2013-03-12). See below for important information on the "
-"Jetty update. The Jetty 7 series is actively maintained and we plan to "
-"stay current with it in future I2P releases."
+"Jetty 7.6.10 (2013-03-12). See below for important information on the Jetty "
+"update. The Jetty 7 series is actively maintained and we plan to stay "
+"current with it in future I2P releases."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:14
 msgid ""
-"Most users will update via HTTP. Those running development builds will "
-"attempt to update via the\n"
-"experimental in-network bittorrent with i2psnark. We've fixed some bugs "
-"that will enable more users\n"
+"Most users will update via HTTP. Those running development builds will attempt to update via the\n"
+"experimental in-network bittorrent with i2psnark. We've fixed some bugs that will enable more users\n"
 "to update via torrent in the 0.9.7 update cycle."
 msgstr ""
 
@@ -850,12 +850,9 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:28
 msgid ""
-"If you first installed I2P with version 0.9.5, on Windows only, we "
-"recommend that you follow the\n"
-"following instructions to fix your eepsite location **before** you update"
-" to 0.9.6.\n"
-"Only original installations of 0.9.5-0 on Windows are affected by this "
-"issue. If your router version\n"
+"If you first installed I2P with version 0.9.5, on Windows only, we recommend that you follow the\n"
+"following instructions to fix your eepsite location **before** you update to 0.9.6.\n"
+"Only original installations of 0.9.5-0 on Windows are affected by this issue. If your router version\n"
 "is 0.9.5-0-win1, you already have the fix and need not take any action."
 msgstr ""
 
@@ -869,36 +866,29 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:43
 msgid ""
-"For most people, the update should just work. If you have multiple Jetty "
-"eepsites,\n"
-"OR have made changes to jetty.xml or other Jetty configuration files, "
-"including changing the port\n"
+"For most people, the update should just work. If you have multiple Jetty eepsites,\n"
+"OR have made changes to jetty.xml or other Jetty configuration files, including changing the port\n"
 "from 7658, you MUST take manual action AFTER updating."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:49
 msgid ""
-"After update, the router will migrate your jetty.xml files to the new "
-"Jetty 7 format."
+"After update, the router will migrate your jetty.xml files to the new Jetty "
+"7 format."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:51
 msgid ""
-"The migration resets the port to 7658. If you have more than one Jetty "
-"eepsite, OR your eepsite\n"
-"  is NOT on port 7658, OR you have made other modifications to jetty.xml "
-"(for example changing the\n"
-"  listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml "
-"file for each eepsite to fix them up\n"
+"The migration resets the port to 7658. If you have more than one Jetty eepsite, OR your eepsite\n"
+"  is NOT on port 7658, OR you have made other modifications to jetty.xml (for example changing the\n"
+"  listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml file for each eepsite to fix them up\n"
 "  after updating, and restart again."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:56
 msgid ""
-"**The following files will be backed up with a &quot;.jetty6&quot; suffix"
-" and then migrated.**\n"
-"If you have made local changes, you may have to edit them manually and "
-"restart.\n"
+"**The following files will be backed up with a &quot;.jetty6&quot; suffix and then migrated.**\n"
+"If you have made local changes, you may have to edit them manually and restart.\n"
 "See http://wiki.eclipse.org/Jetty for assistance in configuring Jetty 7."
 msgstr ""
 
@@ -917,7 +907,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:78
-msgid "If a plugin does not work, please contact the maintainer for that plugin."
+msgid ""
+"If a plugin does not work, please contact the maintainer for that plugin."
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:84
@@ -946,14 +937,14 @@ msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:90
 msgid ""
-"Ignore unsupported IPs in RouterInfos when selecting an address (prep for"
-" IPv6)"
+"Ignore unsupported IPs in RouterInfos when selecting an address (prep for "
+"IPv6)"
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:91
 msgid ""
-"Ignore unused option bits in Database Lookup Message (prep for requesting"
-" encrypted response)"
+"Ignore unused option bits in Database Lookup Message (prep for requesting "
+"encrypted response)"
 msgstr ""
 
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:92
@@ -1023,31 +1014,24 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:12
 msgid ""
-"For the first time, class 'N' routers (those with a minimumum of 128 "
-"KBytes/sec of shared bandwidth)\n"
-"will automatically become floodfill (previously it was only 'O' routers "
-"with 256 KBps). This will\n"
-"increase the floodfill population for additional resistance to certain "
-"attacks (see below). Floodfill routers\n"
-"don't consume much additional bandwidth, but they do tend to use "
-"additional memory and concurrent\n"
-"connections. If you do not wish your router to become floodfill, set the "
-"advanced configuration\n"
+"For the first time, class 'N' routers (those with a minimumum of 128 KBytes/sec of shared bandwidth)\n"
+"will automatically become floodfill (previously it was only 'O' routers with 256 KBps). This will\n"
+"increase the floodfill population for additional resistance to certain attacks (see below). Floodfill routers\n"
+"don't consume much additional bandwidth, but they do tend to use additional memory and concurrent\n"
+"connections. If you do not wish your router to become floodfill, set the advanced configuration\n"
 "router.floodfillParticipant=false ."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:21
 #, python-format
 msgid ""
-"As we think the last release fixed the experimental update-via-torrent "
-"bugs, 3%(pc)s of routers should\n"
+"As we think the last release fixed the experimental update-via-torrent bugs, 3%(pc)s of routers should\n"
 "update over in-network bittorrent this cycle."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:26
 msgid ""
-"Plugin update checks, possibly broken for several releases, are fixed. "
-"Your plugins should once again\n"
+"Plugin update checks, possibly broken for several releases, are fixed. Your plugins should once again\n"
 "auto-update after updating the router."
 msgstr ""
 
@@ -1059,17 +1043,12 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:35
 msgid ""
-"This release contains additional mitigations for the `\"practical "
-"attacks\" paper`__.\n"
-"However, we have a lot more work to do to resist Sybil attacks on the "
-"floodfills, and resist\n"
+"This release contains additional mitigations for the `\"practical attacks\" paper`__.\n"
+"However, we have a lot more work to do to resist Sybil attacks on the floodfills, and resist\n"
 "traffic analysis at the gateways and endpoints of exploratory tunnels.\n"
-"It's a good reminder for everybody that our network is still relatively "
-"small and vulnerable.\n"
-"We don't currently recommend any uses that would put anybody in serious "
-"jeopardy.\n"
-"We'll keep working to improve it... please keep working to spread the "
-"word. A bigger network is a better network."
+"It's a good reminder for everybody that our network is still relatively small and vulnerable.\n"
+"We don't currently recommend any uses that would put anybody in serious jeopardy.\n"
+"We'll keep working to improve it... please keep working to spread the word. A bigger network is a better network."
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:48
@@ -1114,8 +1093,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:60
 msgid ""
-"Fix i2psnark bug that changed the infohash of torrents created by Robert "
-"and fetched via magnet link"
+"Fix i2psnark bug that changed the infohash of torrents created by Robert and"
+" fetched via magnet link"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:61
@@ -1150,8 +1129,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:71
 msgid ""
-"Individual expiration times in leases, for efficiency on destinations "
-"with a high number of tunnels"
+"Individual expiration times in leases, for efficiency on destinations with a"
+" high number of tunnels"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:72
@@ -1167,7 +1146,8 @@ msgid "Tomcat 6.0.37"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:75
-msgid "Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
+msgid ""
+"Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
 msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:76
@@ -1185,12 +1165,11 @@ msgstr ""
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:8
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:10
 msgid ""
-"This unscheduled release disables the RouterInfo verification messages "
-"that were used in the attack published in the UCSB paper, which should "
-"make correlating a LeaseSet and a Router much more difficult. We have "
-"also included a limited number of other fixes listed below. Our 0.9.8 "
-"release, which will include IPv6 support, is still on-schedule for late "
-"September."
+"This unscheduled release disables the RouterInfo verification messages that "
+"were used in the attack published in the UCSB paper, which should make "
+"correlating a LeaseSet and a Router much more difficult. We have also "
+"included a limited number of other fixes listed below. Our 0.9.8 release, "
+"which will include IPv6 support, is still on-schedule for late September."
 msgstr ""
 
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:12
@@ -1240,16 +1219,17 @@ msgstr ""
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:8
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:10
 msgid ""
-"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
-"default, but of course you need a public IPv6 address to use it. "
-"Configuration is on the 'network' configuration tab in your console. We "
-"also have anonymity improvements including padding of SSU packets and "
-"longer router private keys."
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by default, "
+"but of course you need a public IPv6 address to use it. Configuration is on "
+"the 'network' configuration tab in your console. We also have anonymity "
+"improvements including padding of SSU packets and longer router private "
+"keys."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:12
 #, python-format
-msgid "30%(pc)s of you will update via in-network torrent in this update cycle."
+msgid ""
+"30%(pc)s of you will update via in-network torrent in this update cycle."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:14
@@ -1258,41 +1238,30 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:16
 msgid ""
-"IPv6 is enabled and preferred by default. If you have a public IPv6 "
-"address \n"
-"and you are connecting to another router with a published IPv6 address, "
-"it will \n"
-"connect via IPv6. There is a new IPv6 configuration section on /confignet"
-" in \n"
+"IPv6 is enabled and preferred by default. If you have a public IPv6 address \n"
+"and you are connecting to another router with a published IPv6 address, it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet in \n"
 "the router console. If IPv6 is causing problems you may disable it there."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:23
 msgid ""
 "As a part of the IPv6 development effort, I2P now supports multiple \n"
-"published IP addresses. If you have multiple public IP addresses (IPv4, "
-"IPv6, \n"
-"or both), you may enable or disable them individually on /confignet. The"
-" \n"
-"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
-"have \n"
-"multiple addresses you should review the configuration on /confignet and "
-"adjust \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you have \n"
+"multiple addresses you should review the configuration on /confignet and adjust \n"
 "it if necessary.\n"
-"Note that while you may enable multiple IPv4 and IPv6 addresses on "
-"/confignet,\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on /confignet,\n"
 "we recommend that you use only one IPv4 and one IPv6 address. There are\n"
 "bugs still to be fixed with multiple addresses of each type."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:35
 msgid ""
-"While IPv6 support was designed and developed over several years, it has"
-" \n"
-"only been tested by a limited number of users and is still beta. If you "
-"do have \n"
-"a public IPv6 address, please monitor your router and the logs for "
-"problems, \n"
+"While IPv6 support was designed and developed over several years, it has \n"
+"only been tested by a limited number of users and is still beta. If you do have \n"
+"a public IPv6 address, please monitor your router and the logs for problems, \n"
 "and disable it necessary. Please report any bugs on \n"
 "http://trac.i2p2.i2p."
 msgstr ""
@@ -1303,26 +1272,19 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:45
 msgid ""
-"For those of you running I2P on faster hardware (generally, 64-bit x86) "
-"the \n"
-"router will generate a new identity using longer keys. This will "
-"substantially \n"
-"reduce your participating traffic for 48 hours or more, while your router"
-" \n"
-"re-integrates into the network. Due to the new keys, the large number of"
-" \n"
+"For those of you running I2P on faster hardware (generally, 64-bit x86) the \n"
+"router will generate a new identity using longer keys. This will substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router \n"
+"re-integrates into the network. Due to the new keys, the large number of \n"
 "torrent updates, and the recent network growth, we expect substantial \n"
-"disruption to the network for a week or more after the update is "
-"released. \n"
+"disruption to the network for a week or more after the update is released. \n"
 "Please be patient and things should start to improve after a few days."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:55
 msgid ""
-"These changes may result in higher CPU usage for some of you. We're doing"
-" \n"
-"our best to increase efficiency, but stronger security generally requires"
-" more \n"
+"These changes may result in higher CPU usage for some of you. We're doing \n"
+"our best to increase efficiency, but stronger security generally requires more \n"
 "computation. Performance may also be poor during the first week\n"
 "due to the network churn.\n"
 "We will evaluate the network performace before deciding whether to\n"
@@ -1331,10 +1293,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:64
 msgid ""
-"We are experiencing rapid network growth in the last few weeks, which is"
-" \n"
-"causing a bit of a bumpy ride for some, especially on weekends. However, "
-"the \n"
+"We are experiencing rapid network growth in the last few weeks, which is \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, the \n"
 "network is still performing fairly well, so keep spreading the word."
 msgstr ""
 
@@ -1346,14 +1306,10 @@ msgstr ""
 msgid ""
 "We're in the initial stages of desiging major changes to strengthen our \n"
 "crypto. Stronger crypto will use more CPU and it may possibly \n"
-"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
-"on low-power \n"
-"and/or older hardware. We're working hard to minimize the impacts, but "
-"some \n"
-"loss of performance is inevitable. In addition, Java 5 and 6 are no "
-"longer \n"
-"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
-"in \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change in \n"
 "minimum requirements will be announced well in advance."
 msgstr ""
 
@@ -1380,8 +1336,7 @@ msgid ""
 "Last weekend, echelon attended the CTS IV conference in Berlin and\n"
 "psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
 "Several of us will be at 30C3 in Hamburg late this year.\n"
-"It's great to see people participating at these events and representing "
-"I2P."
+"It's great to see people participating at these events and representing I2P."
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:106
@@ -1409,7 +1364,8 @@ msgid "Fix occasional runtime exception in NTCP"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
-msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
+msgid ""
+"Big rework of transport code to accommodate multiple addresses and IPv6"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
@@ -1417,13 +1373,14 @@ msgid "Streaming: Improved recovery from lost acks, other fixes"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
-msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgid ""
+"Use Transifex for translation of initial news and HTTP proxy error pages"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
 msgid ""
-"Translation updates: Chinese, French, German, Portuguese, Russian, "
-"Swedish, Turkish"
+"Translation updates: Chinese, French, German, Portuguese, Russian, Swedish, "
+"Turkish"
 msgstr ""
 
 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:125
@@ -1441,9 +1398,9 @@ msgstr ""
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:7
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:9
 msgid ""
-"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some "
-"people. New installs and non-Windows platforms are not affected, however "
-"all platforms will automatically update even if running 0.9.8."
+"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some people. "
+"New installs and non-Windows platforms are not affected, however all "
+"platforms will automatically update even if running 0.9.8."
 msgstr ""
 
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:11
@@ -1454,10 +1411,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:20
 msgid ""
-"Due to recent attacks, logins are disabled on `Trac`_ and new "
-"registrations are\n"
-"disabled on `zzz.i2p`_. Until those services are restored, please report "
-"all\n"
+"Due to recent attacks, logins are disabled on `Trac`_ and new registrations are\n"
+"disabled on `zzz.i2p`_. Until those services are restored, please report all\n"
 "bugs on IRC freenode or IRC2P #i2p-dev."
 msgstr ""
 
@@ -1470,9 +1425,9 @@ msgstr ""
 msgid ""
 "0.9.9 fixes a number of bugs in the netdb, streaming, and i2ptunnel, and "
 "starts work on a year-long plan to increase the strength of the "
-"cryptographic signing algorithms used in the router, and support multiple"
-" algorithms and key lengths simultaneously. Automatic update files will "
-"now be signed with 4096-bit RSA keys."
+"cryptographic signing algorithms used in the router, and support multiple "
+"algorithms and key lengths simultaneously. Automatic update files will now "
+"be signed with 4096-bit RSA keys."
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:11
@@ -1484,8 +1439,7 @@ msgstr ""
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:18
 msgid ""
 "As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the "
-"latest release.\n"
+"The best way to maintain security and help the network is to run the latest release.\n"
 "Several members of the I2P team will be at 30C3 in Hamburg this year.\n"
 "Come say hello and ask for an I2P sticker.\n"
 "Thanks to everyone for their support this year."
@@ -1601,8 +1555,7 @@ msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:62
 msgid ""
-"Extend router info expiration and other changes to reduce load on "
-"floodfills"
+"Extend router info expiration and other changes to reduce load on floodfills"
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:63
@@ -1639,8 +1592,8 @@ msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:71
 msgid ""
-"Translation updates: French, German, Italian, Romanian, Russian, Spanish,"
-" Swedish, and others"
+"Translation updates: French, German, Italian, Romanian, Russian, Spanish, "
+"Swedish, and others"
 msgstr ""
 
 #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:73
@@ -1679,19 +1632,15 @@ msgstr ""
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:26
 msgid ""
 "If you have a large database or an identity you wish to preserve,\n"
-"you may wish to back up your entire ~/.syndie directory before you start."
-"\n"
-"The upgrade process does make its own backup, however you may find it "
-"easier to use your own backup if the upgrade fails."
+"you may wish to back up your entire ~/.syndie directory before you start.\n"
+"The upgrade process does make its own backup, however you may find it easier to use your own backup if the upgrade fails."
 msgstr ""
 
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:32
 msgid ""
-"Upgrades from 1.103b may fail for some people due to database corruption "
-"due to bugs in the old HSQLDB.\n"
+"Upgrades from 1.103b may fail for some people due to database corruption due to bugs in the old HSQLDB.\n"
 "Unfortunately, we don't know how to fix it.\n"
-"Your alternatives are to start over with a clean database, or stay with "
-"1.103b forever.\n"
+"Your alternatives are to start over with a clean database, or stay with 1.103b forever.\n"
 "Sorry about that."
 msgstr ""
 
@@ -1699,8 +1648,7 @@ msgstr ""
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:30
 msgid ""
 "As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the "
-"latest release."
+"The best way to maintain security and help the network is to run the latest release."
 msgstr ""
 
 #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:57
@@ -1760,6 +1708,8 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:67
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:83
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:87
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:84
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:58
 msgid "Translation updates"
 msgstr ""
 
@@ -1778,19 +1728,15 @@ msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:12
 msgid ""
-"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more "
-"difficult for an attacker\n"
-"to correlate a Destination with a Router. It also fixes character "
-"encoding bugs in susimail,\n"
+"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more difficult for an attacker\n"
+"to correlate a Destination with a Router. It also fixes character encoding bugs in susimail,\n"
 "and includes lots of other bug fixes and translation updates.\n"
-"Most of you will update via torrent, using the new \"su3\" update format "
-"with stronger keys."
+"Most of you will update via torrent, using the new \"su3\" update format with stronger keys."
 msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:19
 msgid ""
-"We recently attended `30C3`__ and `Real World Crypto`__, making several "
-"new\n"
+"We recently attended `30C3`__ and `Real World Crypto`__, making several new\n"
 "connections and formulating `big plans`__ for 2014. Thanks to those who\n"
 "supported our attendance with their `donations`__!"
 msgstr ""
@@ -1801,8 +1747,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:43
 msgid ""
-"Flood netdb stores to new location before midnight to prevent lookup "
-"fails after midnight"
+"Flood netdb stores to new location before midnight to prevent lookup fails "
+"after midnight"
 msgstr ""
 
 #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:44
@@ -1879,24 +1825,19 @@ msgstr ""
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:12
 #, python-format
 msgid ""
-"0.9.11 continues improving LeaseSet lookup and storage to prevent an "
-"attacker\n"
+"0.9.11 continues improving LeaseSet lookup and storage to prevent an attacker\n"
 "from correlating a Destination with a Router. It adds support for the\n"
 "%(orchid)s outproxy plugin which is available at %(url)s. There is a\n"
-"reduction in memory usage due to fixes in the transports. We have some "
-"I2CP\n"
+"reduction in memory usage due to fixes in the transports. We have some I2CP\n"
 "protocol improvements that will provide better lookup facilities and\n"
-"authorization protection for external clients. Of course, there's also "
-"the\n"
+"authorization protection for external clients. Of course, there's also the\n"
 "usual collection of bug fixes. All users should update."
 msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:22
 msgid ""
-"This may be the last release that works with Java 5, which is very old "
-"and\n"
-"unsupported. If you are using a Java 5 or 6 runtime, we strongly "
-"recommend that\n"
+"This may be the last release that works with Java 5, which is very old and\n"
+"unsupported. If you are using a Java 5 or 6 runtime, we strongly recommend that\n"
 "you upgrade to Java 7."
 msgstr ""
 
@@ -1938,13 +1879,12 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:27
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:27
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:39
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:29
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:28
 msgid ""
 "As usual, we recommend that you update to this release. The best way to\n"
 "maintain security and help the network is to run the latest release."
-msgstr ""
-"Ca de obicei, vă recomandăm ca toți utilizatorii să actualizeze la "
-"această versiune. Cel mai bun mod de a ajuta rețeua și a rămâne securizat"
-" este de a rula ultima versiune."
+msgstr "Ca de obicei, vă recomandăm ca toți utilizatorii să actualizeze la această versiune. Cel mai bun mod de a ajuta rețeua și a rămâne securizat este de a rula ultima versiune."
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:40
 msgid "More leaseset handling improvements"
@@ -1976,8 +1916,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:53
 msgid ""
-"Stricter I2CP authorization enforcement of external clients (incompatible"
-" change)"
+"Stricter I2CP authorization enforcement of external clients (incompatible "
+"change)"
 msgstr ""
 
 #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:54
@@ -2001,23 +1941,21 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:9
 msgid ""
-"The site i2pbrowser.net is a fake I2P website mirror serving up malware "
-"for Windows."
+"The site i2pbrowser.net is a fake I2P website mirror serving up malware for "
+"Windows."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:11
 msgid ""
-"We have recently been made aware of the existence of i2pbrowser.net. This"
-"\n"
-"website copies our homepage and download page, and attempts to trick "
-"users into\n"
+"We have recently been made aware of the existence of i2pbrowser.net. This\n"
+"website copies our homepage and download page, and attempts to trick users into\n"
 "downloading Windows malware."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:17
 msgid ""
-"There are several indicators that point to i2pbrowser.net being a malware"
-" site:"
+"There are several indicators that point to i2pbrowser.net being a malware "
+"site:"
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21
@@ -2026,29 +1964,26 @@ msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22
 msgid ""
-"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to "
-"the same .exe file."
+"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to the "
+"same .exe file."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:23
-msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
+msgid ""
+"The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:25
 msgid ""
-"We have not examined the malware ourselves, but it does not appear to be "
-"very\n"
-"sophisticated; it is not integrated into or bundled with the I2P "
-"software.\n"
-"Information security expert `Lance James`__ posted `a tweet`__ labelling "
-"it as\n"
+"We have not examined the malware ourselves, but it does not appear to be very\n"
+"sophisticated; it is not integrated into or bundled with the I2P software.\n"
+"Information security expert `Lance James`__ posted `a tweet`__ labelling it as\n"
 "\"a standard dark comet rat\"."
 msgstr ""
 
 #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:35
 msgid ""
-"Spread the word. The only official download locations for I2P are linked "
-"on our\n"
+"Spread the word. The only official download locations for I2P are linked on our\n"
 "`download page`__. All I2P download packages are GPG-signed by the\n"
 "`release signing key`__."
 msgstr ""
@@ -2069,31 +2004,21 @@ msgstr ""
 #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:12
 msgid ""
 "**Somewhere, NH** -- Internet search company `DuckDuckGo`__ `donates`__\n"
-"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly"
-" open-source\n"
-"donation program. The award was granted on the basis of `nominations`__ "
-"by members of the public\n"
-"on the DuckDuckGo community portal. With an emphasis on privacy, "
-"DuckDuckGo provides a search\n"
-"engine which does not track its users or store personal data. I2P is an "
-"anonymous network intended to\n"
-"protect individuals from dragnet surveillance regularly performed by ISPs"
-" and governments."
+"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly open-source\n"
+"donation program. The award was granted on the basis of `nominations`__ by members of the public\n"
+"on the DuckDuckGo community portal. With an emphasis on privacy, DuckDuckGo provides a search\n"
+"engine which does not track its users or store personal data. I2P is an anonymous network intended to\n"
+"protect individuals from dragnet surveillance regularly performed by ISPs and governments."
 msgstr ""
 
 #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:26
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:46
 msgid ""
-"This marks the single largest donation ever received by I2P and reflects "
-"a growing interest in\n"
-"privacy and security by the Internet community. The funding will help I2P"
-" to reach more users, expand\n"
-"development, and audit the code. It will also enable I2P developers to "
-"attend conferences, such\n"
-"as the `Real-World Cryptography`__ conference in New York City, where the"
-" developers met and\n"
-"collaborated with cryptography experts pursuant to I2P's goals of "
-"providing anonymity to the\n"
+"This marks the single largest donation ever received by I2P and reflects a growing interest in\n"
+"privacy and security by the Internet community. The funding will help I2P to reach more users, expand\n"
+"development, and audit the code. It will also enable I2P developers to attend conferences, such\n"
+"as the `Real-World Cryptography`__ conference in New York City, where the developers met and\n"
+"collaborated with cryptography experts pursuant to I2P's goals of providing anonymity to the\n"
 "public."
 msgstr ""
 
@@ -2124,34 +2049,28 @@ msgstr ""
 msgid ""
 "I2P now requires Java 6 or higher.\n"
 "We strongly recommend that you upgrade to Java 7.\n"
-"If you are still using Java 5, you must upgrade your Java before "
-"installing I2P 0.9.12."
+"If you are still using Java 5, you must upgrade your Java before installing I2P 0.9.12."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:19
 msgid ""
 "0.9.12 adds preliminary support for ECDSA-signed Destinations.\n"
-"It contains several fixes for the handling of Delivery Status Messages "
-"(acknowledgements)\n"
+"It contains several fixes for the handling of Delivery Status Messages (acknowledgements)\n"
 "and those messages are now end-to-end encrypted for increased security."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:24
 msgid ""
 "We have upgraded to Jetty 8.\n"
-"Jetty 8 is almost identical to Jetty 7, so there are no complex "
-"configuration file conversions as there have been in past Jetty upgrades."
-"\n"
+"Jetty 8 is almost identical to Jetty 7, so there are no complex configuration file conversions as there have been in past Jetty upgrades.\n"
 "No manual changes should be necessary."
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:35
 msgid ""
 "In early March, Internet search company `DuckDuckGo`__ `donated`__\n"
-"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly "
-"open-source\n"
-"donation program. The award was granted on the basis of `nominations`__ "
-"by members of the public\n"
+"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly open-source\n"
+"donation program. The award was granted on the basis of `nominations`__ by members of the public\n"
 "on the DuckDuckGo community portal."
 msgstr ""
 
@@ -2206,7 +2125,8 @@ msgid "Jetty 8.1.14.v20131031; Java 6 now required"
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:88
-msgid "Reduce target connection count again to reduce tunnel reject rate further"
+msgid ""
+"Reduce target connection count again to reduce tunnel reject rate further"
 msgstr ""
 
 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:89
@@ -2254,10 +2174,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:13
 msgid ""
-"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, "
-"and a big SusiMail update.\n"
-"Of course, there's also the usual collection of bug fixes and translation"
-" updates."
+"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, and a big SusiMail update.\n"
+"Of course, there's also the usual collection of bug fixes and translation updates."
 msgstr ""
 
 #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:23
@@ -2355,30 +2273,24 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:13
 msgid ""
-"0.9.14 includes critical fixes for XSS and remote execution "
-"vulnerabilities reported by Exodus Intelligence.\n"
-"As an added precaution, we have disabled several advanced configuration "
-"features in the router console,\n"
+"0.9.14 includes critical fixes for XSS and remote execution vulnerabilities reported by Exodus Intelligence.\n"
+"As an added precaution, we have disabled several advanced configuration features in the router console,\n"
 "including installation of new plugins.\n"
 "We plan to re-enable these in a future release after additional review."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:20
 msgid ""
-"Due to I2P library changes, I2P-Bote users must upgrade their plugin to "
-"version 0.2.10 to work with I2P 0.9.14.\n"
-"Your router should update the plugin automatically after the router "
-"restarts."
+"Due to I2P library changes, I2P-Bote users must upgrade their plugin to version 0.2.10 to work with I2P 0.9.14.\n"
+"Your router should update the plugin automatically after the router restarts."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:25
 msgid ""
-"The release also contains several bug fixes in i2ptunnel, i2psnark, and "
-"other areas,\n"
+"The release also contains several bug fixes in i2ptunnel, i2psnark, and other areas,\n"
 "and updates to the latest Jetty, Tomcat, and Wrapper.\n"
 "We've also implemented a faster and more secure method for reseeding.\n"
-"Of course, there's also the usual collection of minor bug fixes and "
-"translation updates."
+"Of course, there's also the usual collection of minor bug fixes and translation updates."
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:32
@@ -2429,14 +2341,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:55
 msgid ""
-"Several i2psnark improvements and fixes (GUI and DHT), including changes "
-"for better compatibility with Vuze"
+"Several i2psnark improvements and fixes (GUI and DHT), including changes for"
+" better compatibility with Vuze"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:60
 msgid ""
-"Reseeding now fetches a signed zip file containing router infos for "
-"security and speed"
+"Reseeding now fetches a signed zip file containing router infos for security"
+" and speed"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:61
@@ -2449,8 +2361,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:63
 msgid ""
-"Per-message reliabilitiy settings in I2CP and error propagation back from"
-" router to client"
+"Per-message reliabilitiy settings in I2CP and error propagation back from "
+"router to client"
 msgstr ""
 
 #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:64
@@ -2482,33 +2394,23 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:13
 msgid ""
-"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some"
-" other web forms.\n"
-"We've restored the ability to install plugins via the console, but you "
-"must first edit your router.config file\n"
-"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the "
-"line routerconsole.enablePluginInstall=true.\n"
-"Other rarely-used advanced features that were removed in 0.9.14 may be "
-"restored by adding the line routerconsole.advanced=true."
+"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some other web forms.\n"
+"We've restored the ability to install plugins via the console, but you must first edit your router.config file\n"
+"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the line routerconsole.enablePluginInstall=true.\n"
+"Other rarely-used advanced features that were removed in 0.9.14 may be restored by adding the line routerconsole.advanced=true."
 msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:20
 msgid ""
-"As usual, if configured with the default \"Download and Verify\", the "
-"router will automatically download the update and display a button to "
-"restart.\n"
-"However, due to a bug in 0.9.14, if your update is configured for "
-"\"Notify only\", the download button will not be displayed.\n"
-"You must change your configuration to \"Download and Verify\" or "
-"\"Download, Verify, and Restart\" to update."
+"As usual, if configured with the default \"Download and Verify\", the router will automatically download the update and display a button to restart.\n"
+"However, due to a bug in 0.9.14, if your update is configured for \"Notify only\", the download button will not be displayed.\n"
+"You must change your configuration to \"Download and Verify\" or \"Download, Verify, and Restart\" to update."
 msgstr ""
 
 #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:26
 msgid ""
-"If you are still running 0.9.13 or older, we recommend that you update to"
-" this release as soon as possible.\n"
-"If you don't often check your router console, please consider changing "
-"your configuration to \"Download, Verify, and Restart\"\n"
+"If you are still running 0.9.13 or older, we recommend that you update to this release as soon as possible.\n"
+"If you don't often check your router console, please consider changing your configuration to \"Download, Verify, and Restart\"\n"
 "to ensure you are always running the latest release."
 msgstr ""
 
@@ -2562,10 +2464,7 @@ msgstr ""
 msgid ""
 "Hello all!\n"
 "\n"
-"Today we announce the Privacy Solutions project, a new organization that "
-"develops and maintains I2P software. Privacy Solutions includes several "
-"new development efforts designed to enhance the privacy, security, and "
-"anonymity for users, based on I2P protocols and technology.\n"
+"Today we announce the Privacy Solutions project, a new organization that develops and maintains I2P software. Privacy Solutions includes several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.\n"
 "\n"
 "These efforts include\n"
 "\n"
@@ -2575,40 +2474,23 @@ msgid ""
 "4) The Anoncoin crypto-coin project.\n"
 "5) The Monero crypto-coin project.\n"
 "\n"
-"Privacy Solutions' initial funding was provided by the supporters of the "
-"Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-"
-"profit type of organization registered within the Norwegian government "
-"registers. ( Kind of like US 501(c)3. )\n"
+"Privacy Solutions' initial funding was provided by the supporters of the Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-profit type of organization registered within the Norwegian government registers. ( Kind of like US 501(c)3. )\n"
 "\n"
-"Privacy Solutions plans to apply for funding from the Norwegian goverment"
-" for network research, because of BigBrother (We'll get back to what that"
-" is) and the coins that are planned to use low-latency networks as "
-"primary transport layer. Our research will support advances in software "
-"technology for anonymity, security, and privacy.\n"
+"Privacy Solutions plans to apply for funding from the Norwegian goverment for network research, because of BigBrother (We'll get back to what that is) and the coins that are planned to use low-latency networks as primary transport layer. Our research will support advances in software technology for anonymity, security, and privacy.\n"
 "\n"
 "\n"
-"First a little bit about the Abscond Browser Bundle. This was first a "
-"one-man project by Meeh, but later on friends started sending patches, "
-"the project is now trying to create the same easy access to I2P as Tor "
-"has with their browser bundle. Our first release isn't far away, it's "
-"just some gitian script tasks left, including setup of the Apple "
-"toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C"
-" struct keeping vital proces information about an process) from the Java "
-"instance to check on I2P before we declare it stable. I2pd will also "
-"switch with the Java version once it's ready, and there is no point in "
-"shipping a JRE in the bundle anymore. You can read more about the Abscond"
-" Browser Bundle at https://hideme.today/dev"
+"First a little bit about the Abscond Browser Bundle. This was first a one-man project by Meeh, but later on friends started sending patches, the project is now trying to create the same easy access to I2P as Tor has with their browser bundle. Our first release isn't far away, it's just some gitian script tasks left, including setup of the Apple toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C struct keeping vital proces information about an process) from the Java instance to check on I2P before we declare it stable. I2pd will also switch with the Java version once it's ready, and there is no point in shipping a JRE in the bundle anymore. You can read more about the Abscond Browser Bundle at https://hideme.today/dev"
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:35
 msgid ""
-"We would also like to inform of the current status of i2pd. I2pd supports"
-" bi-directional streaming now, that allows to use not only HTTP but long-"
-"lived communication channels. Instant IRC support has been added. I2pd "
-"users are able to use it same way as Java I2P for access to I2P IRC "
-"network. I2PTunnel is one of key features of I2P network, allowing non-"
-"I2P applications communicate transparently. That's why it's vital feature"
-" for i2pd and one of key milestones."
+"We would also like to inform of the current status of i2pd. I2pd supports "
+"bi-directional streaming now, that allows to use not only HTTP but long-"
+"lived communication channels. Instant IRC support has been added. I2pd users"
+" are able to use it same way as Java I2P for access to I2P IRC network. "
+"I2PTunnel is one of key features of I2P network, allowing non-I2P "
+"applications communicate transparently. That's why it's vital feature for "
+"i2pd and one of key milestones."
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:39
@@ -2617,18 +2499,17 @@ msgid ""
 "Bigbrother.i2p, which is a metrics system Meeh made over a year back. "
 "Recently we noticed that Meeh actually have 100Gb of non-duplicated data "
 "from nodes reporting in since initial launch. This will also be moved to "
-"Privacy Solutions and be rewritten with a NSPOF backend. With this we "
-"will aslo start using the Graphite ( http://graphite.wikidot.com/screen-"
-"shots ). This will give us a great overview over the network without "
-"privacy issues for our end users. The clients filter all data except "
-"country, router hash and success rate on tunnel buildings. The name of "
-"this service is as always a little joke from Meeh."
+"Privacy Solutions and be rewritten with a NSPOF backend. With this we will "
+"aslo start using the Graphite ( http://graphite.wikidot.com/screen-shots ). "
+"This will give us a great overview over the network without privacy issues "
+"for our end users. The clients filter all data except country, router hash "
+"and success rate on tunnel buildings. The name of this service is as always "
+"a little joke from Meeh."
 msgstr ""
 
 #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:46
 msgid ""
-"We have shorted down a bit of the news here, if you're interested in more"
-" information please visit https://blog.privacysolutions.no/\n"
+"We have shorted down a bit of the news here, if you're interested in more information please visit https://blog.privacysolutions.no/\n"
 "We're still under construction and more content will come!\n"
 "\n"
 "\n"
@@ -2652,67 +2533,50 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:11
 msgid ""
-"I2P Android and Bote have been released on Google Play in Norway, as a "
-"test run for a future worldwide release."
+"I2P Android and Bote have been released on Google Play in Norway, as a test "
+"run for a future worldwide release."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:13
 msgid ""
-"I2P Android has existed for over three years. In that time, it has "
-"evolved from\n"
-"a simple test project into a usable, useful Android port of the I2P "
-"router. Our\n"
-"eventual goal has been to release I2P Android on Google Play, to make it "
-"easier\n"
-"for users to discover, install and use I2P on their Android devices. "
-"After much\n"
-"work improving the user interface, fixing bugs and testing, we think that"
-" I2P\n"
+"I2P Android has existed for over three years. In that time, it has evolved from\n"
+"a simple test project into a usable, useful Android port of the I2P router. Our\n"
+"eventual goal has been to release I2P Android on Google Play, to make it easier\n"
+"for users to discover, install and use I2P on their Android devices. After much\n"
+"work improving the user interface, fixing bugs and testing, we think that I2P\n"
 "Android is finally ready to go where the users are."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:22
 msgid ""
-"Initially, we are only releasing to Android users in Norway, as a test "
-"run. I2P\n"
-"Android will have far more exposure on Google Play than it has ever had "
-"before,\n"
-"and there will be bugs and usability issues that we need to fix. It will "
-"be much\n"
-"easier (and less stressful!) to respond to feedback if we only need to "
-"deal with\n"
-"reports from hundreds of users instead of thousands (already orders of "
-"magnitude\n"
+"Initially, we are only releasing to Android users in Norway, as a test run. I2P\n"
+"Android will have far more exposure on Google Play than it has ever had before,\n"
+"and there will be bugs and usability issues that we need to fix. It will be much\n"
+"easier (and less stressful!) to respond to feedback if we only need to deal with\n"
+"reports from hundreds of users instead of thousands (already orders of magnitude\n"
 "more feedback than we have ever had)."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:31
 msgid ""
-"Simultaneously we are making the first public release of Bote, an Android"
-" port\n"
-"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. "
-"It runs\n"
-"on top of the I2P network, and while it works as a standalone app, it "
-"will use\n"
+"Simultaneously we are making the first public release of Bote, an Android port\n"
+"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. It runs\n"
+"on top of the I2P network, and while it works as a standalone app, it will use\n"
 "the I2P Android app by default if installed. As with I2P Android, we are\n"
 "initially only releasing Bote to Android users in Norway."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:41
 msgid ""
-"The apps are being released on Google Play by `The Privacy Solutions "
-"Project`__.\n"
-"See their `blog post`__ for further information, and links to the Google "
-"Play\n"
+"The apps are being released on Google Play by `The Privacy Solutions Project`__.\n"
+"See their `blog post`__ for further information, and links to the Google Play\n"
 "page for Norway users."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:50
 msgid ""
-"As lead developer for I2P Android and Bote, I look forward to your "
-"comments. You\n"
-"are the people who will be using them, and your perspectives will help me"
-" craft\n"
+"As lead developer for I2P Android and Bote, I look forward to your comments. You\n"
+"are the people who will be using them, and your perspectives will help me craft\n"
 "simple, intuitive apps that make privacy accessible to everyone."
 msgstr ""
 
@@ -2722,28 +2586,22 @@ msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:59
 msgid ""
-"We have also updated I2P Android on the website to match the release "
-"candidate\n"
-"deployed in Norway. This version will be updated with changes as we "
-"respond to\n"
+"We have also updated I2P Android on the website to match the release candidate\n"
+"deployed in Norway. This version will be updated with changes as we respond to\n"
 "feedback from Norwegian users, heading towards our next stable release."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:65
 msgid ""
-"Please note that we have upgraded the Android API to 9. This means that "
-"Froyo\n"
-"Android 2.2 will not be supported anymore; the minimum requirement is now"
-"\n"
+"Please note that we have upgraded the Android API to 9. This means that Froyo\n"
+"Android 2.2 will not be supported anymore; the minimum requirement is now\n"
 "Gingerbread Android 2.3."
 msgstr ""
 
 #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:71
 msgid ""
-"Also note that if you have an earlier version of I2P Android, you will "
-"need to\n"
-"uninstall and reinstall because we have changed the release keys. Further"
-"\n"
+"Also note that if you have an earlier version of I2P Android, you will need to\n"
+"uninstall and reinstall because we have changed the release keys. Further\n"
 "information about this will be provided in a subsequent blog post."
 msgstr ""
 
@@ -2761,31 +2619,23 @@ msgstr ""
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:13
 msgid ""
 "0.9.15 adds preliminary support for Ed25519 EdDSA signatures.\n"
-"It includes a new persistent configuration backend for i2psnark and fixes"
-" several issues with i2psnark's handling of file names.\n"
+"It includes a new persistent configuration backend for i2psnark and fixes several issues with i2psnark's handling of file names.\n"
 "There are several improvements to speed up SAM.\n"
 "Plugins now support stronger signatures in the su3 file format.\n"
-"Plugin installation via the console, which was disabled in 0.9.14, is re-"
-"enabled."
+"Plugin installation via the console, which was disabled in 0.9.14, is re-enabled."
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:21
 msgid ""
-"We have supported ECDSA signatures since 0.9.12, and we would like to "
-"start using ECDSA by default.\n"
-"Unfortunately, some of you are still running older I2P versions, and for "
-"others,\n"
+"We have supported ECDSA signatures since 0.9.12, and we would like to start using ECDSA by default.\n"
+"Unfortunately, some of you are still running older I2P versions, and for others,\n"
 "their distribution or Java runtime does not support ECDSA. Red Hat\n"
 "(RHEL, Fedora) distributions are reported to be missing ECDSA.\n"
 "Some have fixed the Java issues by upgrading from Java 6 to Java 7;\n"
-"others have had success with installing the \"unlimited strength policy "
-"files\".\n"
-"We've added information about missing crypto to the log file and the "
-"/logs page in the console.\n"
-"After you update to 0.9.15, please check if you are missing ECDSA "
-"support, and attempt to fix it if necessary.\n"
-"This is particularly important for those that run popular eepsites and "
-"services."
+"others have had success with installing the \"unlimited strength policy files\".\n"
+"We've added information about missing crypto to the log file and the /logs page in the console.\n"
+"After you update to 0.9.15, please check if you are missing ECDSA support, and attempt to fix it if necessary.\n"
+"This is particularly important for those that run popular eepsites and services."
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:42
@@ -2822,6 +2672,8 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:35
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:35
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:47
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:37
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:36
 msgid "Changes"
 msgstr "Schimbări"
 
@@ -2893,8 +2745,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:68
 msgid ""
-"i2ptunnel add support for local SSL connections for standard and IRC "
-"client tunnels"
+"i2ptunnel add support for local SSL connections for standard and IRC client "
+"tunnels"
 msgstr ""
 
 #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:69
@@ -2931,26 +2783,21 @@ msgid ""
 "0.9.16 is a significant step forward in our plan to migrate\n"
 "from DSA to ECDSA and then EdDSA cryptographic signatures,\n"
 "and makes several other changes to increase your anonymity and security.\n"
-"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures"
-" by default.\n"
-"In addition, we've fixed a large number of serious bugs, including "
-"console lockups."
+"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures by default.\n"
+"In addition, we've fixed a large number of serious bugs, including console lockups."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:21
 msgid ""
-"Changes in router data structures will require i2pcontrol plugin users to"
-" update to version 0.0.9."
+"Changes in router data structures will require i2pcontrol plugin users to "
+"update to version 0.0.9."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:25
 msgid ""
-"If you run an eepsite or a service and you are not running a recent "
-"release,\n"
-"or your Java or OS does not support ECDSA (as noted in the logs and on "
-"the /logs page in the console),\n"
-"please fix the issue as soon as possible or your users will soon be "
-"unable to connect."
+"If you run an eepsite or a service and you are not running a recent release,\n"
+"or your Java or OS does not support ECDSA (as noted in the logs and on the /logs page in the console),\n"
+"please fix the issue as soon as possible or your users will soon be unable to connect."
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:42
@@ -2963,8 +2810,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:44
 msgid ""
-"Require I2CP authorization for all messages when enabled (requires 0.9.11"
-" or higher client)"
+"Require I2CP authorization for all messages when enabled (requires 0.9.11 or"
+" higher client)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:45
@@ -2983,8 +2830,8 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:48
 msgid ""
-"New column sorting, set-all priority buttons, and upload ratio display in"
-" i2psnark"
+"New column sorting, set-all priority buttons, and upload ratio display in "
+"i2psnark"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:49
@@ -3045,14 +2892,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:71
 msgid ""
-"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol"
-" plugin)"
+"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol "
+"plugin)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:72
 msgid ""
-"New router keys now stored in router.keys.dat (eepPriv.dat format) "
-"instead of router.keys"
+"New router keys now stored in router.keys.dat (eepPriv.dat format) instead "
+"of router.keys"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:73
@@ -3087,8 +2934,7 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:80
 msgid ""
-"Change eepsite Jetty threadpool and queue configuration (new installs "
-"only)"
+"Change eepsite Jetty threadpool and queue configuration (new installs only)"
 msgstr ""
 
 #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:81
@@ -3108,39 +2954,34 @@ msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:13
 msgid ""
-"0.9.17 is primarily a bugfix release, but it also continues our migration"
-" to stronger cryptographic signatures."
+"0.9.17 is primarily a bugfix release, but it also continues our migration to"
+" stronger cryptographic signatures."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:17
 msgid ""
-"We have moved the news feed system used for the news on your console and "
-"the latest router version indication\n"
+"We have moved the news feed system used for the news on your console and the latest router version indication\n"
 "to a signed format using RSA 4096-bit keys for enhanced security."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:22
 msgid ""
-"New eepsites and servers will be ECDSA-signed by default, if ECDSA is "
-"available.\n"
+"New eepsites and servers will be ECDSA-signed by default, if ECDSA is available.\n"
 "There is now a warning in the console sidebar if ECDSA is not available.\n"
-"For RedHat users, we have reports of successful installs of the "
-"BouncyCastle Provider (bcprov) jar to add ECDSA support."
+"For RedHat users, we have reports of successful installs of the BouncyCastle Provider (bcprov) jar to add ECDSA support."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:28
 msgid ""
-"We've fixed several serious bugs, including an SSU packet corruption "
-"problem,\n"
+"We've fixed several serious bugs, including an SSU packet corruption problem,\n"
 "and a SAM bug affecting i2p-messenger and other SAM applications.\n"
-"There are several fixes for the preliminary ECDSA router signatures added"
-" in the last release but not yet enabled."
+"There are several fixes for the preliminary ECDSA router signatures added in the last release but not yet enabled."
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:34
 msgid ""
-"Many of us will be attending 31C3 in Hamburg in December. Stop by our "
-"table and say hi!"
+"Many of us will be attending 31C3 in Hamburg in December. Stop by our table "
+"and say hi!"
 msgstr ""
 
 #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:49
@@ -3240,16 +3081,14 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:11
 msgid ""
-"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google"
-" Play and F-Droid."
+"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google "
+"Play and F-Droid."
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:13
 msgid ""
-"It has been some time since I last posted updates about our Android "
-"development,\n"
-"and several I2P releases have gone by without any matching Android "
-"releases.\n"
+"It has been some time since I last posted updates about our Android development,\n"
+"and several I2P releases have gone by without any matching Android releases.\n"
 "At last, the wait is over!"
 msgstr ""
 
@@ -3261,47 +3100,31 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:24
 msgid ""
-"New versions of I2P Android and Bote have been released! They can be "
-"downloaded\n"
+"New versions of I2P Android and Bote have been released! They can be downloaded\n"
 "from these URLs:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:35
 msgid ""
-"The main change in these releases is the transition to Android's new "
-"Material\n"
-"design system. Material has made it much easier for app developers with, "
-"shall\n"
-"we say, \"minimalist\" design skills (like myself) to create apps that "
-"are nicer\n"
-"to use. I2P Android also updates its underlying I2P router to the just-"
-"released\n"
-"version 0.9.17. Bote brings in several new features along with many "
-"smaller\n"
-"improvements; for example, you can now add new email destinations via QR "
-"codes."
+"The main change in these releases is the transition to Android's new Material\n"
+"design system. Material has made it much easier for app developers with, shall\n"
+"we say, \"minimalist\" design skills (like myself) to create apps that are nicer\n"
+"to use. I2P Android also updates its underlying I2P router to the just-released\n"
+"version 0.9.17. Bote brings in several new features along with many smaller\n"
+"improvements; for example, you can now add new email destinations via QR codes."
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:44
 msgid ""
-"As I mentioned in `my last update`__, the release key that signs the apps"
-" has\n"
-"changed. The reason for this was because we needed to change the package "
-"name\n"
-"of I2P Android. The old package name (``net.i2p.android.router``) had "
-"already\n"
-"been taken on Google Play (we still don't know who was using it), and we "
-"wanted\n"
-"to use the same package name and signing key for all distributions of I2P"
-"\n"
-"Android. Doing so means that a user could initially install the app from "
-"the I2P\n"
-"website, and then later if the website was blocked they could upgrade it "
-"using\n"
-"Google Play. Android OS considers an application to be completely "
-"different when\n"
-"its package name changes, so we took the opportunity to increase the "
-"strength of\n"
+"As I mentioned in `my last update`__, the release key that signs the apps has\n"
+"changed. The reason for this was because we needed to change the package name\n"
+"of I2P Android. The old package name (``net.i2p.android.router``) had already\n"
+"been taken on Google Play (we still don't know who was using it), and we wanted\n"
+"to use the same package name and signing key for all distributions of I2P\n"
+"Android. Doing so means that a user could initially install the app from the I2P\n"
+"website, and then later if the website was blocked they could upgrade it using\n"
+"Google Play. Android OS considers an application to be completely different when\n"
+"its package name changes, so we took the opportunity to increase the strength of\n"
 "the signing key."
 msgstr ""
 
@@ -3317,25 +3140,18 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:73
 msgid ""
-"A few months ago we `released`__ both I2P Android and Bote on Google Play"
-" in\n"
-"Norway, to test the release process there. We are pleased to announce "
-"that both\n"
-"apps are now being released globally by `Privacy Solutions`__. The apps "
-"can be\n"
+"A few months ago we `released`__ both I2P Android and Bote on Google Play in\n"
+"Norway, to test the release process there. We are pleased to announce that both\n"
+"apps are now being released globally by `Privacy Solutions`__. The apps can be\n"
 "found at these URLs:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:89
 msgid ""
-"The global release is being done in several stages, starting with the "
-"countries\n"
-"for which we have translations. The notable exception to this is France; "
-"due to\n"
-"import regulations on cryptographic code, we are unable yet to distribute"
-" these\n"
-"apps on Google Play France. This is the same issue that has affected "
-"other apps\n"
+"The global release is being done in several stages, starting with the countries\n"
+"for which we have translations. The notable exception to this is France; due to\n"
+"import regulations on cryptographic code, we are unable yet to distribute these\n"
+"apps on Google Play France. This is the same issue that has affected other apps\n"
 "like TextSecure and Orbot."
 msgstr ""
 
@@ -3347,39 +3163,28 @@ msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:103
 msgid ""
-"Don't think we have forgotten about you, F-Droid users! In addition to "
-"the two\n"
-"locations above, we have set up our own F-Droid repository. If you are "
-"reading\n"
-"this post on your phone, `click here`__ to add it to F-Droid (this only "
-"works in\n"
-"some Android browsers). Or, you can manually add the URL below to your "
-"F-Droid\n"
+"Don't think we have forgotten about you, F-Droid users! In addition to the two\n"
+"locations above, we have set up our own F-Droid repository. If you are reading\n"
+"this post on your phone, `click here`__ to add it to F-Droid (this only works in\n"
+"some Android browsers). Or, you can manually add the URL below to your F-Droid\n"
 "repository list:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:115
 msgid ""
-"If you would like to manually verify the fingerprint (SHA-256) of the "
-"repository\n"
+"If you would like to manually verify the fingerprint (SHA-256) of the repository\n"
 "signing key, or type it in when adding the repository, here it is:"
 msgstr ""
 
 #: i2p2www/blog/2014/12/01/Android-app-releases.rst:124
 msgid ""
-"Unfortunately the I2P app in the main F-Droid repository has not been "
-"updated\n"
-"because our F-Droid maintainer has disappeared. We hope that by "
-"maintaining this\n"
+"Unfortunately the I2P app in the main F-Droid repository has not been updated\n"
+"because our F-Droid maintainer has disappeared. We hope that by maintaining this\n"
 "binary repository, we can better support our F-Droid users and keep them\n"
-"up-to-date. If you have already installed I2P from the main F-Droid "
-"repository,\n"
-"you will need to uninstall it if you want to upgrade, because the signing"
-" key\n"
-"will be different. The apps in our F-Droid repository are the same APKs "
-"that are\n"
-"provided on our website and on Google Play, so in future you will be able"
-" to\n"
+"up-to-date. If you have already installed I2P from the main F-Droid repository,\n"
+"you will need to uninstall it if you want to upgrade, because the signing key\n"
+"will be different. The apps in our F-Droid repository are the same APKs that are\n"
+"provided on our website and on Google Play, so in future you will be able to\n"
 "upgrade using any of these sources."
 msgstr ""
 
@@ -3398,25 +3203,18 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:21
 msgid ""
-"We were, for the second year in a row, at a great location in the "
-"Congress, in\n"
-"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square "
-"has\n"
-"really increased our visibility and helped many people find us. Thanks to"
-" Noisy\n"
+"We were, for the second year in a row, at a great location in the Congress, in\n"
+"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square has\n"
+"really increased our visibility and helped many people find us. Thanks to Noisy\n"
 "Square and the 31C3 organizers for a great Congress."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:30
 msgid ""
-"We also thank Gabriel Weinberg and his fabulous search engine "
-"`DuckDuckGo`__ for\n"
-"their support of open source anonymity tools and their `generous "
-"contribution`__\n"
-"to I2P in 2014. Funding from DuckDuckGo and others helped support our "
-"attendance\n"
-"at CCC. This is the primary annual meetup for I2P developers and it is "
-"critical\n"
+"We also thank Gabriel Weinberg and his fabulous search engine `DuckDuckGo`__ for\n"
+"their support of open source anonymity tools and their `generous contribution`__\n"
+"to I2P in 2014. Funding from DuckDuckGo and others helped support our attendance\n"
+"at CCC. This is the primary annual meetup for I2P developers and it is critical\n"
 "to our success."
 msgstr ""
 
@@ -3428,127 +3226,88 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:49
 msgid ""
-"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved "
-"himself\n"
-"and the project from TU Munich to `Inria`__ in France. He has a large "
-"number of\n"
-"`open positions`__. This is a great opportunity to get paid to work on "
-"open\n"
+"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved himself\n"
+"and the project from TU Munich to `Inria`__ in France. He has a large number of\n"
+"`open positions`__. This is a great opportunity to get paid to work on open\n"
 "source anonymity tools, we encourage everybody to contact him about it."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:60
 msgid ""
-"The prospect of an invigorated GNUnet with a large amount of new funding "
-"is\n"
-"quite interesting. We discussed more ways to work together. In early "
-"2014, we\n"
-"worked hard to understand the GnuNet DNS replacement, but we were unable "
-"to\n"
-"figure out a good fit for it in I2P. One of his new ideas is a "
-"distributed,\n"
-"anonymous statistics gathering subsystem, for detecting problems or "
-"attacks on\n"
+"The prospect of an invigorated GNUnet with a large amount of new funding is\n"
+"quite interesting. We discussed more ways to work together. In early 2014, we\n"
+"worked hard to understand the GnuNet DNS replacement, but we were unable to\n"
+"figure out a good fit for it in I2P. One of his new ideas is a distributed,\n"
+"anonymous statistics gathering subsystem, for detecting problems or attacks on\n"
 "the network. We'd definitely be interested in that."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:69
 msgid ""
-"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems "
-"draft`__.\n"
-"A new, greatly simplified version 3 was posted in December. The prospects"
-" for\n"
+"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems draft`__.\n"
+"A new, greatly simplified version 3 was posted in December. The prospects for\n"
 "approval remain unclear. The best way to monitor or participate in the\n"
-"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to "
-"do so\n"
+"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to do so\n"
 "on our side, and also give Hellekin a new point-of-contact for this topic."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:80
 msgid ""
-"We apologized to Christian for not being organized enough to have a talk "
-"at his\n"
-"`We Fix The Net assembly`__. One of our biggest failures as a project is "
-"our\n"
-"seeming inability to submit talks at conferences. We'll have to do better"
-" in the\n"
+"We apologized to Christian for not being organized enough to have a talk at his\n"
+"`We Fix The Net assembly`__. One of our biggest failures as a project is our\n"
+"seeming inability to submit talks at conferences. We'll have to do better in the\n"
 "new year."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:92
 msgid ""
-"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in "
-"with\n"
-"other anonymity tools into this new Debian \"superpackage\" of some sort,"
-" and\n"
-"would love to get I2P into Debian in 2015. He claims the process is now "
-"easy,\n"
+"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in with\n"
+"other anonymity tools into this new Debian \"superpackage\" of some sort, and\n"
+"would love to get I2P into Debian in 2015. He claims the process is now easy,\n"
 "just `follow the instructions`__. We said that's funny, we've been\n"
 "`stuck in the process for over 7 years`__."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:103
 msgid ""
-"He said, well, try the new process, it works great, should be no problem "
-"at all\n"
-"if your package is in good shape. The people in Debian that run this "
-"process are\n"
-"eager volunteers who want nothing more than to get more packages in. We "
-"said our\n"
-"package is indeed in fantastic shape, and we would try out the new "
-"process as\n"
-"soon as possible. If all this is true, we will be in the next Debian "
-"release in\n"
+"He said, well, try the new process, it works great, should be no problem at all\n"
+"if your package is in good shape. The people in Debian that run this process are\n"
+"eager volunteers who want nothing more than to get more packages in. We said our\n"
+"package is indeed in fantastic shape, and we would try out the new process as\n"
+"soon as possible. If all this is true, we will be in the next Debian release in\n"
 "late 2015. This would be very very cool."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:115
 msgid ""
-"We had a nice discussion with BitingBird of Tails. They are very happy "
-"with our\n"
-"rapid response to the `vulnerability disclosure`__ last summer, resulting"
-" in our\n"
-"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and "
-"they\n"
-"took `great offense`__ to that and the lack of private notification. We "
-"thanked\n"
+"We had a nice discussion with BitingBird of Tails. They are very happy with our\n"
+"rapid response to the `vulnerability disclosure`__ last summer, resulting in our\n"
+"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and they\n"
+"took `great offense`__ to that and the lack of private notification. We thanked\n"
 "them for taking the heat and fighting back."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:127
 msgid ""
-"BitingBird also handles support, and she tells us the number one issue is"
-" how\n"
-"long I2P takes to start up and be useful for browsing I2P sites. Her "
-"standard\n"
-"answer is \"wait ten more minutes\" and that seems to be effective. I2P "
-"is\n"
-"particularly slow to startup on Tails since it does not persist peer data"
-" by\n"
-"default. It would be nice to change that, but there's also things we can "
-"do on\n"
-"the I2P side to make things start faster. Expect some improvement in our "
-"0.9.18\n"
+"BitingBird also handles support, and she tells us the number one issue is how\n"
+"long I2P takes to start up and be useful for browsing I2P sites. Her standard\n"
+"answer is \"wait ten more minutes\" and that seems to be effective. I2P is\n"
+"particularly slow to startup on Tails since it does not persist peer data by\n"
+"default. It would be nice to change that, but there's also things we can do on\n"
+"the I2P side to make things start faster. Expect some improvement in our 0.9.18\n"
 "release."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:140
 msgid ""
-"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The "
-"upcoming\n"
-"Tor Hidden Services changes mean that their keys will no longer fit into "
-"a\n"
-"portion of an IPv6 address, and he was working on a solution. We reminded"
-" him\n"
-"that this has always been the case for I2P (with \"GarliCat\"), that it's"
-" not a\n"
-"new problem. He pointed us to `a presentation`__ of his proposal. It "
-"involves\n"
+"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The upcoming\n"
+"Tor Hidden Services changes mean that their keys will no longer fit into a\n"
+"portion of an IPv6 address, and he was working on a solution. We reminded him\n"
+"that this has always been the case for I2P (with \"GarliCat\"), that it's not a\n"
+"new problem. He pointed us to `a presentation`__ of his proposal. It involves\n"
 "storing an extra record in the hidden service directory (equivalent of a\n"
-"leaseset I2P's network database). It wasn't completely clear how this "
-"would\n"
-"work, or if we would consider it abuse of the netDb. We'll follow up with"
-" him\n"
+"leaseset I2P's network database). It wasn't completely clear how this would\n"
+"work, or if we would consider it abuse of the netDb. We'll follow up with him\n"
 "as he gets further."
 msgstr ""
 
@@ -3560,23 +3319,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:160
 msgid ""
-"We spent hours and hours explaining I2P to people stopping by our table. "
-"Some\n"
-"had heard of I2P before, some had not; everybody had heard of Tor and had"
-" at\n"
-"least a vague idea of what hidden services are. As usual, introducing "
-"people to\n"
-"I2P was a struggle. By the end of the Congress, we became convinced that "
-"a part\n"
-"of the problem was a difference in terminology. Back 12 years ago, when "
-"I2P and\n"
-"Tor were both getting started, we each came up with terms for the various"
-" parts\n"
+"We spent hours and hours explaining I2P to people stopping by our table. Some\n"
+"had heard of I2P before, some had not; everybody had heard of Tor and had at\n"
+"least a vague idea of what hidden services are. As usual, introducing people to\n"
+"I2P was a struggle. By the end of the Congress, we became convinced that a part\n"
+"of the problem was a difference in terminology. Back 12 years ago, when I2P and\n"
+"Tor were both getting started, we each came up with terms for the various parts\n"
 "of our systems. Today, the Tor terminology such as \"hidden service\" is\n"
-"well-understood and commonplace. The I2P terminology such as \"eepsite\" "
-"is\n"
-"neither. We agreed to review our documentation, router console, and other"
-" places\n"
+"well-understood and commonplace. The I2P terminology such as \"eepsite\" is\n"
+"neither. We agreed to review our documentation, router console, and other places\n"
 "for opportunities to simplify it and use common terms."
 msgstr ""
 
@@ -3595,66 +3346,65 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:182
 msgid ""
-"* *Toronto meetup:* CCC is such a productive time for us, and it seems "
-"that a second meetup in the year would be quite helpful. We have proposed"
-" it for August 2015 in Toronto, Canada, in conjunction with `Toronto "
-"Crypto`__. It would include developer meetings together with "
-"presentations and tutorials, all open to the public. We are attempting to"
-" gauge interest and research possible venues. If you are considering "
-"attending, please let us know by `tweeting @i2p`__ or posting `on the dev"
-" forum thread`__."
+"* *Toronto meetup:* CCC is such a productive time for us, and it seems that "
+"a second meetup in the year would be quite helpful. We have proposed it for "
+"August 2015 in Toronto, Canada, in conjunction with `Toronto Crypto`__. It "
+"would include developer meetings together with presentations and tutorials, "
+"all open to the public. We are attempting to gauge interest and research "
+"possible venues. If you are considering attending, please let us know by "
+"`tweeting @i2p`__ or posting `on the dev forum thread`__."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:190
 msgid ""
-"* We discussed Meeh's workload and the state of the various services he "
-"is running. We made some plans to reduce his load and have some other "
-"people help out."
+"* We discussed Meeh's workload and the state of the various services he is "
+"running. We made some plans to reduce his load and have some other people "
+"help out."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:194
 msgid ""
-"* We reviewed our critieria for placing links to `i2pd`__ on our download"
-" page.  We agreed that the only remaining item is to have a nice page on "
-"the `Privacy Solutions web site`__ or elsewhere with binary packages for "
+"* We reviewed our critieria for placing links to `i2pd`__ on our download "
+"page.  We agreed that the only remaining item is to have a nice page on the "
+"`Privacy Solutions web site`__ or elsewhere with binary packages for "
 "Windows, Linux, and Mac, and source packages. It's not clear who is "
-"responsible for building the packages and where the \"official\" version "
-"is. Once there's an established process for building and signing packages"
-" and an official place to put them, we're ready to link to it. If it is "
-"not feasible to host it on the Privacy Solutions website, we will discuss"
-" alternatives with orignal, including possible migration to our download "
+"responsible for building the packages and where the \"official\" version is."
+" Once there's an established process for building and signing packages and "
+"an official place to put them, we're ready to link to it. If it is not "
+"feasible to host it on the Privacy Solutions website, we will discuss "
+"alternatives with orignal, including possible migration to our download "
 "servers."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:201
 msgid ""
-"* Lots of people coming by the table asked if we had a non-Java version. "
-"It was great to finally answer \"yes\" and we're eager to get the word "
-"out and get more users, testers, and developers on it."
+"* Lots of people coming by the table asked if we had a non-Java version. It "
+"was great to finally answer \"yes\" and we're eager to get the word out and "
+"get more users, testers, and developers on it."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:205
 msgid ""
-"* `Vuze`__ continues to make good progress on their I2P integration. We "
-"look forward to working with them in the new year on a managed rollout to"
-" more users."
+"* `Vuze`__ continues to make good progress on their I2P integration. We look"
+" forward to working with them in the new year on a managed rollout to more "
+"users."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:211
 msgid ""
 "* We discussed the state of Meeh's and Sindu's reseed servers. They made "
-"several improvements while at the congress and are investigating "
-"migration to `Matt Drollette's Go implementation`__. The security and "
-"reliability of our reseed servers is vital to new users and network "
-"operation. `User 'backup'`__ is doing a great job monitoring and managing"
-" the pool of reseed servers."
+"several improvements while at the congress and are investigating migration "
+"to `Matt Drollette's Go implementation`__. The security and reliability of "
+"our reseed servers is vital to new users and network operation. `User "
+"'backup'`__ is doing a great job monitoring and managing the pool of reseed "
+"servers."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:218
 msgid ""
-"* We agreed to purchase a second root server for development, testing, "
-"and services. Echelon will be adminstering it. Contact him if you would "
-"like a VM."
+"* We agreed to purchase a second root server for development, testing, and "
+"services. Echelon will be adminstering it. Contact him if you would like a "
+"VM."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:222
@@ -3665,26 +3415,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:226
 msgid ""
-"* We met with Welterde about the state of his services including his "
-"`open tracker`__. These services are not being adequately maintained and "
-"will soon become inaccessible due to crypto changes if they are not "
-"upgraded. He committed to upgrading them soon."
+"* We met with Welterde about the state of his services including his `open "
+"tracker`__. These services are not being adequately maintained and will soon"
+" become inaccessible due to crypto changes if they are not upgraded. He "
+"committed to upgrading them soon."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:232
 msgid ""
-"* We met lots of people interested in our `Android app`__. We passed "
-"several ideas and bug reports back to str4d. We plan to make a big push "
-"to give the app some development love early in the year."
+"* We met lots of people interested in our `Android app`__. We passed several"
+" ideas and bug reports back to str4d. We plan to make a big push to give the"
+" app some development love early in the year."
 msgstr ""
 
 #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:238
 msgid ""
-"* Regrettably, we didn't get to see too many talks at the Congress, as we"
-" were so busy meeting with people. We plan to catch up and `watch them "
-"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and"
-" Jacob's talk was great. We hear that the cryptography talks were good as"
-" well."
+"* Regrettably, we didn't get to see too many talks at the Congress, as we "
+"were so busy meeting with people. We plan to catch up and `watch them "
+"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and "
+"Jacob's talk was great. We hear that the cryptography talks were good as "
+"well."
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:1
@@ -3701,13 +3451,11 @@ msgstr ""
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:13
 msgid ""
 "0.9.18 contains several bug fixes and performance improvements.\n"
-"We have shortened the startup time, and reduced latency throughout our "
-"network protocols.\n"
+"We have shortened the startup time, and reduced latency throughout our network protocols.\n"
 "We've increased the default connection limits for the fastest routers,\n"
 "and reduced the thread usage in i2ptunnel.\n"
 "UPnP fixes should improve handling of external device changes.\n"
-"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP "
-"fixes."
+"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP fixes."
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:33
@@ -3715,7 +3463,8 @@ msgid "Fix parsing of ECDSA address helper in HTTP client proxy"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:34
-msgid "Fix news last-modified processing which prevented notification of update"
+msgid ""
+"Fix news last-modified processing which prevented notification of update"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:35
@@ -3752,8 +3501,7 @@ msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:46
 msgid ""
-"Add startup browser configuration with advanced config "
-"routerconsole.browser"
+"Add startup browser configuration with advanced config routerconsole.browser"
 msgstr ""
 
 #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:47
@@ -3815,21 +3563,16 @@ msgstr ""
 msgid ""
 "0.9.19 has several fixes and improvements for floodfill performance.\n"
 "Many of you saw high CPU usage after 0.9.18 was released.\n"
-"This was caused by a combination of increased encryption usage, the big "
-"influx of Vuze users into the network,\n"
-"reduced floodfills due to tighter performance requirements, and some "
-"longstanding bugs.\n"
+"This was caused by a combination of increased encryption usage, the big influx of Vuze users into the network,\n"
+"reduced floodfills due to tighter performance requirements, and some longstanding bugs.\n"
 "Things should be a lot better after most of the network has updated.\n"
-"As always, the best way to reduce CPU usage is to lower your bandwidth "
-"limits."
+"As always, the best way to reduce CPU usage is to lower your bandwidth limits."
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:21
 msgid ""
-"We've also added new ways to reseed manually, and to generate a reseed "
-"file you can easily share with others who need it.\n"
-"See the reseed configuration page in the router console for more "
-"information."
+"We've also added new ways to reseed manually, and to generate a reseed file you can easily share with others who need it.\n"
+"See the reseed configuration page in the router console for more information."
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:35
@@ -3895,7 +3638,8 @@ msgid "Increase min and default bandwidth for i2psnark"
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:58
-msgid "Improved strategies for dropping jobs on high job lag to prevent overload"
+msgid ""
+"Improved strategies for dropping jobs on high job lag to prevent overload"
 msgstr ""
 
 #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:59
@@ -3935,37 +3679,28 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:13
 msgid ""
-"0.9.20 contains many important bug fixes, and several changes to increase"
-" floodfill capacity in the network."
-msgstr ""
-"0.9.20 conţine multe remedieri importate de erori şi câteva schimbări "
-"pentru a creşte capacitatea de adăugare în reţea."
+"0.9.20 contains many important bug fixes, and several changes to increase "
+"floodfill capacity in the network."
+msgstr "0.9.20 conţine multe remedieri importate de erori şi câteva schimbări pentru a creşte capacitatea de adăugare în reţea."
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:17
 msgid ""
-"Routers configured for 32-64 KB of shared bandwidth may now become "
-"floodfill,\n"
-"and routers configured for 512 KB or more of shared bandwidth will have "
-"higher connection limits.\n"
+"Routers configured for 32-64 KB of shared bandwidth may now become floodfill,\n"
+"and routers configured for 512 KB or more of shared bandwidth will have higher connection limits.\n"
 "These changes may cause your router to use more resources.\n"
-"If the router becomes too busy, the best way to reduce usage is to lower "
-"the bandwidth settings in your console.\n"
-"If that doesn't help, you may now disable automatic floodfill on the "
-"advanced configuration page in the console."
+"If the router becomes too busy, the best way to reduce usage is to lower the bandwidth settings in your console.\n"
+"If that doesn't help, you may now disable automatic floodfill on the advanced configuration page in the console."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:25
 msgid ""
-"We're hopeful that these changes will increase network capacity and "
-"performance,\n"
-"and reduce the congestion that's been affecting the network the last "
-"three months."
+"We're hopeful that these changes will increase network capacity and performance,\n"
+"and reduce the congestion that's been affecting the network the last three months."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:35
 msgid ""
-"Finally, we're excited to announce our first-ever I2P meetup, in Toronto "
-"August 15-16.\n"
+"Finally, we're excited to announce our first-ever I2P meetup, in Toronto August 15-16.\n"
 "There will be lots of presentations and tutorials. All are welcome.\n"
 "For more information, see the `announcement`_."
 msgstr ""
@@ -3984,8 +3719,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:53
 msgid ""
-"Raise connection limits for new classes 'P' (512-2000 KBps share "
-"bandwidth) and 'X' (over 2000 KBps)"
+"Raise connection limits for new classes 'P' (512-2000 KBps share bandwidth) "
+"and 'X' (over 2000 KBps)"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:54
@@ -3997,7 +3732,8 @@ msgid "Clock skew fixes"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:62
-msgid "Fixes and configuration for when IPv4 is firewalled but IPv6 still works"
+msgid ""
+"Fixes and configuration for when IPv4 is firewalled but IPv6 still works"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:63
@@ -4070,8 +3806,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:86
 msgid ""
-"Add Bloom filter warning when configured for high bandwidth but not "
-"enough memory"
+"Add Bloom filter warning when configured for high bandwidth but not enough "
+"memory"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:87
@@ -4084,8 +3820,7 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:89
 msgid ""
-"Better error handling and user feedback when HTTP client tunnel is "
-"disabled"
+"Better error handling and user feedback when HTTP client tunnel is disabled"
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:90
@@ -4118,19 +3853,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:13
 msgid ""
-"The I2P team is proud to announce that we are going to host a meetup in "
-"Toronto on August 15-16.\n"
-"A number of members of our community will be attending and are going to "
-"host talks, workshops and discussions about and relating to I2P. This "
-"event is not just for I2P people though, it's meant for everyone."
+"The I2P team is proud to announce that we are going to host a meetup in Toronto on August 15-16.\n"
+"A number of members of our community will be attending and are going to host talks, workshops and discussions about and relating to I2P. This event is not just for I2P people though, it's meant for everyone."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:18
 msgid ""
-"If you're curious about I2P, interested in privacy/cryptography/anonymity"
-" or just want to come by and talk to us, please do. This is an event for "
-"everyone. If you're not familiar with any of these topics, come by anyway"
-" and we'll show you how I2P works and what you can do with it.\n"
+"If you're curious about I2P, interested in privacy/cryptography/anonymity or just want to come by and talk to us, please do. This is an event for everyone. If you're not familiar with any of these topics, come by anyway and we'll show you how I2P works and what you can do with it.\n"
 "\n"
 "The event is entirely free, you don't need to sign up or register."
 msgstr ""
@@ -4138,9 +3867,9 @@ msgstr ""
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:24
 msgid ""
 "The meetup couldn't have been arranged without our friends at `Toronto "
-"Crypto <https://torontocrypto.org/>`_ which have been helping us organize"
-" the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are"
-" providing us with a very nice space."
+"Crypto <https://torontocrypto.org/>`_ which have been helping us organize "
+"the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are "
+"providing us with a very nice space."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:28
@@ -4168,9 +3897,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:55
 msgid ""
-"The focus will be on an introduction to topics surrounding I2P, privacy "
-"and anonymity online. People of all backgrounds and knowledge levels are "
-"welcome to attend."
+"The focus will be on an introduction to topics surrounding I2P, privacy and "
+"anonymity online. People of all backgrounds and knowledge levels are welcome"
+" to attend."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:59
@@ -4187,9 +3916,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:63
 msgid ""
-"The crypto party will contain a number of stations where "
-"privacy/anonymity software will be demoed. The goal is to provide people "
-"with the tools they need to communicate securely."
+"The crypto party will contain a number of stations where privacy/anonymity "
+"software will be demoed. The goal is to provide people with the tools they "
+"need to communicate securely."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:67
@@ -4210,11 +3939,10 @@ msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:72
 msgid ""
-"We're currently looking for help staffing the stations. If you want to "
-"help out, you can! Bring a monitor/laptop and run a station. The station "
-"could be any of the ones listed above, or any other privacy/anonymity "
-"related one you would like to run. Please contact us at `@geti2p`_ if "
-"you're interested."
+"We're currently looking for help staffing the stations. If you want to help "
+"out, you can! Bring a monitor/laptop and run a station. The station could be"
+" any of the ones listed above, or any other privacy/anonymity related one "
+"you would like to run. Please contact us at `@geti2p`_ if you're interested."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:81
@@ -4224,8 +3952,8 @@ msgstr ""
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:86
 msgid ""
 "The focus will be on in-depth topics surrounding I2P, the roadmap and "
-"development. Anyone is welcome to attend, but the content will be "
-"somewhat technical."
+"development. Anyone is welcome to attend, but the content will be somewhat "
+"technical."
 msgstr ""
 
 #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:90
@@ -4261,35 +3989,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:14
 msgid ""
-"I2PCon is the first event of its kind. It has two short term goals. Where"
-" the\n"
-"first one is to provide the general public with an event where knowledge "
-"about\n"
-"privacy and privacy concerns can be obtained. The second goal is to "
-"further the\n"
-"I2P project and its community. This will take the shape of technical "
-"discussions\n"
+"I2PCon is the first event of its kind. It has two short term goals. Where the\n"
+"first one is to provide the general public with an event where knowledge about\n"
+"privacy and privacy concerns can be obtained. The second goal is to further the\n"
+"I2P project and its community. This will take the shape of technical discussions\n"
 "about cryptography, anonymity and I2P centric topics."
 msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:22
 msgid ""
-"There is a larger and more long-term goal of this event, and it is to "
-"build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we would like to provide a forum where this "
-"community\n"
+"There is a larger and more long-term goal of this event, and it is to build a\n"
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we would like to provide a forum where this community\n"
 "can grow."
 msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:29
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
-"`Toronto Crypto`_. The venue and everything relating to it is provided by"
-"\n"
-"`Hacklab`_. Without either of them this event would not have been "
-"possible, so\n"
+"`Toronto Crypto`_. The venue and everything relating to it is provided by\n"
+"`Hacklab`_. Without either of them this event would not have been possible, so\n"
 "thank you both."
 msgstr ""
 
@@ -4299,12 +4018,9 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/16/I2PCon.rst:49
 msgid ""
-"I2PCon is entirely free to attend! We ask you to register `here`__, to "
-"give us\n"
-"an estimate of how many people will be attending. No identifying "
-"information has\n"
-"to be given in order to register, but if you have any concerns, please "
-"let us\n"
+"I2PCon is entirely free to attend! We ask you to register `here`__, to give us\n"
+"an estimate of how many people will be attending. No identifying information has\n"
+"to be given in order to register, but if you have any concerns, please let us\n"
 "know."
 msgstr ""
 
@@ -4349,26 +4065,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:13
 msgid ""
-"0.9.21 contains several changes to add capacity to the network, increase "
-"the efficiency of the floodfills,\n"
+"0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\n"
 "and use bandwidth more effectively.\n"
-"We have migrated the shared clients tunnels to ECDSA signatures and added"
-" a DSA fallback\n"
-"using the new \"multisession\" capability for those sites that don't "
-"support ECDSA."
-msgstr ""
-"0.9.21 conține mai multe modificări pentru a adăuga capacitate la rețea, "
-"crește eficiența impotriva inundațiilor in retea\n"
-"și utilizarea lățimii de bandă mai eficient.\n"
-"Am migrat clienții partajați a tunelurilor pentru semnături ECDSA și am "
-"adăugat ca soluție de rezervă  semnături DSA\n"
-"folosind noua capacitate \"multi-sesiune\" pentru acele site-uri care nu "
-"acceptă ECDSA."
+"We have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\n"
+"using the new \"multisession\" capability for those sites that don't support ECDSA."
+msgstr "0.9.21 conține mai multe modificări pentru a adăuga capacitate la rețea, crește eficiența impotriva inundațiilor in retea\nși utilizarea lățimii de bandă mai eficient.\nAm migrat clienții partajați a tunelurilor pentru semnături ECDSA și am adăugat ca soluție de rezervă  semnături DSA\nfolosind noua capacitate \"multi-sesiune\" pentru acele site-uri care nu acceptă ECDSA."
 
 #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:20
 msgid ""
-"The speakers and the schedule of the I2PCon in Toronto 2015 have been "
-"announced.\n"
+"The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.\n"
 "Have a look on the `I2PCon page`_ for details.\n"
 "Reserve your seat on `Eventbrite`_."
 msgstr ""
@@ -4480,21 +4185,15 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:14
 msgid ""
-"I2PCon has been a giant success. For us, the I2P contributors, it "
-"represents a\n"
-"leap forward in terms of what we're capable of pulling off as a "
-"community, how we\n"
-"communicate the usecases of I2P and reach out to privacy conscious "
-"individuals.\n"
+"I2PCon has been a giant success. For us, the I2P contributors, it represents a\n"
+"leap forward in terms of what we're capable of pulling off as a community, how we\n"
+"communicate the usecases of I2P and reach out to privacy conscious individuals.\n"
 "\n"
-"By arranging this event, we've also grown our community. People who've "
-"previously\n"
-"only lurked on our irc channels, or run our software or possibly hadn't "
-"even heard\n"
+"By arranging this event, we've also grown our community. People who've previously\n"
+"only lurked on our irc channels, or run our software or possibly hadn't even heard\n"
 "of I2P are now a part of our comminuty.\n"
 "\n"
-"This event has been our first active step towards building a large and "
-"inclusive\n"
+"This event has been our first active step towards building a large and inclusive\n"
 "community, and as such it's been great success."
 msgstr ""
 
@@ -4502,11 +4201,9 @@ msgstr ""
 msgid ""
 "Minutiae\n"
 "========\n"
-"On day 2 we had two short discussion sessions. A more general discussion "
-"and a roadmapping discussion.\n"
+"On day 2 we had two short discussion sessions. A more general discussion and a roadmapping discussion.\n"
 "\n"
-"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P "
-"Discussion session minutiae`_."
+"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P Discussion session minutiae`_."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:37
@@ -4535,32 +4232,25 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:62
 msgid ""
-"We've had some wonderful speakers, from both inside- and outside of our "
-"community.\n"
+"We've had some wonderful speakers, from both inside- and outside of our community.\n"
 "\n"
-"`David Dagon`_ talked to us about the way forward and how I2P could "
-"handle potential abuse.\n"
+"`David Dagon`_ talked to us about the way forward and how I2P could handle potential abuse.\n"
 "\n"
-"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us"
-" his thoughts about how far I2P has come.\n"
+"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us his thoughts about how far I2P has come.\n"
 "\n"
-"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and "
-"why you should care."
+"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and why you should care."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:72
 msgid ""
-"I would also like to thank the speakers from our community. `psi`_, "
-"`@str4d`_ and `zzz`_  who all had\n"
-"wonderful talks. Improving our ability to inform people about I2P is "
-"something that\n"
+"I would also like to thank the speakers from our community. `psi`_, `@str4d`_ and `zzz`_  who all had\n"
+"wonderful talks. Improving our ability to inform people about I2P is something that\n"
 "is going to be important for us going forward."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:78
 msgid ""
-"I would like to thank `Sadie`_ and Siew for helping us out with marketing"
-" and graphics.\n"
+"I would like to thank `Sadie`_ and Siew for helping us out with marketing and graphics.\n"
 "Without you I2PCon would've been a very different event."
 msgstr ""
 
@@ -4572,43 +4262,39 @@ msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:87
 msgid ""
-"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto "
-"Crypto`_ for their help during the event."
+"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto Crypto`_ "
+"for their help during the event."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:91
 msgid ""
-"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV "
-"and doing all of the post-production\n"
+"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV and doing all of the post-production\n"
 "work for the videos of all the talks."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:96
 msgid ""
-"I would like to thank `@killyourtv_i2p`_ for hosting a very popular "
-"crypto party station."
+"I would like to thank `@killyourtv_i2p`_ for hosting a very popular crypto "
+"party station."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:100
 msgid ""
-"Thanks to our new favorite journalist `@robinlevinson`_, for showing an "
-"interest in our cause and\n"
+"Thanks to our new favorite journalist `@robinlevinson`_, for showing an interest in our cause and\n"
 "educating yourself about the technologies involved."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:105
 msgid ""
-"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very "
-"much made this event better."
+"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very much "
+"made this event better."
 msgstr ""
 
 #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:109
 msgid ""
-"Finally I would like to thank everyone else who just showed up to the "
-"event and helped out in any way\n"
+"Finally I would like to thank everyone else who just showed up to the event and helped out in any way\n"
 "they could.\n"
-"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was "
-"most excellent to hang out\n"
+"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was most excellent to hang out\n"
 "with you."
 msgstr ""
 
@@ -4625,26 +4311,11 @@ msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:13
 msgid ""
-"0.9.22 contains fixes for i2psnark getting stuck before completion, and "
-"begins the migration of router infos to new, stronger Ed25519 signatures."
-"\n"
-"To reduce network churn, your router will have only a small probability "
-"of converting to Ed25519 at each restart.\n"
-"When it does rekey, expect to see lower bandwidth usage for a couple of "
-"days as it reintegrates into the network with its new identity.\n"
-"If all goes well, we will accelerate the rekeying process in the next "
-"release."
-msgstr ""
-"0.9.22 conține remedieri pentru i2psnark care se bloca inainte de "
-"finalizare, și începe migrarea informaţilor routerului la noi, mai "
-"puternice semnături Ed25519.\n"
-"Pentru a reduce abandonul de rețea, router-ul va avea doar o mică "
-"probabilitate de conversie la Ed25519 la fiecare repornire.\n"
-"Atunci când se recodifică, vă puteţi așteapta să vedeţi utilizarea "
-"lățimii de bandă mai mică pentru câteva zile, deoarece se reintegrează in"
-" rețea cu noua identitate.\n"
-"Dacă totul merge bine, vom accelera procesul de recodificare în "
-"următoarea lansare."
+"0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\n"
+"To reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\n"
+"When it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\n"
+"If all goes well, we will accelerate the rekeying process in the next release."
+msgstr "0.9.22 conține remedieri pentru i2psnark care se bloca inainte de finalizare, și începe migrarea informaţilor routerului la noi, mai puternice semnături Ed25519.\nPentru a reduce abandonul de rețea, router-ul va avea doar o mică probabilitate de conversie la Ed25519 la fiecare repornire.\nAtunci când se recodifică, vă puteţi așteapta să vedeţi utilizarea lățimii de bandă mai mică pentru câteva zile, deoarece se reintegrează in rețea cu noua identitate.\nDacă totul merge bine, vom accelera procesul de recodificare în următoarea lansare."
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:20
 msgid ""
@@ -4662,14 +4333,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:46
 msgid ""
-"Fix i2psnark getting stuck before download complete, and not deleting "
-"temp files"
+"Fix i2psnark getting stuck before download complete, and not deleting temp "
+"files"
 msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:47
 msgid ""
-"Fix starting of torrents added by copying torrent file to i2psnark "
-"directory"
+"Fix starting of torrents added by copying torrent file to i2psnark directory"
 msgstr ""
 
 #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:48
@@ -4698,10 +4368,8 @@ msgstr ""
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:15
 msgid ""
 "Greetings!\n"
-"This is the first in a long series of blogs to help the community see "
-"what is happening in the I2P community.\n"
-"Since many awesome events are happening *inside* the network, we think it"
-" will be worthwhile to talk about some of activities here."
+"This is the first in a long series of blogs to help the community see what is happening in the I2P community.\n"
+"Since many awesome events are happening *inside* the network, we think it will be worthwhile to talk about some of activities here."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:21
@@ -4712,16 +4380,14 @@ msgstr ""
 msgid ""
 "Let's face it -- our console needs improvement.\n"
 "Our site could use an update as well.\n"
-"We are looking for feedback on how to improve the usability of I2P for "
-"new and existing users!"
+"We are looking for feedback on how to improve the usability of I2P for new and existing users!"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:29
 msgid ""
 "Any and all feedback is welcome.\n"
 "Please contact `@GetI2P`_, `@str4d`_, or `@YrB1rd`_.\n"
-"If you don't feel comfortable using Twitter, we are always available via "
-"the in-network IRC channel.\n"
+"If you don't feel comfortable using Twitter, we are always available via the in-network IRC channel.\n"
 "You don't have to be a long time user.\n"
 "We want to hear from all sorts of people!"
 msgstr ""
@@ -4733,36 +4399,27 @@ msgstr ""
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:43
 msgid ""
 "On 03 November there was an I2P developer meeting (`log`_).\n"
-"This meeting focused on adding new links to the router console, "
-"preparation for CCC, finding a replacement for forum.i2p, and website "
-"improvements."
+"This meeting focused on adding new links to the router console, preparation for CCC, finding a replacement for forum.i2p, and website improvements."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:50
 msgid ""
 "The consensus was to not add dogecoindark.i2p.\n"
-"There are concerns about usability due to many images being included on "
-"the page.\n"
-"Exchanged.i2p is conditionally added, as long as the maintainer adds a "
-"disclaimer on the site.\n"
-"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was "
-"lenta.i2p (a russian news site)."
+"There are concerns about usability due to many images being included on the page.\n"
+"Exchanged.i2p is conditionally added, as long as the maintainer adds a disclaimer on the site.\n"
+"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was lenta.i2p (a russian news site)."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:57
 msgid ""
-"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used"
-" for developer's services.\n"
-"He also suggested a more formalized technical proposal system, with more "
-"prominence on the main website."
+"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used for developer's services.\n"
+"He also suggested a more formalized technical proposal system, with more prominence on the main website."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:62
 msgid ""
-"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos "
-"Computer Congress.\n"
-"More details are to come on this, but we can promise there will be "
-"stickers."
+"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos Computer Congress.\n"
+"More details are to come on this, but we can promise there will be stickers."
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:67
@@ -4770,13 +4427,14 @@ msgid "General Announcements"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:69
-msgid "Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!"
+msgid ""
+"Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!"
 msgstr ""
 
 #: i2p2www/blog/2015/11/15/Community-Outreach.rst:75
 msgid ""
-"Translation deadline Thursday, 12 November, translators please update. "
-"All translations are done via `Transifex`_ ."
+"Translation deadline Thursday, 12 November, translators please update. All "
+"translations are done via `Transifex`_ ."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:1
@@ -4790,22 +4448,14 @@ msgstr ""
 msgid ""
 "0.9.23 contains a variety of bug fixes, and some minor improvements in "
 "I2PSnark"
-msgstr ""
-"0.9.23 conține o varietate de erori remediate, și unele îmbunătățiri "
-"minore în I2PSnark"
+msgstr "0.9.23 conține o varietate de erori remediate, și unele îmbunătățiri minore în I2PSnark"
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:13
 msgid ""
-"Hello I2P! This is the first release signed by me (str4d), after 49 "
-"releases\n"
-"signed by zzz. This is an important test of our redundancy for all "
-"things,\n"
+"Hello I2P! This is the first release signed by me (str4d), after 49 releases\n"
+"signed by zzz. This is an important test of our redundancy for all things,\n"
 "including people."
-msgstr ""
-"Salut I2P! Aceasta este prima lansare semnata de mine (str4d), după 49 "
-"lansari\n"
-"semnate de zzz. Acesta este un test important al redundanței noastre "
-"pentru toate lucrurile, inclusiv a oameniilor."
+msgstr "Salut I2P! Aceasta este prima lansare semnata de mine (str4d), după 49 lansari\nsemnate de zzz. Acesta este un test important al redundanței noastre pentru toate lucrurile, inclusiv a oameniilor."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:19
 msgid "Housekeeping"
@@ -4813,29 +4463,20 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:24
 msgid ""
-"My signing key has been in router updates for over two years (since "
-"0.9.9), so\n"
-"if you are on a recent version of I2P this update should be just as easy "
-"as\n"
-"every other update. However, if you are running an older version than "
-"0.9.9, you\n"
-"will first need to manually update to a recent version. Update files for "
-"recent\n"
-"versions `can be downloaded here`__, and instructions on how to manually "
-"update\n"
-"`are provided here`__. Once you have manually updated, your router will "
-"then find\n"
+"My signing key has been in router updates for over two years (since 0.9.9), so\n"
+"if you are on a recent version of I2P this update should be just as easy as\n"
+"every other update. However, if you are running an older version than 0.9.9, you\n"
+"will first need to manually update to a recent version. Update files for recent\n"
+"versions `can be downloaded here`__, and instructions on how to manually update\n"
+"`are provided here`__. Once you have manually updated, your router will then find\n"
 "and download the 0.9.23 update as usual."
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:38
 msgid ""
-"If you installed I2P via a package manager, you are not affected by the "
-"change,\n"
+"If you installed I2P via a package manager, you are not affected by the change,\n"
 "and can update as usual."
-msgstr ""
-"În cazul în care instalați I2P printr-un manager de pachete, nu sunteți "
-"afectat de modificare, și puteți actualiza ca de obicei."
+msgstr "În cazul în care instalați I2P printr-un manager de pachete, nu sunteți afectat de modificare, și puteți actualiza ca de obicei."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:43
 msgid ""
@@ -4845,49 +4486,26 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:48
 msgid ""
-"The migration of RouterInfos to new, stronger Ed25519 signatures is going"
-" well,\n"
-"with at least half of the network already estimated to have rekeyed. This"
-"\n"
-"release accelerates the rekeying process. To reduce network churn, your "
-"router\n"
-"will have a small probability of converting to Ed25519 at each restart. "
-"When it\n"
-"does rekey, expect to see lower bandwidth usage for a couple of days as "
-"it\n"
+"The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\n"
+"with at least half of the network already estimated to have rekeyed. This\n"
+"release accelerates the rekeying process. To reduce network churn, your router\n"
+"will have a small probability of converting to Ed25519 at each restart. When it\n"
+"does rekey, expect to see lower bandwidth usage for a couple of days as it\n"
 "reintegrates into the network with its new identity."
-msgstr ""
-"Migrarea informaţilor routerului la noi, mai puternice Ed25519 semnături "
-"merge bine,\n"
-"cu cel puțin jumătate din reţeaua deja estimată a fi recodificată. "
-"Această versiune accelerează procesul de recodificare. Pentru a reduce "
-"abandonul de reţea, routerul dumneavoastră va avea o probabilitate mică "
-"de conversie la Ed25519 la fiecare repornire. Atunci când se recodifică, "
-"vă puteţi așteapta să vedeţi utilizarea lățimii de bandă mai mică pentru "
-"câteva zile, deoarece se reintegrează in rețea cu noua identitate."
+msgstr "Migrarea informaţilor routerului la noi, mai puternice Ed25519 semnături merge bine,\ncu cel puțin jumătate din reţeaua deja estimată a fi recodificată. Această versiune accelerează procesul de recodificare. Pentru a reduce abandonul de reţea, routerul dumneavoastră va avea o probabilitate mică de conversie la Ed25519 la fiecare repornire. Atunci când se recodifică, vă puteţi așteapta să vedeţi utilizarea lățimii de bandă mai mică pentru câteva zile, deoarece se reintegrează in rețea cu noua identitate."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:57
 msgid ""
-"Note that this will be the last release to support Java 6. Please update "
-"to\n"
-"Java 7 or 8 as soon as possible. We are already working to make I2P "
-"compatible\n"
+"Note that this will be the last release to support Java 6. Please update to\n"
+"Java 7 or 8 as soon as possible. We are already working to make I2P compatible\n"
 "with the upcoming Java 9, and some of that work is in this release."
-msgstr ""
-"Rețineți că acest lucru va fi ultima versiune care mai suportă Java 6. Vă"
-" rugăm să actualizați la Java 7 sau 8 cât mai curând posibil. Noi deja "
-"lucrăm pentru a face I2P compatibil cu viitorul Java 9, și o parte din "
-"această muncă se regăsește in această versiune."
+msgstr "Rețineți că acest lucru va fi ultima versiune care mai suportă Java 6. Vă rugăm să actualizați la Java 7 sau 8 cât mai curând posibil. Noi deja lucrăm pentru a face I2P compatibil cu viitorul Java 9, și o parte din această muncă se regăsește in această versiune."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:63
 msgid ""
-"We have also made some minor improvements in I2PSnark, and added a new "
-"page in\n"
+"We have also made some minor improvements in I2PSnark, and added a new page in\n"
 "the routerconsole for viewing older news items."
-msgstr ""
-"Am făcut, de asemenea, unele îmbunătățiri minore în I2PSnark, și am "
-"adăugat o nouă pagină în consola router-ului pentru vizualizarea știrilor"
-" mai vechi."
+msgstr "Am făcut, de asemenea, unele îmbunătățiri minore în I2PSnark, și am adăugat o nouă pagină în consola router-ului pentru vizualizarea știrilor mai vechi."
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:78
 msgid "Accelerate transition to Ed25519"
@@ -4895,14 +4513,13 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:83
 msgid ""
-"Fix some bugs soft restarting after a large clock shift (e.g. resume) "
-"(but more to do)"
+"Fix some bugs soft restarting after a large clock shift (e.g. resume) (but "
+"more to do)"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:84
 msgid ""
-"Fix streaming retransmission timers that were dying, and related timer "
-"bugs"
+"Fix streaming retransmission timers that were dying, and related timer bugs"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:85
@@ -4946,7 +4563,8 @@ msgid "Detect for broken ECDSA support in Gentoo"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:98
-msgid "Console: Add a Java 6 warning, this is the last release to support Java 6"
+msgid ""
+"Console: Add a Java 6 warning, this is the last release to support Java 6"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:99
@@ -4955,8 +4573,8 @@ msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:100
 msgid ""
-"Pass Accept-Encoding header through client and server proxies, to allow "
-"end-to-end compression"
+"Pass Accept-Encoding header through client and server proxies, to allow end-"
+"to-end compression"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:103
@@ -4972,7 +4590,8 @@ msgid "Save magnet parameters across restart"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:106
-msgid "Don't delete .torrent file on errors at startup, rename to .torrent.BAD"
+msgid ""
+"Don't delete .torrent file on errors at startup, rename to .torrent.BAD"
 msgstr ""
 
 #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:107
@@ -5004,8 +4623,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:13
 msgid ""
-"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and "
-"eche|on."
+"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and eche|on."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:17
@@ -5013,21 +4631,15 @@ msgid ""
 "Start\n"
 "=====\n"
 "The project has had another successful year at CCC.\n"
-"We would like to thank the volunteers at `32C3`__ for all of their help "
-"in organizing this event and for being accommodating hosts for us.\n"
-"Many I2P contributors were able to attend this year's Congress due to "
-"many of the generous donations from supporters like you to the project.\n"
-"If you would like to fund I2P, please see `our donation page`__ for more "
-"information."
+"We would like to thank the volunteers at `32C3`__ for all of their help in organizing this event and for being accommodating hosts for us.\n"
+"Many I2P contributors were able to attend this year's Congress due to many of the generous donations from supporters like you to the project.\n"
+"If you would like to fund I2P, please see `our donation page`__ for more information."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:29
 msgid ""
-"Just like previous years we were located in Noisy Square, located near "
-"the EFF's table.\n"
-"This proved to be an ideal spot for us as our table was almost always "
-"busy with current and new users who were interested in I2P, many of whom "
-"we wouldn't have otherwise had the ability to talk to."
+"Just like previous years we were located in Noisy Square, located near the EFF's table.\n"
+"This proved to be an ideal spot for us as our table was almost always busy with current and new users who were interested in I2P, many of whom we wouldn't have otherwise had the ability to talk to."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:63
@@ -5042,13 +4654,10 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:72
 msgid ""
-"If you don't know what a reseed server is, it is first the connection new"
-" routers use to find peers.\n"
-"There was a lot of discussion around the current status of the reseed "
-"network right now.\n"
+"If you don't know what a reseed server is, it is first the connection new routers use to find peers.\n"
+"There was a lot of discussion around the current status of the reseed network right now.\n"
 "As always, more reseed operators are needed!\n"
-"If you would like to strengthen the reseed infrastructure, (or if you're "
-"talented with Go) email `backup -at- i2pmail.org`__."
+"If you would like to strengthen the reseed infrastructure, (or if you're talented with Go) email `backup -at- i2pmail.org`__."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:81
@@ -5059,16 +4668,11 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:86
 msgid ""
-"Due to the decentralized nature of I2P detecting Sybil attacks is not as "
-"straight forward as on other networks (i.e. Tor).\n"
-"To mitigate this zzz has been working on a new router-based Sybil "
-"detection tool.\n"
-"To be brief, the tool runs in the router, and collects information on "
-"floodfills your router is currently aware of.\n"
-"Currently the tool is mainly collecting a baseline and does not act on "
-"any of the information it is collecting.\n"
-"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as "
-"it is still in active development"
+"Due to the decentralized nature of I2P detecting Sybil attacks is not as straight forward as on other networks (i.e. Tor).\n"
+"To mitigate this zzz has been working on a new router-based Sybil detection tool.\n"
+"To be brief, the tool runs in the router, and collects information on floodfills your router is currently aware of.\n"
+"Currently the tool is mainly collecting a baseline and does not act on any of the information it is collecting.\n"
+"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as it is still in active development"
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:94
@@ -5080,21 +4684,15 @@ msgstr ""
 #: i2p2www/blog/2016/01/23/32C3.rst:99
 msgid ""
 "On the 30th we held an in person `meeting`__ at our table.\n"
-"The meeting focused on organizationally preparing for more project "
-"management, and public relations (both from Sadie)."
+"The meeting focused on organizationally preparing for more project management, and public relations (both from Sadie)."
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:106
 msgid ""
-"We discussed how much of the work done on I2P is lost in the commits and "
-"there is not much to see for our users.\n"
-"To remedy this lazygravy plans on preparing a series of posts explaining "
-"some technical topics in I2P.\n"
-"The initial ideas that we discussed writing posts on are what encrypted "
-"lease sets are, why different tunnel types are needed, and some "
-"observations seen in `I2Spy`__.\n"
-"But these are just the start and we would like to hear feedback on topics"
-" we should write about!"
+"We discussed how much of the work done on I2P is lost in the commits and there is not much to see for our users.\n"
+"To remedy this lazygravy plans on preparing a series of posts explaining some technical topics in I2P.\n"
+"The initial ideas that we discussed writing posts on are what encrypted lease sets are, why different tunnel types are needed, and some observations seen in `I2Spy`__.\n"
+"But these are just the start and we would like to hear feedback on topics we should write about!"
 msgstr ""
 
 #: i2p2www/blog/2016/01/23/32C3.rst:115
@@ -5161,42 +4759,32 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:11
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:11
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:11
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:11
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:11
 msgid "Update details"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:18
 msgid ""
-"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and "
-"efficiency improvements.\n"
+"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and efficiency improvements.\n"
 "Note that this release is the first to require Java 7.\n"
 "Please update to Java 7 or 8 as soon as possible.\n"
 "Your router will not automatically update if you are using Java 6."
-msgstr ""
-"0.9.24 conține o nouă versiune de SAM (v3.2), precum și numeroase "
-"remedieri de erori dar și îmbunătățiri ale eficienței.\n"
-"Rețineți că această versiune este prima care necesită Java 7.\n"
-"Vă rugăm să actualizați la Java 7 sau 8, cât mai curând posibil.\n"
-"Router-ul nu se va actualiza automat dacă utilizați Java 6."
+msgstr "0.9.24 conține o nouă versiune de SAM (v3.2), precum și numeroase remedieri de erori dar și îmbunătățiri ale eficienței.\nRețineți că această versiune este prima care necesită Java 7.\nVă rugăm să actualizați la Java 7 sau 8, cât mai curând posibil.\nRouter-ul nu se va actualiza automat dacă utilizați Java 6."
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:25
 msgid ""
-"To prevent the problems caused by the ancient commons-logging library, we"
-" have removed it.\n"
-"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by "
-"HungryHobo) to crash if they have IMAP enabled.\n"
-"The recommended fix is to replace your old I2P-Bote plugin with the "
-"current one signed by str4d.\n"
+"To prevent the problems caused by the ancient commons-logging library, we have removed it.\n"
+"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by HungryHobo) to crash if they have IMAP enabled.\n"
+"The recommended fix is to replace your old I2P-Bote plugin with the current one signed by str4d.\n"
 "For more details, see `this post`__."
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:34
 msgid ""
-"We had a great `32C3 Congress`__ and are making good progress on our 2016"
-" project plans.\n"
-"Echelon gave a talk on I2P's history and current status, and his slides "
-"are `available here`__ (pdf).\n"
-"Str4d attended `Real World Crypto`__ and gave a talk on our crypto "
-"migration, his slides are `here`__ (pdf)."
+"We had a great `32C3 Congress`__ and are making good progress on our 2016 project plans.\n"
+"Echelon gave a talk on I2P's history and current status, and his slides are `available here`__ (pdf).\n"
+"Str4d attended `Real World Crypto`__ and gave a talk on our crypto migration, his slides are `here`__ (pdf)."
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:58
@@ -5205,8 +4793,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:59
 msgid ""
-"SAM 3.2, with several new advanced features, command parser improvements,"
-" and lots of bug fixes"
+"SAM 3.2, with several new advanced features, command parser improvements, "
+"and lots of bug fixes"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:60
@@ -5231,8 +4819,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:69
 msgid ""
-"Don't remove tunnel on next-hop failure indication from transport, it "
-"isn't reliable"
+"Don't remove tunnel on next-hop failure indication from transport, it isn't "
+"reliable"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:70
@@ -5240,13 +4828,13 @@ msgid "Fix formatting in summary bar to prevent overflow"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:71
-msgid "Fix console links in i2ptunnel error pages when on nonstandard host/port"
+msgid ""
+"Fix console links in i2ptunnel error pages when on nonstandard host/port"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:72
 msgid ""
-"Don't query floodfills whose version is too old to support encrypted "
-"replies"
+"Don't query floodfills whose version is too old to support encrypted replies"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:73
@@ -5293,8 +4881,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:87
 msgid ""
-"Don't offer to introduce unless requested, to introduce only those that "
-"need it"
+"Don't offer to introduce unless requested, to introduce only those that need"
+" it"
 msgstr ""
 
 #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:88
@@ -5359,6 +4947,8 @@ msgstr ""
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:71
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:88
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:92
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:89
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:61
 msgid "Full list of fixed bugs"
 msgstr ""
 
@@ -5375,30 +4965,17 @@ msgstr "0.9.25 conține SAM 3.3, coduri QR, și erori remediate"
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:18
 msgid ""
-"0.9.25 contains a major new version of SAM, v3.3, to support "
-"sophisticated multiprotocol applications.\n"
+"0.9.25 contains a major new version of SAM, v3.3, to support sophisticated multiprotocol applications.\n"
 "It adds QR codes for sharing hidden service addresses with others,\n"
 "and \"identicon\" images for visually distinguishing addresses."
-msgstr ""
-"0.9.25 conține o nouă versiune majoră a SAM, v3.3, pentru a sprijini "
-"aplicațiile Multiprotocol sofisticate.\n"
-"Aceasta adaugă codurile QR pentru partajarea adreselor de servicii "
-"ascunse cu alte persoane și imagini \"identicon\" pentru adrese vizuale "
-"distinctive."
+msgstr "0.9.25 conține o nouă versiune majoră a SAM, v3.3, pentru a sprijini aplicațiile Multiprotocol sofisticate.\nAceasta adaugă codurile QR pentru partajarea adreselor de servicii ascunse cu alte persoane și imagini \"identicon\" pentru adrese vizuale distinctive."
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:24
 msgid ""
 "We've added a new \"router family\" configuration page in the console,\n"
-"to make it easier to declare that your group of routers is run by a "
-"single person.\n"
-"There are several changes to increase the capacity of the network and "
-"hopefully improve tunnel build success."
-msgstr ""
-"Am adăugat o nouă pagină de configurare \"familie router\", în consolă, \n"
-"pentru a face mai ușor de a declara că grupul dvs. de routere este "
-"administrat de o singură persoană.\n"
-"Există mai multe modificări pentru a crește capacitatea rețelei și, "
-"sperăm, a îmbunătăți construirea tunelelor cu succes."
+"to make it easier to declare that your group of routers is run by a single person.\n"
+"There are several changes to increase the capacity of the network and hopefully improve tunnel build success."
+msgstr "Am adăugat o nouă pagină de configurare \"familie router\", în consolă, \npentru a face mai ușor de a declara că grupul dvs. de routere este administrat de o singură persoană.\nExistă mai multe modificări pentru a crește capacitatea rețelei și, sperăm, a îmbunătăți construirea tunelelor cu succes."
 
 #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:40
 msgid "Display of identicons and QR codes in address book and i2ptunnel"
@@ -5490,34 +5067,26 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:11
 msgid ""
 "We are pleased to announce that this summer, I2P will be embarking on a "
-"development program aimed at improving the privacy software ecosystem for"
-" both developers and users."
+"development program aimed at improving the privacy software ecosystem for "
+"both developers and users."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:13
 msgid ""
-"Over the last few years, the need for users to be in control of their own"
-" data\n"
-"has become increasingly apparent. Some excellent progress had been made "
-"in this\n"
-"regard with the rise of messaging apps like Signal_, and file storage "
-"systems\n"
-"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to "
-"the\n"
+"Over the last few years, the need for users to be in control of their own data\n"
+"has become increasingly apparent. Some excellent progress had been made in this\n"
+"regard with the rise of messaging apps like Signal_, and file storage systems\n"
+"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to the\n"
 "whole world is steadily gaining traction."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:21
 msgid ""
-"But building privacy and anonymity into applications is not trivial. Much"
-" of the\n"
-"software people use every day was not designed to be privacy-preserving, "
-"and the\n"
+"But building privacy and anonymity into applications is not trivial. Much of the\n"
+"software people use every day was not designed to be privacy-preserving, and the\n"
 "tools developers have available are generally not easy to work with. The\n"
-"recently-published OnionScan_ survey gives some insight into just how "
-"easy it is\n"
-"for even technical users to mis-configure their services, completely "
-"undermining\n"
+"recently-published OnionScan_ survey gives some insight into just how easy it is\n"
+"for even technical users to mis-configure their services, completely undermining\n"
 "their intentions."
 msgstr ""
 
@@ -5530,16 +5099,14 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:41
 msgid ""
 "We are pleased to announce that this summer, I2P will be embarking on a\n"
-"development program aimed at improving the privacy software ecosystem. "
-"Our goal\n"
-"is to make life easier both for developers wanting to leverage I2P in "
-"their\n"
-"applications, and for users trying to configure and run their apps "
-"through I2P."
+"development program aimed at improving the privacy software ecosystem. Our goal\n"
+"is to make life easier both for developers wanting to leverage I2P in their\n"
+"applications, and for users trying to configure and run their apps through I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:48
-msgid "We will be focusing our time this summer into three complementary areas:"
+msgid ""
+"We will be focusing our time this summer into three complementary areas:"
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:52
@@ -5550,19 +5117,15 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:57
 msgid ""
-"In June, we will be updating the various libraries that exist for "
-"interfacing\n"
-"with I2P. We have made significant progress this year on extending our "
-"SAM_ API\n"
-"with additional features, such as support for datagrams and ports. We "
-"plan to\n"
+"In June, we will be updating the various libraries that exist for interfacing\n"
+"with I2P. We have made significant progress this year on extending our SAM_ API\n"
+"with additional features, such as support for datagrams and ports. We plan to\n"
 "make these features easily accessible in our C++ and Python libraries."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:64
 msgid ""
-"We will also soon be making it much easier for Java and Android "
-"developers to\n"
+"We will also soon be making it much easier for Java and Android developers to\n"
 "add I2P support to their applications. Stay tuned!"
 msgstr ""
 
@@ -5574,18 +5137,12 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:76
 msgid ""
-"In July we will be working with applications that have expressed interest"
-" in\n"
-"adding support for I2P. There are some really neat ideas being developed "
-"in the\n"
-"privacy space right now, and we want to help their communities leverage "
-"over a\n"
-"decade of research and development on peer-to-peer anonymity. Extending "
-"these\n"
-"applications to work natively over I2P is a good step forward for "
-"usability, and\n"
-"in the process will improve how these applications think about and handle"
-" user\n"
+"In July we will be working with applications that have expressed interest in\n"
+"adding support for I2P. There are some really neat ideas being developed in the\n"
+"privacy space right now, and we want to help their communities leverage over a\n"
+"decade of research and development on peer-to-peer anonymity. Extending these\n"
+"applications to work natively over I2P is a good step forward for usability, and\n"
+"in the process will improve how these applications think about and handle user\n"
 "information."
 msgstr ""
 
@@ -5597,12 +5154,9 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:91
 msgid ""
-"Finally, in August we will turn out attention to the apps we bundle "
-"inside I2P,\n"
-"and the wider array of plugins. Some of these are due for some love, to "
-"make\n"
-"them more user-friendly - as well as fix any outstanding bugs! We hope "
-"that\n"
+"Finally, in August we will turn out attention to the apps we bundle inside I2P,\n"
+"and the wider array of plugins. Some of these are due for some love, to make\n"
+"them more user-friendly - as well as fix any outstanding bugs! We hope that\n"
 "longtime I2P supporters will enjoy the outcome of this work."
 msgstr ""
 
@@ -5617,14 +5171,10 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:104
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:131
 msgid ""
-"We have many more ideas for things we'd like to get done in these areas. "
-"If\n"
-"you're interested in hacking on privacy and anonymity software, designing"
-" usable\n"
-"websites or interfaces, or writing guides for users: come and chat with "
-"us on\n"
-"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our "
-"community, both\n"
+"We have many more ideas for things we'd like to get done in these areas. If\n"
+"you're interested in hacking on privacy and anonymity software, designing usable\n"
+"websites or interfaces, or writing guides for users: come and chat with us on\n"
+"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our community, both\n"
 "inside and outside I2P. We'll be sending I2P stickers out to all new\n"
 "contributors taking part (or possibly other pending I2P goodies)!"
 msgstr ""
@@ -5632,24 +5182,18 @@ msgstr ""
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:113
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:140
 msgid ""
-"Likewise, if you are an application developer who wants a hand with "
-"integrating\n"
-"I2P, or even just to chat about the concepts or details: get in touch! If"
-" you\n"
-"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ "
-"or\n"
-"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or "
-"FreeNode."
+"Likewise, if you are an application developer who wants a hand with integrating\n"
+"I2P, or even just to chat about the concepts or details: get in touch! If you\n"
+"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ or\n"
+"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or FreeNode."
 msgstr ""
 
 #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:120
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:147
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:131
 msgid ""
-"We'll be posting here as we go, but you can also follow our progress, and"
-" share\n"
-"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring"
-" on the\n"
+"We'll be posting here as we go, but you can also follow our progress, and share\n"
+"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring on the\n"
 "summer!"
 msgstr ""
 
@@ -5662,11 +5206,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:11
 msgid ""
-"0.9.26 contains crypto updates, Debian packaging improvements, and bug "
-"fixes"
-msgstr ""
-"0.9.26 conține actualizări criptografice, îmbunătățiri de instalare pe "
-"Debian, și remedieri de erori"
+"0.9.26 contains crypto updates, Debian packaging improvements, and bug fixes"
+msgstr "0.9.26 conține actualizări criptografice, îmbunătățiri de instalare pe Debian, și remedieri de erori"
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:13
 msgid ""
@@ -5679,41 +5220,22 @@ msgid ""
 "0.9.26 contains a major upgrade to our native crypto library,\n"
 "a new addressbook subscription protocol with signatures,\n"
 "and major improvements to the Debian/Ubuntu packaging."
-msgstr ""
-"0.9.26 conține o actualizare majoră pentru biblioteca criptografică "
-"nativă,\n"
-"un nou protocol de abonament cu semnături în Addressbook,\n"
-"și îmbunătățiri majore pentru instalarea in sistemele Debian / Ubuntu."
+msgstr "0.9.26 conține o actualizare majoră pentru biblioteca criptografică nativă,\nun nou protocol de abonament cu semnături în Addressbook,\nși îmbunătățiri majore pentru instalarea in sistemele Debian / Ubuntu."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:31
 msgid ""
-"For crypto, we have upgraded to GMP 6.0.0, and added support for newer "
-"processors,\n"
+"For crypto, we have upgraded to GMP 6.0.0, and added support for newer processors,\n"
 "which will speed up crypto operations considerably.\n"
-"Also, we are now using constant-time GMP functions to prevent side-"
-"channel attacks.\n"
-"For caution, the GMP changes are enabled for new installs and "
-"Debian/Ubuntu builds only;\n"
+"Also, we are now using constant-time GMP functions to prevent side-channel attacks.\n"
+"For caution, the GMP changes are enabled for new installs and Debian/Ubuntu builds only;\n"
 "we will include them for in-net updates in the 0.9.27 release."
-msgstr ""
-"Pentru criptografie, am actualizat la GMP 6.0.0, și am adăugat suport "
-"pentru procesoare mai noi,\n"
-"care va accelera operațiunile criptografice considerabil.\n"
-"De asemenea, de acum folosim funcții GMP constante de timp pentru a "
-"preveni atacurile de canal lateral.\n"
-"Pentru precauție, modificările GMP sunt activate pentru noi instalări și "
-"doar de instalare în Debian / Ubuntu;\n"
-"noi le vom include în actualizările de rețea în versiunea 0.9.27."
+msgstr "Pentru criptografie, am actualizat la GMP 6.0.0, și am adăugat suport pentru procesoare mai noi,\ncare va accelera operațiunile criptografice considerabil.\nDe asemenea, de acum folosim funcții GMP constante de timp pentru a preveni atacurile de canal lateral.\nPentru precauție, modificările GMP sunt activate pentru noi instalări și doar de instalare în Debian / Ubuntu;\nnoi le vom include în actualizările de rețea în versiunea 0.9.27."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:39
 msgid ""
-"For Debian/Ubuntu builds, we have added dependencies on several packages,"
-"\n"
+"For Debian/Ubuntu builds, we have added dependencies on several packages,\n"
 "including Jetty 8 and geoip, and removed the equivalent bundled code."
-msgstr ""
-"Pentru construcția pachetelor în Debian / Ubuntu, am adăugat dependințe "
-"la mai multe pachete, inclusiv Jetty 8 și GeoIP, și am eliminat codul "
-"pachet echivalent."
+msgstr "Pentru construcția pachetelor în Debian / Ubuntu, am adăugat dependințe la mai multe pachete, inclusiv Jetty 8 și GeoIP, și am eliminat codul pachet echivalent."
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:44
 msgid ""
@@ -5723,10 +5245,10 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:59
 msgid ""
-"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant "
-"speedups on newer architectures, and constant-time crypto operations  "
-"(new installs and Debian/Ubuntu builds only, will include in the updates "
-"in the next release, 0.9.27)"
+"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant speedups "
+"on newer architectures, and constant-time crypto operations  (new installs "
+"and Debian/Ubuntu builds only, will include in the updates in the next "
+"release, 0.9.27)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:60
@@ -5739,8 +5261,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:62
 msgid ""
-"Enhance hosts blockfile format to allow for multiple destinations per "
-"entry"
+"Enhance hosts blockfile format to allow for multiple destinations per entry"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:63
@@ -5749,8 +5270,7 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:64
 msgid ""
-"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu "
-"packages"
+"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu packages"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:65
@@ -5768,8 +5288,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:67
 msgid ""
-"Enhancements to the desktopgui system tray feature, to be enabled by "
-"default in next release"
+"Enhancements to the desktopgui system tray feature, to be enabled by default"
+" in next release"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:68
@@ -5784,8 +5304,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:75
 msgid ""
-"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual"
-" fix)"
+"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual "
+"fix)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:76
@@ -5794,8 +5314,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:77
 msgid ""
-"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 "
-"for manual fix)"
+"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 for "
+"manual fix)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:78
@@ -5816,8 +5336,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:87
 msgid ""
-"Rework resource bundle generation for 20x speedup in build time (requires"
-" gettext version 0.19)"
+"Rework resource bundle generation for 20x speedup in build time (requires "
+"gettext version 0.19)"
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:1
@@ -5833,10 +5353,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:13
 msgid ""
-"We're nearly half-way into the APIs month of Summer Dev, and making great"
-"\n"
-"progress on a number of fronts. I'm happy to announce that the first of "
-"these is\n"
+"We're nearly half-way into the APIs month of Summer Dev, and making great\n"
+"progress on a number of fronts. I'm happy to announce that the first of these is\n"
 "complete: the I2P client libraries are now available on Maven Central!"
 msgstr ""
 
@@ -5844,10 +5362,8 @@ msgstr ""
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:51
 msgid ""
 "This should make it much simpler for Java developers to use I2P in their\n"
-"applications. Instead of needing to obtain the libraries from a current "
-"install,\n"
-"they can simply add I2P to their dependencies. Upgrading to new versions "
-"will\n"
+"applications. Instead of needing to obtain the libraries from a current install,\n"
+"they can simply add I2P to their dependencies. Upgrading to new versions will\n"
 "similarly be much easier."
 msgstr ""
 
@@ -5871,25 +5387,21 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:39
 msgid ""
-"Add one or both of these to your project's dependencies, and you're good "
-"to go!"
+"Add one or both of these to your project's dependencies, and you're good to "
+"go!"
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:67
 msgid ""
-"For other build systems, see the Maven Central pages for the `core`__ and"
-"\n"
+"For other build systems, see the Maven Central pages for the `core`__ and\n"
 "`streaming`__ libraries."
 msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:72
 msgid ""
-"Android developers should use the `I2P Android client library`__, which "
-"contains\n"
-"the same libraries along with Android-specific helpers. I'll be updating "
-"it soon\n"
-"to depend on the new I2P libraries, so that cross-platform applications "
-"can work\n"
+"Android developers should use the `I2P Android client library`__, which contains\n"
+"the same libraries along with Android-specific helpers. I'll be updating it soon\n"
+"to depend on the new I2P libraries, so that cross-platform applications can work\n"
 "natively with either I2P Android or desktop I2P."
 msgstr ""
 
@@ -5901,10 +5413,8 @@ msgstr ""
 
 #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:89
 msgid ""
-"See our `application development`__ guide for help getting started with "
-"these\n"
-"libraries. You can also chat with us about them in #i2p-dev on IRC. And "
-"if you\n"
+"See our `application development`__ guide for help getting started with these\n"
+"libraries. You can also chat with us about them in #i2p-dev on IRC. And if you\n"
 "do start using them, let us know what you're working on with the hashtag\n"
 "`#I2PSummer`__ on Twitter!"
 msgstr ""
@@ -5918,26 +5428,22 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:11
 msgid ""
-"In the first month of Summer Dev, we have improved the usability of our "
-"APIs for Java, Android, and Python developers."
+"In the first month of Summer Dev, we have improved the usability of our APIs"
+" for Java, Android, and Python developers."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:13
 msgid ""
-"Summer Dev is in full swing: we've been busy greasing wheels, sanding "
-"edges, and\n"
-"tidying the place up. Now it's time for our first roundup, where we bring"
-" you up\n"
+"Summer Dev is in full swing: we've been busy greasing wheels, sanding edges, and\n"
+"tidying the place up. Now it's time for our first roundup, where we bring you up\n"
 "to speed on the progress we are making!"
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:19
 msgid ""
 "\n"
-"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us"
-" the\n"
-"fantastic logo you see above. It adds a cheerful personality to our "
-"development\n"
+"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us the\n"
+"fantastic logo you see above. It adds a cheerful personality to our development\n"
 "program (and is going to look great on t-shirts)."
 msgstr ""
 
@@ -5949,48 +5455,37 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:33
 msgid ""
-"Our goal for this month was to \"blend in\" - to make our APIs and "
-"libraries work\n"
-"within the existing infrastructure of various communities, so that "
-"application\n"
-"developers can work with I2P more efficiently, and users don't need to "
-"worry\n"
+"Our goal for this month was to \"blend in\" - to make our APIs and libraries work\n"
+"within the existing infrastructure of various communities, so that application\n"
+"developers can work with I2P more efficiently, and users don't need to worry\n"
 "about the details."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:43
 msgid ""
-"The I2P client libraries are now available on `Maven Central`__ ! See our"
-"\n"
+"The I2P client libraries are now available on `Maven Central`__ ! See our\n"
 "`previous blog post`__ for full details.\n"
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:58
 msgid ""
-"The `I2P Android client library`__ has also been updated to use the new "
-"I2P\n"
-"libraries. This means that cross-platform applications can work natively "
-"with\n"
+"The `I2P Android client library`__ has also been updated to use the new I2P\n"
+"libraries. This means that cross-platform applications can work natively with\n"
 "either I2P Android or desktop I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:71
 msgid ""
-"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work"
-"\n"
+"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work\n"
 "seamlessly over local, remote, and port-forwarded `SAM APIs`__. See its\n"
-"`documentation`__ for usage instructions, and report any issues on "
-"`GitHub`__."
+"`documentation`__ for usage instructions, and report any issues on `GitHub`__."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:84
 msgid ""
-"The first (beta) version of ``i2psocket`` has been released! This is a "
-"direct\n"
-"replacement for the standard Python ``socket`` library that extends it "
-"with I2P\n"
-"support over the SAM API. See its `GitHub page`__ for usage instructions,"
-" and\n"
+"The first (beta) version of ``i2psocket`` has been released! This is a direct\n"
+"replacement for the standard Python ``socket`` library that extends it with I2P\n"
+"support over the SAM API. See its `GitHub page`__ for usage instructions, and\n"
 "to report any issues."
 msgstr ""
 
@@ -6002,15 +5497,15 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:98
 msgid ""
-"zzz has been hard at work on Syndie, getting a headstart on Plugins "
-"month. You can follow his progress on `the development forum thread`__."
+"zzz has been hard at work on Syndie, getting a headstart on Plugins month. "
+"You can follow his progress on `the development forum thread`__."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:100
 msgid ""
-"psi has been creating an I2P test network using i2pd, and in the process "
-"has found and fixed several i2pd bugs that will improve its compatibility"
-" with Java I2P."
+"psi has been creating an I2P test network using i2pd, and in the process has"
+" found and fixed several i2pd bugs that will improve its compatibility with "
+"Java I2P."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:104
@@ -6021,21 +5516,16 @@ msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:109
 msgid ""
-"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a "
-"long time\n"
-"been home to one of the `largest public grids`__, using a patched version"
-" of\n"
-"Tahoe-LAFS. During Apps month we will be helping them with their ongoing "
-"work to\n"
-"add native support for I2P and Tor, so that I2P users can benefit from "
-"all of\n"
+"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a long time\n"
+"been home to one of the `largest public grids`__, using a patched version of\n"
+"Tahoe-LAFS. During Apps month we will be helping them with their ongoing work to\n"
+"add native support for I2P and Tor, so that I2P users can benefit from all of\n"
 "the improvements upstream."
 msgstr ""
 
 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:117
 msgid ""
-"There are several other projects that we will be talking with about their"
-" plans\n"
+"There are several other projects that we will be talking with about their plans\n"
 "for I2P integration, and helping with design. Stay tuned!"
 msgstr ""
 
@@ -6053,19 +5543,9 @@ msgstr "0.9.27 conține remedieri de erori"
 #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:18
 msgid ""
 "0.9.27 contains a number of bug fixes.\n"
-"The updated GMP library for crypto acceleration, which was bundled in the"
-" 0.9.26 release for new installs and Debian builds only, is now included "
-"in the in-network update for 0.9.27.\n"
-"There are improvements in IPv6 transports, SSU peer testing, and hidden "
-"mode."
-msgstr ""
-"0.9.27 conține o serie de remedieri de erori.\n"
-"Biblioteca GMP actualizată pentru accelerarea criptografică, care a fost "
-"inclusă în \n"
-"versiunea 0.9.26 pentru noi instalări și doar pentru sistemele Debian, "
-"este acum inclusă în actualizarea în rețea pentru 0.9.27.\n"
-"Există îmbunătățiri în domeniul transporturilor IPv6, testarea "
-"partenerului SSU, și a modului ascuns."
+"The updated GMP library for crypto acceleration, which was bundled in the 0.9.26 release for new installs and Debian builds only, is now included in the in-network update for 0.9.27.\n"
+"There are improvements in IPv6 transports, SSU peer testing, and hidden mode."
+msgstr "0.9.27 conține o serie de remedieri de erori.\nBiblioteca GMP actualizată pentru accelerarea criptografică, care a fost inclusă în \nversiunea 0.9.26 pentru noi instalări și doar pentru sistemele Debian, este acum inclusă în actualizarea în rețea pentru 0.9.27.\nExistă îmbunătățiri în domeniul transporturilor IPv6, testarea partenerului SSU, și a modului ascuns."
 
 #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:24
 msgid ""
@@ -6162,34 +5642,17 @@ msgstr "0.9.28 conține remedieri de erori"
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:18
 msgid ""
-"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number "
-"of bundled software packages including Jetty.\n"
-"There are fixes for the IPv6 peer testing feature introduced last "
-"release.\n"
-"We continue improvements to detect and block peers that are potentially "
-"malicious.\n"
-"There are preliminary fixes for Java 9, although we do not yet recommend "
-"Java 9 for general use."
-msgstr ""
-"0.9.28 conține remedieri pentru peste 25 de bilete Trac, și actualizări "
-"pentru un număr de pachete de programe incluse, inclusiv Jetty.\n"
-"Corecții pentru funcția de testare a partener la partener IPv6 introdusă "
-"la ultima lansare.\n"
-"Vom continua să îmbunătățim detectarea și blocarea partenerilor de rețea,"
-" care sunt potențial rău intenționați.\n"
-"Aici sunt corecții preliminare pentru Java 9, cu toate că nu recomandăm "
-"încă Java 9 pentru uz general."
+"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number of bundled software packages including Jetty.\n"
+"There are fixes for the IPv6 peer testing feature introduced last release.\n"
+"We continue improvements to detect and block peers that are potentially malicious.\n"
+"There are preliminary fixes for Java 9, although we do not yet recommend Java 9 for general use."
+msgstr "0.9.28 conține remedieri pentru peste 25 de bilete Trac, și actualizări pentru un număr de pachete de programe incluse, inclusiv Jetty.\nCorecții pentru funcția de testare a partener la partener IPv6 introdusă la ultima lansare.\nVom continua să îmbunătățim detectarea și blocarea partenerilor de rețea, care sunt potențial rău intenționați.\nAici sunt corecții preliminare pentru Java 9, cu toate că nu recomandăm încă Java 9 pentru uz general."
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:25
 msgid ""
-"I2P will be at 33C3, please stop by our table and give us your ideas on "
-"how to improve the network.\n"
+"I2P will be at 33C3, please stop by our table and give us your ideas on how to improve the network.\n"
 "We will review our 2017 roadmap and priorities 2017 at the Congress."
-msgstr ""
-"I2P va fi la 33C3, vă rugăm să vă opriți la masa noastră și să ne dați "
-"idei cu privire la modul de îmbunătățire a rețelei.\n"
-"Vom analiza foaia noastră de parcurs a lui 2017 și prioritățile lui 2017 "
-"la Congres."
+msgstr "I2P va fi la 33C3, vă rugăm să vă opriți la masa noastră și să ne dați idei cu privire la modul de îmbunătățire a rețelei.\nVom analiza foaia noastră de parcurs a lui 2017 și prioritățile lui 2017 la Congres."
 
 #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:50
 msgid "Fix version test for SSU IPv6 peer testing"
@@ -6364,24 +5827,13 @@ msgstr "0.9.29 conține remedieri de erori"
 
 #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:18
 msgid ""
-"0.9.29 contains fixes for numerous Trac tickets, including workarounds "
-"for corrupt compressed messages.\n"
+"0.9.29 contains fixes for numerous Trac tickets, including workarounds for corrupt compressed messages.\n"
 "We now support NTP over IPv6.\n"
 "We've added preliminary Docker support.\n"
 "We now have translated man pages.\n"
 "We now pass same-origin Referer headers through the HTTP proxy.\n"
-"There are more fixes for Java 9, although we do not yet recommend Java 9 "
-"for general use."
-msgstr ""
-"0.9.29 conține remedieri pentru numeroase bilete Trac, inclusiv soluții "
-"pentru mesajele comprimate corupte.\n"
-"Acum suportăm NTP peste IPv6.\n"
-"Am adăugat suport preliminar Docker.\n"
-"Am tradus acum paginile man.\n"
-"Acum trecem antetele adresei URL sursă de același origine prin proxy "
-"HTTP.\n"
-"Există mai multe corecții pentru Java 9, cu toate că nu recomandăm încă "
-"Java 9 pentru uz general."
+"There are more fixes for Java 9, although we do not yet recommend Java 9 for general use."
+msgstr "0.9.29 conține remedieri pentru numeroase bilete Trac, inclusiv soluții pentru mesajele comprimate corupte.\nAcum suportăm NTP peste IPv6.\nAm adăugat suport preliminar Docker.\nAm tradus acum paginile man.\nAcum trecem antetele adresei URL sursă de același origine prin proxy HTTP.\nExistă mai multe corecții pentru Java 9, cu toate că nu recomandăm încă Java 9 pentru uz general."
 
 #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:37
 msgid "BOB database refactor"
@@ -6492,11 +5944,9 @@ msgstr ""
 
 #: i2p2www/blog/2017/03/04/0.9.29-Windows-Installer-Fix.rst:18
 msgid ""
-"The 0.9.29 Windows installer posted on our website two days ago fails "
-"during install with an Exception.\n"
+"The 0.9.29 Windows installer posted on our website two days ago fails during install with an Exception.\n"
 "We have fixed the bug and posted the new installer to our website.\n"
-"This does not affect upgrades from previous releases or non-Windows "
-"installers.\n"
+"This does not affect upgrades from previous releases or non-Windows installers.\n"
 "We apologize for the issue."
 msgstr ""
 
@@ -6514,53 +5964,39 @@ msgstr ""
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:18
 msgid ""
 "0.9.30 contains an upgrade to Jetty 9 and Tomcat 8.\n"
-"The previous versions are no longer supported, and are not available in "
-"the upcoming Debian Stretch and Ubuntu Zesty releases."
+"The previous versions are no longer supported, and are not available in the upcoming Debian Stretch and Ubuntu Zesty releases."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:23
 msgid ""
-"The router will migrate the jetty.xml configuration file for each Jetty "
-"website to the new Jetty 9 setup.\n"
-"This should work for recent, unmodified configurations but may not work "
-"for modified or very old setups.\n"
-"Verify that your Jetty website works after upgrading, and contact us on "
-"IRC if you need assistance."
+"The router will migrate the jetty.xml configuration file for each Jetty website to the new Jetty 9 setup.\n"
+"This should work for recent, unmodified configurations but may not work for modified or very old setups.\n"
+"Verify that your Jetty website works after upgrading, and contact us on IRC if you need assistance."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:29
 msgid ""
 "Several plugins are not compatible with Jetty 9 and must be updated.\n"
-"The following plugins have been updated to work with 0.9.30, and your "
-"router should update them after restart:"
+"The following plugins have been updated to work with 0.9.30, and your router should update them after restart:"
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:35
 msgid ""
-"The following plugins (with current versions listed) will not work with "
-"0.9.30.\n"
+"The following plugins (with current versions listed) will not work with 0.9.30.\n"
 "Contact the appropriate plugin developer for the status of new versions:"
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:41
 msgid ""
-"This release also supports migration of old (2014 and earlier) DSA-SHA1 "
-"hidden services to the more-secure EdDSA signature type.\n"
-"See http://zzz.i2p/topics/2271 for further information, including a guide"
-" and FAQ."
+"This release also supports migration of old (2014 and earlier) DSA-SHA1 hidden services to the more-secure EdDSA signature type.\n"
+"See http://zzz.i2p/topics/2271 for further information, including a guide and FAQ."
 msgstr ""
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:46
 msgid ""
-"Note: On non-Android ARM platforms such as the Raspberry Pi, the "
-"blockfile database will upgrade on restart, which may take several "
-"minutes.\n"
+"Note: On non-Android ARM platforms such as the Raspberry Pi, the blockfile database will upgrade on restart, which may take several minutes.\n"
 "Please be patient."
-msgstr ""
-"Notă: pe platforme non-Android ARM, cum ar fi Raspberry Pi, baza de date "
-"blocfile va face upgrade la repornire, ceea ce poate dura câteva minute."
-"\n"
-"Te rog fii rabdator."
+msgstr "Notă: pe platforme non-Android ARM, cum ar fi Raspberry Pi, baza de date blocfile va face upgrade la repornire, ceea ce poate dura câteva minute.\nTe rog fii rabdator."
 
 #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:61
 msgid "Jetty 9, Tomcat 8"
@@ -6671,41 +6107,32 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:11
 msgid ""
-"This year's Summer Dev will be focused on metrics collection and "
-"performance improvements for the network."
+"This year's Summer Dev will be focused on metrics collection and performance"
+" improvements for the network."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:13
 msgid ""
 "It's that time of year again! We're embarking on our summer development\n"
-"programme, where we focus on a particular aspect of I2P to push it "
-"forward. For\n"
-"the next three months, we'll be encouraging both new contributors and "
-"existing\n"
+"programme, where we focus on a particular aspect of I2P to push it forward. For\n"
+"the next three months, we'll be encouraging both new contributors and existing\n"
 "community members to pick a task and have fun with it!"
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:20
 msgid ""
-"`Last year`__, we focused on helping users and developers leverage I2P, "
-"by\n"
-"improving API tooling and giving some love to applications that run over "
-"I2P.\n"
-"This year, we want to improve the user experience by working on an aspect"
-" that\n"
+"`Last year`__, we focused on helping users and developers leverage I2P, by\n"
+"improving API tooling and giving some love to applications that run over I2P.\n"
+"This year, we want to improve the user experience by working on an aspect that\n"
 "affects everyone: performance."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:29
 msgid ""
-"Despite onion-routing networks often being called \"low-latency\" "
-"networks, there\n"
-"is significant overhead created by routing traffic through additional "
-"computers.\n"
-"I2P's unidirectional tunnel design means that by default, a round trip "
-"between\n"
-"two Destinations will involve twelve participants! Improving the "
-"performance of\n"
+"Despite onion-routing networks often being called \"low-latency\" networks, there\n"
+"is significant overhead created by routing traffic through additional computers.\n"
+"I2P's unidirectional tunnel design means that by default, a round trip between\n"
+"two Destinations will involve twelve participants! Improving the performance of\n"
 "these participants will help to both reduce the latency of end-to-end\n"
 "connections [1]_, and increase the quality of tunnels network-wide."
 msgstr ""
@@ -6728,11 +6155,9 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:52
 msgid ""
-"We can't tell if we improve performance without a baseline! We'll be "
-"creating a\n"
+"We can't tell if we improve performance without a baseline! We'll be creating a\n"
 "metrics system for collecting usage and performance data about I2P in a\n"
-"privacy-preserving way, as well as porting various benchmarking tools to "
-"run\n"
+"privacy-preserving way, as well as porting various benchmarking tools to run\n"
 "over I2P (e.g. iperf3_)."
 msgstr ""
 
@@ -6744,10 +6169,8 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:66
 msgid ""
-"There's a lot of scope for improving the performance of our existing "
-"code, to\n"
-"e.g. reduce the overhead of participating in tunnels. We will be looking "
-"at\n"
+"There's a lot of scope for improving the performance of our existing code, to\n"
+"e.g. reduce the overhead of participating in tunnels. We will be looking at\n"
 "potential improvements to:"
 msgstr ""
 
@@ -6777,14 +6200,10 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:86
 msgid ""
-"We have several open proposals for improving the scalability of the I2P "
-"network\n"
-"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We "
-"will be\n"
-"working on these proposals, and begin implementing the finalised ones in "
-"the\n"
-"various network routers. The more feedback these proposals receive, the "
-"sooner\n"
+"We have several open proposals for improving the scalability of the I2P network\n"
+"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We will be\n"
+"working on these proposals, and begin implementing the finalised ones in the\n"
+"various network routers. The more feedback these proposals receive, the sooner\n"
 "we can roll them out, and the sooner I2P services can start using them!"
 msgstr ""
 
@@ -6796,46 +6215,36 @@ msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:106
 msgid ""
-"I2P is a packet-switched network, like the internet it runs on top of. "
-"This\n"
-"gives us significant flexibility in how we route packets, both for "
-"performance\n"
+"I2P is a packet-switched network, like the internet it runs on top of. This\n"
+"gives us significant flexibility in how we route packets, both for performance\n"
 "and privacy. The majority of this flexibility is unexplored! We want to\n"
-"encourage research into how various clearnet techniques for improving "
-"bandwidth\n"
+"encourage research into how various clearnet techniques for improving bandwidth\n"
 "can be applied to I2P, and how they might affect the privacy of network\n"
 "participants."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:120
 msgid ""
-"We have many more ideas for things we'd like to get done in these areas. "
-"If\n"
-"you're interested in hacking on privacy and anonymity software, designing"
-"\n"
-"protocols (cryptographic or otherwise), or researching future ideas - "
-"come and\n"
-"chat with us on IRC or Twitter! We are always happy to welcome newcomers "
-"into\n"
-"our community, both inside and outside the I2P network. We'll also be "
-"sending\n"
-"I2P stickers out to all new contributors taking part! If you want to chat"
-" about\n"
-"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You"
-" can\n"
+"We have many more ideas for things we'd like to get done in these areas. If\n"
+"you're interested in hacking on privacy and anonymity software, designing\n"
+"protocols (cryptographic or otherwise), or researching future ideas - come and\n"
+"chat with us on IRC or Twitter! We are always happy to welcome newcomers into\n"
+"our community, both inside and outside the I2P network. We'll also be sending\n"
+"I2P stickers out to all new contributors taking part! If you want to chat about\n"
+"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You can\n"
 "also find us in #i2p-dev on OFTC or Freenode."
 msgstr ""
 
 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:142
 msgid ""
-"Low-latency onion-routing networks are vulnerable to traffic confirmation"
-" attacks, so it would be reasonable to ask whether improved performance "
+"Low-latency onion-routing networks are vulnerable to traffic confirmation "
+"attacks, so it would be reasonable to ask whether improved performance "
 "equates to reduced privacy. Some latency can help privacy if applied "
 "correctly via random delays or batching (neither of which are currently "
-"employed by any general-purpose onion-routing network). However, if a "
-"tunnel has uniform overall latency, then traffic confirmation attacks "
-"should be just as viable with or without that latency; thus there should "
-"be little statistical difference when the latency is reduced uniformly."
+"employed by any general-purpose onion-routing network). However, if a tunnel"
+" has uniform overall latency, then traffic confirmation attacks should be "
+"just as viable with or without that latency; thus there should be little "
+"statistical difference when the latency is reduced uniformly."
 msgstr ""
 
 #: i2p2www/blog/2017/08/07/0.9.31-Release.rst:1
@@ -6855,8 +6264,7 @@ msgid ""
 "We have refreshed the router console to make it easier to understand,\n"
 "improve accessibility and cross-browser support,\n"
 "and generally tidy things up.\n"
-"This is the first step in a longer-term plan to make the router console "
-"more user-friendly.\n"
+"This is the first step in a longer-term plan to make the router console more user-friendly.\n"
 "We have also added torrent ratings and comments support to i2psnark."
 msgstr ""
 
@@ -6926,19 +6334,10 @@ msgstr ""
 
 #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:18
 msgid ""
-"0.9.32 contains a number of fixes in the router console and associated "
-"webapps (addressbook, i2psnark, and susimail).\n"
-"We have also changed the way we handle configured hostnames for published"
-" router infos, to eliminate some network enumeration attacks via DNS.\n"
+"0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail).\n"
+"We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS.\n"
 "We have added some checks in the console to resist rebinding attacks."
-msgstr ""
-"0.9.32 conține un număr de remedii în consola routerului și în "
-"aplicațiile web asociate (addressbook, i2psnark și susimail).\n"
-"De asemenea, am schimbat modul în care gestionăm numele de gazdă "
-"configurat pentru informațiile publicate despre router, pentru a elimina "
-"unele atacuri de enumerare a rețelei prin DNS.\n"
-"Am adăugat câteva verificări în consola pentru a rezista atacurilor de "
-"reconectare."
+msgstr "0.9.32 conține un număr de remedii în consola routerului și în aplicațiile web asociate (addressbook, i2psnark și susimail).\nDe asemenea, am schimbat modul în care gestionăm numele de gazdă configurat pentru informațiile publicate despre router, pentru a elimina unele atacuri de enumerare a rețelei prin DNS.\nAm adăugat câteva verificări în consola pentru a rezista atacurilor de reconectare."
 
 #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:34
 msgid "Disallow hostnames in router addresses (proposal 141)"
@@ -6978,22 +6377,11 @@ msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:17
 msgid ""
-"0.9.33 contains a large number of bug fixes, including i2psnark, "
-"i2ptunnel, streaming, and SusiMail.\n"
-"For those who cannot access the reseed sites directly, we now support "
-"several types of proxies for reseeding.\n"
+"0.9.33 contains a large number of bug fixes, including i2psnark, i2ptunnel, streaming, and SusiMail.\n"
+"For those who cannot access the reseed sites directly, we now support several types of proxies for reseeding.\n"
 "We now set rate limits by default in the hidden services manager.\n"
-"For those that run high-traffic servers, please review and adjust the "
-"limits as necessary."
-msgstr ""
-"0.9.33 conține un număr mare de remediere a erorilor, incluzând i2psnark,"
-" i2ptunnel, streaming și SusiMail.\n"
-"Pentru cei care nu pot accesa direct site-urile  de reseed, suportăm acum"
-" mai multe tipuri de proxy-uri pentru reseeding.\n"
-"Acum setăm limitele ratei în mod implicit în managerul de servicii "
-"ascunse.\n"
-"Pentru cei care rulează servere cu trafic ridicat, vă rugăm să consultați"
-" și să ajustați limitele după cum este necesar."
+"For those that run high-traffic servers, please review and adjust the limits as necessary."
+msgstr "0.9.33 conține un număr mare de remediere a erorilor, incluzând i2psnark, i2ptunnel, streaming și SusiMail.\nPentru cei care nu pot accesa direct site-urile  de reseed, suportăm acum mai multe tipuri de proxy-uri pentru reseeding.\nAcum setăm limitele ratei în mod implicit în managerul de servicii ascunse.\nPentru cei care rulează servere cu trafic ridicat, vă rugăm să consultați și să ajustați limitele după cum este necesar."
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:34
 msgid "DesktopGui: Enable on OSX"
@@ -7080,7 +6468,8 @@ msgid "SusiMail: Fix several issues when using multiple browser tabs"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:62
-msgid "SusuMail: Fix bugs corrupting text attachments and large message bodies"
+msgid ""
+"SusuMail: Fix bugs corrupting text attachments and large message bodies"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:63
@@ -7147,8 +6536,7 @@ msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:83
 msgid ""
-"Debian: Remove ecj dependency; replace glassfish with libtaglibs where "
-"able"
+"Debian: Remove ecj dependency; replace glassfish with libtaglibs where able"
 msgstr ""
 
 #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:84
@@ -7218,12 +6606,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:13
 msgid ""
-"One of the many things we discussed at 34C3 was what we should focus on "
-"for the\n"
-"coming year. In particular, we wanted a roadmap that was clear about what"
-" we\n"
-"want to ensure we get done, vs what would be really nice to have, and be "
-"able to\n"
+"One of the many things we discussed at 34C3 was what we should focus on for the\n"
+"coming year. In particular, we wanted a roadmap that was clear about what we\n"
+"want to ensure we get done, vs what would be really nice to have, and be able to\n"
 "help onboard newcomers to either category. Here is what we came up with:"
 msgstr ""
 
@@ -7235,14 +6620,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:25
 msgid ""
-"Many of the current primitives and protocols still retain their original "
-"designs\n"
-"from circa 2005, and need improvement. We have had a number of open "
-"proposals\n"
-"for several years with ideas, but forward progress has been slow. We all "
-"agreed\n"
-"that this needs to be our top priority for 2018. The core components are:"
-"\n"
+"Many of the current primitives and protocols still retain their original designs\n"
+"from circa 2005, and need improvement. We have had a number of open proposals\n"
+"for several years with ideas, but forward progress has been slow. We all agreed\n"
+"that this needs to be our top priority for 2018. The core components are:\n"
 "\n"
 "- New transport protocols (to replace NTCP and SSU). See Prop111_.\n"
 "- New onion-encryption protocol for building and using tunnels.\n"
@@ -7261,8 +6642,7 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:50
 msgid ""
-"We cannot release new protocol specifications across the entire network "
-"without\n"
+"We cannot release new protocol specifications across the entire network without\n"
 "work on all of these areas."
 msgstr ""
 
@@ -7274,31 +6654,24 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:60
 msgid ""
-"One of the benefits of starting the above work now, is that over the last"
-" few\n"
+"One of the benefits of starting the above work now, is that over the last few\n"
 "years there have been independent efforts to create simple protocols and\n"
-"protocol frameworks that achieve many of the aims we have for our own "
-"protocols,\n"
-"and have gained traction with the wider community. By leveraging this "
-"work, we\n"
+"protocol frameworks that achieve many of the aims we have for our own protocols,\n"
+"and have gained traction with the wider community. By leveraging this work, we\n"
 "get a \"force multiplier\" effect:\n"
 "\n"
-"- We benefit from protocol designs, security proofs, and code written by "
-"others,\n"
+"- We benefit from protocol designs, security proofs, and code written by others,\n"
 "  reducing the amount of work we need to do for the same level of\n"
 "  feature-completeness and security assurances.\n"
 "\n"
-"- Work we do can be leveraged by other communities, increasing their "
-"interest in\n"
+"- Work we do can be leveraged by other communities, increasing their interest in\n"
 "  collaborating with us, and thinking about I2P as a whole."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:76
 msgid ""
-"My proposals in particular will be leveraging the `Noise Protocol "
-"Framework`_,\n"
-"and the `SPHINX packet format`_. I have collaborations lined up with "
-"several\n"
+"My proposals in particular will be leveraging the `Noise Protocol Framework`_,\n"
+"and the `SPHINX packet format`_. I have collaborations lined up with several\n"
 "people outside I2P for these!"
 msgstr ""
 
@@ -7310,16 +6683,11 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:90
 msgid ""
-"On that topic, we've been slowly building interest over the last six "
-"months or\n"
-"so. Across PETS2017, 34C3, and RWC2018, I've had some very good "
-"discussions\n"
-"about ways in which we can improve collaboration with the wider "
-"community. This\n"
-"is really important to ensure we can garner as much review as possible "
-"for new\n"
-"protocols. The biggest blocker I've seen is the fact that the majority of"
-" I2P\n"
+"On that topic, we've been slowly building interest over the last six months or\n"
+"so. Across PETS2017, 34C3, and RWC2018, I've had some very good discussions\n"
+"about ways in which we can improve collaboration with the wider community. This\n"
+"is really important to ensure we can garner as much review as possible for new\n"
+"protocols. The biggest blocker I've seen is the fact that the majority of I2P\n"
 "development collaboration currently happens inside I2P itself, which\n"
 "significantly increases the effort required to contribute."
 msgstr ""
@@ -7328,8 +6696,7 @@ msgstr ""
 msgid ""
 "The two priorities in this area are:\n"
 "\n"
-"- Set up a project-run development forum that is accessible both inside "
-"and\n"
+"- Set up a project-run development forum that is accessible both inside and\n"
 "  outside I2P.\n"
 "\n"
 "- Set up mailing lists for review and discussion of proposals (possibly\n"
@@ -7340,21 +6707,17 @@ msgstr ""
 msgid ""
 "Other goals which are classed as nice-to-have:\n"
 "\n"
-"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit"
-"\n"
-"  clearnet contributions on GitHub while keeping the canonical dev "
-"environment\n"
+"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit\n"
+"  clearnet contributions on GitHub while keeping the canonical dev environment\n"
 "  on Monotone.\n"
 "\n"
-"- Write a \"position paper\" that accurately explains I2P to academic "
-"audiences,\n"
+"- Write a \"position paper\" that accurately explains I2P to academic audiences,\n"
 "  and puts it in context with existing literature."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:123
 msgid ""
-"I expect that collaborations with people outside I2P will be done "
-"entirely on\n"
+"I expect that collaborations with people outside I2P will be done entirely on\n"
 "GitHub, for minimal friction."
 msgstr ""
 
@@ -7366,24 +6729,18 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:133
 msgid ""
-"I2P is now in Debian Sid (their unstable repo) which will stablilise in "
-"around a\n"
+"I2P is now in Debian Sid (their unstable repo) which will stablilise in around a\n"
 "year and a half, and has also been pulled into the Ubuntu repository for\n"
-"inclusion in the next LTS release in April. We are going to start having "
-"I2P\n"
-"versions that end up hanging around for years, and we need to ensure we "
-"can\n"
+"inclusion in the next LTS release in April. We are going to start having I2P\n"
+"versions that end up hanging around for years, and we need to ensure we can\n"
 "handle their presence in the network."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:141
 msgid ""
-"The primary goal here is to roll out as many of the new protocols as we "
-"feasibly\n"
-"can in the next year, to hit the next Debian stable release. For those "
-"that\n"
-"require multi-year rollouts, we should incorporate the forward-"
-"compatability\n"
+"The primary goal here is to roll out as many of the new protocols as we feasibly\n"
+"can in the next year, to hit the next Debian stable release. For those that\n"
+"require multi-year rollouts, we should incorporate the forward-compatability\n"
 "changes as early as we can."
 msgstr ""
 
@@ -7395,32 +6752,24 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:153
 msgid ""
-"The Debian model encourages having separate packages for separate "
-"components. We\n"
-"agreed that decoupling the currently-bundled Java applications from the "
-"core\n"
+"The Debian model encourages having separate packages for separate components. We\n"
+"agreed that decoupling the currently-bundled Java applications from the core\n"
 "Java router would be beneficial for several reasons:\n"
 "\n"
 "- It codifies the boundary between the applications and the router.\n"
 "\n"
-"- It should make it easier to get these apps running with non-Java "
-"routers.\n"
+"- It should make it easier to get these apps running with non-Java routers.\n"
 "\n"
-"- It would enable third parties to create \"I2P bundles\" containing just"
-" the\n"
+"- It would enable third parties to create \"I2P bundles\" containing just the\n"
 "  applications they want."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:167
 msgid ""
-"In combination with the earlier priorities, this moves the main I2P "
-"project more\n"
-"in the direction of e.g. the Linux kernel. We will spend more time "
-"focusing on\n"
-"the network itself, leaving third-party developers to focus on "
-"applications that\n"
-"use the network (something that is significantly easier to do after our "
-"work in\n"
+"In combination with the earlier priorities, this moves the main I2P project more\n"
+"in the direction of e.g. the Linux kernel. We will spend more time focusing on\n"
+"the network itself, leaving third-party developers to focus on applications that\n"
+"use the network (something that is significantly easier to do after our work in\n"
 "the last few years on APIs and libraries)."
 msgstr ""
 
@@ -7432,25 +6781,18 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:180
 msgid ""
-"There are a bunch of app-level improvements that we want to work on, but "
-"do not\n"
-"currently have the developer time to do so, given our other priorities. "
-"This is\n"
-"an area we would love to see new contributors for! Once the above "
-"decoupling is\n"
-"complete, it will be significantly easier for someone to work on a "
-"specific\n"
+"There are a bunch of app-level improvements that we want to work on, but do not\n"
+"currently have the developer time to do so, given our other priorities. This is\n"
+"an area we would love to see new contributors for! Once the above decoupling is\n"
+"complete, it will be significantly easier for someone to work on a specific\n"
 "application independently of the main Java router."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:188
 msgid ""
-"One such application we would love to have help with is I2P Android. We "
-"will be\n"
-"keeping it up-to-date with the core I2P releases, and fixing bugs as we "
-"can, but\n"
-"there is much that could be done to improve the underlying code as well "
-"as the\n"
+"One such application we would love to have help with is I2P Android. We will be\n"
+"keeping it up-to-date with the core I2P releases, and fixing bugs as we can, but\n"
+"there is much that could be done to improve the underlying code as well as the\n"
 "usability."
 msgstr ""
 
@@ -7462,14 +6804,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:200
 msgid ""
-"Having said that, we do want to work specifically on Susimail and I2P-"
-"Bote fixes\n"
-"in the near term (some of which have landed in 0.9.33). They have had "
-"less work\n"
-"over the last few years than other I2P apps, and so we want to spend some"
-" time\n"
-"bringing their codebases up to par, and making them easier for new "
-"contributors\n"
+"Having said that, we do want to work specifically on Susimail and I2P-Bote fixes\n"
+"in the near term (some of which have landed in 0.9.33). They have had less work\n"
+"over the last few years than other I2P apps, and so we want to spend some time\n"
+"bringing their codebases up to par, and making them easier for new contributors\n"
 "to jump into!"
 msgstr ""
 
@@ -7481,14 +6819,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:213
 msgid ""
-"We have a large backlog of tickets in a number of I2P subsystems and "
-"apps. As\n"
-"part of the above stabilisation effort, we would love to clean up some of"
-" our\n"
-"older long-standing issues. More importantly, we want to ensure that our "
-"tickets\n"
-"are correctly organised, so that new contributors can find good tickets "
-"to work\n"
+"We have a large backlog of tickets in a number of I2P subsystems and apps. As\n"
+"part of the above stabilisation effort, we would love to clean up some of our\n"
+"older long-standing issues. More importantly, we want to ensure that our tickets\n"
+"are correctly organised, so that new contributors can find good tickets to work\n"
 "on."
 msgstr ""
 
@@ -7500,12 +6834,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:226
 msgid ""
-"One aspect of the above we will be focusing on is keeping in touch with "
-"users\n"
-"who take the time to report issues. Thank you! The smaller we can make "
-"the\n"
-"feedback loop, the quicker we can resolve problems that new users face, "
-"and the\n"
+"One aspect of the above we will be focusing on is keeping in touch with users\n"
+"who take the time to report issues. Thank you! The smaller we can make the\n"
+"feedback loop, the quicker we can resolve problems that new users face, and the\n"
 "more likely it is that they keep participating in the community."
 msgstr ""
 
@@ -7517,15 +6848,13 @@ msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:238
 msgid ""
-"That all looks very ambitious, and it is! But many of the items above "
-"overlap,\n"
+"That all looks very ambitious, and it is! But many of the items above overlap,\n"
 "and with careful planning we can make a serious dent in them."
 msgstr ""
 
 #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:243
 msgid ""
-"If you are interested in helping with any of the goals above, come chat "
-"to us!\n"
+"If you are interested in helping with any of the goals above, come chat to us!\n"
 "You can find us on OFTC and Freenode (#i2p-dev), and Twitter (@GetI2P)."
 msgstr ""
 
@@ -7551,18 +6880,10 @@ msgstr ""
 #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:17
 msgid ""
 "0.9.34 contains a lot of bug fixes!\n"
-"It also has improvements in SusiMail, IPv6 handling, and tunnel peer "
-"selection.\n"
+"It also has improvements in SusiMail, IPv6 handling, and tunnel peer selection.\n"
 "We add support for IGD2 schemas in UPnP.\n"
-"There's also preparation for more improvements you will see in future "
-"releases."
-msgstr ""
-"0.9.34 conține o mulțime de remedieri a erorilor!\n"
-"De asemenea, are îmbunătățiri pentru SusiMail, manipularea IPv6 și "
-"selecția peer-tunel.\n"
-"Adăugăm suport pentru schemele IGD2 în UPnP.\n"
-"Există, de asemenea, pregătiri pentru mai multe îmbunătățiri pe care le "
-"veți vedea în versiunile viitoare."
+"There's also preparation for more improvements you will see in future releases."
+msgstr "0.9.34 conține o mulțime de remedieri a erorilor!\nDe asemenea, are îmbunătățiri pentru SusiMail, manipularea IPv6 și selecția peer-tunel.\nAdăugăm suport pentru schemele IGD2 în UPnP.\nExistă, de asemenea, pregătiri pentru mai multe îmbunătățiri pe care le veți vedea în versiunile viitoare."
 
 #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:34
 msgid "SusiMail: Improved startup and memory management"
@@ -7624,26 +6945,19 @@ msgstr "0.9.35 cu dosare SusiMail și Expert SSL"
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:16
 msgid ""
-"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for "
-"setting up HTTPS on your Hidden Service website.\n"
+"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.\n"
 "We also have the usual collection of bug fixes, especially in SusiMail."
-msgstr ""
-"0.9.35 adaugă suport pentru dosare în SusiMail și un nou expert SSL "
-"pentru configurarea HTTPS pe site-ul dvs. de servicii ascunse.\n"
-"De asemenea, avem colecția uzuală pentru remedierea erorilor, în special "
-"în SusiMail."
+msgstr "0.9.35 adaugă suport pentru dosare în SusiMail și un nou expert SSL pentru configurarea HTTPS pe site-ul dvs. de servicii ascunse.\nDe asemenea, avem colecția uzuală pentru remedierea erorilor, în special în SusiMail."
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:21
 msgid ""
 "We're hard at work on several things for 0.9.36, including a new OSX "
 "installer and a faster, more secure transport protocol called NTCP2."
-msgstr ""
-"Lucram din greu la mai multe lucruri pentru 0.9.36, incluzând un nou "
-"program de instalare OSX și un protocol de transport mai rapid și mai "
-"sigur, numit NTCP2."
+msgstr "Lucram din greu la mai multe lucruri pentru 0.9.36, incluzând un nou program de instalare OSX și un protocol de transport mai rapid și mai sigur, numit NTCP2."
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:25
-msgid "I2P will be at HOPE in New York City, July 20-22. Find us and say hello!"
+msgid ""
+"I2P will be at HOPE in New York City, July 20-22. Find us and say hello!"
 msgstr "I2P va fi la HOPE în New York City, 20-22 iulie. Găsiți-ne și salutați-ne!"
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:39
@@ -7663,7 +6977,8 @@ msgid "CPUID: Fix TBM detection"
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:48
-msgid "i2psnark: Fix torrents ignoring priority settings when autostart enabled"
+msgid ""
+"i2psnark: Fix torrents ignoring priority settings when autostart enabled"
 msgstr ""
 
 #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:49
@@ -7739,25 +7054,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:20
 msgid ""
-"I2P's transport protocols were originally developed around 15 years ago. "
-"Back \n"
-"then, the main goal was to hide the transferred data, not to hide the "
-"fact that \n"
-"one was using the protocol itself. Nobody thought seriously about "
-"protecting \n"
-"against DPI (deep packets inspection) and protocols censorship. Times "
-"change, \n"
-"and even though original transport protocols are still providing strong "
-"security, \n"
-"there was a demand for a new transport protocol. NTCP2 is designed to "
-"resist \n"
-"current censorship threats. Mainly, DPI analysis of packets length. Plus,"
-" the new \n"
-"protocol uses the most modern cryptography developments. NTCP2 is based "
-"on the \n"
+"I2P's transport protocols were originally developed around 15 years ago. Back \n"
+"then, the main goal was to hide the transferred data, not to hide the fact that \n"
+"one was using the protocol itself. Nobody thought seriously about protecting \n"
+"against DPI (deep packets inspection) and protocols censorship. Times change, \n"
+"and even though original transport protocols are still providing strong security, \n"
+"there was a demand for a new transport protocol. NTCP2 is designed to resist \n"
+"current censorship threats. Mainly, DPI analysis of packets length. Plus, the new \n"
+"protocol uses the most modern cryptography developments. NTCP2 is based on the \n"
 "`Noise Protocol Framework`_, with SHA256 \n"
-"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) "
-"key \n"
+"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) key \n"
 "exchange."
 msgstr ""
 
@@ -7779,23 +7085,17 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:59
 msgid ""
-"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of "
-"ElGamal \n"
-"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, "
-"and uses \n"
-"SipHash for obfuscating the packet's length information. The key "
-"derivation \n"
+"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of ElGamal \n"
+"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, and uses \n"
+"SipHash for obfuscating the packet's length information. The key derivation \n"
 "function used in NTCP2 is more complex, now using many HMAC-SHA256 calls."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:66
 msgid ""
-"i2pd (C++) implementation note: All of the algorithms mentioned above, "
-"except \n"
-"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the "
-"coming \n"
-"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is "
-"used in \n"
+"i2pd (C++) implementation note: All of the algorithms mentioned above, except \n"
+"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the coming \n"
+"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is used in \n"
 "most of the current systems, core i2pd developer \n"
 "`Jeff Becker`_ has contributed standalone \n"
 "implementations of missing cryptographic algorithms."
@@ -7809,40 +7109,28 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:82
 msgid ""
-"NTCP2 requires having a third (x25519) key in addition to existing two "
-"(the \n"
-"encryption and signature keys). It is called a static key and it has to "
-"be added \n"
-"to any of RouterInfo addresses as an \"s\" parameter. It is required for "
-"both \n"
-"NTCP2 initiator (Alice) and responder (Bob). If more than one address "
-"supports \n"
-"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for "
-"all of \n"
-"them. Alice's address is allowed to have just the \"s\" parameter without"
-" \"host\" \n"
-"and \"port\" set. Also, a \"v\" parameter is required, that is currently "
-"always set \n"
+"NTCP2 requires having a third (x25519) key in addition to existing two (the \n"
+"encryption and signature keys). It is called a static key and it has to be added \n"
+"to any of RouterInfo addresses as an \"s\" parameter. It is required for both \n"
+"NTCP2 initiator (Alice) and responder (Bob). If more than one address supports \n"
+"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for all of \n"
+"them. Alice's address is allowed to have just the \"s\" parameter without \"host\" \n"
+"and \"port\" set. Also, a \"v\" parameter is required, that is currently always set \n"
 "to \"2\"."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:93
 msgid ""
-"NTCP2 address can be declared as a separate NTCP2 address or as an old-"
-"style \n"
-"NTCP address with additional parameters, in which case it will accept "
-"both \n"
-"NTCP and NTCP2 connections. Java I2P implementation uses the second "
-"approach, \n"
+"NTCP2 address can be declared as a separate NTCP2 address or as an old-style \n"
+"NTCP address with additional parameters, in which case it will accept both \n"
+"NTCP and NTCP2 connections. Java I2P implementation uses the second approach, \n"
 "i2pd (C++ implementation) uses the first."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:100
 msgid ""
-"If a node accepts NTCP2 connections, it has to publish its RouterInfo "
-"with the \n"
-"\"i\" parameter, which is used as an initialization vector (IV) for the "
-"public \n"
+"If a node accepts NTCP2 connections, it has to publish its RouterInfo with the \n"
+"\"i\" parameter, which is used as an initialization vector (IV) for the public \n"
 "encryption key when that node establishes new connections."
 msgstr ""
 
@@ -7854,14 +7142,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:111
 msgid ""
-"To establish a connection both sides need to generate pairs of ephemeral "
-"x25519 \n"
-"keys. Based on those keys and \"static\" keys they derive a set of keys "
-"for data \n"
-"transferring. Both parties must verify that the other side actually has a"
-" \n"
-"private key for that static key, and that static key is the same as in "
-"RouterInfo."
+"To establish a connection both sides need to generate pairs of ephemeral x25519 \n"
+"keys. Based on those keys and \"static\" keys they derive a set of keys for data \n"
+"transferring. Both parties must verify that the other side actually has a \n"
+"private key for that static key, and that static key is the same as in RouterInfo."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:118
@@ -7870,29 +7154,23 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:131
 msgid ""
-"A common x25519 key, called «input key material», is computed for each "
-"message, \n"
-"after which message encryption key is generated with a MixKey function. A"
-" value \n"
+"A common x25519 key, called «input key material», is computed for each message, \n"
+"after which message encryption key is generated with a MixKey function. A value \n"
 "ck (chaining key) is kept while messages are being exchanged. \n"
-"That value is used as a final input when generating keys for data "
-"transferring."
+"That value is used as a final input when generating keys for data transferring."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:138
 msgid ""
-"MixKey function looks something like this in the C++ implementation of "
-"I2P:"
+"MixKey function looks something like this in the C++ implementation of I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:159
 msgid ""
-"**SessionRequest** message is made of a public x25519 Alice key (32 "
-"bytes), a \n"
+"**SessionRequest** message is made of a public x25519 Alice key (32 bytes), a \n"
 "block of data encrypted with AEAD/Chacha20/Poly1305 (16 bytes), a hash \n"
 "(16 bytes) and some random data in the end (padding). Padding length is \n"
-"defined in the encrypted block of data. Encrypted block also contains "
-"length of \n"
+"defined in the encrypted block of data. Encrypted block also contains length of \n"
 "the second part of the **SessionConfirmed** message. A block of data is \n"
 "encrypted and signed with a key derived from Alice's ephemeral key and \n"
 "Bob's static key. Initial ck value for MixKey function is set to SHA256 \n"
@@ -7901,38 +7179,28 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:170
 msgid ""
-"Since 32 bytes of public x25519 key can be detected by DPI, it is "
-"encrypted with \n"
-"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" "
-"parameter \n"
+"Since 32 bytes of public x25519 key can be detected by DPI, it is encrypted with \n"
+"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" parameter \n"
 "from RouterInfo as an initialization vector (IV)."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:176
 msgid ""
-"**SessionCreated** message has the same structure as **SessionRequest**, "
-"except \n"
-"the key is computed based on ephemeral keys of both sides. IV generated "
-"after \n"
-"encrypting/decrypting public key from **SessionRequest** message is used "
-"as IV \n"
+"**SessionCreated** message has the same structure as **SessionRequest**, except \n"
+"the key is computed based on ephemeral keys of both sides. IV generated after \n"
+"encrypting/decrypting public key from **SessionRequest** message is used as IV \n"
 "for encrypting/decrypting ephemeral public key."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:183
 msgid ""
 "**SessionConfirmed** message has 2 parts: public static key and Alice's \n"
-"RouterInfo. The difference from previous messages is that ephemeral "
-"public key \n"
-"is encrypted with AEAD/Chaha20/Poly1305 using the same key as "
-"**SessionCreated**. \n"
+"RouterInfo. The difference from previous messages is that ephemeral public key \n"
+"is encrypted with AEAD/Chaha20/Poly1305 using the same key as **SessionCreated**. \n"
 "It leads to increasing first part of the message from 32 to 48 bytes. \n"
-"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a"
-" new \n"
-"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo"
-" part \n"
-"can also be appended with random data padding, but it is not required, "
-"since \n"
+"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a new \n"
+"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo part \n"
+"can also be appended with random data padding, but it is not required, since \n"
 "RouterInfo usually has various length."
 msgstr ""
 
@@ -7944,29 +7212,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:199
 msgid ""
-"If every hash and key verification has succeeded, a common ck value must "
-"be \n"
-"present after the last MixKey operation on both sides. This value is used"
-" to \n"
-"generate two sets of keys <k, sipk, sipiv> for each side of a connection."
-" \"k\" is \n"
-"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an "
-"initial \n"
+"If every hash and key verification has succeeded, a common ck value must be \n"
+"present after the last MixKey operation on both sides. This value is used to \n"
+"generate two sets of keys <k, sipk, sipiv> for each side of a connection. \"k\" is \n"
+"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an initial \n"
 "value for SipHash IV, that is changed after each use."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:207
 msgid ""
-"Code used to generate keys looks like this in the C++ implementation of "
-"I2P:"
+"Code used to generate keys looks like this in the C++ implementation of I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:246
 msgid ""
-"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array "
-"are a \n"
-"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, "
-"but i2pd \n"
+"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array are a \n"
+"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, but i2pd \n"
 "handles them as a single 16 bytes key."
 msgstr ""
 
@@ -7993,28 +7254,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:271
 msgid ""
-"Message length is obfuscated by applying the XOR function with two first "
-"bytes \n"
+"Message length is obfuscated by applying the XOR function with two first bytes \n"
 "of the current SipHash IV."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:276
 msgid ""
-"Encrypted data part contains blocks of data. Each block is prepended with"
-" 3 \n"
-"bytes header, that defines block type and block length. Generally, I2NP "
-"type \n"
-"blocks are transferred, that are I2NP messages with an altered header. "
-"One NTCP2 \n"
+"Encrypted data part contains blocks of data. Each block is prepended with 3 \n"
+"bytes header, that defines block type and block length. Generally, I2NP type \n"
+"blocks are transferred, that are I2NP messages with an altered header. One NTCP2 \n"
 "frame can transfer multiple I2NP blocks."
 msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:283
 msgid ""
-"The other important data block type is a random data block. It is "
-"recommended to \n"
-"add a random data block to every NTCP2 frame. Only one random data block "
-"can be \n"
+"The other important data block type is a random data block. It is recommended to \n"
+"add a random data block to every NTCP2 frame. Only one random data block can be \n"
 "added and it must be the last block."
 msgstr ""
 
@@ -8024,12 +7279,8 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:293
 msgid ""
-"- RouterInfo  — usually contains Bob's RouterInfo after the connection "
-"has been established, but it can also contain RouterInfo of a random node"
-" for the purpose of speeding up floodfills (there is a flags field for "
-"that case). \n"
-"- Termination  — is used when a host explicitly terminates a connection "
-"and specifies a reason for that.\n"
+"- RouterInfo  — usually contains Bob's RouterInfo after the connection has been established, but it can also contain RouterInfo of a random node for the purpose of speeding up floodfills (there is a flags field for that case). \n"
+"- Termination  — is used when a host explicitly terminates a connection and specifies a reason for that.\n"
 "- DateTime — a current time in seconds."
 msgstr ""
 
@@ -8041,14 +7292,10 @@ msgstr ""
 
 #: i2p2www/blog/2018/08/20/NTCP2.rst:305
 msgid ""
-"The new I2P transport protocol NTCP2 provides effective resistance "
-"against DPI \n"
-"censorship. It also results in reduced CPU load because of the faster, "
-"modern \n"
-"cryptography used. It makes I2P more likely to run on low-end devices, "
-"such as \n"
-"smartphones and home routers. Both major I2P implementations have full "
-"support \n"
+"The new I2P transport protocol NTCP2 provides effective resistance against DPI \n"
+"censorship. It also results in reduced CPU load because of the faster, modern \n"
+"cryptography used. It makes I2P more likely to run on low-end devices, such as \n"
+"smartphones and home routers. Both major I2P implementations have full support \n"
 "for NTCP2 and it make NTCP2 available for use starting with version \n"
 "0.9.36 (Java) and 2.20 (i2pd, C++)."
 msgstr ""
@@ -8134,7 +7381,8 @@ msgid "i2psnark: Add icon for comments"
 msgstr ""
 
 #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:60
-msgid "i2ptunnel: Change read timeout defaults to account for streaming changes"
+msgid ""
+"i2ptunnel: Change read timeout defaults to account for streaming changes"
 msgstr ""
 
 #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:61
@@ -8159,7 +7407,8 @@ msgid "0.9.37 with NTCP2 enabled"
 msgstr "0.9.37 cu NTCP2 activat"
 
 #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:16
-msgid "0.9.37 enables the faster, more secure transport protocol called NTCP2."
+msgid ""
+"0.9.37 enables the faster, more secure transport protocol called NTCP2."
 msgstr ""
 
 #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:30
@@ -8200,27 +7449,19 @@ msgstr ""
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:18
 msgid ""
 "`Invisible Internet Project`_ (I2P) provides a framework for\n"
-"developing privacy-aware applications. It is a virtual network working on"
-" top of\n"
-"the regular Internet, in which hosts can exchange data without disclosing"
-" their\n"
-"\"real\" IP addresses. Connections inside I2P network are established "
-"between \n"
-"virtual addresses called *I2P destinations*. It's possible to have as "
-"many\n"
-"of destinations as one needs, even use a new destination for each "
-"connection,\n"
-"they don't disclose any information about the real IP address to the "
-"other\n"
+"developing privacy-aware applications. It is a virtual network working on top of\n"
+"the regular Internet, in which hosts can exchange data without disclosing their\n"
+"\"real\" IP addresses. Connections inside I2P network are established between \n"
+"virtual addresses called *I2P destinations*. It's possible to have as many\n"
+"of destinations as one needs, even use a new destination for each connection,\n"
+"they don't disclose any information about the real IP address to the other\n"
 "side."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:31
 msgid ""
-"This article describes basic concepts one needs to know when developing "
-"I2P\n"
-"applications. Code samples are written in Python with the use of built-in"
-"\n"
+"This article describes basic concepts one needs to know when developing I2P\n"
+"applications. Code samples are written in Python with the use of built-in\n"
 "asynchronous framework asyncio."
 msgstr ""
 
@@ -8233,15 +7474,11 @@ msgstr ""
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:42
 msgid ""
 "I2P provides many different APIs to the client applications. Regular\n"
-"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java "
-"applications \n"
-"usually use I2CP. For developing with other languages, like Python, the "
-"best \n"
+"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java applications \n"
+"usually use I2CP. For developing with other languages, like Python, the best \n"
 "option is `SAM`_. SAM is disabled by \n"
-"default in the original Java client implementation, so we need to enable "
-"it. \n"
-"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run "
-"at Startup\" \n"
+"default in the original Java client implementation, so we need to enable it. \n"
+"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run at Startup\" \n"
 "and press \"Start\", then \"Save Client Configuration\"."
 msgstr ""
 
@@ -8262,12 +7499,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:79
 msgid ""
-"This library works with the Python's built-in `asynchronous framework "
-"asyncio`_,\n"
-"so please note that code samples are taken from async functions "
-"(coroutines)\n"
-"which are running inside the event loop. Additional examples of i2plib "
-"usage can\n"
+"This library works with the Python's built-in `asynchronous framework asyncio`_,\n"
+"so please note that code samples are taken from async functions (coroutines)\n"
+"which are running inside the event loop. Additional examples of i2plib usage can\n"
 "be found in the `source code repository`_."
 msgstr ""
 
@@ -8279,10 +7513,8 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:94
 msgid ""
-"I2P destination is literally a set of encryption and cryptographic "
-"signature\n"
-"keys. Public keys from this set are published to the I2P network and are "
-"used to\n"
+"I2P destination is literally a set of encryption and cryptographic signature\n"
+"keys. Public keys from this set are published to the I2P network and are used to\n"
 "make connections instead of IP addresses."
 msgstr ""
 
@@ -8292,28 +7524,22 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:112
 msgid ""
-"base32 address is a hash which is used by other peers to discover your "
-"full\n"
-"Destination in the network. If you plan to use this destination as a "
-"permanent\n"
-"address in your program, save the binary data from "
-"*dest.private\\_key.data* \n"
+"base32 address is a hash which is used by other peers to discover your full\n"
+"Destination in the network. If you plan to use this destination as a permanent\n"
+"address in your program, save the binary data from *dest.private\\_key.data* \n"
 "to a local file."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:119
 msgid ""
-"Now you can create a SAM session, which literally means to make the "
-"Destination\n"
+"Now you can create a SAM session, which literally means to make the Destination\n"
 "online in I2P:"
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:130
 msgid ""
-"Important note here: Destination will remain online while "
-"*session\\_writer* socket\n"
-"is kept open. If you wish to switch it off, you can call "
-"*session\\_writer.close()*."
+"Important note here: Destination will remain online while *session\\_writer* socket\n"
+"is kept open. If you wish to switch it off, you can call *session\\_writer.close()*."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:135
@@ -8324,11 +7550,9 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:140
 msgid ""
-"Now when the Destination is online, you can use it to connect to other "
-"peers.\n"
+"Now when the Destination is online, you can use it to connect to other peers.\n"
 "For example, this is how you connect to\n"
-"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send "
-"HTTP GET\n"
+"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send HTTP GET\n"
 "request and read the response (it is \"i2p-projekt.i2p\" web server):"
 msgstr ""
 
@@ -8340,20 +7564,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:171
 msgid ""
-"While making outgoing connections is trivial, when you accept connections"
-" there\n"
-"is one important detail. After a new client is connected, SAM API sends "
-"an ASCII\n"
-"string with base64-encoded client's Destination to the socket. Since "
-"Destination \n"
+"While making outgoing connections is trivial, when you accept connections there\n"
+"is one important detail. After a new client is connected, SAM API sends an ASCII\n"
+"string with base64-encoded client's Destination to the socket. Since Destination \n"
 "and data can come in one chunk, you should be aware of it."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:178
 msgid ""
 "This is how a simple PING-PONG server looks like. It accepts incoming\n"
-"connection, saves client's Destination to a *remote\\_destination* "
-"variable and\n"
+"connection, saves client's Destination to a *remote\\_destination* variable and\n"
 "sends back \"PONG\" string:"
 msgstr ""
 
@@ -8365,21 +7585,16 @@ msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:208
 msgid ""
-"This article describes the usage of a TCP-like Streaming protocol. SAM "
-"API also\n"
-"provides a UDP-like protocol to send and receive datagrams. This feature "
-"will\n"
+"This article describes the usage of a TCP-like Streaming protocol. SAM API also\n"
+"provides a UDP-like protocol to send and receive datagrams. This feature will\n"
 "be added to i2plib later."
 msgstr ""
 
 #: i2p2www/blog/2018/10/23/application-development-basics.rst:214
 msgid ""
-"This is just a basic information, but it's enough to start your own "
-"project with\n"
-"the use of I2P. Invisible Internet is a great tool to develop all kinds "
-"of\n"
-"privacy-aware applications. There are no design constraints by the "
-"network,\n"
+"This is just a basic information, but it's enough to start your own project with\n"
+"the use of I2P. Invisible Internet is a great tool to develop all kinds of\n"
+"privacy-aware applications. There are no design constraints by the network,\n"
 "those applications can be client-server as well as P2P."
 msgstr ""
 
@@ -8395,25 +7610,15 @@ msgstr "0.9.38 cu un nou asistent de configurare"
 msgid ""
 "0.9.38 includes a new first-install wizard with a bandwidth tester.\n"
 "We've added support for the latest GeoIP database format.\n"
-"There's a new Firefox profile installer and a new, native Mac OSX "
-"installer on our website.\n"
+"There's a new Firefox profile installer and a new, native Mac OSX installer on our website.\n"
 "Work continues on supporting the new \"LS2\" netdb format."
-msgstr ""
-"0.9.38 include un nou asistent de configurare la prima instalare cu un "
-"tester pentru lățimea de bandă.\n"
-"Am adăugat suport pentru cel mai recent format de bază de date GeoIP.\n"
-"Există un nou program de instalare a profilului Firefox și un nou "
-"instalator Mac OSX nativ pe site-ul nostru.\n"
-"Lucrul continuă la sprijinirea noului format netdb \"LS2\"."
+msgstr "0.9.38 include un nou asistent de configurare la prima instalare cu un tester pentru lățimea de bandă.\nAm adăugat suport pentru cel mai recent format de bază de date GeoIP.\nExistă un nou program de instalare a profilului Firefox și un nou instalator Mac OSX nativ pe site-ul nostru.\nLucrul continuă la sprijinirea noului format netdb \"LS2\"."
 
 #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:23
 msgid ""
 "This release also contains plenty of bug fixes, including several issues "
 "with susimail attachments, and a fix for IPv6-only routers."
-msgstr ""
-"Această versiune conține, de asemenea, o mulțime de corecții de erori, "
-"inclusiv câteva probleme cu atașamentele susimail și o remediere pentru "
-"routerele numai cu IPv6."
+msgstr "Această versiune conține, de asemenea, o mulțime de corecții de erori, inclusiv câteva probleme cu atașamentele susimail și o remediere pentru routerele numai cu IPv6."
 
 #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:37
 msgid "New setup wizard with bandwidth testing"
@@ -8497,25 +7702,25 @@ msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:16
 msgid ""
-"There are many projects in the I2P world that we are excited about, but "
-"not all of them are ready for prime-time.  We decided to create a place "
-"where we can make those available for anyone interested in trying them "
-"out, that will serve as proving grounds for projects that may one day "
-"become official I2P products.  This place is the `I2P Laboratory`_."
+"There are many projects in the I2P world that we are excited about, but not "
+"all of them are ready for prime-time.  We decided to create a place where we"
+" can make those available for anyone interested in trying them out, that "
+"will serve as proving grounds for projects that may one day become official "
+"I2P products.  This place is the `I2P Laboratory`_."
 msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:22
 msgid ""
-"In the lab we will be offering downoads ready for you to try.  Keep in "
-"mind that they are not going to be \"release\" quality, and some may not "
-"even be \"beta\" quality.  We do not offer official support for them.  "
-"Any of the lab projects may get discontinued at any time."
+"In the lab we will be offering downoads ready for you to try.  Keep in mind "
+"that they are not going to be \"release\" quality, and some may not even be "
+"\"beta\" quality.  We do not offer official support for them.  Any of the "
+"lab projects may get discontinued at any time."
 msgstr ""
 
 #: i2p2www/blog/2019/02/14/i2p-lab.rst:26
 msgid ""
-"If you are feeling adventurous we invite you to try our ideas.  We "
-"welcome your feedback at the `I2P Lab Forum`_."
+"If you are feeling adventurous we invite you to try our ideas.  We welcome "
+"your feedback at the `I2P Lab Forum`_."
 msgstr ""
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:2
@@ -8528,32 +7733,17 @@ msgstr "0.9.39 cu îmbunătățiri de performanță"
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:16
 msgid ""
-"0.9.39 includes extensive changes for the new network database types "
-"(proposal 123).\n"
-"We've bundled the i2pcontrol plugin as a webapp to support development of"
-" RPC applications.\n"
+"0.9.39 includes extensive changes for the new network database types (proposal 123).\n"
+"We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications.\n"
 "There are numerous performance improvements and bug fixes."
-msgstr ""
-"\n"
-"0.9.39 include schimbări extensive pentru noile tipuri de baze de date de"
-" rețea (propunerea 123).\n"
-"Am legat pluginul i2pcontrol ca un webapp pentru a sprijini dezvoltarea "
-"aplicațiilor.\n"
-"Există numeroase îmbunătățiri de performanță și corecții de erori."
+msgstr "\n0.9.39 include schimbări extensive pentru noile tipuri de baze de date de rețea (propunerea 123).\nAm legat pluginul i2pcontrol ca un webapp pentru a sprijini dezvoltarea aplicațiilor.\nExistă numeroase îmbunătățiri de performanță și corecții de erori."
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:22
 msgid ""
-"We've removed the midnight and classic themes to reduce the maintenance "
-"burden;\n"
+"We've removed the midnight and classic themes to reduce the maintenance burden;\n"
 "previous users of those themes will now see the dark or light theme.\n"
 "There's also new home page icons, a first step in updating the console."
-msgstr ""
-"Am eliminat temele midnight și clasic pentru a reduce povara "
-"întreținerii;\n"
-"utilizatorii anteriori ai acestor teme vor vedea acum tema întunecată sau"
-" luminoasă.\n"
-"Există și noi pictograme pentru pagina de pornire, un prim pas în "
-"actualizarea consolei."
+msgstr "Am eliminat temele midnight și clasic pentru a reduce povara întreținerii;\nutilizatorii anteriori ai acestor teme vor vedea acum tema întunecată sau luminoasă.\nExistă și noi pictograme pentru pagina de pornire, un prim pas în actualizarea consolei."
 
 #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:38
 msgid "I2PControl RPC plugin bundled as a webapp"
@@ -8627,18 +7817,12 @@ msgstr "0.9.40 cu iconite noi"
 msgid ""
 "0.9.40 includes support for the new encrypted leaseset format.\n"
 "We disabled the old NTCP 1 transport protocol.\n"
-"There's a new SusiDNS import feature, and a new scripted filtering "
-"mechanism for incoming connections."
-msgstr ""
-"0.9.40 include suport pentru noul format de închiriere criptat.\n"
-"Am dezactivat vechiul protocol de transport NTCP 1.\n"
-"Există o nouă caracteristică de import SusiDNS și un nou mecanism de "
-"filtrare scriptic pentru conexiunile primite."
+"There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections."
+msgstr "0.9.40 include suport pentru noul format de închiriere criptat.\nAm dezactivat vechiul protocol de transport NTCP 1.\nExistă o nouă caracteristică de import SusiDNS și un nou mecanism de filtrare scriptic pentru conexiunile primite."
 
 #: i2p2www/blog/2019/05/07/0.9.40-Release.rst:22
 msgid ""
-"We've made a lot of improvements to the OSX native installer, and we've "
-"updated the IzPack installer as well.\n"
+"We've made a lot of improvements to the OSX native installer, and we've updated the IzPack installer as well.\n"
 "The work continues on refreshing the console with new icons.\n"
 "As usual, we've fixed lots of bugs as well!"
 msgstr ""
@@ -8741,24 +7925,16 @@ msgid ""
 "::\n"
 "\n"
 "       What is I2P-bote?\n"
-"          I2P-bote is a private messaging system built on i2p, which has "
-"additional\n"
-"          features to make it even more difficult to discern information "
-"about the\n"
-"          messages that are transmitted. Because of this, it can be used "
-"to transmit\n"
-"          private messages securely while tolerating high latency and not"
-" relying on\n"
-"          a centralized relay to send messages when the sender goes "
-"offline. This is\n"
-"          in contrast to almost every other popular private messaging "
-"system, which\n"
-"          either require both parties to be online or rely on a semi-"
-"trusted service\n"
+"          I2P-bote is a private messaging system built on i2p, which has additional\n"
+"          features to make it even more difficult to discern information about the\n"
+"          messages that are transmitted. Because of this, it can be used to transmit\n"
+"          private messages securely while tolerating high latency and not relying on\n"
+"          a centralized relay to send messages when the sender goes offline. This is\n"
+"          in contrast to almost every other popular private messaging system, which\n"
+"          either require both parties to be online or rely on a semi-trusted service\n"
 "          which transmits messages on behalf of senders who go offline.\n"
 "\n"
-"          or, ELI5: It's used similarly to e-mail, but it suffers from "
-"none of e-mail's\n"
+"          or, ELI5: It's used similarly to e-mail, but it suffers from none of e-mail's\n"
 "          privacy defects."
 msgstr ""
 
@@ -8840,11 +8016,9 @@ msgid ""
 "   character set into binary.\n"
 "2. Second, take bytes 386 and 387 and convert them to a single\n"
 "   Big-Endian integer.\n"
-"3. Add the number you computed from the two bytes in step two to 387. "
-"This is\n"
+"3. Add the number you computed from the two bytes in step two to 387. This is\n"
 "   the length of the base64 destination.\n"
-"4. Take that nummber of bytes from the front of the full destination to "
-"get\n"
+"4. Take that nummber of bytes from the front of the full destination to get\n"
 "   the destination as a range of bytes.\n"
 "5. Convert back to a base64 representation using i2p's base64 character\n"
 "   set."
@@ -8895,8 +8069,7 @@ msgid ""
 "\n"
 "::\n"
 "\n"
-"       sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-"
-"config/i2pbote/local_dest.key"
+"       sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-config/i2pbote/local_dest.key"
 msgstr ""
 
 #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:149
@@ -8951,8 +8124,7 @@ msgid ""
 "\n"
 "Now that you've got the correct destination for your I2P-Bote node, the\n"
 "final step is to add yourself to the default peers list for `I2P-Bote\n"
-"here <https://github.com/i2p/i2p.i2p-"
-"bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n"
+"here <https://github.com/i2p/i2p.i2p-bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n"
 "here. You can do this by forking the repository, adding yourself to the\n"
 "list with your name commented out, and your 516-char destination\n"
 "directly below it, like this:"
@@ -8965,12 +8137,7 @@ msgid ""
 "::\n"
 "\n"
 "       # idk\n"
-"       QuabT3H5ljZyd-PXCQjvDzdfCec-"
-"2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-"
-"bkSo0gEhB-"
-"GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA"
-"~z0Nus-"
-"VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA"
+"       QuabT3H5ljZyd-PXCQjvDzdfCec-2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-bkSo0gEhB-GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA~z0Nus-VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA"
 msgstr ""
 
 #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:205
@@ -8991,38 +8158,25 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:10
 msgid ""
-"Although the Java I2P router comes pre-configured with a static web "
-"server,\n"
-"jetty, to provide the user's first eepSite, many require more "
-"sophisticated\n"
-"functionality from their web server and would rather create an eepSite "
-"with a\n"
-"different server. This is of course possible, and actually is really easy"
-" once\n"
+"Although the Java I2P router comes pre-configured with a static web server,\n"
+"jetty, to provide the user's first eepSite, many require more sophisticated\n"
+"functionality from their web server and would rather create an eepSite with a\n"
+"different server. This is of course possible, and actually is really easy once\n"
 "you've done it one time."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:18
 msgid ""
-"Although it is easy to do, there are a few things you should consider "
-"before\n"
-"doing it. You will want to remove identifying characteristics from your "
-"web\n"
-"server, like potentially identifying headers and default error pages that"
-"\n"
-"report the server/distro type. More information about threats to "
-"anonymity\n"
+"Although it is easy to do, there are a few things you should consider before\n"
+"doing it. You will want to remove identifying characteristics from your web\n"
+"server, like potentially identifying headers and default error pages that\n"
+"report the server/distro type. More information about threats to anonymity\n"
 "posed by improperly configured applications see:\n"
-"`Riseup here: <https://riseup.net/en/security/network-security/tor"
-"/onionservices-best-practices>`__,\n"
+"`Riseup here: <https://riseup.net/en/security/network-security/tor/onionservices-best-practices>`__,\n"
 "`Whonix Here: <https://www.whonix.org/wiki/Onion_Services>`__,\n"
-"`This blog article for some opsec fails: "
-"<https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,"
-"\n"
-"`and the I2P applications page here "
-"<https://geti2p.net/en/docs/applications/supported>`__.\n"
-"Although much of this information is expressed for Tor Onion Services, "
-"the same\n"
+"`This blog article for some opsec fails: <https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,\n"
+"`and the I2P applications page here <https://geti2p.net/en/docs/applications/supported>`__.\n"
+"Although much of this information is expressed for Tor Onion Services, the same\n"
 "procedures and principles apply to hosting applications over I2P."
 msgstr ""
 
@@ -9033,8 +8187,7 @@ msgstr ""
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:35
 msgid ""
 "Go to the I2P web interface at 127.0.0.1:7657 and open the\n"
-"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links"
-" to\n"
+"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links to\n"
 "localhost). Click the button that says \"Tunnel Wizard\" to begin."
 msgstr ""
 
@@ -9044,8 +8197,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:48
 msgid ""
-"The tunnel wizard is very simple. Since we're setting up an http "
-"*server*, all\n"
+"The tunnel wizard is very simple. Since we're setting up an http *server*, all\n"
 "we need to do is select a *server* tunnel."
 msgstr ""
 
@@ -9055,15 +8207,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:60
 msgid ""
-"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP "
-"services.\n"
+"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP services.\n"
 "It has filtering and rate-limiting features enabled that are tailored\n"
-"specifically to that purpose. A standard tunnel may work as well, but if "
-"you\n"
-"select a atandard tunnel you'll need to take care of those security "
-"features\n"
-"yourself. A more in-depth dive into the HTTP Tunnel configuration is "
-"available\n"
+"specifically to that purpose. A standard tunnel may work as well, but if you\n"
+"select a atandard tunnel you'll need to take care of those security features\n"
+"yourself. A more in-depth dive into the HTTP Tunnel configuration is available\n"
 "in the next tutorial."
 msgstr ""
 
@@ -9073,12 +8221,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:76
 msgid ""
-"For your own benefit and ability to remeber and distinguish the what you "
-"are\n"
-"using the tunnel for, give it a good nickname and description. If you "
-"need to\n"
-"come back and do more management later, then this is how you will "
-"identify the\n"
+"For your own benefit and ability to remeber and distinguish the what you are\n"
+"using the tunnel for, give it a good nickname and description. If you need to\n"
+"come back and do more management later, then this is how you will identify the\n"
 "tunnel in the hidden services manager."
 msgstr ""
 
@@ -9088,12 +8233,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:90
 msgid ""
-"In this step, you point the web server at the TCP port where your web "
-"server is\n"
-"listening. Since most web servers listen on port 80 or port 8080, the "
-"example\n"
-"shows that. If you use alternate ports or virtual machines or containers "
-"to\n"
+"In this step, you point the web server at the TCP port where your web server is\n"
+"listening. Since most web servers listen on port 80 or port 8080, the example\n"
+"shows that. If you use alternate ports or virtual machines or containers to\n"
 "isolate your web services, you may need to adjust the host, port, or both."
 msgstr ""
 
@@ -9111,12 +8253,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:115
 msgid ""
-"Finally, take a look at the settings you have selected. If you approve, "
-"save\n"
-"them. If you did not choose to start the tunnel automatically, go to the "
-"hidden\n"
-"services manager and start it manually when you wish to make your service"
-"\n"
+"Finally, take a look at the settings you have selected. If you approve, save\n"
+"them. If you did not choose to start the tunnel automatically, go to the hidden\n"
+"services manager and start it manually when you wish to make your service\n"
 "available."
 msgstr ""
 
@@ -9126,10 +8265,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:129
 msgid ""
-"I2P provides a detailed panel for configuring the http server tunnel in "
-"custom\n"
-"ways. I'll finish this tutorial by walking through all of them. "
-"Eventually."
+"I2P provides a detailed panel for configuring the http server tunnel in custom\n"
+"ways. I'll finish this tutorial by walking through all of them. Eventually."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:4
@@ -9142,38 +8279,28 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:10
 msgid ""
-"This blog post is intended as a general guide to running a mirror of a "
-"clear-net\n"
-"service as an eepSite. It elaborates on the previous blog post about "
-"basic\n"
+"This blog post is intended as a general guide to running a mirror of a clear-net\n"
+"service as an eepSite. It elaborates on the previous blog post about basic\n"
 "I2PTunnel tunnels."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:16
 msgid ""
-"Unfortunately, it's probably impossible to *completely* cover all "
-"possible cases\n"
-"of making an existing web site available as an eepSite, there's simply "
-"too\n"
+"Unfortunately, it's probably impossible to *completely* cover all possible cases\n"
+"of making an existing web site available as an eepSite, there's simply too\n"
 "diverse an array of server-side software, not to mention the in-practice\n"
-"peculiarities of any particular deployment of software. Instead, I'm "
-"going to\n"
-"try and convey, as specifically as possible, the general process "
-"preparing a\n"
+"peculiarities of any particular deployment of software. Instead, I'm going to\n"
+"try and convey, as specifically as possible, the general process preparing a\n"
 "service for deployment to the eepWeb or other hidden services."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:25
 msgid ""
-"Much of this guide will be treating the reader as a conversational "
-"participant,\n"
-"in particular If I really mean it I will address the reader directly(i.e."
-" using\n"
-"\"you\" instead of \"one\") and I'll frequently head sections with "
-"questions I think\n"
+"Much of this guide will be treating the reader as a conversational participant,\n"
+"in particular If I really mean it I will address the reader directly(i.e. using\n"
+"\"you\" instead of \"one\") and I'll frequently head sections with questions I think\n"
 "the reader might be asking. This is, after all, a \"process\" that an\n"
-"administrator must consider themselves \"involved\" in just like hosting "
-"any other\n"
+"administrator must consider themselves \"involved\" in just like hosting any other\n"
 "service."
 msgstr ""
 
@@ -9183,16 +8310,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:37
 msgid ""
-"While it would be wonderful, it's probably impossible for me to put "
-"specific\n"
-"instructions for every single kind of software that one might use to host"
-" web\n"
-"sites. As such, this tutorial requires some assumptions on the part of "
-"the\n"
-"writer and some critical thinking and common sense on the part of the "
-"reader.\n"
-"To be clear, **I have assumed that the person following this tutorial "
-"is**\n"
+"While it would be wonderful, it's probably impossible for me to put specific\n"
+"instructions for every single kind of software that one might use to host web\n"
+"sites. As such, this tutorial requires some assumptions on the part of the\n"
+"writer and some critical thinking and common sense on the part of the reader.\n"
+"To be clear, **I have assumed that the person following this tutorial is**\n"
 "**already operating a clear-web service linkable to a real identity or**\n"
 "**organization** and thus is simply offering anonymous access and not\n"
 "anonymizing themselves."
@@ -9200,22 +8322,17 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:48
 msgid ""
-"Thus, **it makes no attempt whatsoever to anonymize** a connection from "
-"one\n"
-"server to another. If you want to run a new, un-linkable hidden service "
-"that\n"
-"makes server-to-server connections, additional steps will be required and"
-" will\n"
+"Thus, **it makes no attempt whatsoever to anonymize** a connection from one\n"
+"server to another. If you want to run a new, un-linkable hidden service that\n"
+"makes server-to-server connections, additional steps will be required and will\n"
 "be covered in another tutorial."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:55
 msgid ""
 "That said: If you can be sure that a *brand new service* which is *not*\n"
-"*available to the clear-web* will never make a server-to-server "
-"connection and\n"
-"will not leak server metadata in responses to clients, then services "
-"configured\n"
+"*available to the clear-web* will never make a server-to-server connection and\n"
+"will not leak server metadata in responses to clients, then services configured\n"
 "in this way will be anonymous."
 msgstr ""
 
@@ -9229,16 +8346,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:68
 msgid ""
-"In practice, your web service probably uses a number of things to enhance"
-" it's\n"
-"reliability and security. These things could be proxies, reverse proxies,"
-"\n"
-"containers, tunnels, Intrusion Detection Systems, rate-limiters, load "
-"balancers,\n"
-"among many other things. When you get started, you should go through your"
-"\n"
-"deployment and determine which software you are using, and what you are "
-"using it\n"
+"In practice, your web service probably uses a number of things to enhance it's\n"
+"reliability and security. These things could be proxies, reverse proxies,\n"
+"containers, tunnels, Intrusion Detection Systems, rate-limiters, load balancers,\n"
+"among many other things. When you get started, you should go through your\n"
+"deployment and determine which software you are using, and what you are using it\n"
 "for."
 msgstr ""
 
@@ -9248,8 +8360,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:80
 msgid ""
-"These questions should help you evaluate what parts of your software "
-"stack are\n"
+"These questions should help you evaluate what parts of your software stack are\n"
 "relevant to your I2P eepSite."
 msgstr ""
 
@@ -9259,16 +8370,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:88
 msgid ""
-"If you are using software which alters the behavior of traffic based on "
-"the IP\n"
-"address of the sender, these things will probably not work with I2P, or "
-"may work\n"
-"in complicated or unexpected ways. This is because the address will "
-"usually be\n"
-"the localhost, or at least the host where your I2P router is running. "
-"Software\n"
-"which sometimes does things based on IP addresses could be Fail2Ban, "
-"iptables,\n"
+"If you are using software which alters the behavior of traffic based on the IP\n"
+"address of the sender, these things will probably not work with I2P, or may work\n"
+"in complicated or unexpected ways. This is because the address will usually be\n"
+"the localhost, or at least the host where your I2P router is running. Software\n"
+"which sometimes does things based on IP addresses could be Fail2Ban, iptables,\n"
 "and similar applications."
 msgstr ""
 
@@ -9278,10 +8384,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:100
 msgid ""
-"Some software may be configured to add information to the traffic it "
-"handles.\n"
-"Obviously, if this information is identifying it should not be part of "
-"the chain\n"
+"Some software may be configured to add information to the traffic it handles.\n"
+"Obviously, if this information is identifying it should not be part of the chain\n"
 "of services that is exposed to the I2P network."
 msgstr ""
 
@@ -9293,37 +8397,27 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:109
 msgid ""
-"Some software may also draw from remote resources, to find up-to-date "
-"rules and\n"
-"block lists which can be used to prevent attacks. Some of these might be "
-"useful\n"
-"as part of the service that is exposed to I2P, but you should make sure "
-"that the\n"
-"rules are applicable and that a rules update cannot be triggered as a "
-"result of\n"
-"a normal client request. This would create a server-to-server "
-"communication\n"
+"Some software may also draw from remote resources, to find up-to-date rules and\n"
+"block lists which can be used to prevent attacks. Some of these might be useful\n"
+"as part of the service that is exposed to I2P, but you should make sure that the\n"
+"rules are applicable and that a rules update cannot be triggered as a result of\n"
+"a normal client request. This would create a server-to-server communication\n"
 "which could reveal the timing of an I2P communication to a third party."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:118
 msgid ""
-"Step two: Determine which port to Forward to I2P and Optionally locate "
-"your TLS certificate"
+"Step two: Determine which port to Forward to I2P and Optionally locate your "
+"TLS certificate"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:121
 msgid ""
-"Now you've gathered all the information that you will require to forward "
-"your\n"
-"service to I2P. Once you've selected the point at which you would like to"
-" make\n"
-"your site available to I2P, you will need to note the port you wish to "
-"foward.\n"
-"In simple scenarios, this will probably just be port 80 or port 8080. In "
-"more\n"
-"sophisticated scenarios, this might be a reverse proxy or something like "
-"that.\n"
+"Now you've gathered all the information that you will require to forward your\n"
+"service to I2P. Once you've selected the point at which you would like to make\n"
+"your site available to I2P, you will need to note the port you wish to foward.\n"
+"In simple scenarios, this will probably just be port 80 or port 8080. In more\n"
+"sophisticated scenarios, this might be a reverse proxy or something like that.\n"
 "Make a note of the port."
 msgstr ""
 
@@ -9333,18 +8427,12 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:133
 msgid ""
-"Should you be a non-anonymous organization that wishes to provide "
-"enhanced\n"
-"privacy to your users by providing a hidden service, you may wish to "
-"establish\n"
-"a common identity between versions of your site. However, since we can't "
-"add\n"
-"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we "
-"have to do\n"
-"this in another way. To do this, **even if you are forwarding the HTTP "
-"port**\n"
-"**and not HTTPS**, make a note of the location of your TLS certificate "
-"for use\n"
+"Should you be a non-anonymous organization that wishes to provide enhanced\n"
+"privacy to your users by providing a hidden service, you may wish to establish\n"
+"a common identity between versions of your site. However, since we can't add\n"
+"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we have to do\n"
+"this in another way. To do this, **even if you are forwarding the HTTP port**\n"
+"**and not HTTPS**, make a note of the location of your TLS certificate for use\n"
 "in the final step."
 msgstr ""
 
@@ -9354,10 +8442,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:146
 msgid ""
-"Congratulations! You've completed the most difficult part. From here on, "
-"the\n"
-"decisions you must make, and the consequences that they will have, are "
-"much\n"
+"Congratulations! You've completed the most difficult part. From here on, the\n"
+"decisions you must make, and the consequences that they will have, are much\n"
 "more straightforward and easy to enumerate. Such is the beauty of a\n"
 "cryptographically secure network layer like I2P!"
 msgstr ""
@@ -9369,20 +8455,13 @@ msgstr ""
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:158
 msgid ""
 "For eepSites, you will need to create an HTTP Server Tunnel. This is\n"
-"an I2P destination with a few special features for hosting HTTP services "
-"to\n"
-"enable things like rate-limiting, filtering, and the inclusion of headers"
-" to\n"
-"identify the destination of the client to the server. These enable "
-"flexibility\n"
-"in how you handle connections in terms of load-balancing and rate-"
-"limiting on\n"
-"a case-by-case basis, among other things. Explore these options and how "
-"they\n"
-"relate to the applications which you considered in step one, even though "
-"a very\n"
-"simple setup is easy, larger sites may benefit from taking advantage of "
-"these\n"
+"an I2P destination with a few special features for hosting HTTP services to\n"
+"enable things like rate-limiting, filtering, and the inclusion of headers to\n"
+"identify the destination of the client to the server. These enable flexibility\n"
+"in how you handle connections in terms of load-balancing and rate-limiting on\n"
+"a case-by-case basis, among other things. Explore these options and how they\n"
+"relate to the applications which you considered in step one, even though a very\n"
+"simple setup is easy, larger sites may benefit from taking advantage of these\n"
 "features."
 msgstr ""
 
@@ -9392,98 +8471,70 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:173
 msgid ""
-"If you've configured a reverse proxy or an SSH tunnel before, then the "
-"general\n"
+"If you've configured a reverse proxy or an SSH tunnel before, then the general\n"
 "idea here should be very familiar to you. I2PTunnel, in essence, is just\n"
-"forwarding ports from the host to the I2P Network. To set this up using "
-"the web\n"
+"forwarding ports from the host to the I2P Network. To set this up using the web\n"
 "interface, go to the I2PTunnel configuration page."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:180
 msgid ""
-"At the bottom of the \"I2P Hidden Services\" section of the page, select "
-"an HTTP\n"
+"At the bottom of the \"I2P Hidden Services\" section of the page, select an HTTP\n"
 "Service from the drop-down and click \"Create.\""
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:189
 msgid ""
-"It will immediately drop you into the granular tunnel configuration page,"
-" which\n"
-"we're about to explore from top-to-bottom. The first, most essential "
-"settings\n"
-"are the tunnel name and the target host:port. **The target host:port is**"
-"\n"
-"**the place where you input the address of the service you are forwarding"
-" to**\n"
-"**I2P**. Once you've configured that, your web site will become available"
-" over\n"
+"It will immediately drop you into the granular tunnel configuration page, which\n"
+"we're about to explore from top-to-bottom. The first, most essential settings\n"
+"are the tunnel name and the target host:port. **The target host:port is**\n"
+"**the place where you input the address of the service you are forwarding to**\n"
+"**I2P**. Once you've configured that, your web site will become available over\n"
 "i2p. However, there are probably a few things that we can improve."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:202
 msgid ""
-"Next, you may want to pick a hostname to use for your eepSite. This "
-"hostname\n"
-"doesn't need to be universally unique, for now, it will only be used "
-"locally.\n"
-"We'll publish it to an address helper later. **If** the *Local "
-"Destination*\n"
-"field isn't populated with your Base64 Destination yet, you should scroll"
-" down\n"
+"Next, you may want to pick a hostname to use for your eepSite. This hostname\n"
+"doesn't need to be universally unique, for now, it will only be used locally.\n"
+"We'll publish it to an address helper later. **If** the *Local Destination*\n"
+"field isn't populated with your Base64 Destination yet, you should scroll down\n"
 "to the bottom, save the tunnel configuration, and return to the tunnel\n"
 "configuration."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:215
 msgid ""
-"A little further down the configuration page, the tunnel options are "
-"available.\n"
-"Since you've got a site which is not intended to be anonymous, but rather"
-" to\n"
-"provide anonymous access to others by an alternate gateway, it may be "
-"good to\n"
+"A little further down the configuration page, the tunnel options are available.\n"
+"Since you've got a site which is not intended to be anonymous, but rather to\n"
+"provide anonymous access to others by an alternate gateway, it may be good to\n"
 "reduce the number of hops the tunnel takes on the I2P network."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:226
 msgid ""
-"Next are the encrypted leaseset options. You can probably leave these as "
-"the\n"
-"defaults, since your site isn't anonymous it probably doesn't need "
-"features like\n"
-"blinding or encrypted leasesets. If you were to choose encrypted "
-"leasesets, you\n"
-"would not be accessible to anyone unless you shared a key with them in "
-"advance."
+"Next are the encrypted leaseset options. You can probably leave these as the\n"
+"defaults, since your site isn't anonymous it probably doesn't need features like\n"
+"blinding or encrypted leasesets. If you were to choose encrypted leasesets, you\n"
+"would not be accessible to anyone unless you shared a key with them in advance."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:237
 msgid ""
-"The next few parts may be especially useful to you if you run a high-"
-"traffic\n"
-"site or find yourself subject to DDOS attacks. Here you can configure "
-"various\n"
+"The next few parts may be especially useful to you if you run a high-traffic\n"
+"site or find yourself subject to DDOS attacks. Here you can configure various\n"
 "kinds of connection limits."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:247
 msgid ""
-"After that, there are a few other ways of filtering connections by client"
-"\n"
-"characteristics. First, you can block access via inproxies like I2P.to "
-"and\n"
-"similar. Since you have a clearnet presence already, changing this may be"
-" better\n"
-"if you want to encourage I2P users to only use your eepSite. You can also"
-" block\n"
-"accesses via specific user-agents, for instance blocking wget may be "
-"helpful if\n"
-"you want to prevent spidering. Finally, and of particular interest to "
-"Fail2Ban\n"
-"users, the \"Unique local address per client\" will give each client it's"
-" own\n"
+"After that, there are a few other ways of filtering connections by client\n"
+"characteristics. First, you can block access via inproxies like I2P.to and\n"
+"similar. Since you have a clearnet presence already, changing this may be better\n"
+"if you want to encourage I2P users to only use your eepSite. You can also block\n"
+"accesses via specific user-agents, for instance blocking wget may be helpful if\n"
+"you want to prevent spidering. Finally, and of particular interest to Fail2Ban\n"
+"users, the \"Unique local address per client\" will give each client it's own\n"
 "local IP address instead of them all appearing to the server to be from\n"
 "127.0.0.1."
 msgstr ""
@@ -9494,10 +8545,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:271
 msgid ""
-"Lastly, you can set up an advanced filter definition. Writing filters is "
-"beyond\n"
-"what I'm prepared to do in this document, for more information see the "
-"format\n"
+"Lastly, you can set up an advanced filter definition. Writing filters is beyond\n"
+"what I'm prepared to do in this document, for more information see the format\n"
 "specification for now."
 msgstr ""
 
@@ -9507,22 +8556,16 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:284
 msgid ""
-"One interesting thing that I2P can do is host the same site on multiple "
-"servers\n"
-"at the same time transparently, which is referred to as \"Multihoming.\" "
-"In order\n"
-"to multihome your application, you will need to return to the tunnel menu"
-" and\n"
-"change the location of your private key file to it's own, non-shared "
-"location."
+"One interesting thing that I2P can do is host the same site on multiple servers\n"
+"at the same time transparently, which is referred to as \"Multihoming.\" In order\n"
+"to multihome your application, you will need to return to the tunnel menu and\n"
+"change the location of your private key file to it's own, non-shared location."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:295
 msgid ""
-"When you're done, copy the new key file for your new multihomed service "
-"to a\n"
-"storage device. Now, you can re-produce your service/tunnel configuration"
-" with\n"
+"When you're done, copy the new key file for your new multihomed service to a\n"
+"storage device. Now, you can re-produce your service/tunnel configuration with\n"
 "those same keys on any I2P router and increase your service's redundancy."
 msgstr ""
 
@@ -9532,11 +8575,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:304
 msgid ""
-"Since you're running an anonymously accessible instance of an existing "
-"clear-net\n"
+"Since you're running an anonymously accessible instance of an existing clear-net\n"
 "service, you'll probably want to leverage some existing form of trust to\n"
-"distribute your eepSite URL, like a TLS Certificate signed by a "
-"recognized and\n"
+"distribute your eepSite URL, like a TLS Certificate signed by a recognized and\n"
 "reputable authority. What can I say we live in an imperfect world."
 msgstr ""
 
@@ -9546,29 +8587,23 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:316
 msgid ""
-"The simplest way to provide a link to your eepSite using an existing site"
-" to\n"
-"distribute the link is to distribute a so-called \"Base32\" address. The "
-"Base32\n"
-"address is the hash of the public key of your I2P destination, so it "
-"cannot be\n"
-"forged if it is provided by a reliable source. In the case of a clear-net"
-" site\n"
+"The simplest way to provide a link to your eepSite using an existing site to\n"
+"distribute the link is to distribute a so-called \"Base32\" address. The Base32\n"
+"address is the hash of the public key of your I2P destination, so it cannot be\n"
+"forged if it is provided by a reliable source. In the case of a clear-net site\n"
 "with a hidden service presence, one of those places is likely to be that\n"
 "clear-net site."
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:325
 msgid ""
-"Your base32 address is visible on the main i2ptunnel configuration page "
-"and it\n"
+"Your base32 address is visible on the main i2ptunnel configuration page and it\n"
 "looks like this:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:334
 msgid ""
-"Your users can copy-and-paste this link directly into their I2P browsers "
-"and\n"
+"Your users can copy-and-paste this link directly into their I2P browsers and\n"
 "it will just work, no additional configuration required."
 msgstr ""
 
@@ -9578,17 +8613,12 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:342
 msgid ""
-"You can also distribute a human-readable link to suggest to your "
-"potential users\n"
-"by taking advantage of I2P's \"Address Book\" feature, which allows the "
-"users to\n"
+"You can also distribute a human-readable link to suggest to your potential users\n"
+"by taking advantage of I2P's \"Address Book\" feature, which allows the users to\n"
 "decide to assign a human-readable domain name to your cryptographically\n"
-"assured identity. You can do this by distributing a specially crafted "
-"link\n"
-"containing the domain name that you want to suggest, followed by a slash,"
-"\n"
-"followed by ?i2paddresshelper=, followed by the Local Destination of the "
-"tunnel\n"
+"assured identity. You can do this by distributing a specially crafted link\n"
+"containing the domain name that you want to suggest, followed by a slash,\n"
+"followed by ?i2paddresshelper=, followed by the Local Destination of the tunnel\n"
 "you just created, which you can see here:"
 msgstr ""
 
@@ -9598,14 +8628,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:364
 msgid ""
-"I keep saying suggest because when the such a link is visited, I2P asks "
-"for the\n"
-"user's consent to add this human-readable name to the user's local "
-"address book.\n"
-"That means there is no expectation that this domain be universally agreed"
-" upon\n"
-"by all visitors on the I2P network, whereas in the case of base32 "
-"addresses,\n"
+"I keep saying suggest because when the such a link is visited, I2P asks for the\n"
+"user's consent to add this human-readable name to the user's local address book.\n"
+"That means there is no expectation that this domain be universally agreed upon\n"
+"by all visitors on the I2P network, whereas in the case of base32 addresses,\n"
 "the opposite is true."
 msgstr ""
 
@@ -9615,16 +8641,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:375
 msgid ""
-"Nonetheless, there do exist publicly available address subscription "
-"feeds, and\n"
-"special services for discovering new human-readable addresses, such as "
-"no.i2p,\n"
-"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or "
-"Jump\n"
-"Services, and can also be subscribed to automatically. This may be "
-"espescially\n"
-"helpful to users of your service who wish to acquire the address without "
-"leaving\n"
+"Nonetheless, there do exist publicly available address subscription feeds, and\n"
+"special services for discovering new human-readable addresses, such as no.i2p,\n"
+"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or Jump\n"
+"Services, and can also be subscribed to automatically. This may be espescially\n"
+"helpful to users of your service who wish to acquire the address without leaving\n"
 "I2P or visiting your clearnet service."
 msgstr ""
 
@@ -9642,10 +8663,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:405
 msgid ""
-"Most of the security issues of hosting Tor hidden services also apply to "
-"I2P. It\n"
-"would be advisable to take advantage of their resources as well as this "
-"one:"
+"Most of the security issues of hosting Tor hidden services also apply to I2P. It\n"
+"would be advisable to take advantage of their resources as well as this one:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/02/mirroring-guide.rst:410
@@ -9698,27 +8717,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:10
 msgid ""
-"This is a tutorial on how to set up and tweak an I2P tunnel in order to "
-"use it\n"
-"to access an SSH server remotely, using either I2P or i2pd. For now, it "
-"assumes\n"
-"you will install your SSH server from a package manager and that it's "
-"running\n"
+"This is a tutorial on how to set up and tweak an I2P tunnel in order to use it\n"
+"to access an SSH server remotely, using either I2P or i2pd. For now, it assumes\n"
+"you will install your SSH server from a package manager and that it's running\n"
 "as a service."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:17
 msgid ""
-"Considerations: In this guide, I'm assuming a few things. They will need "
-"to be\n"
-"adjusted depending on the complications that arise in your particular "
-"setup,\n"
-"especially if you use VM's or containers for isolation. This assumes that"
-" the\n"
-"I2P router and the ssh server are running on the same localhost. You "
-"should be\n"
-"using newly-generated SSH host keys, either by using a freshly installed "
-"sshd,\n"
+"Considerations: In this guide, I'm assuming a few things. They will need to be\n"
+"adjusted depending on the complications that arise in your particular setup,\n"
+"especially if you use VM's or containers for isolation. This assumes that the\n"
+"I2P router and the ssh server are running on the same localhost. You should be\n"
+"using newly-generated SSH host keys, either by using a freshly installed sshd,\n"
 "or by deleting old keys and forcing their re-generation. For example:"
 msgstr ""
 
@@ -9733,9 +8744,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:41
 msgid ""
-"Using java I2P's web interface, navigate to the (Links to your Router "
-"Console)\\ `Hidden Services Manager "
-"<http://127.0.0.1:7657/i2ptunnelmgr>`__\n"
+"Using java I2P's web interface, navigate to the (Links to your Router Console)\\ `Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\n"
 "and start the tunnel wizard."
 msgstr ""
 
@@ -9746,15 +8755,13 @@ msgstr "Expert tunel"
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:49
 msgid ""
-"Since you are setting up this tunnel for the SSH server, you need to "
-"select the\n"
+"Since you are setting up this tunnel for the SSH server, you need to select the\n"
 "\"Server\" tunnel type."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:58
 msgid ""
-"You should fine-tune it later, but the Standard tunnel type is easiest to"
-" start\n"
+"You should fine-tune it later, but the Standard tunnel type is easiest to start\n"
 "with."
 msgstr ""
 
@@ -9777,23 +8784,17 @@ msgstr "Setări avansate"
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:92
 msgid ""
-"Now head back over the the Hidden Services Manager, and look over the "
-"available\n"
-"advanced settings. One thing you'll definitely want to change is to set "
-"it up\n"
+"Now head back over the the Hidden Services Manager, and look over the available\n"
+"advanced settings. One thing you'll definitely want to change is to set it up\n"
 "for interactive connections intstead of bulk connections."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:102
 msgid ""
-"Besides that, these other options can affect performance when accessing "
-"your SSH\n"
-"server. If you aren't that concerned about your anonymity, then you could"
-" reduce\n"
-"the number of hops you take. If you have trouble with speed, a higher "
-"tunnel\n"
-"count might help. A few backup tunnels are probably a good idea. You "
-"might have\n"
+"Besides that, these other options can affect performance when accessing your SSH\n"
+"server. If you aren't that concerned about your anonymity, then you could reduce\n"
+"the number of hops you take. If you have trouble with speed, a higher tunnel\n"
+"count might help. A few backup tunnels are probably a good idea. You might have\n"
 "to dial-it-in a bit."
 msgstr ""
 
@@ -9803,10 +8804,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:118
 msgid ""
-"Another interesting setting, especially if you choose to run a high "
-"number of\n"
-"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels "
-"that run\n"
+"Another interesting setting, especially if you choose to run a high number of\n"
+"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels that run\n"
 "when the serve has experienced extended inactivity."
 msgstr ""
 
@@ -9817,12 +8816,9 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:131
 msgid ""
-"With i2pd, all configuration is done with files instead of via a web "
-"interface.\n"
-"In order to configure an SSH Service tunnel for i2pd, tweak the following"
-"\n"
-"example settings to your anonymity and performance needs and copy them "
-"into\n"
+"With i2pd, all configuration is done with files instead of via a web interface.\n"
+"In order to configure an SSH Service tunnel for i2pd, tweak the following\n"
+"example settings to your anonymity and performance needs and copy them into\n"
 "tunnels.conf"
 msgstr ""
 
@@ -9836,21 +8832,16 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:158
 msgid ""
-"Depending on how you want to access your SSH Server, you may want to make"
-" a few\n"
-"changes to the settings. Besides the obvious SSH hardening stuff you "
-"should do\n"
-"on all SSH servers(Public-Key Authentication, no login as root, etc), if "
-"you\n"
-"don't want your SSH server to listen on any addresses except your server "
-"tunnel,\n"
+"Depending on how you want to access your SSH Server, you may want to make a few\n"
+"changes to the settings. Besides the obvious SSH hardening stuff you should do\n"
+"on all SSH servers(Public-Key Authentication, no login as root, etc), if you\n"
+"don't want your SSH server to listen on any addresses except your server tunnel,\n"
 "you should change AddressFamily to inet and ListenAddress to 127.0.0.1."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:171
 msgid ""
-"If you choose to use a port other than 22 for your SSH server, you will "
-"need to\n"
+"If you choose to use a port other than 22 for your SSH server, you will need to\n"
 "change the port in your I2P tunnel configuration."
 msgstr ""
 
@@ -9860,27 +8851,22 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:179
 msgid ""
-"You will need to be able to see the I2P router console of the SSH server "
-"in\n"
-"order to configure your client connection. One neat thing about this "
-"setup is\n"
+"You will need to be able to see the I2P router console of the SSH server in\n"
+"order to configure your client connection. One neat thing about this setup is\n"
 "that the initial connection to the I2P tunnel is authenticated, somewhat\n"
-"reducing the risk of your initial connection to the SSH server being "
-"MITM'ed,\n"
+"reducing the risk of your initial connection to the SSH server being MITM'ed,\n"
 "as is a risk in Trust-On-First-Use scenarios."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:197
 msgid ""
-"First, start the tunnel configuration wizard from the hidden services "
-"manager\n"
+"First, start the tunnel configuration wizard from the hidden services manager\n"
 "and select a client tunnel."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:206
 msgid ""
-"Next, select the standard tunnel type. You will fine-tune this "
-"configuration\n"
+"Next, select the standard tunnel type. You will fine-tune this configuration\n"
 "later."
 msgstr ""
 
@@ -9890,27 +8876,22 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:223
 msgid ""
-"This is the only slightly tricky part. Go to the hidden services manager "
-"of the\n"
-"I2P router console and find the base64 \"local destination\" of the SSH "
-"server\n"
-"tunnel. You'll need to find a way to copy this information into the next "
-"step.\n"
+"This is the only slightly tricky part. Go to the hidden services manager of the\n"
+"I2P router console and find the base64 \"local destination\" of the SSH server\n"
+"tunnel. You'll need to find a way to copy this information into the next step.\n"
 "I generally `Tox <https://tox.chat>`__ it to myself, any off-the-record\n"
 "should be sufficient for most people."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:235
 msgid ""
-"Once you've found the base64 destination you want to connect to "
-"transmitted to\n"
+"Once you've found the base64 destination you want to connect to transmitted to\n"
 "your client device, then paste it into the client destination field."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:244
 msgid ""
-"Lastly, set a local port to connect your ssh client to. This will local "
-"port\n"
+"Lastly, set a local port to connect your ssh client to. This will local port\n"
 "will be connected to the base64 destination and thus the SSH server."
 msgstr ""
 
@@ -9920,19 +8901,15 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:266
 msgid ""
-"Like before, you'll want to change the settings to be optimized for "
-"interactive\n"
-"connections. Additionally, if you want to set up client whiteliting on "
-"the\n"
-"server, you should check the \"Generate key to enable persistent client "
-"tunnel\n"
+"Like before, you'll want to change the settings to be optimized for interactive\n"
+"connections. Additionally, if you want to set up client whiteliting on the\n"
+"server, you should check the \"Generate key to enable persistent client tunnel\n"
 "identity\" radial button."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:282
 msgid ""
-"You can set this up by adding the following lines to your tunnels.conf "
-"and\n"
+"You can set this up by adding the following lines to your tunnels.conf and\n"
 "adjust it for your performance/anonymity needs."
 msgstr ""
 
@@ -9946,14 +8923,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:309
 msgid ""
-"There are lots of ways to set up an SSH client to connect to your server "
-"on I2P,\n"
-"but there are a few things you should do to secure your SSH client for "
-"anonymous\n"
-"use. First, you should configure it to only identify itself to SSH server"
-" with\n"
-"a single, specific key so that you don't risk contaminating your "
-"anonymous and\n"
+"There are lots of ways to set up an SSH client to connect to your server on I2P,\n"
+"but there are a few things you should do to secure your SSH client for anonymous\n"
+"use. First, you should configure it to only identify itself to SSH server with\n"
+"a single, specific key so that you don't risk contaminating your anonymous and\n"
 "non-anonymous SSH connections."
 msgstr ""
 
@@ -9963,8 +8936,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:328
 msgid ""
-"Alternatively, you could make a .bash_alias entry to enforce your options"
-" and\n"
+"Alternatively, you could make a .bash_alias entry to enforce your options and\n"
 "automatically connect to I2P. You get the idea, you need to enforce\n"
 "IdentitiesOnly and provide an identity file."
 msgstr ""
@@ -9975,26 +8947,21 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:343
 msgid ""
-"This is more-or-less optional, but it's pretty cool and will prevent "
-"anyone who\n"
-"happens to come across your destination from being able to tell you are "
-"hosting\n"
+"This is more-or-less optional, but it's pretty cool and will prevent anyone who\n"
+"happens to come across your destination from being able to tell you are hosting\n"
 "an SSH service."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:349
 msgid ""
-"First, retrieve the persistent client tunnel destination and transmit it "
-"to the\n"
+"First, retrieve the persistent client tunnel destination and transmit it to the\n"
 "server."
 msgstr ""
 
 #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:358
 msgid ""
-"Add the client's base64 destination to the server's destination "
-"whitelist. Now\n"
-"you'll only be able to connect to the server tunnel from that specific "
-"client\n"
+"Add the client's base64 destination to the server's destination whitelist. Now\n"
+"you'll only be able to connect to the server tunnel from that specific client\n"
 "tunnel and no one else will be able to connect to that destination."
 msgstr ""
 
@@ -10012,28 +8979,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:12
 msgid ""
-"One of the best features of I2P, in my opinion, is it's SAM API, which "
-"can be\n"
-"used to build a bridge between I2P and your application or language of "
-"choice.\n"
-"Currently, dozens of SAM libraries exist for a variety of languages, "
-"including:"
+"One of the best features of I2P, in my opinion, is it's SAM API, which can be\n"
+"used to build a bridge between I2P and your application or language of choice.\n"
+"Currently, dozens of SAM libraries exist for a variety of languages, including:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:32
 msgid ""
-"If you're using any of these languages, you may be able to port your "
-"application\n"
-"to I2P already, using an existing library. That's not what this tutorial "
-"is\n"
-"about, though. This tutorial is about what to do if you want to create a "
-"SAM\n"
-"library in a new language. In this tutorial, I will implement a new SAM "
-"library\n"
-"in Java. I chose Java because there isn't a Java library that connects "
-"you to\n"
-"SAM yet, because of Java's use in Android, and because it's a language "
-"almost\n"
+"If you're using any of these languages, you may be able to port your application\n"
+"to I2P already, using an existing library. That's not what this tutorial is\n"
+"about, though. This tutorial is about what to do if you want to create a SAM\n"
+"library in a new language. In this tutorial, I will implement a new SAM library\n"
+"in Java. I chose Java because there isn't a Java library that connects you to\n"
+"SAM yet, because of Java's use in Android, and because it's a language almost\n"
 "everybody has at least a *little* experience with, so hopefully you can\n"
 "translate it into a language of your choice."
 msgstr ""
@@ -10044,10 +9002,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:46
 msgid ""
-"How you set up your own library will vary depending on the language you "
-"wish\n"
-"to use. For this example library, we'll be using java so we can create a "
-"library\n"
+"How you set up your own library will vary depending on the language you wish\n"
+"to use. For this example library, we'll be using java so we can create a library\n"
 "like this:"
 msgstr ""
 
@@ -10061,10 +9017,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:69
 msgid ""
-"There are a few pieces of data that almost any SAM library should "
-"probably\n"
-"manage. It will at least need to store the address of the SAM Bridge you "
-"intend\n"
+"There are a few pieces of data that almost any SAM library should probably\n"
+"manage. It will at least need to store the address of the SAM Bridge you intend\n"
 "to use and the signature type you wish to use."
 msgstr ""
 
@@ -10074,8 +9028,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:78
 msgid ""
-"I prefer to store the SAM address as a String and an Integer, and re-"
-"combine\n"
+"I prefer to store the SAM address as a String and an Integer, and re-combine\n"
 "them in a function at runtime."
 msgstr ""
 
@@ -10085,15 +9038,11 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:94
 msgid ""
-"The valid signature types for an I2P Tunnel are DSA_SHA1, "
-"ECDSA_SHA256_P256,\n"
+"The valid signature types for an I2P Tunnel are DSA_SHA1, ECDSA_SHA256_P256,\n"
 "ECDSA_SHA384_P384, ECDSA_SHA512_P521, EdDSA_SHA512_Ed25519, but it is\n"
-"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if "
-"you\n"
-"implement at least SAM 3.1. In java, the 'enum' datastructure lends "
-"itself to\n"
-"this task, as it is intended to contain a group of constants. Add the "
-"enum, and\n"
+"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if you\n"
+"implement at least SAM 3.1. In java, the 'enum' datastructure lends itself to\n"
+"this task, as it is intended to contain a group of constants. Add the enum, and\n"
 "an instance of the enum, to your java class definition."
 msgstr ""
 
@@ -10104,8 +9053,7 @@ msgstr ""
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:117
 msgid ""
 "That takes care of reliably storing the signature type in use by the SAM\n"
-"connection, but you've still got to retrieve it as a string to "
-"communicate it\n"
+"connection, but you've still got to retrieve it as a string to communicate it\n"
 "to the bridge."
 msgstr ""
 
@@ -10115,10 +9063,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:156
 msgid ""
-"Once that's done, begin creating your constructor. Note that we've given "
-"our\n"
-"library defaults which will be useful in default situations on all "
-"existing I2P\n"
+"Once that's done, begin creating your constructor. Note that we've given our\n"
+"library defaults which will be useful in default situations on all existing I2P\n"
 "routers so far."
 msgstr ""
 
@@ -10128,14 +9074,10 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:173
 msgid ""
-"Finally, the good part. Interaction with the SAM bridge is done by "
-"sending a\n"
-"\"command\" to the address of the SAM bridge, and you can parse the "
-"result of the\n"
-"command as a set of string-based key-value pairs. So bearing that in "
-"mind, let's\n"
-"estabish a read-write connection to the SAM Address we defined before, "
-"then\n"
+"Finally, the good part. Interaction with the SAM bridge is done by sending a\n"
+"\"command\" to the address of the SAM bridge, and you can parse the result of the\n"
+"command as a set of string-based key-value pairs. So bearing that in mind, let's\n"
+"estabish a read-write connection to the SAM Address we defined before, then\n"
 "write a \"CommandSAM\" Function and a reply parser."
 msgstr ""
 
@@ -10145,17 +9087,14 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:184
 msgid ""
-"We're communicating with SAM via a Socket, so in order to connect to, "
-"read from,\n"
-"and write to the socket, you'll need to create the following private "
-"variables\n"
+"We're communicating with SAM via a Socket, so in order to connect to, read from,\n"
+"and write to the socket, you'll need to create the following private variables\n"
 "in the Jsam class:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:196
 msgid ""
-"You will also want to instantiate those variables in your Constructors by"
-"\n"
+"You will also want to instantiate those variables in your Constructors by\n"
 "creating a function to do so."
 msgstr ""
 
@@ -10165,23 +9104,17 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:222
 msgid ""
-"Now you're all set up to finally start talking to SAM. In order to keep "
-"things\n"
-"nicely organized, let's create a function which sends a single command to"
-" SAM,\n"
-"terminated by a newline, and which returns a Reply object, which we will "
-"create\n"
+"Now you're all set up to finally start talking to SAM. In order to keep things\n"
+"nicely organized, let's create a function which sends a single command to SAM,\n"
+"terminated by a newline, and which returns a Reply object, which we will create\n"
 "in the next step:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:241
 msgid ""
-"Note that we are using the writer and reader we created from the socket "
-"in the\n"
-"previous step as our inputs and outputs to the socket. When we get a "
-"reply from\n"
-"the reader, we pass the string to the Reply constructor, which parses it "
-"and\n"
+"Note that we are using the writer and reader we created from the socket in the\n"
+"previous step as our inputs and outputs to the socket. When we get a reply from\n"
+"the reader, we pass the string to the Reply constructor, which parses it and\n"
 "returns the Reply object."
 msgstr ""
 
@@ -10192,37 +9125,29 @@ msgstr ""
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:253
 msgid ""
 "In order to more easily handle replies, we'll use a Reply object to\n"
-"automatically parse the results we get from the SAM bridge. A reply has "
-"at least\n"
-"a topic, a type, and a result, as well as an arbitrary number of key-"
-"value\n"
+"automatically parse the results we get from the SAM bridge. A reply has at least\n"
+"a topic, a type, and a result, as well as an arbitrary number of key-value\n"
 "pairs."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:268
 msgid ""
-"As you can see, we will be storing the \"result\" as an enum, "
-"REPLY_TYPES. This\n"
-"enum contains all the possible reply results which the SAM bridge might "
-"respond\n"
+"As you can see, we will be storing the \"result\" as an enum, REPLY_TYPES. This\n"
+"enum contains all the possible reply results which the SAM bridge might respond\n"
 "with."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:335
 msgid ""
-"Now let's create our constructor, which takes the reply string recieved "
-"from the\n"
-"socket as a parameter, parses it, and uses the information to set up the "
-"reply\n"
-"object. The reply is space-delimited, with key-value pairs joined by an "
-"equal\n"
+"Now let's create our constructor, which takes the reply string recieved from the\n"
+"socket as a parameter, parses it, and uses the information to set up the reply\n"
+"object. The reply is space-delimited, with key-value pairs joined by an equal\n"
 "sign and terminated by a newline."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:364
 msgid ""
-"Lastly, for the sake of convenience, let's give the reply object a "
-"toString()\n"
+"Lastly, for the sake of convenience, let's give the reply object a toString()\n"
 "function which returns a string representation of the Reply object."
 msgstr ""
 
@@ -10232,30 +9157,21 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:379
 msgid ""
-"Now we're ready to establish communication with SAM by sending a "
-"\"Hello\"\n"
-"message. If you're writing a new SAM library, you should probably target "
-"at\n"
-"least SAM 3.1, since it's available in both I2P and i2pd and introduces "
-"support\n"
+"Now we're ready to establish communication with SAM by sending a \"Hello\"\n"
+"message. If you're writing a new SAM library, you should probably target at\n"
+"least SAM 3.1, since it's available in both I2P and i2pd and introduces support\n"
 "for the SIGNATURE_TYPE parameter."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:397
 msgid ""
-"As you can see, we use the CommandSAM function we created before to send "
-"the\n"
-"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This "
-"tells\n"
-"SAM that you want to start communicating with the API, and that you know "
-"how\n"
+"As you can see, we use the CommandSAM function we created before to send the\n"
+"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This tells\n"
+"SAM that you want to start communicating with the API, and that you know how\n"
 "to speak SAM version 3.0 and 3.1. The router, in turn, will respond with\n"
-"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass"
-" to\n"
-"the Reply constructor to get a valid Reply object. From now on, we can "
-"use our\n"
-"CommandSAM function and Reply object to deal with all our communication "
-"across\n"
+"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass to\n"
+"the Reply constructor to get a valid Reply object. From now on, we can use our\n"
+"CommandSAM function and Reply object to deal with all our communication across\n"
 "the SAM bridge."
 msgstr ""
 
@@ -10265,66 +9181,46 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:423
 msgid ""
-"Now that you've negotiated your connection to SAM and agreed on a SAM "
-"version\n"
-"you both speak, you can set up peer-to-peer connections for your "
-"application\n"
-"to connect to other i2p applications. You do this by sending a \"SESSION "
-"CREATE\"\n"
-"command to the SAM Bridge. To do that, we'll use a CreateSession function"
-" that\n"
+"Now that you've negotiated your connection to SAM and agreed on a SAM version\n"
+"you both speak, you can set up peer-to-peer connections for your application\n"
+"to connect to other i2p applications. You do this by sending a \"SESSION CREATE\"\n"
+"command to the SAM Bridge. To do that, we'll use a CreateSession function that\n"
 "accepts a session ID and a destination type parameter."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:444
 msgid ""
-"That was easy, right? All we had to do was adapt the pattern we used in "
-"our\n"
-"HelloSAM function to the ``SESSION CREATE`` command. A good reply from "
-"the\n"
-"bridge will still return OK, and in that case we return the ID of the "
-"newly\n"
-"created SAM connection. Otherwise, we return an empty string because "
-"that's an\n"
-"invalid ID anyway and it failed, so it's easy to check. Let's see if this"
-"\n"
+"That was easy, right? All we had to do was adapt the pattern we used in our\n"
+"HelloSAM function to the ``SESSION CREATE`` command. A good reply from the\n"
+"bridge will still return OK, and in that case we return the ID of the newly\n"
+"created SAM connection. Otherwise, we return an empty string because that's an\n"
+"invalid ID anyway and it failed, so it's easy to check. Let's see if this\n"
 "function works by writing a test for it:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:461
 msgid ""
-"Note that in this test, we *must* call HelloSAM first to establish "
-"communication\n"
-"with SAM before starting our session. If not, the bridge will reply with "
-"an\n"
+"Note that in this test, we *must* call HelloSAM first to establish communication\n"
+"with SAM before starting our session. If not, the bridge will reply with an\n"
 "error and the test will fail."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:472
 msgid ""
-"Now you have your session established and your local destination, and "
-"need to\n"
-"decide what you want to do with them. Your session can now be commanded "
-"to\n"
-"connect to a remote service over I2P, or to wait for incoming connections"
-" to\n"
-"respond to. However, before you can connect to a remote destination, you "
-"may\n"
-"need to obtain the base64 of the destination, which is what the API "
-"expects. In\n"
-"order to do this, we'll create a LookupName function, which will return "
-"the\n"
+"Now you have your session established and your local destination, and need to\n"
+"decide what you want to do with them. Your session can now be commanded to\n"
+"connect to a remote service over I2P, or to wait for incoming connections to\n"
+"respond to. However, before you can connect to a remote destination, you may\n"
+"need to obtain the base64 of the destination, which is what the API expects. In\n"
+"order to do this, we'll create a LookupName function, which will return the\n"
 "base64 in a usable form."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:494
 msgid ""
-"Again, this is almost the same as our HelloSAM and CreateSession "
-"functions,\n"
-"with one difference. Since we're looking for the VALUE specifically and "
-"the NAME\n"
-"field will be the same as the ``name`` argument, it simply returns the "
-"base64\n"
+"Again, this is almost the same as our HelloSAM and CreateSession functions,\n"
+"with one difference. Since we're looking for the VALUE specifically and the NAME\n"
+"field will be the same as the ``name`` argument, it simply returns the base64\n"
 "string of the destination requested."
 msgstr ""
 
@@ -10334,50 +9230,39 @@ msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:516
 msgid ""
-"At last, we are going to establish a connection to another service with "
-"our new\n"
+"At last, we are going to establish a connection to another service with our new\n"
 "library. This part confused me a bit at first, but the most astute Java\n"
 "developers were probably wondering why we didn't extend the socket class\n"
-"instead of creating a Socket variable inside of the Jsam class. That's "
-"because\n"
-"until now, we've been communicating with the \"Control Socket\" and we "
-"need to\n"
-"create a new socket to do the actual communication. So we've waited to "
-"extend\n"
+"instead of creating a Socket variable inside of the Jsam class. That's because\n"
+"until now, we've been communicating with the \"Control Socket\" and we need to\n"
+"create a new socket to do the actual communication. So we've waited to extend\n"
 "the the Socket class with the Jsam class until now:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:530
 msgid ""
-"Also, let's alter our startConnection function so that we can use it to "
-"switch\n"
-"over from the control socket to the socket we'll be using in our "
-"application. It\n"
+"Also, let's alter our startConnection function so that we can use it to switch\n"
+"over from the control socket to the socket we'll be using in our application. It\n"
 "will now take a Socket argument."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:556
 msgid ""
-"This allows us to quickly and easily open a new socket to communicate "
-"over,\n"
+"This allows us to quickly and easily open a new socket to communicate over,\n"
 "perform the \"Hello SAM\" handshake over again, and connect the stream."
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:579
 msgid ""
-"And now you have a new Socket for communicating over SAM! Let's do the "
-"same\n"
+"And now you have a new Socket for communicating over SAM! Let's do the same\n"
 "thing for Accepting remote connections:"
 msgstr ""
 
 #: i2p2www/blog/2019/06/23/sam-library-basics.rst:599
 msgid ""
-"There you have it. That's how you build a SAM library, step-by-step. In "
-"the\n"
-"future, I will cross-reference this with the working version of the "
-"library,\n"
-"Jsam, and the SAM v3 specification but for now I've got to get some other"
-" stuff\n"
+"There you have it. That's how you build a SAM library, step-by-step. In the\n"
+"future, I will cross-reference this with the working version of the library,\n"
+"Jsam, and the SAM v3 specification but for now I've got to get some other stuff\n"
 "done."
 msgstr ""
 
@@ -10395,22 +9280,13 @@ msgid ""
 "including per-client authentication for encrypted leasesets.\n"
 "The console has an updated I2P logo and several new icons.\n"
 "We've updated the Linux installer."
-msgstr ""
-"0.9.41 continuă lucrările pentru implementarea noilor funcții pentru "
-"propunerea 123,\n"
-"inclusiv autentificarea per client pentru închirieri criptate.\n"
-"Consola are un logo I2P actualizat și câteva pictograme noi.\n"
-"Am actualizat instalatorul Linux."
+msgstr "0.9.41 continuă lucrările pentru implementarea noilor funcții pentru propunerea 123,\ninclusiv autentificarea per client pentru închirieri criptate.\nConsola are un logo I2P actualizat și câteva pictograme noi.\nAm actualizat instalatorul Linux."
 
 #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:23
 msgid ""
 "Startup should be faster on platforms such as Raspberry Pi.\n"
-"We've fixed several bugs, including some serious ones affecting low-level"
-" network messages."
-msgstr ""
-"Pornirea ar trebui să fie mai rapidă pe platforme precum Raspberry Pi.\n"
-"Am rezolvat mai multe bug-uri, inclusiv unele grave care afectează mesaje"
-" de rețea la nivel scăzut."
+"We've fixed several bugs, including some serious ones affecting low-level network messages."
+msgstr "Pornirea ar trebui să fie mai rapidă pe platforme precum Raspberry Pi.\nAm rezolvat mai multe bug-uri, inclusiv unele grave care afectează mesaje de rețea la nivel scăzut."
 
 #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:38
 msgid ""
@@ -10503,58 +9379,39 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:11
 msgid ""
-"*This post is adapted directly from material originally created for "
-"mhatta's*\n"
-"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-"
-"c08ec9de225d>`__\\ *.*\n"
-"*He deserves the credit for the OP. It has been updated in certain places"
-" where*\n"
-"*it refers to old versions of I2P as current and has undergone some "
-"light*\n"
+"*This post is adapted directly from material originally created for mhatta's*\n"
+"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-c08ec9de225d>`__\\ *.*\n"
+"*He deserves the credit for the OP. It has been updated in certain places where*\n"
+"*it refers to old versions of I2P as current and has undergone some light*\n"
 "*editing. -idk*"
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:17
 msgid ""
-"Right after it starts up, I2P is often seen as a little bit slow. It's "
-"true, and\n"
-"we all know why, by nature, `garlic routing "
-"<https://en.wikipedia.org/wiki/Garlic_routing>`__\n"
-"adds overhead to the familiar experience of using the internet so that "
-"you can\n"
-"have privacy, but this means that for many or most I2P services, your "
-"data will\n"
+"Right after it starts up, I2P is often seen as a little bit slow. It's true, and\n"
+"we all know why, by nature, `garlic routing <https://en.wikipedia.org/wiki/Garlic_routing>`__\n"
+"adds overhead to the familiar experience of using the internet so that you can\n"
+"have privacy, but this means that for many or most I2P services, your data will\n"
 "need to go through 12 hops by default."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:28
 msgid ""
-"Also, unlike Tor, I2P was primarily designed as a closed network. You can"
-"\n"
-"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-"
-"untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources "
-"inside I2P, but you are not supposed\n"
-"to access `clearnet "
-"<https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n"
+"Also, unlike Tor, I2P was primarily designed as a closed network. You can\n"
+"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources inside I2P, but you are not supposed\n"
+"to access `clearnet <https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n"
 "websites through I2P. There exist a few I2P “outproxies” similar to\n"
-"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit"
-" nodes to\n"
-"access clearnet, but most of them are very slow to use as going to the "
-"clearnet\n"
-"is effectively *another* hop in the already 6 hops in, six hops out "
-"connection."
+"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit nodes to\n"
+"access clearnet, but most of them are very slow to use as going to the clearnet\n"
+"is effectively *another* hop in the already 6 hops in, six hops out connection."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:36
 msgid ""
-"Until a few versions ago, this problem was even harder to deal with "
-"because many\n"
-"I2P router users were having difficulties configuring the bandwidth "
-"settings for\n"
-"their routers. If everyone who can takes the time to adjust their "
-"bandwidth\n"
-"settings properly, they will improve not only your connection but also "
-"the I2P\n"
+"Until a few versions ago, this problem was even harder to deal with because many\n"
+"I2P router users were having difficulties configuring the bandwidth settings for\n"
+"their routers. If everyone who can takes the time to adjust their bandwidth\n"
+"settings properly, they will improve not only your connection but also the I2P\n"
 "network as a whole."
 msgstr ""
 
@@ -10564,8 +9421,7 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:45
 msgid ""
-"Since I2P is a peer-to-peer network, you have to share some of your "
-"network\n"
+"Since I2P is a peer-to-peer network, you have to share some of your network\n"
 "bandwidth with other peers. You see choose how much in “I2P Bandwidth\n"
 "Configuration” (“Configure Bandwidth” button in the “Applications and\n"
 "Configuration” section of I2P Router Console, or\n"
@@ -10574,47 +9430,34 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:55
 msgid ""
-"If you see a shared bandwidth limit of 48 KBps, which is very low, then "
-"you\n"
-"may not have adjusted your shared bandwidth from the default. As the "
-"original\n"
-"author of the material this blog post is adapted from noted, I2P has a "
-"default\n"
-"shared bandwidth limit that is very low until the user adjusts it to "
-"avoid\n"
+"If you see a shared bandwidth limit of 48 KBps, which is very low, then you\n"
+"may not have adjusted your shared bandwidth from the default. As the original\n"
+"author of the material this blog post is adapted from noted, I2P has a default\n"
+"shared bandwidth limit that is very low until the user adjusts it to avoid\n"
 "causing issues with the user's connection."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:61
 msgid ""
-"However, since many users may not know exactly which bandwidth settings "
-"to\n"
-"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ "
-"introduced a\n"
-"New Install Wizard. It contains a Bandwidth Test, which automatically "
-"detects\n"
-"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) "
-"and adjusts\n"
+"However, since many users may not know exactly which bandwidth settings to\n"
+"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ introduced a\n"
+"New Install Wizard. It contains a Bandwidth Test, which automatically detects\n"
+"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) and adjusts\n"
 "I2P’s bandwidth settings accordingly."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:67
 msgid ""
-"If you want to re-run the wizard, for instance following a change in your"
-"\n"
-"service provider or bcause you installed I2P before version 0.9.38, you "
-"can\n"
-"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply "
-"access\n"
+"If you want to re-run the wizard, for instance following a change in your\n"
+"service provider or bcause you installed I2P before version 0.9.38, you can\n"
+"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply access\n"
 "the wizard directly at http://localhost:7657/welcome"
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:76
 msgid ""
-"Using the Wizard is straightforward, simply keep clicking “Next”. "
-"Sometimes\n"
-"M-Lab’s chosen measurement servers are down and the test fails. In such "
-"case,\n"
+"Using the Wizard is straightforward, simply keep clicking “Next”. Sometimes\n"
+"M-Lab’s chosen measurement servers are down and the test fails. In such case,\n"
 "click “Previous” (do not use your web browser’s “back” button), then\n"
 "try it again."
 msgstr ""
@@ -10625,27 +9468,19 @@ msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:88
 msgid ""
-"Even after adjusted the bandwidth, your connection might still be slow As"
-" I\n"
-"said, I2P is a P2P network. It will take some time for your I2P router to"
-" be\n"
-"discovered by other peers and integrated into the I2P network. If your "
-"router\n"
-"not up long enough to become well integrated, or if you shut down un-"
-"gracefully\n"
-"too often, the network will remain fairly slow. On the other hand, the "
-"longer\n"
-"you run your I2P router continuously, the faster and more stable your "
-"connection\n"
+"Even after adjusted the bandwidth, your connection might still be slow As I\n"
+"said, I2P is a P2P network. It will take some time for your I2P router to be\n"
+"discovered by other peers and integrated into the I2P network. If your router\n"
+"not up long enough to become well integrated, or if you shut down un-gracefully\n"
+"too often, the network will remain fairly slow. On the other hand, the longer\n"
+"you run your I2P router continuously, the faster and more stable your connection\n"
 "becomes, and more of your bandwidth share will be used in the network."
 msgstr ""
 
 #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:96
 msgid ""
-"However, many people might not be able to stay your I2P router up. In "
-"such\n"
-"case, you can still run the I2P router on a remote server such as VPS, "
-"then use\n"
+"However, many people might not be able to stay your I2P router up. In such\n"
+"case, you can still run the I2P router on a remote server such as VPS, then use\n"
 "SSH port forwarding."
 msgstr ""
 
@@ -10661,21 +9496,10 @@ msgstr "0.9.42 cu remedierea erorilor "
 msgid ""
 "0.9.42 continues the work to make I2P faster and more reliable.\n"
 "It includes several changes to speed up our UDP transport.\n"
-"We have split up the configuration files to enable future work for more "
-"modular packaging.\n"
-"We continue work to implement new proposals for faster and more secure "
-"encryption.\n"
+"We have split up the configuration files to enable future work for more modular packaging.\n"
+"We continue work to implement new proposals for faster and more secure encryption.\n"
 "There are, of course, a lot of bug fixes also."
-msgstr ""
-"0.9.42 continuă activitatea pentru ca I2P să fie mai rapid și mai fiabil."
-"\n"
-"Acesta include mai multe modificări pentru a accelera transportul nostru "
-"UDP.\n"
-"Am împărțit fișierele de configurare pentru a permite lucrările viitoare "
-"pentru ambalaje mai modulare.\n"
-"Continuăm munca pentru implementarea de noi propuneri pentru o criptare "
-"mai rapidă și mai sigură.\n"
-"Există, de asemenea, o mulțime de remedieri de erori."
+msgstr "0.9.42 continuă activitatea pentru ca I2P să fie mai rapid și mai fiabil.\nAcesta include mai multe modificări pentru a accelera transportul nostru UDP.\nAm împărțit fișierele de configurare pentru a permite lucrările viitoare pentru ambalaje mai modulare.\nContinuăm munca pentru implementarea de noi propuneri pentru o criptare mai rapidă și mai sigură.\nExistă, de asemenea, o mulțime de remedieri de erori."
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:34
 msgid "Console: Split up help page, tag text for translation"
@@ -10702,7 +9526,8 @@ msgid "JBigI: GMP 6.1.2 (Linux 64-bit only)"
 msgstr ""
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:40
-msgid "NetDB: Choose alternate gateway for store replies to reduce connections"
+msgid ""
+"NetDB: Choose alternate gateway for store replies to reduce connections"
 msgstr ""
 
 #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:41
@@ -10749,134 +9574,91 @@ msgstr ""
 msgid "Def Con Trip Report- zzz"
 msgstr ""
 
-#: i2p2www/blog/2019/08/30/defcon.rst:11 i2p2www/blog/2019/08/30/defcon2.rst:11
+#: i2p2www/blog/2019/08/30/defcon.rst:11
+#: i2p2www/blog/2019/08/30/defcon2.rst:11
 msgid "Def Con Trip Report"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:14
 msgid ""
-"idk and I attended DEFCON 27 and presented two workshops on I2P for "
-"application\n"
-"developers, with support from mhatta and Alex. I gave the workshop at "
-"Monero\n"
-"Village and idk gave the one at Crypto/Privacy Village. Here, I will "
-"summarize\n"
-"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will"
-" post a\n"
+"idk and I attended DEFCON 27 and presented two workshops on I2P for application\n"
+"developers, with support from mhatta and Alex. I gave the workshop at Monero\n"
+"Village and idk gave the one at Crypto/Privacy Village. Here, I will summarize\n"
+"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will post a\n"
 "trip report covering his workshop."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:22
 msgid ""
-"We had about 8 attendees for the Monero Village workshop, entitled \"I2P "
-"for\n"
-"Cryptocurrency Developers\". We planned to discuss the particular "
-"networking\n"
-"needs for each application and work through the various i2ptunnel and SAM"
-"\n"
-"options available. However, all attendees were relatively unfamiliar with"
-" I2P,\n"
-"so we pivoted and gave an overview of I2P. As none of the attendees had a"
-" laptop\n"
-"with them, we helped several of them install I2P on their Android phone "
-"and\n"
-"walked through some of the features of the app. For all users, the app "
-"appeared\n"
+"We had about 8 attendees for the Monero Village workshop, entitled \"I2P for\n"
+"Cryptocurrency Developers\". We planned to discuss the particular networking\n"
+"needs for each application and work through the various i2ptunnel and SAM\n"
+"options available. However, all attendees were relatively unfamiliar with I2P,\n"
+"so we pivoted and gave an overview of I2P. As none of the attendees had a laptop\n"
+"with them, we helped several of them install I2P on their Android phone and\n"
+"walked through some of the features of the app. For all users, the app appeared\n"
 "to reseed and build tunnels fairly quickly."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:33
 msgid ""
-"One common question after installing the app was \"what do I do now?\". "
-"The app\n"
-"doesn't have a 'hidden services of interest' section or first-run wizard "
-"like\n"
-"our desktop application does, and most of the default addressbook entries"
-" are\n"
-"long-dead. There's improvements we could make to the first-run "
-"experience.\n"
+"One common question after installing the app was \"what do I do now?\". The app\n"
+"doesn't have a 'hidden services of interest' section or first-run wizard like\n"
+"our desktop application does, and most of the default addressbook entries are\n"
+"long-dead. There's improvements we could make to the first-run experience.\n"
 "Also, some of the more interesting parts of the app are hidden behind an\n"
-"advanced setting; we should review those items and consider un-hiding "
-"some of\n"
+"advanced setting; we should review those items and consider un-hiding some of\n"
 "them."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:43
 msgid ""
-"It's always useful to go to Tor talks, not so much to find out what "
-"they're\n"
-"doing, but to hear how they explain things to people, and what "
-"terminology they\n"
-"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large "
-"room\n"
-"attended by about two thousand people. He gave a very brief overview of "
-"Tor\n"
-"with only three or four slides. He says they now have \"two to eight "
-"million\n"
-"users a day\". Most of the talk was a review of national blocking "
-"attempts over\n"
-"the years, starting with Thailand and Iran in '06-'07 through Tunisia, "
-"china,\n"
-"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He "
-"showed a\n"
-"new form to be showed to new users, with a checkbox \"Tor is censored in "
-"my\n"
+"It's always useful to go to Tor talks, not so much to find out what they're\n"
+"doing, but to hear how they explain things to people, and what terminology they\n"
+"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large room\n"
+"attended by about two thousand people. He gave a very brief overview of Tor\n"
+"with only three or four slides. He says they now have \"two to eight million\n"
+"users a day\". Most of the talk was a review of national blocking attempts over\n"
+"the years, starting with Thailand and Iran in '06-'07 through Tunisia, china,\n"
+"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He showed a\n"
+"new form to be showed to new users, with a checkbox \"Tor is censored in my\n"
 "country\"."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:56
 msgid ""
 "Their new pluggable transport \"snowflake\" uses a combination of domain\n"
-"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. "
-"Roger\n"
-"only had one slide on it, and I wasn't familiar with it, so we should do "
-"more\n"
-"research on what it's all about. He briefly mentioned some things they "
-"may be\n"
-"working on next, including \"salmon\" distribution of bridges, "
-"FTE/Marionette,\n"
-"decoy routing, and \"cupcake\" which is an extension of snowflake. While "
-"I don't\n"
-"have any further information about them, they may be good buzzwords to "
-"keep an\n"
+"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. Roger\n"
+"only had one slide on it, and I wasn't familiar with it, so we should do more\n"
+"research on what it's all about. He briefly mentioned some things they may be\n"
+"working on next, including \"salmon\" distribution of bridges, FTE/Marionette,\n"
+"decoy routing, and \"cupcake\" which is an extension of snowflake. While I don't\n"
+"have any further information about them, they may be good buzzwords to keep an\n"
 "eye out for on their mailing lists."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:67
 msgid ""
 "Much of Tor's censorship woes is due to Tor's popularity, but their TLS\n"
-"handshake is a particular issue and it's been the focus of much of the "
-"\"arms\n"
-"race\" over the years. In some ways we're in better shape, as we've taken"
-"\n"
-"several features of their current-best obfs4 pluggable transport and "
-"build them\n"
-"into NTCP2. However, we do have issues with our website and reseeds being"
-"\n"
+"handshake is a particular issue and it's been the focus of much of the \"arms\n"
+"race\" over the years. In some ways we're in better shape, as we've taken\n"
+"several features of their current-best obfs4 pluggable transport and build them\n"
+"into NTCP2. However, we do have issues with our website and reseeds being\n"
 "blocked, as Sadie and Phong will be presenting at USENIX FOCI this week."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon.rst:76
 msgid ""
-"Notes for next time: I do recommend DEFCON, as long as we find a village "
-"to\n"
-"call our home. It's an enormous conference and the limited general "
-"hangout\n"
+"Notes for next time: I do recommend DEFCON, as long as we find a village to\n"
+"call our home. It's an enormous conference and the limited general hangout\n"
 "spaces are massively overcrowded. Both Monero Village and Crypto/Privacy\n"
-"Village were fantastic hosts and we had several hours at each spot to "
-"meet with\n"
-"people. We should find more opportunities to work with both "
-"organizations.\n"
-"There were also ZCash people at the Monero Village and we should work "
-"with them\n"
-"also. Any future workshop should be targeted at a more general audience. "
-"We do\n"
-"need a standard \"Intro to I2P\" slide deck; it would have been helpful "
-"at the\n"
-"workshops. Don't expect attendees to have laptops with them, focus on "
-"Android\n"
-"for any hands-on exercises. There's several improvements to be made in "
-"our\n"
+"Village were fantastic hosts and we had several hours at each spot to meet with\n"
+"people. We should find more opportunities to work with both organizations.\n"
+"There were also ZCash people at the Monero Village and we should work with them\n"
+"also. Any future workshop should be targeted at a more general audience. We do\n"
+"need a standard \"Intro to I2P\" slide deck; it would have been helpful at the\n"
+"workshops. Don't expect attendees to have laptops with them, focus on Android\n"
+"for any hands-on exercises. There's several improvements to be made in our\n"
 "Android app. Drink lots of water in Vegas... and stay away from the slot\n"
 "machines."
 msgstr ""
@@ -10893,95 +9675,67 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:19
 msgid ""
-"My workshop went well, we even had a few application developers attend! "
-"In\n"
-"particular I had a pretty lengthy conversation with a person named Mary "
-"about\n"
+"My workshop went well, we even had a few application developers attend! In\n"
+"particular I had a pretty lengthy conversation with a person named Mary about\n"
 "how I2P could be used to eliminate centralization and enhance privacy in\n"
-"a \"Magic Wormhole\" type of application. While I wasn't totally familiar"
-" with\n"
-"Magic Wormhole at the time, I think most of my advice was usable. I think"
-" Mary\n"
-"had some very interesting and workable ideas about sharing information in"
-" more\n"
-"human-centric ways that could be interesting in I2P applications, and am "
-"looking\n"
+"a \"Magic Wormhole\" type of application. While I wasn't totally familiar with\n"
+"Magic Wormhole at the time, I think most of my advice was usable. I think Mary\n"
+"had some very interesting and workable ideas about sharing information in more\n"
+"human-centric ways that could be interesting in I2P applications, and am looking\n"
 "forward to experimenting with some of those."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:30
 msgid ""
-"The materials I made for the application development workshop are "
-"available on\n"
-"Github! https://github.com/eyedeekay/defcon Please consider it a living "
-"document,\n"
-"your input is desired! As it is licensed permissively, you are free to "
-"fork it\n"
-"and make it your own as well. Share your examples, your hacks, or correct"
-" my\n"
-"comma use, complain about my document preparation style, or just print "
-"off your\n"
+"The materials I made for the application development workshop are available on\n"
+"Github! https://github.com/eyedeekay/defcon Please consider it a living document,\n"
+"your input is desired! As it is licensed permissively, you are free to fork it\n"
+"and make it your own as well. Share your examples, your hacks, or correct my\n"
+"comma use, complain about my document preparation style, or just print off your\n"
 "own copy in booklet form!"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:39
 msgid ""
-"I also talked to a guy who gives advice to the government about the "
-"differences\n"
-"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in "
-"which\n"
-"peers in a P2P application might want to have enhanced privacy from each-"
-"other,\n"
+"I also talked to a guy who gives advice to the government about the differences\n"
+"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in which\n"
+"peers in a P2P application might want to have enhanced privacy from each-other,\n"
 "and why I2P is perhaps uniquely suited to accomplish that."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:46
 msgid ""
-"In general, both the application development workshops went well, even "
-"though\n"
-"they didn't go entirely according to plan in that only a small proportion"
-" of the\n"
-"audience were application developers. The impression I got was that many "
-"people\n"
-"are very interested in I2P, but also many people are confused by how "
-"interacting\n"
-"with I2P works. By re-focusing on their questions and by teaming off with"
-" zzz,\n"
-"mhatta, and Alex we were fairly successful at dealing with our audience, "
-"which\n"
+"In general, both the application development workshops went well, even though\n"
+"they didn't go entirely according to plan in that only a small proportion of the\n"
+"audience were application developers. The impression I got was that many people\n"
+"are very interested in I2P, but also many people are confused by how interacting\n"
+"with I2P works. By re-focusing on their questions and by teaming off with zzz,\n"
+"mhatta, and Alex we were fairly successful at dealing with our audience, which\n"
 "was more varied in terms of occupation, interest, and I2P knowledge than\n"
 "expected."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:57
 msgid ""
-"Besides that, I also talked to Alex about my experimental contextual-"
-"identity\n"
-"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to"
-" talk\n"
-"a little about bundling, but not too much, as it was a very busy "
-"convention. I'm\n"
+"Besides that, I also talked to Alex about my experimental contextual-identity\n"
+"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to talk\n"
+"a little about bundling, but not too much, as it was a very busy convention. I'm\n"
 "looking forward to following up with him on that soon."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:64
 msgid ""
 "mhatta and I almost won a lobster from a claw machine, but it was a real\n"
-"fighter and got away at the last second. Really thought I had it for a "
-"moment\n"
+"fighter and got away at the last second. Really thought I had it for a moment\n"
 "though. :)"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/defcon2.rst:70
 msgid ""
-"To add to zzz's notes for next time, aside from being more general I "
-"believe our\n"
-"workshops would not have been as able to adapt to the needs of the "
-"audience\n"
-"without the support of mhatta and Alex. Having people who can help "
-"particpants\n"
-"individually or in small groups was immensely helpful, many, many thanks "
-"to both\n"
+"To add to zzz's notes for next time, aside from being more general I believe our\n"
+"workshops would not have been as able to adapt to the needs of the audience\n"
+"without the support of mhatta and Alex. Having people who can help particpants\n"
+"individually or in small groups was immensely helpful, many, many thanks to both\n"
 "of them for helping us out."
 msgstr ""
 
@@ -10992,95 +9746,71 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:14
 msgid ""
-"Over the past year I have had the good fortune to participate in the "
-"research\n"
-"Nguyen Phong Hoang from Stony Brook University has been doing regarding "
-"I2P\n"
-"censorship. The infrastructure used for this research provided numerous "
-"and\n"
-"geographically diverse vantage points, and also the ability to conduct "
-"in-depth\n"
-"measurements across all levels of the network stack. I2P services which "
-"were\n"
-"measured for availability included official homepage, mirror site, reseed"
-"\n"
+"Over the past year I have had the good fortune to participate in the research\n"
+"Nguyen Phong Hoang from Stony Brook University has been doing regarding I2P\n"
+"censorship. The infrastructure used for this research provided numerous and\n"
+"geographically diverse vantage points, and also the ability to conduct in-depth\n"
+"measurements across all levels of the network stack. I2P services which were\n"
+"measured for availability included official homepage, mirror site, reseed\n"
 "servers and active relays."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:24
 msgid ""
-"The presentation on Tuesday went very well, and Phong was very busy "
-"afterwards\n"
-"answering questions about his work. I was busy too answering questions "
-"about\n"
-"I2P and what it does. The new stickers featuring the updated logo by Ura "
-"Design\n"
-"got rave reviews! It was a very positive experience and I will be looking"
-"\n"
-"forward to continuing to work with Phong and monitoring I2P censorship. I"
-" would\n"
-"encourage anyone who has encountered blocking, or has had success using "
-"I2P to\n"
+"The presentation on Tuesday went very well, and Phong was very busy afterwards\n"
+"answering questions about his work. I was busy too answering questions about\n"
+"I2P and what it does. The new stickers featuring the updated logo by Ura Design\n"
+"got rave reviews! It was a very positive experience and I will be looking\n"
+"forward to continuing to work with Phong and monitoring I2P censorship. I would\n"
+"encourage anyone who has encountered blocking, or has had success using I2P to\n"
 "communicate in restricted environments to reach out if you can. I2P is\n"
-"currently working on new solutions to circumvent internet blocking. "
-"Having met\n"
+"currently working on new solutions to circumvent internet blocking. Having met\n"
 "people this year who have given me first hand accounts of the effects of\n"
-"censorship and the need to stay connected, makes the need for I2P to be "
-"more\n"
-"resilient where it needs to be and for the team to be creating guides for"
-" using\n"
+"censorship and the need to stay connected, makes the need for I2P to be more\n"
+"resilient where it needs to be and for the team to be creating guides for using\n"
 "I2P in these situations."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:39
 msgid ""
-"I will be putting together better resources for researchers interested in"
-" I2P,\n"
+"I will be putting together better resources for researchers interested in I2P,\n"
 "as well."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:44
 msgid ""
 "I also had the good fortune to spend time with Mhatta, who is an I2P\n"
-"contributor, and to make connections for future funding. A huge thank you"
-" to\n"
-"the community builders I met in Tunis who I met again and who are "
-"offering so\n"
-"much support to the project. This has been an exciting year so far, and "
-"I2P has\n"
-"so much work to do. Please consider donating your time or funding the "
-"project\n"
+"contributor, and to make connections for future funding. A huge thank you to\n"
+"the community builders I met in Tunis who I met again and who are offering so\n"
+"much support to the project. This has been an exciting year so far, and I2P has\n"
+"so much work to do. Please consider donating your time or funding the project\n"
 "as it needs to scale quickly to new challenges."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:53
 msgid ""
-"If you have an opportunity to, you can read the full report Measuring I2P"
-"\n"
+"If you have an opportunity to, you can read the full report Measuring I2P\n"
 "Censorship at a Global Scale here\n"
 "https://www.usenix.org/conference/foci19/presentation/hoang"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:59
 msgid ""
-"Another great workshop in the measurements workshop was On the Importance"
-" of\n"
+"Another great workshop in the measurements workshop was On the Importance of\n"
 "Encrypted-SNI (ESNI) to Censorship Circumvention\n"
 "https://www.usenix.org/conference/foci19/presentation/chai"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:65
 msgid ""
-"There are so many great workshops that I attended - anyone who would like"
-" too\n"
+"There are so many great workshops that I attended - anyone who would like too\n"
 "can access the program and related materials here:\n"
 "https://www.usenix.org/conference/foci19/workshop-program"
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/foci.rst:71
 msgid ""
-"I will be attending Our Networks in Toronto next month "
-"https://ournetworks.ca/\n"
+"I will be attending Our Networks in Toronto next month https://ournetworks.ca/\n"
 "- and so should you! The program can be viewed here\n"
 "https://ournetworks.ca/program/"
 msgstr ""
@@ -11092,63 +9822,43 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:14
 msgid ""
-"This was my first time attending IFF, and what a great experience for I2P"
-" this\n"
-"was! I met with human rights defenders, people who work on censorship "
-"metrics,\n"
+"This was my first time attending IFF, and what a great experience for I2P this\n"
+"was! I met with human rights defenders, people who work on censorship metrics,\n"
 "and of course UX and security professionals."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:20
 msgid ""
 "My goal was to connect with people to further support I2P’s UX overhaul,\n"
-"keeping in mind security and UX considerations for frontline workers. As "
-"it was\n"
-"pointed out to me, people see I2P as a very important and powerful "
-"resource to\n"
-"circumvent censorship and support safe communication, however the "
-"interface\n"
-"suffers from some usability concerns. People were happy with our initial "
-"steps\n"
-"to make first time users have a better experience, such as our set up "
-"wizard\n"
-"and bandwidth detection tool. I also received positive reviews on our "
-"changes\n"
-"to the website and /home icons. It was very encouraging to hear directly "
-"from\n"
+"keeping in mind security and UX considerations for frontline workers. As it was\n"
+"pointed out to me, people see I2P as a very important and powerful resource to\n"
+"circumvent censorship and support safe communication, however the interface\n"
+"suffers from some usability concerns. People were happy with our initial steps\n"
+"to make first time users have a better experience, such as our set up wizard\n"
+"and bandwidth detection tool. I also received positive reviews on our changes\n"
+"to the website and /home icons. It was very encouraging to hear directly from\n"
 "the community that small changes we have made are in the right direction."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:32
 msgid ""
-"Things like having configuration happen out of the box and not having to "
-"put\n"
-"people in the position where they need to rely on reading so much "
-"documentation\n"
-"or chasing documentation were discussed. Also, improved documentation for"
-"\n"
-"setting up outproxies and and site mirroring were requested and "
-"suggested.\n"
-"Please see Mikal’s very good instructions on setting up an I2P outproxy "
-"that\n"
+"Things like having configuration happen out of the box and not having to put\n"
+"people in the position where they need to rely on reading so much documentation\n"
+"or chasing documentation were discussed. Also, improved documentation for\n"
+"setting up outproxies and and site mirroring were requested and suggested.\n"
+"Please see Mikal’s very good instructions on setting up an I2P outproxy that\n"
 "came out of the suggestions this week —\n"
-"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to "
-"make\n"
+"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to make\n"
 "bug reporting easier."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/freedom.rst:43
 msgid ""
-"To this point, I truly hope that the project will secure resources to "
-"continue\n"
-"the improvements to its usability that it requires to meet the growing "
-"demand\n"
-"for I2P services. It is humbling to to be working with such talented "
-"people and\n"
-"to be able to work together with our community during a time when people "
-"all\n"
-"over the globe need all of the privacy protecting resources we as people "
-"who\n"
+"To this point, I truly hope that the project will secure resources to continue\n"
+"the improvements to its usability that it requires to meet the growing demand\n"
+"for I2P services. It is humbling to to be working with such talented people and\n"
+"to be able to work together with our community during a time when people all\n"
+"over the globe need all of the privacy protecting resources we as people who\n"
 "develop, design and educate can offer."
 msgstr ""
 
@@ -11159,58 +9869,40 @@ msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:14
 msgid ""
-"The messages from activists in Syria during the Access No\\_! session on "
-"the\n"
+"The messages from activists in Syria during the Access No\\_! session on the\n"
 "first day were deeply moving and really drove home why I work in digital\n"
-"rights. We listened to the experiences of activists who are unable to "
-"travel\n"
-"due to lack of status, documentation and active conflict. For these "
-"people\n"
+"rights. We listened to the experiences of activists who are unable to travel\n"
+"due to lack of status, documentation and active conflict. For these people\n"
 "“the internet is the only passport (they) carry.” Human rights defenders\n"
-"spoke of the importance of  digital training to keep people protected "
-"when they\n"
-"are communicating with family inside of the country, as well as with "
-"family and\n"
-"friends who have left. They had created digital clinics to show people "
-"how to\n"
+"spoke of the importance of  digital training to keep people protected when they\n"
+"are communicating with family inside of the country, as well as with family and\n"
+"friends who have left. They had created digital clinics to show people how to\n"
 "use services securely, for instance, how to use features like Signal’s\n"
-"disappearing messages so that those messages could not be used against "
-"them\n"
+"disappearing messages so that those messages could not be used against them\n"
 "when devices are searched at security check points. Continuing to pursue\n"
-"education was also very important, the internet being relied on to access"
-"\n"
+"education was also very important, the internet being relied on to access\n"
 "resources."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:30
 msgid ""
-"The following days we met with people who had both questions about I2P "
-"and\n"
-"suggestions for potential use cases. We also discussed overhauling the "
-"project\n"
+"The following days we met with people who had both questions about I2P and\n"
+"suggestions for potential use cases. We also discussed overhauling the project\n"
 "documentation for threat models, improving guides for users with little\n"
-"technical background, and ensuring that these guides are easily "
-"translatable. I\n"
-"made a note that I should go through the proposals and connect then to "
-"human\n"
-"use cases and solutions. This will be part of the projects’ continued "
-"effort\n"
+"technical background, and ensuring that these guides are easily translatable. I\n"
+"made a note that I should go through the proposals and connect then to human\n"
+"use cases and solutions. This will be part of the projects’ continued effort\n"
 "to improve its user guides and onboarding."
 msgstr ""
 
 #: i2p2www/blog/2019/08/30/rights.rst:40
 msgid ""
-"The opportunity to meet face to face with people who are using I2P and "
-"have\n"
-"successfully used it to circumvent internet blockages was inspiring. As "
-"the\n"
+"The opportunity to meet face to face with people who are using I2P and have\n"
+"successfully used it to circumvent internet blockages was inspiring. As the\n"
 "project has began working on its own browser and is examining outproxy\n"
-"packaging, it needs as much feedback and testing as possible to create "
-"secure\n"
-"and frictionless experiences for people. Also, the I2P network needs more"
-"\n"
-"hosted content and mirrored sites in order to expand resources for its "
-"users."
+"packaging, it needs as much feedback and testing as possible to create secure\n"
+"and frictionless experiences for people. Also, the I2P network needs more\n"
+"hosted content and mirrored sites in order to expand resources for its users."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:2
@@ -11224,47 +9916,35 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:14
 msgid ""
-"The weekend of September 20th I traveled to Toronto to meet with Sadie to"
-" take\n"
-"part in the Our Networks conference. The Our Networks conference "
-"encompasses a\n"
-"wide variety of topic including many peer-to-peer technologies with an "
-"eye\n"
+"The weekend of September 20th I traveled to Toronto to meet with Sadie to take\n"
+"part in the Our Networks conference. The Our Networks conference encompasses a\n"
+"wide variety of topic including many peer-to-peer technologies with an eye\n"
 "toward their potential to make the world a better place."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:21
 msgid ""
-"The conference was fascinating, full of very smart people working on "
-"everything\n"
-"from physical mesh networks to the distributed web to, of course, "
-"anonymity. We\n"
-"got to talk to some great people from Tor, Protocol Labs, Parity Labs, "
-"the Dat\n"
-"Project, as well as a variety of artists and social scientists. Lots of "
-"fun too,\n"
+"The conference was fascinating, full of very smart people working on everything\n"
+"from physical mesh networks to the distributed web to, of course, anonymity. We\n"
+"got to talk to some great people from Tor, Protocol Labs, Parity Labs, the Dat\n"
+"Project, as well as a variety of artists and social scientists. Lots of fun too,\n"
 "and a great environment. Dat in particular presents some pretty cool\n"
 "opportunities for future co-operation I think."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:30
 msgid ""
-"I hadn't planned on giving a talk, but we were having so much fun that "
-"when\n"
-"we were asked, Sadie and I put something together and I gave a quick "
-"lightning\n"
+"I hadn't planned on giving a talk, but we were having so much fun that when\n"
+"we were asked, Sadie and I put something together and I gave a quick lightning\n"
 "talk about I2P and how it's design choices are relevant to Peer-to-Peer\n"
-"application development. The talk was recorded and when the video becomes"
-"\n"
-"available, I'll make sure to add it to this blog. Next year, I'll have "
-"some\n"
+"application development. The talk was recorded and when the video becomes\n"
+"available, I'll make sure to add it to this blog. Next year, I'll have some\n"
 "submissions for their Zine Library about I2P."
 msgstr ""
 
 #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:39
 msgid ""
-"Besides that, I really enjoyed my time visiting Toronto, it was a great "
-"place\n"
+"Besides that, I really enjoyed my time visiting Toronto, it was a great place\n"
 "to visit."
 msgstr ""
 
@@ -11278,23 +9958,11 @@ msgstr "0.9.43 cu remedieri de erori"
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:16
 msgid ""
-"In the 0.9.43 release, we continue work on stronger security and privacy "
-"features and performance improvements.\n"
-"Our implementation of the new leaseset specification (LS2) is now "
-"complete.\n"
-"We are beginning our implementation of stronger and faster end-to-end "
-"encryption (proposal 144) for a future release.\n"
-"Several IPv6 address detection issues have been fixed, and there of "
-"course are several other bug fixes."
-msgstr ""
-"În versiunea 0.9.43, continuăm să lucrăm la caracteristici mai puternice "
-"de securitate și confidențialitate și îmbunătățiri ale performanței.\n"
-"Implementarea noastră a noului caiet de sarcini (LS2) este acum completă."
-"\n"
-"Începem implementarea noastră pentru o criptare end-to-end mai puternică "
-"și mai rapidă (propunerea 144) pentru o versiune viitoare.\n"
-"Mai multe probleme de detectare a adreselor IPv6 au fost remediate, și "
-"există, desigur, câteva alte remedieri ale erorilor."
+"In the 0.9.43 release, we continue work on stronger security and privacy features and performance improvements.\n"
+"Our implementation of the new leaseset specification (LS2) is now complete.\n"
+"We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release.\n"
+"Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes."
+msgstr "În versiunea 0.9.43, continuăm să lucrăm la caracteristici mai puternice de securitate și confidențialitate și îmbunătățiri ale performanței.\nImplementarea noastră a noului caiet de sarcini (LS2) este acum completă.\nÎncepem implementarea noastră pentru o criptare end-to-end mai puternică și mai rapidă (propunerea 144) pentru o versiune viitoare.\nMai multe probleme de detectare a adreselor IPv6 au fost remediate, și există, desigur, câteva alte remedieri ale erorilor."
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:33
 msgid "Console setup wizard improvements"
@@ -11337,7 +10005,8 @@ msgid "i2ptunnel support for quoted custom options"
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:51
-msgid "i2psnark now starts with reduced tunnel count then increases as necessary"
+msgid ""
+"i2psnark now starts with reduced tunnel count then increases as necessary"
 msgstr ""
 
 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:52
@@ -11368,47 +10037,33 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:11
 msgid ""
-"Highlighting Research - An Empirical Study of the I2P Anonymity Network "
-"and its Censorship Resistance"
+"Highlighting Research - An Empirical Study of the I2P Anonymity Network and "
+"its Censorship Resistance"
 msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:16
 msgid ""
-"The following blog post is authored by Information Controls Fellow Hoàng "
-"Nguyên\n"
-"Phong. As an ICFP fellow, Phong's research focused on analyzing different"
-"\n"
-"aspects of the I2P network, a privacy-enhancing Internet tool that can be"
-" used\n"
+"The following blog post is authored by Information Controls Fellow Hoàng Nguyên\n"
+"Phong. As an ICFP fellow, Phong's research focused on analyzing different\n"
+"aspects of the I2P network, a privacy-enhancing Internet tool that can be used\n"
 "to access online content over an anonymity-enhancing network helpful in\n"
-"circumventing state-imposed censorship. Working with his host "
-"organization, the\n"
-"University of Massachusetts Amherst, Phong studied the I2P network's "
-"censorship\n"
-"resilience, including identifying what blocking methods a state censor "
-"might use\n"
-"to inhibit access to I2P and investigating potential solutions to make "
-"I2P more\n"
+"circumventing state-imposed censorship. Working with his host organization, the\n"
+"University of Massachusetts Amherst, Phong studied the I2P network's censorship\n"
+"resilience, including identifying what blocking methods a state censor might use\n"
+"to inhibit access to I2P and investigating potential solutions to make I2P more\n"
 "resistant to such blockage."
 msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:28
 msgid ""
 "Phong found blocking attempts on the I2P network (specifically via DNS\n"
-"poisoning, SNI-based blocking, TCP packet injection, and page-specific "
-"blocks)\n"
-"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. "
-"Phong\n"
-"posits that because the blocks are usually imposed on the I2P download "
-"page and\n"
-"reseed servers, such blocking could be mitigated by hosting download "
-"links to\n"
-"this content on large cloud service providers - raising the collateral "
-"cost of\n"
-"blocking. Phong also built a metrics portal for the platform so that "
-"researchers\n"
-"and others can better understand who is using I2P, finding that there are"
-" about\n"
+"poisoning, SNI-based blocking, TCP packet injection, and page-specific blocks)\n"
+"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. Phong\n"
+"posits that because the blocks are usually imposed on the I2P download page and\n"
+"reseed servers, such blocking could be mitigated by hosting download links to\n"
+"this content on large cloud service providers - raising the collateral cost of\n"
+"blocking. Phong also built a metrics portal for the platform so that researchers\n"
+"and others can better understand who is using I2P, finding that there are about\n"
 "20,000 relays in the network on a daily basis."
 msgstr ""
 
@@ -11422,10 +10077,8 @@ msgstr ""
 
 #: i2p2www/blog/2019/10/25/research-highlights.rst:55
 msgid ""
-"We thank Phong and his collaborators for their excellent study as we move"
-" to\n"
-"address the issues that were identified. It's exciting to see more "
-"academic\n"
+"We thank Phong and his collaborators for their excellent study as we move to\n"
+"address the issues that were identified. It's exciting to see more academic\n"
 "study of I2P and are excited to keep working with him."
 msgstr ""
 
@@ -11439,34 +10092,18 @@ msgstr "0.9.44 cu remedieri de erori"
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:16
 msgid ""
-"0.9.44 contains an important fix for a denial of service issue in hidden "
-"services handling of new encryption types.\n"
+"0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.\n"
 "All users should update as soon as possible."
-msgstr ""
-"0.9.44 conține o soluție importantă pentru o problemă de refuz a "
-"serviciului în gestionarea serviciilor ascunse de noi tipuri de criptare."
-"\n"
-"Toți utilizatorii ar trebui să se actualizeze cât mai curând posibil."
+msgstr "0.9.44 conține o soluție importantă pentru o problemă de refuz a serviciului în gestionarea serviciilor ascunse de noi tipuri de criptare.\nToți utilizatorii ar trebui să se actualizeze cât mai curând posibil."
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:21
 msgid ""
-"The release includes initial support for new end-to-end encryption "
-"(proposal 144).\n"
+"The release includes initial support for new end-to-end encryption (proposal 144).\n"
 "Work continues on this project, and it is not yet ready for use.\n"
-"There are changes to the console home page, and new embedded HTML5 media "
-"players in i2psnark.\n"
+"There are changes to the console home page, and new embedded HTML5 media players in i2psnark.\n"
 "Additional fixes for firewalled IPv6 networks are included.\n"
 "Tunnel build fixes should result in faster startup for some users."
-msgstr ""
-"Versiunea include suportul inițial pentru noua criptare end-to-end "
-"(propunerea 144).\n"
-"Lucrările continuă pentru acest proiect și încă nu este gata de "
-"utilizare.\n"
-"Există modificări la pagina principală a consolei și la noi playere HTML5"
-" integrate în i2psnark.\n"
-"Sunt incluse soluții suplimentare pentru rețelele IPv6 firewalled.\n"
-"Corecțiile de construire a tunelului ar trebui să conducă la o pornire "
-"mai rapidă pentru unii utilizatori."
+msgstr "Versiunea include suportul inițial pentru noua criptare end-to-end (propunerea 144).\nLucrările continuă pentru acest proiect și încă nu este gata de utilizare.\nExistă modificări la pagina principală a consolei și la noi playere HTML5 integrate în i2psnark.\nSunt incluse soluții suplimentare pentru rețelele IPv6 firewalled.\nCorecțiile de construire a tunelului ar trebui să conducă la o pornire mai rapidă pentru unii utilizatori."
 
 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:39
 msgid "Console home page changes"
@@ -11546,11 +10183,9 @@ msgstr ""
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:16
 msgid ""
-"0.9.45 contains important fixes for hidden mode and the bandwidth tester."
-"\n"
+"0.9.45 contains important fixes for hidden mode and the bandwidth tester.\n"
 "There's an update to the console dark theme.\n"
-"We continue work on improving performance and the development of new end-"
-"to-end encryption (proposal 144)."
+"We continue work on improving performance and the development of new end-to-end encryption (proposal 144)."
 msgstr ""
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:32
@@ -11562,7 +10197,8 @@ msgid "Console icon changes"
 msgstr ""
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:34
-msgid "Move some translations from console to router and core for embedded uses"
+msgid ""
+"Move some translations from console to router and core for embedded uses"
 msgstr ""
 
 #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:37
@@ -11616,24 +10252,20 @@ msgstr ""
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:10
 msgid ""
 "Tutorial for setting up git access through an I2P Tunnel. This tunnel\n"
-"will act as your access point to a single git service on I2P. It is part "
-"of the\n"
+"will act as your access point to a single git service on I2P. It is part of the\n"
 "overall effort to transition I2P from monotone to Git."
 msgstr ""
 
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:16
 msgid ""
-"Before anything else: Know the capabilities the service offers to the "
-"public"
+"Before anything else: Know the capabilities the service offers to the public"
 msgstr ""
 
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:19
 msgid ""
 "Depending on how the git service is configured, it may or may not offer\n"
 "all services on the same address. In the case of git.idk.i2p, there is a\n"
-"public HTTP URL, and an SSH "
-"URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to "
-"configure for your Git SSH client. Either\n"
+"public HTTP URL, and an SSH URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to configure for your Git SSH client. Either\n"
 "can be used to push or pull, but SSH is recommended."
 msgstr ""
 
@@ -11684,10 +10316,8 @@ msgid ""
 "Then, add the address you will be pushing and pulling from. Note that\n"
 "this example address is for Read-Only HTTP-over-I2P clones, if your\n"
 "admin does not allow the git HTTP(Smart HTTP) protocol, then you will\n"
-"need to get the SSH clone base32 from them. Use this Base32 to connect "
-"the\n"
-"client tunnel to the Git SSH service: "
-"**g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**"
+"need to get the SSH clone base32 from them. Use this Base32 to connect the\n"
+"client tunnel to the Git SSH service: **g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**"
 msgstr ""
 
 #: i2p2www/blog/2020/03/06/git-over-i2p.rst:109
@@ -11815,7 +10445,8 @@ msgid "Gitlab over I2P Setup"
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:7
-msgid "Mirror I2P Git repositories and Bridge Clearnet repositories for others."
+msgid ""
+"Mirror I2P Git repositories and Bridge Clearnet repositories for others."
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:9
@@ -11870,14 +10501,13 @@ msgid ""
 "images. Since there are no third-party images involved here, updates\n"
 "should come as soon as they are available in the host images. To review\n"
 "the Dockerfile for yourself, visit the `Gitlab source\n"
-"code <https://gitlab.com/gitlab-org/omnibus-"
-"gitlab/-/blob/master/docker/Dockerfile>`__."
+"code <https://gitlab.com/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile>`__."
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:70
 msgid ""
-"Set up an I2P HTTP Proxy for Gitlab to use(Important information, "
-"optional steps)"
+"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional "
+"steps)"
 msgstr ""
 
 #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:73
@@ -12106,21 +10736,10 @@ msgid ""
 "generated for you. A recent, correctly-generated bundle of the mainline\n"
 "i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside\n"
 "of I2P at my pastebin\n"
-"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also "
-"use a\n"
-"`magnet link "
-"<magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,"
-"\n"
+"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also use a\n"
+"`magnet link <magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,\n"
 "and if you're a BiglyBT user who wants to bridge the torrent, use \n"
-"`this magnet link instead "
-"<magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker"
-".leechers-"
-"paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker"
-".lanta-"
-"net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker"
-".tiny-"
-"vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__"
-"\n"
+"`this magnet link instead <magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__\n"
 "to announce to clearnet trackers as well."
 msgstr ""
 
@@ -12214,33 +10833,29 @@ msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:16
 msgid ""
-"0.9.46 contains significant performance improvements in the streaming "
-"library.\n"
-"We have completed development of ECIES encryption (proposal 144) and "
-"there is now an option to enable it for testing."
+"0.9.46 contains significant performance improvements in the streaming library.\n"
+"We have completed development of ECIES encryption (proposal 144) and there is now an option to enable it for testing."
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:21
 msgid ""
 "Windows users only:\n"
 "This release fixes a local privilege escalation vulnerability\n"
-"which could be exploited by a local user that has the ability to run "
-"programs.\n"
+"which could be exploited by a local user that has the ability to run programs.\n"
 "Please apply the update as soon as possible.\n"
 "Thanks to Blaze Infosec for their responsible disclosure of the issue."
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:29
 msgid ""
-"This is the last release to support Java 7, Debian packages Wheezy and "
-"Stretch, and Ubuntu packages Precise and Trusty.\n"
+"This is the last release to support Java 7, Debian packages Wheezy and Stretch, and Ubuntu packages Precise and Trusty.\n"
 "Users on those platforms must upgrade to receive future I2P updates."
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:44
 msgid ""
-"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing "
-"(proposal 144)"
+"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing (proposal "
+"144)"
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:45
@@ -12265,8 +10880,8 @@ msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:54
 msgid ""
-"Hidden Services Manager: Fixes for changing shared client options, "
-"prevent changing certain options while tunnel is running"
+"Hidden Services Manager: Fixes for changing shared client options, prevent "
+"changing certain options while tunnel is running"
 msgstr ""
 
 #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:55
@@ -12427,18 +11042,15 @@ msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:16
 msgid ""
-"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by "
-"default for some services.\n"
+"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by default for some services.\n"
 "The Sybil analysis and blocking tool is now enabled by default."
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:21
 msgid ""
 "Java 8 or higher is now required.\n"
-"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and "
-"Precise, are no longer supported.\n"
-"Users on those platforms should upgrade so you may continue to receive "
-"I2P updates."
+"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and Precise, are no longer supported.\n"
+"Users on those platforms should upgrade so you may continue to receive I2P updates."
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:37
@@ -12447,8 +11059,8 @@ msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:42
 msgid ""
-"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared "
-"clients, HTTP proxy, and new tunnels"
+"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared clients, "
+"HTTP proxy, and new tunnels"
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:43
@@ -12460,7 +11072,8 @@ msgid "Enable Sybil analysis and blocking tool by default"
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:51
-msgid "Hidden Services Manager: Fix missing server tunnel length configuration"
+msgid ""
+"Hidden Services Manager: Fix missing server tunnel length configuration"
 msgstr ""
 
 #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:52
@@ -12509,18 +11122,15 @@ msgstr ""
 
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:16
 msgid ""
-"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for "
-"most services.\n"
-"We have added preliminary support for new tunnel build message encryption"
-" (proposal 152).\n"
+"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for most services.\n"
+"We have added preliminary support for new tunnel build message encryption (proposal 152).\n"
 "There are significant performance improvements throughout the router."
 msgstr ""
 
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:22
 msgid ""
 "Packages for Ubuntu Xenial (16.04 LTS) are no longer supported.\n"
-"Users on that platform should upgrade so you may continue to receive I2P "
-"updates."
+"Users on that platform should upgrade so you may continue to receive I2P updates."
 msgstr ""
 
 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:37
@@ -12670,33 +11280,25 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:21
 msgid ""
-"For over a decade, I2P has relied on the venerable Monotone service to "
-"support\n"
-"its version control needs, but during the past few years, most of the "
-"world has\n"
+"For over a decade, I2P has relied on the venerable Monotone service to support\n"
+"its version control needs, but during the past few years, most of the world has\n"
 "moved on to the now-universal Git version control system. In that same\n"
-"time, the I2P Network has become faster and more reliable, and accessible"
-"\n"
+"time, the I2P Network has become faster and more reliable, and accessible\n"
 "workarounds to Git's non-resumability have been developed."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:29
 msgid ""
-"Today marks a significant occasion for I2P, as we switched off the old "
-"mtn\n"
-"i2p.i2p branch, and moved the development of the core Java I2P libraries "
-"from\n"
+"Today marks a significant occasion for I2P, as we switched off the old mtn\n"
+"i2p.i2p branch, and moved the development of the core Java I2P libraries from\n"
 "Monotone to Git officially."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:35
 msgid ""
-"While our use of mtn has been questioned in the past, and it's not always"
-" been a\n"
-"popular choice, I'd like to take this moment, as perhaps the very last "
-"project to use\n"
-"Monotone to thank the Monotone developers, current and former, wherever "
-"they are,\n"
+"While our use of mtn has been questioned in the past, and it's not always been a\n"
+"popular choice, I'd like to take this moment, as perhaps the very last project to use\n"
+"Monotone to thank the Monotone developers, current and former, wherever they are,\n"
 "for the software they created."
 msgstr ""
 
@@ -12706,12 +11308,9 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:49
 msgid ""
-"Checkins to the I2P Project repositories require you to configure GPG "
-"signing for\n"
-"your git commits, including Merge Requests and Pull Requests. Please "
-"configure\n"
-"your git client for GPG signing before you fork i2p.i2p and check "
-"anything in."
+"Checkins to the I2P Project repositories require you to configure GPG signing for\n"
+"your git commits, including Merge Requests and Pull Requests. Please configure\n"
+"your git client for GPG signing before you fork i2p.i2p and check anything in."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:55
@@ -12720,32 +11319,24 @@ msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:60
 msgid ""
-"The official repository is the one hosted at https://i2pgit.org/i2p-"
-"hackers/i2p.i2p\n"
-"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\""
-" available\n"
+"The official repository is the one hosted at https://i2pgit.org/i2p-hackers/i2p.i2p\n"
+"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\" available\n"
 "at Github at https://github.com/i2p/i2p.i2p."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:66
 msgid ""
-"Now that we're on git, we can synchronize repositories from our own self-"
-"hosted Gitlab\n"
-"instance, to Github, and back again. This means that it is possible to "
-"create and submit\n"
-"a merge request on Gitlab and when it is merged, the result will be "
-"synced with Github,\n"
+"Now that we're on git, we can synchronize repositories from our own self-hosted Gitlab\n"
+"instance, to Github, and back again. This means that it is possible to create and submit\n"
+"a merge request on Gitlab and when it is merged, the result will be synced with Github,\n"
 "and a Pull Request on Github, when merged, will appear on Gitlab."
 msgstr ""
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:73
 msgid ""
-"This means that it's possible to submit code to us through our Gitlab "
-"instance or through\n"
-"Github depending on what you prefer, however, more of the I2P developers "
-"are regularly\n"
-"monitoring Gitlab than Github. MR's to Gitlab are more likely to be "
-"merged sooner\n"
+"This means that it's possible to submit code to us through our Gitlab instance or through\n"
+"Github depending on what you prefer, however, more of the I2P developers are regularly\n"
+"monitoring Gitlab than Github. MR's to Gitlab are more likely to be merged sooner\n"
 "than PR's to Github."
 msgstr ""
 
@@ -12755,14 +11346,10 @@ msgstr "Mulțumesc"
 
 #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:85
 msgid ""
-"Congratulations and thanks to everyone who helped in the git migration, "
-"especially\n"
-"zzz, eche|on, nextloop, and our site mirror operators! While some of us "
-"will miss\n"
-"Monotone, it has become a barrier for new and existing participants in "
-"I2P development\n"
-"and we're excited to join the world of developers using Git to manage "
-"their distributed\n"
+"Congratulations and thanks to everyone who helped in the git migration, especially\n"
+"zzz, eche|on, nextloop, and our site mirror operators! While some of us will miss\n"
+"Monotone, it has become a barrier for new and existing participants in I2P development\n"
+"and we're excited to join the world of developers using Git to manage their distributed\n"
 "projects."
 msgstr ""
 
@@ -12777,33 +11364,25 @@ msgstr ""
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:16
 msgid ""
 "0.9.49 continues the work to make I2P faster and more secure.\n"
-"We have several improvements and fixes for the SSU (UDP) transport that "
-"should result in faster speeds.\n"
-"This release also starts the migration to new, faster ECIES-X25519 "
-"encryption for routers.\n"
+"We have several improvements and fixes for the SSU (UDP) transport that should result in faster speeds.\n"
+"This release also starts the migration to new, faster ECIES-X25519 encryption for routers.\n"
 "(Destinations have been using this encryption for a few releases now)\n"
-"We've been working on the specifications and protocols for new encryption"
-" for several years,\n"
-"and we are getting close to the end of it! The migration will take "
-"several releases to complete."
+"We've been working on the specifications and protocols for new encryption for several years,\n"
+"and we are getting close to the end of it! The migration will take several releases to complete."
 msgstr ""
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:25
 msgid ""
-"For this release, to minimize disruption, only new installs and a very "
-"small percentage of existing installs\n"
+"For this release, to minimize disruption, only new installs and a very small percentage of existing installs\n"
 "(randomly selected at restart) will be using the new encryption.\n"
-"If your router does \"rekey\" to use the new encryption, it may have "
-"lower traffic or less reliability than usual for several days after you "
-"restart.\n"
+"If your router does \"rekey\" to use the new encryption, it may have lower traffic or less reliability than usual for several days after you restart.\n"
 "This is normal, because your router has generated a new identity.\n"
 "Your performance should recover after a while."
 msgstr ""
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:33
 msgid ""
-"We have \"rekeyed\" the network twice before, when changing the default "
-"signature type,\n"
+"We have \"rekeyed\" the network twice before, when changing the default signature type,\n"
 "but this is the first time we've changed the default encryption type.\n"
 "Hopefully it will all go smoothly, but we're starting slowly to be sure."
 msgstr ""
@@ -12869,7 +11448,8 @@ msgid "Crypto: Increase ratchet tag window to prevent message loss"
 msgstr ""
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:68
-msgid "I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys"
+msgid ""
+"I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys"
 msgstr ""
 
 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:69
@@ -12928,3 +11508,1442 @@ msgstr ""
 msgid "Util: New unit tests"
 msgstr ""
 
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:2
+msgid "0.9.50 Release"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:9
+msgid "0.9.50 with IPv6 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:16
+msgid ""
+"0.9.50 continues the transition to ECIES-X25519 for router encryption keys.\n"
+"We have enabled DNS over HTTPS for reseeding to protect users from passive DNS snooping.\n"
+"There are numerous fixes and improvements for IPv6 addresses, including new UPnP support."
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:22
+msgid ""
+"We have finally fixed some longstanding SusiMail corruption bugs.\n"
+"Changes to the bandwidth limiter should improve network tunnel performance.\n"
+"There are several improvements in our Docker containers.\n"
+"We have improved our defenses for possible malicious and buggy routers in the network."
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:39
+msgid "Docker improvements"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:40
+msgid "NTCP: Remove support for version 1"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:41
+msgid "Reseed: Use DNSOverHTTPS"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:42
+msgid "Router: Increase ECIES rekey probability"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:43
+msgid "Router: Persist Sybil blocklist"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:44
+msgid "SSU: Enable introducers and introductions via IPv6 (proposal 158)"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:46
+msgid "Transports: Publish support for outbound IPv4/v6 (proposal 158)"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:47
+msgid "UPnP: Add support for IPv6"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:53
+msgid "Debian: Fix link to compiler jar"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:54
+msgid "i2psnark: Fix theme selection"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:55
+msgid "Jetty: Fix detection of SSL connector"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:56
+msgid "NetDB: Fix NPE when validating expired blinded leaseset"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:57
+msgid "NTP: Year 2036 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:58
+msgid "Router: Fix rekeying every restart on ARM"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:59
+msgid "Router: Fix decryption of encrypted leasesets"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:60
+msgid "SAM: Fix removal of subsessions"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:61
+msgid "SSU: Fix excessive dropping by the bandwidth limiter"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:62
+msgid "SSU: Fix publishing 'C' capability when not an introducer"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:63
+msgid "SSU: Fixes for firewalled/not firewalled state transitions"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:64
+msgid "SSU: IPv6 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:65
+msgid "SSU: Peer test fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:66
+msgid "SusiMail: Fix theme selection"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:67
+msgid "SusiMail: Fix stream closed errors"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:68
+msgid "SusiMail: Fix corruption in display of large, new messages"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:69
+msgid "Tunnels: Several fixes in the participating tunnel bandwidth limiter"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:70
+msgid "UPnP: Fix leases not being renewed before expiration"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:76
+msgid "Build: Remove empty jars and wars from installers"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:77
+msgid "Build: Prep for different release and API versions"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:78
+msgid "Build: Remove launcher code"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:79
+msgid "Gradle build fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:80
+msgid "Profiles: Disable tunnel peer test"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:81
+msgid "Profiles: Remove unused tunnel test response time stat"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:82
+msgid "SSU: Avoid outbound connections to buggy routers"
+msgstr ""
+
+#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:83
+msgid "Transports: Increase connection limits for some platforms"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:2
+msgid "1.5.0 Release"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:9
+msgid "1.5.0 with new tunnel build messages"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:16
+msgid ""
+"Yes, that's right, after 9 years of 0.9.x releases, we are going straight from 0.9.50 to 1.5.0.\n"
+"This does not signify a major API change, or a claim that development is now complete.\n"
+"It is simply a recognition of almost 20 years of work to provide anonymity and security for our users."
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:22
+msgid ""
+"This release finishes implementation of smaller tunnel build messages to reduce bandwidth.\n"
+"We continue the transition of the network's routers to X25519 encryption.\n"
+"Of course there are also numerous bug fixes and performance improvements."
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:39
+msgid "Tunnels: Finish support for new build messages (proposal 157)"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:40
+msgid "Updates: Support for .dmg and .exe updates"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:45
+msgid "Console: Fix generation of SSL keys on Java 17"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:46
+msgid "i2psnark: Fix autostart for magnets"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:47
+msgid "Router: Fix rare deadlock in publishing our RI"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:48
+msgid "SSU: Fix handling of bad peer test responses"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:49
+msgid "UPnP: IPv6 fixes"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:54
+msgid "Jetty: Improve sort in directory listings"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:55
+msgid "Jetty: Add X-I2P-Location header"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:56
+msgid "Router: Increase probability to rekey to ECIES"
+msgstr ""
+
+#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:57
+msgid "Streaming: Performance improvements for low-latency connections"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:2
+msgid "I2P Celebrates its 20th Year"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:9
+msgid "I2P has been around for 20 years, let's take a look back"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:11
+msgid "20 Years of I2P"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:16
+msgid ""
+"It's hard to believe, but I2P has been around for nearly 20 years! From its\n"
+"beginning as a C project which provided anonymous access to IRC, we've had\n"
+"hundreds of contributors, accepted checkins from dozens of coders, used 2\n"
+"main languages, 3 version control systems, experienced a migration of its\n"
+"crypography, and multiple soft-forks. There have been around 500 registered\n"
+"sites on the Invisible Web, and countless unregistered I2P sites that were only\n"
+"accessible via their cryptographic hostnames."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:26
+msgid ""
+"Thanks to the participation of users like you, the network has grown from a tiny\n"
+"group of power users to over 75,000 nodes operated from all over the world,\n"
+"made of I2P routers bundled in perhaps dozens of applications. Today I2P is\n"
+"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, OpenBSD, and\n"
+"many other systems. I2P can run on phones and even in SOHO routers (thanks to the\n"
+"independent C++ implementation of the protocol, i2pd)."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:35
+msgid "A Routing Protocol with Flagship Applications"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:40
+msgid ""
+"Even before other anonymity projects were providing their own application\n"
+"bundles, I2P was a tool for building applications that were configured for\n"
+"anonymity. Over the years, we've leaned on this strength, by expanding our\n"
+"APIs to support more and more versatile applications. Today, we're still\n"
+"developing new ways of building I2P into applications."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:48
+msgid ""
+"Using the power of the Hidden Services Manager or the SAM API, developers of all\n"
+"kinds of applications can empower their users with anonymity using I2P. Exciting\n"
+"downstream projects like Monero's I2P-Zero have made it very easy for developers\n"
+"to help their users get connected to I2P. Today, I2P helps provide anonymity to\n"
+"dozens of applications including Bitcoin, IRC, email and multiple file-sharing\n"
+"protocols."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:57
+msgid "An Anonymous Network By Everyone, For Everyone"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:62
+msgid ""
+"I2P has always been a decentralized network, because its obvious that providing\n"
+"an anonymity network is an intrinsically collaborative process. To illustrate\n"
+"with the most extreme example, a single computer cannot provide itself\n"
+"with anonymity, nor can it be a useful network, by definiton. However, building\n"
+"I2P in this fully-decentralized manner hasn't always been easy."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:70
+msgid ""
+"From the beginning, I2P would need to be scalable, and be able to balance itself\n"
+"so that  high-bandwidth nodes wouldn't be able to easily take over the network.\n"
+"Sybil attacks would leave the realm of academia and we would need to develop\n"
+"new defenses against them."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:77
+msgid ""
+"We've worked very hard to never compromise on this stance, and today every I2P\n"
+"router helps participate in providing the network with bandwidth resources and\n"
+"providing the users with anonymity. In doing so, we've learned incredible things\n"
+"and produced a network which at times has seemed inconceivable."
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:84
+msgid "Celebrating I2P"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:89
+msgid ""
+"Over the next 2 weeks, we've planned some blog posts where we'll explore the past,\n"
+"present, and future of I2P, highlight applications and tools that build on\n"
+"and enhance I2P, and showcase the best of our community. Check back here for\n"
+"more in the coming days!"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:96
+msgid ""
+"`The History of I2P\n"
+"  </en/blog/post/2021/08/28/History-of-I2P>`_"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:98
+msgid ""
+"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from Monero)\n"
+"  </en/blog/post/2021/09/08/I2P-Jpackage-Bundles-and-Zero>`_"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:100
+msgid ""
+"`Level-Up your I2P use with Encrypted LeaseSets\n"
+"  </en/blog/post/2021/09/07/Level-Up-Encrypted-Leasesets>`_"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:102
+msgid ""
+"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for "
+"End-Users"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:103
+msgid "I2P's Usability Journey"
+msgstr ""
+
+#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:104
+msgid "Building Bridges - Making Connections with Other Privacy Projects"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:2
+msgid "20 Years of Privacy: A brief History of I2P"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:9
+msgid "A history of I2P As We Know It"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:11
+msgid ""
+"Invisibility is the best defense: building an internet within an internet"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:16
+msgid ""
+"I believe most people want this technology so they can express\n"
+"    themselves freely. It’s a comfortable feeling when you know you can\n"
+"    do that. At the same time we can conquer some of the problems seen\n"
+"    within the Internet by changing the way security and privacy is\n"
+"    viewed, as well as the extent to what it is valued."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:23
+msgid ""
+"In October 2001, 0x90 ( Lance James) had a dream. It started as a\n"
+"“desire for instant communication with other Freenet users to talk about\n"
+"Freenet issues, and exchange Freenet keys while still maintaining\n"
+"anonymity, privacy and security.” It was called IIP — the Invisible IRC\n"
+"Project."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:35
+msgid ""
+"The Invisible IRC Project was based on an ideal and framework behind The\n"
+"InvisibleNet:"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:38
+msgid "In an interview from 2002, 0x90 described the project:"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:40
+msgid ""
+"“InvisibleNet is a research & development driven organization whose main\n"
+"    focus is the innovation of intelligent network technology. Our goal is\n"
+"    to provide the highest standards in security and privacy on the widely\n"
+"    used, yet notoriously insecure Internet.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:45
+msgid ""
+"\"The InvisibleNet team is comprised of a talented group of developers and\n"
+"    architects entirely dedicated to providing its users with both\n"
+"    convenience and the very best in secure communication.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:49
+msgid ""
+"\"Our technological ideals are reflected in the implementation of a\n"
+"    framework that is solid in design, and transparent in its application.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:52
+msgid ""
+"\"Here at InvisibleNet we strive towards the greatest level of quality\n"
+"    possible by keeping all areas of our research & development open and\n"
+"    available to the public for peer review, feedback, suggestions and new\n"
+"    ideas.”"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:57
+msgid ""
+"\"The Invisible Internet Project: Defined as the “New Internet”.\n"
+"    Peer 2 Peer Internet. Using your peers to protect you. It is a\n"
+"    similar concept to the Invisible IRC Project, with its design as our\n"
+"    test model. We plan to re-design the Internet by taking it a step\n"
+"    further and having security and privacy be first priority.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:63
+msgid ""
+"\"The Invisible Internet Project or Protocol will be utilizing the\n"
+"    tests and research/development concepts of the Invisible IRC Project\n"
+"    to give us the scalability that we need and leverage this to take it\n"
+"    to the next level.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:68
+msgid ""
+"\"This, in essence will be an impenetrable neural-network, that is\n"
+"    self-driven, self-defensed, and completely seamless to already\n"
+"    applied protocols, specifically client to server (or agents as I call\n"
+"    them). It will be THE next transport layer, a layer on top of the\n"
+"    notoriously insecure Internet, to deliver full anonymity, privacy,\n"
+"    and security at the highest level possible. Decentralized and peer to\n"
+"    peer Internet, by the way, means no more worrying about your ISP\n"
+"    controlling your traffic. This will allow you to do seamless\n"
+"    activities and change the way we look at security and even the\n"
+"    Internet, utilizing public key cryptography, IP steganography, and\n"
+"    message authentication. The Internet that should have been, will be\n"
+"    soon.\""
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:85
+msgid "All citations and quotes are from the interviews found here:"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:90
+msgid ""
+"By 2003, several other similar projects had started, the largest being\n"
+"Freenet, GNUNet, and Tor. All of these projects had broad goals to\n"
+"encrypt and anonymize a variety of traffic. For IIP, it became clear\n"
+"that IRC alone was not a big-enough target. What was needed was an\n"
+"anonymizing layer for all protocols. IIP by now was also being called\n"
+"“InvisibleNet”."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:97
+msgid ""
+"In early 2003, a new anonymous developer, “jrandom” joined the project.\n"
+"His explicit goal was to broaden the charter of IIP."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:100
+msgid ""
+"jrandom wished to rewrite the IIP code base in Java, a language he was\n"
+"familiar with, and the same language Freenet was using. He also wished\n"
+"to redesign the IIP protocols based on recent papers and the early\n"
+"design decisions that Tor and Freenet were making. Some of these\n"
+"concepts and naming conventions, such as “onion routing”, were modified\n"
+"to become “garlic routing”. For several of the design decisions, jrandom\n"
+"made different choices than Tor did, including selecting different\n"
+"cryptographic primitives in a number of places. Many (but not all) of\n"
+"these choices turned out quite well. For some others, such as using\n"
+"unidirectional tunnels rather than Tor’s bidirectional tunnels, the\n"
+"benefits and trade-offs are still not well-studied."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:112
+msgid ""
+"jrandom also set out a clear vision for the architecture of the code. It\n"
+"would be a client/server model, with the server (i.e. the router)\n"
+"isolated from any “client” protocols. Clients such as web browsers, web\n"
+"servers, IRC clients and servers, and others, would communicate through\n"
+"the router using I2CP, the I2P Client Protocol."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:118
+msgid ""
+"jrandom also had strong opinions on the direction of the project and its\n"
+"philosophy. He was strongly committed to open source and free software.\n"
+"He explicitly set a goal of protection from organizations with\n"
+"“unlimited financial and political resources.”"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:123
+msgid ""
+"By late summer 2003, jrandom had taken control of the project, and\n"
+"renamed it the Invisible Internet Project or “I2P”. He published a\n"
+"document outlining the philosophy of the project, and placed its\n"
+"technical goals and design in the context of mixnets and anonymizing\n"
+"layers. He also published the specification of two protocols (I2CP and\n"
+"I2NP) and their underlying data structures, that formed the basis of the\n"
+"network I2P uses today. Lance (“nop”) was last seen in a project meeting\n"
+"on November 11, 2003."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:138
+msgid ""
+"By fall 2003, I2P, Freenet, and Tor were rapidly developing. Business\n"
+"Week published an article on “The Underground Internet” which referenced\n"
+"InvisibleNet and discussed “darknets” extensively. jrandom released I2P\n"
+"version 0.2 on November 1, 2003, and continued rapid releases for the\n"
+"next 3 years. He maintained regular weekly meetings and status notes\n"
+"during this time. Several popular services and “respites” emerged during\n"
+"this time. Auto updates via clearnet HTTP became available in 2004."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:146
+msgid ""
+"Through 2004 and 2005, router development continued, and several\n"
+"“clients” or applications were added to the I2P package. “Mihi” wrote\n"
+"the first streaming protocol implementation and the i2ptunnel interface\n"
+"for configuring and starting client tunnels. “Susi” wrote the web mail\n"
+"and address book applications SusiMail and SusiDNS. Many people worked\n"
+"on the router console web interface. A bridge to make it easier for\n"
+"non-I2P clients to communicate over I2P, called “SAM” (Simple Anonymous\n"
+"Messaging) was added."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:155
+msgid "In February 2005, zzz installed I2P for the first time."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:156
+msgid ""
+"Anonymity projects were in the news. After surveying the field, he\n"
+"  installed Freenet, and found it ambiguous, and difficult to explore.\n"
+"  Not only that, it was very resource heavy and it was difficult to get\n"
+"  anything to load. Tor and I2P were the other options, and he tried\n"
+"  I2P."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:162
+msgid ""
+"zzz had no preconceived plans to contribute to the project, and had\n"
+"never written a line of Java. He had maybe used IRC once. At this time,\n"
+"I2P was at version 0.5, with maybe a thousand users and three hard-coded\n"
+"floodfills. Forum.i2p and postman’s tracker were up and running at the\n"
+"time, and weekly meetings and status notes, and releases every couple of\n"
+"week were happening."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:169
+msgid ""
+"By summer 2005, zzz had set up two websites. The first was zzz.i2p,\n"
+"which over the years became a central resource for I2P development, and\n"
+"still is. The second was stats.i2p, the first site to gather statistics\n"
+"on I2P network performance and present graphs on both the network and\n"
+"individual routers. While the individual router statistics eventually\n"
+"had to be shut down due to the tremendous growth of the network, the\n"
+"overall performance graphs remain. We are not sure that he ever planned\n"
+"to become the release manger for almost 2 decades, but we are happy he\n"
+"did. The project has not only stayed active, it has thrived and scaled\n"
+"to the demands of its growth."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:184
+msgid ""
+"On July 27, 2005, jrandom released I2P version 0.6, including an\n"
+"innovative new UDP transport protocol he designed called “SSU”, for\n"
+"Secure Semi-reliable UDP. It contained features for IP discovery and\n"
+"firewall traversal."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:189
+msgid ""
+"In September 2005, jrandom bundled “Syndie”, his new high-latency\n"
+"anonymous messaging system. In October 2005, jrandom ported Snark, a\n"
+"Java BitTorrent client, to become an I2P application and bundled it with\n"
+"the I2P package. This completed the collection of client applications\n"
+"that are still bundled with I2P today."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:195
+msgid ""
+"In late 2005 and early 2006, jrandom redesigned the way that I2P built\n"
+"tunnels. This was a major effort that was done to increase the security\n"
+"of the tunnel building, which is crucial to maintain anonymity and\n"
+"resist attacks. He worked closely with the Freenet developers, including\n"
+"“Toad”, on this design. The new build protocol required new I2NP\n"
+"messages and a hard cut-over or “flag day”. These changes were released\n"
+"in version 0.6.1.10 on February 16, 2006. This is significant as it is\n"
+"the last flag day I2P has had. While, in practice, an 0.6.1.10 router\n"
+"would not work well, if at all, in today’s network, we are, technically\n"
+"speaking, backwards-compatible with this ten-year-old version today."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:206
+msgid ""
+"By early 2006, the I2P software was at least feature-complete, but it\n"
+"was still not widely-known. jrandom’s view was that it shouldn’t be\n"
+"marketed publicly until it was near-perfect, and labeled as version 1.0.\n"
+"The network had perhaps a thousand users at the time. Project members\n"
+"were discouraged from talking about it online, and the website\n"
+"(`i2p.net <http://i2p.net>`__) was unpolished and incomplete."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:213
+msgid ""
+"On July 27, 2006, jrandom released I2P version 0.6.1.23, including an\n"
+"innovative new TCP transport protocol he designed called “NTCP”, for\n"
+"new-IO-based TCP. It used Java’s new IO library for efficient handling\n"
+"of large numbers of TCP connections."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:218
+msgid ""
+"In late 2006, jrandom turned his focus to Syndie. He came to see it as\n"
+"his top priority, and the “killer application” for I2P. Highly secure\n"
+"and almost unusable, it delayed messages for up to two days before\n"
+"delivery to resist traffic analysis. Later in 2006, he stopped work on\n"
+"the bundled Syndie application and started a new, incompatible,\n"
+"standalone messaging application. This application was, confusingly,\n"
+"also called “Syndie”. The new Syndie was a large and complex\n"
+"development, and it was essentially a one-man project."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:227
+msgid ""
+"From late 2006 into 2007, core I2P development and releases slowed\n"
+"dramatically. From almost 30 releases in 2005 and 13 in the first half\n"
+"of 2006, there were only 5 in the second half of 2006 and only 4 in all\n"
+"of 2007. During this time, zzz and a developer named Complication had\n"
+"source code commit privileges and were making changes, but their\n"
+"understanding of the code base was limited. zzz worked, for example, on\n"
+"improving i2psnark, fixing bugs, and redesigning the strategy for\n"
+"anticipatory tunnel building. But there was a lot more that needed to be\n"
+"done. Complication and zzz did what they could, and they wrote the code\n"
+"for almost all the changes in the four 2007 releases\n"
+"(0.6.1.27–0.6.1.30). By this time, jrandom was providing very little\n"
+"guidance, code review, or direction for the project."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:240
+msgid "It wasn’t apparent at the time, but the project was in trouble."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:242
+msgid ""
+"jrandom had almost stopped working on the core I2P router and\n"
+"applications. Even the new Syndie, which he had declared as far more\n"
+"important than I2P itself, languished. After regular releases through\n"
+"March 2007, his next Syndie release, 1.100a, was August 25, 2007. All\n"
+"I2P releases were required to be signed by jrandom’s key, and he built\n"
+"and signed his last release, 0.6.1.30, on October 7, 2007."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:249
+msgid ""
+"In November 2007, disaster struck. Complication and zzz received a\n"
+"cryptic message from jrandom, that he would have to take time off from\n"
+"both Syndie and I2P development for a year or more. He expected that he\n"
+"would still be available to sign releases, but was willing to pass the\n"
+"release signing key to somebody else. Complication and zzz immediately\n"
+"replied with a request for the release key and other credentials, such\n"
+"as access to the website, mailing list, CVS administration, and others.\n"
+"Unfortunately, they never heard from jrandom again."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:258
+msgid ""
+"Late 2007 and early 2008, they awaited jrandom’s response, and wondered\n"
+"what to do next. However, all of the project infrastructure remained\n"
+"active, so it didn’t seem to be an immediate crisis. They knew, however,\n"
+"that without the release key or website access, they would have to sign\n"
+"with new keys, host the files on a new website, and require everybody to\n"
+"manually update since their keys wouldn’t be recognized."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:265
+msgid ""
+"The second stage of the disaster happened on January 13, 2008. The\n"
+"hosting company for almost all `i2p.net <http://i2p.net>`__ servers\n"
+"suffered a power outage, and they did not fully return to service. Only\n"
+"jrandom had the credentials required to restore service. In addition,\n"
+"the centralized CVS source control appeared to be down, so five years of\n"
+"source control history appeared to be lost. Luckily, the CVS server was\n"
+"up, only the name server for it was down. The full contents of the CVS\n"
+"archive was quickly downloaded."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:274
+msgid ""
+"Complication, welterde, and zzz quickly made a number of decisions to\n"
+"  get the project back up and running. Welterde started a new website at\n"
+"  `i2p2.de <http://i2p2.de>`__. I2P needed to move to a decentralized\n"
+"  source code control system. They tested bazaar and that did not work\n"
+"  well over I2P. Git was just getting started. jrandom had used monotone\n"
+"  for Syndie and liked its security properties, and it worked well over\n"
+"  I2P, so it was selected."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:281
+msgid ""
+"Several people set up new services. The next release, 0.6.1.31, was\n"
+"  signed by Complication and required a manual upgrade. It was released\n"
+"  on February 10, 2008."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:285
+msgid ""
+"The project realized that even though it claimed to be totally\n"
+"decentralized, it actually depended on a number of centralized\n"
+"resources, above all, on jrandom. Work was done throughout 2008 to\n"
+"decentralize the project, and distribute roles to a number of people.\n"
+"Additionally, it was realized that development had essentially stalled\n"
+"in 2007, because jrandom had stopped working on it, but had not\n"
+"delegated to other developers. Nobody had an overall understanding of\n"
+"the code base."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:294
+msgid ""
+"Complication continued to sign the releases through mid-2009, but his\n"
+"contributions declined as he focused on activism and other projects.\n"
+"Starting with release 0.7.6 on July 31, 2009, zzz would sign the next 49\n"
+"releases."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:299
+msgid ""
+"In December 2008, zzz attended his first CCC, 25C3 in Berlin, and met\n"
+"other I2P project team members for the first time, including hottuna and\n"
+"welterde. The experience was overwhelming, and also humbling, as he\n"
+"struggled to explain I2P to others or answer even basic questions about\n"
+"its design and use of cryptography."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:305
+msgid ""
+"By mid-2009, zzz had come to understand the code base much better. Far\n"
+"from being complete or perfect, it was filled with problems and\n"
+"scalability issues. In 2009 the project experienced more network growth\n"
+"due to its anonymizing properties as well as its circumvention\n"
+"abilities. Participants appeared who were beginning to adopt the network\n"
+"for reasons like censorship and clearnet issues like blocking of popular\n"
+"services. For development gains, in-net auto updates became available\n"
+"for the software."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:316
+msgid ""
+"July 2010 zzz briefly presented I2P at the end of Adrian Hong’s\n"
+"presentation at HOPE XXXX. Adrian talked about how tech has helped\n"
+"expose human rights violations, and the need for defensive tools for\n"
+"activists. He urged that we all be ambassadors for all tech, stay on top\n"
+"of new tech, and keep the barrier low and educate people about how to\n"
+"use the tool we create."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:323
+msgid ""
+"He also talked about how we need many options for people to use, and\n"
+"asked how do we make it easier to support human rights, freedom of\n"
+"expression?"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:327
+msgid ""
+"At the end of the talk, zzz was invited on stage to introduce I2P and\n"
+"give an overview of what the project was about. The same weekend, it was\n"
+"pointed out that the I2P documentation was not in great shape."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:331
+msgid ""
+"In Fall 2010, zzz declared a moratorium on I2P development until the\n"
+"website documentation was complete and accurate. It took 3 months to get\n"
+"it done."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:335
+msgid ""
+"Beginning in 2010, until COVID restrictions were put in place, zzz, ech,\n"
+"hottuna, and other I2P contributors have attended CCC ( Chaos\n"
+"Communications Congress) every year. Over the years, meeh, Zab, Sadie,\n"
+"LazyGravy, KYTV, IDK and others have made the trip to Germany to share\n"
+"tables with other projects and celebrate the end of a year of releases.\n"
+"The project looks forward to one day being able to meet up again and\n"
+"have an in-person yearly roadmap meeting."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:343
+msgid ""
+"Anoncoin, a digital cryptocurrency that focuses on privacy and anonymity\n"
+"for its users was created in 2013. It was the first coin that provided\n"
+"built-in support for I2P, as well as Tor that makes it impossible to\n"
+"determine the IP address of the user. The developers, including meeh,\n"
+"also ran organizations like Privacy Solutions, and provided infrastructure\n"
+"support to the I2P network by running services like outproxies and\n"
+"reseed servers."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:351
+msgid ""
+"I2PBote development started to take off again in 2014 when str4d began\n"
+"contributing to the project. Bote is a server-less email client — it\n"
+"stores email in a `distributed hash\n"
+"table <http://en.wikipedia.org/wiki/Distributed_hash_table>`__. Email is\n"
+"“automatically encrypted and digitally signed, which ensures no one but\n"
+"the intended recipient can read the email, and third parties cannot\n"
+"forge them.” ( https://i2pbote.xyz/). The project has existed since\n"
+"2009."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:366
+msgid ""
+"At Real World Crypto that year, zzz, psi and str4d began to talk about\n"
+"and review the plan to update I2P’s cryptography. The same year, the\n"
+"project was awarded a $5k donation from Duck Duck Go. Lavabit,\n"
+"SecureDrop, RiseUp and Mailpile also received donations for supporting\n"
+"better trust and privacy online."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:372
+msgid ""
+"By late 2014 most new signing crypto was complete, including ECDSA and\n"
+"EdDSA. New destination crypto was available; but new router info crypto\n"
+"needed to wait a year for the network to upgrade sufficiently."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:376
+msgid ""
+"During the early part of 2015, zzz posted to Twitter that it would be\n"
+"great to have a mini conference for I2P. In Spring, it was decided that\n"
+"I2PCon would take place that August over the course of a weekend."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:380
+msgid ""
+"Hottuna and Sadie organized most of the details, getting graphic assets\n"
+"created, posters printed and a banner made for the podium. Nick at\n"
+"Hacklab, where the event would take place, helped with making sure the\n"
+"space was ready for the event. Sadie reached out to the local infosec\n"
+"community and helped secure guest speakers as well. The event happened\n"
+"on one of the hottest weekends of the Summer, with attendees arriving\n"
+"from America and Europe. The I2P community did an amazing job of\n"
+"supporting the event by postering, giving talks, and spreading the word\n"
+"in forums and on social media. The talks can be viewed on KYTV’s YouTube\n"
+"Channel https://www.youtube.com/channel/UCZfD2Dk6POE-VU8DOqW7VVw"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:395
+msgid ""
+"In January 2016 at Real World Crypto Stanford — str4d gave a talk on the\n"
+"crypto migration progress and future plans for the project. zzz and\n"
+"others would continue weekly meetings to plan the migration over the\n"
+"next few years."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:400
+msgid ""
+"NTCP2 was implemented in 2018, in release 0.9.36. It was disabled by\n"
+"default so that it could be tested. It was enabled in 0.9.37. NTCP1 was\n"
+"disabled in 0.9.40."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:404
+msgid ""
+"The new I2P transport protocol provides effective resistance against\n"
+"    DPI censorship. It also results in reduced CPU load because of the\n"
+"    faster, modern cryptography used. It makes I2P more likely to run on\n"
+"    low-end devices, such as smartphones and home routers. Both major I2P\n"
+"    implementations have full support for NTCP2 and it make NTCP2\n"
+"    available for use starting with version 0.9.36 (Java) and 2.20 (i2pd,\n"
+"    C++)."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:412
+msgid ""
+"The complete implementation details can be read here\n"
+"https://geti2p.net/en/blog/post/2018/08/20/NTCP2"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:415
+msgid ""
+"0.9.39 included extensive changes for new network database types\n"
+"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support\n"
+"development of RPC applications."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:419
+msgid ""
+"In 2019, the team decided to attend more conferences. That year IDK and\n"
+"zzz attended DefCon, and IDK gave a workshop on I2P application\n"
+"development. At Monero Village, zzz gave a talk called I2P for\n"
+"Cryptocurrency Developers."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:424
+msgid ""
+"Late that year, Sadie and IDK attended Our Networks in Toronto, where\n"
+"IDK gave a lightning talk about I2P."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:427
+msgid ""
+"Sadie attended RightsCon in Tunis and the Internet Freedom Festival in\n"
+"Valencia to meet with NGO’s and Human Right Defenders. Thanks to the the\n"
+"connections we made, the project received grants for usability and\n"
+"accessibility support from Open Tech Fund, and most recently Internews.\n"
+"This will ensure more user friendly onboarding, UX, and information\n"
+"architecture improvements to support the growing interest in the\n"
+"network. It will also support specific tooling to help in-need users\n"
+"with specific risk surfaces through user research."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:438
+msgid ""
+"That Summer, Hoàng Nguyên Phong had his research into I2P censorship\n"
+"accepted too FOCI at USENIX in Santa Clara. Sadie had supported the\n"
+"research and they attended together. I2P Metrics was created during this\n"
+"time https://i2p-metrics.np-tokumei.net/, and well as research into more\n"
+"resistant reseed servers for the I2P network\n"
+"https://homepage.np-tokumei.net/post/notes-i2p-reseed-over-cloudflare/.\n"
+"You can read the research report here\n"
+"https://homepage.np-tokumei.net/post/notes-otf-wrapup-blogpost/."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:447
+msgid ""
+"At CCC that year, the decision was made to migrate from Monotone too\n"
+"GitLab. The project was one of the last to use Monotone, and it was time\n"
+"to prepare to move on. IDK would spend 2020 ensuring the process was as\n"
+"smooth as it could be. The pandemic would result in the team not being\n"
+"able to see each other that year to celebrate the ( mostly) smooth move\n"
+"to Gitlab. On December 10. 2020, the project switched off the old mtn\n"
+"i2p.i2p branch, and moved the development of the core Java I2P libraries\n"
+"from Monotone to Git officially."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:456
+msgid ""
+"Congratulations and thanks to everyone who helped in the git\n"
+"    migration, especially zzz, eche|on, nextloop, and our site mirror\n"
+"    operators! While some of us will miss Monotone, it has become a\n"
+"    barrier for new and existing participants in I2P development and\n"
+"    we’re excited to join the world of developers using Git to manage\n"
+"    their distributed projects."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:465
+msgid ""
+"0.9.47 enabled the new end-to-end encryption protocol (proposal 144) by\n"
+"default for some services. A Sybil analysis and blocking tool was also\n"
+"now enabled by default. 0.9.48 enabled the new end-to-end encryption\n"
+"protocol (proposal 144) for most services. Preliminary support was added\n"
+"for new tunnel build message encryption (proposal 152). There were\n"
+"significant performance improvements throughout the router."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:472
+msgid ""
+"0.9.49 was the release that brought faster crypto. The I2P network\n"
+"became faster and more secure. Improvements and fixes for the SSU (UDP)\n"
+"transport resulted in faster speeds. The release also started the\n"
+"migration to new, faster ECIES-X25519 encryption for routers. The\n"
+"project had been working on the specifications and protocols for new\n"
+"encryption for several years, and was getting close to the end of it.\n"
+"The migration would take several releases to complete."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:480
+msgid ""
+"To minimize disruption, only new installs and a very small percentage of\n"
+"existing installs (randomly selected at restart) would be using the new\n"
+"encryption."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:484
+msgid ""
+"The project had “rekeyed” the network twice before, when changing the\n"
+"default signature type, but this was the first time it had changed the\n"
+"default encryption type. 0.9.50 enabled DNS over HTTPS for reseeding to\n"
+"protect users from passive DNS snooping. There were numerous fixes and\n"
+"improvements for IPv6 addresses, including new UPnP support."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:492
+msgid "1.5.0 — The early anniversary release because it is so good!"
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:495
+msgid ""
+"Yes, that’s right, after 9 years of 0.9.x releases, we are going\n"
+"    straight from 0.9.50 to 1.5.0. This does not signify a major API\n"
+"    change, or a claim that development is now complete. It is simply a\n"
+"    recognition of almost 20 years of work to provide anonymity and\n"
+"    security for our users."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:501
+msgid ""
+"This release finishes implementation of smaller tunnel build messages\n"
+"    to reduce bandwidth. We continue the transition of the network’s\n"
+"    routers to X25519 encryption. Of course there are also numerous bug\n"
+"    fixes and performance improvements."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:506
+msgid ""
+"As usual, we recommend that you update to this release. The best way\n"
+"    to maintain security and help the network is to run the latest\n"
+"    release."
+msgstr ""
+
+#: i2p2www/blog/2021/08/28/History-of-I2P.rst:510
+msgid "Congratulations team. Let’s do another 20."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:2
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:11
+msgid "Level up your I2P Skills with Encrypted LeaseSets"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:9
+msgid ""
+"It has been said that I2P emphasizes Hidden Services, we examine one "
+"interpretation of this"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:16
+msgid ""
+"It has been said in the past that I2P emphasizes support for Hidden Services,\n"
+"which is true in many ways. However, what this means to users, developers, and\n"
+"hidden service administrators isn't always the same. Encrypted LeaseSets and\n"
+"their use-cases provide a unique, practical window into how I2P makes hidden\n"
+"services more versatile, easier to administer, and how I2P extends on the\n"
+"Hidden Service concept to provide security benefits for potentially interesting\n"
+"use-cases."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:26
+msgid ""
+"What is a LeaseSet?\n"
+"-------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:31
+msgid ""
+"When you create a hidden service, you publish something called a \"LeaseSet\" to\n"
+"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P users\n"
+"need to discover \"where\" your hidden service is on the I2P Network. It contains\n"
+"\"Leases\" which identify tunnels that can be used to reach your hidden service,\n"
+"and the public key of your destination, which clients will encrypt messages to.\n"
+"This type of hidden service is reachable by anyone who has the address, which\n"
+"is probably the most common use case for now."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:41
+msgid ""
+"Sometimes, you might not want to allow your hidden services to be accessible by\n"
+"anyone, though. Some people use hidden services as a way of accessing an SSH\n"
+"server on a home PC, or to stitch together a network of IOT Devices. In these\n"
+"cases it's not necessary, and may be counter-productive, to make your hidden\n"
+"service accessible to everyone one the I2P Network. This is where \"Encrypted\n"
+"LeaseSets\" come into play."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:50
+msgid ""
+"Encrypted LeaseSets: VERY Hidden Services\n"
+"------------------------------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:55
+msgid ""
+"Encrypted LeaseSets are LeaseSets which are published to the NetDB in an\n"
+"encrypted form, where none of the Leases or public keys are visible unless\n"
+"the client has the keys required to decrypt the LeaseSet inside of it. Only\n"
+"clients you share keys with(For PSK Encrypted LeaseSets), or who share their\n"
+"keys with you(For DH Encrypted LeaseSets), will be able to see the destination\n"
+"and no one else."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:64
+msgid ""
+"I2P Supports several strategies for Encrypted LeaseSets. The key characteristics\n"
+"of each strategy are important to understand when deciding which one to use. If\n"
+"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the server\n"
+"will generate a key(or keys) which the server operator then shares with each\n"
+"client. Of course, this exchange must happen out-of-band, possibly via an\n"
+"exchange on IRC for example. This version of Encrypted LeaseSets is sort of\n"
+"like logging into Wi-Fi with a password. Except, what you're logging into is\n"
+"a Hidden Service."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:75
+msgid ""
+"If an Encrypted LeaseSet uses a \"Diffie-Hellman(DH)\n"
+"strategy, then they keys are generated on the client instead. When a\n"
+"Diffie-Hellman client connects to a destination with an Encrypted LeaseSet, they\n"
+"must first share their keys with the server operator. The server operator then\n"
+"decides whether to authorize the DH client. This version of Encrypted LeaseSets\n"
+"is sort of like SSH with an `authorized_keys` file. Except, what you're logging\n"
+"into is a Hidden Service."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:85
+msgid ""
+"By Encrypting your LeaseSet, you not only make it impossible for unauthorized\n"
+"users to connect to your destination, you make it impossible for unauthorized\n"
+"visitors to even discover the real destination of the I2P Hidden Service. Some\n"
+"readers have probably already considered a use-case for their own Encrypted\n"
+"LeaseSet."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:93
+msgid ""
+"Using Encrypted LeaseSets to Safely Access a Router Console\n"
+"-----------------------------------------------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:98
+msgid ""
+"As a general rule, the more complex information a service has access to about\n"
+"your device, the more dangerous it is to expose that service to the Internet or\n"
+"indeed, to a Hidden Service network like I2P. If you want to expose such a\n"
+"service, you need to protect it with something like a password, or, in the case\n"
+"of I2P, a much more thorough and secure option could be an Encrypted LeaseSet."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:106
+msgid ""
+"**Before continuing, please read and understand that if you do the following**\n"
+"**procedure without an Encrypted LeaseSet, you will be defeating the security of**\n"
+"**your I2P router. Do not configure access to your router console over I2P without**\n"
+"**an Encrypted LeaseSet. Additionally, do not share your Encrypted LeaseSet PSK's**\n"
+"**with any devices you do not control.**"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:114
+msgid ""
+"One such service which is useful to share over I2P, but ONLY with an Encrypted\n"
+"LeaseSet, is the I2P router console itself. Exposing the I2P router console on\n"
+"one machine to I2P with an Encrypted LeaseSet allows another machine with a\n"
+"browser to administer the remote I2P instance. I find this useful for remotely\n"
+"monitoring my regular I2P Services. It could also be used to monitor a server\n"
+"which is used to seed a torrent long-term as a way to access I2PSnark."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:123
+msgid ""
+"For as long as it takes to explain them, setting up an Encrypted LeaseSet is\n"
+"straightforward to configure via the Hidden Services Manager UI."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:128
+msgid ""
+"On the \"Server\"\n"
+"---------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:137
+msgid ""
+"Start by opening the Hidden Services Manager at http://127.0.0.1:7657/i2ptunnelmgr\n"
+"and scroll to the bottom of the section that says \"I2P Hidden Services.\" Create\n"
+"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" with these\n"
+"\"Tunnel Cryptography Options\" and save the hidden service."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:148
+msgid ""
+"Then, select your new tunnel from the Hidden Services Manager main page. The\n"
+"Tunnel Cryptography Options should now include your first Pre-Shared Key. Copy\n"
+"this down for the next step, along with the Encrypted Base32 Address of your\n"
+"tunnel."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:159
+msgid ""
+"On the \"Client\"\n"
+"---------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:164
+msgid ""
+"Now switch computers to the client which will connect to the hidden service,\n"
+"and visit the Keyring Configuration at http://127.0.0.1:7657/configkeyring to\n"
+"add the keys from earlier. Start by pasting the Base32 from the Server into\n"
+"the field labeled: \"Full destination, name, Base32, or hash.\" Next, paste the\n"
+"Pre-Shared Key from the server into the \"Encryption Key\" field. Click save,\n"
+"and you're ready to securely visit the Hidden Service using an Encrypted\n"
+"LeaseSet."
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:178
+msgid ""
+"Now You're Ready to Remotely Administer I2P\n"
+"-------------------------------------------"
+msgstr ""
+
+#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:183
+msgid ""
+"As you can see, I2P offers unique capabilities to Hidden Service Administrators\n"
+"which empower them to securely manage their I2P connections from anywhere in the\n"
+"world. Other Encrypted LeaseSets I keep on the same device for the same reason\n"
+"point to the SSH server, the Portainer instance I user to manage my service\n"
+"containers, and my personal NextCloud instance. With I2P, truly private, always\n"
+"reachable Self-Hosting is an achievable goal, in fact I think it's one of the\n"
+"things we're uniquely suited to, because of Encrypted LeaseSets. With them, I2P\n"
+"could become the key to securing self-hosted home automation or simply become\n"
+"the backbone of a new more private peer-to-peer web."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:2
+msgid "Improving I2P Adoption and Onboarding using Jpackage, I2P-Zero"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:9
+msgid ""
+"Versatile and emerging ways of installing and embedding I2P in your "
+"application"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:11
+msgid ""
+"For the majority of I2P's existence, it's been an application that runs with the\n"
+"help of a Java Virtual Machine that is already installed on the platform. This\n"
+"has always been the normal way to distribute Java applications, but it leads to\n"
+"a complicated installation procedure for many people. To make things even more\n"
+"complicated, the \"right answer\" to making I2P easy to install on any given\n"
+"platform might not be the same as any other platform. For example, I2P is quite\n"
+"simple to install with standard tools on Debian and Ubuntu based operating\n"
+"systems, because we can simply list the required Java components as \"Required\"\n"
+"by our package, however on Windows or OSX, there is no such system allowing us to make\n"
+"sure that a compatible Java is installed."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:24
+msgid ""
+"The obvious solution would be to manage the Java installation ourselves, but\n"
+"this used to a problem in-and-of-itself, outside of the scope of I2P. However,\n"
+"in recent Java versions, a new set of options has emerged which has the\n"
+"potential to solve this problem for many Java software. This exciting tool is\n"
+"called **\"Jpackage.\"**"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:32
+msgid "I2P-Zero and Dependency-Free I2P Installation"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:37
+msgid ""
+"The first very successful effort at building a dependency-free I2P Package was\n"
+"I2P-Zero, which was created by the Monero project originally for use with the\n"
+"Monero cryptocurrency. This project got us very excited because of it's success\n"
+"in creating a general-purpose I2P router which could easily packaged with an\n"
+"I2P application. Especially on Reddit, many people express their preference for\n"
+"the simplicity of setting up an I2P-Zero router."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:46
+msgid ""
+"This really proved to us that a dependency-free I2P Package which was easy to\n"
+"install was possible using modern Java tools, but I2P-Zero's use case was a\n"
+"little bit different than ours. It is best for embedded apps that need an I2P\n"
+"router that they can easily control using it's convenient control port on port\n"
+"\"8051\". Our next step would be to adapt the technology to the general-purpose\n"
+"I2P Application."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:55
+msgid "OSX Application Security Changes affect I2P IzPack Installer"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:60
+msgid ""
+"The issue became more pressing in recent versions of Mac OSX, where it is no\n"
+"longer straightforward to use the \"Classic\" installer which comes in the .jar\n"
+"format. This is because the application is not \"Notarized\" by Apple authorities\n"
+"and it is deemed a security risk. **However**, Jpackage can produce a .dmg file,\n"
+"which can be notarized by Apple authorities, conveniently solving our problem."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:68
+msgid ""
+"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to install on\n"
+"OSX than ever, no longer requiring users to install Java themselves and using\n"
+"standard OSX installation tools in their prescribed ways. The new .dmg installer\n"
+"makes setting up I2P on Mac OSX easier than it's ever been."
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:79
+msgid "The I2P of the future is Easy to Install"
+msgstr ""
+
+#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:84
+msgid ""
+"One of the things I hear from users the most is that if I2P wants adoption, it\n"
+"needs to be easy to use for people. Many of them want a \"Tor Browser Like\" user\n"
+"experience, to quote or paraphrase many familiar Redditors. Installation should\n"
+"not require complicated and error-prone \"post-installation\" steps. Many new\n"
+"users are not prepared to deal with their browser configuration in a thorough\n"
+"and complete way. To address this problem, we created the I2P Profile Bundle\n"
+"which configured Firefox so that it would automatically \"Just Work\" for I2P.\n"
+"As it's developed, it's added security features and improved integration with\n"
+"I2P itself. In it's latest version, it **also** bundles a complete, Jpackage\n"
+"powered I2P Router. The I2P Firefox Profile is now a fully-fledged distribution\n"
+"of I2P for Windows, with the only remaining dependency being Firefox itself.\n"
+"This should provide an unprecedented level of convenience for I2P users on\n"
+"Windows."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:2
+msgid "Bitcoin Core adds support for I2P!"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:9
+msgid "A new use case and a signal of growing acceptance"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:11
+msgid ""
+"An event months in the making, Bitcoin Core has added official support for I2P!\n"
+"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin nodes,\n"
+"using the help of nodes that operate within both I2P and the clearnet, making\n"
+"them first-class participants in the Bitcoin network. It's exciting to see\n"
+"large communities like Bitcoin taking notice of the advantages I2P can bring\n"
+"to them providing privacy and reachability to people all over the world."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:20
+msgid "How it Works"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:25
+msgid ""
+"I2P support is automatic, via the SAM API. This is also exciting news, because\n"
+"it highlights some of the things I2P is singularly good at, like empowering \n"
+"application developers to build I2P connections programmatically and\n"
+"conveniently. Bitcoin-over-I2P users can use I2P with no manual configuration by\n"
+"enabling the SAM API and running Bitcoin with I2P enabled."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:33
+msgid "Configuring your I2P Router"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:38
+msgid ""
+"In order to set up an I2P Router to provide anonymous connectivity to bitcoin,\n"
+"the SAM API needs to be enabled. In Java I2P, you should go to `http://127.0.0.1:7657/configclients\n"
+"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application Bridge\n"
+"with the \"Start\" button. You may also want to enable the SAM Application Bridge\n"
+"by default by checking the \"Run at Startup\" box and clicking \"Save Client\n"
+"Configuration.\""
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:47
+msgid ""
+"On i2pd, the SAM API is normally enabled by default, but if it isn't, you should\n"
+"set::\n"
+"\n"
+"  sam.enabled=true\n"
+"\n"
+"in your i2pd.conf file."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:56
+msgid "Configuring your Bitcoin Node for Anonymity and Connectivity"
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:61
+msgid ""
+"Getting Bitcoin itself launched in an anonymous mode still requires editing some\n"
+"configuration files in the Bitcoin Data Directory, which is %APPDATA%\\Bitcoin on\n"
+"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ on Mac\n"
+"OSX. It also requires at least version 22.0.0 for I2P support to be present."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:68
+msgid ""
+"After following these instructions, you should have a private Bitcoin\n"
+"node which uses I2P for I2P connections, and Tor for .onion and clearnet\n"
+"connections, so that all your connections are anonymous. For convenience,\n"
+"Windows users should open their Bitcoin Data Directory by opening the start menu\n"
+"and searching for \"Run.\" Inside the run prompt, type \"%APPDATA%\\Bitcoin\" and\n"
+"press enter."
+msgstr ""
+
+#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:77
+msgid ""
+"In that directory create a file called \"i2p.conf.\" On Windows, you should make\n"
+"sure that you've add quotes around the file when you save it, in order to\n"
+"prevent Windows from adding a default file extension to the file. The file\n"
+"should contain the following I2P-Related Bitcoin configuration options::\n"
+"\n"
+"  i2psam=127.0.0.1:7656\n"
+"  i2pacceptincoming=true\n"
+"  onlynet=i2p\n"
+"\n"
+"Next, you should create another file called \"tor.conf.\" The file should contain\n"
+"the following Tor related configuration options::\n"
+"\n"
+"  proxy=127.0.0.1:9050\n"
+"  onion=127.0.0.1:9050\n"
+"  onlynet=tor\n"
+"\n"
+"Finally, you'll need to \"include\" these configuration options in your Bitcoin\n"
+"configuration file, called \"bitcoin.conf\" in the Data Directory. Add these two\n"
+"lines to your bitcoin.conf file::\n"
+"\n"
+"  includeconf=i2p.conf\n"
+"  includeconf=tor.conf\n"
+"\n"
+"Now your Bitcoin node is configured to only use anonymous connections. In order\n"
+"to enable direct connections to remote nodes, remove the lines beginning in::\n"
+"\n"
+"  onlynet=\n"
+"\n"
+"You can do this if you do not require your Bitcoin node to be anonymous, and\n"
+"it helps anonymous users connect to the rest of the Bitcoin network."
+msgstr ""
diff --git a/i2p2www/translations/ro/LC_MESSAGES/comparison.po b/i2p2www/translations/ro/LC_MESSAGES/comparison.po
index bd2a372a59dc2c524f454183b71acbc055b0a4e9..9c78568004b5526ecd79502541f7ff4c1bd96be7 100644
--- a/i2p2www/translations/ro/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/ro/LC_MESSAGES/comparison.po
@@ -1,23 +1,23 @@
-# Romanian translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # polearnik <polearnik@mail.ru>, 2019
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2019-09-07 06:39+0000\n"
-"Last-Translator: polearnik <polearnik@mail.ru>\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: polearnik <polearnik@mail.ru>, 2019\n"
 "Language-Team: Romanian (http://www.transifex.com/otf/I2P/language/ro/)\n"
-"Plural-Forms: nplurals=3; "
-"plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1))\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ro\n"
+"Plural-Forms: nplurals=3; plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1));\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -25,85 +25,39 @@ msgstr "I2P in comparatie cu Freenet"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
-msgstr ""
-"Freenet este o rețea de publicare anonima distribuita pe deplin, egal la "
-"egal , oferind metode sigure de a stoca date, precum și încearcă să facă "
-"fata inundărilor de trafic. În timp ce Freenet este conceput ca un "
-"depozit de date distribuite, persoane au construit aplicații pentru a "
-"face comunicarea anonimă mai generice, cum ar fi site-uri web statice și "
-"forumuri."
+msgstr "Freenet este o rețea de publicare anonima distribuita pe deplin, egal la egal , oferind metode sigure de a stoca date, precum și încearcă să facă fata inundărilor de trafic. În timp ce Freenet este conceput ca un depozit de date distribuite, persoane au construit aplicații pentru a face comunicarea anonimă mai generice, cum ar fi site-uri web statice și forumuri."
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
-msgstr ""
-"Comparativ cu I2P, Freenet oferă unele avantaje substanțiale - este un "
-"depozit de date distribuite, în timp ce I2P nu este, permite oamenilor "
-"pentru a prelua conținutul publicat de către alte persoane, chiar atunci "
-"când editorul nu mai este on-line. În plus, ar trebui să fie în măsură de"
-" a distribui date populare destul de eficient. I2P în sine nu are și nu "
-"va oferi această funcționalitate. Pe de altă parte, există o suprapunere "
-"utilizatorilor care doar să comunice unul cu celălalt anonim prin "
-"intermediul site-uri, forumuri, programe de file sharing, etc asemenea, "
-"au existat câteva tentative de a elabora un magazin de date distribuite "
-"pentru a rula pe partea de sus a I2P, (cel mai recent un port de <a "
-"href=\"%(tahoe)s\">  Tahoe-LAFS </ a>), dar nimic nu este inca gata "
-"pentru uz general."
+msgstr "Comparativ cu I2P, Freenet oferă unele avantaje substanțiale - este un depozit de date distribuite, în timp ce I2P nu este, permite oamenilor pentru a prelua conținutul publicat de către alte persoane, chiar atunci când editorul nu mai este on-line. În plus, ar trebui să fie în măsură de a distribui date populare destul de eficient. I2P în sine nu are și nu va oferi această funcționalitate. Pe de altă parte, există o suprapunere utilizatorilor care doar să comunice unul cu celălalt anonim prin intermediul site-uri, forumuri, programe de file sharing, etc asemenea, au existat câteva tentative de a elabora un magazin de date distribuite pentru a rula pe partea de sus a I2P, (cel mai recent un port de <a href=\"%(tahoe)s\">  Tahoe-LAFS </ a>), dar nimic nu este inca gata pentru uz general."
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
-msgstr ""
-"Cu toate acestea, chiar și ignorând orice probleme implementării, există "
-"unele preocupări cu privire algoritmi Freenet scalabilitate și de "
-"perspectivă anonimata, datorită în mare parte la euristica Freenet "
-"condusa de rutare. Interacțiunile de diferite tehnici de siguranță pot "
-"descuraja cu succes diferite atacuri, și, probabil, unele aspecte ale "
-"algoritmilor de rutare va oferi sperat pentru scalabilitate. Din păcate, "
-"analiza nu demult a algoritmilor implicate a dus la rezultate pozitive, "
-"dar încă mai există speranță. Cel puțin, Freenet nu oferă anonimatul "
-"substanțial față de un atacator care nu are resursele necesare pentru a "
-"analiza în continuare."
+msgstr "Cu toate acestea, chiar și ignorând orice probleme implementării, există unele preocupări cu privire algoritmi Freenet scalabilitate și de perspectivă anonimata, datorită în mare parte la euristica Freenet condusa de rutare. Interacțiunile de diferite tehnici de siguranță pot descuraja cu succes diferite atacuri, și, probabil, unele aspecte ale algoritmilor de rutare va oferi sperat pentru scalabilitate. Din păcate, analiza nu demult a algoritmilor implicate a dus la rezultate pozitive, dar încă mai există speranță. Cel puțin, Freenet nu oferă anonimatul substanțial față de un atacator care nu are resursele necesare pentru a analiza în continuare."
 
 #: i2p2www/pages/site/comparison/index.html:2
 msgid "Comparing I2P to other projects"
@@ -111,48 +65,28 @@ msgstr "I2P in comparatie cu alte proiecte"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Există o mulțime de alte aplicații și proiecte ce lucrează asupra "
-"comunicării anonimă și I2P a fost inspirat de o mare parte a eforturilor "
-"lor. Aceasta nu este o listă completă a resurselor de anonimat - <a "
-"href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie "
-"Anonimatului</a> și de GNUnet <a href = \"https://www .gnunet.org/link-"
-"uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva "
-"sisteme se disting prin comparație continua. Următoarele pagini au "
-"comparații individuale :"
+msgstr "Există o mulțime de alte aplicații și proiecte ce lucrează asupra comunicării anonimă și I2P a fost inspirat de o mare parte a eforturilor lor. Aceasta nu este o listă completă a resurselor de anonimat - <a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie Anonimatului</a> și de GNUnet <a href = \"https://www .gnunet.org/link-uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva sisteme se disting prin comparație continua. Următoarele pagini au comparații individuale :"
 
 #: i2p2www/pages/site/comparison/index.html:20
 #, python-format
 msgid ""
 "The following are discussed on the <a href=\"%(othernetworks)s\">other "
 "networks page:</a>"
-msgstr ""
-"Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte "
-"retele: </ a>"
+msgstr "Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte retele: </ a>"
 
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Conținutul acestei pagini este subiectul actualizarii, discuții și "
-"dispute, și observații și completări sunt binevenite. Puteți contribui o "
-"analiză prin introducerea unui <a href=\"%(trac)s\"> bilet nou pe Trac "
-"</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
 msgid "I2P Compared to Other Anonymous Networks"
@@ -169,253 +103,116 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Cele mai multe dintre următoarele secțiuni sunt destul de vechi, și ar "
-"putea să nu fie exacte. Pentru o privire de ansamblu asupra comparații "
-"disponibile, a se vedea href=\"%(comparison)s\"> pagina principală "
-"comparații rețea </ a>. Puteți contribui o analiză prin introducerea unui"
-" <a href=\"%(trac)s\"> bilet nou pe Trac </ a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
-msgstr ""
-"RetroShare este un set de aplicații peer-to-peer care rulează în\n"
-"Rețea <a href=\"%(f2fwiki)s\">prieten cu prieten (F2F)</a>. Fiecare coleg"
-" de astfel de F2F\n"
-"rețeaua face conexiuni IP directe numai la colegii autenticați "
-"(„prieteni”) după ce sunt explicite\n"
-"schimb de certificate. Poate descoperi colegi neautentificați (de "
-"exemplu, prietenii prietenilor),\n"
-"dar conexiunile la aceștia sunt transmise peste colegii „prieteni” pentru"
-" a oferi confidențialitate și anonimat."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
+msgstr "RetroShare este un set de aplicații peer-to-peer care rulează în\nRețea <a href=\"%(f2fwiki)s\">prieten cu prieten (F2F)</a>. Fiecare coleg de astfel de F2F\nrețeaua face conexiuni IP directe numai la colegii autenticați („prieteni”) după ce sunt explicite\nschimb de certificate. Poate descoperi colegi neautentificați (de exemplu, prietenii prietenilor),\ndar conexiunile la aceștia sunt transmise peste colegii „prieteni” pentru a oferi confidențialitate și anonimat."
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
-msgstr ""
-"RetroShare este conceput pentru a construi o rețea privată de colegi de "
-"încredere, în timp ce I2P este proiectat\n"
-"să fie o rețea publică anonimă la scară largă. Versiunile recente ale "
-"RetroShare au opțiuni de rulat\n"
-"ca un \"darknet\" public prin utilizarea I2P sau Tor ca transport. Astfel"
-" sunt toate conexiunile\n"
-"anonimizat și nu este necesară încredere pentru adăugarea de „prieteni” "
-"noi."
+msgstr "RetroShare este conceput pentru a construi o rețea privată de colegi de încredere, în timp ce I2P este proiectat\nsă fie o rețea publică anonimă la scară largă. Versiunile recente ale RetroShare au opțiuni de rulat\nca un \"darknet\" public prin utilizarea I2P sau Tor ca transport. Astfel sunt toate conexiunile\nanonimizat și nu este necesară încredere pentru adăugarea de „prieteni” noi."
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
-msgstr ""
-"Morphmix și Tarzan sunt ambele complet distribuite , de tip peer-to-peer "
-"rețelele de proxy-uri anonime, care permit oamenilor să tunel prin "
-"intermediul rețelei de amestec scăzut latență. Morphmix include unele "
-"algoritmi foarte interesante  de detectare a comploturilor și apărare "
-"Sybil, în timp ce Tarzan face uz de deficitul de adrese IP pentru a "
-"realiza aceasta. Cele două diferențe principale între aceste sisteme și "
-"I2P sunt legate de <a href=\"%(threatmodel)s\"> modelul amenințare I2P "
-"</a> și proiectarea lor de-proxy (spre deosebire de a oferi atât "
-"anonimare expeditorului și receptorului). Există un cod sursă disponibil "
-"pentru ambele sisteme, dar noi nu sunt constienti de utilizarea lor în "
-"afara mediilor academice."
+msgstr "Morphmix și Tarzan sunt ambele complet distribuite , de tip peer-to-peer rețelele de proxy-uri anonime, care permit oamenilor să tunel prin intermediul rețelei de amestec scăzut latență. Morphmix include unele algoritmi foarte interesante  de detectare a comploturilor și apărare Sybil, în timp ce Tarzan face uz de deficitul de adrese IP pentru a realiza aceasta. Cele două diferențe principale între aceste sisteme și I2P sunt legate de <a href=\"%(threatmodel)s\"> modelul amenințare I2P </a> și proiectarea lor de-proxy (spre deosebire de a oferi atât anonimare expeditorului și receptorului). Există un cod sursă disponibil pentru ambele sisteme, dar noi nu sunt constienti de utilizarea lor în afara mediilor academice."
 
 #: i2p2www/pages/site/comparison/other-networks.html:172
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
-msgstr ""
-"Mixminion și Mixmaster sunt rețele de suport e-mail anonim împotriva unui"
-" adversar foarte puternic. Aplicații high-latență de mesagerie care "
-"rulează pe partea de sus a I2P (de exemplu, <a href=\"%(syndie)s\"> "
-"Syndie </ a> sau I2PBote) se poate dovedi, probabil, suficient pentru a "
-"satisface modelul amenințarea acestor adversari, în timp ce rulează în "
-"paralel de-a lungul partea de nevoile utilizatorilor latență redusă, "
-"pentru a oferi un set de anonimat semnificativ mai mare. Suport de înaltă"
-" latență în router-ul I2P în sine poate sau nu poate fi adăugat într-un "
-"comunicat viitor îndepărtat. Este prea devreme pentru a spune dacă I2P va"
-" satisface nevoile utilizatorilor care necesită protecție extrem de "
-"e-mail."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
+msgstr "Mixminion și Mixmaster sunt rețele de suport e-mail anonim împotriva unui adversar foarte puternic. Aplicații high-latență de mesagerie care rulează pe partea de sus a I2P (de exemplu, <a href=\"%(syndie)s\"> Syndie </ a> sau I2PBote) se poate dovedi, probabil, suficient pentru a satisface modelul amenințarea acestor adversari, în timp ce rulează în paralel de-a lungul partea de nevoile utilizatorilor latență redusă, pentru a oferi un set de anonimat semnificativ mai mare. Suport de înaltă latență în router-ul I2P în sine poate sau nu poate fi adăugat într-un comunicat viitor îndepărtat. Este prea devreme pentru a spune dacă I2P va satisface nevoile utilizatorilor care necesită protecție extrem de e-mail."
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
 msgid ""
 "As with Tor and Onion Routing, \n"
 "both Mixminion and Mixmaster take the directory based approach as well."
-msgstr ""
-"Ca și în cazul Tor și ceapa de rutare, atât Mixminion și Mixmaster ia o "
-"abordare bazată pe directorul "
+msgstr "Ca și în cazul Tor și ceapa de rutare, atât Mixminion și Mixmaster ia o abordare bazată pe directorul "
 
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
-msgstr ""
-"JAP ( Java Proxy Anonim ) este o rețea de cascade de amestece pentru "
-"anonimizarea cererilor de web , și , ca atare, are câteva noduri  "
-"centralizate ( participanții la cascada ), care amesteca cereri de la "
-"clienti prin secvența de noduri (cascadă ) înainte de proxy de pe web . "
-"Domeniul de aplicare , modelul de amenințare , si siguranța este "
-"substanțial diferită de I2P , dar pentru cei care nu au nevoie de "
-"anonimat semnificativ , dar încă nu sunt mulțumit cu un Anonymizer - cum "
-"ar fi serviciu , JAP este în valoare de revizuire . O remarcare de "
-"prudenta este faptul că oricine sub jurisdicția instanțelor germane ar "
-"putea dori să aibă grijă , ca Biroul Federal German de Investigații "
-"Penale ( FBCI ) a montat cu succes un <a href=\"%(url)s\"> atac < /a> pe "
-"rețea . Chiar dacă metoda a acestui atac a fost ulterior dovedit a fi "
-"ilegal în instanțele germane , faptul că datele au fost colectate cu "
-"succes  . Instanțele schimba mintea lor bazate pe situație , iar acest "
-"lucru este o dovadă că în cazul în care un organism guvernamental sau "
-"agenția de informații a vrut , ar putea aduna date , chiar dacă acesta "
-"poate fi găsite inadmisibile în unele instanțe mai târziu )\n"
+msgstr "JAP ( Java Proxy Anonim ) este o rețea de cascade de amestece pentru anonimizarea cererilor de web , și , ca atare, are câteva noduri  centralizate ( participanții la cascada ), care amesteca cereri de la clienti prin secvența de noduri (cascadă ) înainte de proxy de pe web . Domeniul de aplicare , modelul de amenințare , si siguranța este substanțial diferită de I2P , dar pentru cei care nu au nevoie de anonimat semnificativ , dar încă nu sunt mulțumit cu un Anonymizer - cum ar fi serviciu , JAP este în valoare de revizuire . O remarcare de prudenta este faptul că oricine sub jurisdicția instanțelor germane ar putea dori să aibă grijă , ca Biroul Federal German de Investigații Penale ( FBCI ) a montat cu succes un <a href=\"%(url)s\"> atac < /a> pe rețea . Chiar dacă metoda a acestui atac a fost ulterior dovedit a fi ilegal în instanțele germane , faptul că datele au fost colectate cu succes  . Instanțele schimba mintea lor bazate pe situație , iar acest lucru este o dovadă că în cazul în care un organism guvernamental sau agenția de informații a vrut , ar putea aduna date , chiar dacă acesta poate fi găsite inadmisibile în unele instanțe mai târziu )\n"
 
 #: i2p2www/pages/site/comparison/other-networks.html:216
 #, python-format
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
-msgstr ""
-"Ambele din aceste sisteme funcționează prin aceeași baza <a "
-"href=\"%(antnet)s\"> antnet </a> de rutare, oferind un anumit grad de "
-"anonimat bazat pe modelul amenințarea de a oferi negare plauzibilă față "
-"de un simplu adversar non-conspiră. Cu rutare antnet, ei în primul rând, "
-"fie fac o plimbare aleatoare sau o căutare difuzata a găsit unii "
-"utilizatori cu datele de identitate sau dorite, iar apoi folosiți un "
-"algoritm de feedback pentru a optimiza această cale gasita. Aceasta "
-"funcționează bine pentru aplicații care pur și simplu doresc să știe ce "
-"alți oameni din jurul lor au de oferit - \"Cum voi face\" vs \"Hei Alice,"
-" ce mai faci\" - veți obține de fapt un grup local, de noduri, care pot "
-"partaja fișiere cu și menține un anumit grad de anonimat (dacă nu aveți "
-"mai mult control asupra cine este în acel grup de colegii)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
+msgstr "Ambele din aceste sisteme funcționează prin aceeași baza <a href=\"%(antnet)s\"> antnet </a> de rutare, oferind un anumit grad de anonimat bazat pe modelul amenințarea de a oferi negare plauzibilă față de un simplu adversar non-conspiră. Cu rutare antnet, ei în primul rând, fie fac o plimbare aleatoare sau o căutare difuzata a găsit unii utilizatori cu datele de identitate sau dorite, iar apoi folosiți un algoritm de feedback pentru a optimiza această cale gasita. Aceasta funcționează bine pentru aplicații care pur și simplu doresc să știe ce alți oameni din jurul lor au de oferit - \"Cum voi face\" vs \"Hei Alice, ce mai faci\" - veți obține de fapt un grup local, de noduri, care pot partaja fișiere cu și menține un anumit grad de anonimat (dacă nu aveți mai mult control asupra cine este în acel grup de colegii)."
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
-msgstr ""
-"Cu toate acestea, algoritmul nu scaleaza de bine la toate - în cazul în "
-"care cererea vrea să vorbească cu un anumit utilizator se termină prin a "
-"face o emisiune de căutare  sau de mers aleator (deși, dacă acestea sunt "
-"suficient de norocos pentru a reuși, de rutare antnet ar trebui să "
-"optimizeze găsirea conexiunii). Acest lucru înseamnă că, în timp ce "
-"aceste rețele pot lucra bine la solzi mici, ele nu sunt potrivite pentru "
-"retele mari în cazul în care cineva vrea să intre în contact cu un alt "
-"inter pares. Asta nu înseamnă că nu există nicio valoare în aceste "
-"sisteme, doar că aplicabilitatea lor este limitată la situațiile în care "
-"problemele lor specifice pot fi abordate."
+msgstr "Cu toate acestea, algoritmul nu scaleaza de bine la toate - în cazul în care cererea vrea să vorbească cu un anumit utilizator se termină prin a face o emisiune de căutare  sau de mers aleator (deși, dacă acestea sunt suficient de norocos pentru a reuși, de rutare antnet ar trebui să optimizeze găsirea conexiunii). Acest lucru înseamnă că, în timp ce aceste rețele pot lucra bine la solzi mici, ele nu sunt potrivite pentru retele mari în cazul în care cineva vrea să intre în contact cu un alt inter pares. Asta nu înseamnă că nu există nicio valoare în aceste sisteme, doar că aplicabilitatea lor este limitată la situațiile în care problemele lor specifice pot fi abordate."
 
 #: i2p2www/pages/site/comparison/other-networks.html:239
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
-msgstr ""
-"Aceasta a fost o rețea închisă-source destinata utilizatorilor iraniene. "
-"Tor a făcut o <a href=\"%(torpost)s\"> writeup bun asupra a ceea ce să "
-"caute într-un instrument de eludare </ a>. Este suficient să spunem că "
-"este o sursa închisă și care vizează în mod public o anumită țară nu sunt"
-" idei bune. I2P este, desigur, sursă deschisă. Cu toate acestea, această "
-"sursă, și documentația noastră <a href=\"%(docs)s\">tehnice </a>, are "
-"nevoie de mult mai multa revizuire."
+msgstr "Aceasta a fost o rețea închisă-source destinata utilizatorilor iraniene. Tor a făcut o <a href=\"%(torpost)s\"> writeup bun asupra a ceea ce să caute într-un instrument de eludare </ a>. Este suficient să spunem că este o sursa închisă și care vizează în mod public o anumită țară nu sunt idei bune. I2P este, desigur, sursă deschisă. Cu toate acestea, această sursă, și documentația noastră <a href=\"%(docs)s\">tehnice </a>, are nevoie de mult mai multa revizuire."
 
 #: i2p2www/pages/site/comparison/other-networks.html:248
 msgid "Paid VPN Services"
@@ -426,10 +223,8 @@ msgstr "Servicii VPN platite"
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Puteți contribui o analiză prin introducerea unui <a href=\"%(trac)s\"> "
-"bilet nou pe Trac </a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
 msgid "Others"
@@ -457,17 +252,7 @@ msgid ""
 "network, as well as gather and report statistics, as \n"
 "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
 "database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
-msgstr ""
-"Tor și Onion Routing sunt rețele anonime  proxy, permițând oamenilor să "
-"tuneleze prin intermediul rețelei de  amestec latență scăzuta. Cele două "
-"diferențe principale între Tor/onion-routing  și I2P sunt  în legătură cu"
-" diferențele de model-amenințare și de design de-proxy (deși Tor acceptă "
-"servicii ascunse, de asemenea). ÃŽn plus, Tor are abordarea directorului "
-"bazat - pe oferirea unui punct centralizat de gestionare a \"vederii\" "
-"generale a rețelei, precum și adunarea și raportarea statistici, spre "
-"deosebire de I2P distribuita <a href = \"% (netdb) s\" > Baza de date "
-"rețea </ a> și   <a href=\"%(peerselection)s\">selecție egal la egal </ "
-"a>."
+msgstr "Tor și Onion Routing sunt rețele anonime  proxy, permițând oamenilor să tuneleze prin intermediul rețelei de  amestec latență scăzuta. Cele două diferențe principale între Tor/onion-routing  și I2P sunt  în legătură cu diferențele de model-amenințare și de design de-proxy (deși Tor acceptă servicii ascunse, de asemenea). În plus, Tor are abordarea directorului bazat - pe oferirea unui punct centralizat de gestionare a \"vederii\" generale a rețelei, precum și adunarea și raportarea statistici, spre deosebire de I2P distribuita <a href = \"% (netdb) s\" > Baza de date rețea </ a> și   <a href=\"%(peerselection)s\">selecție egal la egal </ a>."
 
 #: i2p2www/pages/site/comparison/tor.html:23
 msgid ""
@@ -480,14 +265,7 @@ msgid ""
 "outproxies are prone to abuse, along with all of the \n"
 "other security issues we've come to know and love with \n"
 "normal Internet traffic."
-msgstr ""
-"Funcționalitatea outproxy I2P/Tor are câteva puncte slabe importante "
-"împotriva unor agresori - odata comunicarea părăsește mixnet, adversarea "
-"pasiva la nivel mondial se poate mai ușor monta analiza traficului. În "
-"plus, outproxies au acces la textul datelor transferate în ambele "
-"direcții, și outproxies sunt predispuse la abuz, împreună cu toate "
-"celelalte probleme de securitate le-am venit să-l cunoastem cu trafic "
-"normal din Internet."
+msgstr "Funcționalitatea outproxy I2P/Tor are câteva puncte slabe importante împotriva unor agresori - odata comunicarea părăsește mixnet, adversarea pasiva la nivel mondial se poate mai ușor monta analiza traficului. În plus, outproxies au acces la textul datelor transferate în ambele direcții, și outproxies sunt predispuse la abuz, împreună cu toate celelalte probleme de securitate le-am venit să-l cunoastem cu trafic normal din Internet."
 
 #: i2p2www/pages/site/comparison/tor.html:35
 msgid ""
@@ -497,14 +275,7 @@ msgid ""
 "to build outproxy functionality on top of an anonymous\n"
 "communication layer, they can).  In fact, some I2P users\n"
 "currently take advantage of Tor to outproxy."
-msgstr ""
-"Cu toate acestea, majoritatea persoanelor nu trebuie să faca griji cu "
-"privire la aceste situații, deoarece acestea sunt în afara modelului lor "
-"de amenințare. Este, de asemenea, în afara (formal) domeniul de aplicare "
-"funcțională I2P lui (în cazul în care oamenii doresc să construiască "
-"funcționalitate outproxy pe partea de sus a unui strat de comunicare "
-"anonimă, ei pot). De fapt, unii utilizatori de I2P  în prezent profita de"
-" Tor la outproxy."
+msgstr "Cu toate acestea, majoritatea persoanelor nu trebuie să faca griji cu privire la aceste situații, deoarece acestea sunt în afara modelului lor de amenințare. Este, de asemenea, în afara (formal) domeniul de aplicare funcțională I2P lui (în cazul în care oamenii doresc să construiască funcționalitate outproxy pe partea de sus a unui strat de comunicare anonimă, ei pot). De fapt, unii utilizatori de I2P  în prezent profita de Tor la outproxy."
 
 #: i2p2www/pages/site/comparison/tor.html:49
 msgid "Comparison of Tor and I2P Terminology"
@@ -514,9 +285,7 @@ msgstr "Compararea cu Tor și I2P terminologie"
 msgid ""
 "While Tor and I2P are similar in many ways, much of the terminology is "
 "different."
-msgstr ""
-"În timp ce Tor și I2P sunt similare în multe feluri, o mare parte din "
-"terminologie este diferita."
+msgstr "În timp ce Tor și I2P sunt similare în multe feluri, o mare parte din terminologie este diferita."
 
 #: i2p2www/pages/site/comparison/tor.html:55
 msgid "Cell"
@@ -589,8 +358,8 @@ msgstr "Serviciul ascuns"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
-msgstr "Eepsite sau Destinatie"
+msgid "I2P Site or Destination"
+msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
 msgid "Hidden Service Descriptor"
@@ -660,21 +429,14 @@ msgstr "Beneficiile Tor peste I2P"
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
-msgstr ""
-"Baza mult mai mare de utilizatori; vizibilitate mult mai multa în "
-"comunitățile academice și hacker, beneficiaza de studii formale de "
-"anonimat, rezistenta, și de performanță,  vizibila, liderul non-anonim "
-"universitate pe baza de"
+msgstr "Baza mult mai mare de utilizatori; vizibilitate mult mai multa în comunitățile academice și hacker, beneficiaza de studii formale de anonimat, rezistenta, și de performanță,  vizibila, liderul non-anonim universitate pe baza de"
 
 #: i2p2www/pages/site/comparison/tor.html:84
 msgid "Has already solved some scaling issues I2P has yet to address"
-msgstr ""
-"S-au rezolvat deja unele probleme de scalare I2P a fost încă pentru "
-"adresare"
+msgstr "S-au rezolvat deja unele probleme de scalare I2P a fost încă pentru adresare"
 
 #: i2p2www/pages/site/comparison/tor.html:85
 msgid "Has significant funding"
@@ -686,34 +448,24 @@ msgstr "Are mai multe dezvoltatori, inclusiv câteva care sunt finanțate"
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
-msgstr ""
-"Mai rezistent la blocarea din cauza stratului transport TLS  și poduri "
-"(I2P are propuneri pentru \"rute restricționate complete\", dar acestea "
-"încă nu sunt puse în aplicare )"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
+msgstr "Mai rezistent la blocarea din cauza stratului transport TLS  și poduri (I2P are propuneri pentru \"rute restricționate complete\", dar acestea încă nu sunt puse în aplicare )"
 
 #: i2p2www/pages/site/comparison/tor.html:93
 msgid "Big enough that it has had to adapt to blocking and DOS attempts"
-msgstr ""
-"Suficient de mare pentru că a trebuit să se adapteze la blocarea și DOS "
-"încercări"
+msgstr "Suficient de mare pentru că a trebuit să se adapteze la blocarea și DOS încercări"
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
-msgstr ""
-"Concepute și optimizate pentru traficul de ieșire, cu un număr mare de "
-"noduri de ieșire"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
+msgstr "Concepute și optimizate pentru traficul de ieșire, cu un număr mare de noduri de ieșire"
 
 #: i2p2www/pages/site/comparison/tor.html:96
 msgid ""
 "Better documentation, has formal papers and specifications,\n"
 "better website, many more translations"
-msgstr ""
-"Documentația mai bună, are acte oficiale și specificațiile, site-ul mai "
-"bun, mult mai multe traduceri"
+msgstr "Documentația mai bună, are acte oficiale și specificațiile, site-ul mai bun, mult mai multe traduceri"
 
 #: i2p2www/pages/site/comparison/tor.html:101
 msgid "More efficient with memory usage"
@@ -727,17 +479,13 @@ msgstr "Nodurile client Tor au foarte putin trafic overhead"
 msgid ""
 "Centralized control reduces the complexity at each\n"
 "node and can efficiently address Sybil attacks"
-msgstr ""
-"Control centralizat reduce complexitatea de la fiecare nod și poate "
-"răspunde în mod eficient atacuri Sybil"
+msgstr "Control centralizat reduce complexitatea de la fiecare nod și poate răspunde în mod eficient atacuri Sybil"
 
 #: i2p2www/pages/site/comparison/tor.html:110
 msgid ""
 "A core of high capacity nodes provides higher\n"
 "throughput and lower latency"
-msgstr ""
-"O bază de noduri de mare capacitate oferă transfer mai mare și latență "
-"mai mică"
+msgstr "O bază de noduri de mare capacitate oferă transfer mai mare și latență mai mică"
 
 #: i2p2www/pages/site/comparison/tor.html:115
 msgid "C, not Java (ewww)"
@@ -749,11 +497,9 @@ msgstr "Beneficiile I2P peste Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
-msgstr ""
-"Concepute și optimizate pentru serviciile ascunse, care sunt mult mai "
-"rapide decât în Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
+msgstr "Concepute și optimizate pentru serviciile ascunse, care sunt mult mai rapide decât în Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:121
 msgid "Fully distributed and self organizing"
@@ -763,23 +509,17 @@ msgstr "Complet distribuit și de auto organizare"
 msgid ""
 "Peers are selected by continuously profiling and ranking performance,\n"
 "rather than trusting claimed capacity"
-msgstr ""
-"Colegii sunt selectate de către profilare continua  si clasament de "
-"performanță, mai degrabă decât încredere în capacitatea de a pretins"
+msgstr "Colegii sunt selectate de către profilare continua  si clasament de performanță, mai degrabă decât încredere în capacitatea de a pretins"
 
 #: i2p2www/pages/site/comparison/tor.html:129
 msgid ""
 "Floodfill peers (\"directory servers\") are varying and untrusted,\n"
 "rather than hardcoded"
-msgstr ""
-"Colegii Floodfill (\"serverele director\") sunt diferiti și nu sunt de "
-"încredere, mai degrabă decât codate"
+msgstr "Colegii Floodfill (\"serverele director\") sunt diferiti și nu sunt de încredere, mai degrabă decât codate"
 
 #: i2p2www/pages/site/comparison/tor.html:134
 msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
-msgstr ""
-"Suficient de mici pentru că sa nu fie blocati sau administrati demult, "
-"sau  deloc"
+msgstr "Suficient de mici pentru că sa nu fie blocati sau administrati demult, sau  deloc"
 
 #: i2p2www/pages/site/comparison/tor.html:135
 msgid "Peer-to-peer friendly"
@@ -793,17 +533,13 @@ msgstr "Comutarea pachetelor în loc de comutarea circuitelor"
 msgid ""
 "implicit transparent load balancing of messages \n"
 "across multiple peers, rather than a single path"
-msgstr ""
-"balansare incarcarii implicita si  transparentă a mesajelor pe mai multe "
-"colegii, mai des decât o singură cale"
+msgstr "balansare incarcarii implicita si  transparentă a mesajelor pe mai multe colegii, mai des decât o singură cale"
 
 #: i2p2www/pages/site/comparison/tor.html:145
 msgid ""
 "resilience vs. failures by running multiple \n"
 "tunnels in parallel, plus rotating tunnels"
-msgstr ""
-"rezistența vs eșecurile prin rularea mai multor tuneluri în paralel, plus"
-"  tuneluri rotative"
+msgstr "rezistența vs eșecurile prin rularea mai multor tuneluri în paralel, plus  tuneluri rotative"
 
 #: i2p2www/pages/site/comparison/tor.html:151
 msgid ""
@@ -811,21 +547,14 @@ msgid ""
 "of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
 "used by all of the peers Alice is talking with, \n"
 "rather than a circuit for each)"
-msgstr ""
-"scala conexiuni ale fiecărui client la O (1) în loc de O (N) (Alice de  "
-"exemplu are 2 tuneluri de intrare care sunt utilizate de către toti  "
-"colegi cu care Alice converseaza , mai degrabă decât un circuit pentru "
-"fiecare)"
+msgstr "scala conexiuni ale fiecărui client la O (1) în loc de O (N) (Alice de  exemplu are 2 tuneluri de intrare care sunt utilizate de către toti  colegi cu care Alice converseaza , mai degrabă decât un circuit pentru fiecare)"
 
 #: i2p2www/pages/site/comparison/tor.html:161
 msgid ""
 "Unidirectional tunnels instead of bidirectional\n"
 "circuits, doubling the number of nodes a peer has to\n"
 "compromise to get the same information."
-msgstr ""
-"Tuneluri unidirecționale în loc de circuite bidirecționale, dublarea "
-"numărului de noduri colegilor trebuie să facă un compromis pentru a "
-"obține aceleași informații."
+msgstr "Tuneluri unidirecționale în loc de circuite bidirecționale, dublarea numărului de noduri colegilor trebuie să facă un compromis pentru a obține aceleași informații."
 
 #: i2p2www/pages/site/comparison/tor.html:166
 #, python-format
@@ -839,11 +568,7 @@ msgid ""
 "tunnels are used for more than simply passing end \n"
 "to end messages (e.g. netDb, tunnel management, \n"
 "tunnel testing)"
-msgstr ""
-"Protecția împotriva detectarii de activitate clientului, chiar și atunci "
-"când un atacator participă la tunel, așa cum tuneluri sunt folosite "
-"pentru mai multe decât pur și simplu trecerea intr-un capăt mesaje finali"
-" (de exemplu netDb, managementul tunel, tunel"
+msgstr "Protecția împotriva detectarii de activitate clientului, chiar și atunci când un atacator participă la tunel, așa cum tuneluri sunt folosite pentru mai multe decât pur și simplu trecerea intr-un capăt mesaje finali (de exemplu netDb, managementul tunel, tunel"
 
 #: i2p2www/pages/site/comparison/tor.html:180
 msgid ""
@@ -851,18 +576,13 @@ msgid ""
 "of samples that an attacker can use to mount an \n"
 "active attack with, unlike circuits in Tor, which are\n"
 "typically long lived."
-msgstr ""
-"Tunelurile din I2P sunt de scurtă durată, scăderea numărului de probe "
-"care un atacator poate folosi pentru a monta un atac activ , spre "
-"deosebire de circuite din Tor, care de obicei au viata lunga."
+msgstr "Tunelurile din I2P sunt de scurtă durată, scăderea numărului de probe care un atacator poate folosi pentru a monta un atac activ , spre deosebire de circuite din Tor, care de obicei au viata lunga."
 
 #: i2p2www/pages/site/comparison/tor.html:188
 msgid ""
 "I2P APIs are designed specifically for anonymity and\n"
 "security, while SOCKS is designed for functionality."
-msgstr ""
-"I2P API-uri sunt proiectate special pentru anonimatul și securitate, în "
-"timp ce SOCKS este proiectat pentru funcționalitate."
+msgstr "I2P API-uri sunt proiectate special pentru anonimatul și securitate, în timp ce SOCKS este proiectat pentru funcționalitate."
 
 #: i2p2www/pages/site/comparison/tor.html:193
 msgid "Essentially all peers participate in routing for others"
@@ -873,10 +593,7 @@ msgid ""
 "The bandwidth overhead of being a full peer is low, \n"
 "while in Tor, while client nodes don't require much\n"
 "bandwidth, they don't fully participate in the mixnet."
-msgstr ""
-"Overhead de bandă a utilizatorului este scăzut, decit în Tor, în timp ce "
-"nodurile client nu necesită mai mult de lățime de bandă, ele nu participă"
-" pe deplin la mixnet."
+msgstr "Overhead de bandă a utilizatorului este scăzut, decit în Tor, în timp ce nodurile client nu necesită mai mult de lățime de bandă, ele nu participă pe deplin la mixnet."
 
 #: i2p2www/pages/site/comparison/tor.html:201
 msgid "Integrated automatic update mechanism"
@@ -902,19 +619,14 @@ msgstr "... și  posibil sa nu fie puse în aplicare, astfel încât nu conta pe
 msgid ""
 "Defense vs. message count analysis by garlic wrapping \n"
 "multiple messages"
-msgstr ""
-"Apărare vs analiza numărului de mesaje de ambalaj usturoi invelite mai "
-"multe mesaje"
+msgstr "Apărare vs analiza numărului de mesaje de ambalaj usturoi invelite mai multe mesaje"
 
 #: i2p2www/pages/site/comparison/tor.html:216
 msgid ""
 "Defense vs. long term intersection by adding delays \n"
 "at various hops (where the delays are not discernible\n"
 "by other hops)"
-msgstr ""
-"Apărare vs intersecție pe termen lung prin adăugarea de întârzieri la "
-"diferite hamei (în cazul în care întârzierile nu sunt perceptibile prin "
-"alte hamei)"
+msgstr "Apărare vs intersecție pe termen lung prin adăugarea de întârzieri la diferite hamei (în cazul în care întârzierile nu sunt perceptibile prin alte hamei)"
 
 #: i2p2www/pages/site/comparison/tor.html:223
 msgid ""
@@ -922,8 +634,4 @@ msgid ""
 "create a tunnel that will handle 500 messages / minute,\n"
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
-msgstr ""
-"Diverse strategii de amestecare la nivel tunel (de exemplu, a crea un "
-"tunel care se va ocupa 500 de mesaje / minut, în cazul în care obiectivul"
-" va injecta mesaje false dacă există mesaje insuficiente, etc)"
-
+msgstr "Diverse strategii de amestecare la nivel tunel (de exemplu, a crea un tunel care se va ocupa 500 de mesaje / minut, în cazul în care obiectivul va injecta mesaje false dacă există mesaje insuficiente, etc)"
diff --git a/i2p2www/translations/ro/LC_MESSAGES/misc.po b/i2p2www/translations/ro/LC_MESSAGES/misc.po
index 6f578cfadb4086dbe55162b9c3db256a8f8e8e46..129bad42579674a05145e6d4ffb93a38b8483f26 100644
--- a/i2p2www/translations/ro/LC_MESSAGES/misc.po
+++ b/i2p2www/translations/ro/LC_MESSAGES/misc.po
@@ -1,24 +1,24 @@
-# Romanian translations for I2P.
-# Copyright (C) 2017 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # oper2 <12>, 2014
-# pol polearnik <polearnik@mail.ru>, 2014
+# polearnik <polearnik@mail.ru>, 2014
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-02-12 00:06+0000\n"
-"PO-Revision-Date: 2017-09-19 18:21+0000\n"
-"Last-Translator: pol polearnik <polearnik@mail.ru>\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: polearnik <polearnik@mail.ru>, 2014\n"
 "Language-Team: Romanian (http://www.transifex.com/otf/I2P/language/ro/)\n"
-"Plural-Forms: nplurals=3; "
-"plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1))\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ro\n"
+"Plural-Forms: nplurals=3; plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1));\n"
 
 #: i2p2www/pages/site/misc/clt.html:2
 msgid "I2P at CLT and PetCon 2009.1"
@@ -27,78 +27,39 @@ msgstr "I2P la CLT și PETCON 2009.1"
 #: i2p2www/pages/site/misc/clt.html:4
 msgid ""
 "Members of I2P will held a talk at CLT and PetCon 2009.1\n"
-"Two members of the I2P team will be at two forthcoming Linux day and "
-"security convention."
-msgstr ""
-"Membrii I2P va avea loc o discuție la CLT și PETCON 2009.1 Doi membri ai "
-"echipei de I2P vor fi la două viitoarea zi Linux și securitate convenție."
+"Two members of the I2P team will be at two forthcoming Linux day and security convention."
+msgstr "Membrii I2P va avea loc o discuție la CLT și PETCON 2009.1 Doi membri ai echipei de I2P vor fi la două viitoarea zi Linux și securitate convenție."
 
 #: i2p2www/pages/site/misc/clt.html:9
 #, python-format
 msgid ""
-"On 14th march of 2009 there will be a short talk about general "
-"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> hold by echelon.\n"
-"Echelon and some other members of the I2P family will attend to the Linux"
-" meeting the whole two days (Saturday and Sunday) and will be "
-"recognizable as I2P family members. Meet them, ask them your questions, "
-"show them your props! Show your support!"
-msgstr ""
-"Pe data de 14 martie 2009 va avea loc o scurtă discuție despre "
-"introducere generală la I2P la <a href=\"%(chemnitzer)s\"> Chemnitz Linux"
-" Eticheta de 2009 </ a> deținuta de Echelon. Echelon și alți membri ai "
-"familiei I2P vor participa la reuniunea Linux  două zile (sâmbătă și "
-"duminică) și vor fi recunoscute în calitate de membri de familie I2P. "
-"Faceti cunostinta, dați întrebări, arată-le elemente de recuzită "
-"dumneavoastră! Demonstrați-vă sprijinul!"
+"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n"
+"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!"
+msgstr "Pe data de 14 martie 2009 va avea loc o scurtă discuție despre introducere generală la I2P la <a href=\"%(chemnitzer)s\"> Chemnitz Linux Eticheta de 2009 </ a> deținuta de Echelon. Echelon și alți membri ai familiei I2P vor participa la reuniunea Linux  două zile (sâmbătă și duminică) și vor fi recunoscute în calitate de membri de familie I2P. Faceti cunostinta, dați întrebări, arată-le elemente de recuzită dumneavoastră! Demonstrați-vă sprijinul!"
 
 #: i2p2www/pages/site/misc/clt.html:14
 #, python-format
 msgid ""
-"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security "
-"convention</a> in Dresden will take place.\n"
-"Again, echelon will attend this event and hold a short talk about general"
-" introduction to I2P. Another talk about the profiling by the I2P clients"
-" will be held."
-msgstr ""
-"Doar 10 zile mai târziu va avea loc<a href=\"%(petcon)s\">  convenția de "
-"confidențialitate și securitate a datelor </ a> din Dresda . Din nou, "
-"Echelon va participa la acest eveniment și va avea loc o scurtă discuție "
-"cu privire la prezentare generală a I2P. La fel va avea loc o alta "
-"discutie despre stabilirea profilului de clienti I2P ."
+"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n"
+"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held."
+msgstr "Doar 10 zile mai târziu va avea loc<a href=\"%(petcon)s\">  convenția de confidențialitate și securitate a datelor </ a> din Dresda . Din nou, Echelon va participa la acest eveniment și va avea loc o scurtă discuție cu privire la prezentare generală a I2P. La fel va avea loc o alta discutie despre stabilirea profilului de clienti I2P ."
 
 #: i2p2www/pages/site/misc/cvs.html:4
 #, python-format
 msgid ""
-"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a"
-" <a href=\"%(monotone)s\">Monotone</a> repository.\n"
+"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n"
 "For those who aren't very familiar with CVS, there is a\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> "
-"on the\n"
-"subject (developers only need to deal with the first chapter - \"An "
-"Overview of\n"
-"CVS\", as subsequent chapters go into some nasty details very few ever "
-"need to\n"
+"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n"
+"subject (developers only need to deal with the first chapter - \"An Overview of\n"
+"CVS\", as subsequent chapters go into some nasty details very few ever need to\n"
 "touch)."
-msgstr ""
-"Cod sursă I2P a fost ținut într-un depozit CVS. In zilele noastre se "
-"păstrează într-un depozit<a href=\"%(monotone)s\"> Monotone </ a> . "
-"Pentru cei care nu sunt foarte familiarizati cu CVS, există o <a "
-"href=\"http://cvsbook.red-bean.com/cvsbook.html\">carte fantastica</ a> "
-"pe această temă (dezvoltatorii trebuie doar să faca cunostinta cu primul "
-"capitol - \"O privire de ansamblu de CVS\", așa cum capitolele următoare "
-"intra în unele detalii urâte cu foarte puțini nevoie pentru a atinge  "
-"vreodată)."
+msgstr "Cod sursă I2P a fost ținut într-un depozit CVS. In zilele noastre se păstrează într-un depozit<a href=\"%(monotone)s\"> Monotone </ a> . Pentru cei care nu sunt foarte familiarizati cu CVS, există o <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">carte fantastica</ a> pe această temă (dezvoltatorii trebuie doar să faca cunostinta cu primul capitol - \"O privire de ansamblu de CVS\", așa cum capitolele următoare intra în unele detalii urâte cu foarte puțini nevoie pentru a atinge  vreodată)."
 
 #: i2p2www/pages/site/misc/cvs.html:31
 msgid ""
-"Humorous quote from WinCVS: \"Did you know...  Never experiment with new "
-"CVS\n"
+"Humorous quote from WinCVS: \"Did you know...  Never experiment with new CVS\n"
 "commands on your working repository.  Create a sample module instead.\""
-msgstr ""
-"Citat plin de umor de la WinCVS: \"Știați că ... Niciodata experimentul "
-"cu noile comenzile CVS  pe repozitoriul dumneavoastră de lucru Crearea "
-"unui modul de probă în loc.\"."
+msgstr "Citat plin de umor de la WinCVS: \"Știați că ... Niciodata experimentul cu noile comenzile CVS  pe repozitoriul dumneavoastră de lucru Crearea unui modul de probă în loc.\"."
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4
@@ -109,13 +70,9 @@ msgstr "migrație I2PTunnel"
 msgid ""
 "After upgrading to the new architecture, you'll have to do a \n"
 "little work to get your old I2PTunnel-driven servers running.  \n"
-"Lets walk through a simple example.  For an eepsite with the \n"
+"Lets walk through a simple example.  For an I2P Site with the \n"
 "old clientApp configuration, you had:"
 msgstr ""
-"După actualizarea la noua arhitectură, veți avea de a face un pic de "
-"lucru pentru a obține  servere vechi I2PTunnel-conduse in funcționare.Vom"
-" exemplifica printr-un exemplu simplu. Pentru un eepsite cu  configurația"
-" clientApp veche, ati avut:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16
 msgid "To provide that same functionality on the new web architecture:"
@@ -131,14 +88,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\""
 msgstr "Faceți clic pe Adauga nou: [tunel Server] \"GO\""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21
-msgid "For the name: <code>\"eepsite\"</code>"
-msgstr "Pentru numele: <code> \"eepsite\" </code>"
+msgid "For the name: <code>\"I2P Site\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22
-msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>"
+msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>"
 msgstr ""
-"Pentru descrierea: <code> \"? Eepsite meu, oare nu este destul de "
-"frumos\" </ code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23
 msgid ">For the target host:"
@@ -152,10 +107,7 @@ msgstr "Pentru portul țintă:"
 msgid ""
 "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n"
 "(it is recommended to copy that .dat to your new install dir)"
-msgstr ""
-"Pentru  fișierul cheie privat:  <code>cale la \"myWebPriv.dat\" </ code> "
-"<br /> \n"
-"(este recomandat pentru a copia acest fisierul .dat la noua instalare dir)"
+msgstr "Pentru  fișierul cheie privat:  <code>cale la \"myWebPriv.dat\" </ code> <br /> \n(este recomandat pentru a copia acest fisierul .dat la noua instalare dir)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29
 msgid "Check the \"Start automatically?\" checkbox"
@@ -171,24 +123,12 @@ msgstr "Acesta va veni înapoi spunând:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39
 msgid ""
-"That's it!  Creating a new I2PTunnel server works the same way too, "
-"except you\n"
-"don't need to \"copy the old file\", obviously.  Behind the scenes, it is"
-" all driven\n"
-"by the <code>i2ptunnel.config</code> file, which you may modify "
-"externally (if you do,\n"
-"hit \"Reload config\" on the I2PTunnel web page, which will tear down all"
-" of your \n"
+"That's it!  Creating a new I2PTunnel server works the same way too, except you\n"
+"don't need to \"copy the old file\", obviously.  Behind the scenes, it is all driven\n"
+"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n"
+"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n"
 "existing tunnels and rebuild new ones)"
-msgstr ""
-"Asta este! Server nou I2PTunnel creat funcționează în același mod de "
-"asemenea, în afară de tine \n"
-"Nu este nevoie să \"copiați fișierul vechi\". În spatele scenei, totul "
-"este condus \n"
-"de <code> i2ptunnel.config </ code> , care s-ar putea modifica extern "
-"(dacă ai face, \n"
-"apasa \"Reload config\", pe pagina de web I2PTunnel, care va dărâma toate"
-" dvs. tuneluri existente și reconstrui noi)"
+msgstr "Asta este! Server nou I2PTunnel creat funcționează în același mod de asemenea, în afară de tine \nNu este nevoie să \"copiați fișierul vechi\". În spatele scenei, totul este condus \nde <code> i2ptunnel.config </ code> , care s-ar putea modifica extern (dacă ai face, \napasa \"Reload config\", pe pagina de web I2PTunnel, care va dărâma toate dvs. tuneluri existente și reconstrui noi)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47
 msgid ""
@@ -197,21 +137,15 @@ msgid ""
 "interface.  It will say \"Please be patient\" if you try to \n"
 "beforehand, which means that it is still trying to build the \n"
 "necessary I2PTunnel sessions it has been configured to create."
-msgstr ""
-"Rețineți că va trebui să așteptați până când router-ul va fi integrat \n"
-"în rețea înainte de a fi capabili de a utiliza / i2ptunnel / web \n"
-"interfață. Se va spune \"Vă rugăm să așteptați\", dacă încercați  \n"
-"în prealabil, ceea ce înseamnă că acesta este încă in stare de construire"
-" \n"
-"sesiuni de I2PTunnel necesare acesta ce a fost configurat pentru a crea."
+msgstr "Rețineți că va trebui să așteptați până când router-ul va fi integrat \nîn rețea înainte de a fi capabili de a utiliza / i2ptunnel / web \ninterfață. Se va spune \"Vă rugăm să așteptați\", dacă încercați  \nîn prealabil, ceea ce înseamnă că acesta este încă in stare de construire \nsesiuni de I2PTunnel necesare acesta ce a fost configurat pentru a crea."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:2
 msgid "I2PTunnel services"
 msgstr "servicii I2PTunnel"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:4
-msgid "Below is quick copy of aum's eepsite deployment guide."
-msgstr "Mai jos este copia rapida de eepsite ghid de implementare Aum lui."
+msgid "Below is quick copy of aum's I2P Site deployment guide."
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:8
 msgid "1. - Deploy a local server"
@@ -222,70 +156,48 @@ msgid ""
 "For simplicity's sake, we will walk through the setup of a web server; "
 "however, this procedure is the same regardless what protocol of servers "
 "and/or clients you are setting up."
-msgstr ""
-"Pentru simplitate, vom merge prin configurarea unui server web, cu toate "
-"acestea, această procedură este aceeași, indiferent ce protocol de "
-"servere și / sau clienți pe care îl configurați."
+msgstr "Pentru simplitate, vom merge prin configurarea unui server web, cu toate acestea, această procedură este aceeași, indiferent ce protocol de servere și / sau clienți pe care îl configurați."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:13
 msgid ""
-"I recommend the Tiny Httpd web server, thttpd, (windows version available"
-" on site) although you can use anything that you feel comfortable with."
-msgstr ""
-"Vom recomanda serverul Httpd Tiny web, thttpd, (versiunea disponibilă "
-"pentru windows pe site-ul ), deși se poate utiliza orice cu care sa te "
-"simti confortabil cu."
+"I recommend the Tiny Httpd web server, thttpd, (windows version available on"
+" site) although you can use anything that you feel comfortable with."
+msgstr "Vom recomanda serverul Httpd Tiny web, thttpd, (versiunea disponibilă pentru windows pe site-ul ), deși se poate utiliza orice cu care sa te simti confortabil cu."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:16
 msgid ""
 "Another more robust option would be to use EasyPHP, which is also open "
 "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For "
-"newbies who have no experience setting up and hosting content over "
-"servers, see the hosting page for help."
-msgstr ""
-"O altă opțiune mai robusta ar fi de a folosi EasyPHP, care este, de "
-"asemenea, open source. Acesta este dotat cu PHP, phpMyAdmin, MySQL, și "
-"server web Apache. Pentru începători care nu au experiență configurarea "
-"și găzduire conținutului pe servere, consultați pagina de hosting pentru "
-"ajutor."
+"newbies who have no experience setting up and hosting content over servers, "
+"see the hosting page for help."
+msgstr "O altă opțiune mai robusta ar fi de a folosi EasyPHP, care este, de asemenea, open source. Acesta este dotat cu PHP, phpMyAdmin, MySQL, și server web Apache. Pentru începători care nu au experiență configurarea și găzduire conținutului pe servere, consultați pagina de hosting pentru ajutor."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:19
 msgid ""
-"With the web server you've chosen, configure it to listen on a port of "
-"your choice, and serve its documents from a directory of your choice. For"
-" this example, we'll assume port 10880."
-msgstr ""
-"Cu serverul web pe care l-ați ales, configurați-l pentru a asculta un "
-"port la alegere, și a servi documentele sale de la un director la "
-"alegerea ta. Pentru acest exemplu, vom presupune 10880 port."
+"With the web server you've chosen, configure it to listen on a port of your "
+"choice, and serve its documents from a directory of your choice. For this "
+"example, we'll assume port 10880."
+msgstr "Cu serverul web pe care l-ați ales, configurați-l pentru a asculta un port la alegere, și a servi documentele sale de la un director la alegerea ta. Pentru acest exemplu, vom presupune 10880 port."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:22
 msgid ""
 "Make sure your firewall is set up so that you cannot receive incoming "
 "connections on this port (which would breach your anonymity)."
-msgstr ""
-"Asigurați-vă că firewall-ul este configurat astfel încât să nu poate "
-"primi conexiuni de intrare la acest port (care ar încălca anonimatul)."
+msgstr "Asigurați-vă că firewall-ul este configurat astfel încât să nu poate primi conexiuni de intrare la acest port (care ar încălca anonimatul)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:25
 msgid ""
 "Test the webserver, by pointing your normal browser (the one with the "
 "\"direct connection\") at <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the "
-"port number you have chosen)."
-msgstr ""
-"Testați serverul de web, arătând browser-ul dvs. normal (cel cu "
-"\"legătura directă\") la <a href=\"http://localhost:10880\" "
-"target=\"_blank\"> http://localhost:10880 </ a> (schimbati 10880 de "
-"numărul de port ce l-ați ales)."
+"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port"
+" number you have chosen)."
+msgstr "Testați serverul de web, arătând browser-ul dvs. normal (cel cu \"legătura directă\") la <a href=\"http://localhost:10880\" target=\"_blank\"> http://localhost:10880 </ a> (schimbati 10880 de numărul de port ce l-ați ales)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:28
 msgid ""
 "Once your webserver is working, and you can access it locally with your "
 "browser, continue to the next step."
-msgstr ""
-"Odată ce serverul dvs. lucreaza, și îl puteți accesa la nivel local cu "
-"browser-ul dvs., continuați cu pasul următor."
+msgstr "Odată ce serverul dvs. lucreaza, și îl puteți accesa la nivel local cu browser-ul dvs., continuați cu pasul următor."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:33
 msgid "2 - Generate an I2P Destination Keypair"
@@ -293,45 +205,29 @@ msgstr "2 - generează o destinație pereche de chei I2P"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:35
 msgid ""
-"I2P does not deal in IP addresses. To protect your anonymity, it deals in"
-" unique addresses called destination keys."
-msgstr ""
-"I2P nu ocupă adrese IP. Pentru a proteja anonimatul, se ocupă adrese "
-"unice numite chei de destinație."
+"I2P does not deal in IP addresses. To protect your anonymity, it deals in "
+"unique addresses called destination keys."
+msgstr "I2P nu ocupă adrese IP. Pentru a proteja anonimatul, se ocupă adrese unice numite chei de destinație."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:38
 msgid ""
 "A destination key works a lot like a regular IP address, except that it "
-"can't be traced to your IP address or physical location. When users place"
-" a request to speak with you, your gateways are the ones that answer for "
-"you. So the requesting user can only know the IP address of your "
-"gateways. However, gateways don't know your IP address, because gateways "
-"are the last nodes on your tunnels, and you anonymously create tunnels by"
-" way of garlic routing. (So gateways are like puppets that can't see "
-"their masters, and everyone communicates through these puppets)"
-msgstr ""
-"O cheie destinație funcționează  ca o adresă IP obișnuită, cu excepția "
-"faptului că nu pot fi urmărite dupa adresa IP sau locație fizică. Când "
-"utilizatorii plaseaza o cerere de a vorbi cu tine, gateway-urile sunt "
-"cele care răspund pentru tine. Astfel încât utilizatorul solicitant poate"
-" cunoaște doar adresa IP a gateway-urile. Cu toate acestea, gateway-uri "
-"nu știu adresa IP dvs. , deoarece gateway-uri sunt ultimele nodurile de "
-"pe tuneluri, și creați anonim tuneluri de cale de usturoi de rutare. "
-"(Deci, gateway-uri sunt ca marionete care nu pot vedea stăpânii lor, și "
-"toată lumea comunică prin intermediul acestor marionete)"
+"can't be traced to your IP address or physical location. When users place a "
+"request to speak with you, your gateways are the ones that answer for you. "
+"So the requesting user can only know the IP address of your gateways. "
+"However, gateways don't know your IP address, because gateways are the last "
+"nodes on your tunnels, and you anonymously create tunnels by way of garlic "
+"routing. (So gateways are like puppets that can't see their masters, and "
+"everyone communicates through these puppets)"
+msgstr "O cheie destinație funcționează  ca o adresă IP obișnuită, cu excepția faptului că nu pot fi urmărite dupa adresa IP sau locație fizică. Când utilizatorii plaseaza o cerere de a vorbi cu tine, gateway-urile sunt cele care răspund pentru tine. Astfel încât utilizatorul solicitant poate cunoaște doar adresa IP a gateway-urile. Cu toate acestea, gateway-uri nu știu adresa IP dvs. , deoarece gateway-uri sunt ultimele nodurile de pe tuneluri, și creați anonim tuneluri de cale de usturoi de rutare. (Deci, gateway-uri sunt ca marionete care nu pot vedea stăpânii lor, și toată lumea comunică prin intermediul acestor marionete)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:41
 msgid ""
 "To deploy a server on I2P, you create a destination keypair. You use the "
-"private key to authenticate your server when connecting it to I2P, and "
-"you make the public key (aka destination key) known publicly, so others "
-"can connect to your server. (indirectly, through your gateways)"
-msgstr ""
-"Pentru a implementa un server de pe I2P, creați o keypair destinație. "
-"Puteți utiliza cheia privată pentru a autentifica server-ul dvs. atunci "
-"când se conecteaza la I2P, și să vă facă cheia publică (aka cheie "
-"destinație), cunoscut în mod public, astfel încât alții se poate conecta "
-"la server. (indirect, prin intermediul gateway-urile)\\"
+"private key to authenticate your server when connecting it to I2P, and you "
+"make the public key (aka destination key) known publicly, so others can "
+"connect to your server. (indirectly, through your gateways)"
+msgstr "Pentru a implementa un server de pe I2P, creați o keypair destinație. Puteți utiliza cheia privată pentru a autentifica server-ul dvs. atunci când se conecteaza la I2P, și să vă facă cheia publică (aka cheie destinație), cunoscut în mod public, astfel încât alții se poate conecta la server. (indirect, prin intermediul gateway-urile)\\"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:44
 msgid "Each service you run on I2P requires a different keypair."
@@ -342,77 +238,52 @@ msgid ""
 "To generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code> (all on one line)"
-msgstr ""
-"Pentru a genera keypair dvs., tastați comanda: <code> java-jar "
-"lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </"
-" code> (tot pe o singură linie)"
+msgstr "Pentru a genera keypair dvs., tastați comanda: <code> java-jar lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </ code> (tot pe o singură linie)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:50
 msgid ""
 "In windows, to generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code>"
-msgstr ""
-"Pentru a genera keypair dvs., tastați comanda: <code> java-jar "
-"lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </"
-" code>"
+msgstr "Pentru a genera keypair dvs., tastați comanda: <code> java-jar lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </ code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:53
 msgid ""
-"The filenames <code>myWebPrivKey.dat</code> and "
-"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want "
-"here, as long as you understand your own choices."
-msgstr ""
-"Nume de fișiere <code> myWebPrivKey.dat </ code> și <code> "
-"myWebPubKey.dat </ code> sunt arbitrare - alege ce vrei aici, atâta timp "
-"cât ați înțeles propriile alegeri."
+"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>"
+" are arbitrary - choose whatever you want here, as long as you understand "
+"your own choices."
+msgstr "Nume de fișiere <code> myWebPrivKey.dat </ code> și <code> myWebPubKey.dat </ code> sunt arbitrare - alege ce vrei aici, atâta timp cât ați înțeles propriile alegeri."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:56
 msgid ""
 "We now need to export your public key into base64 format, which you will "
 "share with others."
-msgstr ""
-"Avem acum nevoie pentru a exporta cheia dvs. publică în format base64, "
-"care vă vor împărtăși cu alții."
+msgstr "Avem acum nevoie pentru a exporta cheia dvs. publică în format base64, care vă vor împărtăși cu alții."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:59
 msgid ""
-"To convert your myWebPubKey.dat file into shareable base64, type the "
-"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (all on one line)."
-msgstr ""
-"Pentru a converti fișierul myWebPubKey.dat în base64 partajabile, tastați"
-" <code> comanda java-cp lib/i2p.jar net.i2p.data.Base64 codifica "
-"myWebPubKey.dat> myWebPubKey.txt </ code> (tot pe o linie )."
+"To convert your myWebPubKey.dat file into shareable base64, type the command"
+" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; "
+"myWebPubKey.txt</code> (all on one line)."
+msgstr "Pentru a converti fișierul myWebPubKey.dat în base64 partajabile, tastați <code> comanda java-cp lib/i2p.jar net.i2p.data.Base64 codifica myWebPubKey.dat> myWebPubKey.txt </ code> (tot pe o linie )."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:62
 msgid ""
-"This file you have just generated, <code>myWebPubKey.txt</code>, contains"
-" a long base64 string (516 chars at last count), which we call a "
-"destination key. All you need to know about this string for now is that "
-"it allows remote clients to uniquely pinpoint and connect to your server,"
-" just the same way as an IP address allows remote machines to pinpoint "
-"and connect to your machine."
-msgstr ""
-"Acest fișier pe care tocmai ați generat, <code> myWebPubKey.txt </ code>,"
-" conține un șir de base64 lung (516 de caractere de la ultima "
-"numaratoare), pe care o numim o cheie destinație. Tot ce trebuie să știți"
-" despre acest șir de acum este că permite clienților de la distanță "
-"pentru a indica în mod unic și conecta la server-ul dvs., chiar în "
-"același mod ca și o adresă IP permite mașini la distanță să identifice și"
-" să se conecteze la mașina dumneavoastră."
+"This file you have just generated, <code>myWebPubKey.txt</code>, contains a "
+"long base64 string (516 chars at last count), which we call a destination "
+"key. All you need to know about this string for now is that it allows remote"
+" clients to uniquely pinpoint and connect to your server, just the same way "
+"as an IP address allows remote machines to pinpoint and connect to your "
+"machine."
+msgstr "Acest fișier pe care tocmai ați generat, <code> myWebPubKey.txt </ code>, conține un șir de base64 lung (516 de caractere de la ultima numaratoare), pe care o numim o cheie destinație. Tot ce trebuie să știți despre acest șir de acum este că permite clienților de la distanță pentru a indica în mod unic și conecta la server-ul dvs., chiar în același mod ca și o adresă IP permite mașini la distanță să identifice și să se conecteze la mașina dumneavoastră."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:65
 msgid ""
 "However, in contrast to an IP address, there is no way to trace your "
-"machine's physical location - even though your server can be addressed "
-"via I2P, your IP address cannot be traced or associated with this "
-"destination key."
-msgstr ""
-"Cu toate acestea, spre deosebire de o adresă IP, nu există nici o "
-"modalitate de a urmări locația fizică a aparatului dumneavoastră - chiar "
-"dacă server-ul dvs. pot fi abordate prin intermediul I2P, adresa IP nu "
-"pot fi urmărite sau asociate cu această cheie destinație."
+"machine's physical location - even though your server can be addressed via "
+"I2P, your IP address cannot be traced or associated with this destination "
+"key."
+msgstr "Cu toate acestea, spre deosebire de o adresă IP, nu există nici o modalitate de a urmări locația fizică a aparatului dumneavoastră - chiar dacă server-ul dvs. pot fi abordate prin intermediul I2P, adresa IP nu pot fi urmărite sau asociate cu această cheie destinație."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:70
 msgid "3 - Open a 'Tunnel' from I2P To Your Server"
@@ -420,52 +291,37 @@ msgstr "3 - Deschide un \"tunel\" de la I2P la server"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:72
 msgid ""
-"For clients elsewhere in I2P to be able to access your server, you must "
-"run a 'bridge' or 'tunnel', which takes connections from these clients "
-"and forwards them to your local server."
-msgstr ""
-"Pentru clienții din alte părți I2P a putea accesa server-ul dvs., trebuie"
-" să executați o \"punte\" sau \"tunel\", care are legături de la acești "
-"clienți și le transmite la server-ul local."
+"For clients elsewhere in I2P to be able to access your server, you must run "
+"a 'bridge' or 'tunnel', which takes connections from these clients and "
+"forwards them to your local server."
+msgstr "Pentru clienții din alte părți I2P a putea accesa server-ul dvs., trebuie să executați o \"punte\" sau \"tunel\", care are legături de la acești clienți și le transmite la server-ul local."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:75
 msgid ""
 "To activate such a tunnel, type the command <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code> (all one line)."
-msgstr ""
-"Pentru a genera keypair dvs., tastați comanda: <code> java-jar "
-"lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </"
-" code> (tot pe o singură linie)"
+msgstr "Pentru a genera keypair dvs., tastați comanda: <code> java-jar lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </ code> (tot pe o singură linie)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:78
 msgid ""
 "If you used different filenames or port number earlier on, change these "
 "accordingly"
-msgstr ""
-"Dacă ați utilizat diferite nume de fișiere sau număre de port mai "
-"devreme, schimba aceste în consecință"
+msgstr "Dacă ați utilizat diferite nume de fișiere sau număre de port mai devreme, schimba aceste în consecință"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:81
 msgid ""
 "Windows users, remember to replace apostrophes with double quotes. Thus: "
 "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code>"
-msgstr ""
-"Utilizatorii de Windows, tineti minte  sa înlocuiti apostroful cu "
-"ghilimele duble. Astfel: <code> java-jar lib/i2ptunnel.jar-nogui-e "
-"\"localhost server de 10880 myWebPrivKey.dat\" </ code>"
+msgstr "Utilizatorii de Windows, tineti minte  sa înlocuiti apostroful cu ghilimele duble. Astfel: <code> java-jar lib/i2ptunnel.jar-nogui-e \"localhost server de 10880 myWebPrivKey.dat\" </ code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:84
 msgid ""
-"Within a few seconds, the 'tunnel' should now be active, and remote "
-"clients should be able to reach your server anonymously. Remember to let "
-"your router \"warm up\" before opening clients to it."
-msgstr ""
-"În câteva secunde, \"tunelul\" ar trebui să fie acum activ, și clienți la"
-" distanță ar trebui să ajungă la server-ul dvs. în mod anonim. "
-"Amintiți-vă pentru a permite router-ul \"sa se incalzeasca\" înainte de a"
-" deschide pentru clienți ."
+"Within a few seconds, the 'tunnel' should now be active, and remote clients "
+"should be able to reach your server anonymously. Remember to let your router"
+" \"warm up\" before opening clients to it."
+msgstr "În câteva secunde, \"tunelul\" ar trebui să fie acum activ, și clienți la distanță ar trebui să ajungă la server-ul dvs. în mod anonim. Amintiți-vă pentru a permite router-ul \"sa se incalzeasca\" înainte de a deschide pentru clienți ."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:89
 msgid "4 - Update Your hosts.txt File "
@@ -477,31 +333,21 @@ msgid ""
 "hosts.txt file, so I2P can translate the simple URL you place in the "
 "browser's address bar into the full public key text needed to find your "
 "server."
-msgstr ""
-"Pentru a testa un server propriu la nivel local, va trebui să creați o "
-"intrare în fișierul hosts.txt, astfel încât I2P poate traduce URL-ul "
-"simplu plasați în bara de adresa a browser-ului  cheie publică necesara "
-"pentru a găsi server."
+msgstr "Pentru a testa un server propriu la nivel local, va trebui să creați o intrare în fișierul hosts.txt, astfel încât I2P poate traduce URL-ul simplu plasați în bara de adresa a browser-ului  cheie publică necesara pentru a găsi server."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:94
 msgid ""
 "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where "
-"myserver.i2p is an I2P 'domain' you want to associate with your site, and"
-" the blahblahblah is the text of the base64 public key you created "
-"earlier in the file myWebPubKey.txt"
-msgstr ""
-"Editati hosts.txt dvs., și adăugați linia myserver.i2p = blahblahblah, "
-"unde myserver.i2p este un \"domeniu\" I2P doriți să se asocieze cu site-"
-"ul dvs., și blahblahblah este textul cheii publice base64 ce l-ați creat "
-"mai devreme în fișier myWebPubKey.txt"
+"myserver.i2p is an I2P 'domain' you want to associate with your site, and "
+"the blahblahblah is the text of the base64 public key you created earlier in"
+" the file myWebPubKey.txt"
+msgstr "Editati hosts.txt dvs., și adăugați linia myserver.i2p = blahblahblah, unde myserver.i2p este un \"domeniu\" I2P doriți să se asocieze cu site-ul dvs., și blahblahblah este textul cheii publice base64 ce l-ați creat mai devreme în fișier myWebPubKey.txt"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:97
 msgid ""
 "With this in place, you and others can reach your server with the simple "
 "domain name myserver.i2p in the browser's address bar."
-msgstr ""
-"ÃŽn acest loc, dvs. si altii pot ajunge la server-ul dvs. cu un simplu "
-"nume de domeniu myserver.i2p  în bara de adrese a browser-ului."
+msgstr "În acest loc, dvs. si altii pot ajunge la server-ul dvs. cu un simplu nume de domeniu myserver.i2p  în bara de adrese a browser-ului."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:102
 msgid "5 - Surf Your Site Within I2P"
@@ -512,11 +358,7 @@ msgid ""
 "Using your secondary browser - the one you earlier configured to use "
 "localhost:4444 as a proxy - point this browser to the address <a "
 "href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>"
-msgstr ""
-"Folosind browser-ul secundar - configurat mai devreme pentru a utiliza "
-"localhost: 4444 ca un proxy - punct acest browser pentru a adresa <a "
-"href=\"http://myserver.i2p\" target=\"_blank\"> http://myserver. I2P </ "
-"a>"
+msgstr "Folosind browser-ul secundar - configurat mai devreme pentru a utiliza localhost: 4444 ca un proxy - punct acest browser pentru a adresa <a href=\"http://myserver.i2p\" target=\"_blank\"> http://myserver. I2P </ a>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:107
 msgid "You should see the main page of your webserver come up."
@@ -532,62 +374,43 @@ msgstr "Avem acum să se gândească dincolo de doar servere de web."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:117
 msgid ""
-"As you grow into I2P and get more of a 'feel' for it, you will want to "
-"use all manner of servers and clients."
-msgstr ""
-"Pe măsură ce creste integritate în I2P  și a obține mai mult de un "
-"\"simt\" pentru el, veți dori să folositi tot felul de servere si "
-"clienti."
+"As you grow into I2P and get more of a 'feel' for it, you will want to use "
+"all manner of servers and clients."
+msgstr "Pe măsură ce creste integritate în I2P  și a obține mai mult de un \"simt\" pentru el, veți dori să folositi tot felul de servere si clienti."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:120
 msgid ""
-"The beauty of I2P is that it allows standard Internet clients and servers"
-" for most protocols to be transparently 'tunneled' through the anonymous "
+"The beauty of I2P is that it allows standard Internet clients and servers "
+"for most protocols to be transparently 'tunneled' through the anonymous "
 "network."
-msgstr ""
-"Frumusețea I2P este că permite clienților de internet standard și servere"
-" pentru cele mai multe protocoale să fie transparent \"tunel\" prin "
-"intermediul rețelei anonim."
+msgstr "Frumusețea I2P este că permite clienților de internet standard și servere pentru cele mai multe protocoale să fie transparent \"tunel\" prin intermediul rețelei anonim."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:123
 msgid ""
-"You can run mailservers/clients, nameservers/clients, newsservers/clients"
-" - almost anything at all - perhaps even FTP in passive mode."
-msgstr ""
-"Puteți rula de servere mail / clienti, servere de nume / clienti, servere"
-" de noutati / clienti - aproape orice, la toate - poate chiar FTP în "
-"modul pasiv."
+"You can run mailservers/clients, nameservers/clients, newsservers/clients - "
+"almost anything at all - perhaps even FTP in passive mode."
+msgstr "Puteți rula de servere mail / clienti, servere de nume / clienti, servere de noutati / clienti - aproape orice, la toate - poate chiar FTP în modul pasiv."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:126
 msgid ""
-"Now, we'll create a client tunnel. This is like the server tunnel we "
-"created earlier, but works in reverse. It listens to a port on your local"
-" machine; your local client connects to this port; the connection gets "
-"forwarded through I2P to the service on the other end."
-msgstr ""
-"Acum, vom crea un tunel client. Acest lucru este ca tunelul de server pe "
-"care l-am creat mai devreme, dar funcționează în sens invers. Se ascultă "
-"la un port de pe computerul local, clientul dvs. local se conectează la "
-"acest port, conexiunea este transmisă prin I2P la serviciul de la "
-"celălalt capăt."
+"Now, we'll create a client tunnel. This is like the server tunnel we created"
+" earlier, but works in reverse. It listens to a port on your local machine; "
+"your local client connects to this port; the connection gets forwarded "
+"through I2P to the service on the other end."
+msgstr "Acum, vom crea un tunel client. Acest lucru este ca tunelul de server pe care l-am creat mai devreme, dar funcționează în sens invers. Se ascultă la un port de pe computerul local, clientul dvs. local se conectează la acest port, conexiunea este transmisă prin I2P la serviciul de la celălalt capăt."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:129
 msgid ""
-"To open your client tunnel for your server, type the command <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (all one line)."
-msgstr ""
-"Pentru a deschide tunelul client pentru server-ul dvs., tastați comanda "
-"<code> java-jar lib/i2ptunnel.jar-nogui-e \"config localhost 7654\"-e "
-"\"client 10888 textofbase64key\" </ code> (tot intr-o singură linie)."
+"To open your client tunnel for your server, type the command <code>java -jar"
+" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 "
+"textofbase64key\"</code> (all one line)."
+msgstr "Pentru a deschide tunelul client pentru server-ul dvs., tastați comanda <code> java-jar lib/i2ptunnel.jar-nogui-e \"config localhost 7654\"-e \"client 10888 textofbase64key\" </ code> (tot intr-o singură linie)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:132
 msgid ""
-"The port 10888 is arbitrary - it just needs to be something other than "
-"the physical port your server is listening on."
-msgstr ""
-"Port 10888 este arbitrar - trebuie doar să fie altceva decât portul fizic"
-" pe care il asculta server-ul dvs.."
+"The port 10888 is arbitrary - it just needs to be something other than the "
+"physical port your server is listening on."
+msgstr "Port 10888 este arbitrar - trebuie doar să fie altceva decât portul fizic pe care il asculta server-ul dvs.."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:135
 msgid ""
@@ -595,53 +418,34 @@ msgid ""
 "myWebPubKey.txt, reproduced fully on one line (alternately, instead of "
 "textofbase64key, you can specify the name from your hosts.txt - e.g. "
 "myserver.i2p)"
-msgstr ""
-"textofbase64key este pur și simplu conținutul fișier cheie public  "
-"myWebPubKey.txt, scrisa pe o singură linie (alternativ, în loc de "
-"textofbase64key, puteți specifica numele de hosts.txt dvs. - de exemplu "
-"myserver.i2p)"
+msgstr "textofbase64key este pur și simplu conținutul fișier cheie public  myWebPubKey.txt, scrisa pe o singură linie (alternativ, în loc de textofbase64key, puteți specifica numele de hosts.txt dvs. - de exemplu myserver.i2p)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:138
 msgid ""
 "Within a minute or two of launching this command, the client tunnel from "
 "your local machine into I2P will be open and ready for use."
-msgstr ""
-"Într-un minut sau două dupa lansarea acestei comenzi, tunelul de client "
-"de la computerul local în I2P va fi deschis și gata de utilizare."
+msgstr "Într-un minut sau două dupa lansarea acestei comenzi, tunelul de client de la computerul local în I2P va fi deschis și gata de utilizare."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:141
 msgid ""
 "Point your regular web browser (ie, not the one you configured to use "
 "localhost:4444), and point it to <a href=\"http://localhost:10888\" "
 "target=\"_blank\">http://localhost:10888</a>"
-msgstr ""
-"Punctul de browser-ul web regulat (de exemplu, nu cel pe care l-ati "
-"configurat pentru a utiliza localhost: 4444), și punctul în care să <a "
-"href=\"http://localhost:10888\" target=\"_blank\"> http://localhost:10888"
-" </ a>"
+msgstr "Punctul de browser-ul web regulat (de exemplu, nu cel pe care l-ati configurat pentru a utiliza localhost: 4444), și punctul în care să <a href=\"http://localhost:10888\" target=\"_blank\"> http://localhost:10888 </ a>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:144
 msgid ""
 "Verify that the main page of your server eventually comes up in your "
 "browser."
-msgstr ""
-"Asigurați-vă că pagina principală a serverului dvs. în cele din urmă vine"
-" în browser-ul dumneavoastră."
+msgstr "Asigurați-vă că pagina principală a serverului dvs. în cele din urmă vine în browser-ul dumneavoastră."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:147
 msgid ""
-"You use the same procedure for using any local client program to access a"
-" remote I2P server - just get the base64 public key (called destination "
-"key) of the remote server, choose a local port to connect to the remote "
-"server, open the tunnel, and just connect with your client to your "
-"heart's content."
-msgstr ""
-"Puteți utiliza aceeași procedură pentru folosirea orice programului "
-"client local, pentru a accesa un server de la distanță I2P - ajunge doar "
-"cheia publică base64 (denumit cheie destinație) din serverul de la "
-"distanță, alegeți un port local pentru a se conecta la serverul de la "
-"distanță, deschideți tunel, și doar conecta cu clientul dvs. pentru inima"
-" ta de conținut."
+"You use the same procedure for using any local client program to access a "
+"remote I2P server - just get the base64 public key (called destination key) "
+"of the remote server, choose a local port to connect to the remote server, "
+"open the tunnel, and just connect with your client to your heart's content."
+msgstr "Puteți utiliza aceeași procedură pentru folosirea orice programului client local, pentru a accesa un server de la distanță I2P - ajunge doar cheia publică base64 (denumit cheie destinație) din serverul de la distanță, alegeți un port local pentru a se conecta la serverul de la distanță, deschideți tunel, și doar conecta cu clientul dvs. pentru inima ta de conținut."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:152
 msgid "7 - Share your server details with others"
@@ -651,45 +455,26 @@ msgstr "7 - Împărtășiți detaliile de server cu alții"
 msgid ""
 "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's "
 "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. "
-"Others will then be able to reach your server remotely, without either of"
-" you jeopardizing your anonymity."
-msgstr ""
-"Folosind un mediu anonim (de exemplu, unul dintre serverele IRC I2P sau "
-"wiki ugha), posta numele dvs. de domeniu (de exemplu, <a "
-"href=\"http://www.mynick.i2p\"  target=\"_blank\"> www.mynick.i2p</ a>, "
-"precum și cheia destinație. Alții vor putea apoi să ajungă la server-ul "
-"dvs. de la distanță, fără ca nici unul dintre va pune în pericol "
-"anonimatul."
+"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others"
+" will then be able to reach your server remotely, without either of you "
+"jeopardizing your anonymity."
+msgstr "Folosind un mediu anonim (de exemplu, unul dintre serverele IRC I2P sau wiki ugha), posta numele dvs. de domeniu (de exemplu, <a href=\"http://www.mynick.i2p\"  target=\"_blank\"> www.mynick.i2p</ a>, precum și cheia destinație. Alții vor putea apoi să ajungă la server-ul dvs. de la distanță, fără ca nici unul dintre va pune în pericol anonimatul."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:157
 msgid ""
-"Remember, you can go to What's on I2P and find the latest public keys "
-"linked to their URL. You should also post your own public key and URL "
-"their. However, you will want to do this anonymously, of course. "
-"Drupal.i2p.net is currently, as of this writing, only accessible from the"
-" net. So, to access the outside WWW anonymously from inside of I2P, you "
-"will need to start up your script called startSquid. Do it the same way "
-"you have been doing these other scripts. Reconfigure your browser to "
-"proxy on localhost:5555, as defined in the script, and when the script "
-"has generated it's keys, you can access the squid proxy. Put any WWW URL "
-"(such as Google or this i2p site) into your browser's address bar and you"
-" will be surfing the World Wide Web anonymously. Now you can safely post "
-"your public key, and no one can detect your IP address."
-msgstr ""
-"Retineti, poti sa te duci la ceea ce este pe I2P și pentru a găsi cele "
-"mai recente cheile publice legate de URL-ul lor. Tu ar trebui să postezi,"
-" de asemenea, cheie publică proprie și URL-ul lor. Cu toate acestea, veți"
-" dori să faceți acest lucru anonim, desigur. Drupal.i2p.net este în "
-"prezent, scris, accesibil numai de pe net. Deci, pentru a accesa WWW "
-"exterior anonim din interiorul I2P, veți avea nevoie pentru a porni "
-"script-ul numit startSquid. Fă-o la fel cum au făcut alte script-uri. "
-"Reconfigurati browser-ul dvs. să proxezi pe localhost: 5555, astfel cum "
-"sunt definite în script, iar în cazul în care script-ul a generat cheile,"
-" puteți accesa proxy squid. Pune orice URL-ul WWW (cum ar fi Google sau "
-"site-ul I2P) în bara de adrese a browser-ului dvs. și veti avea navigarea"
-" pe World Wide Web anonim. Acum puteți posta în siguranță cheia dvs. "
-"publică, și nimeni nu poate detecta adresa IP."
+"Remember, you can go to What's on I2P and find the latest public keys linked"
+" to their URL. You should also post your own public key and URL their. "
+"However, you will want to do this anonymously, of course. Drupal.i2p.net is "
+"currently, as of this writing, only accessible from the net. So, to access "
+"the outside WWW anonymously from inside of I2P, you will need to start up "
+"your script called startSquid. Do it the same way you have been doing these "
+"other scripts. Reconfigure your browser to proxy on localhost:5555, as "
+"defined in the script, and when the script has generated it's keys, you can "
+"access the squid proxy. Put any WWW URL (such as Google or this i2p site) "
+"into your browser's address bar and you will be surfing the World Wide Web "
+"anonymously. Now you can safely post your public key, and no one can detect "
+"your IP address."
+msgstr "Retineti, poti sa te duci la ceea ce este pe I2P și pentru a găsi cele mai recente cheile publice legate de URL-ul lor. Tu ar trebui să postezi, de asemenea, cheie publică proprie și URL-ul lor. Cu toate acestea, veți dori să faceți acest lucru anonim, desigur. Drupal.i2p.net este în prezent, scris, accesibil numai de pe net. Deci, pentru a accesa WWW exterior anonim din interiorul I2P, veți avea nevoie pentru a porni script-ul numit startSquid. Fă-o la fel cum au făcut alte script-uri. Reconfigurati browser-ul dvs. să proxezi pe localhost: 5555, astfel cum sunt definite în script, iar în cazul în care script-ul a generat cheile, puteți accesa proxy squid. Pune orice URL-ul WWW (cum ar fi Google sau site-ul I2P) în bara de adrese a browser-ului dvs. și veti avea navigarea pe World Wide Web anonim. Acum puteți posta în siguranță cheia dvs. publică, și nimeni nu poate detecta adresa IP."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:162
 msgid "8 - Write Some Scripts To Handle All This Menial Nonsense"
@@ -697,12 +482,9 @@ msgstr "8 - scrie unele script-uri să se ocupe de toate aceste prostii dezonora
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:164
 msgid ""
-"It would drive most people crazy, going through all these steps every "
-"time one sets up an I2P server, and/or deploys a client."
-msgstr ""
-"Aceasta ar conduce majoritatea oamenilor nebun, trecând prin toate aceste"
-" etape de fiecare dată când unul stabilește un server I2P, și / sau "
-"implementează un client."
+"It would drive most people crazy, going through all these steps every time "
+"one sets up an I2P server, and/or deploys a client."
+msgstr "Aceasta ar conduce majoritatea oamenilor nebun, trecând prin toate aceste etape de fiecare dată când unul stabilește un server I2P, și / sau implementează un client."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:167
 msgid ""
@@ -710,47 +492,29 @@ msgid ""
 "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called "
 "setupServer.py which automates all this nonsense into one simple command "
 "line . But I respect that people's tastes in user interfaces differ, and "
-"trying to write something which satisfies everyone's needs usually "
-"results in something so complex that it turns into newbie-repellent."
-msgstr ""
-"Aum site-ul <a href=\"http://www.freenet.org.nz/i2p/\"  "
-"target=\"_blank\"> http://www.freenet.org.nz/i2p/ </ a> are un script "
-"numit setupServer.py care automatizează toate prostiile astea într-o "
-"singură linie de comandă simplă. Dar eu respect  gusturile oamenilor în "
-"interfețe de utilizator diferite, și încercarea de a scrie ceva care "
-"satisface nevoile tuturor, de obicei, duce la ceva atât de complex, care "
-"se transformă în ceva teribil."
+"trying to write something which satisfies everyone's needs usually results "
+"in something so complex that it turns into newbie-repellent."
+msgstr "Aum site-ul <a href=\"http://www.freenet.org.nz/i2p/\"  target=\"_blank\"> http://www.freenet.org.nz/i2p/ </ a> are un script numit setupServer.py care automatizează toate prostiile astea într-o singură linie de comandă simplă. Dar eu respect  gusturile oamenilor în interfețe de utilizator diferite, și încercarea de a scrie ceva care satisface nevoile tuturor, de obicei, duce la ceva atât de complex, care se transformă în ceva teribil."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:170
 msgid ""
 "So please feel free to use and/or customize setupServer.py to taste, or "
 "write your own in Python or another language."
-msgstr ""
-"Deci, vă rugăm să nu ezitați să folositi și/sau personalizati "
-"setupServer.py la gust, sau scrieti script propriu  în Python sau intr-o "
-"altă limbă."
+msgstr "Deci, vă rugăm să nu ezitați să folositi și/sau personalizati setupServer.py la gust, sau scrieti script propriu  în Python sau intr-o altă limbă."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:173
 msgid ""
-"Also, you may want to write a script which handles the startup of the I2P"
-" Router, the eepProxy, plus any and all tunnels you are using. I've got "
-"such a script called startEverything.sh, which gets launched at system "
-"startup. (Be sure to search this site for template scripts to automate "
-"your I2P commands. If I create a page for one, I'll try to remember to "
-"link it here."
-msgstr ""
-"De asemenea, poate doriți să scrieti un script care se ocupă de pornire a"
-" Router-ului I2P, eepProxy, plus  toate tunelurile pe care le folosiți. "
-"Am un astfel de script numit startEverything.sh, care va fi lansat la "
-"pornirea sistemului. (Asigurați-vă că pentru a căuta site-ul pentru "
-"script-uri șablon pentru a automatiza comenzile I2P. Dacă aș crea o "
-"pagină pentru unul, voi încerca să retin ca să-l leg aici."
+"Also, you may want to write a script which handles the startup of the I2P "
+"Router, the eepProxy, plus any and all tunnels you are using. I've got such "
+"a script called startEverything.sh, which gets launched at system startup. "
+"(Be sure to search this site for template scripts to automate your I2P "
+"commands. If I create a page for one, I'll try to remember to link it here."
+msgstr "De asemenea, poate doriți să scrieti un script care se ocupă de pornire a Router-ului I2P, eepProxy, plus  toate tunelurile pe care le folosiți. Am un astfel de script numit startEverything.sh, care va fi lansat la pornirea sistemului. (Asigurați-vă că pentru a căuta site-ul pentru script-uri șablon pentru a automatiza comenzile I2P. Dacă aș crea o pagină pentru unul, voi încerca să retin ca să-l leg aici."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:176
-msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
-msgstr ""
-"Exercițiu pentru utilizatorii de Windows - transcrieti setupServer.py  "
-"într-un fișier BAT MS-DOS.."
+msgid ""
+"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
+msgstr "Exercițiu pentru utilizatorii de Windows - transcrieti setupServer.py  într-un fișier BAT MS-DOS.."
 
 #: i2p2www/pages/site/misc/invisiblenet.html:2
 msgid "Old Documents"
@@ -758,19 +522,12 @@ msgstr "Documente vechi"
 
 #: i2p2www/pages/site/misc/invisiblenet.html:5
 msgid ""
-"Following is a list of documents originally on www.invisiblenet.net/i2p/ "
-"and\n"
+"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n"
 "rescued via the\n"
 "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
 "They are quite dated and may or may not be accurate.\n"
-"However, the I2CP and I2NP documents in particular have some good "
-"information."
-msgstr ""
-"Urmind listă de documente inițiale pe www.invisiblenet.net/i2p/ și \n"
-"salvate la \n"
-"<a href=\"http://www.archive.org/\"> Wayback Masini </a>. \n"
-"Ele sunt destul de datat și pot sau nu pot fi corecte. \n"
-"Cu toate acestea, I2CP și I2NP documente, au unele informații utile."
+"However, the I2CP and I2NP documents in particular have some good information."
+msgstr "Urmind listă de documente inițiale pe www.invisiblenet.net/i2p/ și \nsalvate la \n<a href=\"http://www.archive.org/\"> Wayback Masini </a>. \nEle sunt destul de datat și pot sau nu pot fi corecte. \nCu toate acestea, I2CP și I2NP documente, au unele informații utile."
 
 #: i2p2www/pages/site/misc/jbigi.html:3
 msgid "August 2011"
@@ -782,15 +539,10 @@ msgstr "Prezentare generală"
 
 #: i2p2www/pages/site/misc/jbigi.html:7
 msgid ""
-"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a "
-"little\n"
+"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n"
 "manual work and a piece of chewing gum we have made several\n"
 "cryptography operations quite a bit faster."
-msgstr ""
-"Folosind JNI (Java Native Interface), un pic de cod C (datorită ugha!), "
-"Un pic \n"
-"lucru manual și o bucată de gumă de mestecat si le-am făcut mai multe \n"
-"operațiuni criptografice un pic mai repede."
+msgstr "Folosind JNI (Java Native Interface), un pic de cod C (datorită ugha!), Un pic \nlucru manual și o bucată de gumă de mestecat si le-am făcut mai multe \noperațiuni criptografice un pic mai repede."
 
 #: i2p2www/pages/site/misc/jbigi.html:13
 #, python-format
@@ -801,45 +553,21 @@ msgid ""
 "<a href=\"%(func)s\">mpz_powm()</a>\n"
 "as a replacement for the\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n"
-"As modPow() is a significant computational portion of many crypto "
-"operations, this is of significant benefit."
-msgstr ""
-"Accelerare vine de la bibliotecă super-rapid \n"
-"<a href=\"%(gmplib)s\"> GNU MP Bignum  (libgmp) </ a>. \n"
-"Noi folosim o singură funcție de libgmp - \n"
-"<a href=\"%(func)s\"> mpz_powm () </ a> \n"
-"ca un înlocuitor pentru \n"
-"<a href=\"%(bigint)s\"> Java Math bibliotecii BigInteger modPow () </ a>."
-" \n"
-"Ca modPow () este o porțiune de calcul semnificativă a multor operațiuni "
-"criptografice, acest lucru este deosebit de benefic."
+"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit."
+msgstr "Accelerare vine de la bibliotecă super-rapid \n<a href=\"%(gmplib)s\"> GNU MP Bignum  (libgmp) </ a>. \nNoi folosim o singură funcție de libgmp - \n<a href=\"%(func)s\"> mpz_powm () </ a> \nca un înlocuitor pentru \n<a href=\"%(bigint)s\"> Java Math bibliotecii BigInteger modPow () </ a>. \nCa modPow () este o porțiune de calcul semnificativă a multor operațiuni criptografice, acest lucru este deosebit de benefic."
 
 #: i2p2www/pages/site/misc/jbigi.html:25
 #, python-format
 msgid ""
-"The standard I2P installation includes about 20 versions of the library "
-"for different platforms,\n"
+"The standard I2P installation includes about 20 versions of the library for different platforms,\n"
 "each about 50KB, inside the jbigi.jar file.\n"
-"The initialization of the JBigI library, including CPU identification, "
-"selection, and extraction\n"
+"The initialization of the JBigI library, including CPU identification, selection, and extraction\n"
 "of the correct loadable module, is handled by the\n"
 "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n"
 "If no module is available for the current platform, the standard\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>\n"
 "is used."
-msgstr ""
-"Instalarea standarda I2P include aproximativ 20 de versiuni ale "
-"bibliotecii pentru diferite platforme, \n"
-"fiecare aproximativ 50KB, în interiorul fișierul jbigi.jar. \n"
-"Inițializarea bibliotecii JBigI, inclusiv identificarea CPU, selecție, și"
-" extracție \n"
-"modulului de încărcare corecta, este manipulat de către \n"
-"<a href=\"%(nativebigint)s\">clasă  NativeBigInteger  </ a>. \n"
-"Dacă modul nu este disponibil pentru platforma actuală, este utilizat "
-"standardul \n"
-"<a href=\"%(bigint)s\"> Java Math bibliotecii BigInteger modPow () </ a>"
-" \n"
-"."
+msgstr "Instalarea standarda I2P include aproximativ 20 de versiuni ale bibliotecii pentru diferite platforme, \nfiecare aproximativ 50KB, în interiorul fișierul jbigi.jar. \nInițializarea bibliotecii JBigI, inclusiv identificarea CPU, selecție, și extracție \nmodulului de încărcare corecta, este manipulat de către \n<a href=\"%(nativebigint)s\">clasă  NativeBigInteger  </ a>. \nDacă modul nu este disponibil pentru platforma actuală, este utilizat standardul \n<a href=\"%(bigint)s\"> Java Math bibliotecii BigInteger modPow () </ a> \n."
 
 #: i2p2www/pages/site/misc/jbigi.html:38
 msgid "Rebuilding and Testing JBigI"
@@ -847,12 +575,9 @@ msgstr "Reconstruirea și testare JBigI"
 
 #: i2p2www/pages/site/misc/jbigi.html:39
 msgid ""
-"Following are the instructions to build a new jbigi library for your own "
-"platform\n"
+"Following are the instructions to build a new jbigi library for your own platform\n"
 "and testing its performance."
-msgstr ""
-"În urma sunt instructiunile pentru a construirea și testarea "
-"performanțelor  bibliotecii jbigi pentru propria platforma."
+msgstr "În urma sunt instructiunile pentru a construirea și testarea performanțelor  bibliotecii jbigi pentru propria platforma."
 
 #: i2p2www/pages/site/misc/jbigi.html:42
 msgid "Requirements"
@@ -861,55 +586,28 @@ msgstr "Cerințe"
 #: i2p2www/pages/site/misc/jbigi.html:43
 msgid ""
 "This works on Linux, and with a few changes in build.sh probably also on\n"
-"other platforms. FreeBSD has also been reported to work too. On Kaffee "
-"the\n"
-"speedup is very small, because it already uses native BitInteger "
-"internally.\n"
+"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n"
+"speedup is very small, because it already uses native BitInteger internally.\n"
 "Blackdown seems to cause strange errors. Because you are going to do\n"
 "compilation, you need JDK; JRE won't work."
-msgstr ""
-"Aceasta funcționează pe Linux, și cu câteva modificări în build.sh, "
-"probabil, de asemenea, cu privire la \n"
-"alte platforme. A fost, de asemenea, raportat lucru pe platforma FreeBSD."
-" Pe Kaffee \n"
-"accelerare este foarte mica, deoarece foloseste deja BitInteger nativ pe "
-"plan intern. \n"
-"Blackdown pare a provoca erori ciudate. Daca aveți de gând să faci \n"
-"compilare, aveți nevoie de JDK, JRE nu va funcționa."
+msgstr "Aceasta funcționează pe Linux, și cu câteva modificări în build.sh, probabil, de asemenea, cu privire la \nalte platforme. A fost, de asemenea, raportat lucru pe platforma FreeBSD. Pe Kaffee \naccelerare este foarte mica, deoarece foloseste deja BitInteger nativ pe plan intern. \nBlackdown pare a provoca erori ciudate. Daca aveți de gând să faci \ncompilare, aveți nevoie de JDK, JRE nu va funcționa."
 
 #: i2p2www/pages/site/misc/jbigi.html:50
 msgid ""
-"The required code is available in monotone database and the latest source"
-" tarball. "
-msgstr ""
-"Codul necesar este disponibil în baza de date monoton și cele mai recente"
-" pachete cu sursa."
+"The required code is available in monotone database and the latest source "
+"tarball. "
+msgstr "Codul necesar este disponibil în baza de date monoton și cele mai recente pachete cu sursa."
 
 #: i2p2www/pages/site/misc/jbigi.html:51
 msgid ""
 "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n"
-"included in your OS / distribution or installed already, it can be "
-"received from\n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Even if you\n"
-"have already installed it as binary, it might still be worth a try to "
-"compile\n"
-"GMP yourself, since then it will be able to use the specific instructions"
-" of\n"
+"included in your OS / distribution or installed already, it can be received from\n"
+"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n"
+"have already installed it as binary, it might still be worth a try to compile\n"
+"GMP yourself, since then it will be able to use the specific instructions of\n"
 "your processor. The latest GMP may also\n"
 "be used instead of GMP 5.0.2, but it hasn't been tested by us."
-msgstr ""
-"Biblioteca GNU MP Bignum (libgmp) trebuie să fie instalata, în cazul în "
-"care acesta nu este \n"
-"incluse în OS / distribuție sau instalat deja, acesta poate fi primit de "
-"la \n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\"> http://gmplib.org/#DOWNLOAD </ "
-"a>. Chiar dacă \n"
-"l-au instalat deja ca binar, ar putea fi încă în valoare de o încercare "
-"de a compila \n"
-"GMP-te, deoarece atunci se va putea folosi instrucțiunile specifice ale \n"
-"procesorul. Cel mai recent GMP poate, de asemenea, \n"
-"fi utilizate în locul GMP 5.0.2, dar acesta nu a fost testat de către noi."
+msgstr "Biblioteca GNU MP Bignum (libgmp) trebuie să fie instalata, în cazul în care acesta nu este \nincluse în OS / distribuție sau instalat deja, acesta poate fi primit de la \n<a href=\"http://gmplib.org/#DOWNLOAD\"> http://gmplib.org/#DOWNLOAD </ a>. Chiar dacă \nl-au instalat deja ca binar, ar putea fi încă în valoare de o încercare de a compila \nGMP-te, deoarece atunci se va putea folosi instrucțiunile specifice ale \nprocesorul. Cel mai recent GMP poate, de asemenea, \nfi utilizate în locul GMP 5.0.2, dar acesta nu a fost testat de către noi."
 
 #: i2p2www/pages/site/misc/jbigi.html:61
 msgid "Step-by-step instructions"
@@ -917,14 +615,9 @@ msgstr "Instrucțiuni Pas-cu-pas"
 
 #: i2p2www/pages/site/misc/jbigi.html:63
 msgid ""
-"Look at <a href=\"http://localhost:7657/logs.jsp\">your running "
-"environment on the logs.jsp page</a>.\n"
+"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n"
 "There should be one of two status messages for JBigI - either"
-msgstr ""
-"Uită-te la <a href=\"http://localhost:7657/logs.jsp\"> mediu de pornire "
-"pe pagina logs.jsp </ a>. \n"
-"Nu ar trebui să fie una dintre cele două mesaje de stare pentru JBigI - "
-"fie"
+msgstr "Uită-te la <a href=\"http://localhost:7657/logs.jsp\"> mediu de pornire pe pagina logs.jsp </ a>. \nNu ar trebui să fie una dintre cele două mesaje de stare pentru JBigI - fie"
 
 #: i2p2www/pages/site/misc/jbigi.html:66
 msgid "Locally optimized native BigInteger loaded from the library path"
@@ -946,64 +639,30 @@ msgid ""
 "may require you to compile your own library.\n"
 "If the BigInteger library was loaded, do at least the next step to see\n"
 "what your performance is."
-msgstr ""
-"Dacă biblioteca nativa BitInteger nu a fost încărcată, cu siguranta ai "
-"nevoie pentru a \n"
-"compila propria biblioteca. \n"
-"Anumite platforme, cum ar fi OS X, OpenSolaris, și sistemele pe 64 de "
-"biți, \n"
-"vă pot solicita să compilați propria biblioteca. \n"
-"Dacă biblioteca BigInteger a fost încărcata, faceti cel puțin următorul "
-"pas pentru a vedea \n"
-"care performanța este."
+msgstr "Dacă biblioteca nativa BitInteger nu a fost încărcată, cu siguranta ai nevoie pentru a \ncompila propria biblioteca. \nAnumite platforme, cum ar fi OS X, OpenSolaris, și sistemele pe 64 de biți, \nvă pot solicita să compilați propria biblioteca. \nDacă biblioteca BigInteger a fost încărcata, faceti cel puțin următorul pas pentru a vedea \ncare performanța este."
 
 #: i2p2www/pages/site/misc/jbigi.html:78
 msgid ""
-"Look on <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"to see what the lifetime average values for "
-"<code>crypto.elGamal.decrypt</code> and\n"
-"<code>crypto.elGamal.encrypt</code> are. The numbers are times in "
-"milliseconds. Copy these somewhere so you can compare\n"
+"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n"
+"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n"
 "them later on.\n"
 "The network average for encrypt time is about 20ms.\n"
-"If your encrypt time is less than 50ms for a relatively new processor, or"
-" less than 100ms\n"
-"for an older processor, and the native BigInteger library was loaded, you"
-" are probably fine."
-msgstr ""
-"Uită-te la <a href=\"http://localhost:7657/stats.jsp\"> "
-"http://localhost:7657/stats.jsp </ a> \n"
-"pentru a vedea valorile medii de viață pentru <code> "
-"crypto.elGamal.decrypt </ code> și \n"
-"<code> crypto.elGamal.encrypt </ code> . Numerele sunt momente în "
-"milisecunde. Copiați aceste undeva astfel încât să puteți compara \n"
-" mai târziu. \n"
-"Media de rețea de timpul criptarii este de aproximativ 20ms. \n"
-"Dacă timpul dvs. de criptare este mai mic de 50ms pentru un procesor "
-"relativ nou , sau mai puțin de 100ms \n"
-"pentru  un procesor mai vechi, și  biblioteca BigInteger nativ este "
-"incarcata, valorile sunt bune ."
+"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n"
+"for an older processor, and the native BigInteger library was loaded, you are probably fine."
+msgstr "Uită-te la <a href=\"http://localhost:7657/stats.jsp\"> http://localhost:7657/stats.jsp </ a> \npentru a vedea valorile medii de viață pentru <code> crypto.elGamal.decrypt </ code> și \n<code> crypto.elGamal.encrypt </ code> . Numerele sunt momente în milisecunde. Copiați aceste undeva astfel încât să puteți compara \n mai târziu. \nMedia de rețea de timpul criptarii este de aproximativ 20ms. \nDacă timpul dvs. de criptare este mai mic de 50ms pentru un procesor relativ nou , sau mai puțin de 100ms \npentru  un procesor mai vechi, și  biblioteca BigInteger nativ este incarcata, valorile sunt bune ."
 
 #: i2p2www/pages/site/misc/jbigi.html:87
 #, python-format
 msgid ""
 "Get the latest released source code of I2P from\n"
-"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge "
-"source\n"
+"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n"
 "out of the monotone database mtn.i2p2.de"
-msgstr ""
-"Obțineți cele mai recente cod-sursă eliberat de I2P de la \n"
-"<a href=\"%(downloads)s\"> pagina de descărcare </ a>, sau de a lua sursa"
-" de ultimă oră \n"
-"din mtn.i2p2.de bazei de data monoton"
+msgstr "Obțineți cele mai recente cod-sursă eliberat de I2P de la \n<a href=\"%(downloads)s\"> pagina de descărcare </ a>, sau de a lua sursa de ultimă oră \ndin mtn.i2p2.de bazei de data monoton"
 
 #: i2p2www/pages/site/misc/jbigi.html:92
 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>"
-msgstr ""
-"În interiorul copacului  sursă schimbati directorul : <code> core / c / "
-"jbigi </ code>"
+msgstr "În interiorul copacului  sursă schimbati directorul : <code> core / c / jbigi </ code>"
 
 #: i2p2www/pages/site/misc/jbigi.html:93
 msgid ""
@@ -1011,65 +670,30 @@ msgid ""
 "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n"
 "Use the 'dynamic' argument to build.sh.\n"
 "Otherwise, you must download GMP version 5.0.2 from\n"
-"from <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"saving it to gmp-5.0.2.tar.bz2.\n"
-"If you decide to use a newer version, change the VER= line in "
-"<code>core/c/jbigi/build.sh</code>."
-msgstr ""
-"Citiți fișierul README. \n"
-"Dacă aveți un / usr / lib / libgmp.so fișier, nu trebuie să descărcați "
-"GMP. \n"
-"Utilizați argumentul \"dinamic\", a build.sh. \n"
-"În caz contrar, trebuie să descărcați GMP versiunea 5.0.2 de la \n"
-"de la <a href=\"http://gmplib.org/#DOWNLOAD\"> http://gmplib.org/ # "
-"DOWNLOAD </ a>, salvându-l ca GMP-5.0.2.tar.bz2. \n"
-"Dacă vă decideți să utilizați o versiune mai nouă, schimba VER = linie în"
-" <code> core / c / jbigi / build.sh </ code>."
+"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n"
+"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>."
+msgstr "Citiți fișierul README. \nDacă aveți un / usr / lib / libgmp.so fișier, nu trebuie să descărcați GMP. \nUtilizați argumentul \"dinamic\", a build.sh. \nÎn caz contrar, trebuie să descărcați GMP versiunea 5.0.2 de la \nde la <a href=\"http://gmplib.org/#DOWNLOAD\"> http://gmplib.org/ # DOWNLOAD </ a>, salvându-l ca GMP-5.0.2.tar.bz2. \nDacă vă decideți să utilizați o versiune mai nouă, schimba VER = linie în <code> core / c / jbigi / build.sh </ code>."
 
 #: i2p2www/pages/site/misc/jbigi.html:101
 msgid ""
 "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n"
-"environment variable is set and you are using Linux then it might just "
-"work.\n"
+"environment variable is set and you are using Linux then it might just work.\n"
 "Otherwise change the settings. Remember, you need the Java SDK installed."
-msgstr ""
-"Aruncati o privire la <code> build.sh </ code>, în cazul în care  "
-"variabilă de mediu <code> JAVA_HOME </ code> \n"
-" este setata și  utilizați Linux, atunci s-ar putea funcționa. \n"
-"Schimba altfel setările. Amintiți-vă, ca aveți nevoie de Java SDK "
-"instalat."
+msgstr "Aruncati o privire la <code> build.sh </ code>, în cazul în care  variabilă de mediu <code> JAVA_HOME </ code> \n este setata și  utilizați Linux, atunci s-ar putea funcționa. \nSchimba altfel setările. Amintiți-vă, ca aveți nevoie de Java SDK instalat."
 
 #: i2p2www/pages/site/misc/jbigi.html:106
 msgid ""
 "Run <code>build.sh</code> (if you downloaded GMP) or\n"
 "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n"
-"Maybe the build spewed out some errors of missing jni.h and jni_md.h "
-"files.\n"
-"Either copy these files from your java install into the "
-"core/c/jbigi/jbigi/include/ directory,\n"
+"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n"
+"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n"
 "or fix $JAVA_HOME.<br>\n"
-"You can run the <code>build.sh</code> from the <code>core/c/</code> "
-"directory which will\n"
+"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n"
 "build all available jbigi libs into a jbigi.jar.</br>\n"
 "A file named <code>libjbigi.so</code> should be created in the current\n"
-"directory. If this doesn't happen and/or you get errors then please "
-"report\n"
+"directory. If this doesn't happen and/or you get errors then please report\n"
 "them."
-msgstr ""
-"Rulați <code> build.sh </ code> (dacă ați descărcat GMP) sau \n"
-"<code> build.sh dinamic </ code> (dacă aveți / usr / lib / libgmp.so). "
-"<br/> Poate construirea a aruncat unele erori de lipsă jni.h  și fișiere "
-"jni_md.h. Copiati aceste fișiere din directoriul de instalare a java dvs."
-"  / c / jbigi / jbigi / include / directory, \n"
-"sau reparati $JAVA_HOME. <br> \n"
-"Puteți rula <code> build.sh </ code> din <code>core / c / </ code> "
-"director care va \n"
-"construi toate biblioteci jbigi disponibile într-o jbigi.jar. </ br> \n"
-"Un fișier numit <code> libjbigi.so </ code> ar trebui să fie creat în "
-"director curent. Dacă acest lucru nu se întâmplă și / sau veți obține "
-"erori, vă rugăm să raportati \n"
-"ele."
+msgstr "Rulați <code> build.sh </ code> (dacă ați descărcat GMP) sau \n<code> build.sh dinamic </ code> (dacă aveți / usr / lib / libgmp.so). <br/> Poate construirea a aruncat unele erori de lipsă jni.h  și fișiere jni_md.h. Copiati aceste fișiere din directoriul de instalare a java dvs.  / c / jbigi / jbigi / include / directory, \nsau reparati $JAVA_HOME. <br> \nPuteți rula <code> build.sh </ code> din <code>core / c / </ code> director care va \nconstrui toate biblioteci jbigi disponibile într-o jbigi.jar. </ br> \nUn fișier numit <code> libjbigi.so </ code> ar trebui să fie creat în director curent. Dacă acest lucru nu se întâmplă și / sau veți obține erori, vă rugăm să raportati \nele."
 
 #: i2p2www/pages/site/misc/jbigi.html:118
 msgid ""
@@ -1077,19 +701,13 @@ msgid ""
 "the speed test.\n"
 "Read the final lines of the speed test's output for some additional\n"
 "info, it will be something like this:"
-msgstr ""
-"Urmați instrucțiunile din bază / c / README pentru a instala biblioteca "
-"și a trece testul de viteză. \n"
-"Citiți liniile finale ale rezultatului testului de viteză pentru unele "
-"info suplimentare, acesta va fi ceva de genul:"
+msgstr "Urmați instrucțiunile din bază / c / README pentru a instala biblioteca și a trece testul de viteză. \nCitiți liniile finale ale rezultatului testului de viteză pentru unele info suplimentare, acesta va fi ceva de genul:"
 
 #: i2p2www/pages/site/misc/jbigi.html:128
 msgid ""
 "If the native is indeed 5-7x faster (or more) then it looks all good. If "
 "not, please report."
-msgstr ""
-"În cazul în care nativul este într-adevăr de 5-7x mai rapid (sau mai "
-"mult), atunci se pare totul bine. Dacă nu, vă rugăm să raportați."
+msgstr "În cazul în care nativul este într-adevăr de 5-7x mai rapid (sau mai mult), atunci se pare totul bine. Dacă nu, vă rugăm să raportați."
 
 #: i2p2www/pages/site/misc/jbigi.html:129
 msgid "Copy <code>libjbigi.so</code> to your i2p directory"
@@ -1101,19 +719,10 @@ msgstr "Reporniți programele I2P."
 
 #: i2p2www/pages/site/misc/jbigi.html:131
 msgid ""
-"On <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"the <code>crypto.elGamal.decrypt</code> and "
-"<code>crypto.elGamal.encrypt</code>\n"
+"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n"
 "should be a lot faster."
-msgstr ""
-"Pe <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-" <code>crypto.elGamal.decrypt</code> si "
-"<code>crypto.elGamal.encrypt</code>\n"
-"ar trebui să fie mult mai repede."
+msgstr "Pe <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n <code>crypto.elGamal.decrypt</code> si <code>crypto.elGamal.encrypt</code>\nar trebui să fie mult mai repede."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:2
 msgid "Jrandom's Announcement"
@@ -1121,45 +730,28 @@ msgstr "Anunt Jrandom-lui"
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:4
 msgid ""
-"The following message was received in mid-November 2007. We have no "
-"further information\n"
+"The following message was received in mid-November 2007. We have no further information\n"
 "on jrandom's status."
-msgstr ""
-"Următorul mesaj a fost primit la mijlocul lunii noiembrie 2007. Nu avem "
-"nici o informație suplimentara \n"
-"cu privire la statutul jrandom-lui."
+msgstr "Următorul mesaj a fost primit la mijlocul lunii noiembrie 2007. Nu avem nici o informație suplimentara \ncu privire la statutul jrandom-lui."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:9
 #, python-format
 msgid ""
 "Subsequently, in an unrelated incident, the hosting company for\n"
 "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n"
-"on January 13, 2008, and the i2p.net servers did not fully return to "
-"service.\n"
+"on January 13, 2008, and the i2p.net servers did not fully return to service.\n"
 "As only jrandom has the credentials required to restore service,\n"
 "and he could not be contacted,\n"
 "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n"
 "and related subdomains."
-msgstr ""
-"Ulterior, într-un incident care nu au legătură, compania de găzduire "
-"pentru \n"
-"toate  serverele *.i2p.net (cu excepția forum.i2p.net) a suferit o pană "
-"de curent \n"
-"pe 13 ianuarie 2008, iar serverele i2p.net nu au revenit pe deplin la "
-"serviciu. \n"
-"Ca doar jrandom are acreditările necesare pentru a restabili serviciu, \n"
-"și el nu a putut fi contactat, \n"
-"ne-am mutat toate serviciile publice la <a href=\"%(site)s\"> www.i2p2.de"
-" </ a> "
+msgstr "Ulterior, într-un incident care nu au legătură, compania de găzduire pentru \ntoate  serverele *.i2p.net (cu excepția forum.i2p.net) a suferit o pană de curent \npe 13 ianuarie 2008, iar serverele i2p.net nu au revenit pe deplin la serviciu. \nCa doar jrandom are acreditările necesare pentru a restabili serviciu, \nși el nu a putut fi contactat, \nne-am mutat toate serviciile publice la <a href=\"%(site)s\"> www.i2p2.de </ a> "
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:19
 #, python-format
 msgid ""
 "Approximately two months later, for unrelated reasons,\n"
 "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>."
-msgstr ""
-"Aproximativ două luni mai târziu, din motive care nu au legatura, \n"
-"forum.i2p.net a fost mutat la <a href=\"http://%(forum)s/\">%(forum)s</a>."
+msgstr "Aproximativ două luni mai târziu, din motive care nu au legatura, \nforum.i2p.net a fost mutat la <a href=\"http://%(forum)s/\">%(forum)s</a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:2
 #: i2p2www/pages/site/misc/manual-wrapper.html:4
@@ -1169,65 +761,35 @@ msgstr "Instalarea manual Java Wrapper"
 #: i2p2www/pages/site/misc/manual-wrapper.html:6
 #, python-format
 msgid ""
-"The installation package for the <a href=\"%(downloads)s\">I2P router</a>"
-" comes\n"
-"with a Java wrapper for the most common architectures. If your system is "
-"not\n"
-"supported by our installer&mdash;or if you want to update the wrapper to "
-"a\n"
-"newer version&mdash;the following steps describe installing the wrapper "
-"manually."
-msgstr ""
-"Pachetul de instalare pentru router <a href=\"%(downloads)s\"> I2P </a> "
-"vine \n"
-"cu un înveliș Java pentru cele mai comune arhitecturi. Dacă sistemul dvs."
-" nu este \n"
-"susținut de instalator nostru sau dacă doriți să actualizați wrapper  la "
-"o \n"
-"versiunea următoarele etape noi descriu instalarea manuală ambalajul"
+"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n"
+"with a Java wrapper for the most common architectures. If your system is not\n"
+"supported by our installer&mdash;or if you want to update the wrapper to a\n"
+"newer version&mdash;the following steps describe installing the wrapper manually."
+msgstr "Pachetul de instalare pentru router <a href=\"%(downloads)s\"> I2P </a> vine \ncu un înveliș Java pentru cele mai comune arhitecturi. Dacă sistemul dvs. nu este \nsusținut de instalator nostru sau dacă doriți să actualizați wrapper  la o \nversiunea următoarele etape noi descriu instalarea manuală ambalajul"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:14
 msgid ""
-"Check Tanuki Software's <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download"
-" page</a>\n"
+"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n"
 "for your platform. Is your platform listed? If so, you're in\n"
-"luck! Download the most recent version of the Community Edition for your "
-"OS and\n"
+"luck! Download the most recent version of the Community Edition for your OS and\n"
 "CPU and move to <a href=\"#packaged\">the next step</a>."
-msgstr ""
-"Verifica <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">"
-"  pagina de descărcare </ a> \n"
-"pentru platforma dumneavoastră. Este listat platforma? Dacă da, sunteți"
-"  \n"
-"norocos! Descărcați cea mai recentă versiune a ediției comunitar pentru "
-"sistemul de operare și \n"
-"CPU și treceti la <a href=\"#packaged\"> următorul pas </ a>."
+msgstr "Verifica <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">  pagina de descărcare </ a> \npentru platforma dumneavoastră. Este listat platforma? Dacă da, sunteți  \nnorocos! Descărcați cea mai recentă versiune a ediției comunitar pentru sistemul de operare și \nCPU și treceti la <a href=\"#packaged\"> următorul pas </ a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:20
 msgid ""
-"If your platform does not have an already compiled wrapper available, you"
-"\n"
-"may be able to compile it yourself. If you are willing to have a go at "
-"it, move\n"
+"If your platform does not have an already compiled wrapper available, you\n"
+"may be able to compile it yourself. If you are willing to have a go at it, move\n"
 "on to <a href=\"#compiling\">compiling</a> the wrapper for your system."
-msgstr ""
-"În cazul în care platforma nu are un înveliș  deja compilat disponibil, \n"
-"poate veti fi capabil să-l compilați singur. Dacă sunteți dispus treceti"
-" \n"
-"la <a href=\"#compiling\"> compilarea </ a> învelișului pentru sistemul "
-"dumneavoastră."
+msgstr "În cazul în care platforma nu are un înveliș  deja compilat disponibil, \npoate veti fi capabil să-l compilați singur. Dacă sunteți dispus treceti \nla <a href=\"#compiling\"> compilarea </ a> învelișului pentru sistemul dumneavoastră."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:27
 msgid "Using existing binaries"
 msgstr "Folosind binare existente"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:28
-msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>."
-msgstr ""
-"În pașii de mai jos, $ I2P înseamnă <em> locație I2P a fost instalat la "
-"</ em>."
+msgid ""
+"In the steps below, $I2P means <em>the location I2P was installed to</em>."
+msgstr "În pașii de mai jos, $ I2P înseamnă <em> locație I2P a fost instalat la </ em>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:36
 #: i2p2www/pages/site/misc/manual-wrapper.html:64
@@ -1242,11 +804,9 @@ msgstr "<code> tail-f /tmp/wrapper.log </code> și căutați orice probleme."
 #: i2p2www/pages/site/misc/manual-wrapper.html:39
 #: i2p2www/pages/site/misc/manual-wrapper.html:67
 msgid ""
-"If this did not work you'll need to use <code>runplain.sh</code> to start"
-" I2P."
-msgstr ""
-"Dacă acest lucru nu are efect, va trebui să utilizați <code> runplain.sh "
-"</ code> pentru a porni I2P."
+"If this did not work you'll need to use <code>runplain.sh</code> to start "
+"I2P."
+msgstr "Dacă acest lucru nu are efect, va trebui să utilizați <code> runplain.sh </ code> pentru a porni I2P."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:43
 msgid "Compiling from source"
@@ -1254,23 +814,16 @@ msgstr "Compilarea de la sursă"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:44
 msgid ""
-"These steps worked to compile the wrapper for use on a mipsel system "
-"running Debian. The steps <strong>will</strong> need to be altered for "
-"your system."
-msgstr ""
-"Acești pași au lucrat pentru a compila wrapper pentru utilizare pe un "
-"sistem mipsel ce se rulează Debian. Pașii <strong> vor </ strong> trebuie"
-" să fie modificate pentru sistemul dumneavoastră."
+"These steps worked to compile the wrapper for use on a mipsel system running"
+" Debian. The steps <strong>will</strong> need to be altered for your system."
+msgstr "Acești pași au lucrat pentru a compila wrapper pentru utilizare pe un sistem mipsel ce se rulează Debian. Pașii <strong> vor </ strong> trebuie să fie modificate pentru sistemul dumneavoastră."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:48
 msgid ""
-"Download the source archive for the community version of the wrapper from"
-" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download"
-" page</a>."
-msgstr ""
-"Descărcați arhiva sursă pentru versiunea comunitatii de înveliș de la <a "
-"href=\"http://wrapper.tanukisoftware.com/downloads\">  pagina de "
-"descarcare a wrapper </ a>."
+"Download the source archive for the community version of the wrapper from <a"
+" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download "
+"page</a>."
+msgstr "Descărcați arhiva sursă pentru versiunea comunitatii de înveliș de la <a href=\"http://wrapper.tanukisoftware.com/downloads\">  pagina de descarcare a wrapper </ a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:49
 msgid "Extract the tarball"
@@ -1278,19 +831,15 @@ msgstr "Extrage arhiva"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:51
 msgid ""
-"Set environment variables <code>ANT_HOME</code> and "
-"<code>JAVA_HOME</code>. For example, in Debian:"
-msgstr ""
-"Setati variabile de mediu <code> ANT_HOME </ code> și <code> JAVA_HOME </"
-" code>. De exemplu, în Debian:"
+"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. "
+"For example, in Debian:"
+msgstr "Setati variabile de mediu <code> ANT_HOME </ code> și <code> JAVA_HOME </ code>. De exemplu, în Debian:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:54
 msgid ""
 "Since there isn't a Makefile for Mipsel, we'll make a copy of an already "
 "existing makefile:"
-msgstr ""
-"Daca nu există un Makefile pentru Mipsel, vom face o copie a unui "
-"Makefile deja existent:"
+msgstr "Daca nu există un Makefile pentru Mipsel, vom face o copie a unui Makefile deja existent:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:56
 msgid "Now we can attempt to compile the wrapper:"
@@ -1298,9 +847,7 @@ msgstr "Acum putem încerca pentru a compila înveliș:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:57
 msgid "use <code>./build64.sh</code> if you have a 64bit CPU and JVM"
-msgstr ""
-"folositi <code> ./build64.sh </ code>, dacă aveți un procesor pe 64 de "
-"biți și JVM"
+msgstr "folositi <code> ./build64.sh </ code>, dacă aveți un procesor pe 64 de biți și JVM"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:58
 msgid "Copy the wrapper into its proper place:"
@@ -1310,9 +857,7 @@ msgstr "Copiați ambalajul în locul său:"
 msgid ""
 "Here's an outline and rationale for a minimal WWW proxy app for use over "
 "I2P."
-msgstr ""
-"Iată o schiță și justificarea pentru o WWW proxy app minime pentru "
-"utilizarea cu I2P."
+msgstr "Iată o schiță și justificarea pentru o WWW proxy app minime pentru utilizarea cu I2P."
 
 #: i2p2www/pages/site/misc/minwww.html:8
 msgid ""
@@ -1322,295 +867,116 @@ msgid ""
 "in the router (but later versions of the SocketLibrary will be able to\n"
 "use selective ACK and large window sizes, allowing more ACKs to be\n"
 "skipped)"
-msgstr ""
-"Functionarea HTTP peste I2P folosind I2PTunnel. În cazul în care "
-"SocketLibrary de bază \n"
-"este afară, singura diferență semnificativă va fi \"wrapRequest\" și \n"
-"'unwrapRequest \"va fi funcțional plasate în socketLibrary, nu \n"
-"în router (dar mai târziu versiuni ale SocketLibrary va putea \n"
-"utilizează ACK selective și ferestre de mari dimensiuni, care să permită "
-"mai multe ACK-uri pentru a fi \n"
-"ignorate)"
+msgstr "Functionarea HTTP peste I2P folosind I2PTunnel. În cazul în care SocketLibrary de bază \neste afară, singura diferență semnificativă va fi \"wrapRequest\" și \n'unwrapRequest \"va fi funcțional plasate în socketLibrary, nu \nîn router (dar mai târziu versiuni ale SocketLibrary va putea \nutilizează ACK selective și ferestre de mari dimensiuni, care să permită mai multe ACK-uri pentru a fi \nignorate)"
 
 #: i2p2www/pages/site/misc/minwww.html:47
 msgid ""
-"An optimized form, designed to handle only 128KB [1] files and pages, can"
-"\n"
+"An optimized form, designed to handle only 128KB [1] files and pages, can\n"
 "operate significantly faster:"
-msgstr ""
-"O formă optimizată, proiectat să se ocupe doar 128KB de [1] fișiere și "
-"pagini, poate \n"
-"funcționează mult mai rapid:"
+msgstr "O formă optimizată, proiectat să se ocupe doar 128KB de [1] fișiere și pagini, poate \nfuncționează mult mai rapid:"
 
 #: i2p2www/pages/site/misc/minwww.html:71
 msgid ""
 "The difference in network load and latency is significant - this is\n"
-"essentially a UDP version of HTTP.  On the normal web, we can't really do"
-" that,\n"
-"since most HTTP requests and responses are orders of magnitude larger "
-"than UDP\n"
-"packets functionally support, but in I2P, messages can be large.  The "
-"savings\n"
-"for the network load comes from the fact that we don't need to send any "
-"ACK\n"
+"essentially a UDP version of HTTP.  On the normal web, we can't really do that,\n"
+"since most HTTP requests and responses are orders of magnitude larger than UDP\n"
+"packets functionally support, but in I2P, messages can be large.  The savings\n"
+"for the network load comes from the fact that we don't need to send any ACK\n"
 "messages - rather than the earlier wrap/unwrap request (that bundles a\n"
-"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery),"
-" the\n"
-"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there"
-" are no\n"
+"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n"
+"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n"
 "resends)."
-msgstr ""
-"Diferența de încărcare a rețelei și de latență este semnificativ - acesta"
-" este \n"
-"în esență, o versiune UDP de HTTP. Pe web normal, nu putem într-adevăr "
-"că, \n"
-"deoarece cele mai multe cereri HTTP și răspunsuri sunt ordine de mărime "
-"mai mari decât UDP \n"
-"pachete sprijine funcțional, dar în I2P, mesajele pot fi mari. economiile"
-" \n"
-"pentru sarcina de rețea vine de la faptul că nu avem nevoie pentru a "
-"trimite orice ACK \n"
-"mesaje - mai degrabă decât folie / cererea desface mai devreme (ce "
-"include un \n"
-"DataMessage cu o DeliveryStatusMessage de a asigura livrarea garantat), \n"
-"MinWWW ocupă proxy cu retransmite (dacă este necesar - în I2PTunnel de "
-"astăzi, nu există \n"
-"retransmite)."
+msgstr "Diferența de încărcare a rețelei și de latență este semnificativ - acesta este \nîn esență, o versiune UDP de HTTP. Pe web normal, nu putem într-adevăr că, \ndeoarece cele mai multe cereri HTTP și răspunsuri sunt ordine de mărime mai mari decât UDP \npachete sprijine funcțional, dar în I2P, mesajele pot fi mari. economiile \npentru sarcina de rețea vine de la faptul că nu avem nevoie pentru a trimite orice ACK \nmesaje - mai degrabă decât folie / cererea desface mai devreme (ce include un \nDataMessage cu o DeliveryStatusMessage de a asigura livrarea garantat), \nMinWWW ocupă proxy cu retransmite (dacă este necesar - în I2PTunnel de astăzi, nu există \nretransmite)."
 
 #: i2p2www/pages/site/misc/minwww.html:83
 msgid ""
-"The data that the MinWWW proxy and server need to wrap is trivial - when "
-"the\n"
-"proxy wants to send \"GET /\", it prepends it with the I2P Destination "
-"sending\n"
-"the request, followed by a 4 byte request ID.  The MinWWW server receives"
-" those\n"
-"requests, contacts the appropriate HTTPD, sends the request, waits for "
-"the\n"
+"The data that the MinWWW proxy and server need to wrap is trivial - when the\n"
+"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n"
+"the request, followed by a 4 byte request ID.  The MinWWW server receives those\n"
+"requests, contacts the appropriate HTTPD, sends the request, waits for the\n"
 "response, and sends a reply to the MinWWW proxy containing the response,\n"
-"prefixed with the original request ID.  That response is taken and passed"
-" back\n"
+"prefixed with the original request ID.  That response is taken and passed back\n"
 "to the browser and the connection is closed."
-msgstr ""
-"Datele pe care proxy MinWWW și serverul trebuie să-și încheie este banal "
-"- în cazul în care \n"
-"proxy vrea să trimită \"GET /\", ea, adauga inaintea cu destinație I2P "
-"trimiterea \n"
-"cererea, urmate de o solicitare ID 4 octeți. Serverul MinWWW primește "
-"cele \n"
-"cereri, contacte httpd adecvat, trimite cererea, așteaptă \n"
-"răspuns, și trimite un răspuns la proxy MinWWW conține răspunsul,\n"
-"prefix cererea ID-ul original. Că răspunsul este preluat și a trecut "
-"înapoi \n"
-"la browser și conexiunea este închisă."
+msgstr "Datele pe care proxy MinWWW și serverul trebuie să-și încheie este banal - în cazul în care \nproxy vrea să trimită \"GET /\", ea, adauga inaintea cu destinație I2P trimiterea \ncererea, urmate de o solicitare ID 4 octeți. Serverul MinWWW primește cele \ncereri, contacte httpd adecvat, trimite cererea, așteaptă \nrăspuns, și trimite un răspuns la proxy MinWWW conține răspunsul,\nprefix cererea ID-ul original. Că răspunsul este preluat și a trecut înapoi \nla browser și conexiunea este închisă."
 
 #: i2p2www/pages/site/misc/minwww.html:93
 msgid ""
 "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n"
-"list, going through some round robin or other algorithm, so that there "
-"are\n"
-"multiple outproxies merged transparently.  The bandwidth required for "
-"running\n"
-"one of these outproxies is also greatly reduced, since it will only "
-"handle 128KB\n"
+"list, going through some round robin or other algorithm, so that there are\n"
+"multiple outproxies merged transparently.  The bandwidth required for running\n"
+"one of these outproxies is also greatly reduced, since it will only handle 128KB\n"
 "files (aka no one is going to be downloading porn, warez, etc)."
-msgstr ""
-"ÃŽn plus, proxy-ul MinWWW poate alege serverul MinWWW pentru folosirea din"
-" \n"
-"lista, trece printr-un round robin sau alt algoritm, astfel încât există"
-" \n"
-"mai multe outproxies fuzionate transparent. Lățimea de bandă necesară "
-"pentru rularea \n"
-"unului dintre aceste outproxies este, de asemenea, redusa foarte mult, "
-"deoarece acesta se va ocupa doar 128KB \n"
-"fișiere (aka nimeni nu e de gând să  descărce filme porno, warez, etc)."
+msgstr "În plus, proxy-ul MinWWW poate alege serverul MinWWW pentru folosirea din \nlista, trece printr-un round robin sau alt algoritm, astfel încât există \nmai multe outproxies fuzionate transparent. Lățimea de bandă necesară pentru rularea \nunului dintre aceste outproxies este, de asemenea, redusa foarte mult, deoarece acesta se va ocupa doar 128KB \nfișiere (aka nimeni nu e de gând să  descărce filme porno, warez, etc)."
 
 #: i2p2www/pages/site/misc/minwww.html:101
 msgid ""
-"The functionality /is/ limited, but 128KB of data is a lot for a single "
-"HTTP\n"
-"request or response.  The above diagrams are also unrealistic in their "
-"hops -\n"
-"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send "
-"each\n"
-"of the messages through two additional outbound routers, then forwarded "
-"to\n"
-"two additional inbound routers to ROUTERB, so the lag there is "
-"significant -\n"
-"while the above only saves 11 steps, 8 of those steps need to traverse "
-"the\n"
-"entire tunnel path (4+ remote hops each time when tunnels are 2 remote "
-"hops\n"
-"in each stretch), leaving MinWWW with only two full traversals (one for "
-"the\n"
+"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n"
+"request or response.  The above diagrams are also unrealistic in their hops -\n"
+"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send each\n"
+"of the messages through two additional outbound routers, then forwarded to\n"
+"two additional inbound routers to ROUTERB, so the lag there is significant -\n"
+"while the above only saves 11 steps, 8 of those steps need to traverse the\n"
+"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n"
+"in each stretch), leaving MinWWW with only two full traversals (one for the\n"
 "request, one for the response), instead of 10."
-msgstr ""
-"Funcționalitatea /este/ limitata, dar 128KB de date este mult pentru o "
-"singura cerere sau răspuns HTTP. Diagramele de mai sus sunt, de asemenea,"
-" nerealiste în sectorul hameiului lor - \n"
-"ROUTERA într-adevăr nu va vorbi direct la ROUTERB. ROUTERA va trimite "
-"fiecare \n"
-"din mesaje prin două routere de ieșire suplimentare, apoi înaintat \n"
-"două routere de intrare suplimentare ROUTERB, astfel încât decalajul nu "
-"este semnificativ - \n"
-"în timp ce cele de mai sus salvează numai 11 pași, 8 dintre aceste măsuri"
-" trebuie să traverseze \n"
-"întreaga cale tunel (4 + hamei la distanță de fiecare dată când tuneluri "
-"sunt 2 hamei de la distanță \n"
-"în fiecare întindere), lăsând MinWWW cu doar doua traversari complete "
-"(una pentru \n"
-"cerere, unul pentru răspunsul), în loc de 10."
+msgstr "Funcționalitatea /este/ limitata, dar 128KB de date este mult pentru o singura cerere sau răspuns HTTP. Diagramele de mai sus sunt, de asemenea, nerealiste în sectorul hameiului lor - \nROUTERA într-adevăr nu va vorbi direct la ROUTERB. ROUTERA va trimite fiecare \ndin mesaje prin două routere de ieșire suplimentare, apoi înaintat \ndouă routere de intrare suplimentare ROUTERB, astfel încât decalajul nu este semnificativ - \nîn timp ce cele de mai sus salvează numai 11 pași, 8 dintre aceste măsuri trebuie să traverseze \nîntreaga cale tunel (4 + hamei la distanță de fiecare dată când tuneluri sunt 2 hamei de la distanță \nîn fiecare întindere), lăsând MinWWW cu doar doua traversari complete (una pentru \ncerere, unul pentru răspunsul), în loc de 10."
 
 #: i2p2www/pages/site/misc/minwww.html:113
 msgid ""
-"Implementing the MinWWW proxy and server should be fairly easy - read an "
-"HTTP\n"
-"request from the client fully (perhaps only start out with HTTP GET, "
-"leaving\n"
-"HTTP POST for later), wrap the message, and wait for the response.  The "
-"server\n"
-"in turn simply needs to parse the request to either open a socket or URL,"
-"\n"
-"send the request, wait for the response, and send it back through the "
-"network.\n"
+"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n"
+"request from the client fully (perhaps only start out with HTTP GET, leaving\n"
+"HTTP POST for later), wrap the message, and wait for the response.  The server\n"
+"in turn simply needs to parse the request to either open a socket or URL,\n"
+"send the request, wait for the response, and send it back through the network.\n"
 "If someone were to implement this, it would be Good :)"
-msgstr ""
-"Punerea în aplicare a proxy MinWWW și serverului ar trebui să fie destul "
-"de usoara - citit o HTTP \n"
-"cerere complet din partea clientului  (poate începe numai cu HTTP GET, "
-"lăsând \n"
-"POST HTTP pentru mai târziu), înfășurați mesajul, și așteptați răspunsul."
-" serverul \n"
-"la rândul său, pur și simplu are nevoie pentru a analiza cererea fie a "
-"deschide un socket sau URL-ul, \n"
-"trimiteti cererea, așteptați răspunsul, și trimite-l înapoi prin "
-"intermediul rețelei. \n"
-"Dacă cineva a fost să pună în aplicare acest lucru, ar fi bine :)"
+msgstr "Punerea în aplicare a proxy MinWWW și serverului ar trebui să fie destul de usoara - citit o HTTP \ncerere complet din partea clientului  (poate începe numai cu HTTP GET, lăsând \nPOST HTTP pentru mai târziu), înfășurați mesajul, și așteptați răspunsul. serverul \nla rândul său, pur și simplu are nevoie pentru a analiza cererea fie a deschide un socket sau URL-ul, \ntrimiteti cererea, așteptați răspunsul, și trimite-l înapoi prin intermediul rețelei. \nDacă cineva a fost să pună în aplicare acest lucru, ar fi bine :)"
 
 #: i2p2www/pages/site/misc/minwww.html:122
 msgid ""
-"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary "
-"message\n"
-"size, but that's going to be going away since it involves either "
-"excessive memory\n"
-"overhead on intermediary routers, or additional implementation details to"
-"\n"
-"handle.  I2PTunnel is currently limited to 128KB and hasn't been a "
-"burden,\n"
+"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary message\n"
+"size, but that's going to be going away since it involves either excessive memory\n"
+"overhead on intermediary routers, or additional implementation details to\n"
+"handle.  I2PTunnel is currently limited to 128KB and hasn't been a burden,\n"
 "so perhaps it could be increased to 256KB when the I2CP spec is updated)"
-msgstr ""
-"[1] De ce fișiere 128KB? În prezent, I2CP funcțional permite mesaje "
-"dimensiune arbitrara  \n"
-", dar care va fi merge departe, deoarece aceasta implică  memorie "
-"excesiva  \n"
-" pe routere intermediare, sau detalii suplimentare de punere în aplicare "
-". I2PTunnel este în prezent limitat la 128KB și nu a fost o povară,așa "
-"că, probabil, ar putea fi crescută la 256KB când spec. I2CP va fi "
-"actualizata)"
+msgstr "[1] De ce fișiere 128KB? În prezent, I2CP funcțional permite mesaje dimensiune arbitrara  \n, dar care va fi merge departe, deoarece aceasta implică  memorie excesiva  \n pe routere intermediare, sau detalii suplimentare de punere în aplicare . I2PTunnel este în prezent limitat la 128KB și nu a fost o povară,așa că, probabil, ar putea fi crescută la 256KB când spec. I2CP va fi actualizata)"
 
 #: i2p2www/pages/site/misc/myi2p.html:4
 msgid ""
-"There has been discussion about a distributed blogging application for a "
-"few\n"
-"months now called \"MyI2P\".  While the original discussions were lost, "
-"we were \n"
-"able to retrieve a Google <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
-"of it.  It isn't pretty, but it includes the basic overview and some "
-"discussion\n"
+"There has been discussion about a distributed blogging application for a few\n"
+"months now called \"MyI2P\".  While the original discussions were lost, we were \n"
+"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
+"of it.  It isn't pretty, but it includes the basic overview and some discussion\n"
 "that ensued."
-msgstr ""
-"Au fost discuții cu privire la o cerere de blogging-ul distribuit de "
-"câteva \n"
-"luni, numit acum \"MyI2P\". În timp ce discuțiile originale s-au pierdut,"
-" a fost \n"
-"posibilitatea de a prelua un  <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\"> cache Google </ "
-"a> \n"
-". Acesta nu este destul, dar include o vedere de ansamblu de bază și "
-"unele discuții \n"
-"care a urmat."
+msgstr "Au fost discuții cu privire la o cerere de blogging-ul distribuit de câteva \nluni, numit acum \"MyI2P\". În timp ce discuțiile originale s-au pierdut, a fost \nposibilitatea de a prelua un  <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\"> cache Google </ a> \n. Acesta nu este destul, dar include o vedere de ansamblu de bază și unele discuții \ncare a urmat."
 
 #: i2p2www/pages/site/misc/myi2p.html:12
 #, python-format
 msgid ""
-"The application itself is not yet implemented, and the ideas behind it "
-"have \n"
-"been made less ambitious over time, but they are still valid and the "
-"current \n"
-"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality "
-"available \n"
-"along side the I2P 1.0 release.  That will include a distributed address "
-"book\n"
-"to enable secure, distributed, and human readable naming by sacrificing "
-"the \n"
-"need for global uniqueness - basically everyone has their own local "
-"address book \n"
-"and can 'subscribe' to other people's address books, letting MyI2P "
-"periodically\n"
-"retrieve new name to destination mappings (leaving conflicts up to the "
-"user to\n"
-"resolve).  In addition to the address book, there will be a distributed "
-"blogging\n"
+"The application itself is not yet implemented, and the ideas behind it have \n"
+"been made less ambitious over time, but they are still valid and the current \n"
+"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n"
+"along side the I2P 1.0 release.  That will include a distributed address book\n"
+"to enable secure, distributed, and human readable naming by sacrificing the \n"
+"need for global uniqueness - basically everyone has their own local address book \n"
+"and can 'subscribe' to other people's address books, letting MyI2P periodically\n"
+"retrieve new name to destination mappings (leaving conflicts up to the user to\n"
+"resolve).  In addition to the address book, there will be a distributed blogging\n"
 "system using a reduced and secured subset of \n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to "
-"essentially\n"
-"provide an anonymous <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
-"a 'friends list' and transparent access control (authenticated by the I2P"
-"\n"
-"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the "
-"address book)."
-msgstr ""
-"Aplicatie în sine nu este încă pusă în aplicare , iar ideile din spatele "
-"acestuia au\n"
-" fost destul de ambitiosi , dar ele sunt încă valabile si in \n"
-"<a href=\"%(roadmap)s\">planul curent < / a > este de a avea "
-"funcționalitatea MyI2P de bază disponibila\n"
-"de-a lungul release-ului I2P 1.0  . Care va include o agendă de adrese "
-"distribuita\n"
-"pentru a permite denumiri sigure , distribuite , și umane ce pot fi "
-"citite prin sacrificarea\n"
-"nevoie de unicitate la nivel mondial - în principiu, fiecare are propria "
-"lor agendă locală\n"
-"și pot \" abona \" la agende altor persoane , permițându- MyI2P periodic\n"
-"prelua nume nou pentru maparea de destinație ( lăsând conflicte până la "
-"utilizatorul le\n"
-"rezolva ) . În plus față de agenda , va exista un blogging- distribuit\n"
-"sistem folosind un subset redus și asigurat de\n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\"> BBCode < / a "
-">  , în esență,\n"
-"oferă un <a  href=\"http://www.livejournal.com/\"> LiveJournal < / a > "
-"anonim cu\n"
-"o \" lista de prieteni \" și de control al accesului transparent ( "
-"autentificat de I2P\n"
-"<a  href=\"%(datagrams)s\">  datagrame</ a> cu reguli definite bazat pe "
-"agenda de adrese) ."
+"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n"
+"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
+"a 'friends list' and transparent access control (authenticated by the I2P\n"
+"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)."
+msgstr "Aplicatie în sine nu este încă pusă în aplicare , iar ideile din spatele acestuia au\n fost destul de ambitiosi , dar ele sunt încă valabile si in \n<a href=\"%(roadmap)s\">planul curent < / a > este de a avea funcționalitatea MyI2P de bază disponibila\nde-a lungul release-ului I2P 1.0  . Care va include o agendă de adrese distribuita\npentru a permite denumiri sigure , distribuite , și umane ce pot fi citite prin sacrificarea\nnevoie de unicitate la nivel mondial - în principiu, fiecare are propria lor agendă locală\nși pot \" abona \" la agende altor persoane , permițându- MyI2P periodic\nprelua nume nou pentru maparea de destinație ( lăsând conflicte până la utilizatorul le\nrezolva ) . În plus față de agenda , va exista un blogging- distribuit\nsistem folosind un subset redus și asigurat de\n<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\"> BBCode < / a >  , în esență,\noferă un <a  href=\"http://www.livejournal.com/\"> LiveJournal < / a > anonim cu\no \" lista de prieteni \" și de control al accesului transparent ( autentificat de I2P\n<a  href=\"%(datagrams)s\">  datagrame</ a> cu reguli definite bazat pe agenda de adrese) ."
 
 #: i2p2www/pages/site/misc/myi2p.html:29
 msgid ""
-"Additional functionality, such as integration with a DHT backing store or"
-" \n"
-"swarming file transfers for 'attachments' can be added later.  Email may "
-"or may\n"
-"not get in the first pass either, though its implementation is "
-"essentially just\n"
-"a blog entry with private access, so perhaps some UI designer can come up"
-" with\n"
-"something.  Exporting the data to RSS or access through ATOM will be an "
-"option \n"
+"Additional functionality, such as integration with a DHT backing store or \n"
+"swarming file transfers for 'attachments' can be added later.  Email may or may\n"
+"not get in the first pass either, though its implementation is essentially just\n"
+"a blog entry with private access, so perhaps some UI designer can come up with\n"
+"something.  Exporting the data to RSS or access through ATOM will be an option \n"
 "down the road as well."
-msgstr ""
-"Funcționalitate suplimentară, cum ar fi integrarea cu un magazin de "
-"suport DHT sau \n"
-" transferuri de fișiere pentru atașamente  pot fi adăugate mai târziu. "
-"E-mail poate sau \n"
-"nu ajunge în prima trecere, fie, deși punerea sa în aplicare este, în "
-"esență doar \n"
-"o intrare de blog cu acces privat, asa ca, probabil unele designer de UI "
-"pot veni cu \n"
-"ceva. Exportarea datelor la RSS sau accesul prin ATOM va fi o opțiune \n"
-"adaugata in viitor, de asemenea."
+msgstr "Funcționalitate suplimentară, cum ar fi integrarea cu un magazin de suport DHT sau \n transferuri de fișiere pentru atașamente  pot fi adăugate mai târziu. E-mail poate sau \nnu ajunge în prima trecere, fie, deși punerea sa în aplicare este, în esență doar \no intrare de blog cu acces privat, asa ca, probabil unele designer de UI pot veni cu \nceva. Exportarea datelor la RSS sau accesul prin ATOM va fi o opțiune \nadaugata in viitor, de asemenea."
 
 #: i2p2www/pages/site/misc/ratestats.html:2
 #: i2p2www/pages/site/misc/ratestats.html:5
@@ -1623,11 +989,9 @@ msgstr "I2P permite colectarea de o gamă largă de rate."
 
 #: i2p2www/pages/site/misc/ratestats.html:7
 msgid ""
-"The list was gathered using the following command in the top directory of"
-" the branch i2p.i2p:"
-msgstr ""
-"Lista a fost colectate folosind următoarea comandă în directorul de sus "
-"in ramură i2p.i2p :"
+"The list was gathered using the following command in the top directory of "
+"the branch i2p.i2p:"
+msgstr "Lista a fost colectate folosind următoarea comandă în directorul de sus in ramură i2p.i2p :"
 
 #: i2p2www/pages/site/misc/ratestats.html:10
 msgid "All options aren't needed, but it works."
@@ -1641,35 +1005,17 @@ msgid ""
 "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n"
 "on monotone.\n"
 "See\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p "
-"monotone</a>\n"
-"for more information on how to get started and check out the source "
-"anonymously.\n"
+"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n"
+"for more information on how to get started and check out the source anonymously.\n"
 "There is also a quick-start guide on the\n"
 "<a href=\"%(newdevs)s\">new developer's page</a>."
-msgstr ""
-"Codului sursă I2P este păstrată în mai multe depozite monotone "
-"distribuite. \n"
-"Vezi site-ul\n"
-"<a href=\"http://www.monotone.ca/\"> Monotone </ a> pentru informații \n"
-"de monoton. \n"
-"vedea \n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\"> acest post pe forum "
-"I2P monoton </ a> \n"
-"pentru mai multe informații cu privire la modul de a începe și a verifica"
-" afară de sursa anonim. \n"
-"Există, de asemenea, un ghid rapid de pornire pe \n"
-"<a  href=\"%(newdevs)s\"> pagină nouă pentru dezvoltatori </ a>."
+msgstr "Codului sursă I2P este păstrată în mai multe depozite monotone distribuite. \nVezi site-ul\n<a href=\"http://www.monotone.ca/\"> Monotone </ a> pentru informații \nde monoton. \nvedea \n<a href=\"http://%(forum)s/viewtopic.php?t=2524\"> acest post pe forum I2P monoton </ a> \npentru mai multe informații cu privire la modul de a începe și a verifica afară de sursa anonim. \nExistă, de asemenea, un ghid rapid de pornire pe \n<a  href=\"%(newdevs)s\"> pagină nouă pentru dezvoltatori </ a>."
 
 #: i2p2www/pages/site/misc/transition-guide.html:16
 msgid ""
-"If you want to get the source non-anonymously, pull from the public "
-"server mtn.welterde.de.\n"
+"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n"
 "The i2p source code branch is \"i2p.i2p\"."
-msgstr ""
-"Dacă doriți să obțineți sursa non-anonim, trage de la server public "
-"mtn.welterde.de . \n"
-"Denumirea ramurei sursei de cod I2P este \"i2p.i2p\"."
+msgstr "Dacă doriți să obțineți sursa non-anonim, trage de la server public mtn.welterde.de . \nDenumirea ramurei sursei de cod I2P este \"i2p.i2p\"."
 
 #: i2p2www/pages/site/misc/transition-guide.html:21
 msgid "Guide"
@@ -1679,9 +1025,7 @@ msgstr "Ghidaj"
 msgid ""
 "\n"
 "The following is a detailed guide by Complication."
-msgstr ""
-"\n"
-"Ceea ce urmează este un ghid detaliat de complicație."
+msgstr "\nCeea ce urmează este un ghid detaliat de complicație."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2
 msgid "How to Upgrade from 0.6.1.30 and Earlier"
@@ -1698,44 +1042,24 @@ msgid ""
 "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n"
 "we do not have his update signing key or access to\n"
 "www.i2p[.net] or dev.i2p[.net].\n"
-"Complication and zzz have generated new signing keys, and they and Amiga "
-"are providing\n"
-"update file hosting. These changes must be configured in your router to "
-"take effect."
-msgstr ""
-"De la dezvoltator I2P  \n"
-"<a href=\"%(jrandom)s\"> a plecat AWOL </ a>, \n"
-"nu avem cheia de semnare pentru actualizare sau acces la \n"
-"www.i2p [. net] sau dev.i2p [. net]. \n"
-"Complicație și zzz au generat noi chei de semnare, și ei și Amiga  "
-"furnizeaza \n"
-"actualizarea  hosting-ului de fișiere. Aceste modificări trebuie să fie "
-"configurate în router-ul pentru efect."
+"Complication and zzz have generated new signing keys, and they and Amiga are providing\n"
+"update file hosting. These changes must be configured in your router to take effect."
+msgstr "De la dezvoltator I2P  \n<a href=\"%(jrandom)s\"> a plecat AWOL </ a>, \nnu avem cheia de semnare pentru actualizare sau acces la \nwww.i2p [. net] sau dev.i2p [. net]. \nComplicație și zzz au generat noi chei de semnare, și ei și Amiga  furnizeaza \nactualizarea  hosting-ului de fișiere. Aceste modificări trebuie să fie configurate în router-ul pentru efect."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17
 msgid ""
-"Make the following configuration changes and your router will "
-"automatically install\n"
+"Make the following configuration changes and your router will automatically install\n"
 "the latest release."
-msgstr ""
-"Face următoarele modificări de configurare și router-ul se va instala "
-"automat \n"
-"la cea mai recentă versiune."
+msgstr "Face următoarele modificări de configurare și router-ul se va instala automat \nla cea mai recentă versiune."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22
 #, python-format
 msgid ""
-"We recommend the automated process as it will verify the key of the "
-"signed update file.\n"
+"We recommend the automated process as it will verify the key of the signed update file.\n"
 "If you do not make these changes,\n"
 "you may manually download the i2pupdate.zip file from\n"
 "<a href=\"%(downloads)s\">the download page</a>."
-msgstr ""
-"Vă recomandăm proces automatizat care va verifica cheia  fișierului "
-"semnat de actualizare. \n"
-"Dacă nu faceti aceste modificări, \n"
-"puteți descărca manual fișierul i2pupdate.zip de la \n"
-"<a href=\"%(downloads)s\"> pagina de descărcare </ a>."
+msgstr "Vă recomandăm proces automatizat care va verifica cheia  fișierului semnat de actualizare. \nDacă nu faceti aceste modificări, \nputeți descărca manual fișierul i2pupdate.zip de la \n<a href=\"%(downloads)s\"> pagina de descărcare </ a>."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:34
 #, python-format
@@ -1744,11 +1068,9 @@ msgstr "Schimbați URL-ul de știri la:%(url)s"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38
 msgid ""
-"Select ONE of the following new Update URLs at random and enter it into "
-"the Update URL box: "
-msgstr ""
-"Selectați unul din următoarele  URL-uri de actualizare  noi la întâmplare"
-" și introduceți-l în caseta de actualizare URL:"
+"Select ONE of the following new Update URLs at random and enter it into the "
+"Update URL box: "
+msgstr "Selectați unul din următoarele  URL-uri de actualizare  noi la întâmplare și introduceți-l în caseta de actualizare URL:"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43
 msgid "Check the box \"Update through the eepProxy?\""
@@ -1769,27 +1091,14 @@ msgstr "Faceți clic pe \"Apply\""
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58
 msgid ""
 "You are now ready to automatically receive the release update file,\n"
-"either by setting your update policy to \"download and install\" or by "
-"clicking on the\n"
+"either by setting your update policy to \"download and install\" or by clicking on the\n"
 "\"update available\" link when it appears."
-msgstr ""
-"Acum sunteți gata pentru a primi în mod automat fișierul de actualizare "
-"de eliberare, \n"
-"fie prin stabilirea politicii dvs. de actualizare pentru a \"descărca și "
-"instala\" sau făcând clic pe  link-ul\n"
-"\"update disponibil\", atunci când apare."
+msgstr "Acum sunteți gata pentru a primi în mod automat fișierul de actualizare de eliberare, \nfie prin stabilirea politicii dvs. de actualizare pentru a \"descărca și instala\" sau făcând clic pe  link-ul\n\"update disponibil\", atunci când apare."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:65
 #, python-format
 msgid ""
 "If you would like to verify the trusted update keys, they are also\n"
 "<a href=\"%(url)s\">posted and signed here</a>.\n"
-"Thank you for your support during this transition. For help please "
-"contact us on #i2p."
-msgstr ""
-"Dacă doriți pentru a verifica cheile de actualizare de încredere, ele "
-"sunt, de asemenea, scris și semnat\n"
-"<a href=\"%(url)s\"> aici </ a>. \n"
-"Vă mulțumim pentru sprijinul dumneavoastră în timpul acestei tranziții. "
-"Pentru ajutor, vă rugăm să ne contactați la # I2P."
-
+"Thank you for your support during this transition. For help please contact us on #i2p."
+msgstr "Dacă doriți pentru a verifica cheile de actualizare de încredere, ele sunt, de asemenea, scris și semnat\n<a href=\"%(url)s\"> aici </ a>. \nVă mulțumim pentru sprijinul dumneavoastră în timpul acestei tranziții. Pentru ajutor, vă rugăm să ne contactați la # I2P."
diff --git a/i2p2www/translations/ru/LC_MESSAGES/comparison.po b/i2p2www/translations/ru/LC_MESSAGES/comparison.po
index ffa45285abace7101f805244a637054f1ef3341a..ff6b4c376507f0a6ea7e115ccca662d582dc5b5e 100644
--- a/i2p2www/translations/ru/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/ru/LC_MESSAGES/comparison.po
@@ -1,7 +1,7 @@
-# Russian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Aleksey Orekhov <opexob@yandex.ru>, 2013
 # Aleksey Vyskubov <viskubov@gmail.com>, 2016
@@ -12,20 +12,18 @@
 # R4SAS, 2019
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: zzzi2p\n"
-"Language-Team: Russian (Russia) "
-"(http://www.transifex.com/otf/I2P/language/ru_RU/)\n"
-"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && "
-"n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) "
-"|| (n%100>=11 && n%100<=14)? 2 : 3)\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Irina Fedulova <istartlin@gmail.com>, 2020\n"
+"Language-Team: Russian (Russia) (http://www.transifex.com/otf/I2P/language/ru_RU/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ru_RU\n"
+"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) || (n%100>=11 && n%100<=14)? 2 : 3);\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -33,88 +31,39 @@ msgstr "I2P в сравнении с Freenet"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
-msgstr ""
-"Freenet - это полностью распределенная, точка-точка, анонимная сеть для "
-"публикации, предоставляющая безопасный способ хранить данные, также "
-"некоторые подходы, позволяющие обрабатывать нагрузки\n"
-"в пиках. Хотя Freenet разработан как распределенное хранилище, "
-"пользователи сделали\n"
-"приложения поверх него, которые позволяют другие формы взаимодействия, "
-"такие как статичные\n"
-"веб-сайты и доски сообщений."
+msgstr "Freenet - это полностью распределенная, точка-точка, анонимная сеть для публикации, предоставляющая безопасный способ хранить данные, также некоторые подходы, позволяющие обрабатывать нагрузки\nв пиках. Хотя Freenet разработан как распределенное хранилище, пользователи сделали\nприложения поверх него, которые позволяют другие формы взаимодействия, такие как статичные\nвеб-сайты и доски сообщений."
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
-msgstr ""
-"По сравнению с I2P, Freenet имеет некоторые преимущества - это "
-"распределенное хранилище\n"
-"данных, чем I2P не является, позволяющее людям обмениваться данными, даже"
-" если оригинальный\n"
-"автор более недоступен. Также сеть позволяет эффективно распределять "
-"данные. I2P сам по себе не имеет и не будет иметь такой функции. С другой"
-" стороны, здесь есть недостаток для пользователей, которые просто хотят "
-"анонимно общаться через веб-сайты, доски объявлений, программы "
-"файлообмена и т.д\n"
-"В I2P есть варианты реализации таких функций с помощью специальных "
-"приложений (a href=\"%(tahoe)s\">Tahoe-LAFS</a>), но еще ничего для "
-"обычного использования не готово."
+msgstr "По сравнению с I2P, Freenet имеет некоторые преимущества - это распределенное хранилище\nданных, чем I2P не является, позволяющее людям обмениваться данными, даже если оригинальный\nавтор более недоступен. Также сеть позволяет эффективно распределять данные. I2P сам по себе не имеет и не будет иметь такой функции. С другой стороны, здесь есть недостаток для пользователей, которые просто хотят анонимно общаться через веб-сайты, доски объявлений, программы файлообмена и т.д\nВ I2P есть варианты реализации таких функций с помощью специальных приложений (a href=\"%(tahoe)s\">Tahoe-LAFS</a>), но еще ничего для обычного использования не готово."
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
-msgstr ""
-"Тем не менее, даже не обращая внимание на проблемы реализации, есть "
-"определенные соображения\n"
-"об алгоритмах Freenet с точки зрения масштабирования и анонимности, в "
-"области эвристической маршрутизации внутри Freenet. Взаимодействие разных"
-" техник определенно может защитить от ряда атак, \n"
-"и, возможно, некоторые аспекты алгоритмов маршрутизации дают надежды на "
-"масштабирование. К сожалению, немногие из попыток анализа алгоритмов дали"
-" позитивные результаты, но надежда есть.\n"
-"В конце концов, Freenet предоставляет значительный уровень анонимности "
-"против атакующего, который не обладает достаточными для дальнейшего "
-"анализа ресурсами."
+msgstr "Тем не менее, даже не обращая внимание на проблемы реализации, есть определенные соображения\nоб алгоритмах Freenet с точки зрения масштабирования и анонимности, в области эвристической маршрутизации внутри Freenet. Взаимодействие разных техник определенно может защитить от ряда атак, \nи, возможно, некоторые аспекты алгоритмов маршрутизации дают надежды на масштабирование. К сожалению, немногие из попыток анализа алгоритмов дали позитивные результаты, но надежда есть.\nВ конце концов, Freenet предоставляет значительный уровень анонимности против атакующего, который не обладает достаточными для дальнейшего анализа ресурсами."
 
 #: i2p2www/pages/site/comparison/index.html:2
 msgid "Comparing I2P to other projects"
@@ -122,26 +71,14 @@ msgstr "Сравнение I2P с другими проектами"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
-msgstr ""
-"Существует много других хороших приложений и проектов в области анонимных"
-" коммуникаций, и I2P определенно обогащается их опытом.  Это неполный\n"
-" список подобных ресурсов - у freehaven'а  в  \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"и в GNUnet <a href=\"https://www.gnunet.org/links/\">проектах</a>\n"
-"эти списки полнее. Всего несколько систем имеет смысл сравнивать далее. \n"
-"Ниже перечислены страницы, посвященные сравнениям с этими системами:"
+msgstr "Существует много других хороших приложений и проектов в области анонимных коммуникаций, и I2P определенно обогащается их опытом.  Это неполный\n список подобных ресурсов - у freehaven'а  в  \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\nи в GNUnet <a href=\"https://www.gnunet.org/links/\">проектах</a>\nэти списки полнее. Всего несколько систем имеет смысл сравнивать далее. \nНиже перечислены страницы, посвященные сравнениям с этими системами:"
 
 #: i2p2www/pages/site/comparison/index.html:20
 #, python-format
@@ -153,15 +90,9 @@ msgstr "Обсуждается на <a href=\"%(othernetworks)s\">страниц
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Содержимое этой страницы подлежит обновлению, обсуждению и оспариванию, и"
-" мы будем рады любым замечаниям и дополнениям.\n"
-"Вы можете посодействовать анализу, добавив <a href=\"%(trac)s\">новый "
-"тикет в Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
 msgid "I2P Compared to Other Anonymous Networks"
@@ -178,251 +109,116 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Большая часть следующих разделов сильно устарела и не может быть точной.\n"
-"Для ознакомления с доступными сравнениями обратитесь к\n"
-"<a href=\"%(comparison)s\">основной странице сравнения сетей</a>.\n"
-"Вы можете посодействовать анализу, добавив\n"
-"<a href=\"%(trac)s\">новый тикет в Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
-msgstr ""
-"RetroShare - это набор peer-to-peer приложений, работающих в \n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> сети. Каждый пир такой"
-" F2F \n"
-"сети устанавливает прямые IP-соединения только с проверенными пирами "
-"(\"друзьями\") после явного \n"
-"обмена сертификатами. Он может обнаружить непроверенные пиры (например, "
-"друзья друзей), \n"
-"но соединения с ними производятся только через пиры \"друзей\" для "
-"обеспечения конфиденциальности и анонимности."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
+msgstr "RetroShare - это набор peer-to-peer приложений, работающих в \n<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> сети. Каждый пир такой F2F \nсети устанавливает прямые IP-соединения только с проверенными пирами (\"друзьями\") после явного \nобмена сертификатами. Он может обнаружить непроверенные пиры (например, друзья друзей), \nно соединения с ними производятся только через пиры \"друзей\" для обеспечения конфиденциальности и анонимности."
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
-msgstr ""
-"RetroShare предназначен для построения частноой сети доверенных пиров, в "
-"то время как I2P предназначен быть крупной публичной анонимной сетью. "
-"Последние версии RetroShare имеют варианты запуска в качестве публичного "
-"\"даркнета\", используя I2P или Tor  в качестве транспорта. Таким "
-"образом, все соединения \n"
-"анонимны и не требуют доверия для добавления новых \"друзей\"."
+msgstr "RetroShare предназначен для построения частноой сети доверенных пиров, в то время как I2P предназначен быть крупной публичной анонимной сетью. Последние версии RetroShare имеют варианты запуска в качестве публичного \"даркнета\", используя I2P или Tor  в качестве транспорта. Таким образом, все соединения \nанонимны и не требуют доверия для добавления новых \"друзей\"."
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
-msgstr ""
-"Morphmix и Tarzan - это полностью распределенные точка-точка сети "
-"анонимных прокси-серверов, позволяющие людям организовывать соединения "
-"через смешанную сеть с низкими задержками.\n"
-"Morphmix включает интересные алгоритмы обхода коллизий и защиты от атаки "
-"Sybil, а Tarzan использует для этого недостаток IP-адресов. Два основных "
-"отличия таких систем от I2P связаны с <a href=\"%(threatmodel)s\">моделью"
-" угроз</a> I2P \n"
-"и их дизайнов выходящих узлов (в отличие от обеспечения анонимности и "
-"отправителя, и получателя). Для обоих систем доступны исходные коды, но "
-"нам не известно об их использовании за пределами научной деятельности."
+msgstr "Morphmix и Tarzan - это полностью распределенные точка-точка сети анонимных прокси-серверов, позволяющие людям организовывать соединения через смешанную сеть с низкими задержками.\nMorphmix включает интересные алгоритмы обхода коллизий и защиты от атаки Sybil, а Tarzan использует для этого недостаток IP-адресов. Два основных отличия таких систем от I2P связаны с <a href=\"%(threatmodel)s\">моделью угроз</a> I2P \nи их дизайнов выходящих узлов (в отличие от обеспечения анонимности и отправителя, и получателя). Для обоих систем доступны исходные коды, но нам не известно об их использовании за пределами научной деятельности."
 
 #: i2p2www/pages/site/comparison/other-networks.html:172
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
-msgstr ""
-"\n"
-"Mixminion и Mixmaster являются сетями, поддерживающими анонимность "
-"электронной корреспонденции с очень сильной защитой.\n"
-"Программы обмена сообщениями с высокой скрытностью, работающие поверх I2P"
-"\n"
-"(например <a href=\"%(syndie)s\">Syndie</a> или I2PBote),\n"
-"возможно, смогут показать достаточную сопротивляемость существующей "
-"модели угроз, в то же время удовлетворяя потребности пользователей по "
-"обмену сообщениями меньшей скрытности,\n"
-"обеспечивая гораздо лучшую анонимность.\n"
-"Поддержка высокой скрытности в самом I2P маршрутизаторе, возможно, будет "
-"реализована, а, возможно, и нет, в отдалённом будущем.\n"
-"Ещё слишком рано говорить, удовлетворяет ли I2P потребностям "
-"пользователей в экстремально защищённом обмене сообщениями."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
+msgstr "\nMixminion и Mixmaster являются сетями, поддерживающими анонимность электронной корреспонденции с очень сильной защитой.\nПрограммы обмена сообщениями с высокой скрытностью, работающие поверх I2P\n(например <a href=\"%(syndie)s\">Syndie</a> или I2PBote),\nвозможно, смогут показать достаточную сопротивляемость существующей модели угроз, в то же время удовлетворяя потребности пользователей по обмену сообщениями меньшей скрытности,\nобеспечивая гораздо лучшую анонимность.\nПоддержка высокой скрытности в самом I2P маршрутизаторе, возможно, будет реализована, а, возможно, и нет, в отдалённом будущем.\nЕщё слишком рано говорить, удовлетворяет ли I2P потребностям пользователей в экстремально защищённом обмене сообщениями."
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
 msgid ""
 "As with Tor and Onion Routing, \n"
 "both Mixminion and Mixmaster take the directory based approach as well."
-msgstr ""
-"Как и в случае с Tor и Onion Routing, Mixminion и Mixmaster применяют "
-"подход на основе справочных директорий."
+msgstr "Как и в случае с Tor и Onion Routing, Mixminion и Mixmaster применяют подход на основе справочных директорий."
 
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
-msgstr ""
-"JAP (Java Anonymous Proxy) - это сеть смешанных каскадов для анонимизации"
-" веб-запросов, и для этого применяется несколько централизованных узлов "
-"(участников каскада), которые смешивают и обрабатывают запросы "
-"пользователей через набор узлов (каскад) перед доставкой их в сеть.\n"
-"Задача, модель угроз и безопасности существенно отличаются от принятых в "
-"I2P, но те, кто не нуждается в значительном уровне анонимности, но не "
-"удовлетворен уровнем анонимности существующих анонимайзеров, могут "
-"рассмотреть этот вариант. Те, кто в зоне ответственности немецкого "
-"законодательства, должны учитывать опасность того, что German Federal "
-"Bureau of Criminal Investigation (FBCI) успешно провело <a "
-"href=\"%(url)s\">атаку</a> на эту сеть.\n"
-"Хотя методы атаки позже были признаны незаконными в немецком суде, факт "
-"успешного сбора данных стоит учитывать. Суды могут поменять свои решения "
-"по обстоятельствам и техническую возможность сбора информации "
-"правительством или агентствами нельзя сбрасывать со счетов)."
+msgstr "JAP (Java Anonymous Proxy) - это сеть смешанных каскадов для анонимизации веб-запросов, и для этого применяется несколько централизованных узлов (участников каскада), которые смешивают и обрабатывают запросы пользователей через набор узлов (каскад) перед доставкой их в сеть.\nЗадача, модель угроз и безопасности существенно отличаются от принятых в I2P, но те, кто не нуждается в значительном уровне анонимности, но не удовлетворен уровнем анонимности существующих анонимайзеров, могут рассмотреть этот вариант. Те, кто в зоне ответственности немецкого законодательства, должны учитывать опасность того, что German Federal Bureau of Criminal Investigation (FBCI) успешно провело <a href=\"%(url)s\">атаку</a> на эту сеть.\nХотя методы атаки позже были признаны незаконными в немецком суде, факт успешного сбора данных стоит учитывать. Суды могут поменять свои решения по обстоятельствам и техническую возможность сбора информации правительством или агентствами нельзя сбрасывать со счетов)."
 
 #: i2p2www/pages/site/comparison/other-networks.html:216
 #, python-format
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
-msgstr ""
-"Обе эти системы работают на одном базовом механизме <a "
-"href=\"%(antnet)s\">маршрутизации</a>, добиваясь некоторой анонимности, "
-"предоставляя путь отказа при несложном, неорганизованном противнике. "
-"Используя antnet маршрутизацию, они сначала делают случайный проход или "
-"широковещательный запрос на поиск пира с нужными данными или адресами, а "
-"затем используют обратную связь для оптимизации найденного пути. Это "
-"нормально работает для приложений, которые собирают информацию о том, что"
-" другие пиры вокруг могут предложить - \"как у вас всех дела?\" против "
-"\"Алиса, привет, ты как?\". На выходе вы получаете локальный набор узлов,"
-" с которыми можно обмениваться файлами и поддерживать определенный "
-"уровень анонимности (хотя вы не имеете особого контроля над тем, кто "
-"будет в этой группе пиров)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
+msgstr "Обе эти системы работают на одном базовом механизме <a href=\"%(antnet)s\">маршрутизации</a>, добиваясь некоторой анонимности, предоставляя путь отказа при несложном, неорганизованном противнике. Используя antnet маршрутизацию, они сначала делают случайный проход или широковещательный запрос на поиск пира с нужными данными или адресами, а затем используют обратную связь для оптимизации найденного пути. Это нормально работает для приложений, которые собирают информацию о том, что другие пиры вокруг могут предложить - \"как у вас всех дела?\" против \"Алиса, привет, ты как?\". На выходе вы получаете локальный набор узлов, с которыми можно обмениваться файлами и поддерживать определенный уровень анонимности (хотя вы не имеете особого контроля над тем, кто будет в этой группе пиров)."
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
-msgstr ""
-"Тем не менее, этот алгоритм не очень хорошо масштабируется - если "
-"приложение хочет говорить с конкретным пиром, оно делает "
-"широковещательный запрос или случайный поиск (хотя, если поиск удался, "
-"antnet позволит оптимизировать связь). Это означает, что хотя эти сети "
-"работают на малом числе узлов, для большого числа узлов они не очень "
-"применимы при попытке связаться с конкретным пиром. Это не означает, что "
-"эти системы бесполезны, просто их применимость ограничена сценариями, где"
-" эти недостатки можно обработать другими средствами."
+msgstr "Тем не менее, этот алгоритм не очень хорошо масштабируется - если приложение хочет говорить с конкретным пиром, оно делает широковещательный запрос или случайный поиск (хотя, если поиск удался, antnet позволит оптимизировать связь). Это означает, что хотя эти сети работают на малом числе узлов, для большого числа узлов они не очень применимы при попытке связаться с конкретным пиром. Это не означает, что эти системы бесполезны, просто их применимость ограничена сценариями, где эти недостатки можно обработать другими средствами."
 
 #: i2p2www/pages/site/comparison/other-networks.html:239
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
-msgstr ""
-"Это был проект с закрытым исходным кодом, нацеленный на иранских "
-"пользователей.\n"
-"Tor стал <a href=\"%(torpost)s\">хорошим примером того, что нужно "
-"инструменту обхода цензуры</a>.\n"
-"Однако, нужно сказать, что закрытый исходный код и нацеленность на "
-"аудиторию конкретной страны - это не лучшие идеи.\n"
-"I2P - это, конечно же, проект с открытым исходным кодом. Тем не менее, "
-"эти исходные коды, а также <a href=\"%(docs)s\">техническая "
-"документация</a> требуют гораздо большего внимания."
+msgstr "Это был проект с закрытым исходным кодом, нацеленный на иранских пользователей.\nTor стал <a href=\"%(torpost)s\">хорошим примером того, что нужно инструменту обхода цензуры</a>.\nОднако, нужно сказать, что закрытый исходный код и нацеленность на аудиторию конкретной страны - это не лучшие идеи.\nI2P - это, конечно же, проект с открытым исходным кодом. Тем не менее, эти исходные коды, а также <a href=\"%(docs)s\">техническая документация</a> требуют гораздо большего внимания."
 
 #: i2p2www/pages/site/comparison/other-networks.html:248
 msgid "Paid VPN Services"
@@ -433,10 +229,8 @@ msgstr "Платные VPN-сервисы"
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
-"Вы можете посодействовать анализу, добавив\n"
-"<a href=\"%(trac)s\">новый тикет в Trac</a>."
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
 msgid "Others"
@@ -464,17 +258,7 @@ msgid ""
 "network, as well as gather and report statistics, as \n"
 "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
 "database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
-msgstr ""
-"Tor и Onion Routing - это анонимные сети прокси-серверов, позволяющие "
-"пользователям\n"
-"туннелировать данные через их сеть с низкими задержками. Два основных "
-"отличия Tor и I2P \n"
-"основаны на разнице в моделях угроз и дизайне выходных прокси-узлов (хотя"
-" Tor и поддерживает скрытые сервисы, как и I2P). Кроме того, Tor "
-"реализует централизованную точку для управления видимостью сети, а также "
-"для сбора статистики, в отличие от распределенной модели сети I2P, <a "
-"href=\"%(netdb)s\">базы сети</a> и <a href=\"%(peerselection)s\">выбора "
-"пира</a>."
+msgstr "Tor и Onion Routing - это анонимные сети прокси-серверов, позволяющие пользователям\nтуннелировать данные через их сеть с низкими задержками. Два основных отличия Tor и I2P \nоснованы на разнице в моделях угроз и дизайне выходных прокси-узлов (хотя Tor и поддерживает скрытые сервисы, как и I2P). Кроме того, Tor реализует централизованную точку для управления видимостью сети, а также для сбора статистики, в отличие от распределенной модели сети I2P, <a href=\"%(netdb)s\">базы сети</a> и <a href=\"%(peerselection)s\">выбора пира</a>."
 
 #: i2p2www/pages/site/comparison/tor.html:23
 msgid ""
@@ -487,14 +271,7 @@ msgid ""
 "outproxies are prone to abuse, along with all of the \n"
 "other security issues we've come to know and love with \n"
 "normal Internet traffic."
-msgstr ""
-"Функция выходных узлов в  I2P/Tor обладает несколькими явными проблемами "
-"- \n"
-"как только данные покидают сеть, глобальные наблюдатели легко "
-"обеспечивают мониторинг этого трафика. Вдобавок, выходные узлы имеют "
-"доступ к незашифрованным данным в обе стороны, а также легко выявляются и"
-" подвержены разного рода атакам реального мира. И это все в добавление к "
-"обычным проблемам безопасности, которые мы знаем."
+msgstr "Функция выходных узлов в  I2P/Tor обладает несколькими явными проблемами - \nкак только данные покидают сеть, глобальные наблюдатели легко обеспечивают мониторинг этого трафика. Вдобавок, выходные узлы имеют доступ к незашифрованным данным в обе стороны, а также легко выявляются и подвержены разного рода атакам реального мира. И это все в добавление к обычным проблемам безопасности, которые мы знаем."
 
 #: i2p2www/pages/site/comparison/tor.html:35
 msgid ""
@@ -504,11 +281,7 @@ msgid ""
 "to build outproxy functionality on top of an anonymous\n"
 "communication layer, they can).  In fact, some I2P users\n"
 "currently take advantage of Tor to outproxy."
-msgstr ""
-"Тем не менее, многим людям не стоит беспокоиться на этот счет, т.к. они "
-"за пределами угроз модели. Они также вне (формальной) границы I2P (если "
-"людям нужно сделать выходной узел, они могут его сделать). На самом деле,"
-" ряд пользователей I2P в качестве выходного узла используют Tor."
+msgstr "Тем не менее, многим людям не стоит беспокоиться на этот счет, т.к. они за пределами угроз модели. Они также вне (формальной) границы I2P (если людям нужно сделать выходной узел, они могут его сделать). На самом деле, ряд пользователей I2P в качестве выходного узла используют Tor."
 
 #: i2p2www/pages/site/comparison/tor.html:49
 msgid "Comparison of Tor and I2P Terminology"
@@ -518,9 +291,7 @@ msgstr "Сравнение терминологии Tor и I2P"
 msgid ""
 "While Tor and I2P are similar in many ways, much of the terminology is "
 "different."
-msgstr ""
-"Хотя Tor и I2P во многом похожи, у них значительно отличается "
-"терминология."
+msgstr "Хотя Tor и I2P во многом похожи, у них значительно отличается терминология."
 
 #: i2p2www/pages/site/comparison/tor.html:55
 msgid "Cell"
@@ -664,21 +435,14 @@ msgstr "Преимущества Tor перед I2P"
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
-msgstr ""
-"Значительно большая пользовательская база; Большее внимание со стороны "
-"науки и хакерского сообщества; выгоды от формальных исследований "
-"анонимности, сопротивления и производительности;\n"
-"известен неанонимный, видимый, связанный с университетом лидер"
+msgstr "Значительно большая пользовательская база; Большее внимание со стороны науки и хакерского сообщества; выгоды от формальных исследований анонимности, сопротивления и производительности;\nизвестен неанонимный, видимый, связанный с университетом лидер"
 
 #: i2p2www/pages/site/comparison/tor.html:84
 msgid "Has already solved some scaling issues I2P has yet to address"
-msgstr ""
-"Уже разрешили ряд проблем масштабирования, к которым I2P еще просто не "
-"подошел"
+msgstr "Уже разрешили ряд проблем масштабирования, к которым I2P еще просто не подошел"
 
 #: i2p2www/pages/site/comparison/tor.html:85
 msgid "Has significant funding"
@@ -690,32 +454,24 @@ msgstr "Больше разработчиков, включая ряд опла
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
-msgstr ""
-"Более устойчивый к блокировкам на уровне государств, благодаря транспорту"
-" поверх TLS и мостам (I2P имеет предложения по \"полностью закрытым "
-"путям\", но они еще не реализованы)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
+msgstr "Более устойчивый к блокировкам на уровне государств, благодаря транспорту поверх TLS и мостам (I2P имеет предложения по \"полностью закрытым путям\", но они еще не реализованы)"
 
 #: i2p2www/pages/site/comparison/tor.html:93
 msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr "Достаточно большая сеть, чтобы адаптироваться к блокировке и попыткам DOS"
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
-msgstr ""
-"Разработан и оптимизирован для выхода трафика с большим числом выходных "
-"узлов"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
+msgstr "Разработан и оптимизирован для выхода трафика с большим числом выходных узлов"
 
 #: i2p2www/pages/site/comparison/tor.html:96
 msgid ""
 "Better documentation, has formal papers and specifications,\n"
 "better website, many more translations"
-msgstr ""
-"Лучше документация, есть исследования и спецификации,\n"
-"лучше веб-сайт, гораздо больше переведенных данных"
+msgstr "Лучше документация, есть исследования и спецификации,\nлучше веб-сайт, гораздо больше переведенных данных"
 
 #: i2p2www/pages/site/comparison/tor.html:101
 msgid "More efficient with memory usage"
@@ -729,17 +485,13 @@ msgstr "Клиенты Tor работают с очень небольшими 
 msgid ""
 "Centralized control reduces the complexity at each\n"
 "node and can efficiently address Sybil attacks"
-msgstr ""
-"Централизованный контроль уменьшает сложность каждого узла и может "
-"эффективно работать с атаками Sybil"
+msgstr "Централизованный контроль уменьшает сложность каждого узла и может эффективно работать с атаками Sybil"
 
 #: i2p2www/pages/site/comparison/tor.html:110
 msgid ""
 "A core of high capacity nodes provides higher\n"
 "throughput and lower latency"
-msgstr ""
-"Набор высокопроизводительных узлов обеспечивает высокую "
-"производительность и меньшие задержки"
+msgstr "Набор высокопроизводительных узлов обеспечивает высокую производительность и меньшие задержки"
 
 #: i2p2www/pages/site/comparison/tor.html:115
 msgid "C, not Java (ewww)"
@@ -751,11 +503,9 @@ msgstr "Преимущества I2P перед Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
-msgstr ""
-"Разработан и оптимизирован для работы скрытых сервисов, что гораздо "
-"быстрее, чем в Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
+msgstr "Разработан и оптимизирован для работы скрытых сервисов, что гораздо быстрее, чем в Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:121
 msgid "Fully distributed and self organizing"
@@ -765,18 +515,13 @@ msgstr "Полностью распределенная и самооргани
 msgid ""
 "Peers are selected by continuously profiling and ranking performance,\n"
 "rather than trusting claimed capacity"
-msgstr ""
-"Пиры выбираются на основе постоянного профайлинга и замеров по "
-"производительности,\n"
-"нежели по объявленной пиром пропускной способности"
+msgstr "Пиры выбираются на основе постоянного профайлинга и замеров по производительности,\nнежели по объявленной пиром пропускной способности"
 
 #: i2p2www/pages/site/comparison/tor.html:129
 msgid ""
 "Floodfill peers (\"directory servers\") are varying and untrusted,\n"
 "rather than hardcoded"
-msgstr ""
-"Пиры Floodfill (\"справочные сервера\") постоянно меняются и не обладают "
-"доверием, в отличие от явно прошитых в Tor"
+msgstr "Пиры Floodfill (\"справочные сервера\") постоянно меняются и не обладают доверием, в отличие от явно прошитых в Tor"
 
 #: i2p2www/pages/site/comparison/tor.html:134
 msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
@@ -794,17 +539,13 @@ msgstr "Коммутирует пакеты вместо соединений"
 msgid ""
 "implicit transparent load balancing of messages \n"
 "across multiple peers, rather than a single path"
-msgstr ""
-"Явная прозрачная балансировка сообщений по многим пирам, в отличие от "
-"использования одного пути"
+msgstr "Явная прозрачная балансировка сообщений по многим пирам, в отличие от использования одного пути"
 
 #: i2p2www/pages/site/comparison/tor.html:145
 msgid ""
 "resilience vs. failures by running multiple \n"
 "tunnels in parallel, plus rotating tunnels"
-msgstr ""
-"Надежность и отказоустойчивость за счет поддержания нескольких "
-"параллельных туннелей и обеспечения ротации туннелей"
+msgstr "Надежность и отказоустойчивость за счет поддержания нескольких параллельных туннелей и обеспечения ротации туннелей"
 
 #: i2p2www/pages/site/comparison/tor.html:151
 msgid ""
@@ -812,20 +553,14 @@ msgid ""
 "of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
 "used by all of the peers Alice is talking with, \n"
 "rather than a circuit for each)"
-msgstr ""
-"соединения каждого пользователя масштабируются как  O(1) вместо  O(N) "
-"(например, Алиса держит 2 входящих туннеля, которые может использовать "
-"любой пир, с которым Алиса общается, а не держим по цепочке на каждый "
-"пир)"
+msgstr "соединения каждого пользователя масштабируются как  O(1) вместо  O(N) (например, Алиса держит 2 входящих туннеля, которые может использовать любой пир, с которым Алиса общается, а не держим по цепочке на каждый пир)"
 
 #: i2p2www/pages/site/comparison/tor.html:161
 msgid ""
 "Unidirectional tunnels instead of bidirectional\n"
 "circuits, doubling the number of nodes a peer has to\n"
 "compromise to get the same information."
-msgstr ""
-"Односторонние туннели вместо двусторонних цепочек, удваивая число узлов, "
-"которые пир должен скомпрометировать, чтобы получить ту же информацию"
+msgstr "Односторонние туннели вместо двусторонних цепочек, удваивая число узлов, которые пир должен скомпрометировать, чтобы получить ту же информацию"
 
 #: i2p2www/pages/site/comparison/tor.html:166
 #, python-format
@@ -839,11 +574,7 @@ msgid ""
 "tunnels are used for more than simply passing end \n"
 "to end messages (e.g. netDb, tunnel management, \n"
 "tunnel testing)"
-msgstr ""
-"Защита против детектирования клиентской активности, даже если\n"
-"атакующий участвует в туннеле, так как туннели используются не только для"
-" передачи сообщений, но и для работы NetDb, управления туннелями, "
-"проверки работоспособности туннелей)"
+msgstr "Защита против детектирования клиентской активности, даже если\nатакующий участвует в туннеле, так как туннели используются не только для передачи сообщений, но и для работы NetDb, управления туннелями, проверки работоспособности туннелей)"
 
 #: i2p2www/pages/site/comparison/tor.html:180
 msgid ""
@@ -851,34 +582,24 @@ msgid ""
 "of samples that an attacker can use to mount an \n"
 "active attack with, unlike circuits in Tor, which are\n"
 "typically long lived."
-msgstr ""
-"В I2P реализованы короткоживущие туннели, что уменьшает количество "
-"способов, которые атакующий может использовать для атаки, в отличие от "
-"цепочек в Tor'е, которые как правило живут долго. "
+msgstr "В I2P реализованы короткоживущие туннели, что уменьшает количество способов, которые атакующий может использовать для атаки, в отличие от цепочек в Tor'е, которые как правило живут долго. "
 
 #: i2p2www/pages/site/comparison/tor.html:188
 msgid ""
 "I2P APIs are designed specifically for anonymity and\n"
 "security, while SOCKS is designed for functionality."
-msgstr ""
-"API I2P спроектированы под анонимность и безопасность, тогда как SOCKS "
-"сделан для функциональности"
+msgstr "API I2P спроектированы под анонимность и безопасность, тогда как SOCKS сделан для функциональности"
 
 #: i2p2www/pages/site/comparison/tor.html:193
 msgid "Essentially all peers participate in routing for others"
-msgstr ""
-"За редким исключением, все пиры участвуют в маршрутизации трафика для "
-"других"
+msgstr "За редким исключением, все пиры участвуют в маршрутизации трафика для других"
 
 #: i2p2www/pages/site/comparison/tor.html:195
 msgid ""
 "The bandwidth overhead of being a full peer is low, \n"
 "while in Tor, while client nodes don't require much\n"
 "bandwidth, they don't fully participate in the mixnet."
-msgstr ""
-"Затраты на работу в полном режиме довольно низки, тогда как в Tor, если "
-"клиент сам по себе не требует много полосы, но они еще и не полностью "
-"используют сеть."
+msgstr "Затраты на работу в полном режиме довольно низки, тогда как в Tor, если клиент сам по себе не требует много полосы, но они еще и не полностью используют сеть."
 
 #: i2p2www/pages/site/comparison/tor.html:201
 msgid "Integrated automatic update mechanism"
@@ -904,19 +625,14 @@ msgstr "... и, возможно, никогда не реализуемые, т
 msgid ""
 "Defense vs. message count analysis by garlic wrapping \n"
 "multiple messages"
-msgstr ""
-"Защита от количественного анализа сообщений за счет\n"
-"заворачивания нескольких сообщений в одно"
+msgstr "Защита от количественного анализа сообщений за счет\nзаворачивания нескольких сообщений в одно"
 
 #: i2p2www/pages/site/comparison/tor.html:216
 msgid ""
 "Defense vs. long term intersection by adding delays \n"
 "at various hops (where the delays are not discernible\n"
 "by other hops)"
-msgstr ""
-"Защита от статистического анализа за счет добавления задержек на разных "
-"хопах\n"
-"(где задержки не зависят от других хостов)"
+msgstr "Защита от статистического анализа за счет добавления задержек на разных хопах\n(где задержки не зависят от других хостов)"
 
 #: i2p2www/pages/site/comparison/tor.html:223
 msgid ""
@@ -924,9 +640,4 @@ msgid ""
 "create a tunnel that will handle 500 messages / minute,\n"
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
-msgstr ""
-"Разные стратегии имитовставки на уровне туннелей (например,\n"
-"создание туннеля, который будет обрабатывать 500 сообщений в минуту, \n"
-"где эндпойнт посылает случайные данные, если полезный трафик не "
-"передается и т.д.)"
-
+msgstr "Разные стратегии имитовставки на уровне туннелей (например,\nсоздание туннеля, который будет обрабатывать 500 сообщений в минуту, \nгде эндпойнт посылает случайные данные, если полезный трафик не передается и т.д.)"
diff --git a/i2p2www/translations/ru/LC_MESSAGES/docs.po b/i2p2www/translations/ru/LC_MESSAGES/docs.po
index be2467b48191f4ef06d6ed3dec41b70e0f448600..22e8165640f321299251085937cfbb903c34c6c8 100644
--- a/i2p2www/translations/ru/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/ru/LC_MESSAGES/docs.po
@@ -4566,7 +4566,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:72
 msgid "for"
-msgstr ""
+msgstr "для"
 
 #: i2p2www/pages/site/docs/applications/git.html:74
 msgid "in order to obscure your local time zone."
diff --git a/i2p2www/translations/ru/LC_MESSAGES/misc.po b/i2p2www/translations/ru/LC_MESSAGES/misc.po
index b1fc48127c08cd08590aa45725495365bf11175c..a48e11bbda58b58800d52146c0ab1caf0fc9ed08 100644
--- a/i2p2www/translations/ru/LC_MESSAGES/misc.po
+++ b/i2p2www/translations/ru/LC_MESSAGES/misc.po
@@ -1,13 +1,14 @@
-# Russian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Ackermann Yuriy <ackermann.yuriy@gmail.com>, 2015
 # Aisha Medova <nyangasm@outlook.com>, 2017
 # Aleksey Orekhov <opexob@yandex.ru>, 2013
 # Alexander Georgievskiy <galeksandrp@gmail.com>, 2016
 # Petr Polyakov, 2014
+# Alexander Georgievskiy <galeksandrp@gmail.com>, 2016
 # Irina Fedulova <istartlin@gmail.com>, 2020
 # joshua ridney, 2015
 # jujjer <jujjer@gmail.com>, 2013
@@ -16,20 +17,18 @@
 # yume, 2014-2015
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:55+0000\n"
-"Last-Translator: zzzi2p\n"
-"Language-Team: Russian (Russia) "
-"(http://www.transifex.com/otf/I2P/language/ru_RU/)\n"
-"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && "
-"n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) "
-"|| (n%100>=11 && n%100<=14)? 2 : 3)\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Irina Fedulova <istartlin@gmail.com>, 2020\n"
+"Language-Team: Russian (Russia) (http://www.transifex.com/otf/I2P/language/ru_RU/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: ru_RU\n"
+"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) || (n%100>=11 && n%100<=14)? 2 : 3);\n"
 
 #: i2p2www/pages/site/misc/clt.html:2
 msgid "I2P at CLT and PetCon 2009.1"
@@ -38,76 +37,39 @@ msgstr "I2P на CLT и PetCon 2009.1"
 #: i2p2www/pages/site/misc/clt.html:4
 msgid ""
 "Members of I2P will held a talk at CLT and PetCon 2009.1\n"
-"Two members of the I2P team will be at two forthcoming Linux day and "
-"security convention."
-msgstr ""
-"Представители сообщества I2P выступят с докладом на CLT и PetCon 2009.1 \n"
-"Два члена команды I2P примут участие в предстоящих конференциях Linux day"
-" и security convention."
+"Two members of the I2P team will be at two forthcoming Linux day and security convention."
+msgstr "Представители сообщества I2P выступят с докладом на CLT и PetCon 2009.1 \nДва члена команды I2P примут участие в предстоящих конференциях Linux day и security convention."
 
 #: i2p2www/pages/site/misc/clt.html:9
 #, python-format
 msgid ""
-"On 14th march of 2009 there will be a short talk about general "
-"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> hold by echelon.\n"
-"Echelon and some other members of the I2P family will attend to the Linux"
-" meeting the whole two days (Saturday and Sunday) and will be "
-"recognizable as I2P family members. Meet them, ask them your questions, "
-"show them your props! Show your support!"
-msgstr ""
-"14 марта 2009 года состоится встреча, на которой будет представлена сеть "
-"I2P, на <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a>, "
-"проводимая echelon.\n"
-"Echelon и некоторые члены сообщества I2P будут присутствовать на встрече "
-"два полных дня (суббота и воскресенье). Встретьтесь с ними, задайте "
-"вопросы, поделитесь своими предложениями! Поддержите I2P!"
+"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n"
+"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!"
+msgstr "14 марта 2009 года состоится встреча, на которой будет представлена сеть I2P, на <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a>, проводимая echelon.\nEchelon и некоторые члены сообщества I2P будут присутствовать на встрече два полных дня (суббота и воскресенье). Встретьтесь с ними, задайте вопросы, поделитесь своими предложениями! Поддержите I2P!"
 
 #: i2p2www/pages/site/misc/clt.html:14
 #, python-format
 msgid ""
-"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security "
-"convention</a> in Dresden will take place.\n"
-"Again, echelon will attend this event and hold a short talk about general"
-" introduction to I2P. Another talk about the profiling by the I2P clients"
-" will be held."
-msgstr ""
-"10 днями позже в Дрездене пройдет съезд <a href=\"%(petcon)s\">Privacy "
-"and Data Security</a>.\n"
-"Echelon посетит это событие и расскажет о базовых принципах I2P. Также "
-"будет другой доклад о возможностях профилирования клиентами I2P."
+"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n"
+"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held."
+msgstr "10 днями позже в Дрездене пройдет съезд <a href=\"%(petcon)s\">Privacy and Data Security</a>.\nEchelon посетит это событие и расскажет о базовых принципах I2P. Также будет другой доклад о возможностях профилирования клиентами I2P."
 
 #: i2p2www/pages/site/misc/cvs.html:4
 #, python-format
 msgid ""
-"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a"
-" <a href=\"%(monotone)s\">Monotone</a> repository.\n"
+"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n"
 "For those who aren't very familiar with CVS, there is a\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> "
-"on the\n"
-"subject (developers only need to deal with the first chapter - \"An "
-"Overview of\n"
-"CVS\", as subsequent chapters go into some nasty details very few ever "
-"need to\n"
+"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n"
+"subject (developers only need to deal with the first chapter - \"An Overview of\n"
+"CVS\", as subsequent chapters go into some nasty details very few ever need to\n"
 "touch)."
-msgstr ""
-"Ранее исходный код I2P хранился в CVS репозитории. Теперь он хранится в "
-"репозитории <a href=\"%(monotone)s\">Monotone</a>.\n"
-"Для тех, кто не очень знаком с CVS, есть <a href=\"http://cvsbook.red-"
-"bean.com/cvsbook.html\">потрясающая книга</a> по теме (разработчикам "
-"потребуется только первая глава — \"Обзор CVS\", тогда как последующие "
-"главы касаются некоторых неприятных деталей, с которыми вряд ли доведется"
-" сталкиваться)."
+msgstr "Ранее исходный код I2P хранился в CVS репозитории. Теперь он хранится в репозитории <a href=\"%(monotone)s\">Monotone</a>.\nДля тех, кто не очень знаком с CVS, есть <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">потрясающая книга</a> по теме (разработчикам потребуется только первая глава — \"Обзор CVS\", тогда как последующие главы касаются некоторых неприятных деталей, с которыми вряд ли доведется сталкиваться)."
 
 #: i2p2www/pages/site/misc/cvs.html:31
 msgid ""
-"Humorous quote from WinCVS: \"Did you know...  Never experiment with new "
-"CVS\n"
+"Humorous quote from WinCVS: \"Did you know...  Never experiment with new CVS\n"
 "commands on your working repository.  Create a sample module instead.\""
-msgstr ""
-"Забавная цитата из WiCVS: \"Знаете ли... Никогда не экспериментируйте с "
-"новыми командами CVS в действующем репозитории. Создайте тестовый модуль "
-"вместо него.\""
+msgstr "Забавная цитата из WiCVS: \"Знаете ли... Никогда не экспериментируйте с новыми командами CVS в действующем репозитории. Создайте тестовый модуль вместо него.\""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4
@@ -155,10 +117,7 @@ msgstr "В качестве порта назначения:"
 msgid ""
 "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n"
 "(it is recommended to copy that .dat to your new install dir)"
-msgstr ""
-"В качестве пути к файлу с закрытым ключом: <code>путь к "
-"\"myWebPriv.dat\"</code><br />\n"
-"(рекомендуется скопировать этот .dat-файл в директорию с новой установкой)"
+msgstr "В качестве пути к файлу с закрытым ключом: <code>путь к \"myWebPriv.dat\"</code><br />\n(рекомендуется скопировать этот .dat-файл в директорию с новой установкой)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29
 msgid "Check the \"Start automatically?\" checkbox"
@@ -174,22 +133,12 @@ msgstr "Будет выведено сообщение:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39
 msgid ""
-"That's it!  Creating a new I2PTunnel server works the same way too, "
-"except you\n"
-"don't need to \"copy the old file\", obviously.  Behind the scenes, it is"
-" all driven\n"
-"by the <code>i2ptunnel.config</code> file, which you may modify "
-"externally (if you do,\n"
-"hit \"Reload config\" on the I2PTunnel web page, which will tear down all"
-" of your \n"
+"That's it!  Creating a new I2PTunnel server works the same way too, except you\n"
+"don't need to \"copy the old file\", obviously.  Behind the scenes, it is all driven\n"
+"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n"
+"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n"
 "existing tunnels and rebuild new ones)"
-msgstr ""
-"Это всё! Создание нового I2PTunnel сервера работает точно таким же "
-"образом, только вам, конечно, не потребуется \"копировать старый файл\". "
-"На самом деле всё это управляется файлом <code>i2ptunnel.config</code>, "
-"который вы можете изменить отдельно (если вы это сделаете, нажмите "
-"\"Перезагрузить конфигурацию\" на странице I2PTunnel, при этом все "
-"существующие туннели будут разорваны и построены новые)"
+msgstr "Это всё! Создание нового I2PTunnel сервера работает точно таким же образом, только вам, конечно, не потребуется \"копировать старый файл\". На самом деле всё это управляется файлом <code>i2ptunnel.config</code>, который вы можете изменить отдельно (если вы это сделаете, нажмите \"Перезагрузить конфигурацию\" на странице I2PTunnel, при этом все существующие туннели будут разорваны и построены новые)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47
 msgid ""
@@ -198,12 +147,7 @@ msgid ""
 "interface.  It will say \"Please be patient\" if you try to \n"
 "beforehand, which means that it is still trying to build the \n"
 "necessary I2PTunnel sessions it has been configured to create."
-msgstr ""
-"Учтите, что перед использованием интерфейса /i2ptunnel/ потребуется "
-"подождать, пока маршрутизатор интегрируется в сеть. До этого времени "
-"будет появляться сообщение с просьбой подождать, что означает, что "
-"маршрутизатор находится в процессе построения необходимых сессий "
-"I2PTunnel в соответствии с конфигурацией."
+msgstr "Учтите, что перед использованием интерфейса /i2ptunnel/ потребуется подождать, пока маршрутизатор интегрируется в сеть. До этого времени будет появляться сообщение с просьбой подождать, что означает, что маршрутизатор находится в процессе построения необходимых сессий I2PTunnel в соответствии с конфигурацией."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:2
 msgid "I2PTunnel services"
@@ -222,69 +166,48 @@ msgid ""
 "For simplicity's sake, we will walk through the setup of a web server; "
 "however, this procedure is the same regardless what protocol of servers "
 "and/or clients you are setting up."
-msgstr ""
-"Для простоты мы рассмотрим процедуру настройки для веб-сервера; тем не "
-"менее, эта процедура одинакова вне зависимости от того, серверы и/или "
-"клиенты для каких протоколов вы устанавливаете."
+msgstr "Для простоты мы рассмотрим процедуру настройки для веб-сервера; тем не менее, эта процедура одинакова вне зависимости от того, серверы и/или клиенты для каких протоколов вы устанавливаете."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:13
 msgid ""
-"I recommend the Tiny Httpd web server, thttpd, (windows version available"
-" on site) although you can use anything that you feel comfortable with."
-msgstr ""
-"Я рекомендую использовать веб-сервер Tiny Httpd, thttpd, (на сайте "
-"доступна windows-версия), но вы можете использовать то, что удобно вам."
+"I recommend the Tiny Httpd web server, thttpd, (windows version available on"
+" site) although you can use anything that you feel comfortable with."
+msgstr "Я рекомендую использовать веб-сервер Tiny Httpd, thttpd, (на сайте доступна windows-версия), но вы можете использовать то, что удобно вам."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:16
 msgid ""
 "Another more robust option would be to use EasyPHP, which is also open "
 "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For "
-"newbies who have no experience setting up and hosting content over "
-"servers, see the hosting page for help."
-msgstr ""
-"Другим более стойким вариантом является использование EasyPHP, также с "
-"открытым исходным кодом. EasyPHP поставляется вместе с PHP, PHPmyadmin, "
-"mySQL, и веб-сервером Apache. Для новичков, если нет опыта по настройке и"
-" размещению контента на серверах, рекомендуем просмотреть страницу о "
-"хостинге для справки."
+"newbies who have no experience setting up and hosting content over servers, "
+"see the hosting page for help."
+msgstr "Другим более стойким вариантом является использование EasyPHP, также с открытым исходным кодом. EasyPHP поставляется вместе с PHP, PHPmyadmin, mySQL, и веб-сервером Apache. Для новичков, если нет опыта по настройке и размещению контента на серверах, рекомендуем просмотреть страницу о хостинге для справки."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:19
 msgid ""
-"With the web server you've chosen, configure it to listen on a port of "
-"your choice, and serve its documents from a directory of your choice. For"
-" this example, we'll assume port 10880."
-msgstr ""
-"Настройте выбранный вами веб-сервер на нужный порт и корневую директорию "
-"с веб-документами. В этом примере будет использоваться порт 10880."
+"With the web server you've chosen, configure it to listen on a port of your "
+"choice, and serve its documents from a directory of your choice. For this "
+"example, we'll assume port 10880."
+msgstr "Настройте выбранный вами веб-сервер на нужный порт и корневую директорию с веб-документами. В этом примере будет использоваться порт 10880."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:22
 msgid ""
 "Make sure your firewall is set up so that you cannot receive incoming "
 "connections on this port (which would breach your anonymity)."
-msgstr ""
-"Убедитесь, что ваш межсетевой экран запрещает входящие соединения на этом"
-" порту (что нарушило бы вашу анонимность)."
+msgstr "Убедитесь, что ваш межсетевой экран запрещает входящие соединения на этом порту (что нарушило бы вашу анонимность)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:25
 msgid ""
 "Test the webserver, by pointing your normal browser (the one with the "
 "\"direct connection\") at <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the "
-"port number you have chosen)."
-msgstr ""
-"Попробуйте открыть при помощи вашего обычного браузера (того, у которого "
-"\"прямое соединение\") страницу по адресу <a "
-"href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> для проверки работы "
-"веб-сервера (при необходимости замените 10880 на выбранный вами порт)."
+"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port"
+" number you have chosen)."
+msgstr "Попробуйте открыть при помощи вашего обычного браузера (того, у которого \"прямое соединение\") страницу по адресу <a href=\"http://localhost:10880\" target=\"_blank\">http://localhost:10880</a> для проверки работы веб-сервера (при необходимости замените 10880 на выбранный вами порт)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:28
 msgid ""
 "Once your webserver is working, and you can access it locally with your "
 "browser, continue to the next step."
-msgstr ""
-"Когда убедитесь, что ваш веб-сервер работает корректно и вы можете зайти "
-"на него локально из браузера - переходите к следующему шагу."
+msgstr "Когда убедитесь, что ваш веб-сервер работает корректно и вы можете зайти на него локально из браузера - переходите к следующему шагу."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:33
 msgid "2 - Generate an I2P Destination Keypair"
@@ -292,45 +215,29 @@ msgstr "2 - Генерация I2P пары ключей назначения"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:35
 msgid ""
-"I2P does not deal in IP addresses. To protect your anonymity, it deals in"
-" unique addresses called destination keys."
-msgstr ""
-"Внутренняя сеть I2P не использует IP-адреса. Для защиты вашей анонимности"
-" она использует уникальные адреса, называемые ключами назначения."
+"I2P does not deal in IP addresses. To protect your anonymity, it deals in "
+"unique addresses called destination keys."
+msgstr "Внутренняя сеть I2P не использует IP-адреса. Для защиты вашей анонимности она использует уникальные адреса, называемые ключами назначения."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:38
 msgid ""
 "A destination key works a lot like a regular IP address, except that it "
-"can't be traced to your IP address or physical location. When users place"
-" a request to speak with you, your gateways are the ones that answer for "
-"you. So the requesting user can only know the IP address of your "
-"gateways. However, gateways don't know your IP address, because gateways "
-"are the last nodes on your tunnels, and you anonymously create tunnels by"
-" way of garlic routing. (So gateways are like puppets that can't see "
-"their masters, and everyone communicates through these puppets)"
-msgstr ""
-"Ключ адреса назначения работает почти как обычные IP-адреса, исключая "
-"возможность отследить его до вашего реального IP-адреса или "
-"действительного местонахождения. Когда пользователи отправляют запрос на "
-"связь с вами, то шлюзы отвечают за вас. Таким образом, пользователь, "
-"который отправил запрос, может узнать только IP-адреса шлюзов. Однако, "
-"шлюзы не знают ваш IP-адрес, так как шлюзы являются последними узлами "
-"туннелей, и вы анонимно создаете туннели с помощью чесночной "
-"маршрутизации. (Шлюзы как марионетки, которые не могут видеть кукловода, "
-"при этом все используют их для общения)"
+"can't be traced to your IP address or physical location. When users place a "
+"request to speak with you, your gateways are the ones that answer for you. "
+"So the requesting user can only know the IP address of your gateways. "
+"However, gateways don't know your IP address, because gateways are the last "
+"nodes on your tunnels, and you anonymously create tunnels by way of garlic "
+"routing. (So gateways are like puppets that can't see their masters, and "
+"everyone communicates through these puppets)"
+msgstr "Ключ адреса назначения работает почти как обычные IP-адреса, исключая возможность отследить его до вашего реального IP-адреса или действительного местонахождения. Когда пользователи отправляют запрос на связь с вами, то шлюзы отвечают за вас. Таким образом, пользователь, который отправил запрос, может узнать только IP-адреса шлюзов. Однако, шлюзы не знают ваш IP-адрес, так как шлюзы являются последними узлами туннелей, и вы анонимно создаете туннели с помощью чесночной маршрутизации. (Шлюзы как марионетки, которые не могут видеть кукловода, при этом все используют их для общения)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:41
 msgid ""
 "To deploy a server on I2P, you create a destination keypair. You use the "
-"private key to authenticate your server when connecting it to I2P, and "
-"you make the public key (aka destination key) known publicly, so others "
-"can connect to your server. (indirectly, through your gateways)"
-msgstr ""
-"Для развертывания сервера в I2P вы создаете пару ключей назначения. "
-"Закрытый ключ используется для аутентификации вашего сервера при его "
-"подключении к I2P. Открытый ключ (ключ назначения) публикуется, чтобы "
-"клиенты могли соединяться с вашим сервером (не напрямую, через ваши "
-"шлюзы)"
+"private key to authenticate your server when connecting it to I2P, and you "
+"make the public key (aka destination key) known publicly, so others can "
+"connect to your server. (indirectly, through your gateways)"
+msgstr "Для развертывания сервера в I2P вы создаете пару ключей назначения. Закрытый ключ используется для аутентификации вашего сервера при его подключении к I2P. Открытый ключ (ключ назначения) публикуется, чтобы клиенты могли соединяться с вашим сервером (не напрямую, через ваши шлюзы)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:44
 msgid "Each service you run on I2P requires a different keypair."
@@ -341,77 +248,52 @@ msgid ""
 "To generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code> (all on one line)"
-msgstr ""
-"Выполните следующую команду для генерации пары ключей: <code>java -jar "
-"lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
-"myWebPubKey.dat\"</code> (в одну строку)"
+msgstr "Выполните следующую команду для генерации пары ключей: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code> (в одну строку)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:50
 msgid ""
 "In windows, to generate your keypair, type the command: <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat "
 "myWebPubKey.dat\"</code>"
-msgstr ""
-"Выполните следующую команду для генерации пары ключей, если вы "
-"используете Windows: <code>java -jar lib/i2ptunnel.jar -nogui -e "
-"\"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>"
+msgstr "Выполните следующую команду для генерации пары ключей, если вы используете Windows: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:53
 msgid ""
-"The filenames <code>myWebPrivKey.dat</code> and "
-"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want "
-"here, as long as you understand your own choices."
-msgstr ""
-"Имена файлов <code>myWebPrivKey.dat</code> и <code>myWebPubKey.dat</code>"
-" не обязательно должны быть именно такими - задайте свои, если хотите, но"
-" не забывайте о своём выборе."
+"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>"
+" are arbitrary - choose whatever you want here, as long as you understand "
+"your own choices."
+msgstr "Имена файлов <code>myWebPrivKey.dat</code> и <code>myWebPubKey.dat</code> не обязательно должны быть именно такими - задайте свои, если хотите, но не забывайте о своём выборе."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:56
 msgid ""
 "We now need to export your public key into base64 format, which you will "
 "share with others."
-msgstr ""
-"Теперь нам нужно экспортировать публичный ключ, закодированный в base64, "
-"для последующей его публикации."
+msgstr "Теперь нам нужно экспортировать публичный ключ, закодированный в base64, для последующей его публикации."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:59
 msgid ""
-"To convert your myWebPubKey.dat file into shareable base64, type the "
-"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (all on one line)."
-msgstr ""
-"Чтобы закодировать ваш myWebPubKey.dat в base64 для публикации и обмена, "
-"выполните такую команду <code>java -cp lib/i2p.jar net.i2p.data.Base64 "
-"encode myWebPubKey.dat &gt; myWebPubKey.txt</code> (в одну строчку)."
+"To convert your myWebPubKey.dat file into shareable base64, type the command"
+" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; "
+"myWebPubKey.txt</code> (all on one line)."
+msgstr "Чтобы закодировать ваш myWebPubKey.dat в base64 для публикации и обмена, выполните такую команду <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; myWebPubKey.txt</code> (в одну строчку)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:62
 msgid ""
-"This file you have just generated, <code>myWebPubKey.txt</code>, contains"
-" a long base64 string (516 chars at last count), which we call a "
-"destination key. All you need to know about this string for now is that "
-"it allows remote clients to uniquely pinpoint and connect to your server,"
-" just the same way as an IP address allows remote machines to pinpoint "
-"and connect to your machine."
-msgstr ""
-"Файл <code>myWebPubKey.txt</code>, который вы только что сгенерировали, "
-"содержит длинную base64-строку (516 символов по нашим подсчётам), которая"
-" называется ключом назначения. На текущий момент всё, что вам нужно знать"
-" об этой строке - это то, что она позволяет удалённым клиентам однозначно"
-" определить и соединиться с вашим сервером точно так же, как IP-адрес "
-"позволяет удалённым устройствам определять ваш компьютер и соединяться с "
-"ним."
+"This file you have just generated, <code>myWebPubKey.txt</code>, contains a "
+"long base64 string (516 chars at last count), which we call a destination "
+"key. All you need to know about this string for now is that it allows remote"
+" clients to uniquely pinpoint and connect to your server, just the same way "
+"as an IP address allows remote machines to pinpoint and connect to your "
+"machine."
+msgstr "Файл <code>myWebPubKey.txt</code>, который вы только что сгенерировали, содержит длинную base64-строку (516 символов по нашим подсчётам), которая называется ключом назначения. На текущий момент всё, что вам нужно знать об этой строке - это то, что она позволяет удалённым клиентам однозначно определить и соединиться с вашим сервером точно так же, как IP-адрес позволяет удалённым устройствам определять ваш компьютер и соединяться с ним."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:65
 msgid ""
 "However, in contrast to an IP address, there is no way to trace your "
-"machine's physical location - even though your server can be addressed "
-"via I2P, your IP address cannot be traced or associated with this "
-"destination key."
-msgstr ""
-"Но в отличие от IP-адреса при использовании ключа назначения невозможно "
-"определить физическое местонахождение вашего устройства; IP-адрес вашего "
-"сервера не может быть отслежен или связан с этим ключом назначения даже "
-"несмотря на то, что ваш сервер доступен в I2P."
+"machine's physical location - even though your server can be addressed via "
+"I2P, your IP address cannot be traced or associated with this destination "
+"key."
+msgstr "Но в отличие от IP-адреса при использовании ключа назначения невозможно определить физическое местонахождение вашего устройства; IP-адрес вашего сервера не может быть отслежен или связан с этим ключом назначения даже несмотря на то, что ваш сервер доступен в I2P."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:70
 msgid "3 - Open a 'Tunnel' from I2P To Your Server"
@@ -419,52 +301,37 @@ msgstr "3 - Создайте \"Туннель\" из I2P к вашему сер
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:72
 msgid ""
-"For clients elsewhere in I2P to be able to access your server, you must "
-"run a 'bridge' or 'tunnel', which takes connections from these clients "
-"and forwards them to your local server."
-msgstr ""
-"Для того, чтобы клиенты из I2P смогли получить доступ к вашему серверу, "
-"вы должны открыть \"мост\" или \"туннель\", который направляет соединения"
-" от этих клиентов на ваш локальный сервер."
+"For clients elsewhere in I2P to be able to access your server, you must run "
+"a 'bridge' or 'tunnel', which takes connections from these clients and "
+"forwards them to your local server."
+msgstr "Для того, чтобы клиенты из I2P смогли получить доступ к вашему серверу, вы должны открыть \"мост\" или \"туннель\", который направляет соединения от этих клиентов на ваш локальный сервер."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:75
 msgid ""
 "To activate such a tunnel, type the command <code>java -jar "
 "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code> (all one line)."
-msgstr ""
-"Для активации этого туннеля выполните команду <code>java -jar "
-"lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
-"myWebPrivKey.dat\"</code> (в одну строчку)."
+msgstr "Для активации этого туннеля выполните команду <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code> (в одну строчку)."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:78
 msgid ""
 "If you used different filenames or port number earlier on, change these "
 "accordingly"
-msgstr ""
-"Если вы использовали другие имена для файлов или номер порта - измените "
-"их и здесь"
+msgstr "Если вы использовали другие имена для файлов или номер порта - измените их и здесь"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:81
 msgid ""
 "Windows users, remember to replace apostrophes with double quotes. Thus: "
 "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 "
 "myWebPrivKey.dat\"</code>"
-msgstr ""
-"Пользователи Windows - не забудьте заменить апострофы на двойные кавычки."
-" Т.е.: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost "
-"10880 myWebPrivKey.dat\"</code>"
+msgstr "Пользователи Windows - не забудьте заменить апострофы на двойные кавычки. Т.е.: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:84
 msgid ""
-"Within a few seconds, the 'tunnel' should now be active, and remote "
-"clients should be able to reach your server anonymously. Remember to let "
-"your router \"warm up\" before opening clients to it."
-msgstr ""
-"В течение нескольких секунд \"туннель\" должен активироваться, и "
-"удалённые клиенты смогут соединяться с вашим сервером анонимно. Не "
-"забудьте дать маршрутизатору время \"разогреться\" перед тем, как "
-"приглашать посетителей."
+"Within a few seconds, the 'tunnel' should now be active, and remote clients "
+"should be able to reach your server anonymously. Remember to let your router"
+" \"warm up\" before opening clients to it."
+msgstr "В течение нескольких секунд \"туннель\" должен активироваться, и удалённые клиенты смогут соединяться с вашим сервером анонимно. Не забудьте дать маршрутизатору время \"разогреться\" перед тем, как приглашать посетителей."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:89
 msgid "4 - Update Your hosts.txt File "
@@ -476,30 +343,21 @@ msgid ""
 "hosts.txt file, so I2P can translate the simple URL you place in the "
 "browser's address bar into the full public key text needed to find your "
 "server."
-msgstr ""
-"Для тестирования вашего сервера локально потребуется создать запись в "
-"hosts.txt, чтобы сеть I2P могла преобразовать вводимый в браузере URL в "
-"полный открытый ключ, необходимый для обнаружения сервера."
+msgstr "Для тестирования вашего сервера локально потребуется создать запись в hosts.txt, чтобы сеть I2P могла преобразовать вводимый в браузере URL в полный открытый ключ, необходимый для обнаружения сервера."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:94
 msgid ""
 "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where "
-"myserver.i2p is an I2P 'domain' you want to associate with your site, and"
-" the blahblahblah is the text of the base64 public key you created "
-"earlier in the file myWebPubKey.txt"
-msgstr ""
-"Отредактируйте hosts.i2p: добавьте строку myserver.i2p=blahblahblah, \n"
-"где myserver.i2p — 'домен' в I2P, на котором вы хотите разместить сайт, \n"
-"а blahblahblah — открытый ключ в виде base64, который вы создали ранее в "
-"файле myWebPubKey.txt"
+"myserver.i2p is an I2P 'domain' you want to associate with your site, and "
+"the blahblahblah is the text of the base64 public key you created earlier in"
+" the file myWebPubKey.txt"
+msgstr "Отредактируйте hosts.i2p: добавьте строку myserver.i2p=blahblahblah, \nгде myserver.i2p — 'домен' в I2P, на котором вы хотите разместить сайт, \nа blahblahblah — открытый ключ в виде base64, который вы создали ранее в файле myWebPubKey.txt"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:97
 msgid ""
 "With this in place, you and others can reach your server with the simple "
 "domain name myserver.i2p in the browser's address bar."
-msgstr ""
-"Если всё указано верно, вы и другие пользователи смогут связаться с вашим"
-" сервером, введя доменное имя myserver.i2p в адресную строку браузера."
+msgstr "Если всё указано верно, вы и другие пользователи смогут связаться с вашим сервером, введя доменное имя myserver.i2p в адресную строку браузера."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:102
 msgid "5 - Surf Your Site Within I2P"
@@ -510,10 +368,7 @@ msgid ""
 "Using your secondary browser - the one you earlier configured to use "
 "localhost:4444 as a proxy - point this browser to the address <a "
 "href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>"
-msgstr ""
-"Укажите вашему второму браузеру - тому, который вы настроили на "
-"использование localhost:4444 в качестве прокси-сервера - посетить адрес "
-"<a href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>"
+msgstr "Укажите вашему второму браузеру - тому, который вы настроили на использование localhost:4444 в качестве прокси-сервера - посетить адрес <a href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:107
 msgid "You should see the main page of your webserver come up."
@@ -529,61 +384,43 @@ msgstr "Теперь пора задуматься о чём-то большем
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:117
 msgid ""
-"As you grow into I2P and get more of a 'feel' for it, you will want to "
-"use all manner of servers and clients."
-msgstr ""
-"Когда вы ближе познакомитесь с I2P, вы захотите пользоваться всякого рода"
-" серверами и клиентами."
+"As you grow into I2P and get more of a 'feel' for it, you will want to use "
+"all manner of servers and clients."
+msgstr "Когда вы ближе познакомитесь с I2P, вы захотите пользоваться всякого рода серверами и клиентами."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:120
 msgid ""
-"The beauty of I2P is that it allows standard Internet clients and servers"
-" for most protocols to be transparently 'tunneled' through the anonymous "
+"The beauty of I2P is that it allows standard Internet clients and servers "
+"for most protocols to be transparently 'tunneled' through the anonymous "
 "network."
-msgstr ""
-"Прелесть I2P заключается в том, что она позволяет вполне обычным клиентам"
-" и серверам большинства протоколов работать без особой перенастройки "
-"путём их 'туннелирования' через анонимную сеть."
+msgstr "Прелесть I2P заключается в том, что она позволяет вполне обычным клиентам и серверам большинства протоколов работать без особой перенастройки путём их 'туннелирования' через анонимную сеть."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:123
 msgid ""
-"You can run mailservers/clients, nameservers/clients, newsservers/clients"
-" - almost anything at all - perhaps even FTP in passive mode."
-msgstr ""
-"Вы можете использовать почтовые серверы/клиенты, серверы/клиенты "
-"разрешения имён, новостные серверы/клиенты - практически всё - возможно, "
-"даже FTP в пассивном режиме."
+"You can run mailservers/clients, nameservers/clients, newsservers/clients - "
+"almost anything at all - perhaps even FTP in passive mode."
+msgstr "Вы можете использовать почтовые серверы/клиенты, серверы/клиенты разрешения имён, новостные серверы/клиенты - практически всё - возможно, даже FTP в пассивном режиме."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:126
 msgid ""
-"Now, we'll create a client tunnel. This is like the server tunnel we "
-"created earlier, but works in reverse. It listens to a port on your local"
-" machine; your local client connects to this port; the connection gets "
-"forwarded through I2P to the service on the other end."
-msgstr ""
-"Теперь создадим клиентский туннель. Он похож на серверный, созданный нами"
-" ранее, но работает в обратном направлении. Он ждёт соединений на "
-"определённом порту на вашем компьютере; ваш локальный клиент соединяется "
-"с этим портом; соединение перенаправляется через I2P к сервису на другом "
-"конце туннеля."
+"Now, we'll create a client tunnel. This is like the server tunnel we created"
+" earlier, but works in reverse. It listens to a port on your local machine; "
+"your local client connects to this port; the connection gets forwarded "
+"through I2P to the service on the other end."
+msgstr "Теперь создадим клиентский туннель. Он похож на серверный, созданный нами ранее, но работает в обратном направлении. Он ждёт соединений на определённом порту на вашем компьютере; ваш локальный клиент соединяется с этим портом; соединение перенаправляется через I2P к сервису на другом конце туннеля."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:129
 msgid ""
-"To open your client tunnel for your server, type the command <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (all one line)."
-msgstr ""
-"Для открытия клиентского туннеля для сервера наберите команду code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (всё одной строкой)"
+"To open your client tunnel for your server, type the command <code>java -jar"
+" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 "
+"textofbase64key\"</code> (all one line)."
+msgstr "Для открытия клиентского туннеля для сервера наберите команду code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 textofbase64key\"</code> (всё одной строкой)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:132
 msgid ""
-"The port 10888 is arbitrary - it just needs to be something other than "
-"the physical port your server is listening on."
-msgstr ""
-"Порт 10888 выбран произвольно - он просто должен отличаться от порта, на "
-"котором ожидает соединений ваш сервер."
+"The port 10888 is arbitrary - it just needs to be something other than the "
+"physical port your server is listening on."
+msgstr "Порт 10888 выбран произвольно - он просто должен отличаться от порта, на котором ожидает соединений ваш сервер."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:135
 msgid ""
@@ -591,51 +428,34 @@ msgid ""
 "myWebPubKey.txt, reproduced fully on one line (alternately, instead of "
 "textofbase64key, you can specify the name from your hosts.txt - e.g. "
 "myserver.i2p)"
-msgstr ""
-"textofbase64key — это содержимое текстового файла myWebPubKey.txt, "
-"воспроизведенное полностью в одну линию (как вариант, вместо "
-"textofbase64key можно выбрать имя из hosts.txt, например, myserver.i2p)"
+msgstr "textofbase64key — это содержимое текстового файла myWebPubKey.txt, воспроизведенное полностью в одну линию (как вариант, вместо textofbase64key можно выбрать имя из hosts.txt, например, myserver.i2p)"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:138
 msgid ""
 "Within a minute or two of launching this command, the client tunnel from "
 "your local machine into I2P will be open and ready for use."
-msgstr ""
-"Клиентский туннель с вашего компьютера в I2P откроется и будет готов к "
-"использованию через пару минут после выполнения этой команды."
+msgstr "Клиентский туннель с вашего компьютера в I2P откроется и будет готов к использованию через пару минут после выполнения этой команды."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:141
 msgid ""
 "Point your regular web browser (ie, not the one you configured to use "
 "localhost:4444), and point it to <a href=\"http://localhost:10888\" "
 "target=\"_blank\">http://localhost:10888</a>"
-msgstr ""
-"Зайдите браузером (не тем, который настроен использовать localhost:4444) "
-"на <a href=\"http://localhost:10888\" "
-"target=\"_blank\">http://localhost:10888</a>"
+msgstr "Зайдите браузером (не тем, который настроен использовать localhost:4444) на <a href=\"http://localhost:10888\" target=\"_blank\">http://localhost:10888</a>"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:144
 msgid ""
 "Verify that the main page of your server eventually comes up in your "
 "browser."
-msgstr ""
-"Удостоверьтесь, что главная страница вашего сервера отображается в "
-"браузере."
+msgstr "Удостоверьтесь, что главная страница вашего сервера отображается в браузере."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:147
 msgid ""
-"You use the same procedure for using any local client program to access a"
-" remote I2P server - just get the base64 public key (called destination "
-"key) of the remote server, choose a local port to connect to the remote "
-"server, open the tunnel, and just connect with your client to your "
-"heart's content."
-msgstr ""
-"Использование локальных клиентских программ для доступа к удаленному "
-"серверу I2P ничем не отличается от обычной процедуры: получаете открытый "
-"ключ удаленного сервера в виде base64 (ключ адреса назначения), выбираете"
-" локальный порт для соединения с удаленным сервером, открываете туннель, "
-"просто подсоединяетесь клиентской программой и получаете доступ к вашему "
-"любимому контенту."
+"You use the same procedure for using any local client program to access a "
+"remote I2P server - just get the base64 public key (called destination key) "
+"of the remote server, choose a local port to connect to the remote server, "
+"open the tunnel, and just connect with your client to your heart's content."
+msgstr "Использование локальных клиентских программ для доступа к удаленному серверу I2P ничем не отличается от обычной процедуры: получаете открытый ключ удаленного сервера в виде base64 (ключ адреса назначения), выбираете локальный порт для соединения с удаленным сервером, открываете туннель, просто подсоединяетесь клиентской программой и получаете доступ к вашему любимому контенту."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:152
 msgid "7 - Share your server details with others"
@@ -645,44 +465,26 @@ msgstr "7 - Поделитесь адресом вашего сервера"
 msgid ""
 "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's "
 "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. "
-"Others will then be able to reach your server remotely, without either of"
-" you jeopardizing your anonymity."
-msgstr ""
-"Используя анонимные средства (например, один из I2P IRC-серверов или "
-"ugha's wiki), сообщите доменное имя (например, <a "
-"href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a> "
-"вместе с ключом адреса назначения. После этого другие пользователи смогут"
-" соединиться с вашим сервером без риска для вашей и их анонимности."
+"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others"
+" will then be able to reach your server remotely, without either of you "
+"jeopardizing your anonymity."
+msgstr "Используя анонимные средства (например, один из I2P IRC-серверов или ugha's wiki), сообщите доменное имя (например, <a href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a> вместе с ключом адреса назначения. После этого другие пользователи смогут соединиться с вашим сервером без риска для вашей и их анонимности."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:157
 msgid ""
-"Remember, you can go to What's on I2P and find the latest public keys "
-"linked to their URL. You should also post your own public key and URL "
-"their. However, you will want to do this anonymously, of course. "
-"Drupal.i2p.net is currently, as of this writing, only accessible from the"
-" net. So, to access the outside WWW anonymously from inside of I2P, you "
-"will need to start up your script called startSquid. Do it the same way "
-"you have been doing these other scripts. Reconfigure your browser to "
-"proxy on localhost:5555, as defined in the script, and when the script "
-"has generated it's keys, you can access the squid proxy. Put any WWW URL "
-"(such as Google or this i2p site) into your browser's address bar and you"
-" will be surfing the World Wide Web anonymously. Now you can safely post "
-"your public key, and no one can detect your IP address."
-msgstr ""
-"Помните, что вы можете зайти на What's on I2P и найти самые последние "
-"публичные ключи, привязанные к URL. Вы также должны разместить там свои "
-"публичный ключи и URL. Разумеется, вы захотите сделать это анонимно. "
-"Drupal.i2p.net в настоящее время, по состоянию на момент написания этого "
-"текста, доступен только из сети. Таким образом, для того чтобы получить "
-"доступ к внешней сети WWW анонимно из внутренней I2P, вам придется "
-"запустить ваш скрипт под названием startSquid. Сделайте это таким же "
-"образом, как вы делали другие скрипты. Перенастройте свой браузер на "
-"прокси localhost:5555, как определено в скрипте, и когда скрипт "
-"сгенерирует свои ключи, вы сможете получить доступ к прокси-приманке. "
-"Вставьте любой URL (например, Google или этот i2p-сайт) в адресную строку"
-" браузера и вы будете серфить в интернете анонимно. Сейчас вы можете "
-"безопасно указывать ваш публичный ключ, и никто не узнает ваш IP-адрес."
+"Remember, you can go to What's on I2P and find the latest public keys linked"
+" to their URL. You should also post your own public key and URL their. "
+"However, you will want to do this anonymously, of course. Drupal.i2p.net is "
+"currently, as of this writing, only accessible from the net. So, to access "
+"the outside WWW anonymously from inside of I2P, you will need to start up "
+"your script called startSquid. Do it the same way you have been doing these "
+"other scripts. Reconfigure your browser to proxy on localhost:5555, as "
+"defined in the script, and when the script has generated it's keys, you can "
+"access the squid proxy. Put any WWW URL (such as Google or this i2p site) "
+"into your browser's address bar and you will be surfing the World Wide Web "
+"anonymously. Now you can safely post your public key, and no one can detect "
+"your IP address."
+msgstr "Помните, что вы можете зайти на What's on I2P и найти самые последние публичные ключи, привязанные к URL. Вы также должны разместить там свои публичный ключи и URL. Разумеется, вы захотите сделать это анонимно. Drupal.i2p.net в настоящее время, по состоянию на момент написания этого текста, доступен только из сети. Таким образом, для того чтобы получить доступ к внешней сети WWW анонимно из внутренней I2P, вам придется запустить ваш скрипт под названием startSquid. Сделайте это таким же образом, как вы делали другие скрипты. Перенастройте свой браузер на прокси localhost:5555, как определено в скрипте, и когда скрипт сгенерирует свои ключи, вы сможете получить доступ к прокси-приманке. Вставьте любой URL (например, Google или этот i2p-сайт) в адресную строку браузера и вы будете серфить в интернете анонимно. Сейчас вы можете безопасно указывать ваш публичный ключ, и никто не узнает ваш IP-адрес."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:162
 msgid "8 - Write Some Scripts To Handle All This Menial Nonsense"
@@ -690,11 +492,9 @@ msgstr "8 - Написать скрипты, чтобы справиться с
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:164
 msgid ""
-"It would drive most people crazy, going through all these steps every "
-"time one sets up an I2P server, and/or deploys a client."
-msgstr ""
-"Если проходить через эти шаги каждый раз, когда вы настраиваете I2P "
-"сервер или развертываете клиент, то можно сойти с ума."
+"It would drive most people crazy, going through all these steps every time "
+"one sets up an I2P server, and/or deploys a client."
+msgstr "Если проходить через эти шаги каждый раз, когда вы настраиваете I2P сервер или развертываете клиент, то можно сойти с ума."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:167
 msgid ""
@@ -702,45 +502,29 @@ msgid ""
 "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called "
 "setupServer.py which automates all this nonsense into one simple command "
 "line . But I respect that people's tastes in user interfaces differ, and "
-"trying to write something which satisfies everyone's needs usually "
-"results in something so complex that it turns into newbie-repellent."
-msgstr ""
-"Сайт Aum <a href=\"http://www.freenet.org.nz/i2p/\" "
-"target=\"_blank\">http://www.freenet.org.nz/i2p/</a> содержит скрипт "
-"setupServer.py, который автоматизирует все эти шаги в одной командной "
-"строке. Но я уважаю, что представления людей об интерфейсах отличаются, и"
-" попытка написать что-то удовлетворяющее всем требованиям обычно приводит"
-" к громоздким и непонятным вещам, которые отпугивают новичков."
+"trying to write something which satisfies everyone's needs usually results "
+"in something so complex that it turns into newbie-repellent."
+msgstr "Сайт Aum <a href=\"http://www.freenet.org.nz/i2p/\" target=\"_blank\">http://www.freenet.org.nz/i2p/</a> содержит скрипт setupServer.py, который автоматизирует все эти шаги в одной командной строке. Но я уважаю, что представления людей об интерфейсах отличаются, и попытка написать что-то удовлетворяющее всем требованиям обычно приводит к громоздким и непонятным вещам, которые отпугивают новичков."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:170
 msgid ""
 "So please feel free to use and/or customize setupServer.py to taste, or "
 "write your own in Python or another language."
-msgstr ""
-"Пожалуйста, свободно пользуйтесь и подстраивайте на свой вкус "
-"setupServer.py или напишите свой собственный на Python или другом языке."
+msgstr "Пожалуйста, свободно пользуйтесь и подстраивайте на свой вкус setupServer.py или напишите свой собственный на Python или другом языке."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:173
 msgid ""
-"Also, you may want to write a script which handles the startup of the I2P"
-" Router, the eepProxy, plus any and all tunnels you are using. I've got "
-"such a script called startEverything.sh, which gets launched at system "
-"startup. (Be sure to search this site for template scripts to automate "
-"your I2P commands. If I create a page for one, I'll try to remember to "
-"link it here."
-msgstr ""
-"Также вы можете захотеть написать скрипт, который управляет загрузкой "
-"маршрутизатора I2P, eepProxy, а также используемыми вами туннелями. У "
-"меня есть такой скрипт, называется startEverything.sh, загружается при "
-"входе в систему. (Не забудьте найти на сайте шаблоны скриптов для "
-"автоматизации команд I2P. Если я создам для них страницы, то постараюсь "
-"указать здесь ссылки."
+"Also, you may want to write a script which handles the startup of the I2P "
+"Router, the eepProxy, plus any and all tunnels you are using. I've got such "
+"a script called startEverything.sh, which gets launched at system startup. "
+"(Be sure to search this site for template scripts to automate your I2P "
+"commands. If I create a page for one, I'll try to remember to link it here."
+msgstr "Также вы можете захотеть написать скрипт, который управляет загрузкой маршрутизатора I2P, eepProxy, а также используемыми вами туннелями. У меня есть такой скрипт, называется startEverything.sh, загружается при входе в систему. (Не забудьте найти на сайте шаблоны скриптов для автоматизации команд I2P. Если я создам для них страницы, то постараюсь указать здесь ссылки."
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:176
-msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
-msgstr ""
-"Упражнение для пользователей Windows: перенести setupServer.py в файл MS-"
-"DOS .BAT"
+msgid ""
+"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
+msgstr "Упражнение для пользователей Windows: перенести setupServer.py в файл MS-DOS .BAT"
 
 #: i2p2www/pages/site/misc/invisiblenet.html:2
 msgid "Old Documents"
@@ -748,19 +532,12 @@ msgstr "Старые документы"
 
 #: i2p2www/pages/site/misc/invisiblenet.html:5
 msgid ""
-"Following is a list of documents originally on www.invisiblenet.net/i2p/ "
-"and\n"
+"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n"
 "rescued via the\n"
 "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
 "They are quite dated and may or may not be accurate.\n"
-"However, the I2CP and I2NP documents in particular have some good "
-"information."
-msgstr ""
-"Ниже следует список документов, изначально расположенных по адресу "
-"www.invisiblenet.net/i2p/ и сохраненных в <a "
-"href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
-"Они довольно старые и могут быть или не быть точными.\n"
-"Однако, документация о I2CP и I2NP содержит много полезной информации."
+"However, the I2CP and I2NP documents in particular have some good information."
+msgstr "Ниже следует список документов, изначально расположенных по адресу www.invisiblenet.net/i2p/ и сохраненных в <a href=\"http://www.archive.org/\">Wayback Machine</a>.\nОни довольно старые и могут быть или не быть точными.\nОднако, документация о I2CP и I2NP содержит много полезной информации."
 
 #: i2p2www/pages/site/misc/jbigi.html:3
 msgid "August 2011"
@@ -772,15 +549,10 @@ msgstr "Обзор"
 
 #: i2p2www/pages/site/misc/jbigi.html:7
 msgid ""
-"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a "
-"little\n"
+"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n"
 "manual work and a piece of chewing gum we have made several\n"
 "cryptography operations quite a bit faster."
-msgstr ""
-"При помощи JNI (Java Native Interface), небольшого кода на C (спасибо, "
-"ugha!), небольшого\n"
-"количества ручной работы и кусочка жвачки мы заставили некоторые\n"
-"криптографические операции работать немного быстрее."
+msgstr "При помощи JNI (Java Native Interface), небольшого кода на C (спасибо, ugha!), небольшого\nколичества ручной работы и кусочка жвачки мы заставили некоторые\nкриптографические операции работать немного быстрее."
 
 #: i2p2www/pages/site/misc/jbigi.html:13
 #, python-format
@@ -791,41 +563,21 @@ msgid ""
 "<a href=\"%(func)s\">mpz_powm()</a>\n"
 "as a replacement for the\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n"
-"As modPow() is a significant computational portion of many crypto "
-"operations, this is of significant benefit."
-msgstr ""
-"Ускорения удалось достичь за счёт использования\n"
-"<a href=\"%(gmplib)s\">библиотеки GNU MP Bignum (libgmp)</a>.\n"
-"Мы используем одну функцию из libgmp -\n"
-"<a href=\"%(func)s\">mpz_powm()</a>\n"
-"как замену для\n"
-"<a href=\"%(bigint)s\">функции modPow() из библиотеки Java Math "
-"BigInteger</a>.\n"
-"А так как значительная часть вычислений использует modPow() - это "
-"позволило неплохо ускориться."
+"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit."
+msgstr "Ускорения удалось достичь за счёт использования\n<a href=\"%(gmplib)s\">библиотеки GNU MP Bignum (libgmp)</a>.\nМы используем одну функцию из libgmp -\n<a href=\"%(func)s\">mpz_powm()</a>\nкак замену для\n<a href=\"%(bigint)s\">функции modPow() из библиотеки Java Math BigInteger</a>.\nА так как значительная часть вычислений использует modPow() - это позволило неплохо ускориться."
 
 #: i2p2www/pages/site/misc/jbigi.html:25
 #, python-format
 msgid ""
-"The standard I2P installation includes about 20 versions of the library "
-"for different platforms,\n"
+"The standard I2P installation includes about 20 versions of the library for different platforms,\n"
 "each about 50KB, inside the jbigi.jar file.\n"
-"The initialization of the JBigI library, including CPU identification, "
-"selection, and extraction\n"
+"The initialization of the JBigI library, including CPU identification, selection, and extraction\n"
 "of the correct loadable module, is handled by the\n"
 "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n"
 "If no module is available for the current platform, the standard\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>\n"
 "is used."
-msgstr ""
-"Стандартная поставка I2P содержит около 20 версий библиотеки для разных "
-"платформ, каждая около 50КБ, в файле jbigi.jar.\n"
-"Инициализация библиотеки JBigI, включая идентификацию CPU, выбор и "
-"извлечение подходящего загрузочного модуля, управляется <a "
-"href=\"%(nativebigint)s\">классом NativeBigInteger</a>.\n"
-"Если модуль недоступен для текущей платформы, то используется стандартная"
-" функция <a href=\"%(bigint)s\">BigInteger modPow() из библиотеки Java "
-"Math</a>."
+msgstr "Стандартная поставка I2P содержит около 20 версий библиотеки для разных платформ, каждая около 50КБ, в файле jbigi.jar.\nИнициализация библиотеки JBigI, включая идентификацию CPU, выбор и извлечение подходящего загрузочного модуля, управляется <a href=\"%(nativebigint)s\">классом NativeBigInteger</a>.\nЕсли модуль недоступен для текущей платформы, то используется стандартная функция <a href=\"%(bigint)s\">BigInteger modPow() из библиотеки Java Math</a>."
 
 #: i2p2www/pages/site/misc/jbigi.html:38
 msgid "Rebuilding and Testing JBigI"
@@ -833,12 +585,9 @@ msgstr "Пересборка и Тестирование JBigI"
 
 #: i2p2www/pages/site/misc/jbigi.html:39
 msgid ""
-"Following are the instructions to build a new jbigi library for your own "
-"platform\n"
+"Following are the instructions to build a new jbigi library for your own platform\n"
 "and testing its performance."
-msgstr ""
-"Ниже приведены инструкции для сборки новой библиотеки jbigi для вашей "
-"платформы и тестирования её производительности "
+msgstr "Ниже приведены инструкции для сборки новой библиотеки jbigi для вашей платформы и тестирования её производительности "
 
 #: i2p2www/pages/site/misc/jbigi.html:42
 msgid "Requirements"
@@ -847,50 +596,28 @@ msgstr "Требования"
 #: i2p2www/pages/site/misc/jbigi.html:43
 msgid ""
 "This works on Linux, and with a few changes in build.sh probably also on\n"
-"other platforms. FreeBSD has also been reported to work too. On Kaffee "
-"the\n"
-"speedup is very small, because it already uses native BitInteger "
-"internally.\n"
+"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n"
+"speedup is very small, because it already uses native BitInteger internally.\n"
 "Blackdown seems to cause strange errors. Because you are going to do\n"
 "compilation, you need JDK; JRE won't work."
-msgstr ""
-"Это работает на Linux, а с небольшими изменениями в build.sh, вероятно, и"
-" на других платформах. Сообщается, что работает в том числе и на FreeBSD."
-" На Kaffee ускорение незначительно, так как там уже используется нативный"
-" BigInteger.\n"
-"Blackdown похоже вызывает странные ошибки. Так как вам потребуется "
-"компилировать, необходимо иметь JDK; с JRE не выйдет."
+msgstr "Это работает на Linux, а с небольшими изменениями в build.sh, вероятно, и на других платформах. Сообщается, что работает в том числе и на FreeBSD. На Kaffee ускорение незначительно, так как там уже используется нативный BigInteger.\nBlackdown похоже вызывает странные ошибки. Так как вам потребуется компилировать, необходимо иметь JDK; с JRE не выйдет."
 
 #: i2p2www/pages/site/misc/jbigi.html:50
 msgid ""
-"The required code is available in monotone database and the latest source"
-" tarball. "
-msgstr ""
-"Необходимый код доступен в бд monotone и последнем архиве с исходным "
-"кодом."
+"The required code is available in monotone database and the latest source "
+"tarball. "
+msgstr "Необходимый код доступен в бд monotone и последнем архиве с исходным кодом."
 
 #: i2p2www/pages/site/misc/jbigi.html:51
 msgid ""
 "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n"
-"included in your OS / distribution or installed already, it can be "
-"received from\n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Even if you\n"
-"have already installed it as binary, it might still be worth a try to "
-"compile\n"
-"GMP yourself, since then it will be able to use the specific instructions"
-" of\n"
+"included in your OS / distribution or installed already, it can be received from\n"
+"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n"
+"have already installed it as binary, it might still be worth a try to compile\n"
+"GMP yourself, since then it will be able to use the specific instructions of\n"
 "your processor. The latest GMP may also\n"
 "be used instead of GMP 5.0.2, but it hasn't been tested by us."
-msgstr ""
-"Требуется установка библиотеки GNU MP Bignum (libgmp), если она не "
-"включена в вашу ОС/дистрибутив или не установлена ранее, то её можно "
-"загрузить с <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Даже если вы установили её ранее, может быть стоит скомпилировать GMP "
-"самостоятельно, чтобы можно было использовать специфичные инструкции "
-"вашего процессора. Также можно использовать последнюю версию GMP вместо "
-"версии GMP 5.0.2, но мы ещё не проводили тестирование."
+msgstr "Требуется установка библиотеки GNU MP Bignum (libgmp), если она не включена в вашу ОС/дистрибутив или не установлена ранее, то её можно загрузить с <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Даже если вы установили её ранее, может быть стоит скомпилировать GMP самостоятельно, чтобы можно было использовать специфичные инструкции вашего процессора. Также можно использовать последнюю версию GMP вместо версии GMP 5.0.2, но мы ещё не проводили тестирование."
 
 #: i2p2www/pages/site/misc/jbigi.html:61
 msgid "Step-by-step instructions"
@@ -898,19 +625,13 @@ msgstr "Пошаговые инструкции"
 
 #: i2p2www/pages/site/misc/jbigi.html:63
 msgid ""
-"Look at <a href=\"http://localhost:7657/logs.jsp\">your running "
-"environment on the logs.jsp page</a>.\n"
+"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n"
 "There should be one of two status messages for JBigI - either"
-msgstr ""
-"Посмотрите на <a href=\"http://localhost:7657/logs.jsp\">вашу среду "
-"выполнения на странице logs.jsp</a>. Там должно быть одно из двух "
-"сообщений о статусе JBigI, любое."
+msgstr "Посмотрите на <a href=\"http://localhost:7657/logs.jsp\">вашу среду выполнения на странице logs.jsp</a>. Там должно быть одно из двух сообщений о статусе JBigI, любое."
 
 #: i2p2www/pages/site/misc/jbigi.html:66
 msgid "Locally optimized native BigInteger loaded from the library path"
-msgstr ""
-"Локально оптимизированная нативная библиотека BigInteger загружена по "
-"указанному пути"
+msgstr "Локально оптимизированная нативная библиотека BigInteger загружена по указанному пути"
 
 #: i2p2www/pages/site/misc/jbigi.html:68
 msgid "or"
@@ -928,53 +649,26 @@ msgid ""
 "may require you to compile your own library.\n"
 "If the BigInteger library was loaded, do at least the next step to see\n"
 "what your performance is."
-msgstr ""
-"Если нативная библиотека BigInteger НЕ была загружена, то вам определенно"
-" нужно скомпилировать свою. \n"
-"Некоторые платформы, такие как OS X, OpenSolaris и 64-битные системы, "
-"могут потребовать компиляцию своей собственной библиотеки. \n"
-"Если библиотека BigInteger была загружена, проделайте хотя бы следующий "
-"шаг, чтобы определить производительность."
+msgstr "Если нативная библиотека BigInteger НЕ была загружена, то вам определенно нужно скомпилировать свою. \nНекоторые платформы, такие как OS X, OpenSolaris и 64-битные системы, могут потребовать компиляцию своей собственной библиотеки. \nЕсли библиотека BigInteger была загружена, проделайте хотя бы следующий шаг, чтобы определить производительность."
 
 #: i2p2www/pages/site/misc/jbigi.html:78
 msgid ""
-"Look on <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"to see what the lifetime average values for "
-"<code>crypto.elGamal.decrypt</code> and\n"
-"<code>crypto.elGamal.encrypt</code> are. The numbers are times in "
-"milliseconds. Copy these somewhere so you can compare\n"
+"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n"
+"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n"
 "them later on.\n"
 "The network average for encrypt time is about 20ms.\n"
-"If your encrypt time is less than 50ms for a relatively new processor, or"
-" less than 100ms\n"
-"for an older processor, and the native BigInteger library was loaded, you"
-" are probably fine."
-msgstr ""
-"Зайдите на <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>,"
-" чтобы увидеть среднее время существования значений для "
-"<code>crypto.elGamal.decrypt</code> и "
-"<code>crypto.elGamal.encrypt</code>. Значения указаны в миллисекундах. "
-"Скопируйте значения куда-нибудь так, чтобы вы могли сравнить с ними "
-"позже. \n"
-"Среднее время для шифрования в сети — около 20мс.\n"
-"Если время шифрования менее 50мс для достаточно нового процессора или "
-"менее 100мс для старого, нативная библиотека BigInteger загружена, то у "
-"вас, вероятно, всё в порядке."
+"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n"
+"for an older processor, and the native BigInteger library was loaded, you are probably fine."
+msgstr "Зайдите на <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>, чтобы увидеть среднее время существования значений для <code>crypto.elGamal.decrypt</code> и <code>crypto.elGamal.encrypt</code>. Значения указаны в миллисекундах. Скопируйте значения куда-нибудь так, чтобы вы могли сравнить с ними позже. \nСреднее время для шифрования в сети — около 20мс.\nЕсли время шифрования менее 50мс для достаточно нового процессора или менее 100мс для старого, нативная библиотека BigInteger загружена, то у вас, вероятно, всё в порядке."
 
 #: i2p2www/pages/site/misc/jbigi.html:87
 #, python-format
 msgid ""
 "Get the latest released source code of I2P from\n"
-"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge "
-"source\n"
+"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n"
 "out of the monotone database mtn.i2p2.de"
-msgstr ""
-"Скачайте последний выпущенный исходный код I2P на <a "
-"href=\"%(downloads)s\">странице загрузок</a> или из бд monotone "
-"mtn.i2p2.de"
+msgstr "Скачайте последний выпущенный исходный код I2P на <a href=\"%(downloads)s\">странице загрузок</a> или из бд monotone mtn.i2p2.de"
 
 #: i2p2www/pages/site/misc/jbigi.html:92
 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>"
@@ -986,62 +680,30 @@ msgid ""
 "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n"
 "Use the 'dynamic' argument to build.sh.\n"
 "Otherwise, you must download GMP version 5.0.2 from\n"
-"from <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"saving it to gmp-5.0.2.tar.bz2.\n"
-"If you decide to use a newer version, change the VER= line in "
-"<code>core/c/jbigi/build.sh</code>."
-msgstr ""
-"Прочитайте файл README.\n"
-"Если у вас есть файл /usr/lib/libgmp.so, то скачивать GMP не требуется.\n"
-"Используйте параметр 'dynamic' для build.sh.\n"
-"В противном случае вам необходимо скачать GMP версии 5.0.2 с <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"сохранив как gmp-5.0.2.tar.bz2.\n"
-"Если вы решите использовать более новую версию, то измените параметр VER="
-" в файле <code>core/c/jbigi/build.sh</code>."
+"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n"
+"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>."
+msgstr "Прочитайте файл README.\nЕсли у вас есть файл /usr/lib/libgmp.so, то скачивать GMP не требуется.\nИспользуйте параметр 'dynamic' для build.sh.\nВ противном случае вам необходимо скачать GMP версии 5.0.2 с <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, сохранив как gmp-5.0.2.tar.bz2.\nЕсли вы решите использовать более новую версию, то измените параметр VER= в файле <code>core/c/jbigi/build.sh</code>."
 
 #: i2p2www/pages/site/misc/jbigi.html:101
 msgid ""
 "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n"
-"environment variable is set and you are using Linux then it might just "
-"work.\n"
+"environment variable is set and you are using Linux then it might just work.\n"
 "Otherwise change the settings. Remember, you need the Java SDK installed."
-msgstr ""
-"Просмотрите <code>build.sh</code>, если переменная окружения "
-"<code>JAVA_HOME</code> установлена и вы используете Linux, то всё это "
-"может успешно работать.\n"
-"Иначе измените настройки. Не забудьте, что требуется наличие "
-"установленного Java SDK."
+msgstr "Просмотрите <code>build.sh</code>, если переменная окружения <code>JAVA_HOME</code> установлена и вы используете Linux, то всё это может успешно работать.\nИначе измените настройки. Не забудьте, что требуется наличие установленного Java SDK."
 
 #: i2p2www/pages/site/misc/jbigi.html:106
 msgid ""
 "Run <code>build.sh</code> (if you downloaded GMP) or\n"
 "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n"
-"Maybe the build spewed out some errors of missing jni.h and jni_md.h "
-"files.\n"
-"Either copy these files from your java install into the "
-"core/c/jbigi/jbigi/include/ directory,\n"
+"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n"
+"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n"
 "or fix $JAVA_HOME.<br>\n"
-"You can run the <code>build.sh</code> from the <code>core/c/</code> "
-"directory which will\n"
+"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n"
 "build all available jbigi libs into a jbigi.jar.</br>\n"
 "A file named <code>libjbigi.so</code> should be created in the current\n"
-"directory. If this doesn't happen and/or you get errors then please "
-"report\n"
+"directory. If this doesn't happen and/or you get errors then please report\n"
 "them."
-msgstr ""
-"Выполните <code>build.sh</code> (если вы скачивали GMP) или\n"
-"<code>build.sh dynamic</code> (если у вас есть /usr/lib/libgmp.so).<br/>\n"
-"Возможно, скрипт выдаст ошибки об отсутствии файлов jni.h и jni_md.h.\n"
-"Или скопируйте эти файлы из установки java в директорию "
-"core/c/jbigi/jbigi/include/, или исправьте $JAVA_HOME.<br>\n"
-"Вы можете запустить <code>build.sh</code> из директории "
-"<code>core/c/</code>, в результате будет выполнена сборка всех доступных "
-"библиотек jbigi в jbigi.jar.</br>\n"
-"В текущей директории должен быть создан файл <code>libjbigi.so</code>. "
-"Если этого не произойдет и/или будут сообщения об ошибках, пожалуйста, "
-"расскажите нам об этом."
+msgstr "Выполните <code>build.sh</code> (если вы скачивали GMP) или\n<code>build.sh dynamic</code> (если у вас есть /usr/lib/libgmp.so).<br/>\nВозможно, скрипт выдаст ошибки об отсутствии файлов jni.h и jni_md.h.\nИли скопируйте эти файлы из установки java в директорию core/c/jbigi/jbigi/include/, или исправьте $JAVA_HOME.<br>\nВы можете запустить <code>build.sh</code> из директории <code>core/c/</code>, в результате будет выполнена сборка всех доступных библиотек jbigi в jbigi.jar.</br>\nВ текущей директории должен быть создан файл <code>libjbigi.so</code>. Если этого не произойдет и/или будут сообщения об ошибках, пожалуйста, расскажите нам об этом."
 
 #: i2p2www/pages/site/misc/jbigi.html:118
 msgid ""
@@ -1049,19 +711,13 @@ msgid ""
 "the speed test.\n"
 "Read the final lines of the speed test's output for some additional\n"
 "info, it will be something like this:"
-msgstr ""
-"Для установки библиотеки и запуска теста скорости следуйте инструкциям в "
-"core/c/README.\n"
-"Прочитайте последние строки результата теста для дополнительной "
-"информации, они будут похожи на:"
+msgstr "Для установки библиотеки и запуска теста скорости следуйте инструкциям в core/c/README.\nПрочитайте последние строки результата теста для дополнительной информации, они будут похожи на:"
 
 #: i2p2www/pages/site/misc/jbigi.html:128
 msgid ""
 "If the native is indeed 5-7x faster (or more) then it looks all good. If "
 "not, please report."
-msgstr ""
-"Если нативная библиотека действительно в 5-7 раз быстрее (или более), то "
-"всё хорошо. Иначе сообщите нам."
+msgstr "Если нативная библиотека действительно в 5-7 раз быстрее (или более), то всё хорошо. Иначе сообщите нам."
 
 #: i2p2www/pages/site/misc/jbigi.html:129
 msgid "Copy <code>libjbigi.so</code> to your i2p directory"
@@ -1073,17 +729,10 @@ msgstr "Перезапустите приложения I2P."
 
 #: i2p2www/pages/site/misc/jbigi.html:131
 msgid ""
-"On <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"the <code>crypto.elGamal.decrypt</code> and "
-"<code>crypto.elGamal.encrypt</code>\n"
+"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n"
 "should be a lot faster."
-msgstr ""
-"На странице <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-" <code>crypto.elGamal.decrypt</code> и "
-"<code>crypto.elGamal.encrypt</code> должны быть гораздо быстрее."
+msgstr "На странице <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> <code>crypto.elGamal.decrypt</code> и <code>crypto.elGamal.encrypt</code> должны быть гораздо быстрее."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:2
 msgid "Jrandom's Announcement"
@@ -1091,42 +740,28 @@ msgstr "Объявление Jrandom'а"
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:4
 msgid ""
-"The following message was received in mid-November 2007. We have no "
-"further information\n"
+"The following message was received in mid-November 2007. We have no further information\n"
 "on jrandom's status."
-msgstr ""
-"Представленное ниже сообщение было получено в середине ноября 2007. Мы не"
-" располагаем никакой дополнительной информацией\n"
-"о jrandom'е."
+msgstr "Представленное ниже сообщение было получено в середине ноября 2007. Мы не располагаем никакой дополнительной информацией\nо jrandom'е."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:9
 #, python-format
 msgid ""
 "Subsequently, in an unrelated incident, the hosting company for\n"
 "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n"
-"on January 13, 2008, and the i2p.net servers did not fully return to "
-"service.\n"
+"on January 13, 2008, and the i2p.net servers did not fully return to service.\n"
 "As only jrandom has the credentials required to restore service,\n"
 "and he could not be contacted,\n"
 "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n"
 "and related subdomains."
-msgstr ""
-"Позже, в не связанном с этим происшествии, хостинговая компания всех "
-"серверов *.i2p.net (кроме forum.i2p.net) пострадала от отключения питания"
-" 13 января 2008 года, и i2p.net сервера восстановили функционирование не "
-"в полной мере. \n"
-"Так как только jrandom имел необходимый для восстановления сервисов "
-"доступ, а с ним невозможно связаться, мы перенесли все публичные сервисы "
-"на <a href=\"%(site)s\">www.i2p2.de</a> и связанные с ним поддомены."
+msgstr "Позже, в не связанном с этим происшествии, хостинговая компания всех серверов *.i2p.net (кроме forum.i2p.net) пострадала от отключения питания 13 января 2008 года, и i2p.net сервера восстановили функционирование не в полной мере. \nТак как только jrandom имел необходимый для восстановления сервисов доступ, а с ним невозможно связаться, мы перенесли все публичные сервисы на <a href=\"%(site)s\">www.i2p2.de</a> и связанные с ним поддомены."
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:19
 #, python-format
 msgid ""
 "Approximately two months later, for unrelated reasons,\n"
 "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>."
-msgstr ""
-"Спустя примерно два месяца по несвязанным причинам forum.i2p.net переехал"
-" на <a href=\"http://%(forum)s/\">%(forum)s</a>."
+msgstr "Спустя примерно два месяца по несвязанным причинам forum.i2p.net переехал на <a href=\"http://%(forum)s/\">%(forum)s</a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:2
 #: i2p2www/pages/site/misc/manual-wrapper.html:4
@@ -1136,60 +771,35 @@ msgstr "Установка Java Wrapper вручную"
 #: i2p2www/pages/site/misc/manual-wrapper.html:6
 #, python-format
 msgid ""
-"The installation package for the <a href=\"%(downloads)s\">I2P router</a>"
-" comes\n"
-"with a Java wrapper for the most common architectures. If your system is "
-"not\n"
-"supported by our installer&mdash;or if you want to update the wrapper to "
-"a\n"
-"newer version&mdash;the following steps describe installing the wrapper "
-"manually."
-msgstr ""
-"Пакет установки для <a href=\"%(downloads)s\">маршрутизатора I2P</a> "
-"поставляется вместе с Java Wrapper для большинства распространенных "
-"архитектур. Если ваша система не поддерживается нашим инсталлятором "
-"&mdash; или вы хотите обновить Wrapper до более новой версии &mdash; "
-"следующие шаги описывают процесс установки Java Wrapper вручную."
+"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n"
+"with a Java wrapper for the most common architectures. If your system is not\n"
+"supported by our installer&mdash;or if you want to update the wrapper to a\n"
+"newer version&mdash;the following steps describe installing the wrapper manually."
+msgstr "Пакет установки для <a href=\"%(downloads)s\">маршрутизатора I2P</a> поставляется вместе с Java Wrapper для большинства распространенных архитектур. Если ваша система не поддерживается нашим инсталлятором &mdash; или вы хотите обновить Wrapper до более новой версии &mdash; следующие шаги описывают процесс установки Java Wrapper вручную."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:14
 msgid ""
-"Check Tanuki Software's <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download"
-" page</a>\n"
+"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n"
 "for your platform. Is your platform listed? If so, you're in\n"
-"luck! Download the most recent version of the Community Edition for your "
-"OS and\n"
+"luck! Download the most recent version of the Community Edition for your OS and\n"
 "CPU and move to <a href=\"#packaged\">the next step</a>."
-msgstr ""
-"Проверьте <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">страницу"
-" загрузки</a> Tanuki Software. Ваша платформа есть в списке? Если это "
-"так, то вам повезло! Скачайте последнюю версию Community Edition для "
-"вашей ОС и процессора и переходите к <a href=\"#packaged\">следующему "
-"шагу</a>."
+msgstr "Проверьте <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">страницу загрузки</a> Tanuki Software. Ваша платформа есть в списке? Если это так, то вам повезло! Скачайте последнюю версию Community Edition для вашей ОС и процессора и переходите к <a href=\"#packaged\">следующему шагу</a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:20
 msgid ""
-"If your platform does not have an already compiled wrapper available, you"
-"\n"
-"may be able to compile it yourself. If you are willing to have a go at "
-"it, move\n"
+"If your platform does not have an already compiled wrapper available, you\n"
+"may be able to compile it yourself. If you are willing to have a go at it, move\n"
 "on to <a href=\"#compiling\">compiling</a> the wrapper for your system."
-msgstr ""
-"Если для вашей платформы отсутствует скомпилированный Wrapper, то вы "
-"можете скомпилировать его самостоятельно. Если вы хотите попытаться "
-"сделать это, то переходите к шагу <a href=\"#compiling\">компиляции</a> "
-"для вашей системы."
+msgstr "Если для вашей платформы отсутствует скомпилированный Wrapper, то вы можете скомпилировать его самостоятельно. Если вы хотите попытаться сделать это, то переходите к шагу <a href=\"#compiling\">компиляции</a> для вашей системы."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:27
 msgid "Using existing binaries"
 msgstr "Использование готовых исполняемых файлов"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:28
-msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>."
-msgstr ""
-"В изложенных ниже шагах $I2P обозначает <em>путь, куда установили "
-"I2P</em>."
+msgid ""
+"In the steps below, $I2P means <em>the location I2P was installed to</em>."
+msgstr "В изложенных ниже шагах $I2P обозначает <em>путь, куда установили I2P</em>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:36
 #: i2p2www/pages/site/misc/manual-wrapper.html:64
@@ -1204,11 +814,9 @@ msgstr "<code>tail -f /tmp/wrapper.log</code> и посмотрите, нет л
 #: i2p2www/pages/site/misc/manual-wrapper.html:39
 #: i2p2www/pages/site/misc/manual-wrapper.html:67
 msgid ""
-"If this did not work you'll need to use <code>runplain.sh</code> to start"
-" I2P."
-msgstr ""
-"Если это не сработало - используйте <code>runplain.sh</code> для запуска "
+"If this did not work you'll need to use <code>runplain.sh</code> to start "
 "I2P."
+msgstr "Если это не сработало - используйте <code>runplain.sh</code> для запуска I2P."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:43
 msgid "Compiling from source"
@@ -1216,22 +824,16 @@ msgstr "Компиляция из исходников"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:44
 msgid ""
-"These steps worked to compile the wrapper for use on a mipsel system "
-"running Debian. The steps <strong>will</strong> need to be altered for "
-"your system."
-msgstr ""
-"Инструкция успешно протестирована на MIPS(EL) Debian. Инструкция "
-"<strong>дожна</strong> быть подстроена под вашу систему."
+"These steps worked to compile the wrapper for use on a mipsel system running"
+" Debian. The steps <strong>will</strong> need to be altered for your system."
+msgstr "Инструкция успешно протестирована на MIPS(EL) Debian. Инструкция <strong>дожна</strong> быть подстроена под вашу систему."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:48
 msgid ""
-"Download the source archive for the community version of the wrapper from"
-" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download"
-" page</a>."
-msgstr ""
-"Загрузите архив с исходным кодом Wrapper со <a "
-"href=\"http://wrapper.tanukisoftware.com/downloads\">страницы "
-"загрузок</a>."
+"Download the source archive for the community version of the wrapper from <a"
+" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download "
+"page</a>."
+msgstr "Загрузите архив с исходным кодом Wrapper со <a href=\"http://wrapper.tanukisoftware.com/downloads\">страницы загрузок</a>."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:49
 msgid "Extract the tarball"
@@ -1239,19 +841,15 @@ msgstr "Распакуйте tar-архив"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:51
 msgid ""
-"Set environment variables <code>ANT_HOME</code> and "
-"<code>JAVA_HOME</code>. For example, in Debian:"
-msgstr ""
-"Установите переменные окружения <code>ANT_HOME</code> и "
-"<code>JAVA_HOME</code>. Например, в Debian:"
+"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. "
+"For example, in Debian:"
+msgstr "Установите переменные окружения <code>ANT_HOME</code> и <code>JAVA_HOME</code>. Например, в Debian:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:54
 msgid ""
 "Since there isn't a Makefile for Mipsel, we'll make a copy of an already "
 "existing makefile:"
-msgstr ""
-"Так как Makefile для Mipsel отсутствует, то мы сделаем копию уже "
-"существующего файла:"
+msgstr "Так как Makefile для Mipsel отсутствует, то мы сделаем копию уже существующего файла:"
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:56
 msgid "Now we can attempt to compile the wrapper:"
@@ -1259,9 +857,7 @@ msgstr "Теперь мы можем попытаться скомпилиров
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:57
 msgid "use <code>./build64.sh</code> if you have a 64bit CPU and JVM"
-msgstr ""
-"используйте <code>./build64.sh</code>, если у вас 64-битный процессор и "
-"JVM."
+msgstr "используйте <code>./build64.sh</code>, если у вас 64-битный процессор и JVM."
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:58
 msgid "Copy the wrapper into its proper place:"
@@ -1281,273 +877,116 @@ msgid ""
 "in the router (but later versions of the SocketLibrary will be able to\n"
 "use selective ACK and large window sizes, allowing more ACKs to be\n"
 "skipped)"
-msgstr ""
-"Работа HTTP в I2P с использованием I2PTunnel. Когда база библиотеки "
-"SocketLibrary\n"
-"будет отделена, единственным существенным отличием будет то, что "
-"'wrapRequest' и\n"
-"'unwrapRequest' будут функционально располагаться в socketLibrary, а не\n"
-"в маршрутизаторе (но более поздние версии SocketLibrary могут\n"
-"использовать выборочные ACK и большие размеры окон, что позволит "
-"пропускать\n"
-"больше ACK)"
+msgstr "Работа HTTP в I2P с использованием I2PTunnel. Когда база библиотеки SocketLibrary\nбудет отделена, единственным существенным отличием будет то, что 'wrapRequest' и\n'unwrapRequest' будут функционально располагаться в socketLibrary, а не\nв маршрутизаторе (но более поздние версии SocketLibrary могут\nиспользовать выборочные ACK и большие размеры окон, что позволит пропускать\nбольше ACK)"
 
 #: i2p2www/pages/site/misc/minwww.html:47
 msgid ""
-"An optimized form, designed to handle only 128KB [1] files and pages, can"
-"\n"
+"An optimized form, designed to handle only 128KB [1] files and pages, can\n"
 "operate significantly faster:"
-msgstr ""
-"Оптимизированная форма, разработанная, чтобы обработать только 128 КБ [1]"
-" файлы и страницы, может\n"
-"работать значительно быстрее:"
+msgstr "Оптимизированная форма, разработанная, чтобы обработать только 128 КБ [1] файлы и страницы, может\nработать значительно быстрее:"
 
 #: i2p2www/pages/site/misc/minwww.html:71
 msgid ""
 "The difference in network load and latency is significant - this is\n"
-"essentially a UDP version of HTTP.  On the normal web, we can't really do"
-" that,\n"
-"since most HTTP requests and responses are orders of magnitude larger "
-"than UDP\n"
-"packets functionally support, but in I2P, messages can be large.  The "
-"savings\n"
-"for the network load comes from the fact that we don't need to send any "
-"ACK\n"
+"essentially a UDP version of HTTP.  On the normal web, we can't really do that,\n"
+"since most HTTP requests and responses are orders of magnitude larger than UDP\n"
+"packets functionally support, but in I2P, messages can be large.  The savings\n"
+"for the network load comes from the fact that we don't need to send any ACK\n"
 "messages - rather than the earlier wrap/unwrap request (that bundles a\n"
-"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery),"
-" the\n"
-"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there"
-" are no\n"
+"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n"
+"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n"
 "resends)."
-msgstr ""
-"Разница между загрузкой сети и задержками значительна - это,\n"
-"по сути, UDP версия HTTP. В обычной сети мы не можем этого сделать,\n"
-"так как большинство HTTP запросов и ответов в разы больше, чем UDP\n"
-"пакеты функционально поддерживают, но в I2P сообщения могут быть больше. "
-"Экономия на\n"
-"сетевой нагрузке происходит из-за отсутствия необходимости отправлять ACK"
-"\n"
-"сообщений - вместо раннего wrap/unwrap запроса (который связывает\n"
-"DataMessage с DeliveryStatusMessage для обеспечения гарантированной "
-"доставки),\n"
-"MinWWW прокси производит повторную отправку (если необходимо - на данный "
-"момент в I2PTunnels нет\n"
-"повторных отправок)."
+msgstr "Разница между загрузкой сети и задержками значительна - это,\nпо сути, UDP версия HTTP. В обычной сети мы не можем этого сделать,\nтак как большинство HTTP запросов и ответов в разы больше, чем UDP\nпакеты функционально поддерживают, но в I2P сообщения могут быть больше. Экономия на\nсетевой нагрузке происходит из-за отсутствия необходимости отправлять ACK\nсообщений - вместо раннего wrap/unwrap запроса (который связывает\nDataMessage с DeliveryStatusMessage для обеспечения гарантированной доставки),\nMinWWW прокси производит повторную отправку (если необходимо - на данный момент в I2PTunnels нет\nповторных отправок)."
 
 #: i2p2www/pages/site/misc/minwww.html:83
 msgid ""
-"The data that the MinWWW proxy and server need to wrap is trivial - when "
-"the\n"
-"proxy wants to send \"GET /\", it prepends it with the I2P Destination "
-"sending\n"
-"the request, followed by a 4 byte request ID.  The MinWWW server receives"
-" those\n"
-"requests, contacts the appropriate HTTPD, sends the request, waits for "
-"the\n"
+"The data that the MinWWW proxy and server need to wrap is trivial - when the\n"
+"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n"
+"the request, followed by a 4 byte request ID.  The MinWWW server receives those\n"
+"requests, contacts the appropriate HTTPD, sends the request, waits for the\n"
 "response, and sends a reply to the MinWWW proxy containing the response,\n"
-"prefixed with the original request ID.  That response is taken and passed"
-" back\n"
+"prefixed with the original request ID.  That response is taken and passed back\n"
 "to the browser and the connection is closed."
-msgstr ""
-"Данные, которые прокси-сервер MinWWW и сервер должны обернуть, тривиальны"
-" - когда\n"
-"прокси-сервер хочет отправить \"GET /\" запрос, он добавляет к нему I2P "
-"адрес назначения отправляющего\n"
-"запрос, за которым следует 4-байтовый идентификатор запроса. Сервер "
-"MinWWW получает эти\n"
-"запросы, обращается к соответствующему HTTPD, отправляет запрос, ожидает\n"
-"ответ, и отправляет ответ прокси-серверу MinWWW, содержащему запрос,\n"
-"с префиксом исходного идентификатора запроса. Этот ответ берется и "
-"передается\n"
-"браузеру, после чего соединение закрывается."
+msgstr "Данные, которые прокси-сервер MinWWW и сервер должны обернуть, тривиальны - когда\nпрокси-сервер хочет отправить \"GET /\" запрос, он добавляет к нему I2P адрес назначения отправляющего\nзапрос, за которым следует 4-байтовый идентификатор запроса. Сервер MinWWW получает эти\nзапросы, обращается к соответствующему HTTPD, отправляет запрос, ожидает\nответ, и отправляет ответ прокси-серверу MinWWW, содержащему запрос,\nс префиксом исходного идентификатора запроса. Этот ответ берется и передается\nбраузеру, после чего соединение закрывается."
 
 #: i2p2www/pages/site/misc/minwww.html:93
 msgid ""
 "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n"
-"list, going through some round robin or other algorithm, so that there "
-"are\n"
-"multiple outproxies merged transparently.  The bandwidth required for "
-"running\n"
-"one of these outproxies is also greatly reduced, since it will only "
-"handle 128KB\n"
+"list, going through some round robin or other algorithm, so that there are\n"
+"multiple outproxies merged transparently.  The bandwidth required for running\n"
+"one of these outproxies is also greatly reduced, since it will only handle 128KB\n"
 "files (aka no one is going to be downloading porn, warez, etc)."
-msgstr ""
-"В дополнение, прокси MinWWW может выбирать используемый сервер MinWWW из "
-"списка, по алгоритму round-robin или другому, чтобы прозрачно совмещать "
-"несколько выходных прокси.  Необходимая пропускная способность для "
-"запуска одного выходного прокси уменьшается, так как он должен "
-"обрабатывать только 128KB\n"
-"файлы (то есть никто не будет загружать порно, варез и т.д.)"
+msgstr "В дополнение, прокси MinWWW может выбирать используемый сервер MinWWW из списка, по алгоритму round-robin или другому, чтобы прозрачно совмещать несколько выходных прокси.  Необходимая пропускная способность для запуска одного выходного прокси уменьшается, так как он должен обрабатывать только 128KB\nфайлы (то есть никто не будет загружать порно, варез и т.д.)"
 
 #: i2p2www/pages/site/misc/minwww.html:101
 msgid ""
-"The functionality /is/ limited, but 128KB of data is a lot for a single "
-"HTTP\n"
-"request or response.  The above diagrams are also unrealistic in their "
-"hops -\n"
-"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send "
-"each\n"
-"of the messages through two additional outbound routers, then forwarded "
-"to\n"
-"two additional inbound routers to ROUTERB, so the lag there is "
-"significant -\n"
-"while the above only saves 11 steps, 8 of those steps need to traverse "
-"the\n"
-"entire tunnel path (4+ remote hops each time when tunnels are 2 remote "
-"hops\n"
-"in each stretch), leaving MinWWW with only two full traversals (one for "
-"the\n"
+"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n"
+"request or response.  The above diagrams are also unrealistic in their hops -\n"
+"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send each\n"
+"of the messages through two additional outbound routers, then forwarded to\n"
+"two additional inbound routers to ROUTERB, so the lag there is significant -\n"
+"while the above only saves 11 steps, 8 of those steps need to traverse the\n"
+"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n"
+"in each stretch), leaving MinWWW with only two full traversals (one for the\n"
 "request, one for the response), instead of 10."
-msgstr ""
-"Функциональность /is/ ограничена, но 128KB данных с запасом хватит для "
-"одного запроса или ответа\n"
-"HTTP.  Диаграммы выше нереалистичны в отображении хопов -\n"
-"ROUTERA никогда напрямую не свяжется с ROUTERB.  ROUTERA пошлет каждое\n"
-"из сообщений через два дополнительных выходных роутера, затем их перешлют"
-" на\n"
-"два дополнительных входных роутера на ROUTERB, так что задержка здесь "
-"существенна -\n"
-"хотя указанное выше сэкономит только 11 шагов, 8 из них нужны для обхода\n"
-"всего туннельного пути (каждый раз 4+ удаленных хопа при туннелях "
-"протяженностью 2 удаленных хопа), оставляя MinWWW только два обхода (один"
-" для запроса, один для ответа), вместо 10."
+msgstr "Функциональность /is/ ограничена, но 128KB данных с запасом хватит для одного запроса или ответа\nHTTP.  Диаграммы выше нереалистичны в отображении хопов -\nROUTERA никогда напрямую не свяжется с ROUTERB.  ROUTERA пошлет каждое\nиз сообщений через два дополнительных выходных роутера, затем их перешлют на\nдва дополнительных входных роутера на ROUTERB, так что задержка здесь существенна -\nхотя указанное выше сэкономит только 11 шагов, 8 из них нужны для обхода\nвсего туннельного пути (каждый раз 4+ удаленных хопа при туннелях протяженностью 2 удаленных хопа), оставляя MinWWW только два обхода (один для запроса, один для ответа), вместо 10."
 
 #: i2p2www/pages/site/misc/minwww.html:113
 msgid ""
-"Implementing the MinWWW proxy and server should be fairly easy - read an "
-"HTTP\n"
-"request from the client fully (perhaps only start out with HTTP GET, "
-"leaving\n"
-"HTTP POST for later), wrap the message, and wait for the response.  The "
-"server\n"
-"in turn simply needs to parse the request to either open a socket or URL,"
-"\n"
-"send the request, wait for the response, and send it back through the "
-"network.\n"
+"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n"
+"request from the client fully (perhaps only start out with HTTP GET, leaving\n"
+"HTTP POST for later), wrap the message, and wait for the response.  The server\n"
+"in turn simply needs to parse the request to either open a socket or URL,\n"
+"send the request, wait for the response, and send it back through the network.\n"
 "If someone were to implement this, it would be Good :)"
-msgstr ""
-"Реализация прокси MinWWW и сервера должна быть довольно проста - читать "
-"HTTP запрос с клиента полностью (возможно, начать с HTTP GET, оставив "
-"HTTP POST на потом), проксировать сообщение и ждать ответа.  Далее сервер"
-" просто должен распознать запрос и открыть сокет или URL, послать запрос,"
-" ждать ответа, и отправить его обратно по сети.\n"
-"Будет отлично, если кто-то реализует это :)"
+msgstr "Реализация прокси MinWWW и сервера должна быть довольно проста - читать HTTP запрос с клиента полностью (возможно, начать с HTTP GET, оставив HTTP POST на потом), проксировать сообщение и ждать ответа.  Далее сервер просто должен распознать запрос и открыть сокет или URL, послать запрос, ждать ответа, и отправить его обратно по сети.\nБудет отлично, если кто-то реализует это :)"
 
 #: i2p2www/pages/site/misc/minwww.html:122
 msgid ""
-"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary "
-"message\n"
-"size, but that's going to be going away since it involves either "
-"excessive memory\n"
-"overhead on intermediary routers, or additional implementation details to"
-"\n"
-"handle.  I2PTunnel is currently limited to 128KB and hasn't been a "
-"burden,\n"
+"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary message\n"
+"size, but that's going to be going away since it involves either excessive memory\n"
+"overhead on intermediary routers, or additional implementation details to\n"
+"handle.  I2PTunnel is currently limited to 128KB and hasn't been a burden,\n"
 "so perhaps it could be increased to 256KB when the I2CP spec is updated)"
-msgstr ""
-"[1] Почему файлы 128KB?  Сейчас I2CP допускает работу с произвольным "
-"размером сообщения, но это будет отменено, так как привлекает или "
-"избыточное использование памяти на промежуточных маршрутизаторах или "
-"дополнительные усилия по реализации.  I2PTunnel сейчас ограничен до 128KB"
-" без перегрузки,\n"
-"так что, возможно, он будет увеличен до 256KB когда спецификации I2CP "
-"обновят)"
+msgstr "[1] Почему файлы 128KB?  Сейчас I2CP допускает работу с произвольным размером сообщения, но это будет отменено, так как привлекает или избыточное использование памяти на промежуточных маршрутизаторах или дополнительные усилия по реализации.  I2PTunnel сейчас ограничен до 128KB без перегрузки,\nтак что, возможно, он будет увеличен до 256KB когда спецификации I2CP обновят)"
 
 #: i2p2www/pages/site/misc/myi2p.html:4
 msgid ""
-"There has been discussion about a distributed blogging application for a "
-"few\n"
-"months now called \"MyI2P\".  While the original discussions were lost, "
-"we were \n"
-"able to retrieve a Google <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
-"of it.  It isn't pretty, but it includes the basic overview and some "
-"discussion\n"
+"There has been discussion about a distributed blogging application for a few\n"
+"months now called \"MyI2P\".  While the original discussions were lost, we were \n"
+"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
+"of it.  It isn't pretty, but it includes the basic overview and some discussion\n"
 "that ensued."
-msgstr ""
-"Несколько месяцев длилась дискуссия о распределенном приложении для "
-"блогов,\n"
-"теперь оно называется \"MyI2P\".  Хотя оригинальное обсуждение утеряно, "
-"мы можем \n"
-"восстановить его <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">сохраненную "
-"версию из Google</a>.\n"
-"  Не бог весть что, но хотя бы основная идея\n"
-"и завязавшееся обсуждение."
+msgstr "Несколько месяцев длилась дискуссия о распределенном приложении для блогов,\nтеперь оно называется \"MyI2P\".  Хотя оригинальное обсуждение утеряно, мы можем \nвосстановить его <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">сохраненную версию из Google</a>.\n  Не бог весть что, но хотя бы основная идея\nи завязавшееся обсуждение."
 
 #: i2p2www/pages/site/misc/myi2p.html:12
 #, python-format
 msgid ""
-"The application itself is not yet implemented, and the ideas behind it "
-"have \n"
-"been made less ambitious over time, but they are still valid and the "
-"current \n"
-"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality "
-"available \n"
-"along side the I2P 1.0 release.  That will include a distributed address "
-"book\n"
-"to enable secure, distributed, and human readable naming by sacrificing "
-"the \n"
-"need for global uniqueness - basically everyone has their own local "
-"address book \n"
-"and can 'subscribe' to other people's address books, letting MyI2P "
-"periodically\n"
-"retrieve new name to destination mappings (leaving conflicts up to the "
-"user to\n"
-"resolve).  In addition to the address book, there will be a distributed "
-"blogging\n"
+"The application itself is not yet implemented, and the ideas behind it have \n"
+"been made less ambitious over time, but they are still valid and the current \n"
+"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n"
+"along side the I2P 1.0 release.  That will include a distributed address book\n"
+"to enable secure, distributed, and human readable naming by sacrificing the \n"
+"need for global uniqueness - basically everyone has their own local address book \n"
+"and can 'subscribe' to other people's address books, letting MyI2P periodically\n"
+"retrieve new name to destination mappings (leaving conflicts up to the user to\n"
+"resolve).  In addition to the address book, there will be a distributed blogging\n"
 "system using a reduced and secured subset of \n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to "
-"essentially\n"
-"provide an anonymous <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
-"a 'friends list' and transparent access control (authenticated by the I2P"
-"\n"
-"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the "
-"address book)."
-msgstr ""
-"Само приложение не реализовано, и со временем идеи, стоящие за ним стали"
-" \n"
-"менее амбициозными, но они до сих пор существуют и текущий \n"
-"<a href=\"%(roadmap)s\">план</a> состоит в том, чтобы сделать доступной "
-"основную функциональность MyI2P к выпуску I2P 1.0., который будет "
-"включать в себя распределенную адресную книгу, \n"
-"что нужно для защищенной, распределенной, удобной для людей адресации, "
-"пожертвовав необходимостью иметь глобальные уникальные адреса - ведь "
-"обычно у всех есть своя локальная адресная книга и возможность "
-"подписаться на адресные книги других людей, позволив MyI2P периодически "
-"получать новые связки адресов и назначений (оставляя разрешение "
-"конфликтов за пользователем). В дополнение к адресной книге будет "
-"распределенная блоговая система, использующая урезанную защищенную версию"
-"\n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> для"
-" предоставления <a href=\"http://www.livejournal.com/\">LiveJournal</a> "
-"со 'списком друзей' и прозрачным контролем доступа (с аутентификацией с "
-"помощью \n"
-"<a href=\"%(datagrams)s\">датаграмм</a> I2P и правилами, определяемыми на"
-" основе адресной книги)."
+"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n"
+"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
+"a 'friends list' and transparent access control (authenticated by the I2P\n"
+"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)."
+msgstr "Само приложение не реализовано, и со временем идеи, стоящие за ним стали \nменее амбициозными, но они до сих пор существуют и текущий \n<a href=\"%(roadmap)s\">план</a> состоит в том, чтобы сделать доступной основную функциональность MyI2P к выпуску I2P 1.0., который будет включать в себя распределенную адресную книгу, \nчто нужно для защищенной, распределенной, удобной для людей адресации, пожертвовав необходимостью иметь глобальные уникальные адреса - ведь обычно у всех есть своя локальная адресная книга и возможность подписаться на адресные книги других людей, позволив MyI2P периодически получать новые связки адресов и назначений (оставляя разрешение конфликтов за пользователем). В дополнение к адресной книге будет распределенная блоговая система, использующая урезанную защищенную версию\n<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> для предоставления <a href=\"http://www.livejournal.com/\">LiveJournal</a> со 'списком друзей' и прозрачным контролем доступа (с аутентификацией с помощью \n<a href=\"%(datagrams)s\">датаграмм</a> I2P и правилами, определяемыми на основе адресной книги)."
 
 #: i2p2www/pages/site/misc/myi2p.html:29
 msgid ""
-"Additional functionality, such as integration with a DHT backing store or"
-" \n"
-"swarming file transfers for 'attachments' can be added later.  Email may "
-"or may\n"
-"not get in the first pass either, though its implementation is "
-"essentially just\n"
-"a blog entry with private access, so perhaps some UI designer can come up"
-" with\n"
-"something.  Exporting the data to RSS or access through ATOM will be an "
-"option \n"
+"Additional functionality, such as integration with a DHT backing store or \n"
+"swarming file transfers for 'attachments' can be added later.  Email may or may\n"
+"not get in the first pass either, though its implementation is essentially just\n"
+"a blog entry with private access, so perhaps some UI designer can come up with\n"
+"something.  Exporting the data to RSS or access through ATOM will be an option \n"
 "down the road as well."
-msgstr ""
-"Дополнительная функциональность, такая как интеграция с резервным "
-"хранилищем DHT или распределенная передача файлов для 'вложений' могут "
-"быть добавлены позже.  Электронная почта будет или не будет добавлена в "
-"первую очередь, хотя ее реализация по существу - это просто запись в "
-"блоге с приватным доступом, возможно, некоторые дизайнеры "
-"пользовательского интерфейса смогут что нибудь придумать. Экспорт данных "
-"в RSS или доступ через ATOM также будет добавлен позже."
+msgstr "Дополнительная функциональность, такая как интеграция с резервным хранилищем DHT или распределенная передача файлов для 'вложений' могут быть добавлены позже.  Электронная почта будет или не будет добавлена в первую очередь, хотя ее реализация по существу - это просто запись в блоге с приватным доступом, возможно, некоторые дизайнеры пользовательского интерфейса смогут что нибудь придумать. Экспорт данных в RSS или доступ через ATOM также будет добавлен позже."
 
 #: i2p2www/pages/site/misc/ratestats.html:2
 #: i2p2www/pages/site/misc/ratestats.html:5
@@ -1560,11 +999,9 @@ msgstr "I2P предусматривает сбор в широком диапа
 
 #: i2p2www/pages/site/misc/ratestats.html:7
 msgid ""
-"The list was gathered using the following command in the top directory of"
-" the branch i2p.i2p:"
-msgstr ""
-"Информация в списке была собрана с использованием следующей команды в "
-"верхнем каталоге ветки i2p.i2p:"
+"The list was gathered using the following command in the top directory of "
+"the branch i2p.i2p:"
+msgstr "Информация в списке была собрана с использованием следующей команды в верхнем каталоге ветки i2p.i2p:"
 
 #: i2p2www/pages/site/misc/ratestats.html:10
 msgid "All options aren't needed, but it works."
@@ -1578,32 +1015,17 @@ msgid ""
 "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n"
 "on monotone.\n"
 "See\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p "
-"monotone</a>\n"
-"for more information on how to get started and check out the source "
-"anonymously.\n"
+"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n"
+"for more information on how to get started and check out the source anonymously.\n"
 "There is also a quick-start guide on the\n"
 "<a href=\"%(newdevs)s\">new developer's page</a>."
-msgstr ""
-"Исходный код I2P хранится в нескольких распределенных репозиториях "
-"Monotone. \n"
-"Дополнительную информацию о системе вы найдёте на <a "
-"href=\"http://www.monotone.ca/\">сайте Monotone</a>. \n"
-"Для начала работы и анонимного получения исходного кода смотрите <a "
-"href=\"http://%(forum)s/viewtopic.php?t=2524\">сообщение на форуме по "
-"поводу i2p и monotone</a>.\n"
-"Также смотрите краткое руководство на <a href=\"%(newdevs)s\">новой "
-"странице для разработчиков</a>."
+msgstr "Исходный код I2P хранится в нескольких распределенных репозиториях Monotone. \nДополнительную информацию о системе вы найдёте на <a href=\"http://www.monotone.ca/\">сайте Monotone</a>. \nДля начала работы и анонимного получения исходного кода смотрите <a href=\"http://%(forum)s/viewtopic.php?t=2524\">сообщение на форуме по поводу i2p и monotone</a>.\nТакже смотрите краткое руководство на <a href=\"%(newdevs)s\">новой странице для разработчиков</a>."
 
 #: i2p2www/pages/site/misc/transition-guide.html:16
 msgid ""
-"If you want to get the source non-anonymously, pull from the public "
-"server mtn.welterde.de.\n"
+"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n"
 "The i2p source code branch is \"i2p.i2p\"."
-msgstr ""
-"Если вы хотите получить исходный код неанонимно, загрузите его с "
-"публичного сервера mtn.welterde.de.\n"
-"Исходный код I2P находится в ветке i2p.i2p."
+msgstr "Если вы хотите получить исходный код неанонимно, загрузите его с публичного сервера mtn.welterde.de.\nИсходный код I2P находится в ветке i2p.i2p."
 
 #: i2p2www/pages/site/misc/transition-guide.html:21
 msgid "Guide"
@@ -1613,9 +1035,7 @@ msgstr "Руководство"
 msgid ""
 "\n"
 "The following is a detailed guide by Complication."
-msgstr ""
-"\n"
-"Это - детальное руководство от Complication."
+msgstr "\nЭто - детальное руководство от Complication."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2
 msgid "How to Upgrade from 0.6.1.30 and Earlier"
@@ -1632,40 +1052,24 @@ msgid ""
 "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n"
 "we do not have his update signing key or access to\n"
 "www.i2p[.net] or dev.i2p[.net].\n"
-"Complication and zzz have generated new signing keys, and they and Amiga "
-"are providing\n"
-"update file hosting. These changes must be configured in your router to "
-"take effect."
-msgstr ""
-"Так как ведущий разработчик i2p <a href=\"%(jrandom)s\">отсутствует</a>, "
-"у нас нет доступа к его ключам для подписи обновлений или доступа к "
-"www.i2p[.net] или dev.i2p[.net].\n"
-"Complication и zzz сгенерировали новые ключи для подписи, и они и Amiga "
-"предоставляют хостинг для файлов обновления. Чтобы вступить в силу, эти "
-"изменения должны быть внесены в настройки маршрутизатора."
+"Complication and zzz have generated new signing keys, and they and Amiga are providing\n"
+"update file hosting. These changes must be configured in your router to take effect."
+msgstr "Так как ведущий разработчик i2p <a href=\"%(jrandom)s\">отсутствует</a>, у нас нет доступа к его ключам для подписи обновлений или доступа к www.i2p[.net] или dev.i2p[.net].\nComplication и zzz сгенерировали новые ключи для подписи, и они и Amiga предоставляют хостинг для файлов обновления. Чтобы вступить в силу, эти изменения должны быть внесены в настройки маршрутизатора."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17
 msgid ""
-"Make the following configuration changes and your router will "
-"automatically install\n"
+"Make the following configuration changes and your router will automatically install\n"
 "the latest release."
-msgstr ""
-"Сделайте следующие изменения настроек, и ваш маршрутизатор будет "
-"автоматически устанавливать последнюю версию."
+msgstr "Сделайте следующие изменения настроек, и ваш маршрутизатор будет автоматически устанавливать последнюю версию."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22
 #, python-format
 msgid ""
-"We recommend the automated process as it will verify the key of the "
-"signed update file.\n"
+"We recommend the automated process as it will verify the key of the signed update file.\n"
 "If you do not make these changes,\n"
 "you may manually download the i2pupdate.zip file from\n"
 "<a href=\"%(downloads)s\">the download page</a>."
-msgstr ""
-"Мы рекомендуем автоматизированный процесс, так как в этом случае "
-"выполняется проверка ключа подписанного файла обновления.\n"
-"Если вы не внесёте эти изменения в настройки, то вы можете скачать файл "
-"i2pupdate.zip вручную со <a href=\"%(downloads)s\">страницы загрузок</a>."
+msgstr "Мы рекомендуем автоматизированный процесс, так как в этом случае выполняется проверка ключа подписанного файла обновления.\nЕсли вы не внесёте эти изменения в настройки, то вы можете скачать файл i2pupdate.zip вручную со <a href=\"%(downloads)s\">страницы загрузок</a>."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:34
 #, python-format
@@ -1674,11 +1078,9 @@ msgstr "Смените новостной URL на: %(url)s"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38
 msgid ""
-"Select ONE of the following new Update URLs at random and enter it into "
-"the Update URL box: "
-msgstr ""
-"Выберите ОДИН случайный URL обновлений из предоставленных и введите его в"
-" текстовое поле для URL обновлений:"
+"Select ONE of the following new Update URLs at random and enter it into the "
+"Update URL box: "
+msgstr "Выберите ОДИН случайный URL обновлений из предоставленных и введите его в текстовое поле для URL обновлений:"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43
 msgid "Check the box \"Update through the eepProxy?\""
@@ -1699,24 +1101,14 @@ msgstr "Нажмите \"Применить\""
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58
 msgid ""
 "You are now ready to automatically receive the release update file,\n"
-"either by setting your update policy to \"download and install\" or by "
-"clicking on the\n"
+"either by setting your update policy to \"download and install\" or by clicking on the\n"
 "\"update available\" link when it appears."
-msgstr ""
-"Теперь вы можете автоматически получать обновления, либо установив "
-"политику обновлений в режим \"скачать и установить\" или вручную, пройдя "
-"по ссылке \"Доступно обновление\", когда она появляется."
+msgstr "Теперь вы можете автоматически получать обновления, либо установив политику обновлений в режим \"скачать и установить\" или вручную, пройдя по ссылке \"Доступно обновление\", когда она появляется."
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:65
 #, python-format
 msgid ""
 "If you would like to verify the trusted update keys, they are also\n"
 "<a href=\"%(url)s\">posted and signed here</a>.\n"
-"Thank you for your support during this transition. For help please "
-"contact us on #i2p."
-msgstr ""
-"Если вы хотите проверить доверенные ключи обновления, то они доступны <a "
-"href=\"%(url)s\">здесь</a>.\n"
-"Спасибо за вашу поддержку во время этого переходного периода. За помощью,"
-" пожалуйста, обращайтесь к нам на #i2p."
-
+"Thank you for your support during this transition. For help please contact us on #i2p."
+msgstr "Если вы хотите проверить доверенные ключи обновления, то они доступны <a href=\"%(url)s\">здесь</a>.\nСпасибо за вашу поддержку во время этого переходного периода. За помощью, пожалуйста, обращайтесь к нам на #i2p."
diff --git a/i2p2www/translations/sq/LC_MESSAGES/about.po b/i2p2www/translations/sq/LC_MESSAGES/about.po
index 340cae5ea3c7c0c084a869f63515ea1ff01d4ba9..ed2c94d22951781a270cc682de3a9b7225fffa28 100644
--- a/i2p2www/translations/sq/LC_MESSAGES/about.po
+++ b/i2p2www/translations/sq/LC_MESSAGES/about.po
@@ -1,22 +1,24 @@
-# Albanian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Besnik Bleta <besnik@programeshqip.org>, 2018
+# Besnik Bleta <besnik@programeshqip.org>, 2018
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-10-11 16:26+0000\n"
-"PO-Revision-Date: 2021-10-12 09:24+0000\n"
-"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Besnik Bleta <besnik@programeshqip.org>, 2018\n"
 "Language-Team: Albanian (http://www.transifex.com/otf/I2P/language/sq/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: sq\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/about/alternative-clients.html:2
 #: i2p2www/pages/site/about/alternative-clients.html:4
@@ -26,8 +28,7 @@ msgstr "Klientë I2P alternativë"
 #: i2p2www/pages/site/about/alternative-clients.html:5
 msgid ""
 "The main I2P client implementation uses Java. If for some \n"
-"reason you can't use Java on your device, there are alternative "
-"implementations\n"
+"reason you can't use Java on your device, there are alternative implementations\n"
 "developed by community members."
 msgstr ""
 
@@ -50,8 +51,7 @@ msgstr ""
 #, python-format
 msgid ""
 "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n"
-"<a href=\"%(golang)s\">Go</a> programming language. The project is in "
-"early development."
+"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development."
 msgstr ""
 
 #: i2p2www/pages/site/about/browser-config.html:2
@@ -71,18 +71,15 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:9
 msgid ""
 "I2P: Invisible Internet Project: a project meant to\n"
-"        provide an anonymity layer, so user can communicate anonymously "
-"using a\n"
+"        provide an anonymity layer, so user can communicate anonymously using a\n"
 "        range of applications."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:12
 msgid ""
 "Router: The core I2P software, which routes encrypted\n"
-"        packets on the I2P network. All routers by default participate in"
-" the\n"
-"        network, which both helps the network and provides cover traffic "
-"for any\n"
+"        packets on the I2P network. All routers by default participate in the\n"
+"        network, which both helps the network and provides cover traffic for any\n"
 "        clients or servers connecting to the I2P network through the\n"
 "        router."
 msgstr ""
@@ -90,26 +87,22 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:17
 msgid ""
 "RouterIdentity: A collection of information required to\n"
-"        communicate directly with a router, such as its IP address and "
-"listening\n"
+"        communicate directly with a router, such as its IP address and listening\n"
 "        port, public signing and encryption keys etc."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:20
 msgid ""
 "Tunnel: An anonymous communication pathway between a\n"
-"        client or server and the I2P network. Tunnels are unidirectional,"
-" so any\n"
-"        one client or server must have at least two Tunnels - one for "
-"inbound\n"
+"        client or server and the I2P network. Tunnels are unidirectional, so any\n"
+"        one client or server must have at least two Tunnels - one for inbound\n"
 "        traffic and one for outbound traffic."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:24
 msgid ""
 "Destination: The cryptographic identity of a tunnel.\n"
-"        These are the identities of clients and servers within the I2P "
-"network,\n"
+"        These are the identities of clients and servers within the I2P network,\n"
 "        and are analogous to the IP:port of a computer on the normal\n"
 "        internet."
 msgstr ""
@@ -117,39 +110,32 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:28
 msgid ""
 "LeaseSet: A collection of information required to\n"
-"        communicate with a client or server at a particular Destination, "
-"such as\n"
+"        communicate with a client or server at a particular Destination, such as\n"
 "        the gateways of the inbound Tunnels for that\n"
 "        Destination."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:34
 msgid ""
-"This table lists definition of different networks and their components. "
-"These\n"
+"This table lists definition of different networks and their components. These\n"
 "terms and the definitions provided are taken from\n"
-"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization"
-" Off The\n"
+"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n"
 "Shelf: 7 Maxims by Simply Secure</a>(used with permission)."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:40
 msgid ""
 "Decentralization: Network architecture that avoids\n"
-"        reliance on a single party. Encompasses peer-to-peer, blockchain,"
-"\n"
-"        federated, and distributed technologies that involve many "
-"individual\n"
+"        reliance on a single party. Encompasses peer-to-peer, blockchain,\n"
+"        federated, and distributed technologies that involve many individual\n"
 "        users."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:44
 msgid ""
 "Peer-to-Peer (p2p): Peers make a portion of their \n"
-"        resources, such as processing power, disk storage or network "
-"bandwidth,\n"
-"        directly available to other network participants, without the "
-"need for\n"
+"        resources, such as processing power, disk storage or network bandwidth,\n"
+"        directly available to other network participants, without the need for\n"
 "        central coordination by servers or stable hosts. Popularized by\n"
 "        BitTorrent, Napster, and Bitcoin."
 msgstr ""
@@ -157,32 +143,25 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:49
 msgid ""
 "Federated: Federation allows separate deployments of a\n"
-"        service to communicate with each other through a common protocol,"
-" for\n"
-"        instance a mail server run by Google federates with a mail server"
-" run by\n"
-"        Microsoft when you send an email from @gmail.com to @hotmail.com."
-"\n"
+"        service to communicate with each other through a common protocol, for\n"
+"        instance a mail server run by Google federates with a mail server run by\n"
+"        Microsoft when you send an email from @gmail.com to @hotmail.com.\n"
 "        Each deployment may host multiple users."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:54
 msgid ""
 "Blockchain: A distributed ledger that can record\n"
-"        transactions between multiple parties efficiently and in a "
-"verifiable\n"
+"        transactions between multiple parties efficiently and in a verifiable\n"
 "        and permanent way."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:57
 msgid ""
 "Distributed systems: Academic topic within the\n"
-"        discipline of Computer Science which is concerned with the design"
-" of\n"
-"        computer systems that consist of many individual computers "
-"connected\n"
-"        over a network. Peer-to-peer networks and blockchains are "
-"examples of\n"
+"        discipline of Computer Science which is concerned with the design of\n"
+"        computer systems that consist of many individual computers connected\n"
+"        over a network. Peer-to-peer networks and blockchains are examples of\n"
 "        distributed systems architectures."
 msgstr ""
 
@@ -196,8 +175,7 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:65
 msgid ""
 "DHT: Distributed hash table, used in some projects to\n"
-"        connect peers to each other by storing information in the form of"
-"\n"
+"        connect peers to each other by storing information in the form of\n"
 "        key-value pairs in a distributed manner."
 msgstr ""
 
@@ -217,16 +195,14 @@ msgstr ""
 #: i2p2www/pages/site/about/glossary.html:73
 msgid ""
 "Hash: A number, usually displayed as a string of letters\n"
-"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying"
-"\n"
+"        and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n"
 "        data."
 msgstr ""
 
 #: i2p2www/pages/site/about/glossary.html:76
 msgid ""
 "UX: User experience, the overall experience of a person\n"
-"        using a product or a service, especially in terms of how easy it "
-"is to\n"
+"        using a product or a service, especially in terms of how easy it is to\n"
 "        use."
 msgstr ""
 
@@ -236,14 +212,10 @@ msgstr "Vendi i Nderit"
 
 #: i2p2www/pages/site/about/hall-of-fame.html:7
 msgid ""
-"I2P is a project made completely by spare time enthusiasts. But a big "
-"project like\n"
-"I2P is not made from software alone, several servers, domain "
-"registrations, and coffees need to\n"
-"be paid to get a great result. People all over the world donated to I2P "
-"reach the state it is in\n"
-"currently. Here we do track those who gave us a name to be published in a"
-" I2P hall of fame."
+"I2P is a project made completely by spare time enthusiasts. But a big project like\n"
+"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n"
+"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n"
+"currently. Here we do track those who gave us a name to be published in a I2P hall of fame."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:12
@@ -253,15 +225,14 @@ msgstr "Një falënderim të madh për personat vijues që kanë dhuruar për I2
 #: i2p2www/pages/site/about/hall-of-fame.html:13
 #, python-format
 msgid ""
-"If you have made a donation, please send an email to <a "
-"href=\"mailto:%(echelon)s\">echelon</a>\n"
+"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n"
 "with your name or nick (and optionally homepage) so we can list you here."
 msgstr ""
 
 #: i2p2www/pages/site/about/hall-of-fame.html:18
 msgid ""
-"The unsorted list of I2P donors in 15 years of I2P history, starting "
-"March 2004 til March 2019."
+"The unsorted list of I2P donors in 15 years of I2P history, starting March "
+"2004 til March 2019."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:2
@@ -275,12 +246,8 @@ msgstr "Projekti i Internetit të Padukshëm"
 
 #: i2p2www/pages/site/about/intro.html:6
 msgid ""
-"The Invisible Internet Project (I2P) is a fully encrypted private network"
-" layer that has been developed with privacy and security by design in "
-"order to provide protection for your activity,\n"
-"location and your identity.  The software ships with a router that "
-"connects you to the network and applications for sharing, communicating "
-"and building."
+"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n"
+"location and your identity.  The software ships with a router that connects you to the network and applications for sharing, communicating and building."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:9
@@ -290,13 +257,13 @@ msgstr "I2P-ja Kujdeset Për Privatësinë"
 #: i2p2www/pages/site/about/intro.html:11
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:14
@@ -305,15 +272,15 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:16
 msgid ""
-"The Invisible Internet Project provides software to download that "
-"connects you to the network. In addition to the network privacy benefits,"
-" I2P provides an application layer that allows people to use and create "
-"familiar apps for daily use. I2P provides its own unique DNS so that you "
-"can self host or mirror content on the network. You can create and own "
-"your own platform that you can add to the I2P directory or only invite "
-"your friends. The I2P network functions the same way the Internet does. "
-"When you download the I2P software, it includes everything you need to "
-"connect, share, and create privately."
+"The Invisible Internet Project provides software to download that connects "
+"you to the network. In addition to the network privacy benefits, I2P "
+"provides an application layer that allows people to use and create familiar "
+"apps for daily use. I2P provides its own unique DNS so that you can self "
+"host or mirror content on the network. You can create and own your own "
+"platform that you can add to the I2P directory or only invite your friends. "
+"The I2P network functions the same way the Internet does. When you download "
+"the I2P software, it includes everything you need to connect, share, and "
+"create privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:18
@@ -322,28 +289,27 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:20
 msgid ""
-"I2P uses cryptography to achieve a variety of properties for the tunnels "
-"it builds and the communications it transports. I2P tunnels use "
-"transports, NTCP2 and SSU, to hide the nature of the traffic being "
-"transported over it. Connections are encrypted from router-to-router, and"
-" from client-to-client(end-to-end). Forward-secrecy is provided for all "
-"connections. Because I2P is cryptographically addressed, I2P addresses "
-"are self-authenticating and only belong to the user who generated them."
+"I2P uses cryptography to achieve a variety of properties for the tunnels it "
+"builds and the communications it transports. I2P tunnels use transports, "
+"NTCP2 and SSU, to hide the nature of the traffic being transported over it. "
+"Connections are encrypted from router-to-router, and from client-to-"
+"client(end-to-end). Forward-secrecy is provided for all connections. Because"
+" I2P is cryptographically addressed, I2P addresses are self-authenticating "
+"and only belong to the user who generated them."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:23
 msgid ""
-"I2P is a secure and traffic protecting Internet-like layer. The network "
-"is made up of peers (\"routers\") and unidirectional inbound and outbound"
-" virtual tunnels. Routers communicate with each other using protocols "
-"built on existing transport mechanisms (TCP, UDP, etc), passing messages."
-" Client applications have their own cryptographic identifier "
-"(\"Destination\") which enables it to send and receive messages. These "
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels that will be used for sending and receiving "
-"messages through the network. I2P has its own internal network database "
-"(using a modification of the Kademlia DHT) for distributing routing and "
-"contact information securely."
+"I2P is a secure and traffic protecting Internet-like layer. The network is "
+"made up of peers (\"routers\") and unidirectional inbound and outbound "
+"virtual tunnels. Routers communicate with each other using protocols built "
+"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client "
+"applications have their own cryptographic identifier (\"Destination\") which"
+" enables it to send and receive messages. These clients can connect to any "
+"router and authorize the temporary allocation (\"lease\") of some tunnels "
+"that will be used for sending and receiving messages through the network. "
+"I2P has its own internal network database (using a modification of the "
+"Kademlia DHT) for distributing routing and contact information securely."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:26
@@ -352,36 +318,35 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:28
 msgid ""
-"The I2P network is almost completely decentralized, with exception to "
-"what are called \"Reseed Servers,\" which is how you first join the "
-"network. This is to deal with the DHT ( Distributed Hash Table ) "
-"bootstrap problem. Basically, there's not a good and reliable way to get "
-"out of running at least one permanent bootstrap node that non-network "
-"users can find to get started. Once you're connected to the network, you "
-"only discover peers by building \"exploratory\" tunnels, but to make your"
-" initial connection, you need to get a peer set from somewhere. The "
-"reseed servers, which you can see listed on "
-"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you "
-"with those peers. You then connect to them with the I2P router until you "
-"find one who you can reach and build exploratory tunnels through. Reseed "
-"servers can tell that you bootstrapped from them, but nothing else about "
-"your traffic on the I2P network."
+"The I2P network is almost completely decentralized, with exception to what "
+"are called \"Reseed Servers,\" which is how you first join the network. This"
+" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. "
+"Basically, there's not a good and reliable way to get out of running at "
+"least one permanent bootstrap node that non-network users can find to get "
+"started. Once you're connected to the network, you only discover peers by "
+"building \"exploratory\" tunnels, but to make your initial connection, you "
+"need to get a peer set from somewhere. The reseed servers, which you can see"
+" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, "
+"provide you with those peers. You then connect to them with the I2P router "
+"until you find one who you can reach and build exploratory tunnels through. "
+"Reseed servers can tell that you bootstrapped from them, but nothing else "
+"about your traffic on the I2P network."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:30
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:32
 msgid ""
-"Yes, this is how a fully distributed peer-to-peer network works. Every "
-"node participates in routing packets for others, so your IP address must "
-"be known to establish connections. While the fact that your computer runs"
-" I2P is public, nobody can see your activities in it. You can't say if a "
-"user behind this IP address is sharing files, hosting a website, doing "
-"research or just running a node to contribute bandwidth to the project."
+"Yes, this is how a fully distributed peer-to-peer network works. Every node "
+"participates in routing packets for others, so your IP address must be known"
+" to establish connections. While the fact that your computer runs I2P is "
+"public, nobody can see your activities in it. You can't say if a user behind"
+" this IP address is sharing files, hosting a website, doing research or just"
+" running a node to contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:34
@@ -390,13 +355,13 @@ msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:36
 msgid ""
-"The I2P network does not officially \"Exit\" traffic. It has outproxies "
-"to the Internet run by volunteers, which are centralized services. I2P is"
-" primarily a hidden service network and outproxying is not an official "
-"function, nor is it advised. The privacy benefits you get from "
-"participating in the the I2P network come from remaining in the network "
-"and not accessing the internet. I2P recommends that you use Tor Browser "
-"or a trusted VPN when you want to browse the Internet privately."
+"The I2P network does not officially \"Exit\" traffic. It has outproxies to "
+"the Internet run by volunteers, which are centralized services. I2P is "
+"primarily a hidden service network and outproxying is not an official "
+"function, nor is it advised. The privacy benefits you get from participating"
+" in the the I2P network come from remaining in the network and not accessing"
+" the internet. I2P recommends that you use Tor Browser or a trusted VPN when"
+" you want to browse the Internet privately."
 msgstr ""
 
 #: i2p2www/pages/site/about/intro.html:38
@@ -405,15 +370,11 @@ msgstr "Krahasime"
 
 #: i2p2www/pages/site/about/intro.html:40
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -432,9 +393,8 @@ msgstr "Paraqitje lidhur me I2P-n"
 #: i2p2www/pages/site/about/media.html:5
 #, python-format
 msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. "
-"Links to research papers on I2P are available <a "
-"href=\"%(papers)s\">here</a>."
+"Following are links to presentations, videos, and tutorials about I2P. Links"
+" to research papers on I2P are available <a href=\"%(papers)s\">here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:8
@@ -459,11 +419,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(transcript)s\">transcript</a>\n"
 "Lance James (0x90), February 2002."
-msgstr ""
-"Paraqitje e IIP në CodeCon\n"
-"<a href=\"%(mp3)s\">Audio MP3</a>\n"
-"<a href=\"%(transcript)s\">transkriptim</a>\n"
-"Lance James (0x90), shkurt 2002."
+msgstr "Paraqitje e IIP në CodeCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(transcript)s\">transkriptim</a>\nLance James (0x90), shkurt 2002."
 
 #: i2p2www/pages/site/about/media.html:27
 #, python-format
@@ -472,11 +428,7 @@ msgid ""
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(slides)s\">slides</a>\n"
 "Lance James (0x90), September 2002."
-msgstr ""
-"Paraqitje e IIP në ToorCon\n"
-"<a href=\"%(mp3)s\">Audio MP3</a>\n"
-"<a href=\"%(slides)s\">diapozitiva</a>\n"
-"Lance James (0x90), shtator 2002."
+msgstr "Paraqitje e IIP në ToorCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(slides)s\">diapozitiva</a>\nLance James (0x90), shtator 2002."
 
 #: i2p2www/pages/site/about/media.html:35
 #, python-format
@@ -486,12 +438,7 @@ msgid ""
 "An introduction into anonymous communication with I2P.\n"
 "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n"
 "Jens Kubieziel, 24C3 Berlin, December 28, 2007."
-msgstr ""
-"<a href=\"%(video)s\">To Be or I2P</a>\n"
-"(Video Youtube)\n"
-"Një hyrje në komunikimin anonim me I2P.\n"
-"<a href=\"%(pdf)s\">To Be or I2P (Paraqitje PDF)</a>,\n"
-"Jens Kubieziel, 24C3 Berlin, 28 dhjetor, 2007."
+msgstr "<a href=\"%(video)s\">To Be or I2P</a>\n(Video Youtube)\nNjë hyrje në komunikimin anonim me I2P.\n<a href=\"%(pdf)s\">To Be or I2P (Paraqitje PDF)</a>,\nJens Kubieziel, 24C3 Berlin, 28 dhjetor, 2007."
 
 #: i2p2www/pages/site/about/media.html:44
 #, python-format
@@ -499,17 +446,12 @@ msgid ""
 "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n"
 "Lars Schimmer,\n"
 "March 14-15, 2009"
-msgstr ""
-"<a href=\"%(video)s\">Video e bisedës mbi I2P-në në Chemnitz Linux "
-"Tag</a>,\n"
-"Lars Schimmer,\n"
-"14-15 mars, 2009"
+msgstr "<a href=\"%(video)s\">Video e bisedës mbi I2P-në në Chemnitz Linux Tag</a>,\nLars Schimmer,\n14-15 mars, 2009"
 
 #: i2p2www/pages/site/about/media.html:50
 #, python-format
 msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
-" Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
 "\"Hackers for Human Rights\".\n"
 "<a href=\"%(mp3)s\">MP3 audio</a>\n"
 "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)"
@@ -520,9 +462,7 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n"
 "Adrian Crenshaw. Schmoocon Firetalk, January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n"
-"Adrian Crenshaw. Schmoocon Firetalk, janar 2011"
+msgstr "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\nAdrian Crenshaw. Schmoocon Firetalk, janar 2011"
 
 #: i2p2www/pages/site/about/media.html:62
 #, python-format
@@ -530,113 +470,72 @@ msgid ""
 "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n"
 "(Youtube Video)\n"
 "Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27,"
-" 2011.\n"
+"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n"
 "I2P covered from 10:00 to 20:00 in the video."
-msgstr ""
-"<a href=\"%(link)s\">Përdorim i teknologjisë për shpënien më tej të "
-"lirisë</a>\n"
-"(Video Youtube)\n"
-"Eric Johnson.\n"
-"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 mars, "
-"2011.\n"
-"Në video I2P diskutohet nga minuta 10:00 deri në atë 20:00."
+msgstr "<a href=\"%(link)s\">Përdorim i teknologjisë për shpënien më tej të lirisë</a>\n(Video Youtube)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 mars, 2011.\nNë video I2P diskutohet nga minuta 10:00 deri në atë 20:00."
 
 #: i2p2www/pages/site/about/media.html:70
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
 "(Youtube Video)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July "
-"11-15, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n"
-"(Video Youtube)\n"
-"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 "
-"korrik, 2011."
+"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011."
+msgstr "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n(Video Youtube)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 korrik, 2011."
 
 #: i2p2www/pages/site/about/media.html:76
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011."
-msgstr ""
-"<a href=\"%(link)s\">Shënime nga Praktika mbi I2P / Tor</a>\n"
-"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 gusht, 2011."
+msgstr "<a href=\"%(link)s\">Shënime nga Praktika mbi I2P / Tor</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 gusht, 2011."
 
 #: i2p2www/pages/site/about/media.html:81
 #, python-format
 msgid ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
+"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
 "DEF CON Live version (Youtube Video)</a>,\n"
 "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n"
 "<a href=\"%(slides)s\">Slides (ppt)</a>\n"
 "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011."
-msgstr ""
-"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack "
-"Strategies -\n"
-"Versioni Live nga DEF CON (Video Youtube)</a>,\n"
-"<a href=\"%(studio)s\">Versioni \"studio\" (Video Youtube)</a>,\n"
-"<a href=\"%(slides)s\">Diapozitiva (ppt)</a>\n"
-"Adrian Crenshaw. DEF CON 19, Las Vegas, 7 gusht, 2011."
+msgstr "<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\nVersioni Live nga DEF CON (Video Youtube)</a>,\n<a href=\"%(studio)s\">Versioni \"studio\" (Video Youtube)</a>,\n<a href=\"%(slides)s\">Diapozitiva (ppt)</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 7 gusht, 2011."
 
 #: i2p2www/pages/site/about/media.html:91
 msgid ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
-msgstr ""
-"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 "
-"0x06 (Thessaloniki Tech Talk Sessions), 4 nëntor, 2011."
+"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 "
+"(Thessaloniki Tech Talk Sessions), November 4, 2011."
+msgstr "<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4 nëntor, 2011."
 
 #: i2p2www/pages/site/about/media.html:95
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n"
 "(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
-"January 25, 2012."
-msgstr ""
-"<a href=\"%(link)s\">I2P - Rrjeti Anonim</a>\n"
-"(Video Youtube)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, 25 "
-"janr, 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
+msgstr "<a href=\"%(link)s\">I2P - Rrjeti Anonim</a>\n(Video Youtube)\nBlair Dick, University of Abertay, Dundee Ethical Hacking Society, 25 janr, 2012."
 
 #: i2p2www/pages/site/about/media.html:101
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2PCon 2015</a>\n"
 "Toronto, August 15-16, 2015"
-msgstr ""
-"<a href=\"%(link)s\">I2PCon 2015</a>\n"
-"Toronto, 15-16 gusht, 2015"
+msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 gusht, 2015"
 
 #: i2p2www/pages/site/about/media.html:106
 #, python-format
 msgid ""
 "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n"
 "<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, "
-"2015"
-msgstr ""
-"<a href=\"%(link)s\">I2P - ende gjallë! (pdf)</a>\n"
-"<a href=\"%(link2)s\">(video)</a>\n"
-"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 dhjetor, 2015"
+"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015"
+msgstr "<a href=\"%(link)s\">I2P - ende gjallë! (pdf)</a>\n<a href=\"%(link2)s\">(video)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 dhjetor, 2015"
 
 #: i2p2www/pages/site/about/media.html:113
 #, python-format
 msgid ""
-"Replacing Weary Crypto: Upgrading the I2P network with stronger "
-"primitives\n"
+"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
 "str4d, Real World Crypto, Stanford, January 8, 2016"
-msgstr ""
-"Zëvendësim i Fshehtëzimit të Lodhur: Përmirësim i rrjetit I2P me "
-"primitivë më të fuqishëm\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, Real World Crypto, Stanford, 8 janar, 2016"
+msgstr "Zëvendësim i Fshehtëzimit të Lodhur: Përmirësim i rrjetit I2P me primitivë më të fuqishëm\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, Real World Crypto, Stanford, 8 janar, 2016"
 
 #: i2p2www/pages/site/about/media.html:121
 #, python-format
@@ -644,14 +543,8 @@ msgid ""
 "Onions and Garlic: the protocols of I2P\n"
 "<a href=\"%(link)s\">(pdf)</a>\n"
 "<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, February 17, 2016"
-msgstr ""
-"Qepër dhe Hudhra: protokollet e I2P-së\n"
-"<a href=\"%(link)s\">(pdf)</a>\n"
-"<a href=\"%(link2)s\">(odp)</a>\n"
-"str4d, COMPSCI 460: Computer Networking, University of Wisconsin "
-"Whitewater, 17 shkurt, 2016"
+"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016"
+msgstr "Qepër dhe Hudhra: protokollet e I2P-së\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17 shkurt, 2016"
 
 #: i2p2www/pages/site/about/media.html:129
 #, python-format
@@ -660,12 +553,7 @@ msgid ""
 "<a href=\"%(link)s\">(mp4)</a>\n"
 "<a href=\"%(link2)s\">(webm)</a>\n"
 "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018"
-msgstr ""
-"Projekti i Internetit të Padukshëm - Një përmbledhje dhe një udhërrëfyes "
-"për teknologjinë\n"
-"<a href=\"%(link)s\">(mp4)</a>\n"
-"<a href=\"%(link2)s\">(webm)</a>\n"
-"Andrew Savchenko (bircoph), FOSDEM, Bruksel, 4 shkurt, 2018"
+msgstr "Projekti i Internetit të Padukshëm - Një përmbledhje dhe një udhërrëfyes për teknologjinë\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Bruksel, 4 shkurt, 2018"
 
 #: i2p2www/pages/site/about/media.html:137
 #, python-format
@@ -710,39 +598,26 @@ msgstr ""
 msgid ""
 "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n"
 "(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to "
-"irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:176
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>"
-"\n"
+"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n"
 "(Youtube Video)\n"
 "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
 "By <a href=\"http://telecomix.org/\">Telecomix</a>"
-msgstr ""
-"<a href=\"%(link)s\">Felix Atari shpjegon parimet bazë të I2P-së</a>\n"
-"(Video Youtube)\n"
-"Agjenti Felix Atari i Telecomix Crypto Munitions Bureau.\n"
-"Nga <a href=\"http://telecomix.org/\">Telecomix</a>"
+msgstr "<a href=\"%(link)s\">Felix Atari shpjegon parimet bazë të I2P-së</a>\n(Video Youtube)\nAgjenti Felix Atari i Telecomix Crypto Munitions Bureau.\nNga <a href=\"http://telecomix.org/\">Telecomix</a>"
 
 #: i2p2www/pages/site/about/media.html:183
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet "
-"(Windows Install)</a>\n"
+"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n"
 "(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to "
-"access I2P."
-msgstr ""
-"<a href=\"%(link)s\">Si të hyhet në I2P, Darknet-i P2P anonim (Instalim "
-"Windows)</a>\n"
-"(Video Youtube)\n"
-"Kjo përkujdesore tregon se si të instalohet dhe formësohet software-i i "
-"nevojshëm për të përdorur I2P-në."
+"This tutorial shows how to install and configure software needed to access I2P."
+msgstr "<a href=\"%(link)s\">Si të hyhet në I2P, Darknet-i P2P anonim (Instalim Windows)</a>\n(Video Youtube)\nKjo përkujdesore tregon se si të instalohet dhe formësohet software-i i nevojshëm për të përdorur I2P-në."
 
 #: i2p2www/pages/site/about/media.html:189
 #, python-format
@@ -750,10 +625,7 @@ msgid ""
 "<a href=\"%(link)s\">How to connect to I2P</a>\n"
 "(Youtube Video)\n"
 "How to install I2P on Ubuntu."
-msgstr ""
-"<a href=\"%(link)s\">Si të lidheni në I2P</a>\n"
-"(Video Youtube)\n"
-"Si të instalohet I2P-ja në Ubuntu."
+msgstr "<a href=\"%(link)s\">Si të lidheni në I2P</a>\n(Video Youtube)\nSi të instalohet I2P-ja në Ubuntu."
 
 #: i2p2www/pages/site/about/media.html:195
 #, python-format
@@ -762,11 +634,7 @@ msgid ""
 "(Video)\n"
 "Adrian Crenshaw.\n"
 "January 2011"
-msgstr ""
-"<a href=\"%(link)s\">Instalimi i software-it darknet I2P në Linux</a>\n"
-"(Video)\n"
-"Adrian Crenshaw.\n"
-"janar 2011"
+msgstr "<a href=\"%(link)s\">Instalimi i software-it darknet I2P në Linux</a>\n(Video)\nAdrian Crenshaw.\njanar 2011"
 
 #: i2p2www/pages/site/about/media.html:202
 #, python-format
@@ -774,11 +642,7 @@ msgid ""
 "<a href=\"%(link)s\">Short garlic routing animation</a>\n"
 "(Youtube Video)\n"
 "Adrian Crenshaw.\n"
-msgstr ""
-"<a href=\"%(link)s\">Animacion i shkurtër mbi rrugëzim "
-"<em>garlic</em></a>\n"
-"(Video Youtube)\n"
-"Adrian Crenshaw.\n"
+msgstr "<a href=\"%(link)s\">Animacion i shkurtër mbi rrugëzim <em>garlic</em></a>\n(Video Youtube)\nAdrian Crenshaw.\n"
 
 #: i2p2www/pages/site/about/media.html:210
 msgid "Articles and Interviews"
@@ -791,11 +655,7 @@ msgid ""
 "<a href=\"%(link1)s\">Part 1</a>\n"
 "<a href=\"%(link2)s\">Part 2</a>\n"
 "July 26, 2002."
-msgstr ""
-"Lance James (0x90) intervistuar nga DistributedCity\n"
-"<a href=\"%(link1)s\">Pjesa 1</a>\n"
-"<a href=\"%(link2)s\">Pjesa 2</a>\n"
-"26 korrik, 2002."
+msgstr "Lance James (0x90) intervistuar nga DistributedCity\n<a href=\"%(link1)s\">Pjesa 1</a>\n<a href=\"%(link2)s\">Pjesa 2</a>\n26 korrik, 2002."
 
 #: i2p2www/pages/site/about/media.html:221
 #, python-format
@@ -804,35 +664,22 @@ msgid ""
 "(original in Spanish)\n"
 "<a href=\"%(link)s\">English translation</a>\n"
 "October 31, 2002."
-msgstr ""
-"Lance James (0x90) intervistuar nga El País\n"
-"(origjinali në spanjisht)\n"
-"<a href=\"%(link)s\">përkthimi në anglisht</a>\n"
-"31 tetor, 2002."
+msgstr "Lance James (0x90) intervistuar nga El País\n(origjinali në spanjisht)\n<a href=\"%(link)s\">përkthimi në anglisht</a>\n31 tetor, 2002."
 
 #: i2p2www/pages/site/about/media.html:228
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">2003 Business Week article referencing "
-"invisiblenet</a>\n"
+"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n"
 "September 14, 2003."
-msgstr ""
-"<a href=\"%(link)s\">Artikull i 2003-shit në “Business Week” ku përmendet"
-" invisiblenet</a>\n"
-"14 shtator, 2003."
+msgstr "<a href=\"%(link)s\">Artikull i 2003-shit në “Business Week” ku përmendet invisiblenet</a>\n14 shtator, 2003."
 
 #: i2p2www/pages/site/about/media.html:233
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the "
-"Internet</a>\n"
+"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n"
 "(German)\n"
 "November 2007."
-msgstr ""
-"<a href=\"%(link)s\">Artikull i Netzwelt.de rreth se si të jeni anonim në"
-" Internet</a>\n"
-"(gjermanisht)\n"
-"nëntor 2007."
+msgstr "<a href=\"%(link)s\">Artikull i Netzwelt.de rreth se si të jeni anonim në Internet</a>\n(gjermanisht)\nnëntor 2007."
 
 #: i2p2www/pages/site/about/media.html:239
 #, python-format
@@ -840,27 +687,15 @@ msgid ""
 "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n"
 "March 2009\n"
 "<a href=\"%(german)s\">German translation</a>"
-msgstr ""
-"<a href=\"%(link)s\">zzz intervistuar nga gulli.com</a>\n"
-"mars 2009\n"
-"<a href=\"%(german)s\">Përkthimi në gjermanisht</a>"
+msgstr "<a href=\"%(link)s\">zzz intervistuar nga gulli.com</a>\nmars 2009\n<a href=\"%(german)s\">Përkthimi në gjermanisht</a>"
 
 #: i2p2www/pages/site/about/media.html:246
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n"
 "August 18, 2011\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz intervistuar në InfoSec Daily Podcast Ep. 454 "
-"(mp3)</a>\n"
-"18 gusht, 2011\n"
-"(lidhje e vdekur, mbjellë brenda I2P te <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz intervistuar në InfoSec Daily Podcast Ep. 454 (mp3)</a>\n18 gusht, 2011\n(lidhje e vdekur, mbjellë brenda I2P te <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)"
 
 #: i2p2www/pages/site/about/media.html:252
 #, python-format
@@ -868,49 +703,34 @@ msgid ""
 "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n"
 "Jonathan Cox,\n"
 "November 11, 2011."
-msgstr ""
-"<a href=\"%(link)s\">I2P - Anonimitet për Masat</a>,\n"
-"Jonathan Cox,\n"
-"11 nëntor, 2011."
+msgstr "<a href=\"%(link)s\">I2P - Anonimitet për Masat</a>,\nJonathan Cox,\n11 nëntor, 2011."
 
 #: i2p2www/pages/site/about/media.html:258
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n"
 "February 16, 2012\n"
-"(link dead, seeded inside I2P at <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
-msgstr ""
-"<a href=\"%(mp3)s\">zzz dhe Lance James intervistuar në InfoSec Daily "
-"Podcast Ep. 596 (mp3)</a>\n"
-"16 shkurt, 2012\n"
-"(lidhje e vdekur, mbjellë brenda I2P te <a "
-"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's"
-" tracker</a>)"
+"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
+msgstr "<a href=\"%(mp3)s\">zzz dhe Lance James intervistuar në InfoSec Daily Podcast Ep. 596 (mp3)</a>\n16 shkurt, 2012\n(lidhje e vdekur, mbjellë brenda I2P te <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)"
 
 #: i2p2www/pages/site/about/media.html:264
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-010 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n"
 "Part 1, February 28, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:269
 #, python-format
 msgid ""
-"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down "
-"Security Podcast Ep. 2015-011 (mp3)</a>\n"
+"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n"
 "Part 2, March 6, 2015"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:274
 #, python-format
 msgid ""
-"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. "
-"Success, Failures, Grief and Buddhism.</a>\n"
+"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n"
 "<a href=\"%(archive)s\">(archive.org)</a>\n"
 "<a href=\"%(mp3)s\">(mp3)</a>\n"
 "Robert Lei, December 31, 2018"
@@ -919,16 +739,14 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:283
 #, python-format
 msgid ""
-"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on "
-"Medium.com</a>\n"
+"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n"
 "2019\n"
 msgstr ""
 
 #: i2p2www/pages/site/about/media.html:288
 #, python-format
 msgid ""
-"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy "
-"Auto-Configuration</a>\n"
+"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n"
 "Daniel Aleksandersen, February 7 2019"
 msgstr ""
 
@@ -945,8 +763,7 @@ msgstr ""
 #: i2p2www/pages/site/about/media.html:303
 #, python-format
 msgid ""
-"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P "
-"implementations, libraries, resources, projects, and shiny things</a>\n"
+"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n"
 "2019"
 msgstr ""
 
@@ -956,29 +773,20 @@ msgstr ""
 
 #: i2p2www/pages/site/about/restrictive-countries.html:4
 msgid ""
-"This implementation of I2P (the Java implementation distributed on this "
-"site)\n"
-"includes a \"Strict Countries List\" which we use to decide how routers "
-"should behave \n"
-"within regions where applications like I2P may be limited by law. For "
-"example, while\n"
-"no countries that we know of prohibit using I2P, some have broad "
-"prohibitions on\n"
-"participating in routing for others. Routers that appear to be in the "
-"\"Strict\"\n"
+"This implementation of I2P (the Java implementation distributed on this site)\n"
+"includes a \"Strict Countries List\" which we use to decide how routers should behave \n"
+"within regions where applications like I2P may be limited by law. For example, while\n"
+"no countries that we know of prohibit using I2P, some have broad prohibitions on\n"
+"participating in routing for others. Routers that appear to be in the \"Strict\"\n"
 "countries will automatically be placed into \"Hidden\" mode."
 msgstr ""
 
 #: i2p2www/pages/site/about/restrictive-countries.html:11
 msgid ""
-"The Project relies on the research provided by civil and digital rights "
-"organizations in order\n"
-"to make decisions that offer protections for its users. In this case the "
-"ongoing research\n"
-"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has "
-"been referenced. General\n"
-"guidance is to include countries with a Civil Liberties (CL) score of 16 "
-"or less or an Internet\n"
+"The Project relies on the research provided by civil and digital rights organizations in order\n"
+"to make decisions that offer protections for its users. In this case the ongoing research\n"
+"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n"
+"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n"
 "Freedom score of 39 or less (not free)."
 msgstr ""
 
@@ -988,16 +796,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/restrictive-countries.html:19
 msgid ""
-"When a router is placed into hidden mode, three key things change about "
-"it's behavior.\n"
-"It will no longer publish a routerInfo to the NetDB, it will no longer "
-"accept\n"
-"participating tunnels, and it will reject direct connections to routers "
-"in the same\n"
-"country that it is in. These defenses make the routers more difficult to "
-"enumerate\n"
-"reliably, and prevent them from running afoul of restrictions on routing "
-"traffic for\n"
+"When a router is placed into hidden mode, three key things change about it's behavior.\n"
+"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n"
+"participating tunnels, and it will reject direct connections to routers in the same\n"
+"country that it is in. These defenses make the routers more difficult to enumerate\n"
+"reliably, and prevent them from running afoul of restrictions on routing traffic for\n"
 "others."
 msgstr ""
 
@@ -1019,18 +822,15 @@ msgstr ""
 msgid ""
 "When you install the I2P software made available at geti2p.net, you are \n"
 "actually installing an I2P router and an accompanying bundle of basic \n"
-"applications. The I2P Java distribution is the first I2P software gateway"
-" and \n"
+"applications. The I2P Java distribution is the first I2P software gateway and \n"
 "has been actively developed since 2003."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:10
 msgid ""
 "The applications are made available through a webUI, which listens at \n"
-"127.0.0.1:7657, and the main page of which is called the “Router "
-"Console,” \n"
-"where you monitor the health of your connection to the network and access"
-" \n"
+"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n"
+"where you monitor the health of your connection to the network and access \n"
 "applications to use on the network."
 msgstr ""
 
@@ -1041,84 +841,61 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:15
 msgid ""
 "<strong>The Set Up Wizard</strong>: When you download the \n"
-"I2P software, a set up wizard will guide you through a few configuration "
-"steps \n"
-"while your router is making its first connections to the network. This "
-"happens \n"
-"the same way that your home router connects you to the Internet. During "
-"the set \n"
-"up process, you will be given the option to test your bandwidth and set "
-"your \n"
+"I2P software, a set up wizard will guide you through a few configuration steps \n"
+"while your router is making its first connections to the network. This happens \n"
+"the same way that your home router connects you to the Internet. During the set \n"
+"up process, you will be given the option to test your bandwidth and set your \n"
 "bandwidth limits in order to ensure a good connection as a network peer."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:21
 msgid ""
 "<strong>The I2P Router Console</strong>: Here is where you can see your \n"
-"network connections and information about your router. You will be able "
-"to see how many peers you \n"
-"have, and other information that will help if you need to troubleshoot. "
-"You can \n"
-"stop and start the router as well. You will see the applications that the"
-" \n"
-"software includes, as well as links to some community forums and sites on"
-" the \n"
-"I2P network. You will receive news when there is a a new software "
-"release, and \n"
-"will be able to download the latest version here as well. Additionally, "
-"you can \n"
-"find shortcuts to other available applications. The console is "
-"customizable and \n"
+"network connections and information about your router. You will be able to see how many peers you \n"
+"have, and other information that will help if you need to troubleshoot. You can \n"
+"stop and start the router as well. You will see the applications that the \n"
+"software includes, as well as links to some community forums and sites on the \n"
+"I2P network. You will receive news when there is a a new software release, and \n"
+"will be able to download the latest version here as well. Additionally, you can \n"
+"find shortcuts to other available applications. The console is customizable and \n"
 "includes a default light theme with a dark theme option."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:30
 msgid ""
-"<strong>SusiMail</strong>: SusiMail is a secure email client. It is "
-"primarily \n"
-"intended for use with Postman’s email servers inside of the I2P network ."
-" It \n"
-"is designed to avoid leaking information about email use to other "
-"networks. \n"
-"SusiMail is bridged so it can send and receive email from the internet as"
-" well. \n"
-"Occasionally you may see some services like Gmail classifying it as spam,"
-" which \n"
+"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n"
+"intended for use with Postman’s email servers inside of the I2P network . It \n"
+"is designed to avoid leaking information about email use to other networks. \n"
+"SusiMail is bridged so it can send and receive email from the internet as well. \n"
+"Occasionally you may see some services like Gmail classifying it as spam, which \n"
 "you can correct in your Internet email service providers settings."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:36
 #, python-format
 msgid ""
-"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P"
-" network only BitTorrent client. It never makes a connection to a peer "
-"over any other network."
+"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P "
+"network only BitTorrent client. It never makes a connection to a peer over "
+"any other network."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:37
 #, python-format
 msgid ""
-"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This "
-"is a locally-defined list of \n"
-"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P "
-"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) "
-"It integrates with other applications to \n"
+"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n"
+"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n"
 "allow you to use those human-readable addresses in place of those I2P \n"
-"addresses. It is more similar to a hosts file or a contact list than a "
-"network \n"
-"database or a DNS service. There is no recognized global namespace, you "
-"decide \n"
+"addresses. It is more similar to a hosts file or a contact list than a network \n"
+"database or a DNS service. There is no recognized global namespace, you decide \n"
 "what any given .i2p domain maps to in the end."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:46
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services "
-"Manager</a></strong> This is a general-purpose \n"
+"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n"
 "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n"
-"requests to and from I2P. It provides a variety of “Tunnel Types” which "
-"are \n"
+"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n"
 "able to do advance filtering of traffic before it reaches I2P."
 msgstr ""
 
@@ -1129,8 +906,7 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:51
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web "
-"browser with advanced privacy and \n"
+"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n"
 "security features, this is the best browser to configure to browse I2P \n"
 "sites."
 msgstr ""
@@ -1138,27 +914,23 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:54
 #, python-format
 msgid ""
-"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser "
-"developed by Google that is the \n"
-"Open-Source base of Google Chrome, this is sometimes used as an "
-"alternative to \n"
+"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n"
+"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n"
 "Firefox."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:57
 msgid ""
-"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-"
-"Rich bittorrent client including I2P \n"
-"support and the unique ability to “Bridge” regular torrents in-to I2P so"
-" \n"
+"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n"
+"support and the unique ability to “Bridge” regular torrents in-to I2P so \n"
 "people can download them anonymously."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:60
 #, python-format
 msgid ""
-"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is "
-"a popular program used by systems administrators to <a "
+"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a "
+"popular program used by systems administrators to <a "
 "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell” "
 "accounts for users on the server."
 msgstr ""
@@ -1166,26 +938,17 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:61
 #, python-format
 msgid ""
-"<strong><a href=\"%(git)s\">Git</a>/<a "
-"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control "
-"tool which is \n"
-"distributed, and often recommends a fork-first workflow. Hosting source "
-"code on \n"
-"I2P is an important activity, so Gitlab-specific instructions are "
-"available for \n"
+"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n"
+"distributed, and often recommends a fork-first workflow. Hosting source code on \n"
+"I2P is an important activity, so Gitlab-specific instructions are available for \n"
 "all to use."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:65
 msgid ""
-"<strong><a href=\"https://debian.org\">Debian</a> and <a "
-"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible"
-" to obtain \n"
-"packages for Debian and Ubuntu GNU/Linux over I2P using <a "
-"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> "
-"and \n"
-"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-"
-"i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
+"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n"
+"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n"
+"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n"
 "developed."
 msgstr ""
 
@@ -1196,10 +959,8 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:70
 #, python-format
 msgid ""
-"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API "
-"is a language-independent \n"
-"API for writing applications that are I2P-native by communicating with "
-"the \n"
+"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n"
+"API for writing applications that are I2P-native by communicating with the \n"
 "local I2P router. It can provide Streaming-like capabilities, Anonymous \n"
 "Datagrams, or Repliable Datagrams."
 msgstr ""
@@ -1207,18 +968,15 @@ msgstr ""
 #: i2p2www/pages/site/about/software.html:74
 #, python-format
 msgid ""
-"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a "
-"deprecated technology, BOB \n"
+"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n"
 "users should migrate to SAM if it is possible for them to do so."
 msgstr ""
 
 #: i2p2www/pages/site/about/software.html:76
 #, python-format
 msgid ""
-"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an "
-"application, this is how Java \n"
-"applications communicate with the I2P router to set up tunnels, generate "
-"and \n"
+"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n"
+"applications communicate with the I2P router to set up tunnels, generate and \n"
 "manage keys, and communicate with other peers on the network."
 msgstr ""
 
@@ -1229,10 +987,8 @@ msgstr "Anëtarë të Projektit I2P"
 #: i2p2www/pages/site/about/team.html:5
 #, python-format
 msgid ""
-"We are a small group of people spread around several continents, working "
-"to\n"
-"advance different aspects of the project and discussing the design of the"
-"\n"
+"We are a small group of people spread around several continents, working to\n"
+"advance different aspects of the project and discussing the design of the\n"
 "network.\n"
 "<a href=\"%(volunteer)s\">Get involved!</a>"
 msgstr ""
@@ -1404,7 +1160,8 @@ msgid "Product Development"
 msgstr "Zhvillim Produkti"
 
 #: i2p2www/pages/site/about/team.html:117
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:120
@@ -1644,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "zhvillim i jbigi-it, migrim wiki, pastrim dokumentimi"
 
 #: i2p2www/pages/site/about/team.html:319
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/about/team.html:323
@@ -1694,32 +1452,25 @@ msgstr "&hellip; dhe plot të tjera"
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:6
 msgid ""
-"I2PCon 2015 was the first event of its kind. It had two short-term goals."
-"\n"
-"First, to provide the general public with an event where knowledge about "
-"privacy could be obtained.\n"
-"Second, to further the I2P project and its community with technical "
-"discussions\n"
+"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n"
+"First, to provide the general public with an event where knowledge about privacy could be obtained.\n"
+"Second, to further the I2P project and its community with technical discussions\n"
 "about cryptography, anonymity and I2P-centric topics."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:15
 msgid ""
 "A a larger and more long-term goal of this event was to build a\n"
-"commnutiy of privacy-conscious individuals. By connecting people who "
-"recognize\n"
-"the importance of privacy, we wanted to provide a forum where this "
-"community can grow."
+"commnutiy of privacy-conscious individuals. By connecting people who recognize\n"
+"the importance of privacy, we wanted to provide a forum where this community can grow."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:23
 msgid ""
 "The idea for this event was first spawned by our wonderful friends at\n"
 "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n"
-"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>."
-"\n"
-"The marketing was spearheaded by <a "
-"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
+"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n"
+"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n"
 "Without them this event would not have been possible."
 msgstr ""
 
@@ -1737,8 +1488,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:44
 msgid ""
-"Note that in-I2P torrents may also be available on the non-private "
-"internet due to bridging by Vuze clients."
+"Note that in-I2P torrents may also be available on the non-private internet "
+"due to bridging by Vuze clients."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:50
@@ -1777,10 +1528,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:85
 msgid ""
-"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, "
-"malware, network security, and DNS.\n"
-"His interest in I2P is centered on preserving user privacy, autonomous "
-"filtering, and anti-abuse."
+"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n"
+"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:89
@@ -1794,15 +1543,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:98
 msgid ""
-"Lance James is the founder of the Invisibile IRC Project, the predecessor"
-" to I2P, back in 2002.\n"
+"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n"
 "He founded his own cyber threat intelligence company in 2003.\n"
-"He's been focused on network security, malware research, and information "
-"security ever since.\n"
-"During 2011-2013, he was Director of Threat Intelligence for The "
-"Vigilant, which was acquired by Deloitte in 2013.\n"
-"He recently left Deloitte to do consulting through his company The James "
-"Group."
+"He's been focused on network security, malware research, and information security ever since.\n"
+"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n"
+"He recently left Deloitte to do consulting through his company The James Group."
 msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:109
@@ -1811,11 +1556,8 @@ msgstr ""
 
 #: i2p2www/pages/site/about/i2pcon/2015.html:115
 msgid ""
-"Nicholas Johnston is a Professor of Information Security in Sheridan "
-"College's School of Applied Computing in the InfoSec Bachelor's degree "
-"program.\n"
-"His previous professional career was in digital forensics and "
-"investigations.\n"
+"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n"
+"His previous professional career was in digital forensics and investigations.\n"
 "He is also a contractor specializing in incident response.\n"
 "His research areas include secure software development and data analytics."
 msgstr ""
@@ -1870,8 +1612,7 @@ msgstr "Dita 2"
 
 #: i2p2www/pages/site/about/i2pcon/index.html:4
 msgid ""
-"The first conference dedicated to I2P was held in Toronto on August "
-"15-16, 2015.\n"
+"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n"
 "See the link below for more information and links to slides and videos."
 msgstr ""
 
@@ -1889,15 +1630,11 @@ msgstr "Gusht 2010"
 
 #: i2p2www/pages/site/about/performance/future.html:7
 msgid ""
-"There are a few major techniques that can be done to improve the "
-"perceived\n"
-"performance of I2P - some of the following are CPU related, others "
-"bandwidth\n"
+"There are a few major techniques that can be done to improve the perceived\n"
+"performance of I2P - some of the following are CPU related, others bandwidth\n"
 "related, and others still are protocol related.  However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of "
-"the\n"
-"network, as they reduce contention for scarce resources.  This list is of"
-" course\n"
+"dimensions affect the latency, throughput, and perceived performance of the\n"
+"network, as they reduce contention for scarce resources.  This list is of course\n"
 "not comprehensive, but it does cover the major ones that are seen."
 msgstr ""
 
@@ -1916,14 +1653,10 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:21
 #, python-format
 msgid ""
-"Probably one of the most important parts of getting faster performance "
-"will\n"
-"be improving how routers choose the peers that they build their tunnels "
-"through\n"
-"- making sure they don't use peers with slow links or ones with fast "
-"links that\n"
-"are overloaded, etc.  In addition, we've got to make sure we don't expose"
-"\n"
+"Probably one of the most important parts of getting faster performance will\n"
+"be improving how routers choose the peers that they build their tunnels through\n"
+"- making sure they don't use peers with slow links or ones with fast links that\n"
+"are overloaded, etc.  In addition, we've got to make sure we don't expose\n"
 "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n"
 "from a powerful adversary with lots of fast machines."
 msgstr ""
@@ -1934,20 +1667,13 @@ msgstr "Përimtime baze të dhënash rrjeti"
 
 #: i2p2www/pages/site/about/performance/future.html:31
 msgid ""
-"We're going to want to be more efficient with the network database's "
-"healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace "
-"for new\n"
-"peers - causing a significant number of network messages and router load "
-"- we\n"
-"can slow down or even stop exploring until we detect that there's "
-"something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time "
-"someone\n"
-"gave us a reference to someone we had never heard of).  We can also do "
-"some\n"
-"tuning on what we actually send - how many peers we bounce back (or even "
-"if we\n"
+"We're going to want to be more efficient with the network database's healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
+"peers - causing a significant number of network messages and router load - we\n"
+"can slow down or even stop exploring until we detect that there's something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
+"gave us a reference to someone we had never heard of).  We can also do some\n"
+"tuning on what we actually send - how many peers we bounce back (or even if we\n"
 "bounce back a reply), as well as how many concurrent searches we perform."
 msgstr ""
 
@@ -1958,24 +1684,15 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:43
 #, python-format
 msgid ""
-"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> "
-"algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and "
-"expiring\n"
-"them if they aren't used quickly enough.  If we expire them too soon, "
-"we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we "
-"don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we"
-" don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses "
-"some\n"
-"tags, even more encryption failures may occur prior to detection).  With "
-"some\n"
-"more active detection and feedback driven algorithms, we can safely and "
-"more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal "
-"encryption with\n"
+"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
+"them if they aren't used quickly enough.  If we expire them too soon, we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
+"tags, even more encryption failures may occur prior to detection).  With some\n"
+"more active detection and feedback driven algorithms, we can safely and more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
 "a trivial AES operation."
 msgstr ""
 
@@ -1995,33 +1712,24 @@ msgstr ""
 msgid ""
 "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n"
 "algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being "
-"encrypted \n"
-"with the associated AES session's key. This prevents peers from "
-"distinguishing \n"
-"messages that are part of the same session, since each message has a "
-"completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
+"with the associated AES session's key. This prevents peers from distinguishing \n"
+"messages that are part of the same session, since each message has a completely \n"
 "new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, "
-"transparently \n"
-"delivering a way to identify future messages. We then have to keep track"
-" \n"
+"new set of session tags within the encrypted message itself, transparently \n"
+"delivering a way to identify future messages. We then have to keep track \n"
 "of what messages are successfully delivered so that we know what tags \n"
 "we may use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:74
 msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms"
-" \n"
+"This works fine and is fairly robust, however it is inefficient in terms \n"
 "of bandwidth usage, as it requires the delivery of these tags ahead of \n"
 "time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs"
-" \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that"
-" \n"
-"size can be avoided by replacing the delivery of the tags with a "
-"synchronized \n"
+"their expiration). On average though, predelivering the session tag costs \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
+"size can be avoided by replacing the delivery of the tags with a synchronized \n"
 "PRNG - when a new session is established (through an ElGamal encrypted \n"
 "block), both sides seed a PRNG for use and generate the session tags on \n"
 "demand (with the recipient precalculating the next few possible values \n"
@@ -2034,32 +1742,24 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:88
 msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, "
-"though\n"
-"it \"feels okay\".  Once we've got tunnel healing code and more effective"
-" failure\n"
-"detection, we'll be able to more safely vary those durations, reducing "
-"the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
+"it \"feels okay\".  Once we've got tunnel healing code and more effective failure\n"
+"detection, we'll be able to more safely vary those durations, reducing the\n"
 "network and CPU load (due to expensive tunnel creation messages)."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:95
 msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth "
-"routers, but\n"
-"we should not resort to it until we've tuned the tunnel building "
-"algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
-"places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
+"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
 "so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such "
-"a change."
+"Also, it would be difficult to maintain backward compatibility with such a change."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:102
 msgid ""
-"Currently, since the network average tunnel build success rate is fairly "
-"high,\n"
+"Currently, since the network average tunnel build success rate is fairly high,\n"
 "there are no current plans to extend tunnel lifetime."
 msgstr ""
 
@@ -2069,27 +1769,19 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:109
 msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
-" are the\n"
-"current timeouts for various activities.  Why do we have a 60 second "
-"\"peer\n"
-"unreachable\" timeout?  Why do we try sending through a different tunnel "
-"that a\n"
-"LeaseSet advertises after 10 seconds?  Why are the network database "
-"queries\n"
-"bounded by 60 or 20 second limits?  Why are destinations configured to "
-"ask for a\n"
-"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a "
-"peer to\n"
-"reply to our request that they join a tunnel?  Why do we consider a "
-"tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
+"current timeouts for various activities.  Why do we have a 60 second \"peer\n"
+"unreachable\" timeout?  Why do we try sending through a different tunnel that a\n"
+"LeaseSet advertises after 10 seconds?  Why are the network database queries\n"
+"bounded by 60 or 20 second limits?  Why are destinations configured to ask for a\n"
+"new set of tunnels every 10 minutes?  Why do we allow 60 seconds for a peer to\n"
+"reply to our request that they join a tunnel?  Why do we consider a tunnel that\n"
 "doesn't pass our test within 60 seconds \"dead\"?"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:119
 msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as "
-"well\n"
+"Each of those imponderables can be addressed with more adaptive code, as well\n"
 "as tunable parameters to allow for more appropriate tradeoffs between\n"
 "bandwidth, latency, and CPU usage."
 msgstr ""
@@ -2106,17 +1798,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:134
 msgid ""
-"Client level bandwidth limiting (in either or both directions on a "
-"stream, \n"
-"or possibly shared across multiple streams). This would be in addition to"
-" \n"
+"Client level bandwidth limiting (in either or both directions on a stream, \n"
+"or possibly shared across multiple streams). This would be in addition to \n"
 "the router's overall bandwidth limiting, of course."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/future.html:141
 msgid ""
-"Access control lists (only allowing streams to or from certain other "
-"known \n"
+"Access control lists (only allowing streams to or from certain other known \n"
 "destinations)."
 msgstr ""
 
@@ -2129,8 +1818,7 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/future.html:153
 #, python-format
 msgid ""
-"Additional ideas for improving the streaming library are described on the"
-"\n"
+"Additional ideas for improving the streaming library are described on the\n"
 "<a href=\"%(streaming)s#future\">streaming library page</a>."
 msgstr ""
 
@@ -2141,10 +1829,8 @@ msgstr "Historik Funksionimi"
 #: i2p2www/pages/site/about/performance/history.html:4
 #, python-format
 msgid ""
-"Notable performance improvements have been made using the techniques "
-"below.\n"
-"There is more to do, see the <a href=\"%(performance)s\">Performance</a> "
-"page\n"
+"Notable performance improvements have been made using the techniques below.\n"
+"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n"
 "for current issues and thoughts."
 msgstr ""
 
@@ -2163,30 +1849,23 @@ msgstr "e sendërtuar"
 #: i2p2www/pages/site/about/performance/history.html:12
 #, python-format
 msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent "
-"within\n"
+"When I last profiled the I2P code, the vast majority of time was spent within\n"
 "one function: java.math.BigInteger's\n"
 "<a href=\"%(modpow)s\">modPow</a>.\n"
 "Rather than try to tune this method, we'll call out to\n"
 "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n"
 "(with tuned assembler for many architectures). (<i>Editor: see\n"
-"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key "
-"cryptography</a></i>)"
+"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:23
 msgid ""
 "\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java "
-"code\n"
-"is already deployed with hooks for that whenever its ready.  Preliminary "
-"results\n"
-"look fantastic - running the router with the native GMP modPow is "
-"providing over\n"
-"a 800&#37; speedup in encryption performance, and the load was cut in "
-"half.  This\n"
-"was just on one user's machine, and things are nowhere near ready for "
-"packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
+"is already deployed with hooks for that whenever its ready.  Preliminary results\n"
+"look fantastic - running the router with the native GMP modPow is providing over\n"
+"a 800&#37; speedup in encryption performance, and the load was cut in half.  This\n"
+"was just on one user's machine, and things are nowhere near ready for packaging\n"
 "and deployment, yet."
 msgstr ""
 
@@ -2200,55 +1879,40 @@ msgstr "e sendëruar, por lyp përimtim"
 
 #: i2p2www/pages/site/about/performance/history.html:34
 msgid ""
-"This algorithm tweak will only be relevant for applications that want "
-"their\n"
-"peers to reply to them (though that includes everything that uses "
-"I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want their\n"
+"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
 "mihi's ministreaming lib):"
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:39
 msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do "
-"a\n"
-"lookup in the network database - sending out a few requests to get "
-"Alice's\n"
-"current LeaseSet.  If he already has Alice's current LeaseSet, he can "
-"instead\n"
-"just send his reply immediately - this is (part of) why it typically "
-"takes a\n"
-"little longer talking to someone the first time you connect, but "
-"subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
+"lookup in the network database - sending out a few requests to get Alice's\n"
+"current LeaseSet.  If he already has Alice's current LeaseSet, he can instead\n"
+"just send his reply immediately - this is (part of) why it typically takes a\n"
+"little longer talking to someone the first time you connect, but subsequent\n"
 "communication is faster.  Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the "
-"recipient,\n"
-"so that when they go to reply, they'll <i>always</i> have the LeaseSet "
-"locally\n"
-"stored - completely removing any need for a network database lookup on "
-"replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster"
-" reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
+"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n"
+"stored - completely removing any need for a network database lookup on replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
 "If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient "
-"doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient doesn't\n"
 "have to do the network database lookup."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:54
 msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only "
-"way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
 "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100&#37; overhead to a high-bandwidth connection, and much more to"
-"\n"
+"almost 100&#37; overhead to a high-bandwidth connection, and much more to\n"
 "a connection with smaller messages."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:60
 msgid ""
 "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes."
-"\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
 "This will substantially reduce the total overhead of I2P messaging."
 msgstr ""
 
@@ -2259,20 +1923,13 @@ msgstr ""
 #: i2p2www/pages/site/about/performance/history.html:68
 msgid ""
 "At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to "
-"negotiate a\n"
-"private session key.  This means that if someone's clock is really wrong,"
-" or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running "
-"an\n"
-"incompatible version of the router), they're going to consistently "
-"(though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic"
-"\n"
-"operation on all the peers they know about.  While we will want to keep "
-"some\n"
-"verification/validation within the encryption boundary, we'll want to "
-"update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
+"private session key.  This means that if someone's clock is really wrong, or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running an\n"
+"incompatible version of the router), they're going to consistently (though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
+"operation on all the peers they know about.  While we will want to keep some\n"
+"verification/validation within the encryption boundary, we'll want to update the\n"
 "protocol to do some of it first, so that we can reject them cleanly\n"
 "without wasting much CPU or other resources."
 msgstr ""
@@ -2283,16 +1940,11 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:83
 msgid ""
-"Rather than going with the fairly random scheme we have now, we should "
-"use a\n"
-"more context aware algorithm for testing tunnels.  e.g. if we already "
-"know its\n"
-"passing valid data correctly, there's no need to test it, while if we "
-"haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some "
-"data its\n"
-"way.  This will reduce the tunnel contention due to excess messages, as "
-"well as\n"
+"Rather than going with the fairly random scheme we have now, we should use a\n"
+"more context aware algorithm for testing tunnels.  e.g. if we already know its\n"
+"passing valid data correctly, there's no need to test it, while if we haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
+"way.  This will reduce the tunnel contention due to excess messages, as well as\n"
 "improve the speed at which we detect - and address - failing tunnels."
 msgstr ""
 
@@ -2302,17 +1954,14 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:93
 msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
-"selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
 "implemented in release 0.6.2."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:97
 msgid ""
-"Selecting tunnels and leases at random for every message creates a large"
-" \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from"
-" \n"
+"Selecting tunnels and leases at random for every message creates a large \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from \n"
 "increasing its window size as much as it could. By persisting with the \n"
 "same selections for a given connection, the transfer rate is much faster."
 msgstr ""
@@ -2323,20 +1972,13 @@ msgstr "Ngjeshje e disa strukturash të dhënash"
 
 #: i2p2www/pages/site/about/performance/history.html:106
 msgid ""
-"The I2NP messages and the data they contain is already defined in a "
-"fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is "
-"not -\n"
-"\"options\" is a plain ASCII name = value mapping.  Right now, we're "
-"filling it\n"
-"with those published statistics - around 3300 bytes per peer.  Trivial to"
-"\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and "
-"when you\n"
-"consider how often RouterInfo structures are passed across the network, "
-"that's\n"
-"significant savings - every time a router asks another router for a "
-"networkDb\n"
+"The I2NP messages and the data they contain is already defined in a fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is not -\n"
+"\"options\" is a plain ASCII name = value mapping.  Right now, we're filling it\n"
+"with those published statistics - around 3300 bytes per peer.  Trivial to\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
+"consider how often RouterInfo structures are passed across the network, that's\n"
+"significant savings - every time a router asks another router for a networkDb\n"
 "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
 msgstr ""
 
@@ -2350,26 +1992,16 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:119
 msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream "
-"negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
-"message, then\n"
-"Alice and Bob send each other some data, until one of them sends the "
-"other a\n"
-"CLOSE message.  For long lasting connections (to an IRC server, for "
-"instance),\n"
-"that overhead is negligible, but for simple one-off request/response "
-"situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many "
-"messages as\n"
-"necessary.  If, however, Alice piggybacked her first payload in with the "
-"SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps "
-"also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could "
-"be\n"
-"reduced to a pair of messages, instead of the "
-"SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
+"Alice and Bob send each other some data, until one of them sends the other a\n"
+"CLOSE message.  For long lasting connections (to an IRC server, for instance),\n"
+"that overhead is negligible, but for simple one-off request/response situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
+"necessary.  If, however, Alice piggybacked her first payload in with the SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could be\n"
+"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:132
@@ -2378,18 +2010,12 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/history.html:134
 msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in "
-"the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
-"allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to "
-"be used\n"
-"for reliable, blocking operation (under the covers, its still all "
-"unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic "
-"wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the "
-"target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
+"for reliable, blocking operation (under the covers, its still all unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
 "ACK message is forwarded back to us [through tunnels, of course])."
 msgstr ""
 
@@ -2397,16 +2023,11 @@ msgstr ""
 #, python-format
 msgid ""
 "As I've <a href=\"%(link)s\">said</a>, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing "
-"that\n"
-"could be done, but more efficient mechanisms are available.  When we rip "
-"out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
-"with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
-"\n"
-"implement the streaming library to take advantage of the design "
-"experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
+"could be done, but more efficient mechanisms are available.  When we rip out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
+"implement the streaming library to take advantage of the design experiences of\n"
 "the TCP layer - selective ACKs, congestion detection, nagle, etc."
 msgstr ""
 
@@ -2422,52 +2043,33 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:7
 msgid ""
-"Probably one of the most frequent things people ask is \"how fast is "
-"I2P?\",\n"
-"and no one seems to like the answer - \"it depends\".  After trying out "
-"I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is"
-" a most\n"
+"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
+"and no one seems to like the answer - \"it depends\".  After trying out I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
 "emphatic <b>yes</b>."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:14
 msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and "
-"tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is "
-"generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For"
-" example, a small subset of 20-50 nodes are only available to build "
-"tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes "
-"every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router"
-" has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for "
-"reachability and capacity will likely show different results, as the "
-"other routers could be under load just as one router tests, but be free "
-"if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:23
 msgid ""
-"The above describes why each I2P node has different nodes to build "
-"tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels "
-"(which are built via those nodes) have different latency and bandwidth "
-"values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes "
-"have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:29
 msgid ""
-"A server/client is known as a \"destination\" and each destination has at"
-" least one inbound and one outbound tunnel. The default is 3 hops per "
-"tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
-" client-server-client."
+"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:34
@@ -2482,102 +2084,61 @@ msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:47
 msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new "
-"data is sent, it needs to wait until a ack package returns from the "
-"server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
 "In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual "
-"I2P node and each connection on this roundtrip, it takes usually 1-3 "
-"seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a "
-"limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of "
-"20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
-"the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
 "latency and other limitations."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:57
 msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, "
-"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
-"is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
-" to transport data. With a max of 50 kb/sec per tunnel, a destination "
-"could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
-"shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
 "Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to "
-"usage of \"shut down at once\" or situations where there is power loss) "
-"does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in "
-"loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:66
 msgid ""
-"With a limited set of destinations and a limited set of tunnels per "
-"destination, one I2P node only uses a limited set of tunnels across other"
-" I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we "
-"only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of "
-"participating tunnels could be built with a limited amount of bandwidth "
-"all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, "
-"there is only a fraction of available bandwidth/capacity available for "
-"use."
+"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:73
 msgid ""
-"To remain anonymous one router should not be used by the whole network "
-"for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
-" very real central point of failure as well as a central point to grab "
-"IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this"
-" reason."
+"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:79
 msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes "
-"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
-"sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office "
-"routers (DSL, cable,..) only allow a small number of connections (or just"
-" go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
-" type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
 "This limits the amount of traffic routed across your I2P node as well."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:86
 msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why "
-"your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
-"shared and is reachable 24/7, it should be used after some time for "
-"participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other "
-"nodes will tell them: you are not reachable. This blocks your node for at"
-" least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not"
-" use your node for 24h for building tunnels. This is why your traffic "
-"will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
 "be lower after a restart/shutdown for a minimum of 24h."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:94
 msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for "
-"reachability and capacity. It takes time for other nodes to get known to "
-"your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a "
-"torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
 msgstr ""
 
 #: i2p2www/pages/site/about/performance/index.html:99
@@ -2590,4 +2151,3 @@ msgid ""
 "For possible future performance improvements see\n"
 "<a href=\"%(future)s\">Future Performance Improvements</a>."
 msgstr ""
-
diff --git a/i2p2www/translations/sq/LC_MESSAGES/docs.po b/i2p2www/translations/sq/LC_MESSAGES/docs.po
index 40363200e1b9c992c7868e2c7043e5401eb09c50..189275b9c3370c174d2d52db17d4c0626b0f1e40 100644
--- a/i2p2www/translations/sq/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/sq/LC_MESSAGES/docs.po
@@ -1,21 +1,22 @@
-# Albanian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-10-11 16:27+0000\n"
-"PO-Revision-Date: 2021-10-12 09:24+0000\n"
-"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: Albanian (http://www.transifex.com/otf/I2P/language/sq/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: sq\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/docs/index.html:2 i2p2www/pages/site/docs/index.html:24
 msgid "Index to Technical Documentation"
@@ -30,16 +31,14 @@ msgid ""
 "This index is ordered from the highest to lowest layers.\n"
 "The higher layers are for \"clients\" or applications;\n"
 "the lower layers are inside the router itself.\n"
-"The interface between applications and the router is the I2CP (I2P "
-"Control\n"
+"The interface between applications and the router is the I2CP (I2P Control\n"
 "Protocol) API."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:18
 #, python-format
 msgid ""
-"The I2P Project is committed to maintaining accurate, current "
-"documentation.\n"
+"The I2P Project is committed to maintaining accurate, current documentation.\n"
 "If you find any inaccuracies in the documents linked below, please\n"
 "<a href=\"%(trac)s\">enter a ticket identifying the problem</a>."
 msgstr ""
@@ -96,8 +95,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/index.html:36
 #, python-format
 msgid ""
-"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a>"
-" August 28, 2003 (pdf)"
+"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a> "
+"August 28, 2003 (pdf)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:39
@@ -126,7 +125,8 @@ msgstr ""
 msgid "Managed Clients"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:47 i2p2www/pages/site/docs/index.html:240
+#: i2p2www/pages/site/docs/index.html:47
+#: i2p2www/pages/site/docs/index.html:240
 msgid "Embedding the router in your application"
 msgstr ""
 
@@ -143,7 +143,8 @@ msgstr ""
 msgid "hostsdb.blockfile Format"
 msgstr ""
 
-#: i2p2www/pages/site/docs/index.html:51 i2p2www/pages/site/docs/index.html:206
+#: i2p2www/pages/site/docs/index.html:51
+#: i2p2www/pages/site/docs/index.html:206
 msgid "Configuration File Format"
 msgstr ""
 
@@ -220,8 +221,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:101
 msgid ""
-"The lowest-level API used for clients (applications) to send and receive "
-"traffic to a router.\n"
+"The lowest-level API used for clients (applications) to send and receive traffic to a router.\n"
 "Traditionally used only by Java applications and higher-level APIs."
 msgstr ""
 
@@ -280,8 +280,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:127
 msgid ""
-"Distributed storage and retrieval of information about routers and "
-"clients."
+"Distributed storage and retrieval of information about routers and clients."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:129
@@ -343,8 +342,8 @@ msgstr "Tunele"
 
 #: i2p2www/pages/site/docs/index.html:154
 msgid ""
-"Selecting peers, requesting tunnels through those peers, and encrypting "
-"and routing messages through these tunnels."
+"Selecting peers, requesting tunnels through those peers, and encrypting and "
+"routing messages through these tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:156
@@ -399,7 +398,8 @@ msgid "Transport Layer"
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:171
-msgid "The protocols for direct (point-to-point) router to router communication."
+msgid ""
+"The protocols for direct (point-to-point) router to router communication."
 msgstr ""
 
 #: i2p2www/pages/site/docs/index.html:173
@@ -565,43 +565,30 @@ msgstr ""
 msgid ""
 "I2P ships with a generic naming library and a base implementation \n"
 "designed to work off a local name to destination mapping, as well as an\n"
-"add-on application called the <a href=\"#addressbook\">address book</a>."
-" \n"
-"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to "
-"Tor's .onion addresses."
+"add-on application called the <a href=\"#addressbook\">address book</a>. \n"
+"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to Tor's .onion addresses."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:15
 msgid ""
 "The address book is a web-of-trust\n"
-"driven secure, distributed, and human readable naming system, sacrificing"
-" only\n"
-"the call for all human readable names to be globally unique by mandating "
-"only\n"
-"local uniqueness.  While all messages in I2P are cryptographically "
-"addressed\n"
-"by their destination, different people can have local address book "
-"entries for\n"
-"\"Alice\" which refer to different destinations.  People can still "
-"discover new\n"
-"names by importing published address books of peers specified in their "
-"web of trust,\n"
-"by adding in the entries provided through a third party, or (if some "
-"people organize\n"
-"a series of published address books using a first come first serve "
-"registration\n"
-"system) people can choose to treat these address books as name servers, "
-"emulating\n"
+"driven secure, distributed, and human readable naming system, sacrificing only\n"
+"the call for all human readable names to be globally unique by mandating only\n"
+"local uniqueness.  While all messages in I2P are cryptographically addressed\n"
+"by their destination, different people can have local address book entries for\n"
+"\"Alice\" which refer to different destinations.  People can still discover new\n"
+"names by importing published address books of peers specified in their web of trust,\n"
+"by adding in the entries provided through a third party, or (if some people organize\n"
+"a series of published address books using a first come first serve registration\n"
+"system) people can choose to treat these address books as name servers, emulating\n"
 "traditional DNS."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:29
 #, python-format
 msgid ""
-"NOTE: For the reasoning behind the I2P naming system, common arguments "
-"against it\n"
-"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming"
-" discussion</a>\n"
+"NOTE: For the reasoning behind the I2P naming system, common arguments against it\n"
+"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming discussion</a>\n"
 "page."
 msgstr ""
 
@@ -631,34 +618,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:55
 msgid ""
-"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for "
-"lookups and points\n"
+"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for lookups and points\n"
 "the user to remote jump services to assist with failed lookups."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:59
 msgid ""
-"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to "
-"add hosts to their local hosts.txt"
+"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to add "
+"hosts to their local hosts.txt"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:62
 msgid ""
-"HTTP <a href=\"#jump-services\">jump services</a> which provide their own"
-" lookups and redirection."
+"HTTP <a href=\"#jump-services\">jump services</a> which provide their own "
+"lookups and redirection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:65
 msgid ""
-"The <a href=\"#addressbook\">address book</a> application which merges "
-"external\n"
+"The <a href=\"#addressbook\">address book</a> application which merges external\n"
 "host lists, retrieved via HTTP, with the local list."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:69
 msgid ""
-"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web "
-"front-end\n"
+"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web front-end\n"
 "for address book configuration and viewing of the local host lists."
 msgstr ""
 
@@ -670,15 +654,11 @@ msgstr ""
 #, python-format
 msgid ""
 "All destinations in I2P are 516-byte (or longer) keys.\n"
-"(To be more precise, it is a 256-byte public key plus a 128-byte signing "
-"key\n"
-"plus a 3-or-more byte certificate, which in Base64 representation is 516 "
-"or more bytes.\n"
-"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> "
-"are in use now\n"
+"(To be more precise, it is a 256-byte public key plus a 128-byte signing key\n"
+"plus a 3-or-more byte certificate, which in Base64 representation is 516 or more bytes.\n"
+"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> are in use now\n"
 "for signature type indication.\n"
-"Therefore, certificates in recently-generated destinations are more than "
-"3 bytes."
+"Therefore, certificates in recently-generated destinations are more than 3 bytes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:87
@@ -697,8 +677,7 @@ msgid ""
 "The hosts.txt Naming Service does a simple linear search through\n"
 "text files. This naming service was the default until\n"
 "release 0.8.8 when it was replaced by the Blockfile Naming Service.\n"
-"The hosts.txt format had become too slow after the file grew to thousands"
-" of entries."
+"The hosts.txt format had become too slow after the file grew to thousands of entries."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:102
@@ -706,8 +685,7 @@ msgstr ""
 msgid ""
 "It does a linear search through three local files, in order, to\n"
 "look up host names and convert them to a 516-byte destination key.\n"
-"Each file is in a simple <a href=\"%(configuration)s\">configuration file"
-" format</a>, with hostname=base64, one per line.\n"
+"Each file is in a simple <a href=\"%(configuration)s\">configuration file format</a>, with hostname=base64, one per line.\n"
 "The files are:"
 msgstr ""
 
@@ -717,8 +695,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:116
 msgid ""
-"The Blockfile Naming Service stores multiple \"address books\" in a "
-"single\n"
+"The Blockfile Naming Service stores multiple \"address books\" in a single\n"
 "database file named hostsdb.blockfile.\n"
 "This Naming Service is the default since release 0.8.8."
 msgstr ""
@@ -726,32 +703,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:122
 #, python-format
 msgid ""
-"A blockfile is simply on-disk storage of multiple sorted maps (key-value "
-"pairs),\n"
+"A blockfile is simply on-disk storage of multiple sorted maps (key-value pairs),\n"
 "implemented as skiplists.\n"
-"The blockfile format is specified on the <a "
-"href=\"%(blockfile)s\">Blockfile page</a>.\n"
-"It provides fast Destination lookup in a compact format. While the "
-"blockfile overhead is substantial,\n"
-"the destinations are stored in binary rather than in Base 64 as in the "
-"hosts.txt format.\n"
-"In addition, the blockfile provides the capability of arbitrary metadata "
-"storage\n"
-"(such as added date, source, and comments) for each entry to implement "
-"advanced address book features.\n"
-"The blockfile storage requirement is a modest increase over the hosts.txt"
-" format, and the blockfile provides\n"
+"The blockfile format is specified on the <a href=\"%(blockfile)s\">Blockfile page</a>.\n"
+"It provides fast Destination lookup in a compact format. While the blockfile overhead is substantial,\n"
+"the destinations are stored in binary rather than in Base 64 as in the hosts.txt format.\n"
+"In addition, the blockfile provides the capability of arbitrary metadata storage\n"
+"(such as added date, source, and comments) for each entry to implement advanced address book features.\n"
+"The blockfile storage requirement is a modest increase over the hosts.txt format, and the blockfile provides\n"
 "approximately 10x reduction in lookup times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:134
 msgid ""
-"On creation, the naming service imports entries from the three files used"
-" by the hosts.txt Naming Service.\n"
-"The blockfile mimics the previous implementation by maintaining three "
-"maps that\n"
-"are searched in-order, named privatehosts.txt, userhosts.txt, and "
-"hosts.txt.\n"
+"On creation, the naming service imports entries from the three files used by the hosts.txt Naming Service.\n"
+"The blockfile mimics the previous implementation by maintaining three maps that\n"
+"are searched in-order, named privatehosts.txt, userhosts.txt, and hosts.txt.\n"
 "It also maintains a reverse-lookup map to implement rapid reverse lookups."
 msgstr ""
 
@@ -781,31 +748,24 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:158
 #, python-format
 msgid ""
-"The naming service is specified with the configuration property "
-"<tt>i2p.naming.impl=class</tt>.\n"
+"The naming service is specified with the configuration property <tt>i2p.naming.impl=class</tt>.\n"
 "Other implementations are possible. For example,\n"
-"there is an experimental facility for real-time lookups (a la DNS) over "
-"the network within the router.\n"
-"For more information see the <a "
-"href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion"
-" page</a>."
+"there is an experimental facility for real-time lookups (a la DNS) over the network within the router.\n"
+"For more information see the <a href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:165
 msgid ""
-"The HTTP proxy does a lookup via the router for all hostnames ending in "
-"'.i2p'.\n"
+"The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'.\n"
 "Otherwise, it forwards the request to a configured HTTP outproxy.\n"
-"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-"
-"Top Level Domain '.i2p'."
+"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:171
 #, python-format
 msgid ""
 "We have <a href=\"%(i2ptld)s\">applied to reserve the .i2p TLD</a>\n"
-"following the procedures specified in <a href=\"%(rfc6761)s\">RFC "
-"6761</a>."
+"following the procedures specified in <a href=\"%(rfc6761)s\">RFC 6761</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:177
@@ -844,14 +804,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:202
 msgid ""
 "For this reason, the only subscription configured by\n"
-"default is <code>http://i2p-projekt.i2p/hosts.txt "
-"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>,"
-" \n"
+"default is <code>http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>, \n"
 "which contains a copy of the hosts.txt included\n"
 "in the I2P release.\n"
 "Users must configure additional subscriptions in their\n"
-"local address book application (via subscriptions.txt or <a "
-"href=\"#susidns\">SusiDNS</a>)."
+"local address book application (via subscriptions.txt or <a href=\"#susidns\">SusiDNS</a>)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:211
@@ -860,8 +817,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:218
 msgid ""
-"The operators of these services may have various policies for listing "
-"hosts.\n"
+"The operators of these services may have various policies for listing hosts.\n"
 "Presence on this list does not imply endorsement."
 msgstr ""
 
@@ -872,12 +828,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:224
 msgid ""
-"While there are hopefully not any technical limitations within I2P on "
-"host names,\n"
+"While there are hopefully not any technical limitations within I2P on host names,\n"
 "the address book enforces several restrictions on host names\n"
 "imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with "
-"browsers,\n"
+"It does this for basic typographical sanity and compatibility with browsers,\n"
 "and for security.\n"
 "The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
 "Any hostnames violating these rules may not be propagated\n"
@@ -890,13 +844,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:243
 msgid ""
-"Names are checked for conflict with existing names in the existing "
-"userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
 "(but not privatehosts.txt) after conversion to lower case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:248
-msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgid ""
+"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:252
@@ -932,8 +886,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:280
 msgid ""
 "Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
-"*.console.i2p, and others)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:285
@@ -956,8 +909,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:302
 msgid ""
-"Any name received via subscription that passes all the checks is added "
-"via the local naming service."
+"Any name received via subscription that passes all the checks is added via "
+"the local naming service."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:306
@@ -974,19 +927,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:317
 msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
-"form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location "
-"bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
 "add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:323
 msgid ""
-"As the address book application does not use privatehosts.txt at all, in "
-"practice\n"
-"this file is the only place where it is appropriate to place private "
-"aliases or\n"
+"As the address book application does not use privatehosts.txt at all, in practice\n"
+"this file is the only place where it is appropriate to place private aliases or\n"
 "\"pet names\" for sites already in hosts.txt."
 msgstr ""
 
@@ -1001,16 +950,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/naming.html:338
 msgid ""
 "Address Book will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local I2P Site's home directory) to be "
-"accessed by others\n"
+"(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others\n"
 "for their subscriptions.\n"
 "This step is optional and is disabled by default."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:346
 msgid ""
-"The address book application, together with eepget, saves the Etag and/or"
-" Last-Modified\n"
+"The address book application, together with eepget, saves the Etag and/or Last-Modified\n"
 "information returned by the web server of the subscription.\n"
 "This greatly reduces the bandwidth required, as the web server will\n"
 "return a '304 Not Modified' on the next fetch if nothing has changed."
@@ -1027,8 +974,7 @@ msgid ""
 "Hosts serving a static hosts.txt or an equivalent CGI application\n"
 "are strongly encouraged to deliver\n"
 "a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when "
-"appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
 "This will dramatically reduce the network bandwidth, and\n"
 "reduce chances of corruption."
 msgstr ""
@@ -1039,8 +985,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:368
 msgid ""
-"A host add service is a simple CGI application that takes a hostname and "
-"a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
 "and adds that to its local hosts.txt.\n"
 "If other routers subscribe to that hosts.txt, the new hostname/key\n"
 "will be propagated through the network."
@@ -1048,10 +993,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:375
 msgid ""
-"It is recommended that host add services impose, at a minimum, the "
-"restrictions imposed by the address book application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and "
-"keys, for example:"
+"It is recommended that host add services impose, at a minimum, the restrictions imposed by the address book application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and keys, for example:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:380
@@ -1104,10 +1047,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:426
 msgid ""
-"A jump service is a simple CGI application that takes a hostname as a "
-"parameter\n"
-"and returns a 301 redirect to the proper URL with a "
-"<code>?i2paddresshelper=key</code>\n"
+"A jump service is a simple CGI application that takes a hostname as a parameter\n"
+"and returns a 301 redirect to the proper URL with a <code>?i2paddresshelper=key</code>\n"
 "string appended.\n"
 "The HTTP proxy will interpret the appended string and\n"
 "use that key as the actual destination.\n"
@@ -1130,16 +1071,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:448
 msgid ""
-"SusiDNS is simply a web interface front-end to configuring address book "
-"subscriptions\n"
+"SusiDNS is simply a web interface front-end to configuring address book subscriptions\n"
 "and accessing the four address book files.\n"
 "All the real work is done by the 'address book' application."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:454
 msgid ""
-"Currently, there is little enforcement of address book naming rules "
-"within SusiDNS,\n"
+"Currently, there is little enforcement of address book naming rules within SusiDNS,\n"
 "so a user may enter hostnames locally that would be rejected by\n"
 "the address book subscription rules."
 msgstr ""
@@ -1153,36 +1092,29 @@ msgid ""
 "I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
 "Base32 addresses are much shorter and easier to handle than the\n"
 "full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: "
-"<code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>"
+"Example: <code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:468
 #, python-format
 msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
-"hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
 "I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
 "The form is {52 chars}.b32.i2p.\n"
 "Tor has a\n"
-"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94"
-"-december-4th-2013\">proposal</a>\n"
-"to convert to an identical format of {52 chars}.onion for their hidden "
-"services.\n"
+"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-december-4th-2013\">proposal</a>\n"
+"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
 "Base32 is implemented in the naming service, which queries the\n"
 "router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and "
-"publishing\n"
+"Base32 lookups will only be successful when the Destination is up and publishing\n"
 "a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take "
-"significantly\n"
+"Because resolution may require a network database lookup, it may take significantly\n"
 "longer than a local address book lookup."
 msgstr ""
 
 #: i2p2www/pages/site/docs/naming.html:483
 msgid ""
-"Base32 addresses can be used in most places where hostnames or full "
-"destinations\n"
+"Base32 addresses can be used in most places where hostnames or full destinations\n"
 "are used, however there are some exceptions where they may fail if the\n"
 "name does not immediately resolve. I2PTunnel will fail, for example, if\n"
 "the name does not resolve to a destination."
@@ -1208,8 +1140,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:12
 msgid ""
-"There are now plugins available that support distributed email, blogs, "
-"IRC\n"
+"There are now plugins available that support distributed email, blogs, IRC\n"
 "clients, distributed file storage, wikis, and more."
 msgstr ""
 
@@ -1229,8 +1160,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:31
 msgid ""
-"Support large or special-purpose applications that would never be bundled"
-"\n"
+"Support large or special-purpose applications that would never be bundled\n"
 "with the I2P installation"
 msgstr ""
 
@@ -1244,8 +1174,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:44
 msgid ""
-"Separate initial install and update packages, if desired, for smaller "
-"update downloads"
+"Separate initial install and update packages, if desired, for smaller update"
+" downloads"
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:48
@@ -1275,7 +1205,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:70
-msgid "Automatic integration and startup of webapps into console Jetty instance"
+msgid ""
+"Automatic integration and startup of webapps into console Jetty instance"
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:74
@@ -1315,32 +1246,21 @@ msgstr "Instalim"
 
 #: i2p2www/pages/site/docs/plugins.html:101
 msgid ""
-"To install and start a plugin, copy the <code>.xpi2p</code> install link "
-"to\n"
+"To install and start a plugin, copy the <code>.xpi2p</code> install link to\n"
 "the form at the bottom of\n"
-"<a "
-"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp"
-" in\n"
-"your router console</a> and click the \"install plugin\" button.  After a"
-"\n"
-"plugin is installed and started, a link to the plugin will usually appear"
-" at\n"
+"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp in\n"
+"your router console</a> and click the \"install plugin\" button.  After a\n"
+"plugin is installed and started, a link to the plugin will usually appear at\n"
 "the top of your summary bar."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:110
 msgid ""
-"To update a plugin to the latest version, just click the update button on"
-"\n"
-"<a "
-"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>."
-"\n"
-"There is also a button to check if the plugin has a more recent version, "
-"as\n"
-"well as a button to check for updates for all plugins.  Plugins will be "
-"checked\n"
-"for updates automatically when updating to a new I2P release (not "
-"including dev\n"
+"To update a plugin to the latest version, just click the update button on\n"
+"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>.\n"
+"There is also a button to check if the plugin has a more recent version, as\n"
+"well as a button to check for updates for all plugins.  Plugins will be checked\n"
+"for updates automatically when updating to a new I2P release (not including dev\n"
 "builds)."
 msgstr ""
 
@@ -1351,25 +1271,21 @@ msgstr ""
 #: i2p2www/pages/site/docs/plugins.html:121
 #, python-format
 msgid ""
-"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and "
-"the\n"
+"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and the\n"
 "<a href=\"http://%(zzz)s/forums/16\">plugin forum</a> on %(zzz)s."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:126
 #, python-format
 msgid ""
-"See also the sources for plugins developed by various people.  Some "
-"plugins, such\n"
-"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were "
-"developed\n"
+"See also the sources for plugins developed by various people.  Some plugins, such\n"
+"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were developed\n"
 "specifically as examples."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:132
 msgid ""
-"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P"
-"\n"
+"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P\n"
 "or easily add some feature."
 msgstr ""
 
@@ -1381,8 +1297,7 @@ msgstr "Si T’ia Fillohet"
 #, python-format
 msgid ""
 "To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in "
-"monotone</a>."
+"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in monotone</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:144
@@ -1398,8 +1313,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/plugins.html:151
 msgid ""
 "Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush"
-" the\n"
+"the plugin was already run, as it requires class loader trickery to flush the\n"
 "class cache; a full router restart is required."
 msgstr ""
 
@@ -1409,32 +1323,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:161
 msgid ""
-"Plugins running in a separate JVM create a <code>logs/</code> directory "
-"in\n"
+"Plugins running in a separate JVM create a <code>logs/</code> directory in\n"
 "<code>$CWD</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:166
 msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using "
-"the\n"
+"No initial keys are present, except for those of jrandom and zzz (using the\n"
 "same keys as for router update), so the first key seen for a signer is\n"
 "automatically accepted&mdash;there is no signing key authority."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:172
 msgid ""
-"When deleting a plugin, the directory is not always deleted, especially "
-"on\n"
+"When deleting a plugin, the directory is not always deleted, especially on\n"
 "Windows."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:177
 msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
-"in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file "
-"is used."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
 msgstr ""
 
 #: i2p2www/pages/site/docs/plugins.html:182
@@ -1451,8 +1360,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/ports.html:7
 msgid ""
-"These are the ports used or reserved by I2P, including those for known "
-"plugins,\n"
+"These are the ports used or reserved by I2P, including those for known plugins,\n"
 "common alternates,\n"
 "and some typical related applications."
 msgstr ""
@@ -1486,20 +1394,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:10
 msgid ""
-"Reseed hosts are needed to for bootstrapping, that is, providing the "
-"initial set\n"
-"of I2P nodes for your I2P node to talk to. Depending on the status of "
-"your node\n"
-"it may need to bootstrap every now and then if many of the nodes it knows"
-" of\n"
+"Reseed hosts are needed to for bootstrapping, that is, providing the initial set\n"
+"of I2P nodes for your I2P node to talk to. Depending on the status of your node\n"
+"it may need to bootstrap every now and then if many of the nodes it knows of\n"
 "aren't contactable."
 msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:17
 msgid ""
 "Reseeding is done over an encrypted connection and all of the bootstrap\n"
-"information is signed by the reseed host you connect to, making it "
-"impossible\n"
+"information is signed by the reseed host you connect to, making it impossible\n"
 "for an unauthenticated source to provide you with false information."
 msgstr ""
 
@@ -1510,12 +1414,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/reseed.html:26
 msgid ""
 "Operating a reseed server can be accessible to any sysadmin familiar\n"
-"with I2P, and we encourage new reseed operators to get in contact with us"
-" at\n"
-"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed "
-"hosts that\n"
-"are run, the more resilient the I2P network becomes, and the harder it is"
-" to\n"
+"with I2P, and we encourage new reseed operators to get in contact with us at\n"
+"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed hosts that\n"
+"are run, the more resilient the I2P network becomes, and the harder it is to\n"
 "prevent users of I2P from connecting to the network."
 msgstr ""
 
@@ -1525,15 +1426,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:42
 msgid ""
-"In order to make I2P more reslient, other kinds of reseeding are "
-"possible. One\n"
-"important way of carrying out a reseed is the file-based reseed, where a "
-"user\n"
-"with a running I2P router generates a reseed file for a friend and "
-"transfers it\n"
+"In order to make I2P more reslient, other kinds of reseeding are possible. One\n"
+"important way of carrying out a reseed is the file-based reseed, where a user\n"
+"with a running I2P router generates a reseed file for a friend and transfers it\n"
 "to them as a .zip file. Others use cloud-based infrastructure to resist\n"
-"censorship. These reseed methods provide functionality which aids people "
-"in\n"
+"censorship. These reseed methods provide functionality which aids people in\n"
 "situations where reseeds are restricted."
 msgstr ""
 
@@ -1543,8 +1440,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/reseed.html:60
 msgid ""
-"If you are running a reseed server, We would like to thank you for "
-"helping to\n"
+"If you are running a reseed server, We would like to thank you for helping to\n"
 "make the I2P network stronger and more resilient than ever."
 msgstr ""
 
@@ -1558,12 +1454,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:12
 msgid ""
-"At this point, most of the good ideas from BOB have been incorporated "
-"into\n"
-"SAMv3, which has more features and more real-world use. BOB still works, "
-"but it\n"
-"is not gaining the advanced features available to SAMv3 and is "
-"essentially\n"
+"At this point, most of the good ideas from BOB have been incorporated into\n"
+"SAMv3, which has more features and more real-world use. BOB still works, but it\n"
+"is not gaining the advanced features available to SAMv3 and is essentially\n"
 "unsupported at this time."
 msgstr ""
 
@@ -1578,27 +1471,25 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/bob.html:35
 msgid ""
 "<code>ERROR</code> as is implied returns the message <code>\"ERROR "
-"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what"
-" went wrong."
+"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what "
+"went wrong."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:38
 msgid ""
-"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be "
-"returned, it is on the same line. <code>OK</code> means the command is "
-"finished."
+"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be returned, "
+"it is on the same line. <code>OK</code> means the command is finished."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:41
 msgid ""
-"<code>DATA</code> lines contain information that you requested. There may"
-" be multiple <code>DATA</code> lines per request."
+"<code>DATA</code> lines contain information that you requested. There may be"
+" multiple <code>DATA</code> lines per request."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:45
 msgid ""
-"<b>NOTE:</b> The help command is the ONLY command that has an exception "
-"to\n"
+"<b>NOTE:</b> The help command is the ONLY command that has an exception to\n"
 "the rules... it can actually return nothing! This is intentional, since\n"
 "help is a HUMAN and not an APPLICATION command."
 msgstr ""
@@ -1609,8 +1500,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:53
 msgid ""
-"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated,"
-" depending on the system.\n"
+"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated, depending on the system.\n"
 "On connection, BOB outputs two lines:"
 msgstr ""
 
@@ -1620,8 +1510,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:67
 msgid ""
-"Note that previous versions used upper-case hex digits and did not "
-"conform to I2P versioning standards.\n"
+"Note that previous versions used upper-case hex digits and did not conform to I2P versioning standards.\n"
 "It is recommended that subsequent versions use digits 0-9 only."
 msgstr ""
 
@@ -1657,16 +1546,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/bob.html:91
 msgid ""
 "<b>PLEASE NOTE:</b>\n"
-"For CURRENT details on the commands PLEASE use the built-in help command."
-"\n"
-"Just telnet to localhost 2827 and type help and you can get full "
-"documentation on each command."
+"For CURRENT details on the commands PLEASE use the built-in help command.\n"
+"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:97
 msgid ""
-"Commands never get obsoleted or changed, however new commands do get "
-"added from time to time."
+"Commands never get obsoleted or changed, however new commands do get added "
+"from time to time."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:102
@@ -1683,36 +1570,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:130
 msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is "
-"no need for any\n"
-"additional messages to/from the command channel. This allows the router "
-"to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on "
-"attempting to shove\n"
-"many streams in or out one socket -- that can't scale when you have alot "
-"of connections!"
+"Once set up, all TCP sockets can and will block as needed, and there is no need for any\n"
+"additional messages to/from the command channel. This allows the router to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on attempting to shove\n"
+"many streams in or out one socket -- that can't scale when you have alot of connections!"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:137
 msgid ""
-"What is also nice about this particular interface is that writing "
-"anything to interface\n"
-"to it, is much much easier than SAM. There is no other processing to do "
-"after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc "
-"(netcat) can be used\n"
-"to point to some application. The value there is that one could schedule "
-"up and down times\n"
-"for an application, and not have to change the application to do that, or"
-" to even have\n"
-"to stop that application. Instead, you can literally \"unplug\" the "
-"destination, and\n"
-"\"plug it in\" again. As long as the same IP/port addresses and "
-"destination keys are used\n"
-"when bringing the bridge up, the normal TCP application won't care, and "
-"won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that "
-"nothing is coming in."
+"What is also nice about this particular interface is that writing anything to interface\n"
+"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used\n"
+"to point to some application. The value there is that one could schedule up and down times\n"
+"for an application, and not have to change the application to do that, or to even have\n"
+"to stop that application. Instead, you can literally \"unplug\" the destination, and\n"
+"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used\n"
+"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:149
@@ -1721,12 +1595,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:151
 msgid ""
-"For the following example, we'll setup a very simple local loopback "
-"connection,\n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service "
-"from\n"
-"the INET superserver daemon. Destination \"ear\" will be a local port "
-"that you\n"
+"For the following example, we'll setup a very simple local loopback connection,\n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service from\n"
+"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
 "can telnet into, and watch the pretty ASCII test puke forth."
 msgstr ""
 
@@ -1775,30 +1646,28 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:186
 msgid ""
-"At this point, there was no error, a destination with a nickname of "
-"\"mouth\"\n"
-"is set up. When you contact the destination provided, you actually "
-"connect\n"
+"At this point, there was no error, a destination with a nickname of \"mouth\"\n"
+"is set up. When you contact the destination provided, you actually connect\n"
 "to the <code>CHARGEN</code> service on <code>19/TCP</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:192
-msgid "Now for the other half, so that we can actually contact this destination."
+msgid ""
+"Now for the other half, so that we can actually contact this destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:214
 msgid ""
 "Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from address book we want to "
-"contact.\n"
+"send the destination key or host address from address book we want to contact.\n"
 "In this case, we want to contact \"mouth\", all we do is paste in the\n"
 "key and it goes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:221
 msgid ""
-"<b>NOTE:</b> The \"quit\" command in the command channel does NOT "
-"disconnect the tunnels like SAM."
+"<b>NOTE:</b> The \"quit\" command in the command channel does NOT disconnect"
+" the tunnels like SAM."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:238
@@ -1815,14 +1684,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:291
 msgid ""
-"Pretty cool isn't it? Try some other well known I2P SITES if you like, "
-"nonexistent ones,\n"
-"etc, to get a feel for what kind of output to expect in different "
-"situations.\n"
-"For the most part, it is suggested that you ignore any of the error "
-"messages.\n"
-"They would be meaningless to the application, and are only presented for "
-"human debugging."
+"Pretty cool isn't it? Try some other well known I2P SITES if you like, nonexistent ones,\n"
+"etc, to get a feel for what kind of output to expect in different situations.\n"
+"For the most part, it is suggested that you ignore any of the error messages.\n"
+"They would be meaningless to the application, and are only presented for human debugging."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:298
@@ -1839,8 +1704,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/bob.html:328
 msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too "
-"fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
 "and shows you what typical ERROR messages looks like."
 msgstr ""
 
@@ -1895,16 +1759,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/datagrams.html:7
 #, python-format
 msgid ""
-"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide "
-"authenticated\n"
-"and repliable messages in a standard format.  This lets applications "
-"reliably read\n"
-"the \"from\" address out of a datagram and know that the address really "
-"sent the\n"
-"message.  This is necessary for some applications since the base I2P "
-"message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets).  In "
-"addition, the\n"
+"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide authenticated\n"
+"and repliable messages in a standard format.  This lets applications reliably read\n"
+"the \"from\" address out of a datagram and know that the address really sent the\n"
+"message.  This is necessary for some applications since the base I2P message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets).  In addition, the\n"
 "message and sender are authenticated by signing the payload."
 msgstr ""
 
@@ -1913,8 +1772,7 @@ msgstr ""
 msgid ""
 "Datagrams, like <a href=\"%(streaming)s\">streaming library packets</a>,\n"
 "are an application-level construct.\n"
-"These protocols are independent of the low-level <a "
-"href=\"%(transports)s\">transports</a>;\n"
+"These protocols are independent of the low-level <a href=\"%(transports)s\">transports</a>;\n"
 "the protocols are converted to I2NP messages by the router, and\n"
 "either protocol may be carried by either transport."
 msgstr ""
@@ -1930,8 +1788,7 @@ msgid ""
 "<a href=\"%(url)s\">datagram API</a>,\n"
 "while applications in other languages \n"
 "can use <a href=\"%(sam)s\">SAM</a>'s datagram support.\n"
-"There is also limited support in i2ptunnel in the <a "
-"href=\"%(socks)s\">SOCKS proxy</a>,\n"
+"There is also limited support in i2ptunnel in the <a href=\"%(socks)s\">SOCKS proxy</a>,\n"
 "the 'streamr' tunnel types, and udpTunnel classes."
 msgstr ""
 
@@ -1941,34 +1798,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:38
 msgid ""
-"The application designer should carefully consider the tradeoff of "
-"repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel"
-" fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of "
-"them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not "
-"recommended.\n"
+"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
 "Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
-"chances even more."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:47
 #, python-format
 msgid ""
-"Also note that the various overheads added by lower layers, in particular"
-" asymmetric\n"
-"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on "
-"intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are "
-"currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number"
-"\n"
-"of session tags delivered, and a short session tag lifetime, for example."
-"\n"
-"There are currently no configuration parameters available within I2CP to "
-"tune\n"
+"Also note that the various overheads added by lower layers, in particular asymmetric\n"
+"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number\n"
+"of session tags delivered, and a short session tag lifetime, for example.\n"
+"There are currently no configuration parameters available within I2CP to tune\n"
 "the ElGamal Session Tag parameters."
 msgstr ""
 
@@ -1981,38 +1827,30 @@ msgid ""
 "The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
 "Applications may or may not choose to set the\n"
 "protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on "
-"the same Destination."
+"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:65
 #, python-format
 msgid ""
 "As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or "
-"communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or communications sessions,\n"
 "as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
-"described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
 "the <a href=\"%(i2cp)s#format\">I2CP page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:73
 #, python-format
 msgid ""
-"There is no method within the datagram API to specify whether it is non-"
-"repliable (raw)\n"
-"or repliable. The application should be designed to expect the "
-"appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
+"or repliable. The application should be designed to expect the appropriate type.\n"
 "The I2CP protocol number or port should be used by the application to\n"
 "indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
-"are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
 "<a href=\"%(i2psession)s\">I2PSession API</a>\n"
-"for this purpose. A common design pattern in client/server datagram "
-"applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw "
-"datagram\n"
+"for this purpose. A common design pattern in client/server datagram applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
 "for the reply, returning the nonce from the request."
 msgstr ""
 
@@ -2046,15 +1884,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/datagrams.html:107
 #, python-format
 msgid ""
-"Each datagram is sent through I2P as a single message (or as an "
-"individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
 "<a href=\"%(garlicrouting)s\">Garlic Message</a>).\n"
 "Message encapsulation is implemented in the underlying\n"
 "<a href=\"%(i2cp)s\">I2CP</a>,\n"
 "<a href=\"%(i2np)s\">I2NP</a>, and\n"
 "<a href=\"%(tunnelmessage)s\">tunnel message</a> layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram "
-"protocol."
+"There is no packet delimiter mechanism or length field in the datagram protocol."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/datagrams.html:120
@@ -2073,17 +1909,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:5
 #, python-format
 msgid ""
-"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-"
-"RPC\">JSONRPC2</a> interface via the plugin <a "
-"href=\"%(itoopie)s\">I2PControl</a>.\n"
-"The aim of the interface is to provide simple way to interface with a "
-"running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is "
-"provided by the java libraries <a href=\"http://software.dzhuvinov.com"
-"/json-rpc-2.0.html\">JSON-RPC 2.0</a>.  \n"
-"A list of implementations of JSON-RPC for various languages can be found "
-"at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC "
-"wiki</a>."
+"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-RPC\">JSONRPC2</a> interface via the plugin <a href=\"%(itoopie)s\">I2PControl</a>.\n"
+"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries <a href=\"http://software.dzhuvinov.com/json-rpc-2.0.html\">JSON-RPC 2.0</a>.  \n"
+"A list of implementations of JSON-RPC for various languages can be found at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC wiki</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:12
@@ -2138,8 +1967,8 @@ msgstr "Përshkrim"
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:48
 msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate'"
-" RPC method)"
+"Token used for authenticating every request (excluding the 'Authenticate' "
+"RPC method)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:56
@@ -2148,8 +1977,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:57
 msgid ""
-"Creates and returns an authentication token used for further "
-"communication."
+"Creates and returns an authentication token used for further communication."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:59
@@ -2182,8 +2010,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:117
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:163
 msgid ""
-"Token used for authenticating the client. Is provided by the server via "
-"the 'Authenticate' RPC method."
+"Token used for authenticating the client. Is provided by the server via the "
+"'Authenticate' RPC method."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:73
@@ -2245,7 +2073,8 @@ msgid "Returns true if any changes were made."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:98
-msgid "Returns true if any changes requiring a restart to take effect were made."
+msgid ""
+"Returns true if any changes requiring a restart to take effect were made."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:101
@@ -2318,8 +2147,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:157
 msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote "
-"host."
+"Initiates a router reseed, fetching peers into our NetDB from a remote host."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:158
@@ -2328,8 +2156,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:159
 msgid ""
-"Restarts the router gracefully (waits for participating tunnels to "
-"expire)."
+"Restarts the router gracefully (waits for participating tunnels to expire)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:160
@@ -2375,7 +2202,8 @@ msgid "<b>Blocking</b>. If requested, returns the status of the the update"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:175
-msgid "Fetches or sets various network related settings. Ports, addresses etc."
+msgid ""
+"Fetches or sets various network related settings. Ports, addresses etc."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:177
@@ -2386,8 +2214,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:178
 msgid ""
-"What hostname is used for the TCP transport. If null is submitted, "
-"current setting will be returned."
+"What hostname is used for the TCP transport. If null is submitted, current "
+"setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:179
@@ -2404,8 +2232,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:181
 msgid ""
-"What hostname is used for the UDP transport. If null is submitted, "
-"current setting will be returned."
+"What hostname is used for the UDP transport. If null is submitted, current "
+"setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:182
@@ -2419,19 +2247,20 @@ msgid "What ip has been detected by the UDP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:184
-msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
+msgid ""
+"Is UPnP enabled. If null is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:185
 msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If "
-"null is submitted, current setting will be returned."
+"How many percent of bandwidth is usable for participating tunnels. If null "
+"is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:186
 msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
-"current setting will be returned."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
+" setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:187
@@ -2442,15 +2271,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:188
 msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP "
-"changes ). If null is submitted, current setting will be returned."
+"Is laptop mode enabled (change router identity and UDP port when IP changes "
+"). If null is submitted, current setting will be returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:189
 msgid ""
-"Token used for authenticating the client. Is provided by the server via "
-"the 'Authenticate' RPC method. If null is submitted, current setting will"
-" be returned."
+"Token used for authenticating the client. Is provided by the server via the "
+"'Authenticate' RPC method. If null is submitted, current setting will be "
+"returned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:192
@@ -2463,8 +2292,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:194
 msgid ""
-"If requested, returns the method used for automatically detecting ip for "
-"the TCP transport."
+"If requested, returns the method used for automatically detecting ip for the"
+" TCP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:195
@@ -2477,8 +2306,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:197
 msgid ""
-"If requested, returns methods used for detecting the ip address of the "
-"UDP transport."
+"If requested, returns methods used for detecting the ip address of the UDP "
+"transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:198
@@ -2609,34 +2438,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:237
 msgid ""
-"The version of the I2PControl API used wasn't specified, but is required "
-"to be specified."
+"The version of the I2PControl API used wasn't specified, but is required to "
+"be specified."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2pcontrol.html:238
 msgid ""
-"The version of the I2PControl API specified is not supported by "
-"I2PControl."
+"The version of the I2PControl API specified is not supported by I2PControl."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:8
 #, python-format
 msgid ""
 "I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a <a "
-"href=\"%(naming)s\">hostname</a>,\n"
-"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination "
-"key.\n"
-"An established I2PTunnel will be available on your client machine as "
-"localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create "
-"I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key "
-"will be generated\n"
+"Destination of an I2PTunnel can be defined using a <a href=\"%(naming)s\">hostname</a>,\n"
+"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination key.\n"
+"An established I2PTunnel will be available on your client machine as localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
 "for the service and it will become avaliable throughout I2P.\n"
 "A web interface for I2PTunnel management is avaliable on\n"
-"<a "
-"href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>."
+"<a href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:20
@@ -2650,8 +2472,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:23
 msgid ""
 "<b>I2P Webserver</b> - A tunnel pointed to a Jetty webserver run\n"
-"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient "
-"and quick hosting on I2P.\n"
+"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient and quick hosting on I2P.\n"
 "<br>The document root is:"
 msgstr ""
 
@@ -2661,10 +2482,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:33
 msgid ""
-"A HTTP proxy used for browsing I2P and the regular internet anonymously "
-"through I2P. \n"
-"Browsing internet through I2P uses a random proxy specified by the "
-"\"Outproxies:\" option."
+"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n"
+"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:37
@@ -2707,31 +2526,26 @@ msgstr "Standard"
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:56
 msgid ""
-"Opens a local TCP port that connects to a service (like HTTP, FTP or "
-"SMTP) on a destination inside of I2P.\n"
-"The tunnel is directed to a random host from the comma seperated (\", \")"
-" list of destinations."
+"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n"
+"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:62
 msgid ""
-"A HTTP-client tunnel. The tunnel connects to the destination specified by"
-" the URL\n"
-"in a HTTP request. Supports proxying onto internet if an outproxy is "
-"provided. Strips HTTP connections of the following headers:"
+"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n"
+"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:67
 msgid ""
 "<b>Accept, Accept-Charset, Accept-Language\n"
-" and Accept-Ranges</b> as they vary greatly between browsers and can be "
-"used as an identifier."
+" and Accept-Ranges</b> as they vary greatly between browsers and can be used as an identifier."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:90
 msgid ""
-"Depending on if the tunnel is using an outproxy or not it will append the"
-" following User-Agent:"
+"Depending on if the tunnel is using an outproxy or not it will append the "
+"following User-Agent:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:94
@@ -2744,10 +2558,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:100
 msgid ""
-"Creates a connection to a random IRC server specified by the comma "
-"seprated (\", \") \n"
-"list of destinations. Only a whitelisted subset of IRC commands are "
-"allowed due to anonymity concerns."
+"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n"
+"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:105
@@ -2760,8 +2572,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:144
 msgid ""
-"Enables using the I2P router as a SOCKS proxy with the command whitelist "
-"specified by\n"
+"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n"
 "<a href=\"#client-mode-irc\">IRC</a> client mode."
 msgstr ""
 
@@ -2773,8 +2584,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:156
 msgid ""
-"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr "
-"client tunnel will \n"
+"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n"
 "subscribe to a streamr server tunnel."
 msgstr ""
 
@@ -2788,32 +2598,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:171
 msgid ""
-"Creates a destination to a local HTTP server ip:port. Supports gzip for "
-"requests with \n"
-"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in"
-" such a request."
+"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n"
+"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:177
 msgid ""
-"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client "
-"with no outproxying\n"
-"capabilities. An example application would be a web application that does"
-" client-type\n"
+"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n"
+"capabilities. An example application would be a web application that does client-type\n"
 "requests, or loopback-testing an I2P Site as a diagnostic tool."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:184
 msgid ""
-"Creates a destination that filters the reqistration sequence of a client "
-"and passes \n"
+"Creates a destination that filters the reqistration sequence of a client and passes \n"
 "the clients destination key as a hostname to the IRC-server."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/i2ptunnel.html:190
 msgid ""
-"A UDP-client that connects to a media server is created. The UDP-Client "
-"is coupled with a Streamr server I2PTunnel."
+"A UDP-client that connects to a media server is created. The UDP-Client is "
+"coupled with a Streamr server I2PTunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:2
@@ -2830,14 +2635,11 @@ msgstr "Shënim"
 msgid ""
 "The ministreaming library has been enhanced and extended by the\n"
 "\"full\" <a href=\"%(streaming)s\">streaming library</a>.\n"
-"Ministreaming is deprecated and is incompatible with today's "
-"applications.\n"
+"Ministreaming is deprecated and is incompatible with today's applications.\n"
 "The following documentation is old.\n"
-"Also note that streaming extends ministreaming in the same Java package "
-"(net.i2p.client.streaming),\n"
+"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n"
 "so the current <a href=\"%(api)s\">API documentation</a> contains both.\n"
-"Obsolete ministreaming classes and methods are clearly marked as "
-"deprecated in the Javadocs."
+"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:19
@@ -2845,17 +2647,12 @@ msgstr ""
 msgid ""
 "\n"
 "The ministreaming library is a layer on top of the core \n"
-"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and "
-"authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and "
-"unauthenticated \n"
+"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and unauthenticated \n"
 "message layer.  Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations "
-"available, but\n"
-"rather than embed that functionality into the base I2P code, it has been "
-"factored\n"
-"off into its own library both to keep the TCP-esque complexities separate"
-" and to\n"
+"functionality has a whole series of tradeoffs and optimizations available, but\n"
+"rather than embed that functionality into the base I2P code, it has been factored\n"
+"off into its own library both to keep the TCP-esque complexities separate and to\n"
 "allow alternative optimized implementations."
 msgstr ""
 
@@ -2863,42 +2660,29 @@ msgstr ""
 #, python-format
 msgid ""
 "The ministreaming library was written by mihi as a part of his \n"
-"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out"
-" and released\n"
-"under the BSD license.  It is called the \"mini\"streaming library "
-"because it makes\n"
-"some simplifications in the implementation, while a more robust streaming"
-" library\n"
-"could be further optimized for operation over I2P.  The two main issues "
-"with \n"
+"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out and released\n"
+"under the BSD license.  It is called the \"mini\"streaming library because it makes\n"
+"some simplifications in the implementation, while a more robust streaming library\n"
+"could be further optimized for operation over I2P.  The two main issues with \n"
 "the ministreaming library are its use of the traditional TCP two phase \n"
-"establishment protocol and the current fixed window size of 1.  The "
-"establishment\n"
-"issue is minor for long lived streams, but for short ones, such as quick "
-"HTTP\n"
-"requests, the impact can be <a href=\"%(minwww)s\">significant</a>.  As "
-"for the window\n"
-"size, the ministreaming library doesn't maintain any ID or ordering "
-"within the \n"
-"messages sent (or include any application level ACK or SACK), so it must "
-"wait \n"
-"on average twice the time it takes to send a message before sending "
-"another."
+"establishment protocol and the current fixed window size of 1.  The establishment\n"
+"issue is minor for long lived streams, but for short ones, such as quick HTTP\n"
+"requests, the impact can be <a href=\"%(minwww)s\">significant</a>.  As for the window\n"
+"size, the ministreaming library doesn't maintain any ID or ordering within the \n"
+"messages sent (or include any application level ACK or SACK), so it must wait \n"
+"on average twice the time it takes to send a message before sending another."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/ministreaming.html:45
 #, python-format
 msgid ""
-"Even with those issues, the ministreaming library performs quite well in "
-"many\n"
+"Even with those issues, the ministreaming library performs quite well in many\n"
 "situations, and its <a href=\"%(api)s\">API</a>\n"
-"is both quite simple and capable of remaining unchanged as different "
-"streaming\n"
+"is both quite simple and capable of remaining unchanged as different streaming\n"
 "implementations are introduced.  The library is deployed in its own \n"
 "ministreaming.jar.\n"
 "Developers in Java who would like to use it can\n"
-"access the API directly, while developers in other languages can use it "
-"through\n"
+"access the API directly, while developers in other languages can use it through\n"
 "<a href=\"%(samv3)s\">SAM</a>'s streaming support."
 msgstr ""
 
@@ -2937,8 +2721,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/socks.html:5
 msgid ""
 "\n"
-"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are "
-"supported.\n"
+"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n"
 "Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n"
 "Both shared-clients and non-shared are supported.\n"
 "There is no SOCKS outproxy so it is of limited use."
@@ -2959,8 +2742,7 @@ msgid ""
 "information as content, I2P has no way to protect your anonymity.  For\n"
 "example, some mail applications will send the IP address of the machine\n"
 "they are running on to a mail server. There is no way for I2P to filter\n"
-"this, thus using I2P to 'socksify' existing applications is possible, but"
-"\n"
+"this, thus using I2P to 'socksify' existing applications is possible, but\n"
 "extremely dangerous."
 msgstr ""
 
@@ -3039,47 +2821,34 @@ msgstr ""
 #, python-format
 msgid ""
 "The streaming library is a layer on top of the core \n"
-"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and "
-"authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and "
-"unauthenticated \n"
+"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and unauthenticated \n"
 "message layer.  Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations "
-"available, but\n"
-"rather than embed that functionality into the base I2P code, it has been "
-"factored\n"
-"off into its own library both to keep the TCP-esque complexities separate"
-" and to\n"
+"functionality has a whole series of tradeoffs and optimizations available, but\n"
+"rather than embed that functionality into the base I2P code, it has been factored\n"
+"off into its own library both to keep the TCP-esque complexities separate and to\n"
 "allow alternative optimized implementations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:29
 msgid ""
 "In consideration of the relatively high cost of messages, \n"
-"the streaming library's protocol for scheduling and delivering those "
-"messages has been optimized to\n"
-"allow individual messages passed to contain as much information as is "
-"available.\n"
-"For instance, a small HTTP transaction proxied through the streaming "
-"library can\n"
-"be completed in a single round trip - the first messages bundle a SYN, "
-"FIN, and\n"
+"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n"
+"allow individual messages passed to contain as much information as is available.\n"
+"For instance, a small HTTP transaction proxied through the streaming library can\n"
+"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n"
 "the small HTTP request payload, and the reply bundles the SYN,\n"
 "FIN, ACK, and the HTTP response payload.  While an additional\n"
-"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has "
-"been\n"
-"received, the local HTTP proxy can often deliver the full response to the"
-" browser \n"
+"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n"
+"received, the local HTTP proxy can often deliver the full response to the browser \n"
 "immediately."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:42
 msgid ""
 "The streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control "
-"algorithms\n"
-"(both slow start and congestion avoidance), and general packet behavior "
-"(ACK,\n"
+"abstraction of TCP, with its sliding windows, congestion control algorithms\n"
+"(both slow start and congestion avoidance), and general packet behavior (ACK,\n"
 "SYN, FIN, RST, rto calculation, etc)."
 msgstr ""
 
@@ -3099,29 +2868,21 @@ msgstr "API"
 #: i2p2www/pages/site/docs/api/streaming.html:60
 #, python-format
 msgid ""
-"The streaming library API provides a standard socket paradigm to Java "
-"applications.\n"
-"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, "
-"except that\n"
-"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> "
-"through the\n"
+"The streaming library API provides a standard socket paradigm to Java applications.\n"
+"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, except that\n"
+"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> through the\n"
 "streaming library, to be interpreted by I2CP."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:67
 #, python-format
 msgid ""
-"The standard interface to the streaming lib is for the application to use"
-" the\n"
+"The standard interface to the streaming lib is for the application to use the\n"
 "<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a> to create an\n"
-"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks "
-"the\n"
-"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will "
-"cause\n"
-"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The "
-"application\n"
-"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> "
-"or\n"
+"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks the\n"
+"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will cause\n"
+"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The application\n"
+"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> or\n"
 "receive connections with an <a href=\"%(i2psskt)s\">I2PServerSocket</a>."
 msgstr ""
 
@@ -3142,17 +2903,12 @@ msgstr ""
 #, python-format
 msgid ""
 "The options and current default values are listed below.\n"
-"Options are case-sensitive and may be set for the whole router, for a "
-"particular client, or for an individual socket on a\n"
+"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n"
 "per-connection basis.\n"
-"Many values are tuned for HTTP performance over typical I2P conditions. "
-"Other applications such\n"
+"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n"
 "as peer-to-peer services are strongly encouraged to\n"
-"modify as necessary, by setting the options and passing them via the call"
-" to\n"
-"<a "
-"href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost,"
-" _i2cpPort, opts).\n"
+"modify as necessary, by setting the options and passing them via the call to\n"
+"<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost, _i2cpPort, opts).\n"
 "Time values are in ms."
 msgstr ""
 
@@ -3160,17 +2916,14 @@ msgstr ""
 #, python-format
 msgid ""
 "Note that higher-layer APIs, such as <a href=\"%(samv3)s\">SAM</a>,\n"
-"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,"
-"\n"
+"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
 "may override these defaults with their own defaults.\n"
-"Also note that many options only apply to servers listening for incoming "
-"connections."
+"Also note that many options only apply to servers listening for incoming connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:110
 msgid ""
-"As of release 0.9.1, most, but not all, options may be changed on an "
-"active socket manager or session.\n"
+"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n"
 "See the javadocs for details."
 msgstr ""
 
@@ -3194,8 +2947,8 @@ msgstr "Njoftime"
 
 #: i2p2www/pages/site/docs/api/streaming.html:119
 msgid ""
-"Comma- or space-separated list of Base64 peer Hashes used for either "
-"access list or blacklist."
+"Comma- or space-separated list of Base64 peer Hashes used for either access "
+"list or blacklist."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:121
@@ -3245,24 +2998,21 @@ msgstr ""
 msgid ""
 "Comma- or space-separated list of Base64 peer Hashes to be\n"
 "blacklisted for incoming connections to ALL destinations in the context.\n"
-"This option must be set in the context properties, NOT in the "
-"createManager() options argument.\n"
-"Note that setting this in the router context will not affect clients "
-"outside the\n"
+"This option must be set in the context properties, NOT in the createManager() options argument.\n"
+"Note that setting this in the router context will not affect clients outside the\n"
 "router in a separate JVM and context."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:175
 msgid ""
-"How much transmit data (in bytes) will be accepted that hasn't been "
-"written out yet."
+"How much transmit data (in bytes) will be accepted that hasn't been written "
+"out yet."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:179
 msgid ""
 "When we're in congestion avoidance, we grow the window size at the rate\n"
-"of <code>1/(windowSize*factor)</code>.  In standard TCP, window sizes are"
-" in bytes,\n"
+"of <code>1/(windowSize*factor)</code>.  In standard TCP, window sizes are in bytes,\n"
 "while in I2P, window sizes are in messages.\n"
 "A higher number means slower growth."
 msgstr ""
@@ -3271,16 +3021,15 @@ msgstr ""
 msgid ""
 "How long to wait after instantiating a new con \n"
 "before actually attempting to connect.  If this is\n"
-"&lt;= 0, connect immediately with no initial data.  If greater than 0, "
-"wait\n"
+"&lt;= 0, connect immediately with no initial data.  If greater than 0, wait\n"
 "until the output stream is flushed, the buffer fills, \n"
 "or that many milliseconds pass, and include any initial data with the SYN."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:194
 msgid ""
-"How long to block on connect, in milliseconds. Negative means "
-"indefinitely. Default is 5 minutes."
+"How long to block on connect, in milliseconds. Negative means indefinitely. "
+"Default is 5 minutes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:198
@@ -3293,30 +3042,24 @@ msgstr ""
 msgid ""
 "Comma- or space-separated list of Base64 peer Hashes or host names to be\n"
 "contacted using an alternate DSA destination.\n"
-"Only applies if multisession is enabled and the primary session is non-"
-"DSA\n"
+"Only applies if multisession is enabled and the primary session is non-DSA\n"
 "(generally for shared clients only).\n"
-"This option must be set in the context properties, NOT in the "
-"createManager() options argument.\n"
-"Note that setting this in the router context will not affect clients "
-"outside the\n"
+"This option must be set in the context properties, NOT in the createManager() options argument.\n"
+"Note that setting this in the router context will not affect clients outside the\n"
 "router in a separate JVM and context."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:216
 msgid ""
 "Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier "
-"than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this "
-"Destination."
+"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this Destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:226
 msgid ""
 "(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a "
-"duplicate ack."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:232
@@ -3329,8 +3072,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:237
 msgid ""
-"The initial value of the resend delay field in the packet header, times "
-"1000.\n"
+"The initial value of the resend delay field in the packet header, times 1000.\n"
 "Not fully implemented; see below."
 msgstr ""
 
@@ -3353,8 +3095,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:255
 msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
-"are in messages."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
+"in messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:279
@@ -3396,12 +3138,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:333
 msgid ""
 "(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than "
-"1 will cause an error."
+"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:338
-msgid "How long to block on read, in milliseconds. Negative means indefinitely."
+msgid ""
+"How long to block on read, in milliseconds. Negative means indefinitely."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:342
@@ -3444,19 +3186,15 @@ msgstr "Ujdisje"
 
 #: i2p2www/pages/site/docs/api/streaming.html:387
 msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
-"may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
-" may contain the initial response data as well."
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:392
 msgid ""
-"The initiator may send additional data packets, up to the initial window "
-"size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
 "These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short "
-"period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
 "arrive out of order, in advance of the SYNCHRONIZE packet."
 msgstr ""
 
@@ -3466,33 +3204,23 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:400
 msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the"
-" lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
-" will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
 "a large amount of overhead.\n"
 "The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K "
-"I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
 "including overhead for the typical case."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:417
 msgid ""
-"The first message in a connection includes a 387 byte (typical) "
-"Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
-"the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
-"was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
-"I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation "
-"of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important "
-"factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived "
-"connections."
+"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:428
@@ -3506,14 +3234,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:436
 #, python-format
 msgid ""
-"Each packet is sent through I2P as a single message (or as an individual "
-"clove in a\n"
-"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation "
-"is implemented\n"
-"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a "
-"href=\"%(i2np)s\">I2NP</a>, and\n"
-"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no "
-"packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
+"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation is implemented\n"
+"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a href=\"%(i2np)s\">I2NP</a>, and\n"
+"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no packet delimiter\n"
 "mechanism or payload length field in the streaming protocol."
 msgstr ""
 
@@ -3523,17 +3247,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:447
 msgid ""
-"Data packets may include an optional delay field specifying the requested"
-" delay,\n"
+"Data packets may include an optional delay field specifying the requested delay,\n"
 "in ms, before the receiver should ack the packet.\n"
 "Valid values are 0 to 60000 inclusive.\n"
 "A value of 0 requests an immediate ack.\n"
 "This is advisory only, and receivers should delay slightly so that\n"
 "additional packets may be acknowledged with a single ack.\n"
-"Some implementations may include an advisory value of (measured RTT / 2) "
-"in this field.\n"
-"For nonzero optional delay values, receivers should limit the maximum "
-"delay\n"
+"Some implementations may include an advisory value of (measured RTT / 2) in this field.\n"
+"For nonzero optional delay values, receivers should limit the maximum delay\n"
 "before sending an ack to a few seconds at most.\n"
 "Optional delay values greater than 60000 indicate choking, see below."
 msgstr ""
@@ -3545,46 +3266,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:462
 msgid ""
 "TCP headers include the receive window in bytes.\n"
-"The streaming protocol does not contain a receive window, it uses only a "
-"simple choke/unchoke indication.\n"
-"Each endpoint must maintain its own estimate of the far-end receive "
-"window, in either bytes or packets.\n"
-"The recommended minimum buffer size for receiver implementations is 128 "
-"packets or 217 KB (approximately 128x1730).\n"
-"Because of I2P netowrk latency, packet drops, and the resulting "
-"congestion control,\n"
+"The streaming protocol does not contain a receive window, it uses only a simple choke/unchoke indication.\n"
+"Each endpoint must maintain its own estimate of the far-end receive window, in either bytes or packets.\n"
+"The recommended minimum buffer size for receiver implementations is 128 packets or 217 KB (approximately 128x1730).\n"
+"Because of I2P netowrk latency, packet drops, and the resulting congestion control,\n"
 "a buffer of this size is rarely filled.\n"
-"Overflow is, however, likely to occur on high-bandwidth \"local "
-"loopback\" (same-router) connections."
+"Overflow is, however, likely to occur on high-bandwidth \"local loopback\" (same-router) connections."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:471
 msgid ""
 "To quickly indicate and smoothly recover from overflow conditions,\n"
 "there is a simple mechanism for pushback in the streaming protocol.\n"
-"If a packet is received with an optional delay field of value of 60001 or"
-" higher,\n"
+"If a packet is received with an optional delay field of value of 60001 or higher,\n"
 "that indicates \"choking\" or a receive window of zero.\n"
-"A packet with an optional delay field of value of 60000 or less indicates"
-" \"unchoking\".\n"
-"Packets without an optional delay field do not affect the choke/unchoke "
-"state."
+"A packet with an optional delay field of value of 60000 or less indicates \"unchoking\".\n"
+"Packets without an optional delay field do not affect the choke/unchoke state."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:479
 msgid ""
-"After being choked, no more packets with data should be sent until the "
-"transmitter is unchoked,\n"
-"except for occasional \"probe\" data packets to compensate for possible "
-"lost unchoke packets.\n"
-"The choked endpoint should start a \"persist timer\" to control the "
-"probing, as in TCP.\n"
+"After being choked, no more packets with data should be sent until the transmitter is unchoked,\n"
+"except for occasional \"probe\" data packets to compensate for possible lost unchoke packets.\n"
+"The choked endpoint should start a \"persist timer\" to control the probing, as in TCP.\n"
 "The unchoking endpoint should send several packets with this field set,\n"
-"or continue sending them periodically until data packets are received "
-"again.\n"
+"or continue sending them periodically until data packets are received again.\n"
 "Maximum time to wait for unchoking is implementation-dependent.\n"
-"Transmitter window size and congestion control strategy after being "
-"unchoked is implementation-dependent."
+"Transmitter window size and congestion control strategy after being unchoked is implementation-dependent."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:490
@@ -3593,8 +3301,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:491
 msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) "
-"and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
 "phases, with exponential backoff.\n"
 "Windowing and acknowledgments use packet count, not byte count."
 msgstr ""
@@ -3605,53 +3312,44 @@ msgstr "Mbylle"
 
 #: i2p2www/pages/site/docs/api/streaming.html:499
 msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the "
-"CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag."
-"\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag.\n"
 "CLOSE packets may contain data as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:507
 msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
-"in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
 "This function is provided in streaming.\n"
 "Pings and pongs may not be combined with a standard streaming packet;\n"
 "if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are "
-"ignored."
+"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are ignored."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:515
 msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
-"flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is "
-"ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
 "The sendStreamId may or may not correspond to an existing connection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:521
 msgid ""
 "A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the "
-"sendStreamId from the ping.\n"
-"Prior to release 0.9.18, the pong packet does not include any payload "
-"that was contained in the ping."
+"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
+"Prior to release 0.9.18, the pong packet does not include any payload that was contained in the ping."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:527
 msgid ""
 "As of release 0.9.18, pings and pongs may contain a payload.\n"
-"The payload in the ping, up to a maximum of 32 bytes, is returned in the "
-"pong."
+"The payload in the ping, up to a maximum of 32 bytes, is returned in the pong."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:532
 msgid ""
-"Streaming may be configured to disable sending pongs with the "
-"configuration i2p.streaming.answerPings=false."
+"Streaming may be configured to disable sending pongs with the configuration "
+"i2p.streaming.answerPings=false."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:537
@@ -3667,8 +3365,7 @@ msgid ""
 "This is used for \"temporal\" sharing at connection open/close time,\n"
 "not \"ensemble\" sharing during a connection (See\n"
 "<a href=\"http://www.ietf.org/rfc/rfc2140.txt\">RFC 2140</a>).\n"
-"There is a separate share per ConnectionManager (i.e. per local "
-"Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
 "so that there is no information leakage to other Destinations on the\n"
 "same router.\n"
 "The share data for a given peer expires after a few minutes.\n"
@@ -3681,8 +3378,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:560
 msgid ""
-"The following parameters are hardcoded, but may be of interest for "
-"analysis:"
+"The following parameters are hardcoded, but may be of interest for analysis:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:579
@@ -3692,25 +3388,16 @@ msgstr "Histori"
 
 #: i2p2www/pages/site/docs/api/streaming.html:580
 msgid ""
-"The streaming library has grown organically for I2P - first mihi "
-"implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
-"window\n"
-"size of 1 message (requiring an ACK before sending the next one), and "
-"then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets)"
-" and the\n"
-"full streaming implementation was deployed with a sliding window protocol"
-" and \n"
-"optimizations to take into account the high bandwidth x delay product.  "
-"Individual\n"
-"streams may adjust the maximum packet size and other options. The default"
-"\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
-"\n"
+"The streaming library has grown organically for I2P - first mihi implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
+"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
+"full streaming implementation was deployed with a sliding window protocol and \n"
+"optimizations to take into account the high bandwidth x delay product.  Individual\n"
+"streams may adjust the maximum packet size and other options. The default\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
 "and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple "
-"messages."
+"retransmitting lost messages, and the latency and overhead of multiple messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:594
@@ -3741,20 +3428,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/api/streaming.html:604
 #, python-format
 msgid ""
-"Another area for research is the interaction of the streaming lib with "
-"the\n"
+"Another area for research is the interaction of the streaming lib with the\n"
 "NTCP and SSU transport layers.\n"
 "See <a href=\"%(ntcpdisc)s\">the NTCP discussion page</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:609
 msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly"
-" affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a "
-"pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller "
-"window\n"
+"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller window\n"
 "sizes than would otherwise be the case. The router currently routes \n"
 "messages for a single from/to destination pair through a consistent set \n"
 "of tunnels, until tunnel expiration or delivery failure. The router's \n"
@@ -3789,11 +3472,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:636
 msgid ""
-"zzz has added debug code to the streaming library to log packets in a "
-"wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
 "(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters "
-"to TCP fields."
+"The format may require enhancement to map more streaming lib parameters to TCP fields."
 msgstr ""
 
 #: i2p2www/pages/site/docs/api/streaming.html:641
@@ -3812,18 +3493,15 @@ msgstr "Janar, 2017"
 msgid ""
 "There are several bittorrent clients and trackers on I2P.\n"
 "As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P."
-"\n"
+"changes are required to tracker and client software for operation on I2P.\n"
 "These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients "
-"and trackers."
+"Note carefully the guidelines for compatibility with older I2P clients and trackers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:15
 msgid ""
 "This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or "
-"protocols."
+"Specific clients and trackers may implement other unique features or protocols."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:20
@@ -3836,8 +3514,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:27
 msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for"
-" compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
 "Trackers may ignore the port parameter, and should not require it."
 msgstr ""
 
@@ -3849,8 +3526,7 @@ msgid ""
 "using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for "
-"compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
 "Trackers should not require an appended \".i2p\"."
 msgstr ""
 
@@ -3860,18 +3536,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:46
 msgid ""
-"Current Destinations for clients are 387 or more bytes (516 or more in "
-"Base 64 encoding).\n"
+"Current Destinations for clients are 387 or more bytes (516 or more in Base 64 encoding).\n"
 "A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see "
-"below),\n"
+"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
 "the tracker should probably decode and reject bad Base64 when announced."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:53
 msgid ""
-"The default response type is non-compact. Clients may request a compact "
-"response with\n"
+"The default response type is non-compact. Clients may request a compact response with\n"
 "the parameter compact=1. A tracker may, but is not required to, return\n"
 "a compact response when requested."
 msgstr ""
@@ -3879,10 +3552,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:59
 msgid ""
 "Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel "
-"rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and "
-"it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
 "destination enforcement by the tracker (see below)."
 msgstr ""
 
@@ -3904,8 +3575,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:76
 msgid ""
-"Trackers generally include a fake port key, or use the port from the "
-"announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
 "Clients must ignore the port parameter, and should not require it."
 msgstr ""
 
@@ -3913,10 +3583,8 @@ msgstr ""
 #, python-format
 msgid ""
 "The value of the ip key is the base 64 of the client's\n"
-"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as "
-"described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it "
-"wasn't in the announce ip, for compatibility with older clients.\n"
+"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
 "Clients should not require an appended \".i2p\" in the responses."
 msgstr ""
 
@@ -3931,26 +3599,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:95
 #, python-format
 msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a "
-"single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
 "whose length is a multiple of 32 bytes.\n"
 "This string contains the concatenated\n"
 "<a href=\"%(commonstructures)s#type_Hash\">32-byte SHA-256 Hashes</a>\n"
 "of the binary\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement"
-"\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-"
-"DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
 "or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
 "The peers key may be absent, or the peers value may be zero-length."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:109
 msgid ""
-"While compact response support is optional for both clients and trackers,"
-" it is highly\n"
+"While compact response support is optional for both clients and trackers, it is highly\n"
 "recommended as it reduces the nominal response size by over 90&#37;."
 msgstr ""
 
@@ -3961,34 +3625,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:117
 #, python-format
 msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own "
-"tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying "
-"the\n"
+"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
 "client's\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n"
 "using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
-"are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
 "different formats for the same information.\n"
 "These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce "
-"parameter at all."
+"A tracker enforcing destinations need not require the ip announce parameter at all."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:129
 msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for "
-"announces,\n"
-"destination enforcement will prevent usage by those clients unless or "
-"until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
+"destination enforcement will prevent usage by those clients unless or until\n"
 "those clients are converted to announcing over their own tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:135
 msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,"
-"\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
 "so we expect that all trackers will eventually enforce destinations.\n"
 "Both tracker and client developers should anticipate it."
 msgstr ""
@@ -4002,12 +3659,9 @@ msgstr ""
 msgid ""
 "Announce URL host names in torrent files generally follow the\n"
 "<a href=\"%(naming)s\">I2P naming standards</a>.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 "
-"hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
-"should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these "
-"formats."
+"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these formats."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:152
@@ -4029,27 +3683,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:165
 #, python-format
 msgid ""
-"I2P uses 387+ byte <a "
-"href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
+"I2P uses 387+ byte <a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "for addresses, as explained above."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:170
 msgid ""
-"If the client has only the hash of the destination (such as from a "
-"compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
-"Naming Service,\n"
+"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
 "which will return the full Destination if available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:176
 msgid ""
-"If the client has a peer's full Destination it received in a non-compact "
-"response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
 "directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is "
-"quite inefficient."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:183
@@ -4059,40 +3708,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:184
 msgid ""
 "To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer"
-" connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
 "I2P HTTP outproxies often block announces.\n"
 "There are no known SOCKS outproxies supporting bittorrent traffic."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:191
 msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
-"often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
 "block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
-"and not deliver them in responses."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:200
 #, python-format
 msgid ""
 "I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex "
-"available,\n"
+"As there does not appear to be a formal specification of ut_pex available,\n"
 "it may be necessary to review the libtorrent source for assistance.\n"
 "It is an extension message, identified as \"i2p_pex\" in\n"
-"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension "
-"handshake</a>.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", "
-"\"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length "
-"is a multiple of 32 bytes.\n"
+"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
 "These byte strings are the concatenated SHA-256 Hashes of the binary\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n"
 "of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact "
-"response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
 "The added.f value, if present, is the same as in ut_pex."
 msgstr ""
 
@@ -4107,13 +3748,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:226
 msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
-" or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
 "It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension "
-"handshake</a>.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
-"both integers."
+"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:235
@@ -4147,14 +3785,12 @@ msgstr ""
 msgid ""
 "Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
 "instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a"
-" single compact peer info."
+"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:264
 msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
-"2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
 "instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
 "In a response, the \"nodes\" key is a\n"
 "single byte string with concatenated compact node info."
@@ -4163,10 +3799,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/bittorrent.html:271
 msgid ""
 "Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the "
-"destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of "
-"the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of the\n"
 "destination hash exclusive-ORed with the port."
 msgstr ""
 
@@ -4191,51 +3825,38 @@ msgid ""
 "Preliminary differences from\n"
 "<a href=\"http://www.bittorrent.org/beps/bep_0015.html\">BEP 15</a>\n"
 "are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker "
-"supporting datagram announces."
+"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:299
 msgid ""
 "A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive "
-"repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
-" the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
 "The response port is arbitrary.\n"
 "A client sends and receives on a single port only.\n"
 "It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they "
-"contain tokens sent in the query, and need not be signed."
+"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:309
 msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
-" the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
 "although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
-" 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source "
-"port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, "
-"and error response are the same as in BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:317
 msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a "
-"simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
 "with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to "
-"the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
 "and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an "
-"existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
-"prefix.\n"
-"The URL for a modified 2-packet-mode tracker would require a different "
-"prefix if both modes are supported in I2P."
+"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix.\n"
+"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/bittorrent.html:330
@@ -4275,19 +3896,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:8
 msgid ""
-"This page is about bundling the entire I2P router binary with your "
-"application.\n"
-"It is not about writing an application to work with I2P (either bundled "
-"or external)."
+"This page is about bundling the entire I2P router binary with your application.\n"
+"It is not about writing an application to work with I2P (either bundled or external)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:13
 msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's "
-"great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
 "If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the "
-"complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
 "This page discusses some general guidelines."
 msgstr ""
 
@@ -4297,10 +3914,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:24
 msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the "
-"most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for "
-"everyone."
+"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for everyone."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:30
@@ -4309,11 +3924,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:31
 msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the "
-"Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
 "If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
-"the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
 "Some of the following only applies to the Java router."
 msgstr ""
 
@@ -4322,7 +3935,8 @@ msgid "Licensing"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid "Ensure you meet the license requirements of the software you are bundling."
+msgid ""
+"Ensure you meet the license requirements of the software you are bundling."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:45
@@ -4331,29 +3945,22 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:46
 msgid ""
-"A correct default configuration is crucial. Most users will not change "
-"the defaults.\n"
-"The defaults for your application may need to be different than the "
-"defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change the defaults.\n"
+"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
 "Override the router defaults if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:51
 msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and "
-"length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of "
-"your app."
+"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of your app."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:55
 msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute "
-"to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it "
-"would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for "
-"example."
+"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:62
@@ -4363,32 +3970,25 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:63
 msgid ""
 "It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, "
-"setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful "
-"shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful shutdown,\n"
 "your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating "
-"tunnels."
+"However, there's lots of reasons why you should allow participating tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:70
 msgid ""
-"First of all, the router doesn't work that well if it doesn't have a "
-"chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
 "which is helped tremendously by others building tunnels through you."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:74
 msgid ""
-"Secondly, over 90&#37; of the routers in the current network allow "
-"participating traffic.\n"
+"Secondly, over 90&#37; of the routers in the current network allow participating traffic.\n"
 "It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, "
-"then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
 "and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for"
-" people to enable relaying."
+"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:81
@@ -4399,10 +3999,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:84
 msgid ""
-"We strongly discourage you from disabling participating traffic by "
-"default.\n"
-"If you do this and your application gets hugely popular, it could break "
-"the network."
+"We strongly discourage you from disabling participating traffic by default.\n"
+"If you do this and your application gets hugely popular, it could break the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:90
@@ -4411,12 +4009,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:91
 msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs"
-" of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge"
-" load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best "
-"performance."
+"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:99
@@ -4425,12 +4020,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:100
 msgid ""
-"Give your users a way to change the configuration of the important "
-"settings.\n"
-"We understand that you will probably want to hide most of I2P's "
-"complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, "
-"IP/port may be helpful."
+"Give your users a way to change the configuration of the important settings.\n"
+"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:108
@@ -4439,12 +4031,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:109
 msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, "
-"your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at "
-"least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your "
-"fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
 "It also depends on the typical uptime for your application."
 msgstr ""
 
@@ -4455,8 +4044,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:120
 msgid ""
 "Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your "
-"source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
 "Be aware of possible blocking by hostile governments."
 msgstr ""
 
@@ -4466,12 +4054,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:130
 msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle "
-"and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement "
-"some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the "
-"tunnel, even in the presence of some background DHT activity."
+"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:138
@@ -4480,16 +4065,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:139
 msgid ""
-"Have an auto-update feature if at all possible, or at least auto-"
-"notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be "
-"updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical "
-"to the health of the network that the users keep up.\n"
-"We usually have over 80&#37; of the network on the latest release within "
-"6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update"
-" function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
+"We usually have over 80&#37; of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
 "which you presumably are not bundling."
 msgstr ""
 
@@ -4500,17 +4080,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:151
 msgid ""
 "Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques "
-"per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much "
-"issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth "
-"distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is "
-"significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
 "we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this "
-"checklist is."
+"The bigger your growth plans, the more important everthing else in this checklist is."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:163
@@ -4520,10 +4095,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:164
 msgid ""
 "Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even "
-"more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong "
-"solution."
+"It may be several minutes after startup before it works well, and even more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong solution."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:172
@@ -4532,8 +4105,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:173
 msgid ""
-"Provide some indication to the user that the application tunnels are "
-"ready. Encourage patience."
+"Provide some indication to the user that the application tunnels are ready. "
+"Encourage patience."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:178
@@ -4543,8 +4116,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:179
 msgid ""
 "If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to "
-"confirm."
+"Don't let your users break tunnels easily, or at least ask them to confirm."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:185
@@ -4553,8 +4125,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:186
 msgid ""
-"It would be nice if you give your users links to learn more about I2P and"
-" to donate."
+"It would be nice if you give your users links to learn more about I2P and to"
+" donate."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:192
@@ -4564,8 +4136,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:193
 msgid ""
 "Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an "
-"external router."
+"it may be helpful to provide an option or a separate package to use an external router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:200
@@ -4574,8 +4145,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:201
 msgid ""
-"If you plan to use or link to other common I2P services (news feeds, "
-"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
 "make sure you aren't overloading them,\n"
 "and talk to the people who are running them to make sure it's ok."
 msgstr ""
@@ -4587,10 +4157,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:210
 msgid ""
 "I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. "
-"You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system "
-"clock is correct."
+"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system clock is correct."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:218
@@ -4599,41 +4167,30 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:219
 msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
-"mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
 "You may omit the two streaming jars for a datagram-only app.\n"
 "Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
-"to make the crypto much faster.\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
 "Java 7 or higher is required to build.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P "
-"package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, "
-"and i2psnark, for example."
+"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:228
 msgid ""
-"The following files should be included in the I2P installation directory,"
-" specified with the \"i2p.dir.base\" property.\n"
-"Don't forget the certificates/ directory, which is required for "
-"reseeding, and blocklist.txt for IP validation.\n"
-"The geoip directory is optional, but recommended so the router can make "
-"decisions based on location.\n"
-"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that"
-" directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz)."
-"\n"
-"The hosts.txt file may be necessary, you may modify it to include any "
-"hosts your application uses.\n"
-"You may add a router.config file to the base directory to override "
-"initial defaults.\n"
+"The following files should be included in the I2P installation directory, specified with the \"i2p.dir.base\" property.\n"
+"Don't forget the certificates/ directory, which is required for reseeding, and blocklist.txt for IP validation.\n"
+"The geoip directory is optional, but recommended so the router can make decisions based on location.\n"
+"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz).\n"
+"The hosts.txt file may be necessary, you may modify it to include any hosts your application uses.\n"
+"You may add a router.config file to the base directory to override initial defaults.\n"
 "Review and edit or remove the clients.config and i2ptunnel.config files."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:237
 msgid ""
-"License requirements may require you to include the LICENSES.txt file and"
-" the licenses directory."
+"License requirements may require you to include the LICENSES.txt file and "
+"the licenses directory."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:243
@@ -4651,17 +4208,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:255
 msgid ""
 "Our Android router app may be shared by multiple clients.\n"
-"If it is not installed, the user will be prompted when he starts a client"
-" app."
+"If it is not installed, the user will be prompted when he starts a client app."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:259
 msgid ""
-"Some developers have expressed concern that this is a poor user "
-"experience,\n"
+"Some developers have expressed concern that this is a poor user experience,\n"
 "and they wish to embed the router in their app.\n"
-"We do have an Android router service library on our roadmap, which could "
-"make embedding easier.\n"
+"We do have an Android router service library on our roadmap, which could make embedding easier.\n"
 "More information needed."
 msgstr ""
 
@@ -4676,11 +4230,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:272
 msgid ""
-"We have a limited number of our jars on <a "
-"href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven"
-" Central</a>.\n"
-"There are numerous trac tickets for us to address that will improve and "
-"expand the released jars on Maven Central."
+"We have a limited number of our jars on <a href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven Central</a>.\n"
+"There are numerous trac tickets for us to address that will improve and expand the released jars on Maven Central."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:282
@@ -4690,17 +4241,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:283
 msgid ""
 "If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and "
-"increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and increase reliability.\n"
 "This may take some time and experimentation to get working well.\n"
 "Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the "
-"same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
 "Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs "
-"(iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you "
-"have several."
+"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:296
@@ -4710,8 +4257,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/embedding.html:297
 msgid ""
 "Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return "
-"the favor."
+"Give us your Twitter handle and start tweeting about it, we will return the favor."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:303
@@ -4730,8 +4276,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:311
 msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an I2P "
-"Site about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project.\n"
 "Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
 "We can help get you users, testers, translators, or even coders."
 msgstr ""
@@ -4742,12 +4287,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:320
 msgid ""
-"You may wish to install and play with the I2P Android app, and look at "
-"its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
 "See what we expose to the user and what we hide.\n"
 "Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
-" and Monero."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:328
@@ -4762,10 +4305,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/embedding.html:359
 msgid ""
-"This code is for the case where your application starts the router, as in"
-" our Android app.\n"
-"You could also have the router start the application via the "
-"clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in our Android app.\n"
+"You could also have the router start the application via the clients.config and i2ptunnel.config files,\n"
 "together with Jetty webapps,\n"
 "as is done in our Java packages.\n"
 "As always, state management is the difficult part."
@@ -4783,13 +4324,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:7
 msgid ""
-"Cloning large software repositories over I2P can be difficult, and using "
-"git can sometimes make this harder. Fortunately, it can also sometimes "
-"make it easier. Git has a <code>git bundle</code> command which can be "
-"used to turn a git repository into a file which git can then clone, "
-"fetch, or import from a location on your local disk. By combining this "
-"capability with bittorrent downloads, we can solve our remaining problems"
-" with <code>git clone</code>."
+"Cloning large software repositories over I2P can be difficult, and using git"
+" can sometimes make this harder. Fortunately, it can also sometimes make it "
+"easier. Git has a <code>git bundle</code> command which can be used to turn "
+"a git repository into a file which git can then clone, fetch, or import from"
+" a location on your local disk. By combining this capability with bittorrent"
+" downloads, we can solve our remaining problems with <code>git clone</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:8
@@ -4798,13 +4338,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:9
 msgid ""
-"If you intend to generate a git bundle, you <strong>must</strong> already"
-" possess a full copy of the <strong>git</strong> repository, not the mtn "
-"repository. You can get it from github or from git.idk.i2p, but a shallow"
-" clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will"
-" fail silently, creating what looks like a bundle, but when you try to "
-"clone it it will fail. If you are just retrieving a pre-generated git "
-"bundle, then this section does not apply to you."
+"If you intend to generate a git bundle, you <strong>must</strong> already "
+"possess a full copy of the <strong>git</strong> repository, not the mtn "
+"repository. You can get it from github or from git.idk.i2p, but a shallow "
+"clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will "
+"fail silently, creating what looks like a bundle, but when you try to clone "
+"it it will fail. If you are just retrieving a pre-generated git bundle, then"
+" this section does not apply to you."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:10
@@ -4814,23 +4354,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git-bundle.html:11
 msgid ""
 "Someone will need to supply you with a torrent file or a magnet link "
-"corresponding to an existing <code>git bundle</code> that they have "
-"already generated for you. A recent, correctly-generated bundle of the "
-"mainline i2p.i2p source code as-of Wednesday, March 18, 2020, can be "
-"found inside of I2P at my pastebin <a "
+"corresponding to an existing <code>git bundle</code> that they have already "
+"generated for you. A recent, correctly-generated bundle of the mainline "
+"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside of "
+"I2P at my pastebin <a "
 "href=\"http://paste.idk.i2p/f/4h137i\">paste.idk.i2p/f/4hq37i</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:12
 msgid ""
 "Once you have a bundle, you will need to use git to create a working "
-"repository from it. If you’re using GNU/Linux and i2psnark, the git "
-"bundle should be located in $HOME/.i2p/i2psnark or, as a service on "
-"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on "
-"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/” instead. The "
-"examples here assume I2PSnark on GNU/Linux, if you use something else, "
-"replace the path to the bundle with the download directory preferred by "
-"your client and platform."
+"repository from it. If you’re using GNU/Linux and i2psnark, the git bundle "
+"should be located in $HOME/.i2p/i2psnark or, as a service on Debian, "
+"/var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on GNU/Linux, it "
+"is probably at “$HOME/BiglyBT Downloads/” instead. The examples here assume "
+"I2PSnark on GNU/Linux, if you use something else, replace the path to the "
+"bundle with the download directory preferred by your client and platform."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:13
@@ -4843,8 +4382,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:16
 msgid ""
-"If you get the following error, try using git init and git fetch manually"
-" instead."
+"If you get the following error, try using git init and git fetch manually "
+"instead."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:18
@@ -4879,10 +4418,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:29
 msgid ""
-"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you "
-"have a successfully <code>--unshallow</code>ed clone of clone of the "
-"i2p.i2p repository. If you already have a clone, make sure you run "
-"<code>git fetch --unshallow</code> before you generate a torrent bundle."
+"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you have "
+"a successfully <code>--unshallow</code>ed clone of clone of the i2p.i2p "
+"repository. If you already have a clone, make sure you run <code>git fetch "
+"--unshallow</code> before you generate a torrent bundle."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:30
@@ -4891,8 +4430,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:32
 msgid ""
-"and copy the resulting bundle into your I2PSnark downloads directory. For"
-" instance:"
+"and copy the resulting bundle into your I2PSnark downloads directory. For "
+"instance:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git-bundle.html:34
@@ -4903,14 +4442,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:7
 msgid ""
-"Tutorial for setting up git access through an I2P Tunnel. This tunnel "
-"will act as your access point to a single git service on I2P."
+"Tutorial for setting up git access through an I2P Tunnel. This tunnel will "
+"act as your access point to a single git service on I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:8
 msgid ""
-"If you intend to use the service at i2pgit.org/git.idk.i2p, then you "
-"probably already have a tunnel configured and much of this\n"
+"If you intend to use the service at i2pgit.org/git.idk.i2p, then you probably already have a tunnel configured and much of this\n"
 "tutorial will not apply to you."
 msgstr ""
 
@@ -4921,22 +4459,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git.html:11
 msgid ""
 "To create your repositories on a remote git service, sign up for a user "
-"account at that service. Of course it’s also possible to create "
-"repositories locally and push them to a remote git service, but most will"
-" require an account and for you to create a space for the repository on "
-"the server. Gitlab has a very simple sign-up form:"
+"account at that service. Of course it’s also possible to create repositories"
+" locally and push them to a remote git service, but most will require an "
+"account and for you to create a space for the repository on the server. "
+"Gitlab has a very simple sign-up form:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:12
 msgid ""
-"These are generic instructions for any in-i2p Git instance with HTTP and "
-"SSH gateways.\n"
-"If you intend to contribute to I2P, you should create an account at the "
-"I2P gitlab, which is open to the\n"
-"community. Account registration may take a few days to complete, as the "
-"admin needs to sort through a large\n"
-"number of spam registrations. You can help this by getting in touch with "
-"the admin to confirm you are human\n"
+"These are generic instructions for any in-i2p Git instance with HTTP and SSH gateways.\n"
+"If you intend to contribute to I2P, you should create an account at the I2P gitlab, which is open to the\n"
+"community. Account registration may take a few days to complete, as the admin needs to sort through a large\n"
+"number of spam registrations. You can help this by getting in touch with the admin to confirm you are human\n"
 "using the instructions on the home page."
 msgstr ""
 
@@ -4950,10 +4484,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:27
 msgid ""
-"To make sure the setup process works, it helps to make a repository to "
-"test with from the server, and for the sake of this tutorial, we’re going"
-" to use a fork of the I2P router. First, browse to the i2p-"
-"hackers/i2p.i2p repository:"
+"To make sure the setup process works, it helps to make a repository to test "
+"with from the server, and for the sake of this tutorial, we’re going to use "
+"a fork of the I2P router. First, browse to the i2p-hackers/i2p.i2p "
+"repository:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:34
@@ -4962,20 +4496,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:42
 msgid ""
-"To have read-write access to my server, you’ll need to set up a tunnel "
-"for your SSH client. As an example, we’re going to use the HTTP tunnel "
-"instead, but if all you need is read-only, HTTP/S cloning, then you can "
-"skip all this and just use the http_proxy environment variable to "
-"configure git to use the pre-configured I2P HTTP Proxy. For example:"
+"To have read-write access to my server, you’ll need to set up a tunnel for "
+"your SSH client. As an example, we’re going to use the HTTP tunnel instead, "
+"but if all you need is read-only, HTTP/S cloning, then you can skip all this"
+" and just use the http_proxy environment variable to configure git to use "
+"the pre-configured I2P HTTP Proxy. For example:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:50
 msgid ""
-"Then, add the address you will be pushing and pulling from. Note that "
-"this example address is for Read-Only HTTP-over-I2P clones, if your admin"
-" does not allow the git HTTP(Smart HTTP) protocol, then you will need to "
-"get the SSH clone base32 from them. If you have an SSH clone base32, "
-"substitute it for the base32 in this step, which will fail."
+"Then, add the address you will be pushing and pulling from. Note that this "
+"example address is for Read-Only HTTP-over-I2P clones, if your admin does "
+"not allow the git HTTP(Smart HTTP) protocol, then you will need to get the "
+"SSH clone base32 from them. If you have an SSH clone base32, substitute it "
+"for the base32 in this step, which will fail."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:54
@@ -5003,8 +4537,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git.html:68
 msgid ""
 "Git Privacy: Committing to git adds a timestamp to git commit messages, "
-"which may be configured to reflect your local time zone. To enforce the "
-"use of UTC for all commits, you are advised to use a git alias, such as:"
+"which may be configured to reflect your local time zone. To enforce the use "
+"of UTC for all commits, you are advised to use a git alias, such as:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:70
@@ -5022,33 +4556,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/git.html:78
 msgid ""
 "You might get an error where the remote end hangs up unexpectedly. "
-"Unfortunately git still doesn’t support resumable cloning. Until it does,"
-" there are a couple fairly easy ways to handle this. The first and "
-"easiest is to try and clone to a shallow depth:"
+"Unfortunately git still doesn’t support resumable cloning. Until it does, "
+"there are a couple fairly easy ways to handle this. The first and easiest is"
+" to try and clone to a shallow depth:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:81
 msgid ""
-"Once you’ve performed a shallow clone, you can fetch the rest resumably "
-"by changing to the repo directory and running:"
+"Once you’ve performed a shallow clone, you can fetch the rest resumably by "
+"changing to the repo directory and running:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:83
 msgid ""
-"At this point, you still don’t have all your branches yet. You can get "
-"them by running the following commands:"
+"At this point, you still don’t have all your branches yet. You can get them "
+"by running the following commands:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:86
 msgid ""
-"Which tells git to alter the repository configuration so that fetching "
-"from origin fetches all branches."
+"Which tells git to alter the repository configuration so that fetching from "
+"origin fetches all branches."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:87
 msgid ""
-"If that doesn’t work, you can try opening the tunnel configuration menu "
-"and adding some backup tunnels."
+"If that doesn’t work, you can try opening the tunnel configuration menu and "
+"adding some backup tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:91
@@ -5066,26 +4600,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:96
 msgid ""
-"Revision control can make your life easier, but it works best if you use "
-"it well! In light of this, we strongly suggest a fork-first, feature-"
-"branch workflow as many are familiar with from Github. In such a "
-"workflow, the master branch is used as a sort of “Trunk” for updates and "
-"is never touched by the programmmer, instead, all changes to the master "
-"are merged from branches. In order to do set up your workspace for this, "
-"take the following steps:"
+"Revision control can make your life easier, but it works best if you use it "
+"well! In light of this, we strongly suggest a fork-first, feature-branch "
+"workflow as many are familiar with from Github. In such a workflow, the "
+"master branch is used as a sort of “Trunk” for updates and is never touched "
+"by the programmmer, instead, all changes to the master are merged from "
+"branches. In order to do set up your workspace for this, take the following "
+"steps:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:98
 msgid ""
-"<strong>Never make changes to the Master Branch</strong>. You will be "
-"using the master branch to periodially obtain updates to the official "
-"source code. All changes should be made in feature branches."
+"<strong>Never make changes to the Master Branch</strong>. You will be using "
+"the master branch to periodially obtain updates to the official source code."
+" All changes should be made in feature branches."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:101
 msgid ""
-"Set up a second remote in your local repository using the upstream source"
-" code."
+"Set up a second remote in your local repository using the upstream source "
+"code."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:103
@@ -5094,33 +4628,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:105
 msgid ""
-"Before making any changes to the source code, check out a new feature "
-"branch to develop on:"
+"Before making any changes to the source code, check out a new feature branch"
+" to develop on:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:107
 msgid ""
-"When you’re done with your changes, commit them and push them to your "
-"branch"
+"When you’re done with your changes, commit them and push them to your branch"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:110
 msgid ""
-"Submit a merge request. When the merge request is approved and brought "
-"into the upstream master, check out the master locally and pull in the "
-"changes:"
+"Submit a merge request. When the merge request is approved and brought into "
+"the upstream master, check out the master locally and pull in the changes:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:113
 msgid ""
-"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, "
-"you can update your master code using this procedure as well."
+"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, you "
+"can update your master code using this procedure as well."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/git.html:117
 msgid ""
-"The git utccommit alias solution to git timestamp issue was arrived at "
-"from the information first published here"
+"The git utccommit alias solution to git timestamp issue was arrived at from "
+"the information first published here"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:6
@@ -5129,22 +4661,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:7
 msgid ""
-"Mirror I2P Git repositories and Bridge Non-private internet.repositories "
-"for others."
+"Mirror I2P Git repositories and Bridge Non-private internet.repositories for"
+" others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:10
 msgid ""
-"This is the setup process I use for configuring Gitlab and I2P, with "
-"Docker in place to manage the service itself. Gitlab is very easy to host"
-" on I2P in this fashion, it can be administered by one person without "
-"much difficulty. In my configuration, I use a Debian VM to host docker "
-"containers and an I2P router, on a Debian Host system, however, this may "
-"be more than necessary for some people. These instructions should work on"
-" any Debian-based system, regardless of whether it is in a VM or not, and"
-" should easily translate to any system where Docker and an I2P router are"
-" available. This guide starts at Docker and does not assume any VM "
-"underneath."
+"This is the setup process I use for configuring Gitlab and I2P, with Docker "
+"in place to manage the service itself. Gitlab is very easy to host on I2P in"
+" this fashion, it can be administered by one person without much difficulty."
+" In my configuration, I use a Debian VM to host docker containers and an I2P"
+" router, on a Debian Host system, however, this may be more than necessary "
+"for some people. These instructions should work on any Debian-based system, "
+"regardless of whether it is in a VM or not, and should easily translate to "
+"any system where Docker and an I2P router are available. This guide starts "
+"at Docker and does not assume any VM underneath."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:11
@@ -5153,15 +4684,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:12
 msgid ""
-"Because Gitlab runs in a container, we only need to install the "
-"dependencies required for the container on our main system. Conveniently,"
-" you can install everything you need with:"
+"Because Gitlab runs in a container, we only need to install the dependencies"
+" required for the container on our main system. Conveniently, you can "
+"install everything you need with:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:14
 msgid ""
-"on an otherwise unmodified Debian system, or if you have added Docker’s "
-"own “Community” Debian repository, you may use:"
+"on an otherwise unmodified Debian system, or if you have added Docker’s own "
+"“Community” Debian repository, you may use:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:16
@@ -5174,62 +4705,61 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:18
 msgid ""
-"Once you have docker installed, you can fetch the docker containers "
-"required for gitlab. <em>Don’t run them yet.</em>"
+"Once you have docker installed, you can fetch the docker containers required"
+" for gitlab. <em>Don’t run them yet.</em>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:20
 msgid ""
-"For those who are concerned, the gitlab-ce Docker image is built using "
-"only Ubuntu Docker images as a parent, which are built from scratch "
-"images. Since there are no third-party images involved here, updates "
-"should come as soon as they are available in the host images. To review "
-"the Dockerfile for yourself, visit the <a href=\"https://gitlab.com"
-"/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile\">Gitlab "
-"source code</a>."
+"For those who are concerned, the gitlab-ce Docker image is built using only "
+"Ubuntu Docker images as a parent, which are built from scratch images. Since"
+" there are no third-party images involved here, updates should come as soon "
+"as they are available in the host images. To review the Dockerfile for "
+"yourself, visit the <a href=\"https://gitlab.com/gitlab-org/omnibus-"
+"gitlab/-/blob/master/docker/Dockerfile\">Gitlab source code</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:21
 msgid ""
-"Set up an I2P HTTP Proxy for Gitlab to use(Important information, "
-"optional steps)"
+"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional "
+"steps)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:22
 msgid ""
 "Gitlab servers inside of I2P can be run with or without the ability to "
-"interact with servers on the internet outside of I2P. In the case where "
-"the Gitlab server is <em>not allowed</em> to interact with servers "
-"outside of I2P, they cannot be de-anonymized by cloning a git repository "
-"from a git server on the internet outside of I2P. They can, however, "
-"export and mirror repositories from other git services inside of I2P."
+"interact with servers on the internet outside of I2P. In the case where the "
+"Gitlab server is <em>not allowed</em> to interact with servers outside of "
+"I2P, they cannot be de-anonymized by cloning a git repository from a git "
+"server on the internet outside of I2P. They can, however, export and mirror "
+"repositories from other git services inside of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:23
 msgid ""
 "In the case where the Gitlab server is <em>allowed</em> to interact with "
-"servers outside of I2P, it can act as a “Bridge” for the users, who can "
-"use it to mirror content outside I2P to an I2P-accessible source, however"
-" it <em>is not anonymous</em> in this case. Git services on the non-"
-"anonymous internet will be connected to directly."
+"servers outside of I2P, it can act as a “Bridge” for the users, who can use "
+"it to mirror content outside I2P to an I2P-accessible source, however it "
+"<em>is not anonymous</em> in this case. Git services on the non-anonymous "
+"internet will be connected to directly."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:24
 msgid ""
-"<strong>If you want to have a bridged, non-anonymous Gitlab instance with"
-" access to</strong> <strong>web repositories,</strong> no further "
+"<strong>If you want to have a bridged, non-anonymous Gitlab instance with "
+"access to</strong> <strong>web repositories,</strong> no further "
 "modification is necessary."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:25
 msgid ""
-"<strong>If you want to have an I2P-Only Gitlab instance with no access to"
-" Web-Only</strong> <strong>Repositories</strong>, you will need to "
-"configure Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP "
-"proxy only listens on <code>127.0.0.1</code>, you will need to set up a "
-"new one for Docker that listens on the Host/Gateway address of the Docker"
-" network, which is usually <code>172.17.0.1</code>. I configure mine on "
-"port <code>4446</code>."
+"<strong>If you want to have an I2P-Only Gitlab instance with no access to "
+"Web-Only</strong> <strong>Repositories</strong>, you will need to configure "
+"Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP proxy only "
+"listens on <code>127.0.0.1</code>, you will need to set up a new one for "
+"Docker that listens on the Host/Gateway address of the Docker network, which"
+" is usually <code>172.17.0.1</code>. I configure mine on port "
+"<code>4446</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:26
@@ -5245,8 +4775,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/gitlab.html:37
 msgid ""
 "Visit your Local Gitlab instance and set up your admin account. Choose a "
-"strong password, and configure user account limits to match your "
-"resources."
+"strong password, and configure user account limits to match your resources."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:38
@@ -5257,21 +4786,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:39
 msgid ""
-"It’s also possible to apply your HTTP Proxy settings in a more granular "
-"way, so that you can only allow users to mirror repositories from the "
-"domains that you choose. Since the domain is presumably operated by an "
-"organization, you can use this to ensure that repositories that are "
-"mirrorable follow a reasonable set of policies. After all, there is far "
-"more abusive content on the non-anonymous internet than there is on I2P, "
-"we wouldn’t want to make it too easy to introduce abusive content from "
-"such a nefarious place."
+"It’s also possible to apply your HTTP Proxy settings in a more granular way,"
+" so that you can only allow users to mirror repositories from the domains "
+"that you choose. Since the domain is presumably operated by an organization,"
+" you can use this to ensure that repositories that are mirrorable follow a "
+"reasonable set of policies. After all, there is far more abusive content on "
+"the non-anonymous internet than there is on I2P, we wouldn’t want to make it"
+" too easy to introduce abusive content from such a nefarious place."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:40
 msgid ""
-"Add the following lines to your gitlab.rb file inside the "
-"/src/gitlab/config container. These settings will take effect when you "
-"restart in a moment."
+"Add the following lines to your gitlab.rb file inside the /src/gitlab/config"
+" container. These settings will take effect when you restart in a moment."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:56
@@ -5280,10 +4807,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:57
 msgid ""
-"Once you have Gitlab set up locally, go to the I2P Router console. You "
-"will need to set up two server tunnels, one leading to the Gitlab "
-"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH interface"
-" on TCP Port 8022."
+"Once you have Gitlab set up locally, go to the I2P Router console. You will "
+"need to set up two server tunnels, one leading to the Gitlab web(HTTP) "
+"interface on TCP port 8080, and one to the Gitlab SSH interface on TCP Port "
+"8022."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:58
@@ -5294,8 +4821,7 @@ msgstr ""
 msgid ""
 "For the Web interface, use an “HTTP” server tunnel. From <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" launch the “New Tunnel Wizard” and enter the following values at each "
-"step:"
+" launch the “New Tunnel Wizard” and enter the following values at each step:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:61
@@ -5313,8 +4839,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:64
 msgid ""
-"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the"
-" port."
+"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the "
+"port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:65
@@ -5333,19 +4859,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:69
 msgid ""
-"Web services on I2P can register hostnames for themselves by providing an"
-" authentication string to a jump service provider like <a "
+"Web services on I2P can register hostnames for themselves by providing an "
+"authentication string to a jump service provider like <a "
 "href=\"http://stats.i2p\">stats.i2p</a>. To do this, open the <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" again and click on the “Gitlab Web Service” item you just set up. Scroll"
-" to the bottom of the “Edit Server Settings” section and click "
-"Registration Authentication. Copy the field that says “Authentication for"
-" adding Hostname” and visit <a "
+" again and click on the “Gitlab Web Service” item you just set up. Scroll to"
+" the bottom of the “Edit Server Settings” section and click Registration "
+"Authentication. Copy the field that says “Authentication for adding "
+"Hostname” and visit <a "
 "href=\"http://stats.i2p/i2p/addkey.html\">stats.i2p</a> to add your "
-"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then"
-" you will have to use the correct authentication string for your "
-"subdomain, which is a little bit more complicated and merits it’s own "
-"instructions."
+"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then "
+"you will have to use the correct authentication string for your subdomain, "
+"which is a little bit more complicated and merits it’s own instructions."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:70
@@ -5356,8 +4881,7 @@ msgstr ""
 msgid ""
 "For the SSH interface, use a “Standard” server tunnel. From <a "
 "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>"
-" launch the “New Tunnel Wizard” and enter the following values at each "
-"step:"
+" launch the “New Tunnel Wizard” and enter the following values at each step:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:74
@@ -5370,8 +4894,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:76
 msgid ""
-"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the"
-" port."
+"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the "
+"port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:80
@@ -5380,9 +4904,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/gitlab.html:81
 msgid ""
-"Finally, if you either modified <code>gitlab.rb</code> or you registered "
-"a hostname, you will need to re-start the gitlab service for the settings"
-" to take effect."
+"Finally, if you either modified <code>gitlab.rb</code> or you registered a "
+"hostname, you will need to re-start the gitlab service for the settings to "
+"take effect."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:2
@@ -5400,20 +4924,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:15
 msgid ""
 " There are many IRC clients that can be used with I2P. In\n"
-"fact, all IRC clients can be connected to the Irc2P Service by connecting"
-"\n"
+"fact, all IRC clients can be connected to the Irc2P Service by connecting\n"
 "them to the IRC Tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:28
 msgid ""
 "To configure any IRC client to chat on Irc2P, first, make sure that\n"
-"your IRC tunnel is available. Visit the <a "
-"href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n"
-"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" "
-"indicator on\n"
-"the right-hand side is yellow or green, your Irc2P tunnel is ready and "
-"you should \n"
+"your IRC tunnel is available. Visit the <a href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n"
+"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" indicator on\n"
+"the right-hand side is yellow or green, your Irc2P tunnel is ready and you should \n"
 "proceed to the next step."
 msgstr ""
 
@@ -5430,12 +4950,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:42
 msgid ""
 "Pidgin is a very popular Instant Messaging client with built-in IRC\n"
-"support. It is also possible to use it with many other kinds of chat "
-"service, and\n"
-"it supports using multiple accounts at once and has a variety of plugin-"
-"ins. There\n"
-"is a similar application for OSX called \"Adium.\" The instructions for "
-"Pidgin are\n"
+"support. It is also possible to use it with many other kinds of chat service, and\n"
+"it supports using multiple accounts at once and has a variety of plugin-ins. There\n"
+"is a similar application for OSX called \"Adium.\" The instructions for Pidgin are\n"
 "similar in Adium.\n"
 msgstr ""
 
@@ -5451,8 +4968,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:52
 msgid ""
 "After launching Pidgin, you should see a \"Buddy List\" window. From\n"
-"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage"
-" Accounts\" to\n"
+"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage Accounts\" to\n"
 "begin configuring your I2P account."
 msgstr ""
 
@@ -5467,10 +4983,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:59
 msgid ""
 "Click the \"Add\" button. In the window that opens, select \"IRC\" under\n"
-"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and"
-" password. IRC\n"
-"does not require you to register a nickname to join, but you may if you "
-"wish, after\n"
+"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and password. IRC\n"
+"does not require you to register a nickname to join, but you may if you wish, after\n"
 "you connect to Irc2P."
 msgstr ""
 
@@ -5485,8 +4999,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:67
 msgid ""
 "Navigate to the \"Advanced\" tab and set the \"Port\" field to 6668 and\n"
-"make sure that SSL is <em>disabled</em>, since your tunnel has encryption"
-" provided\n"
+"make sure that SSL is <em>disabled</em>, since your tunnel has encryption provided\n"
 "by I2P."
 msgstr ""
 
@@ -5530,8 +5043,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:87
 msgid ""
 "Change the value in \"Servers\" from the default to `localhost/6669`,\n"
-"and configure the default channels you want to join. I suggest #i2p and "
-"#i2p-dev\n"
+"and configure the default channels you want to join. I suggest #i2p and #i2p-dev\n"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:92
@@ -5631,8 +5143,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:143
 msgid ""
 "Revolution IRC is an easy to use IRC client for Android. It's able to\n"
-"handle multiple accounts on multiple services, so you can use it for "
-"Irc2P and for\n"
+"handle multiple accounts on multiple services, so you can use it for Irc2P and for\n"
 "your non-I2P IRC networks as well."
 msgstr ""
 
@@ -5693,15 +5204,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/applications/irc.html:196
 msgid ""
 "Eris is an easy-to-configure IRC server with self-configuring support\n"
-"for I2P. If you want to run a private IRC server it's one of the easiest "
-"ways."
+"for I2P. If you want to run a private IRC server it's one of the easiest ways."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/irc.html:199
 msgid ""
 " This is a valid configuration of the Eris IRC server, but it uses a\n"
-"default password for the admin account(admin). You should change the "
-"operator.admin.password\n"
+"default password for the admin account(admin). You should change the operator.admin.password\n"
 "and account.admin.password before deploying to a real service."
 msgstr ""
 
@@ -5726,24 +5235,18 @@ msgstr ""
 msgid ""
 "As of release 0.9.4, the router supports managed clients.\n"
 "Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives "
-"updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state "
-"tracking\n"
-"and to start and stop a client. It also is much easier to avoid static "
-"references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state tracking\n"
+"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
 "which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router "
-"console,\n"
+"Managed clients may be started and stopped by the user in the router console,\n"
 "and are stopped at router shutdown."
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:31
 msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or "
-"net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following "
-"constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following constructor:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:38
@@ -5762,12 +5265,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:49
 msgid ""
-"If the main class specified in the clients.config file does not implement"
-" a managed interface,\n"
+"If the main class specified in the clients.config file does not implement a managed interface,\n"
 "it will be started with main() with the arguments specified,\n"
 "and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via "
-"the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via the static main() method.\n"
 "The console cannot provide accurate state information to the user."
 msgstr ""
 
@@ -5777,8 +5278,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:58
 msgid ""
-"Clients, whether managed or unmanaged, may register with the "
-"ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
 "so that other clients may retrieve a reference to them.\n"
 "Registration is by name.\n"
 "Known registered clients are:"
@@ -5790,12 +5290,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/applications/managed-clients.html:69
 msgid ""
-"The router also provides a simple mechanism for clients to find an "
-"internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an internal socket service,\n"
 "such as the HTTP proxy. This is provided by the Port Mapper.\n"
 "Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on "
-"that port."
+"Clients that register generally provide an internal emulated socket on that port."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:2
@@ -5805,8 +5303,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:4
 #, python-format
 msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming "
-"system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
 "common arguments and possible alternatives.\n"
 "See <a href=\"%(naming)s\">the naming page</a> for current documentation."
 msgstr ""
@@ -5817,72 +5314,49 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:12
 msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning "
-"with\n"
-"advocates across the spectrum of possibilities.  However, given I2P's "
-"inherent\n"
-"demand for secure communication and decentralized operation, the "
-"traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting "
-"systems."
+"Naming within I2P has been an oft-debated topic since the very beginning with\n"
+"advocates across the spectrum of possibilities.  However, given I2P's inherent\n"
+"demand for secure communication and decentralized operation, the traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:19
 msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage "
-"done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no"
-"\n"
-"value.  DNSsec itself still falls back on registrars and certificate "
-"authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or "
-"the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a "
-"destination\n"
-"itself is just a pair of public keys and a certificate.  DNS-style "
-"systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount "
-"simple denial\n"
-"of service and spoofing attacks.  Adding on a certificate authenticating "
-"the\n"
-"responses as signed by some centralized certificate authority would "
-"address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well"
-" as \n"
+"I2P does not promote the use of DNS-like services though, as the damage done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no\n"
+"value.  DNSsec itself still falls back on registrars and certificate authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
+"itself is just a pair of public keys and a certificate.  DNS-style systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount simple denial\n"
+"of service and spoofing attacks.  Adding on a certificate authenticating the\n"
+"responses as signed by some centralized certificate authority would address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well as \n"
 "hostile certificate authority attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:33
 msgid ""
-"Voting style naming is dangerous as well, especially given the "
-"effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an "
-"arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name.  "
-"Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows "
-"the load\n"
-"required to contact everyone to conduct online voting is implausible, or "
-"if the\n"
+"Voting style naming is dangerous as well, especially given the effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name.  Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows the load\n"
+"required to contact everyone to conduct online voting is implausible, or if the\n"
 "full network is not queried, different sets of answers may be reachable."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:42
 msgid ""
-"As with the Internet however, I2P is keeping the design and operation of "
-"a \n"
-"naming system out of the (IP-like) communication layer.  The bundled "
-"naming library\n"
-"includes a simple service provider interface which <a "
-"href=\"#alternatives\">alternate naming systems</a> can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they"
-" prefer."
+"As with the Internet however, I2P is keeping the design and operation of a \n"
+"naming system out of the (IP-like) communication layer.  The bundled naming library\n"
+"includes a simple service provider interface which <a href=\"#alternatives\">alternate naming systems</a> can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:50
 msgid ""
-"See also <a href=\"https://zooko.com/distnames.html\">Names: "
-"Decentralized, Secure, Human-Meaningful: Choose Two</a>."
+"See also <a href=\"https://zooko.com/distnames.html\">Names: Decentralized, "
+"Secure, Human-Meaningful: Choose Two</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:55
@@ -5893,36 +5367,26 @@ msgstr ""
 msgid ""
 "Q:\n"
 "What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are"
-" not? \n"
+"do not agree on one address and if some addresses are working, others are not? \n"
 "Who is the right source of a name?"
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:64
 msgid ""
 "A:\n"
-"You don't. This is actually a critical difference between names on I2P "
-"and how \n"
-"DNS works - names in I2P are human readable, secure, but <b>not globally"
-" \n"
-"unique</b>.  This is by design, and an inherent part of our need for "
-"security."
+"You don't. This is actually a critical difference between names on I2P and how \n"
+"DNS works - names in I2P are human readable, secure, but <b>not globally \n"
+"unique</b>.  This is by design, and an inherent part of our need for security."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:70
 msgid ""
-"If I could somehow convince you to change the destination associated with"
-" some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances"
-" is that \n"
-"acceptable.  Instead, what we do is make names <b>locally unique</b>: "
-"they are \n"
-"what <i>you</i> use to call a site, just as how you can call things "
-"whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM "
-"client's \n"
-"buddy list.  Who you call \"Boss\" may be who someone else calls "
-"\"Sally\"."
+"If I could somehow convince you to change the destination associated with some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
+"acceptable.  Instead, what we do is make names <b>locally unique</b>: they are \n"
+"what <i>you</i> use to call a site, just as how you can call things whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM client's \n"
+"buddy list.  Who you call \"Boss\" may be who someone else calls \"Sally\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:78
@@ -5938,44 +5402,33 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:89
 msgid ""
 "<b>Inefficiency:</b>\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
-"the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
 "It's about 400K right now for almost 800 hosts."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:94
 msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is "
-"itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic "
-"routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it "
-"averages out to about 10 bytes/sec."
+"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:99
 msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here "
-"between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous"
-" because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
 "last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump"
-" services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
 "in a more automated fashion), possibly at a further cost in anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:106
 #, python-format
 msgid ""
-"Possible improvements would be a replacement or supplement to address "
-"book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n"
-"or something simple like subscribing to http://example.i2p/cgi-"
-"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
-"hours, for example,\n"
-"that could be both more efficient and more anonymous than the current "
-"hosts.txt with last-modified and etag."
+"Possible improvements would be a replacement or supplement to address book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n"
+"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
+"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:112
@@ -5985,17 +5438,14 @@ msgid ""
 "<a href=\"%(url)s\">%(url)s</a>.\n"
 "This script returns an Etag with a timestamp.\n"
 "When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not "
-"Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber"
-"\n"
+"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber\n"
 "does not know about, in an address book-compatible manner."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:121
 msgid ""
-"So the inefficiency is not a big issue and there are several ways to "
-"improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to improve things without\n"
 "radical change."
 msgstr ""
 
@@ -6009,38 +5459,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:132
 msgid ""
 "As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for"
-"\n"
-"a key, you need to have the whole set of keys stored locally, at a cost "
-"of about 500 bytes per key."
+"But unless you're going to do a slow real-time query over the network for\n"
+"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:139
 msgid ""
 "<b>Requires configuration and \"trust\":</b>\n"
-"Out-of-the-box address book is only subscribed to "
-"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box address book is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
 "leading to poor new-user experience."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:144
 msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a "
-"hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
 "provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of "
-"trust in an anonymous network."
+"The configuration step attempts to force users to think about issues of trust in an anonymous network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:149
 msgid ""
-"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy"
-"\n"
-"lists some jump services, but doesn't \"recommend\" any one in "
-"particular,\n"
+"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy\n"
+"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
 "and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but "
-"not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but not enough to\n"
 "automatically go fetch the key from them."
 msgstr ""
 
@@ -6057,14 +5499,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:166
 msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down "
-"web browsing."
+"Unfortunately real-time lookups over i2p would significantly slow down web "
+"browsing."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:169
 msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, "
-"while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
 "keys are permanent."
 msgstr ""
 
@@ -6083,26 +5524,21 @@ msgid ""
 "Yes it depends on a few servers that you have configured.\n"
 "Within i2p, servers and services come and go.\n"
 "Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is "
-"authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" "
-"solution, or by\n"
-"something even simpler, like a script that adds everybody in your "
-"hosts.txt to your address book."
+"have the same problem. A completely decentralized system (everybody is authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
+"something even simpler, like a script that adds everybody in your hosts.txt to your address book."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:190
 msgid ""
-"People advocating all-authoritative solutions generally haven't thought "
-"through\n"
+"People advocating all-authoritative solutions generally haven't thought through\n"
 "the issues of conflicts and hijacking, however."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:196
 msgid ""
 "<b>Awkward, not real-time:</b>\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
-" service providers,\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
 "I2P Site status reporters.\n"
 "Jump servers and subscriptions are a pain, it should just work like DNS."
 msgstr ""
@@ -6113,8 +5549,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:207
 msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, "
-"or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
 "and proposals to \"just use DNS\" aren't well thought-through."
 msgstr ""
 
@@ -6124,8 +5559,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:213
 msgid ""
-"The I2P source contains several pluggable naming systems and supports "
-"configuration options\n"
+"The I2P source contains several pluggable naming systems and supports configuration options\n"
 "to enable experimentation with naming systems."
 msgstr ""
 
@@ -6147,8 +5581,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:234
 msgid ""
-"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/"
-" directory."
+"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/ "
+"directory."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:237
@@ -6173,8 +5607,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:253
 msgid ""
-"The current naming system can be changed with the advanced config option "
-"'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
 "(restart required).\n"
 "See core/java/src/net/i2p/client/naming for details."
 msgstr ""
@@ -6182,8 +5615,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/discussions/naming.html:258
 msgid ""
 "Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the address book subscription functions, "
-"since address book\n"
+"implement local storage and/or the address book subscription functions, since address book\n"
 "only knows about the hosts.txt files and format."
 msgstr ""
 
@@ -6193,50 +5625,40 @@ msgstr "Dëshmi"
 
 #: i2p2www/pages/site/docs/discussions/naming.html:265
 msgid ""
-"I2P destinations contain a certificate, however at the moment that "
-"certificate\n"
+"I2P destinations contain a certificate, however at the moment that certificate\n"
 "is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending "
-"in \"AAAA\",\n"
-"and this is checked in the address book merge mechanism, and possibly "
-"other places.\n"
-"Also, there is no method available to generate a certificate or add it to"
-" a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
+"and this is checked in the address book merge mechanism, and possibly other places.\n"
+"Also, there is no method available to generate a certificate or add it to a\n"
 "destination. So these will have to be updated to implement certificates."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:273
 #, python-format
 msgid ""
-"One possible use of certificates is for <a "
-"href=\"%(todo)s#hashcash\">proof of work</a>."
+"One possible use of certificates is for <a href=\"%(todo)s#hashcash\">proof "
+"of work</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:276
 msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such "
-"thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's "
-"keys."
+"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:280
 msgid ""
-"With any certificate implementation must come the method for verifying "
-"the\n"
+"With any certificate implementation must come the method for verifying the\n"
 "certificates.\n"
 "Presumably this would happen in the address book merge code.\n"
-"Is there a method for multiple types of certificates, or multiple "
-"certificates?"
+"Is there a method for multiple types of certificates, or multiple certificates?"
 msgstr ""
 
 #: i2p2www/pages/site/docs/discussions/naming.html:286
 msgid ""
 "Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would "
-"address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well"
-" as \n"
+"responses as signed by some centralized certificate authority would address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well as \n"
 "hostile certificate authority attacks."
 msgstr ""
 
@@ -6255,91 +5677,58 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:11
 msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple "
-"combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data "
-"confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred"
-" \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
-"describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
 "the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:19
 #: i2p2www/pages/site/docs/how/tech-intro.html:508
 msgid ""
-"The first time a router wants to encrypt a garlic message to another "
-"router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal "
-"and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal "
-"block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains "
-"the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a "
-"number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender "
-"wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal "
-"encrypt \n"
-"a new session key they simply pick one of the previously delivered "
-"session \n"
-"tags and AES encrypt the payload like before, using the session key used "
-"with \n"
-"that session tag, prepended with the session tag itself. When a router "
-"receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it "
-"matches \n"
-"an available session tag - if it does, they simply AES decrypt the "
-"message, \n"
+"The first time a router wants to encrypt a garlic message to another router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
+"a new session key they simply pick one of the previously delivered session \n"
+"tags and AES encrypt the payload like before, using the session key used with \n"
+"that session tag, prepended with the session tag itself. When a router receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
+"an available session tag - if it does, they simply AES decrypt the message, \n"
 "but if it does not, they ElGamal decrypt the first block."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:35
 #: i2p2www/pages/site/docs/how/tech-intro.html:524
 msgid ""
-"Each session tag can be used only once so as to prevent internal "
-"adversaries \n"
-"from unnecessarily correlating different messages as being between the "
-"same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
-"chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough "
-"tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful "
-"tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery "
-"status \n"
-"message\") - when the garlic message arrives at the intended recipient "
-"and \n"
-"is decrypted successfully, this small delivery status message is one of "
-"the \n"
-"cloves exposed and has instructions for the recipient to send the clove "
-"back \n"
-"to the original sender (through an inbound tunnel, of course). When the "
-"original \n"
-"sender receives this delivery status message, they know that the session "
-"tags \n"
+"Each session tag can be used only once so as to prevent internal adversaries \n"
+"from unnecessarily correlating different messages as being between the same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery status \n"
+"message\") - when the garlic message arrives at the intended recipient and \n"
+"is decrypted successfully, this small delivery status message is one of the \n"
+"cloves exposed and has instructions for the recipient to send the clove back \n"
+"to the original sender (through an inbound tunnel, of course). When the original \n"
+"sender receives this delivery status message, they know that the session tags \n"
 "bundled in the garlic message were successfully delivered."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:50
 msgid ""
 "Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is "
-"limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or "
-"old \n"
-"messages may be dropped. The sender keeps track whether messages using "
-"session \n"
-"tags are getting through, and if there isn't sufficient communication it "
-"may \n"
-"drop the ones previously assumed to be properly delivered, reverting back"
-" \n"
+"discarded if not used. In addition, the quantity stored for each key is limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or old \n"
+"messages may be dropped. The sender keeps track whether messages using session \n"
+"tags are getting through, and if there isn't sufficient communication it may \n"
+"drop the ones previously assumed to be properly delivered, reverting back \n"
 "to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or "
-"expire."
+"A session will continue to exist until all its tags are exhausted or expire."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:61
@@ -6354,8 +5743,7 @@ msgid ""
 "between a Router and a Destination.\n"
 "Each Router and Destination maintains its own Session Key Manager to\n"
 "keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple "
-"Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple Destinations\n"
 "to each other or a Router by adversaries."
 msgstr ""
 
@@ -6376,14 +5764,14 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgid ""
+"It is for a new session and contains both ElGamal and AES encrypted blocks"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:88
 msgid ""
 "When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt "
-"the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
 "If that fails, it will assume it is for a new session and attempt to\n"
 "decrypt it using ElGamal."
 msgstr ""
@@ -6394,8 +5782,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:98
 msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
-"block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
 "and an encrypted AES block."
 msgstr ""
 
@@ -6421,8 +5808,7 @@ msgid ""
 "The 32-byte\n"
 "<a href=\"%(commonstructures)s#type_SessionKey\">Session Key</a>\n"
 "is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
-" follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
 "the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
 msgstr ""
 
@@ -6451,18 +5837,16 @@ msgstr ""
 #, python-format
 msgid ""
 "The data is then <a href=\"%(cryptography)s\">AES Encrypted</a>,\n"
-"using the session key and IV (calculated from the pre-IV) from the "
-"ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16"
-" bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
 "</p>"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:266
 #, python-format
 msgid ""
-"Actual max payload length, and max block length, is less than 64 KB; see "
-"the <a href=\"%(i2np)s\">I2NP Overview</a>."
+"Actual max payload length, and max block length, is less than 64 KB; see the"
+" <a href=\"%(i2np)s\">I2NP Overview</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:269
@@ -6491,18 +5875,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:318
 msgid ""
 "The session tag also serves as\n"
-"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the "
-"sessionTag."
+"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:323
 msgid ""
-"To decode a message from an existing session, a router looks up the "
-"Session Tag to find an\n"
-"associated Session Key. If the Session Tag is found, the AES block is "
-"decrypted using the associated Session Key.\n"
-"If the tag is not found, the message is assumed to be a <a "
-"href=\"#new\">New Session Message</a>."
+"To decode a message from an existing session, a router looks up the Session Tag to find an\n"
+"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n"
+"If the tag is not found, the message is assumed to be a <a href=\"#new\">New Session Message</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:331
@@ -6512,38 +5892,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:332
 #, python-format
 msgid ""
-"As of release 0.9.2, the client may configure the default number of "
-"Session Tags to send\n"
+"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
 "and the low tag threshold for the current session.\n"
-"For brief streaming connections or datagrams, these options may be used "
-"to significantly reduce bandwidth.\n"
-"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for "
-"details.\n"
+"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n"
+"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n"
 "The session settings may also be overridden on a per-message basis.\n"
-"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message"
-" Expires specification</a> for details."
+"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:353
 msgid ""
-"There are many possible areas to tune the Session Key Manager's "
-"algorithms;\n"
-"some may interact with the streaming library behavior, or have "
-"significant\n"
+"There are many possible areas to tune the Session Key Manager's algorithms;\n"
+"some may interact with the streaming library behavior, or have significant\n"
 "impact on overall performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:360
 msgid ""
-"The number of tags delivered could depend on message size, keeping in "
-"mind\n"
+"The number of tags delivered could depend on message size, keeping in mind\n"
 "the eventual padding to 1KB at the tunnel message layer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:365
 msgid ""
-"Clients could send an estimate of session lifetime to the router, as an "
-"advisory\n"
+"Clients could send an estimate of session lifetime to the router, as an advisory\n"
 "on the number of tags required."
 msgstr ""
 
@@ -6555,15 +5927,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:374
 msgid ""
-"The router may assume delivery of Session Tags, or await acknowledgement "
-"before using them;\n"
+"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n"
 "there are tradeoffs for each strategy."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:379
 msgid ""
-"For very brief messages, almost the full 222 bytes of the pre-IV and "
-"padding fields in the ElGamal block\n"
+"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n"
 "could be used for the entire message, instead of establishing a session."
 msgstr ""
 
@@ -6575,10 +5945,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/elgamal-aes.html:389
 msgid ""
-"Perhaps things could be more efficient if the Session Tag system was "
-"bidirectional,\n"
-"so tags delivered in the 'forward' path could be used in the 'reverse' "
-"path,\n"
+"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n"
+"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n"
 "thus avoiding ElGamal in the initial response.\n"
 "The router currently plays some tricks like this when sending\n"
 "tunnel test messages to itself."
@@ -6596,12 +5964,9 @@ msgstr ""
 msgid ""
 "Several of these ideas may require a new I2NP message type, or\n"
 "set a flag in the\n"
-"<a "
-"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery"
-" Instructions</a>,\n"
+"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery Instructions</a>,\n"
 "or set a magic number in the first few bytes of the Session Key field\n"
-"and accept a small risk of the random Session Key matching the magic "
-"number."
+"and accept a small risk of the random Session Key matching the magic number."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:2
@@ -6618,8 +5983,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:7
 msgid ""
-"The terms \"garlic routing\" and \"garlic encryption\" are often used "
-"rather loosely when referring to I2P's technology.\n"
+"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n"
 "Here, we explain the history of the terms, the various meanings, and\n"
 "the usage of \"garlic\" methods in I2P."
 msgstr ""
@@ -6629,20 +5993,16 @@ msgid ""
 "\"Garlic routing\" was first coined by\n"
 "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>\n"
 "in Roger Dingledine's Free Haven \n"
-"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> "
-"Section 8.1.1 (June 2000), as derived from \n"
+"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> Section 8.1.1 (June 2000), as derived from \n"
 "<a href=\"http://www.onion-router.net/\">Onion Routing</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:21
 msgid ""
-"\"Garlic\" may have been used originally by I2P developers because I2P "
-"implements a form of\n"
-"bundling as Freedman describes, or simply to emphasize general "
-"differences from Tor.\n"
+"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n"
+"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n"
 "The specific reasoning may be lost to history.\n"
-"Generally, when referring to I2P, the term \"garlic\" may mean one of "
-"three things:"
+"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:28
@@ -6661,54 +6021,39 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:33
 msgid ""
-"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven "
-"years has not always been precise; therefore the reader is\n"
+"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n"
 "cautioned when encountering the term.\n"
 "Hopefully, the explanation below will make things clear."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:40
 msgid ""
-"Onion routing is a technique for building paths, or tunnels, through a "
-"series of peers,\n"
+"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n"
 "and then using that tunnel.\n"
-"Messages are repeatedly encrypted by the originator, and then decrypted "
-"by each hop.\n"
-"During the building phase, only the routing instructions for the next hop"
-" are exposed to each peer.\n"
-"During the operating phase, messages are passed through the tunnel, and "
-"the\n"
-"message and its routing instructions are only exposed to the endpoint of "
-"the tunnel."
+"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n"
+"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n"
+"During the operating phase, messages are passed through the tunnel, and the\n"
+"message and its routing instructions are only exposed to the endpoint of the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:49
 #, python-format
 msgid ""
 "This is similar to the way Mixmaster\n"
-"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages "
-"- taking a message, encrypting it\n"
-"to the recipient's public key, taking that encrypted message and "
-"encrypting\n"
-"it (along with instructions specifying the next hop), and then taking "
-"that\n"
-"resulting encrypted message and so on, until it has one layer of "
-"encryption\n"
+"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages - taking a message, encrypting it\n"
+"to the recipient's public key, taking that encrypted message and encrypting\n"
+"it (along with instructions specifying the next hop), and then taking that\n"
+"resulting encrypted message and so on, until it has one layer of encryption\n"
 "per hop along the path."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:58
 msgid ""
-"In this sense, \"garlic routing\" as a general concept is identical to "
-"\"onion routing\".\n"
-"As implemented in I2P, of course, there are several differences from the "
-"implementation in Tor; see below.\n"
-"Even so, there are substantial similarities such that I2P benefits from a"
-"\n"
-"<a href=\"http://www.onion-router.net/Publications.html\">large amount of"
-" academic research on onion routing</a>,\n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar "
-"mixnets</a>."
+"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n"
+"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n"
+"Even so, there are substantial similarities such that I2P benefits from a\n"
+"<a href=\"http://www.onion-router.net/Publications.html\">large amount of academic research on onion routing</a>,\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar mixnets</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:67
@@ -6717,15 +6062,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:68
 msgid ""
-"Michael Freedman defined \"garlic routing\" as an extension to onion "
-"routing,\n"
+"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n"
 "in which multiple messages are bundled together.\n"
 "He called each message a \"bulb\".\n"
-"All the messages, each with its own delivery instructions, are exposed at"
-" the\n"
+"All the messages, each with its own delivery instructions, are exposed at the\n"
 "endpoint.\n"
-"This allows the efficient bundling of an onion routing \"reply block\" "
-"with the original message."
+"This allows the efficient bundling of an onion routing \"reply block\" with the original message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:77
@@ -6734,10 +6076,8 @@ msgid ""
 "Our term for garlic \"bulbs\" is \"cloves\".\n"
 "Any number of messages can be\n"
 "contained, instead of just a single message.\n"
-"This is a significant distinction from the onion routing implemented in "
-"Tor.\n"
-"However, it is only one of many major architectural differences between "
-"I2P and Tor;\n"
+"This is a significant distinction from the onion routing implemented in Tor.\n"
+"However, it is only one of many major architectural differences between I2P and Tor;\n"
 "perhaps it is not, by itself, enough to justify a change in terminology."
 msgstr ""
 
@@ -6745,10 +6085,8 @@ msgstr ""
 msgid ""
 "Another difference\n"
 "from the method described by Freedman\n"
-"is that the path is unidirectional - there is no \"turning point\" as "
-"seen in onion routing\n"
-"or mixmaster reply blocks, which greatly simplifies the algorithm and "
-"allows for more flexible\n"
+"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n"
+"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n"
 "and reliable delivery."
 msgstr ""
 
@@ -6782,16 +6120,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:113
 msgid ""
-"For publishing some network database entries (dampening the probability "
-"of a successful traffic analysis attack) (ElGamal/AES)"
+"For publishing some network database entries (dampening the probability of a"
+" successful traffic analysis attack) (ElGamal/AES)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:116
 msgid ""
-"There are also significant ways that this technique can be used to "
-"improve the performance of the network, \n"
-"exploiting transport latency/throughput tradeoffs, and branching data "
-"through redundant paths to increase reliability."
+"There are also significant ways that this technique can be used to improve the performance of the network, \n"
+"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:122
@@ -6802,8 +6138,7 @@ msgstr ""
 msgid ""
 "In I2P, tunnels are unidirectional. Each party builds two tunnels,\n"
 "one for outbound and one for inbound traffic.\n"
-"Therefore, four tunnels are required for a single round-trip message and "
-"reply."
+"Therefore, four tunnels are required for a single round-trip message and reply."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:129
@@ -6823,12 +6158,10 @@ msgstr ""
 msgid ""
 "Tunnels are a general-purpose mechanism to transport all\n"
 "<a href=\"%(i2np)s\">I2NP messages</a>, and\n"
-"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to "
-"build tunnels.\n"
+"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to build tunnels.\n"
 "We do not bundle multiple\n"
 "<a href=\"%(i2np)s\">I2NP messages</a> into a single\n"
-"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at "
-"the outbound tunnel endpoint;\n"
+"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at the outbound tunnel endpoint;\n"
 "the tunnel encryption is sufficient."
 msgstr ""
 
@@ -6842,14 +6175,12 @@ msgid ""
 "At the layer above tunnels, I2P delivers end-to-end messages between\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>.\n"
 "Just as within a single tunnel, we use\n"
-"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption."
-"\n"
+"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption.\n"
 "Each client message as delivered to the router through the\n"
 "<a href=\"%(i2cp)s\">I2CP interface</a> becomes a single\n"
 "<a href=\"%(i2npspec)s#struct_GarlicClove\">Garlic Clove</a>\n"
 "with its own\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>,\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>,\n"
 "inside a\n"
 "<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a>.\n"
 "Delivery Instructions may specify a Destination, Router, or Tunnel."
@@ -6872,18 +6203,13 @@ msgid ""
 "A\n"
 "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">Delivery Status Message</a>,\n"
 "with\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>\n"
-"specifying that it be sent back to the originating router as an "
-"acknowledgment.\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n"
+"specifying that it be sent back to the originating router as an acknowledgment.\n"
 "This is similar to the \"reply block\" or \"reply onion\"\n"
 "described in the references.\n"
-"It is used for determining the success or failure of end to end message "
-"delivery.\n"
-"The originating router may, upon failure to receive the Delivery Status "
-"Message\n"
-"within the expected time period, modify the routing to the far-end "
-"Destination,\n"
+"It is used for determining the success or failure of end to end message delivery.\n"
+"The originating router may, upon failure to receive the Delivery Status Message\n"
+"within the expected time period, modify the routing to the far-end Destination,\n"
 "or take other actions."
 msgstr ""
 
@@ -6895,16 +6221,12 @@ msgid ""
 "containing a\n"
 "<a href=\"%(commonstructures)s#struct_LeaseSet\">LeaseSet</a>\n"
 "for the originating Destination, with\n"
-"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery "
-"Instructions</a>\n"
+"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n"
 "specifying the far-end destination's router.\n"
-"By periodically bundling a LeaseSet, the router ensures that the far-end "
-"will be able\n"
+"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n"
 "to maintain communications.\n"
-"Otherwise the far-end would have to query a floodfill router for the "
-"network database entry,\n"
-"and all LeaseSets would have to be published to the network database, as "
-"explained on the\n"
+"Otherwise the far-end would have to query a floodfill router for the network database entry,\n"
+"and all LeaseSets would have to be published to the network database, as explained on the\n"
 "<a href=\"%(netdb)s\">network database page</a>."
 msgstr ""
 
@@ -6914,31 +6236,24 @@ msgid ""
 "By default, the Delivery Status and Database Store Messages\n"
 "are bundled when the local LeaseSet changes, when additional\n"
 "<a href=\"%(commonstructures)s#type_SessionTag\">Session Tags</a>\n"
-"are delivered, or if the messages have not been bundled in the previous "
-"minute.\n"
-"As of release 0.9.2, the client may configure the default number of "
-"Session Tags to send\n"
+"are delivered, or if the messages have not been bundled in the previous minute.\n"
+"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
 "and the low tag threshold for the current session.\n"
-"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for "
-"details.\n"
+"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n"
 "The session settings may also be overridden on a per-message basis.\n"
-"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message"
-" Expires specification</a> for details."
+"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:224
 msgid ""
-"Obviously, the additional messages are currently bundled for specific "
-"purposes,\n"
+"Obviously, the additional messages are currently bundled for specific purposes,\n"
 "and not part of a general-purpose routing scheme."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:229
 msgid ""
-"As of release 0.9.12, the Delivery Status Message is wrapped in another "
-"Garlic Message\n"
-"by the originator so that the contents are encrypted and not visible to "
-"routers on the return path."
+"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n"
+"by the originator so that the contents are encrypted and not visible to routers on the return path."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:235
@@ -6962,35 +6277,26 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/garlic-routing.html:252
 #, python-format
 msgid ""
-"The Garlic Message mechanism is very flexible and provides a structure "
-"for\n"
+"The Garlic Message mechanism is very flexible and provides a structure for\n"
 "implementing many types of mixnet delivery methods.\n"
 "Together with the unused delay option in the\n"
-"<a "
-"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel"
-" message Delivery Instructions</a>,\n"
-"a wide spectrum of batching, delay, mixing, and routing strategies are "
-"possible."
+"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel message Delivery Instructions</a>,\n"
+"a wide spectrum of batching, delay, mixing, and routing strategies are possible."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:260
 msgid ""
-"In particular, there is potential for much more flexibility at the "
-"outbound tunnel endpoint.\n"
+"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n"
 "Messages could possibly be routed from there to one of several tunnels\n"
-"(thus minimizing point-to-point connections), or multicast to several "
-"tunnels\n"
+"(thus minimizing point-to-point connections), or multicast to several tunnels\n"
 "for redundancy, or streaming audio and video."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:267
 msgid ""
-"Such experiments may conflict with the need to ensure security and "
-"anonymity, such\n"
-"as limiting certain routing paths, restricting the types of I2NP messages"
-" that may\n"
-"be forwarded along various paths, and enforcing certain message "
-"expiration times."
+"Such experiments may conflict with the need to ensure security and anonymity, such\n"
+"as limiting certain routing paths, restricting the types of I2NP messages that may\n"
+"be forwarded along various paths, and enforcing certain message expiration times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:273
@@ -6999,11 +6305,9 @@ msgid ""
 "As a part of\n"
 "<a href=\"%(elgamalaes)s\">ElGamal/AES encryption</a>,\n"
 "a garlic message contains a sender\n"
-"specified amount of padding data, allowing the sender to take active "
-"countermeasures \n"
+"specified amount of padding data, allowing the sender to take active countermeasures \n"
 "against traffic analysis.\n"
-"This is not currently used, beyond the requirement to pad to a multiple "
-"of 16 bytes."
+"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:282
@@ -7020,10 +6324,8 @@ msgstr "Referenca"
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:292
 msgid ""
-"The term garlic routing was first coined in Roger Dingledine's Free Haven"
-" \n"
-"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> "
-"(June 2000),\n"
+"The term garlic routing was first coined in Roger Dingledine's Free Haven \n"
+"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> (June 2000),\n"
 "see Section 8.1.1 authored by\n"
 "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>."
 msgstr ""
@@ -7053,8 +6355,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/garlic-routing.html:313
 msgid ""
-"Onion routing was first described in <a href=\"http://www.onion-"
-"router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n"
+"Onion routing was first described in <a href=\"http://www.onion-router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n"
 "by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996."
 msgstr ""
 
@@ -7064,79 +6365,51 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:4
 msgid ""
-"I2P is a project to build, deploy, and maintain a network supporting "
-"secure and anonymous\n"
-"communication. People using I2P are in control of the tradeoffs between "
-"anonymity, reliability,\n"
-"bandwidth usage, and latency. There is no central point in the network on"
-" which pressure can be\n"
-"exerted to compromise the integrity, security, or anonymity of the "
-"system. The network supports\n"
-"dynamic reconfiguration in response to various attacks, and has been "
-"designed to make use of\n"
-"additional resources as they become available. Of course, all aspects of "
-"the network are open and\n"
+"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n"
+"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n"
+"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n"
+"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n"
+"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n"
+"additional resources as they become available. Of course, all aspects of the network are open and\n"
 "freely available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:14
 msgid ""
-"Unlike many other anonymizing networks, I2P doesn't try to provide "
-"anonymity by hiding the\n"
-"originator of some communication and not the recipient, or the other way "
-"around. I2P is designed to\n"
-"allow peers using I2P to communicate with each other anonymously &mdash; "
-"both sender and recipient\n"
-"are unidentifiable to each other as well as to third parties. For "
-"example, today there are both\n"
-"in-I2P web sites (allowing anonymous publishing / hosting) as well as "
-"HTTP proxies to the normal web\n"
-"(allowing anonymous web browsing). Having the ability to run servers "
-"within I2P is essential, as it\n"
-"is quite likely that any outbound proxies to the normal Internet will be "
-"monitored, disabled, or\n"
+"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n"
+"originator of some communication and not the recipient, or the other way around. I2P is designed to\n"
+"allow peers using I2P to communicate with each other anonymously &mdash; both sender and recipient\n"
+"are unidentifiable to each other as well as to third parties. For example, today there are both\n"
+"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n"
+"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n"
+"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n"
 "even taken over to attempt more malicious attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:25
 #, python-format
 msgid ""
-"The network itself is message oriented - it is essentially a secure and "
-"anonymous IP layer, where\n"
-"messages are addressed to cryptographic keys (Destinations) and can be "
-"significantly larger than IP\n"
-"packets. Some example uses of the network include \"I2P Sites\" "
-"(webservers hosting normal web\n"
-"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a "
-"distributed data store. With the\n"
-"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are "
-"able to stream traditional\n"
-"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even "
-"streaming audio. Most people\n"
-"will not use I2P directly, or even need to know they're using it. Instead"
-" their view will be of one\n"
-"of the I2P enabled applications, or perhaps as a little controller app to"
-" turn on and off various\n"
+"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n"
+"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n"
+"packets. Some example uses of the network include \"I2P Sites\" (webservers hosting normal web\n"
+"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n"
+"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are able to stream traditional\n"
+"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n"
+"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n"
+"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n"
 "proxies to enable the anonymizing functionality."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:37
 #, python-format
 msgid ""
-"An essential part of designing, developing, and testing an anonymizing "
-"network is to define the <a\n"
-"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing "
-"as \"true\" anonymity, just\n"
-"increasingly expensive costs to identify someone. Briefly, I2P's intent "
-"is to allow people to\n"
-"communicate in arbitrarily hostile environments by providing good "
-"anonymity, mixed in with\n"
-"sufficient cover traffic provided by the activity of people who require "
-"less anonymity. This way,\n"
-"some users can avoid detection by a very powerful adversary, while others"
-" will try to evade a weaker\n"
-"entity, <i>all on the same network</i>, where each one's messages are "
-"essentially indistinguishable\n"
+"An essential part of designing, developing, and testing an anonymizing network is to define the <a\n"
+"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing as \"true\" anonymity, just\n"
+"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n"
+"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n"
+"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n"
+"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n"
+"entity, <i>all on the same network</i>, where each one's messages are essentially indistinguishable\n"
 "from the others."
 msgstr ""
 
@@ -7147,12 +6420,9 @@ msgstr "Pse?"
 #: i2p2www/pages/site/docs/how/intro.html:49
 #, python-format
 msgid ""
-"There are a multitude of reasons why we need a system to support "
-"anonymous communication, and\n"
-"everyone has their own personal rationale. There are many <a "
-"href=\"%(comparisons)s\">other\n"
-"efforts</a> working on finding ways to provide varying degrees of "
-"anonymity to people through the\n"
+"There are a multitude of reasons why we need a system to support anonymous communication, and\n"
+"everyone has their own personal rationale. There are many <a href=\"%(comparisons)s\">other\n"
+"efforts</a> working on finding ways to provide varying degrees of anonymity to people through the\n"
 "Internet, but we could not find any that met our needs or threat model."
 msgstr ""
 
@@ -7163,23 +6433,14 @@ msgstr "Si?"
 #: i2p2www/pages/site/docs/how/intro.html:58
 #, python-format
 msgid ""
-"The network at a glance is made up of a set of nodes (\"routers\") with a"
-" number of unidirectional\n"
-"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a "
-"href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is "
-"identified by a cryptographic RouterIdentity which is\n"
-"typically long lived. These routers communicate with each other through "
-"existing transport\n"
-"mechanisms (TCP, UDP, etc), passing various messages. Client applications"
-" have their own\n"
-"cryptographic identifier (\"Destination\") which enables it to send and "
-"receive messages. These\n"
-"clients can connect to any router and authorize the temporary allocation "
-"(\"lease\") of some tunnels\n"
-"that will be used for sending and receiving messages through the network."
-" I2P has its own internal\n"
-"<a href=\"%(netdb)s\">network database</a> (using a modification of the "
-"Kademlia algorithm) for\n"
+"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n"
+"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is identified by a cryptographic RouterIdentity which is\n"
+"typically long lived. These routers communicate with each other through existing transport\n"
+"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n"
+"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n"
+"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n"
+"that will be used for sending and receiving messages through the network. I2P has its own internal\n"
+"<a href=\"%(netdb)s\">network database</a> (using a modification of the Kademlia algorithm) for\n"
 "distributing routing and contact information securely."
 msgstr ""
 
@@ -7189,91 +6450,62 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:73
 msgid ""
-"In the above, Alice, Bob, Charlie, and Dave are all running routers with "
-"a single Destination on\n"
-"their local router. They each have a pair of 2-hop inbound tunnels per "
-"destination (labeled 1, 2, 3,\n"
-"4, 5 and 6), and a small subset of each of those router's outbound tunnel"
-" pool is shown with 2-hop\n"
-"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's "
-"outbound tunnels are not\n"
-"shown, nor are the rest of each router's outbound tunnel pool (typically "
-"stocked with a few tunnels\n"
-"at a time). When Alice and Bob talk to each other, Alice sends a message "
-"out one of her (pink)\n"
-"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3"
-" or 4). She knows to send\n"
-"to those tunnels on the correct router by querying the network database, "
-"which is constantly updated\n"
+"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n"
+"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n"
+"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n"
+"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n"
+"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n"
+"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n"
+"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n"
+"to those tunnels on the correct router by querying the network database, which is constantly updated\n"
 "as new leases are authorized and old ones expire."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:85
 #, python-format
 msgid ""
-"If Bob wants to reply to Alice, he simply goes through the same process -"
-" send a message out one of\n"
-"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 "
-"or 2). To make things\n"
-"easier, most messages sent between Alice and Bob are <a "
-"href=\"%(garlicrouting)s\">garlic</a>\n"
-"wrapped, bundling the sender's own current lease information so that the "
-"recipient can reply\n"
-"immediately without having to look in the network database for the "
-"current data."
+"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n"
+"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n"
+"easier, most messages sent between Alice and Bob are <a href=\"%(garlicrouting)s\">garlic</a>\n"
+"wrapped, bundling the sender's own current lease information so that the recipient can reply\n"
+"immediately without having to look in the network database for the current data."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:93
 #, python-format
 msgid ""
-"To deal with a wide range of attacks, I2P is fully distributed with no "
-"centralized resources - and\n"
-"hence there are no directory servers keeping statistics regarding the "
-"performance and reliability of\n"
-"routers within the network. As such, each router must keep and maintain "
-"profiles of various routers\n"
-"and is responsible for selecting appropriate peers to meet the anonymity,"
-" performance, and\n"
-"reliability needs of the users, as described in the <a "
-"href=\"%(peerselection)s\">peer selection</a>\n"
+"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n"
+"hence there are no directory servers keeping statistics regarding the performance and reliability of\n"
+"routers within the network. As such, each router must keep and maintain profiles of various routers\n"
+"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n"
+"reliability needs of the users, as described in the <a href=\"%(peerselection)s\">peer selection</a>\n"
 "page."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:102
 #, python-format
 msgid ""
-"The network itself makes use of a significant number of <a "
-"href=\"%(cryptography)s\">cryptographic\n"
-"techniques and algorithms</a> - a full laundry list includes 2048bit "
-"ElGamal encryption, 256bit AES\n"
-"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, "
-"2048bit Diffie-Hellman\n"
-"negotiated connections with station to station authentication, and <a "
-"href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>."
+"The network itself makes use of a significant number of <a href=\"%(cryptography)s\">cryptographic\n"
+"techniques and algorithms</a> - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n"
+"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n"
+"negotiated connections with station to station authentication, and <a href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:110
 msgid ""
-"Content sent over I2P is encrypted through three layers garlic encryption"
-" (used to verify the\n"
-"delivery of the message to the recipient), tunnel encryption (all "
-"messages passing through a tunnel\n"
-"is encrypted by the tunnel gateway to the tunnel endpoint), and inter "
-"router transport layer\n"
+"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n"
+"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n"
+"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n"
 "encryption (e.g. the TCP transport uses AES256 with ephemeral keys)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:117
 msgid ""
 "End-to-end (I2CP) encryption (client application to\n"
-"server application) was disabled in I2P release 0.6; end-to-end (garlic) "
-"encryption (I2P client router\n"
-"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" "
-"remains. Notice the different use of\n"
-"terms! All data from a to h is end-to-end encrypted, but the I2CP "
-"connection between the I2P router and\n"
-"the applications is not end-to-end encrypted! A and h are the routers of "
-"Alice and Bob, while Alice and\n"
+"server application) was disabled in I2P release 0.6; end-to-end (garlic) encryption (I2P client router\n"
+"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" remains. Notice the different use of\n"
+"terms! All data from a to h is end-to-end encrypted, but the I2CP connection between the I2P router and\n"
+"the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and\n"
 "Bob in following chart are the applications running atop of I2P."
 msgstr ""
 
@@ -7290,32 +6522,22 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:132
 msgid ""
-"The two main mechanisms for allowing people who need strong anonymity to "
-"use the network are\n"
-"explicitly delayed garlic routed messages and more comprehensive tunnels "
-"to include support for\n"
-"pooling and mixing messages. These are currently planned for release 3.0,"
-" but garlic routed messages\n"
-"with no delays and FIFO tunnels are currently in place. Additionally, the"
-" 2.0 release will allow\n"
-"people to set up and operate behind restricted routes (perhaps with "
-"trusted peers), as well as the\n"
+"The two main mechanisms for allowing people who need strong anonymity to use the network are\n"
+"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n"
+"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n"
+"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n"
+"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n"
 "deployment of more flexible and anonymous transports."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:141
 #, python-format
 msgid ""
-"Some questions have been raised with regards to the scalability of I2P, "
-"and reasonably so. There\n"
-"will certainly be more analysis over time, but peer lookup and "
-"integration should be bounded by\n"
-"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network "
-"database</a>'s algorithm, while end\n"
-"to end messages should be <code>O(1)</code> (scale free), since messages "
-"go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no "
-"longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n"
+"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network database</a>'s algorithm, while end\n"
+"to end messages should be <code>O(1)</code> (scale free), since messages go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
 "the network (N) bears no impact."
 msgstr ""
 
@@ -7327,13 +6549,10 @@ msgstr "Kur?"
 #, python-format
 msgid ""
 "I2P initially began in Feb 2003 as a proposed modification to <a\n"
-"href=\"http://freenetproject.org\">Freenet</a> to allow it to use "
-"alternate transports, such as <a\n"
+"href=\"http://freenetproject.org\">Freenet</a> to allow it to use alternate transports, such as <a\n"
 "href=\"%(jms)s\">JMS</a>, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code "
-"being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the"
-" <a href=\"%(roadmap)s\">roadmap</a>."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the <a href=\"%(roadmap)s\">roadmap</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:161
@@ -7343,22 +6562,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/intro.html:162
 #, python-format
 msgid ""
-"We have a small <a href=\"%(team)s\">team</a> spread around several "
-"continents, working to advance\n"
-"different aspects of the project. We are very open to other developers "
-"who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as "
-"critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is "
-"open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix "
-"licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
-"written in Java (1.5+),\n"
-"though some third party applications are being written in Python and "
-"other languages. The code works\n"
-"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual"
-" Machines."
+"We have a small <a href=\"%(team)s\">team</a> spread around several continents, working to advance\n"
+"different aspects of the project. We are very open to other developers who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
+"though some third party applications are being written in Python and other languages. The code works\n"
+"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual Machines."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:173
@@ -7368,12 +6579,9 @@ msgstr "Ku?"
 #: i2p2www/pages/site/docs/how/intro.html:174
 #, python-format
 msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
-"concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
-" currently no\n"
-"scheduled development meetings, however <a href=\"%(meetings)s\">archives"
-" are available</a>."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
+"scheduled development meetings, however <a href=\"%(meetings)s\">archives are available</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/intro.html:180
@@ -7397,39 +6605,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:8
 msgid ""
 "I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (<b>RouterInfos</b>) "
-"and destination contact\n"
-"information (<b>LeaseSets</b>). Each piece of data is signed by the "
-"appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness "
-"information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to "
-"replace\n"
+"just two types of data - router contact information (<b>RouterInfos</b>) and destination contact\n"
+"information (<b>LeaseSets</b>). Each piece of data is signed by the appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
 "older ones, and protection against certain classes of attack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:17
 msgid ""
 "The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains "
-"the distributed database."
+"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:25
 msgid ""
-"When an I2P router wants to contact another router, they need to know "
-"some \n"
-"key pieces of data - all of which are bundled up and signed by the router"
-" into\n"
-"a structure called the \"RouterInfo\", which is distributed with the "
-"SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know some \n"
+"key pieces of data - all of which are bundled up and signed by the router into\n"
+"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
 "as the key. The structure itself contains:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:32
 msgid ""
-"The router's identity (an encryption key, a signing key, and a "
-"certificate)"
+"The router's identity (an encryption key, a signing key, and a certificate)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:33
@@ -7460,8 +6659,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:47
 msgid ""
-"Capabilities flags - used to indicate floodfill participation, "
-"approximate bandwidth, and perceived reachability"
+"Capabilities flags - used to indicate floodfill participation, approximate "
+"bandwidth, and perceived reachability"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:49
@@ -7520,23 +6719,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:76
 msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers "
-"published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
 "and only sent tunnel requests to peers whose uptime was more than 60m"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:82
 msgid ""
 "These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel "
-"through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine "
-"whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine whether\n"
 "the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or "
-"trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging"
-" and network analysis."
+"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging and network analysis."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:102
@@ -7547,13 +6741,11 @@ msgstr "Opsionet Shtesë"
 #, python-format
 msgid ""
 "Additional text options include\n"
-"a small number of statistics about the router's health, which are "
-"aggregated by\n"
+"a small number of statistics about the router's health, which are aggregated by\n"
 "sites such as <a href=\"http://%(stats)s/\">%(stats)s</a>\n"
 "for network performance analysis and debugging.\n"
 "These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such "
-"data\n"
+"such as tunnel build success rates, while balancing the need for such data\n"
 "with the side-effects that could result from revealing this data.\n"
 "Current statistics are limited to:"
 msgstr ""
@@ -7568,18 +6760,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:119
 msgid ""
-"Floodfill routers publish additional data on the number of entries in "
-"their network database."
+"Floodfill routers publish additional data on the number of entries in their "
+"network database."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:123
 msgid ""
 "The data published can be seen in the router's user interface,\n"
 "but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the "
-"published\n"
-"statistics to improve anonymity, and we plan to remove more in future "
-"releases."
+"As the network has matured, we have gradually removed most of the published\n"
+"statistics to improve anonymity, and we plan to remove more in future releases."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:130
@@ -7588,8 +6778,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:132
 msgid ""
-"As of release 0.9.24, routers may declare that they are part of a "
-"\"family\", operated by the same entity.\n"
+"As of release 0.9.24, routers may declare that they are part of a \"family\", operated by the same entity.\n"
 "Multiple routers in the same family will not be used in a single tunnel."
 msgstr ""
 
@@ -7608,16 +6797,15 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:159
 msgid ""
 "RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the "
-"frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
 "with memory or disk usage.\n"
 "In the current implementation, there are the following general policies:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:166
 msgid ""
-"There is no expiration during the first hour of uptime, as the persistent"
-" stored data may be old."
+"There is no expiration during the first hour of uptime, as the persistent "
+"stored data may be old."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:169
@@ -7626,25 +6814,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:172
 msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in"
-" an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 "
-"routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
 "while expiration time with 300 routers is around 30 hours."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:177
 #, python-format
 msgid ""
-"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in "
-"about an hour, as\n"
+"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in about an hour, as\n"
 "the introducer list expires in about that time."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:181
 msgid ""
-"Floodfills use a short expiration time (1 hour) for all local "
-"RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
 "be frequently republished to them."
 msgstr ""
 
@@ -7660,8 +6844,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:192
 msgid ""
-"It may be desirable to persistently store Meta LeaseSets with long "
-"expirations.\n"
+"It may be desirable to persistently store Meta LeaseSets with long expirations.\n"
 "This is implementation-dependent."
 msgstr ""
 
@@ -7675,10 +6858,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:212
 msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
-"documenting\n"
-"a group of <b>tunnel entry points (leases)</b> for a particular client "
-"destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
+"a group of <b>tunnel entry points (leases)</b> for a particular client destination.\n"
 "Each of these leases specify the following information:"
 msgstr ""
 
@@ -7704,8 +6885,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:454
 msgid ""
 "One exception is for Encrypted LeaseSets (LS2), as of release 0.9.38.\n"
-"The SHA256 of the type byte (3) followed by the blinded public key is "
-"used for the DHT key,\n"
+"The SHA256 of the type byte (3) followed by the blinded public key is used for the DHT key,\n"
 "and then rotated as usual."
 msgstr ""
 
@@ -7719,14 +6899,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:239
 msgid ""
-"The destination itself (an encryption key, a signing key and a "
-"certificate)"
+"The destination itself (an encryption key, a signing key and a certificate)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:240
 msgid ""
-"Additional encryption public key: used for end-to-end encryption of "
-"garlic messages"
+"Additional encryption public key: used for end-to-end encryption of garlic "
+"messages"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:241
@@ -7737,8 +6916,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:242
 msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination "
-"published the LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination published "
+"the LeaseSet."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:246
@@ -7769,13 +6948,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:263
 msgid ""
-"A LeaseSet for a destination used only for outgoing connections is "
-"<i>unpublished</i>.\n"
+"A LeaseSet for a destination used only for outgoing connections is <i>unpublished</i>.\n"
 "It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
-"unpublished.\n"
-"Servers will still be able to send messages back to those unpublished "
-"destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
+"Servers will still be able to send messages back to those unpublished destinations,\n"
 "because of <a href=\"#lsp\">I2NP storage messages</a>."
 msgstr ""
 
@@ -7785,24 +6961,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:274
 msgid ""
-"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero "
-"leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet."
-"\n"
-"Revocations are not fully implemented, and it is unclear if they have any"
-" practical use.\n"
-"This is the only planned use for that signing key, so it is currently "
-"unused."
+"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet.\n"
+"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
+"This is the only planned use for that signing key, so it is currently unused."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:283
 msgid ""
 "As of release 0.9.38, floodfills support a new LeaseSet2 structure.\n"
-"This structure is very similar to the old LeaseSet structure, and serves "
-"the same purpose.\n"
+"This structure is very similar to the old LeaseSet structure, and serves the same purpose.\n"
 "The new structure provides the flexibility required to support new\n"
-"encryption types, multiple encryption types, options, offline signing "
-"keys,\n"
+"encryption types, multiple encryption types, options, offline signing keys,\n"
 "and other features.\n"
 "See proposal 123 for details."
 msgstr ""
@@ -7811,15 +6981,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:715
 msgid ""
 "As of release 0.9.38, floodfills support a new Meta LeaseSet structure.\n"
-"This structure provides a tree-like structure in the DHT, to refer to "
-"other LeaseSets.\n"
-"Using Meta LeaseSets, a site may implement large multihomed services, "
-"where several\n"
+"This structure provides a tree-like structure in the DHT, to refer to other LeaseSets.\n"
+"Using Meta LeaseSets, a site may implement large multihomed services, where several\n"
 "different Destinations are used to provide a common service.\n"
 "The entries in a Meta LeaseSet are Destinations or other Meta LeaseSets,\n"
 "and may have long expirations, up to 18.2 hours.\n"
-"Using this facility, it should be possible to run hundreds or thousands "
-"of Destinations hosting a common service.\n"
+"Using this facility, it should be possible to run hundreds or thousands of Destinations hosting a common service.\n"
 "See proposal 123 for details."
 msgstr ""
 
@@ -7837,29 +7004,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:313
 msgid ""
-"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate"
-" key.\n"
-"The leases may only be decoded, and thus the destination may only be "
-"contacted,\n"
+"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate key.\n"
+"The leases may only be decoded, and thus the destination may only be contacted,\n"
 "by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is "
-"encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future "
-"work to\n"
-"research whether the user interface and implementation of encrypted "
-"LeaseSets could be improved."
+"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
+"research whether the user interface and implementation of encrypted LeaseSets could be improved."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:324
 msgid ""
-"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet "
-"structure.\n"
-"The Destination is hidden, and only a blinded public key and an "
-"expiration\n"
+"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet structure.\n"
+"The Destination is hidden, and only a blinded public key and an expiration\n"
 "are visible to the floodfill.\n"
 "Only those that have the full Destination may decrypt the structure.\n"
-"The structure is stored at a DHT location based on the hash of the "
-"blinded public key,\n"
+"The structure is stored at a DHT location based on the hash of the blinded public key,\n"
 "not the hash of the Destination.\n"
 "See proposal 123 for details."
 msgstr ""
@@ -7870,12 +7029,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:336
 msgid ""
-"For regular LeaseSets, the expiration is the time of the latest "
-"expiration of its leases.\n"
-"For the new LeaseSet2 data structures, the expiration is specified in the"
-" header.\n"
-"For LeaseSet2, the expiration should match the latest expiration of its "
-"leases.\n"
+"For regular LeaseSets, the expiration is the time of the latest expiration of its leases.\n"
+"For the new LeaseSet2 data structures, the expiration is specified in the header.\n"
+"For LeaseSet2, the expiration should match the latest expiration of its leases.\n"
 "For EncryptedLeaseSet and MetaLeaseSet, the expiration may vary,\n"
 "and maximum expiration may be enforced, to be determined."
 msgstr ""
@@ -7886,8 +7042,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:346
 msgid ""
-"No persistent storage of LeaseSet data is required, since they expire so "
-"quickly.\n"
+"No persistent storage of LeaseSet data is required, since they expire so quickly.\n"
 "Howewver, persistent storage of EncryptedLeaseSet and MetaLeaseSet data\n"
 "with long expirations may be advisable."
 msgstr ""
@@ -7913,42 +7068,30 @@ msgstr ""
 msgid ""
 "The netDb is decentralized, however you do need at\n"
 "least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the "
-"RouterInfo\n"
-"of an active peer - specifically, by retrieving their "
-"<code>routerInfo-$hash.dat</code>\n"
-"file and storing it in your <code>netDb/</code> directory. Anyone can "
-"provide\n"
-"you with those files - you can even provide them to others by exposing "
-"your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
+"of an active peer - specifically, by retrieving their <code>routerInfo-$hash.dat</code>\n"
+"file and storing it in your <code>netDb/</code> directory. Anyone can provide\n"
+"you with those files - you can even provide them to others by exposing your own\n"
 "netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular "
-"(non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
 "and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches "
-"from\n"
+"When the router starts up for the first time, it automatically fetches from\n"
 "one of these URLs, selected at random."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:379
 msgid ""
-"The floodfill netDb is a simple distributed storage mechanism.  The "
-"storage\n"
-"algorithm is simple: send the data to the closest peer that has "
-"advertised\n"
-"itself as a floodfill router. When the peer in the floodfill netDb "
-"receives a\n"
-"netDb store from a peer not in the floodfill netDb, they send it to a "
-"subset of\n"
-"the floodfill netDb-peers. The peers selected are the ones closest "
-"(according\n"
+"The floodfill netDb is a simple distributed storage mechanism.  The storage\n"
+"algorithm is simple: send the data to the closest peer that has advertised\n"
+"itself as a floodfill router. When the peer in the floodfill netDb receives a\n"
+"netDb store from a peer not in the floodfill netDb, they send it to a subset of\n"
+"the floodfill netDb-peers. The peers selected are the ones closest (according\n"
 "to the <a href=\"#kad\">XOR-metric</a>) to a specific key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:388
 msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed"
-" in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
 "router's published routerInfo as a capability."
 msgstr ""
 
@@ -7978,15 +7121,13 @@ msgid ""
 "Routers with high bandwidth limits (which must be manually configured,\n"
 "as the default is much lower) are presumed to be on lower-latency\n"
 "connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 "
-"KBytes/sec."
+"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:419
 msgid ""
 "In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation "
-"is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
 "automatically enabled."
 msgstr ""
 
@@ -8013,13 +7154,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:441
 msgid ""
-"A floodfill router's only services that are in addition to those of non-"
-"floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
 "are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to "
-"participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to "
-"their distributed database services."
+"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:449
@@ -8028,33 +7166,24 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:450
 msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
-"\n"
-"To create a Kademlia key, the SHA256 hash of the RouterIdentity or "
-"Destination is computed."
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"To create a Kademlia key, the SHA256 hash of the RouterIdentity or Destination is computed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:459
 msgid ""
-"A modification to this algorithm is done to increase the costs of <a href"
-"=\"#sybil-partial\">Sybil attacks</a>.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the "
-"SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented "
-"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight "
-"UTC.\n"
-"Only the search key is modified in this way, not the floodfill router "
-"hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace "
-"rotation\",\n"
+"A modification to this algorithm is done to increase the costs of <a href=\"#sybil-partial\">Sybil attacks</a>.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
+"Only the search key is modified in this way, not the floodfill router hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
 "although it isn't strictly a rotation."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:469
 msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are "
-"only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
 "determination of distance."
 msgstr ""
 
@@ -8069,8 +7198,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:479
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local "
-"RouterInfo are exchanged with peers\n"
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
 "as a part of the initialization of a <a href=\"%(ntcp)s\">NTCP</a>\n"
 "or <a href=\"%(ssu)s\">SSU</a> transport connection."
 msgstr ""
@@ -8082,46 +7210,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:487
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local "
-"LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the "
-"related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an "
-"appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating "
-"Destinations to have published LeaseSets at all."
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:495
 msgid ""
 "The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
 "to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local "
-"database.\n"
-"Even if that floodfill is not actually closest, it will flood it "
-"\"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local database.\n"
+"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
 "sending it to multiple other floodfills.\n"
 "This provides a high degree of fault-tolerance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:504
 msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before"
-" inserting\n"
-"an item in the DHT to the closest target. As the verify operation will "
-"tend to\n"
-"discover closer floodfills if they are present, a router will quickly "
-"improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
-"LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes "
-"necessary,\n"
-"a router may simply do an iterative search for a key with the least "
-"significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the "
-"DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-"
-"distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
+"an item in the DHT to the closest target. As the verify operation will tend to\n"
+"discover closer floodfills if they are present, a router will quickly improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
+"a router may simply do an iterative search for a key with the least significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-distant peer had\n"
 "the netdb item."
 msgstr ""
 
@@ -8132,11 +7246,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:518
 #, python-format
 msgid ""
-"A router publishes its own RouterInfo by directly connecting to a "
-"floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
 "and sending it a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic "
-"encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
 "as this is a direct connection, so there are no intervening routers\n"
 "(and no need to hide this data anyway).\n"
 "The floodfill router replies with a\n"
@@ -8150,8 +7262,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:533
 msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
-"router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
 "must take care that the LeaseSet cannot be associated with the router."
 msgstr ""
 
@@ -8160,10 +7271,8 @@ msgstr ""
 msgid ""
 "A router publishes a local LeaseSet by\n"
 "sending a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that "
-"Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's "
-"Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
 "to hide the message from the tunnel's outbound endpoint.\n"
 "The floodfill router replies with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DeliveryStatusMessage,\n"
@@ -8179,17 +7288,12 @@ msgstr ""
 #, python-format
 msgid ""
 "After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored "
-"in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
 "local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
-"floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the "
-"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the "
-"floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good "
-"knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good knowledge of the\n"
 "DHT \"neighborhood\" for the routing key."
 msgstr ""
 
@@ -8211,17 +7315,15 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:574
 #, python-format
 msgid ""
-"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to "
-"request a netdb entry from a floodfill router.\n"
+"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
 "Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound "
-"exploratory tunnels."
+"The replies are specified to return via one of the router's inbound exploratory tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:580
 msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't "
-"fail) floodfill routers closest to the requested key, in parallel."
+"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
+" floodfill routers closest to the requested key, in parallel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:584
@@ -8229,8 +7331,7 @@ msgstr ""
 msgid ""
 "If the key is found locally by the floodfill router, it responds with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with"
-" a\n"
+"If the key is not found locally by the floodfill router, it responds with a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n"
 "containing a list of other floodfill routers close to the key."
 msgstr ""
@@ -8238,22 +7339,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:592
 msgid ""
 "LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
-"by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
-"encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
 "RouterInfo lookup encryption may be enabled in a future release."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:599
 msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
-" or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
 "will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
-"\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
-" encryption."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:606
@@ -8267,41 +7363,31 @@ msgstr ""
 msgid ""
 "Due to the relatively small size of the network and flooding redundancy,\n"
 "lookups are usually O(1) rather than O(log n).\n"
-"A router is highly likely to know a floodfill router close enough to the "
-"key to get the answer on the first try.\n"
+"A router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
 "In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and"
-"\n"
-"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was "
-"implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and\n"
+"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was implemented.\n"
 "Queries were sent through <i>multiple routes simultaneously</i>\n"
 "to <i>reduce the chance of query failure</i>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:621
 msgid ""
-"As of release 0.8.9, <i>iterative lookups</i> are implemented with no "
-"lookup redundancy.\n"
+"As of release 0.8.9, <i>iterative lookups</i> are implemented with no lookup redundancy.\n"
 "This is a more efficient and reliable lookup that will work much better\n"
 "when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows "
-"only a small\n"
+"limitation to network growth. As the network grows and each router knows only a small\n"
 "subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup"
-" continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious "
-"floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total "
-"lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
 "or the maximum number of peers is queried."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:633
 msgid ""
-"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash "
-"directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally "
-"ignored.\n"
+"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally ignored.\n"
 "Given the current size of the network, a router has\n"
 "<i>detailed knowledge of the neighborhood of the destination ID space</i>."
 msgstr ""
@@ -8313,8 +7399,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:643
 #, python-format
 msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
-"prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
 "the attack described in the paper\n"
 "<a href=\"%(egger2013)s\">Practical Attacks Against the I2P Network</a>.\n"
 "It is not clear if verification can be redesigned to be done safely."
@@ -8322,13 +7407,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:650
 msgid ""
-"To verify a storage was successful, a router simply waits about 10 "
-"seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 seconds,\n"
 "then sends a lookup to another floodfill router close to the key\n"
 "(but not the one the store was sent to).\n"
 "Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the "
-"outbound endpoint(OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:658
@@ -8337,22 +7420,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:659
 msgid ""
-"To verify a storage was successful, a router simply waits about 10 "
-"seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 seconds,\n"
 "then sends a lookup to another floodfill router close to the key\n"
 "(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination "
-"of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
 "To prevent snooping by the OBEP of the outbound tunnel,\n"
 "lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound "
-"tunnels."
+"The replies are specified to return via one of the client's inbound tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:669
 msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
-"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
 "will be encrypted,\n"
 "to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
 msgstr ""
@@ -8364,23 +7443,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:678
 #, python-format
 msgid ""
-"<i>Exploration</i> is a special form of netdb lookup, where a router "
-"attempts to learn about\n"
+"<i>Exploration</i> is a special form of netdb lookup, where a router attempts to learn about\n"
 "new routers.\n"
-"It does this by sending a floodfill router a <a "
-"href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random "
-"key.\n"
+"It does this by sending a floodfill router a <a href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random key.\n"
 "As this lookup will fail, the floodfill would normally respond with a\n"
-"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing "
-"hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already "
-"knows those floodfills,\n"
-"and it would be impractical to add all floodfill routers to the \"don't "
-"include\" field of the DatabaseLookup Message.\n"
+"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
+"and it would be impractical to add all floodfill routers to the \"don't include\" field of the DatabaseLookup Message.\n"
 "For an exploration query, the requesting router sets a special flag in\n"
 "the DatabaseLookup Message.\n"
-"The floodfill will then respond only with non-floodfill routers close to "
-"the requested key."
+"The floodfill will then respond only with non-floodfill routers close to the requested key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:692
@@ -8389,14 +7461,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:693
 msgid ""
-"The response to a lookup request is either a Database Store Message (on "
-"success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' "
-"router hash field\n"
+"The response to a lookup request is either a Database Store Message (on success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
 "to indicate the source of the reply; the DSM does not.\n"
 "The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple "
-"requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
 "difficult to monitor the performance of the various floodfill routers."
 msgstr ""
 
@@ -8406,19 +7475,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:705
 msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using "
-"the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
 "private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the"
-" floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer "
-"requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
-"instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that."
-"\n"
-"The multihoming function has been verified and is in use by several "
-"services on the network."
+"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that.\n"
+"The multihoming function has been verified and is in use by several services on the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:727
@@ -8448,8 +7511,7 @@ msgstr ""
 #, python-format
 msgid ""
 "There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less "
-"impact,\n"
+"Most of the following attacks will become more difficult, or have less impact,\n"
 "as the network size and number of floodfill routers increase."
 msgstr ""
 
@@ -8460,8 +7522,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:748
 #, python-format
 msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
-" routers closest to the key."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
+"routers closest to the key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:753
@@ -8482,8 +7544,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Each router maintains an expanded set of statistics in the\n"
-"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,"
-"\n"
+"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,\n"
 "covering various quality metrics for that peer.\n"
 "The set includes:"
 msgstr ""
@@ -8514,14 +7575,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:775
 msgid ""
-"Each time a router needs to make a determination on which floodfill "
-"router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
 "it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are "
-"relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
 "are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and "
-"avoided,\n"
+"While a completely unresponsive router will quickly be identified and avoided,\n"
 "routers that are only sometimes malicious may be much harder to deal with."
 msgstr ""
 
@@ -8533,8 +7591,7 @@ msgstr ""
 #, python-format
 msgid ""
 "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n"
-"by creating a large number of floodfill routers spread throughout the "
-"keyspace."
+"by creating a large number of floodfill routers spread throughout the keyspace."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:791
@@ -8542,35 +7599,29 @@ msgstr ""
 msgid ""
 "(In a related example, a researcher recently created a\n"
 "<a href=\"%(url)s\">large number of Tor relays</a>.)\n"
-"If successful, this could be an effective DOS attack on the entire "
-"network."
+"If successful, this could be an effective DOS attack on the entire network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:797
 msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as "
-"\"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
 "metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the "
-"suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
 "can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however "
-"none of them is completely satisfactory:"
+"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:805
 msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through"
-" various means\n"
-"(console news, website, forum, etc.); users would have to manually "
-"download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
+"(console news, website, forum, etc.); users would have to manually download the list and\n"
 "add it to their local \"blacklist\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:810
 msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil "
-"with more Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil with "
+"more Sybil)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:811
@@ -8579,8 +7630,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:812
 msgid ""
-"Release a new software version that improves the peer profile metrics and"
-" thresholds,\n"
+"Release a new software version that improves the peer profile metrics and thresholds,\n"
 "in an attempt to automatically identify the \"bad\" peers."
 msgstr ""
 
@@ -8592,12 +7642,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:817
 msgid ""
-"Implement an automatic subscription-based blacklist controlled by a "
-"single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" "
-"model.\n"
-"Unfortunately it would also give a single individual or group the power "
-"to\n"
+"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" model.\n"
+"Unfortunately it would also give a single individual or group the power to\n"
 "block participation of any particular router or IP in the network,\n"
 "or even to completely shutdown or destroy the entire network."
 msgstr ""
@@ -8614,25 +7661,19 @@ msgstr ""
 #, python-format
 msgid ""
 "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n"
-"by creating a small number (8-15) of floodfill routers clustered closely "
-"in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
 "and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed"
-"\n"
+"Then, all lookups and stores for a key in that keyspace would be directed\n"
 "to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular I2P "
-"Site, for example."
+"If successful, this could be an effective DOS attack on a particular I2P Site, for example."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:842
 msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
-"\n"
-"an attacker must use a brute-force method to repeatedly generate router "
-"hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
+"an attacker must use a brute-force method to repeatedly generate router hashes\n"
 "until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent "
-"on network\n"
+"The amount of computational power required for this, which is dependent on network\n"
 "size, is unknown."
 msgstr ""
 
@@ -8640,14 +7681,10 @@ msgstr ""
 msgid ""
 "As a partial defense against this attack,\n"
 "the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
-"\n"
-"we use the Hash of the key appended with the current date string, i.e. "
-"H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which "
-"transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
-"midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
+"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
 "Any partial-keyspace attack would have to be regenerated every day, for\n"
 "after the rotation, the attacking routers would no longer be close\n"
 "to the target key, or to each other."
@@ -8656,8 +7693,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:862
 msgid ""
 "This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not "
-"particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
 "An attacker can precompute numerous router hashes in advance,\n"
 "and only a few routers are sufficient to \"eclipse\" a portion\n"
 "of the keyspace within a half hour after rotation."
@@ -8665,11 +7701,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:870
 msgid ""
-"One consequence of daily keyspace rotation is that the distributed "
-"network database\n"
+"One consequence of daily keyspace rotation is that the distributed network database\n"
 "may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a "
-"store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a store yet.\n"
 "The extent of the issue, and methods for mitigation\n"
 "(for example netdb \"handoffs\" at midnight)\n"
 "are a topic for further study."
@@ -8732,24 +7766,19 @@ msgstr ""
 #, python-format
 msgid ""
 "See also <a href=\"#lookup\">lookup</a>\n"
-"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections "
-"2.2-2.3 for terms below in italics)"
+"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections 2.2-2.3 for terms below in italics)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:926
 msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could"
-" attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their "
-"references."
+"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their references."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:931
 msgid ""
-"This is unlikely to work via exploration, because exploration is a low-"
-"frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel"
-" building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
 "Exploration results are generally limited to a few router hashes,\n"
 "and each exploration query is directed to a random floodfill router."
 msgstr ""
@@ -8761,18 +7790,13 @@ msgid ""
 "For floodfill router references returned in a\n"
 "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n"
 "response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to"
-" the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to the lookup key.\n"
 "The requesting router does not trust that the references are\n"
 "closer to the key (i.e. they are <i>verifiably correct</i>.\n"
-"The lookup also does not stop when no closer key is found, but continues "
-"by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is "
-"reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key "
-"space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a "
-"router info\n"
+"The lookup also does not stop when no closer key is found, but continues by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
 "within the desired key space region.\n"
 "This design ensures that the query capture attack described in\n"
 "<a href=\"%(pdf)s\">Hashing it out in Public</a>\n"
@@ -8810,43 +7834,30 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/network-database.html:973
 #, python-format
 msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
-"by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of "
-"DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network "
-"database lookups are only\n"
-"loosely correlated to the <a href=\"%(peerselection)s\">peer "
-"selection</a> and\n"
-"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only "
-"previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
+"loosely correlated to the <a href=\"%(peerselection)s\">peer selection</a> and\n"
+"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only previously-known peers\n"
 "are used for tunnels.\n"
 "Also, peer selection is unrelated to any notion of DHT key-closeness."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:984
 msgid ""
-"Some of this may actually be more interesting when the I2P network gets "
-"much larger.\n"
-"Right now, each router knows a large proportion of the network, so "
-"looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a "
-"future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, "
-"the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that "
-"much harder."
+"Some of this may actually be more interesting when the I2P network gets much larger.\n"
+"Right now, each router knows a large proportion of the network, so looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that much harder."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/network-database.html:992
 #, python-format
 msgid ""
-"However, the general issue of DHT information leakage in I2P needs "
-"further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather "
-"information.\n"
-"Certainly, at a level of <i>f</i> = 0.2 (20&#37; malicious nodes, as "
-"specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather information.\n"
+"Certainly, at a level of <i>f</i> = 0.2 (20&#37; malicious nodes, as specifed in the paper)\n"
 "we expect that many of the Sybil threats we describe\n"
 "(<a href=\"%(threatmodel)s#sybil\">here</a>,\n"
 "<a href=\"#sybil\">here</a> and\n"
@@ -8881,11 +7892,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:10
 #, python-format
 msgid ""
-"<b>Peer profiling</b> is the process of collecting data based on the "
-"<b>observed</b> performance\n"
+"<b>Peer profiling</b> is the process of collecting data based on the <b>observed</b> performance\n"
 "of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does <b>not</b> use any claimed performance data published by "
-"the peer itself\n"
+"Profiling does <b>not</b> use any claimed performance data published by the peer itself\n"
 "in the <a href=\"%(netdb)s\">network database</a>."
 msgstr ""
 
@@ -8900,8 +7909,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:20
 #, python-format
 msgid ""
-"Choosing peers from the set of floodfill routers to use for network "
-"database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
 "which is discussed on the <a href=\"%(netdb)s\">network database</a> page"
 msgstr ""
 
@@ -8914,11 +7922,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:28
 msgid ""
 "<b>Peer selection</b> is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers "
-"will we \n"
+"on the network we want to relay our messages to go through (which peers will we \n"
 "ask to join our tunnels).  To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how"
-" \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how \n"
 "fast they are, how often they will be able to accept our requests, and \n"
 "whether they seem to be overloaded or otherwise unable to perform what\n"
 "they agree to reliably."
@@ -8928,8 +7934,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is <b>only</b> used to avoid those "
-"peers\n"
+"claimed bandwidth is untrusted and is <b>only</b> used to avoid those peers\n"
 "advertising very low bandwidth insufficient for routing tunnels.\n"
 "All peer selection is done through profiling.\n"
 "This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -8941,10 +7946,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:50
 msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large"
-" number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
-"minutes."
+"Peer selection is done quite frequently, as a router may maintain a large number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:56
@@ -8955,11 +7958,9 @@ msgstr ""
 #, python-format
 msgid ""
 "For more information see the paper\n"
-"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous "
-"Network</a>\n"
+"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>\n"
 "presented at <a href=\"%(url)s\">PET-CON 2009.1</a>.\n"
-"See <a href=\"#notes\">below</a> for notes on minor changes since the "
-"paper was published."
+"See <a href=\"#notes\">below</a> for notes on minor changes since the paper was published."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:65
@@ -8969,30 +7970,21 @@ msgstr "Profile"
 #: i2p2www/pages/site/docs/how/peer-selection.html:66
 #, python-format
 msgid ""
-"Each peer has a set of data points collected about them, including "
-"statistics \n"
-"about how long it takes for them to reply to a network database query, "
-"how \n"
-"often their tunnels fail, and how many new peers they are able to "
-"introduce \n"
-"us to, as well as simple data points such as when we last heard from them"
-" or\n"
-"when the last communication error occurred.  The specific data points "
-"gathered\n"
+"Each peer has a set of data points collected about them, including statistics \n"
+"about how long it takes for them to reply to a network database query, how \n"
+"often their tunnels fail, and how many new peers they are able to introduce \n"
+"us to, as well as simple data points such as when we last heard from them or\n"
+"when the last communication error occurred.  The specific data points gathered\n"
 "can be found in the <a href=\"%(url)s\">code</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:75
 msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile"
-" expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
 "lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written "
-"to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all"
-" profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after "
-"startup."
+"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after startup."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:85
@@ -9002,10 +7994,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:86
 msgid ""
 "While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary "
-"down \n"
-"into four simple values, representing the peer's speed, its capacity, how"
-" well \n"
+"performance, to allow for effective peer selection we break each summary down \n"
+"into four simple values, representing the peer's speed, its capacity, how well \n"
 "integrated into the network it is, and whether it is failing."
 msgstr ""
 
@@ -9017,8 +8007,7 @@ msgstr "Shpejtësi"
 msgid ""
 "The speed calculation\n"
 "simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute.  For "
-"this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute.  For this estimate it just looks at\n"
 "performance in the previous minute."
 msgstr ""
 
@@ -9030,13 +8019,11 @@ msgstr ""
 msgid ""
 "The capacity calculation\n"
 "simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period.  For this "
-"estimate it looks at \n"
+"would agree to participate in over a given time period.  For this estimate it looks at \n"
 "how many tunnel build requests\n"
 "the peer has accepted, rejected, and dropped, and how many\n"
 "of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts "
-"more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
 "statistics up to 48 hours old may be included."
 msgstr ""
 
@@ -9044,10 +8031,8 @@ msgstr ""
 msgid ""
 "Recognizing and avoiding unreliable and unreachable\n"
 "peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the "
-"participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build "
-"request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
 "The router assigns a probability of failure to each of the\n"
 "peers, and uses that probability in the capacity calculation.\n"
 "Drops and test failures are weighted much higher than rejections."
@@ -9059,10 +8044,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:124
 msgid ""
-"As mentioned above, we drill through each peer's profile to come up with "
-"a \n"
-"few key calculations, and based upon those, we organize each peer into "
-"three\n"
+"As mentioned above, we drill through each peer's profile to come up with a \n"
+"few key calculations, and based upon those, we organize each peer into three\n"
 "groups - fast, high capacity, and standard."
 msgstr ""
 
@@ -9072,15 +8055,13 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:134
 msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets "
-"or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
 "exceeds the median of all peers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:138
 msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and "
-"their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
 "speed calculation meets or exceeds the median of all peers."
 msgstr ""
 
@@ -9106,25 +8087,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/peer-selection.html:156
 msgid ""
 "The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are "
-"placed in the group."
+"If there would be more, only the ones with the highest speed rating are placed in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:160
 msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)"
-"\n"
-"If there would be more, only the ones with the highest capacity rating "
-"are placed in the group."
+"The high capacity group is limited to 75 peers (including the fast group)\n"
+"If there would be more, only the ones with the highest capacity rating are placed in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:164
 msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the "
-"number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
 "stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 "
-"RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
 "(including those in the fast and high capacity groups)"
 msgstr ""
 
@@ -9140,16 +8116,15 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:177
 msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\""
-" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
 "at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through"
-" them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
 "which reinforces their presence in the group."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid "The router selects peers from the above groups to build tunnels through."
+msgid ""
+"The router selects peers from the above groups to build tunnels through."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:193
@@ -9158,19 +8133,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:194
 msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies"
-" and web servers."
+"Client tunnels are used for application traffic, such as for HTTP proxies "
+"and web servers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:198
 msgid ""
-"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog"
-"/one-cell-enough\">some attacks</a>,\n"
+"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog/one-cell-enough\">some attacks</a>,\n"
 "and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest "
-"group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants"
-" in a tunnel for the same client."
+"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:206
@@ -9179,35 +8151,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:207
 msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as "
-"network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
 "and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected "
-"routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
 "they are called \"exploratory\".\n"
 "These tunnels are usually low-bandwidth."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:215
 msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from"
-" the standard group.\n"
-"If the success rate of these build attempts is low compared to the client"
-" tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high"
-" capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network "
-"performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants"
-" in an exploratory tunnel."
+"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
+"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:223
 msgid ""
-"As the standard group includes a very large subset of all peers the "
-"router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of "
-"all peers,\n"
+"As the standard group includes a very large subset of all peers the router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of all peers,\n"
 "until the build success rate becomes too low."
 msgstr ""
 
@@ -9217,8 +8180,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:232
 msgid ""
-"To prevent some simple attacks, and for performance, there are the "
-"following restrictions:"
+"To prevent some simple attacks, and for performance, there are the following"
+" restrictions:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:236
@@ -9227,8 +8190,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:239
 msgid ""
-"A peer may participate in a maximum of 33&#37; of all tunnels created by "
-"the router."
+"A peer may participate in a maximum of 33&#37; of all tunnels created by the"
+" router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:242
@@ -9249,18 +8212,18 @@ msgid ""
 "Peers are ordered within tunnels to\n"
 "to deal with the <a href=\"%(pdf)s\">predecessor attack</a>\n"
 "<a href=\"%(pdf2008)s\">(2008 update)</a>.\n"
-"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel "
-"page</a>."
+"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid "Continue to analyze an tune speed and capacity calculations as necessary"
+msgid ""
+"Continue to analyze an tune speed and capacity calculations as necessary"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:271
 msgid ""
-"Implement a more aggressive ejection strategy if necessary to control "
-"memory usage as the network grows"
+"Implement a more aggressive ejection strategy if necessary to control memory"
+" usage as the network grows"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:274
@@ -9275,10 +8238,8 @@ msgstr ""
 #, python-format
 msgid ""
 "For those reading the paper\n"
-"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous "
-"Network</a>,\n"
-"please keep in mind the following minor changes in I2P since the paper's "
-"publication:"
+"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>,\n"
+"please keep in mind the following minor changes in I2P since the paper's publication:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/peer-selection.html:289
@@ -9344,24 +8305,18 @@ msgstr "Kriptografi"
 #: i2p2www/pages/site/docs/how/tech-intro.html:21
 msgid ""
 "I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security "
-"conscious \n"
-"applications can operate. Each of these applications may make their own "
-"anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper "
-"implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the "
-"larger \n"
+"network layer, upon which any number of different anonymity or security conscious \n"
+"applications can operate. Each of these applications may make their own anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the larger \n"
 "anonymity set of users already running on top of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:30
 msgid ""
-"Applications available already provide the full range of typical Internet"
-" activities -\n"
+"Applications available already provide the full range of typical Internet activities -\n"
 "<b>anonymous</b> web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other "
-"applications under development."
+"blogging and content syndication, newsgroups, as well as several other applications under development."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:36
@@ -9374,29 +8329,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:38
 msgid ""
-"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a "
-"href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n"
-"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a "
-"href=\"#app.i2pbt\">I2P-bt</a>\n"
+"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n"
+"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a href=\"#app.i2pbt\">I2P-bt</a>\n"
 "and others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:43
 msgid ""
-"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a href=\"#app.i2pbote"
-"\">I2P-Bote</a>."
+"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a "
+"href=\"#app.i2pbote\">I2P-Bote</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:44
 msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software "
-"<a href=\"#app.syndie\">Syndie</a>."
+"Blog: using e.g. the pebble plugin or the distributed blogging software <a "
+"href=\"#app.syndie\">Syndie</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:45
 msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
-"cloud over I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
+"over I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:46
@@ -9405,77 +8358,47 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:49
 msgid ""
-"Unlike web sites hosted within content distribution networks like <a "
-"href=\"#similar.freenet\">Freenet</a> \n"
-"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services "
-"hosted on \n"
-"I2P are fully interactive - there are traditional web-style search "
-"engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and "
-"bridges \n"
-"to query static systems like Freenet without needing to install it "
-"locally."
+"Unlike web sites hosted within content distribution networks like <a href=\"#similar.freenet\">Freenet</a> \n"
+"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services hosted on \n"
+"I2P are fully interactive - there are traditional web-style search engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
+"to query static systems like Freenet without needing to install it locally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:57
 msgid ""
 "With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to "
-"send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes"
-" care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a"
-" \n"
-"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's "
-"anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, "
-"transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high "
-"bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS "
-"proxies \n"
-"available to tie existing applications into the network, their value has "
-"been \n"
-"limited as nearly every application routinely exposes what, in an "
-"anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully "
-"audit \n"
-"an application to ensure proper operation and to assist in that we "
-"provide \n"
-"a series of APIs in various languages which can be used to make the most "
-"out \n"
+"of the message oriented middleware - applications say that they want to send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a \n"
+"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS proxies \n"
+"available to tie existing applications into the network, their value has been \n"
+"limited as nearly every application routinely exposes what, in an anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully audit \n"
+"an application to ensure proper operation and to assist in that we provide \n"
+"a series of APIs in various languages which can be used to make the most out \n"
 "of the network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:74
 #, python-format
 msgid ""
-"I2P is not a research project - academic, commercial, or governmental, "
-"but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to "
-"provide \n"
-"a sufficient level of anonymity to those who need it. It has been in "
-"active \n"
-"development since early 2003 with one full time developer and a dedicated"
-" \n"
-"group of part time contributors from all over the world. All of the work "
-"done \n"
-"on I2P is open source and freely available on the <a "
-"href=\"%(site)s\">website</a>, \n"
-"with the majority of the code released outright into the public domain, "
-"though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The "
-"people \n"
-"working on I2P do not control what people release client applications "
-"under, \n"
-"and there are several GPL'ed applications available (<a "
-"href=\"#app.i2ptunnel\">I2PTunnel</a>, \n"
-"<a href=\"#app.i2pmail\">susimail</a>, <a "
-"href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-"
-"Bote</a>, \n"
+"I2P is not a research project - academic, commercial, or governmental, but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
+"a sufficient level of anonymity to those who need it. It has been in active \n"
+"development since early 2003 with one full time developer and a dedicated \n"
+"group of part time contributors from all over the world. All of the work done \n"
+"on I2P is open source and freely available on the <a href=\"%(site)s\">website</a>, \n"
+"with the majority of the code released outright into the public domain, though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The people \n"
+"working on I2P do not control what people release client applications under, \n"
+"and there are several GPL'ed applications available (<a href=\"#app.i2ptunnel\">I2PTunnel</a>, \n"
+"<a href=\"#app.i2pmail\">susimail</a>, <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-Bote</a>, \n"
 "<a href=\"#app.i2phex\">I2Phex</a> and others.).\n"
-"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from "
-"donations,\n"
+"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from donations,\n"
 "and does not receive any tax breaks in any jurisdiction at this time,\n"
 "as many of the developers are themselves anonymous."
 msgstr ""
@@ -9486,40 +8409,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:94
 msgid ""
-"To understand I2P's operation, it is essential to understand a few key "
-"concepts. \n"
-"First, I2P makes a strict separation between the software participating "
-"in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
-" associated \n"
-"with individual applications. The fact that someone is running I2P is not"
-" \n"
-"usually a secret. What is hidden is information on what the user is "
-"doing, \n"
-"if anything at all, as well as what router a particular destination is "
-"connected \n"
-"to. End users will typically have several local destinations on their "
-"router \n"
-"- for instance, one proxying in to IRC servers, another supporting the "
-"user's \n"
-"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, "
-"another for \n"
+"To understand I2P's operation, it is essential to understand a few key concepts. \n"
+"First, I2P makes a strict separation between the software participating in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
+"with individual applications. The fact that someone is running I2P is not \n"
+"usually a secret. What is hidden is information on what the user is doing, \n"
+"if anything at all, as well as what router a particular destination is connected \n"
+"to. End users will typically have several local destinations on their router \n"
+"- for instance, one proxying in to IRC servers, another supporting the user's \n"
+"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, another for \n"
 "torrents, etc."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:107
 msgid ""
 "Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of "
-"routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a "
-"single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
 "The decrypted information contains the IP of the next router, along with\n"
 "the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as "
-"\"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages "
-"back,\n"
+"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages back,\n"
 "another tunnel is required."
 msgstr ""
 
@@ -9539,15 +8449,12 @@ msgid ""
 "while <b>\"inbound\" tunnels</b> bring messages to the tunnel creator.\n"
 "Combining these two tunnels allows users to send messages to each other.\n"
 "The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound "
-"tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user"
-"\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user\n"
 "and will send them on until the endpoint (\"Bob\").\n"
 "The endpoint of the outbound tunnel will need to send the message\n"
 "on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted "
-"message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
 "Once the endpoint of the outbound tunnel decrypts the message,\n"
 "it will have instructions to forward the message to the correct\n"
 "inbound gateway (the gateway to \"Bob\")."
@@ -9555,25 +8462,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:140
 msgid ""
-"A third critical concept to understand is I2P's <b>\"network "
-"database\"</b> (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of "
-"metadata \n"
-"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the "
-"routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, "
-"transport \n"
-"addresses, etc), while the leaseSet gives routers the information "
-"necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of "
-"\"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a "
-"specific destination.\n"
+"A third critical concept to understand is I2P's <b>\"network database\"</b> (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of metadata \n"
+"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, transport \n"
+"addresses, etc), while the leaseSet gives routers the information necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
 "The full information contained in a lease:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:151
-msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
+msgid ""
+"Inbound gateway for a tunnel that allows reaching a specific destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:152
@@ -9588,10 +8489,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:155
 msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while "
-"leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router "
-"with his leaseSets)."
+"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:160
@@ -9602,13 +8501,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:164
 msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in "
-"the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
 "This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the "
-"construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has"
-" been constructed."
+"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has been constructed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:171
@@ -9625,30 +8521,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:178
 msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the"
-" \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
-"gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it "
-"with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on"
-" \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
-"endpoint \n"
-"receives those instructions, it forwards the message as requested, and "
-"when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
-" \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, "
-"she \n"
-"needs to transmit her own destination explicitly as part of the message "
-"itself.\n"
-"This can be done by introducing a higher-level layer, which is done in "
-"the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
+"receives those instructions, it forwards the message as requested, and when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
+"needs to transmit her own destination explicitly as part of the message itself.\n"
+"This can be done by introducing a higher-level layer, which is done in the\n"
 "<a href=\"#app.streaming\">streaming</a> library.\n"
 "Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
-"lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
 "for it when he wants to reply, but this is optional."
 msgstr ""
 
@@ -9666,208 +8551,126 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:200
 msgid ""
-"While the tunnels themselves have layered encryption to prevent "
-"unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself "
-"does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is "
-"necessary \n"
-"to add an additional end to end layer of encryption to hide the message "
-"from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a "
-"href=\"#op.garlic\">garlic \n"
-"encryption</a>\" lets Alice's router wrap up multiple messages into a "
-"single \n"
-"\"garlic message\", encrypted to a particular public key so that "
-"intermediary \n"
-"peers cannot determine either how many messages are within the garlic, "
-"what \n"
-"those messages say, or where those individual cloves are destined. For "
-"typical \n"
-"end to end communication between Alice and Bob, the garlic will be "
-"encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be"
-" \n"
+"While the tunnels themselves have layered encryption to prevent unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
+"to add an additional end to end layer of encryption to hide the message from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a href=\"#op.garlic\">garlic \n"
+"encryption</a>\" lets Alice's router wrap up multiple messages into a single \n"
+"\"garlic message\", encrypted to a particular public key so that intermediary \n"
+"peers cannot determine either how many messages are within the garlic, what \n"
+"those messages say, or where those individual cloves are destined. For typical \n"
+"end to end communication between Alice and Bob, the garlic will be encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be \n"
 "encrypted without giving out the public key to Bob's own router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:215
 msgid ""
-"Another important fact to keep in mind is that I2P is entirely message "
-"based \n"
-"and that some messages may be lost along the way. Applications using I2P "
-"can \n"
-"use the message oriented interfaces and take care of their own congestion"
-" \n"
-"control and reliability needs, but most would be best served by reusing "
-"the \n"
-"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as "
-"a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message based \n"
+"and that some messages may be lost along the way. Applications using I2P can \n"
+"use the message oriented interfaces and take care of their own congestion \n"
+"control and reliability needs, but most would be best served by reusing the \n"
+"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n"
 "based network."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:225
 msgid ""
 "Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually "
-"preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that "
-"preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel "
-"participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate "
-"before \n"
-"forward it on to the next peer. Eventually, the message arrives at the "
-"endpoint \n"
-"where the messages are split out again and forwarded on as requested. The"
-" \n"
-"difference arises in what the tunnel's creator does - for inbound "
-"tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers "
-"added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-"
-"decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption "
-"are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate before \n"
+"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
+"where the messages are split out again and forwarded on as requested. The \n"
+"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption are \n"
 "added, the message arrives in the clear at the tunnel endpoint."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:240
 msgid ""
-"The choice of specific peers to pass on messages as well as their "
-"particular \n"
-"ordering is important to understanding both I2P's anonymity and "
-"performance \n"
-"characteristics. While the network database (below) has its own criteria "
-"for \n"
-"picking what peers to query and store entries on, tunnel creators may use"
-" any peers \n"
-"in the network in any order (and even any number of times) in a single "
-"tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and "
-"ordering \n"
-"would be driven by the particular needs of the client in tandem with "
-"their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to "
-"gather \n"
-"anonymously, and depending upon untrusted peers to provide this "
-"information \n"
+"The choice of specific peers to pass on messages as well as their particular \n"
+"ordering is important to understanding both I2P's anonymity and performance \n"
+"characteristics. While the network database (below) has its own criteria for \n"
+"picking what peers to query and store entries on, tunnel creators may use any peers \n"
+"in the network in any order (and even any number of times) in a single tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and ordering \n"
+"would be driven by the particular needs of the client in tandem with their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
+"anonymously, and depending upon untrusted peers to provide this information \n"
 "has its own serious anonymity implications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:253
 msgid ""
-"From an anonymity perspective, the simplest technique would be to pick "
-"peers \n"
-"randomly from the entire network, order them randomly and use those peers"
-" \n"
-"in that order for all eternity. From a performance perspective, the "
-"simplest \n"
-"technique would be to pick the fastest peers with the necessary spare "
-"capacity, \n"
-"spreading the load across different peers to handle transparent failover,"
-" \n"
-"and to rebuild the tunnel whenever capacity information changes. While "
-"the \n"
-"former is both brittle and inefficient, the later requires inaccessible "
-"information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a "
-"range \n"
-"of peer selection strategies, coupled with anonymity aware measurement "
-"code \n"
+"From an anonymity perspective, the simplest technique would be to pick peers \n"
+"randomly from the entire network, order them randomly and use those peers \n"
+"in that order for all eternity. From a performance perspective, the simplest \n"
+"technique would be to pick the fastest peers with the necessary spare capacity, \n"
+"spreading the load across different peers to handle transparent failover, \n"
+"and to rebuild the tunnel whenever capacity information changes. While the \n"
+"former is both brittle and inefficient, the later requires inaccessible information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a range \n"
+"of peer selection strategies, coupled with anonymity aware measurement code \n"
 "to organize the peers by their profiles."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:266
 msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts"
-" \n"
-"with by measuring their indirect behavior - for instance, when a peer "
-"responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
-"the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and "
-"outbound) \n"
-"through which the request and response passed, as well as the queried "
-"peer's \n"
-"profile. Direct measurement, such as transport layer latency or "
-"congestion, \n"
-"is not used as part of the profile, as it can be manipulated and "
-"associated \n"
-"with the measuring router, exposing them to trivial attacks. While "
-"gathering \n"
-"these profiles, a series of calculations are run on each to summarize its"
-" \n"
-"performance - its latency, capacity to handle lots of activity, whether "
-"they \n"
-"are currently overloaded, and how well integrated into the network they "
-"seem \n"
-"to be. These calculations are then compared for active peers to organize "
-"the \n"
-"routers into four tiers - fast and high capacity, high capacity, not "
-"failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, "
-"and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts \n"
+"with by measuring their indirect behavior - for instance, when a peer responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
+"through which the request and response passed, as well as the queried peer's \n"
+"profile. Direct measurement, such as transport layer latency or congestion, \n"
+"is not used as part of the profile, as it can be manipulated and associated \n"
+"with the measuring router, exposing them to trivial attacks. While gathering \n"
+"these profiles, a series of calculations are run on each to summarize its \n"
+"performance - its latency, capacity to handle lots of activity, whether they \n"
+"are currently overloaded, and how well integrated into the network they seem \n"
+"to be. These calculations are then compared for active peers to organize the \n"
+"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, and \n"
 "while they currently use fairly simple algorithms, alternatives exist."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:284
 msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy "
-"is to\n"
-"pick peers randomly from the top tier (fast and high capacity), and this "
-"is\n"
-"currently deployed for client tunnels. Exploratory tunnels (used for "
-"netDb and\n"
-"tunnel management) pick peers randomly from the \"not failing\" tier "
-"(which\n"
+"Using this profile data, the simplest reasonable peer selection strategy is to\n"
+"pick peers randomly from the top tier (fast and high capacity), and this is\n"
+"currently deployed for client tunnels. Exploratory tunnels (used for netDb and\n"
+"tunnel management) pick peers randomly from the \"not failing\" tier (which\n"
 "includes routers in 'better' tiers as well), allowing the peer to sample\n"
-"routers more widely, in effect optimizing the peer selection through "
-"randomized\n"
-"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill "
-"climbing</a>. These\n"
+"routers more widely, in effect optimizing the peer selection through randomized\n"
+"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill climbing</a>. These\n"
 "strategies alone do however leak information regarding the peers in the\n"
-"router's top tier through predecessor and netDb harvesting attacks. In "
-"turn,\n"
-"several alternatives exist which, while not balancing the load as evenly,"
-" will\n"
+"router's top tier through predecessor and netDb harvesting attacks. In turn,\n"
+"several alternatives exist which, while not balancing the load as evenly, will\n"
 "address the attacks mounted by particular classes of adversaries."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:298
 msgid ""
-"By picking a random key and ordering the peers according to their XOR "
-"distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting "
-"attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple"
-" \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the "
-"inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
-"deal \n"
-"with predecessor attacks for adversaries which the client contacts, the "
-"outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to "
-"fix \n"
-"on the most exposed point would of course need to have a limit to the "
-"duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted "
-"or \n"
-"proactively avoided to mimic a measured mean time between failures of "
-"other \n"
-"routers. These two strategies can in turn be combined, using a fixed "
-"exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more "
-"rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, "
-"only \n"
-"using individual peers if all of them agree to participate in the same "
-"way \n"
-"each time. This varies from the XOR based ordering in that the "
-"predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes "
-"sure \n"
+"By picking a random key and ordering the peers according to their XOR distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
+"with predecessor attacks for adversaries which the client contacts, the outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
+"on the most exposed point would of course need to have a limit to the duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted or \n"
+"proactively avoided to mimic a measured mean time between failures of other \n"
+"routers. These two strategies can in turn be combined, using a fixed exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
+"using individual peers if all of them agree to participate in the same way \n"
+"each time. This varies from the XOR based ordering in that the predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes sure \n"
 "their order doesn't change."
 msgstr ""
 
@@ -9876,10 +8679,8 @@ msgstr ""
 msgid ""
 "As mentioned before, I2P currently (release 0.8) includes the tiered \n"
 "random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, "
-"management, \n"
-"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel "
-"spec</a>."
+"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
+"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:326
@@ -9893,27 +8694,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:332
 msgid ""
 "A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast "
-"enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing "
-"floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
 "drops too low."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:339
 #, python-format
 msgid ""
-"Other I2P routers will store their data and lookup data by sending simple"
-" 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the "
-"information to other floodfill routers\n"
-"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia "
-"algorithm</a>.\n"
-"The 'lookup' queries currently function differently, to avoid an "
-"important\n"
+"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
+"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algorithm</a>.\n"
+"The 'lookup' queries currently function differently, to avoid an important\n"
 "<a href=\"%(netdb)s#lookup\">security issue</a>.\n"
-"When a lookup is done, the floodfill router will not forward the lookup "
-"to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
 "but will always answer by itself (if it has the requested data)."
 msgstr ""
 
@@ -9923,8 +8717,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:353
 msgid ""
-"A <b>RouterInfo</b> stores information on a specific I2P router and how "
-"to contact it"
+"A <b>RouterInfo</b> stores information on a specific I2P router and how to "
+"contact it"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:354
@@ -9935,14 +8729,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:356
 msgid ""
-"All of this information is signed by the publishing party and verified by"
-" any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of "
-"old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the "
-"correct time, occasionally querying some SNTP servers \n"
-"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by"
-" default)\n"
+"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
+"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n"
 "and detecting skew between routers at the transport layer."
 msgstr ""
 
@@ -9957,10 +8747,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:370
 msgid ""
 "One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will"
-" however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
-" decoded by people with access to the decryption key."
+"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:377
@@ -9969,13 +8757,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:378
 msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive"
-" a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
 "it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to "
-"make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo "
-"files and bootstrap."
+"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:386
@@ -9985,26 +8770,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:387
 msgid ""
 "Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very "
-"large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will"
-" be present\n"
-"on each netDb router. This will cause a deterioration of the percentage "
-"of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next "
-"releases."
+"Currently, this is not a major problem, since the network is not very large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
+"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next releases."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:398
 msgid ""
-"Communication between routers needs to provide confidentiality and "
-"integrity \n"
-"against external adversaries while authenticating that the router "
-"contacted \n"
-"is the one who should receive a given message. The particulars of how "
-"routers \n"
-"communicate with other routers aren't critical - three separate protocols"
-" \n"
+"Communication between routers needs to provide confidentiality and integrity \n"
+"against external adversaries while authenticating that the router contacted \n"
+"is the one who should receive a given message. The particulars of how routers \n"
+"communicate with other routers aren't critical - three separate protocols \n"
 "have been used at different points to provide those bare necessities."
 msgstr ""
 
@@ -10012,12 +8789,9 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree "
-"communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved"
-" \n"
-"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - "
-"\"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved \n"
+"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n"
 "Semireliable UDP\", or \"SSU\"."
 msgstr ""
 
@@ -10029,46 +8803,32 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:418
 msgid ""
 "The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal "
-"amount \n"
-"of data easily discernible to third parties. It should support high "
-"degree \n"
-"communication as well as TCP-friendly congestion control and may include"
-" \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at "
-"rates \n"
-"sufficient for home users. In addition, it should support techniques for "
-"addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal amount \n"
+"of data easily discernible to third parties. It should support high degree \n"
+"communication as well as TCP-friendly congestion control and may include \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
+"sufficient for home users. In addition, it should support techniques for addressing \n"
 "network obstacles, like most NATs or firewalls."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:428
 #, python-format
 msgid ""
-"Following the introduction of SSU, after issues with congestion collapse"
-" \n"
-"appeared, a new NIO-based TCP transport called <a "
-"href=\"%(ntcp)s\">NTCP</a> \n"
-"was implemented. It is enabled by default for outbound connections only. "
-"Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify"
-" \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
-"inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
-" \n"
+"Following the introduction of SSU, after issues with congestion collapse \n"
+"appeared, a new NIO-based TCP transport called <a href=\"%(ntcp)s\">NTCP</a> \n"
+"was implemented. It is enabled by default for outbound connections only. Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
 "per connection issues of the old TCP transport."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:438
 msgid ""
 "I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids"
-" for \n"
-"the connection and the relative value of these bids assigns the priority."
-" \n"
-"Transports may reply with different bids, depending on whether there is "
-"already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids for \n"
+"the connection and the relative value of these bids assigns the priority. \n"
+"Transports may reply with different bids, depending on whether there is already \n"
 "an established connection to the peer."
 msgstr ""
 
@@ -10076,38 +8836,25 @@ msgstr ""
 #, python-format
 msgid ""
 "The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both "
-"outbound \n"
-"and inbound connections. Your firewall and your I2P router must be "
-"configured \n"
-"to allow inbound NTCP connections. For further information see the <a "
-"href=\"%(ntcp)s\">NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both outbound \n"
+"and inbound connections. Your firewall and your I2P router must be configured \n"
+"to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n"
 "page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:455
 msgid ""
 "A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the "
-"lowest \n"
-"level, inter router communication is protected by the transport layer "
-"security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
-"MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
-"2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other"
-" \n"
-"router's DSA key, plus each network message has their own hash for local "
-"integrity \n"
-"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the "
-"transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and "
-"verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other "
-"messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with "
-"ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
+"level, inter router communication is protected by the transport layer security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other \n"
+"router's DSA key, plus each network message has their own hash for local integrity \n"
+"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
 "(explained below)."
 msgstr ""
 
@@ -10117,51 +8864,31 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:471
 msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, "
-"allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully "
-"formed \n"
-"messages alongside their own instructions for delivery. Messages are "
-"wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in "
-"cleartext \n"
-"through a peer who should not have access to the information - for "
-"instance, \n"
-"when a router wants to ask another router to participate in a tunnel, "
-"they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving "
-"router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another "
-"example \n"
-"is when a client wants to send a message to a destination - the sender's "
-"router \n"
-"will wrap up that data message (alongside some other messages) into a "
-"garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the "
-"recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
+"messages alongside their own instructions for delivery. Messages are wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in cleartext \n"
+"through a peer who should not have access to the information - for instance, \n"
+"when a router wants to ask another router to participate in a tunnel, they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
+"is when a client wants to send a message to a destination - the sender's router \n"
+"will wrap up that data message (alongside some other messages) into a garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
 "leaseSet, and forward it through the appropriate tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:486
 msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer "
-"includes \n"
-"the ability to request that the clove be forwarded locally, to a remote "
-"router, \n"
-"or to a remote tunnel on a remote router. There are fields in those "
-"instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain "
-"time \n"
-"or condition has been met, though they won't be honored until the <a "
-"href=\"#future.variablelatency\">nontrivial \n"
-"delays</a> are deployed. It is possible to explicitly route garlic "
-"messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel "
-"messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops "
-"prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques "
-"are \n"
+"The \"instructions\" attached to each clove inside the encryption layer includes \n"
+"the ability to request that the clove be forwarded locally, to a remote router, \n"
+"or to a remote tunnel on a remote router. There are fields in those instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain time \n"
+"or condition has been met, though they won't be honored until the <a href=\"#future.variablelatency\">nontrivial \n"
+"delays</a> are deployed. It is possible to explicitly route garlic messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques are \n"
 "not currently used in the existing implementation."
 msgstr ""
 
@@ -10171,54 +8898,35 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:500
 msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple "
-"combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data "
-"confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred"
-" \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
-"describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
 "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:539
 msgid ""
-"Session tags themselves have a very short lifetime, after which they are"
-" \n"
-"discarded if not used. In addition, the quantity stored for each key is "
-"limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or "
-"old \n"
-"messages may be dropped. The sender keeps track whether messages using "
-"session \n"
-"tags are getting through, and if there isn't sufficient communication it "
-"may \n"
-"drop the ones previously assumed to be properly delivered, reverting back"
-" \n"
+"Session tags themselves have a very short lifetime, after which they are \n"
+"discarded if not used. In addition, the quantity stored for each key is limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or old \n"
+"messages may be dropped. The sender keeps track whether messages using session \n"
+"tags are getting through, and if there isn't sufficient communication it may \n"
+"drop the ones previously assumed to be properly delivered, reverting back \n"
 "to the full expensive ElGamal encryption."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:549
 msgid ""
-"One alternative is to transmit only a single session tag, and from that,"
-" \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By "
-"keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the "
-"recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of "
-"periodically \n"
-"bundling a large number of tags is removed, allowing more options in the "
-"space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions "
-"necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the "
-"necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount"
-" \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the "
-"moment, \n"
+"One alternative is to transmit only a single session tag, and from that, \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
+"bundling a large number of tags is removed, allowing more options in the space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
 "there are no immediate plans to move towards these synchronized PRNGs."
 msgstr ""
 
@@ -10228,12 +8936,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:563
 msgid ""
-"While I2P is currently functional and sufficient for many scenarios, "
-"there \n"
-"are several areas which require further improvement to meet the needs of "
-"those \n"
-"facing more powerful adversaries as well as substantial user experience "
-"optimization."
+"While I2P is currently functional and sufficient for many scenarios, there \n"
+"are several areas which require further improvement to meet the needs of those \n"
+"facing more powerful adversaries as well as substantial user experience optimization."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:569
@@ -10242,106 +8947,64 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:570
 msgid ""
-"I2P is an overlay network designed to be run on top of a functional "
-"packet \n"
-"switched network, exploiting the end to end principle to offer anonymity "
-"and \n"
-"security. While the Internet no longer fully embraces the end to end "
-"principle\n"
+"I2P is an overlay network designed to be run on top of a functional packet \n"
+"switched network, exploiting the end to end principle to offer anonymity and \n"
+"security. While the Internet no longer fully embraces the end to end principle\n"
 "(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - "
-"there \n"
-"may be a number of peers along the edges running using restricted routes,"
-" \n"
-"but I2P does not include an appropriate routing algorithm for the "
-"degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a"
-" \n"
+"I2P does require a substantial portion of the network to be reachable - there \n"
+"may be a number of peers along the edges running using restricted routes, \n"
+"but I2P does not include an appropriate routing algorithm for the degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a \n"
 "network employing such an algorithm."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:582
 msgid ""
-"Restricted route operation, where there are limits to what peers are "
-"reachable \n"
-"directly, has several different functional and anonymity implications, "
-"dependent \n"
-"upon how the restricted routes are handled. At the most basic level, "
-"restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow"
-" \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
-"integrating \n"
-"distributed hole punching into the transport layer, allowing people "
-"behind \n"
-"most NATs and firewalls to receive unsolicited connections without any "
-"configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to "
-"routers \n"
-"inside the network, as they can simply get introduced to the peer through"
-" \n"
+"Restricted route operation, where there are limits to what peers are reachable \n"
+"directly, has several different functional and anonymity implications, dependent \n"
+"upon how the restricted routes are handled. At the most basic level, restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
+"distributed hole punching into the transport layer, allowing people behind \n"
+"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to routers \n"
+"inside the network, as they can simply get introduced to the peer through \n"
 "the published introducer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:595
 msgid ""
-"Beyond the functional handling of restricted routes, there are two levels"
-" \n"
-"of restricted operation that can be used to limit the exposure of one's "
-"IP \n"
-"address - using router-specific tunnels for communication, and offering "
-"'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels "
-"or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of "
-"them \n"
-"as part of their routerInfo in place of their transport addresses. When a"
-" \n"
-"peer wants to get in touch with them, they see those tunnel gateways in "
-"the \n"
-"netDb and simply send the relevant message to them through one of the "
-"published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may "
-"do \n"
-"so either directly (if they are willing to expose their IP to the peer) "
-"or \n"
-"indirectly through their outbound tunnels. When the routers that the peer"
-" \n"
-"has direct connections to want to reach it (to forward tunnel messages, "
-"for \n"
-"instance), they simply prioritize their direct connection over the "
-"published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the "
-"restricted \n"
-"route by not publishing any router addresses. Such a router would not "
-"even \n"
-"need to publish their routerInfo in the netDb, merely providing their "
-"self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the "
-"router's \n"
-"public keys). Both levels of restricted route operation are planned for "
-"I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels \n"
+"of restricted operation that can be used to limit the exposure of one's IP \n"
+"address - using router-specific tunnels for communication, and offering 'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
+"as part of their routerInfo in place of their transport addresses. When a \n"
+"peer wants to get in touch with them, they see those tunnel gateways in the \n"
+"netDb and simply send the relevant message to them through one of the published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
+"so either directly (if they are willing to expose their IP to the peer) or \n"
+"indirectly through their outbound tunnels. When the routers that the peer \n"
+"has direct connections to want to reach it (to forward tunnel messages, for \n"
+"instance), they simply prioritize their direct connection over the published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
+"route by not publishing any router addresses. Such a router would not even \n"
+"need to publish their routerInfo in the netDb, merely providing their self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
+"public keys). Both levels of restricted route operation are planned for I2P \n"
 "2.0."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:617
 msgid ""
-"There are tradeoffs for those behind restricted routes, as they would "
-"likely \n"
-"participate in other people's tunnels less frequently, and the routers "
-"which \n"
-"they are connected to would be able to infer traffic patterns that would "
-"not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is "
-"less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, "
-"of \n"
-"course, assumes that the peers that the router behind a restricted route "
-"contacts \n"
-"are not hostile - either the network is large enough that the probability"
-" \n"
-"of using a hostile peer to get connected is small enough, or trusted (and"
-" \n"
+"There are tradeoffs for those behind restricted routes, as they would likely \n"
+"participate in other people's tunnels less frequently, and the routers which \n"
+"they are connected to would be able to infer traffic patterns that would not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, of \n"
+"course, assumes that the peers that the router behind a restricted route contacts \n"
+"are not hostile - either the network is large enough that the probability \n"
+"of using a hostile peer to get connected is small enough, or trusted (and \n"
 "perhaps temporary) peers are used instead."
 msgstr ""
 
@@ -10351,45 +9014,28 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:630
 msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency "
-"communication, \n"
-"it was designed with variable latency services in mind from the "
-"beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the"
-" \n"
-"anonymity of medium and high latency communication while still blending "
-"their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can "
-"offer \n"
-"its own medium and high latency communication through the garlic "
-"encryption \n"
-"- specifying that the message should be sent after a certain delay, at a "
-"certain \n"
-"time, after a certain number of messages have passed, or another mix "
-"strategy. \n"
-"With the layered encryption, only the router that the clove exposed the "
-"delay \n"
-"request would know that the message requires high latency, allowing the "
-"traffic \n"
-"to blend in further with the low latency traffic. Once the transmission "
-"precondition \n"
-"is met, the router holding on to the clove (which itself would likely be "
-"a \n"
-"garlic message) simply forwards it as requested - to a router, to a "
-"tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
+"it was designed with variable latency services in mind from the beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the \n"
+"anonymity of medium and high latency communication while still blending their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
+"its own medium and high latency communication through the garlic encryption \n"
+"- specifying that the message should be sent after a certain delay, at a certain \n"
+"time, after a certain number of messages have passed, or another mix strategy. \n"
+"With the layered encryption, only the router that the clove exposed the delay \n"
+"request would know that the message requires high latency, allowing the traffic \n"
+"to blend in further with the low latency traffic. Once the transmission precondition \n"
+"is met, the router holding on to the clove (which itself would likely be a \n"
+"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
 "or, most likely, to a remote client destination."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:647
 msgid ""
-"There are a substantial number of ways to exploit this capacity for high"
-" \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for "
-"the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
-" \n"
-"latency comm can offer should look towards the application layer to "
-"provide \n"
+"There are a substantial number of ways to exploit this capacity for high \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
+"latency comm can offer should look towards the application layer to provide \n"
 "it."
 msgstr ""
 
@@ -10423,18 +9069,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:665
 msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware,"
-" \n"
-"the topology of DHTs, the anonymity and cryptography of free route "
-"mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not "
-"from \n"
-"novel concepts of algorithms though, but from careful engineering "
-"combining \n"
-"the research results of existing systems and papers. While there are a "
-"few \n"
-"similar efforts worth reviewing, both for technical and functional "
-"comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware, \n"
+"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not from \n"
+"novel concepts of algorithms though, but from careful engineering combining \n"
+"the research results of existing systems and papers. While there are a few \n"
+"similar efforts worth reviewing, both for technical and functional comparisons, \n"
 "two in particular are pulled out here - Tor and Freenet."
 msgstr ""
 
@@ -10451,209 +9091,127 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:682
 msgid ""
 "At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the "
-"early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing "
-"and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an "
-"essentially \n"
-"trusted, centralized system with directory servers, I2P has a self "
-"organizing \n"
-"network database with each peer taking on the responsibility of profiling"
-" \n"
-"other routers to determine how best to exploit available resources. "
-"Another \n"
-"key difference is that while both I2P and Tor use layered and ordered "
-"paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
-"network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to "
-"transparently \n"
-"route around congestion or other network failures, operate redundant "
-"pathways, \n"
-"and load balance the data across available resources. While Tor offers "
-"the \n"
-"useful outproxy functionality by offering integrated outproxy discovery "
-"and \n"
-"selection, I2P leaves such application layer decisions up to applications"
-" \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like "
-"streaming \n"
-"library itself to the application layer, allowing developers to "
-"experiment \n"
-"with different strategies, exploiting their domain specific knowledge to "
-"offer \n"
+"similarities. While I2P's development began before we were aware of the early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
+"trusted, centralized system with directory servers, I2P has a self organizing \n"
+"network database with each peer taking on the responsibility of profiling \n"
+"other routers to determine how best to exploit available resources. Another \n"
+"key difference is that while both I2P and Tor use layered and ordered paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
+"route around congestion or other network failures, operate redundant pathways, \n"
+"and load balance the data across available resources. While Tor offers the \n"
+"useful outproxy functionality by offering integrated outproxy discovery and \n"
+"selection, I2P leaves such application layer decisions up to applications \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
+"library itself to the application layer, allowing developers to experiment \n"
+"with different strategies, exploiting their domain specific knowledge to offer \n"
 "better performance."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:703
 msgid ""
-"From an anonymity perspective, there is much similarity when the core "
-"networks \n"
-"are compared. However, there are a few key differences. When dealing with"
-" \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels"
-" \n"
-"expose half as much traffic data than would be exposed with Tor's duplex "
-"circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response "
-"would \n"
-"follow the same path in Tor, while in I2P the packets making up the "
-"request \n"
-"would go out through one or more outbound tunnels and the packets making "
-"up \n"
-"the response would come back through one or more different inbound "
-"tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently "
-"address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be "
-"necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same "
-"routers."
+"From an anonymity perspective, there is much similarity when the core networks \n"
+"are compared. However, there are a few key differences. When dealing with \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
+"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response would \n"
+"follow the same path in Tor, while in I2P the packets making up the request \n"
+"would go out through one or more outbound tunnels and the packets making up \n"
+"the response would come back through one or more different inbound tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same routers."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:717
 msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel "
-"creation, \n"
-"as simple packet counting and timing measurements as the cells in a "
-"circuit \n"
-"pass through an adversary's node exposes statistical information "
-"regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel "
-"creation \n"
-"with a single message so that this data is not exposed. Protecting the "
-"position \n"
-"in a tunnel is important, as an adversary would otherwise be able to "
-"mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation "
-"attacks."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
+"as simple packet counting and timing measurements as the cells in a circuit \n"
+"pass through an adversary's node exposes statistical information regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
+"with a single message so that this data is not exposed. Protecting the position \n"
+"in a tunnel is important, as an adversary would otherwise be able to mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:727
 msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-"
-"trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will "
-"not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
 "offer this topology until <a href=\"#future.restricted\">2.0</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:733
 msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor "
-"works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P "
-"works \n"
-"towards offering a decentralized resilient network in itself. In theory, "
-"both \n"
-"can be used to achieve both purposes, but given limited development "
-"resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have "
-"considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but "
-"concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet "
-"switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P works \n"
+"towards offering a decentralized resilient network in itself. In theory, both \n"
+"can be used to achieve both purposes, but given limited development resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
 "architecture will be able to exploit scarce resources more effectively."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:747
 msgid ""
-"Freenet played a large part in the initial stages of I2P's design - "
-"giving \n"
-"proof to the viability of a vibrant pseudonymous community completely "
-"contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies"
-" \n"
-"could be avoided. The first seed of I2P began as a replacement "
-"communication \n"
-"layer for Freenet, attempting to factor out the complexities of a "
-"scalable, \n"
-"anonymous and secure point to point communication from the complexities "
-"of \n"
-"a censorship resistant distributed data store. Over time however, some of"
-" \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms "
-"made \n"
-"it clear that I2P's focus should stay strictly on providing a generic "
-"anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the "
-"years, \n"
-"the Freenet developers have come to see the weaknesses in the older "
-"design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to "
-"offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a "
-"mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
-"through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data "
-"according \n"
+"Freenet played a large part in the initial stages of I2P's design - giving \n"
+"proof to the viability of a vibrant pseudonymous community completely contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies \n"
+"could be avoided. The first seed of I2P began as a replacement communication \n"
+"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
+"anonymous and secure point to point communication from the complexities of \n"
+"a censorship resistant distributed data store. Over time however, some of \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
+"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the years, \n"
+"the Freenet developers have come to see the weaknesses in the older design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
 "to Freenet's heuristic distributed data storage algorithms."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:766
 msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet "
-"natively \n"
-"provides many of the tools for operating medium and high latency systems,"
-" \n"
-"while I2P natively provides the low latency mix network suitable for "
-"offering \n"
-"adequate anonymity. The logic of separating the mixnet from the "
-"censorship-\n"
-"resistant distributed data store still seems self-evident from an "
-"engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully "
-"the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing"
-" \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
+"provides many of the tools for operating medium and high latency systems, \n"
+"while I2P natively provides the low latency mix network suitable for offering \n"
+"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
+"resistant distributed data store still seems self-evident from an engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing \n"
 "(or helping to improve, as necessary) existing mixnets like I2P or Tor."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:777
 msgid ""
 "It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using "
-"restricted \n"
-"routes between peers of various trust. While insufficient information has"
-" \n"
-"been made publicly available regarding how such a system would operate "
-"for \n"
-"a full review, from what has been said the anonymity and scalability "
-"claims \n"
-"seem highly dubious. In particular, the appropriateness for use in "
-"hostile \n"
-"regimes against state level adversaries has been tremendously overstated,"
-" \n"
-"and any analysis on the implications of resource scarcity upon the "
-"scalability \n"
-"of the network has seemingly been avoided. Further questions regarding "
-"susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth"
-" \n"
-"review of this \"globally scalable darknet\" will have to wait until the "
-"Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
+"routes between peers of various trust. While insufficient information has \n"
+"been made publicly available regarding how such a system would operate for \n"
+"a full review, from what has been said the anonymity and scalability claims \n"
+"seem highly dubious. In particular, the appropriateness for use in hostile \n"
+"regimes against state level adversaries has been tremendously overstated, \n"
+"and any analysis on the implications of resource scarcity upon the scalability \n"
+"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
+"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
 "team makes more information available."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:793
 msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote "
-"destinations \n"
-"and receives messages targeting local destinations - most of the "
-"interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an "
-"anonymous \n"
-"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming"
-" library</a> \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. "
-"Beyond \n"
-"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP "
-"proxying \n"
-"system for either getting into or out of the I2P network, plus a variety "
-"of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
+"and receives messages targeting local destinations - most of the interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
+"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming library</a> \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
+"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP proxying \n"
+"system for either getting into or out of the I2P network, plus a variety of \n"
 "network applications provide further functionality for end users."
 msgstr ""
 
@@ -10663,51 +9221,34 @@ msgstr "Librari transmetimi"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:805
 msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface "
-"(mirroring TCP sockets),\n"
-"and the implementation supports a <a "
-"href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding "
-"window protocol</a>\n"
-"with several optimizations, to take into account the high delay over I2P."
-"\n"
+"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
+"and the implementation supports a <a href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding window protocol</a>\n"
+"with several optimizations, to take into account the high delay over I2P.\n"
 "Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable "
-"tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the "
-"latency \n"
+"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the latency \n"
 "of multiple messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:815
 msgid ""
 "In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering "
-"messages \n"
-"has been optimized to allow individual messages passed to contain as much"
-" \n"
-"information as is available. For instance, a small HTTP transaction "
-"proxied \n"
-"through the streaming library can be completed in a single round trip - "
-"the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request "
-"typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
-" \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell "
-"the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
-"can \n"
+"messages, the streaming library's protocol for scheduling and delivering messages \n"
+"has been optimized to allow individual messages passed to contain as much \n"
+"information as is available. For instance, a small HTTP transaction proxied \n"
+"through the streaming library can be completed in a single round trip - the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
 "deliver the full response to the browser immediately."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:828
 msgid ""
-"On the whole, however, the streaming library bears much resemblance to an"
-" \n"
-"abstraction of TCP, with its sliding windows, congestion control "
-"algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior "
-"(ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an \n"
+"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
 "SYN, FIN, RST, etc)."
 msgstr ""
 
@@ -10737,227 +9278,142 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:842
 msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning"
-" \n"
-"with advocates across the spectrum of possibilities. However, given I2P's"
-" \n"
-"inherent demand for secure communication and decentralized operation, the"
-" \n"
-"traditional DNS-style naming system is clearly out, as are \"majority "
-"rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a "
-"base \n"
-"implementation designed to work off a local name to destination mapping, "
-"as \n"
-"well as an optional add-on application called the \"Address Book\". The "
-"address book \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming "
-"system, \n"
-"sacrificing only the call for all human readable names to be globally "
-"unique \n"
-"by mandating only local uniqueness. While all messages in I2P are "
-"cryptographically \n"
-"addressed by their destination, different people can have local address "
-"book \n"
-"entries for \"Alice\" which refer to different destinations. People can "
-"still \n"
-"discover new names by importing published address books of peers "
-"specified \n"
-"in their web of trust, by adding in the entries provided through a third "
-"party, \n"
-"or (if some people organize a series of published address books using a "
-"first \n"
-"come first serve registration system) people can choose to treat these "
-"address books \n"
+"Naming within I2P has been an oft-debated topic since the very beginning \n"
+"with advocates across the spectrum of possibilities. However, given I2P's \n"
+"inherent demand for secure communication and decentralized operation, the \n"
+"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a base \n"
+"implementation designed to work off a local name to destination mapping, as \n"
+"well as an optional add-on application called the \"Address Book\". The address book \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
+"sacrificing only the call for all human readable names to be globally unique \n"
+"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
+"addressed by their destination, different people can have local address book \n"
+"entries for \"Alice\" which refer to different destinations. People can still \n"
+"discover new names by importing published address books of peers specified \n"
+"in their web of trust, by adding in the entries provided through a third party, \n"
+"or (if some people organize a series of published address books using a first \n"
+"come first serve registration system) people can choose to treat these address books \n"
 "as name servers, emulating traditional DNS."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:862
 msgid ""
 "I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations "
-"have \n"
-"no value. DNSsec itself still falls back on registrars and certificate "
-"authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or "
-"the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, "
-"and \n"
-"a destination itself is just a pair of public keys and a certificate. "
-"DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup "
-"path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a "
-"certificate \n"
-"authenticating the responses as signed by some centralized certificate "
-"authority \n"
-"would address many of the hostile nameserver issues but would leave open "
-"replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations have \n"
+"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, and \n"
+"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
+"authenticating the responses as signed by some centralized certificate authority \n"
+"would address many of the hostile nameserver issues but would leave open replay \n"
 "attacks as well as hostile certificate authority attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:876
 msgid ""
-"Voting style naming is dangerous as well, especially given the "
-"effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an"
-" \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a "
-"given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as"
-" \n"
-"the network grows the load required to contact everyone to conduct online"
-" \n"
-"voting is implausible, or if the full network is not queried, different "
-"sets \n"
+"Voting style naming is dangerous as well, especially given the effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as \n"
+"the network grows the load required to contact everyone to conduct online \n"
+"voting is implausible, or if the full network is not queried, different sets \n"
 "of answers may be reachable."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:886
 msgid ""
-"As with the Internet however, I2P is keeping the design and operation of"
-" \n"
-"a naming system out of the (IP-like) communication layer. The bundled "
-"naming \n"
-"library includes a simple service provider interface which alternate "
-"naming \n"
-"systems can plug into, allowing end users to drive what sort of naming "
-"tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of \n"
+"a naming system out of the (IP-like) communication layer. The bundled naming \n"
+"library includes a simple service provider interface which alternate naming \n"
+"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
 "they prefer."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:895
 msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which"
-"\n"
-"is distributed separately. For more information see the <a "
-"href=\"http://syndie.i2p2.de/\">Syndie</a>\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
+"is distributed separately. For more information see the <a href=\"http://syndie.i2p2.de/\">Syndie</a>\n"
 "pages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:901
 msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content "
-"aggregation \n"
-"system. It lets you create information, share it with others, and read "
-"posts \n"
-"from those you're interested in, all while taking into consideration your"
-" \n"
-"needs for security and anonymity. Rather than building its own content "
-"distribution \n"
-"network, Syndie is designed to run on top of existing networks, "
-"syndicating \n"
-"content through I2P Sites, Tor hidden services, Freenet freesites, normal"
-" websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
-"Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or "
-"archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
+"system. It lets you create information, share it with others, and read posts \n"
+"from those you're interested in, all while taking into consideration your \n"
+"needs for security and anonymity. Rather than building its own content distribution \n"
+"network, Syndie is designed to run on top of existing networks, syndicating \n"
+"content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
 "it."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:916
 msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client "
-"application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel"
-" \n"
-"can be viewed as four separate proxying applications - a \"client\" which"
-" receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an "
-"\"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
-"requests to \n"
-"the appropriate I2P destination (after querying the naming service if "
-"necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a "
-"destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which "
-"extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer "
-"operation. \n"
-"There is an additional \"socksclient\" application, but its use is not "
-"encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
+"can be viewed as four separate proxying applications - a \"client\" which receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
+"the appropriate I2P destination (after querying the naming service if necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
+"There is an additional \"socksclient\" application, but its use is not encouraged \n"
 "for reasons previously mentioned."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:930
 msgid ""
-"I2P itself is not an outproxy network - the anonymity and security "
-"concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have "
-"kept \n"
-"I2P's design focused on providing an anonymous network which capable of "
-"meeting \n"
-"the user's needs without requiring external resources. However, the "
-"I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the "
-"hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-"
-"provided \n"
-"set of outproxies and forwards the request to them. These destinations "
-"are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have "
-"explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running "
-"an \n"
-"outproxy doesn't automatically tell other people to proxy through you. "
-"While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of "
-"concept \n"
-"for using I2P and provide some functionality under a threat model which "
-"may \n"
+"I2P itself is not an outproxy network - the anonymity and security concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have kept \n"
+"I2P's design focused on providing an anonymous network which capable of meeting \n"
+"the user's needs without requiring external resources. However, the I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
+"set of outproxies and forwards the request to them. These destinations are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running an \n"
+"outproxy doesn't automatically tell other people to proxy through you. While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
+"for using I2P and provide some functionality under a threat model which may \n"
 "be sufficient for some users."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:946
 msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" "
-"pointing \n"
-"at a webserver lets anyone run their own anonymous website (or \"I2P "
-"Site\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can"
-" \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously "
-"hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their "
-"local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. "
-"End \n"
-"users also have \"client\" tunnels pointing at <a "
-"href=\"#app.i2pmail\">I2Pmail's</a> \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
-" pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
-"I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run "
-"\"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
+"at a webserver lets anyone run their own anonymous website (or \"I2P Site\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
+"users also have \"client\" tunnels pointing at <a href=\"#app.i2pmail\">I2Pmail's</a> \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run \"client\" \n"
 "proxies to access the \"server\" instances pointing at an NNTP server."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:963
 msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the"
-" \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded "
-"through \n"
-"the eepproxy to I2P Sites specified in the torrent file while tracker "
-"responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open "
-"up \n"
-"a <a href=\"#app.streaming\">streaming lib</a> connection to query them "
-"for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
+"the eepproxy to I2P Sites specified in the torrent file while tracker responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
+"a <a href=\"#app.streaming\">streaming lib</a> connection to query them for \n"
 "blocks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:972
 msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
-" \n"
-"a few modifications as necessary to strip any anonymity-compromising "
-"information \n"
-"from the application and to take into consideration the fact that IPs "
-"cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
+"a few modifications as necessary to strip any anonymity-compromising information \n"
+"from the application and to take into consideration the fact that IPs cannot \n"
 "be used for identifying peers."
 msgstr ""
 
@@ -10970,10 +9426,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:986
 msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous "
-"BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality "
-"through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality through \n"
 "a plain HTML web interface."
 msgstr ""
 
@@ -10981,9 +9435,7 @@ msgstr ""
 #, python-format
 msgid ""
 "Robert is a Bittorrent client written in Python.\n"
-"It is hosted on <a "
-"href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- "
-"TODO: expand -->"
+"It is hosted on <a href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- TODO: expand -->"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1003
@@ -10995,12 +9447,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1011
 msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
-" \n"
-"run entirely on top of I2P. While it has disabled some of Phex's "
-"functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and "
-"chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
+"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
 "system is fully functional."
 msgstr ""
 
@@ -11013,62 +9462,39 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tech-intro.html:1029
 #, python-format
 msgid ""
-"I2Pmail is more a service than an application - postman offers both "
-"internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances"
-" \n"
-"accessing a series of components developed with mastiejaner, allowing "
-"people \n"
-"to use their preferred mail clients to send and receive mail "
-"pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information,"
-" \n"
-"I2P bundles susi23's web based susimail client which has been built "
-"specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
-"transparent \n"
-"virus filtering as well as denial of service prevention with hashcash "
-"augmented \n"
-"quotas. In addition, each user has control of their batching strategy "
-"prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the "
-"mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate "
-"with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
-"those \n"
-"non-anonymous locations does not give access to the mail accounts or "
-"activity \n"
-"patterns of the user. At the moment the developers work on a "
-"decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the I2P "
-"Site \n"
+"I2Pmail is more a service than an application - postman offers both internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances \n"
+"accessing a series of components developed with mastiejaner, allowing people \n"
+"to use their preferred mail clients to send and receive mail pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information, \n"
+"I2P bundles susi23's web based susimail client which has been built specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
+"virus filtering as well as denial of service prevention with hashcash augmented \n"
+"quotas. In addition, each user has control of their batching strategy prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
+"non-anonymous locations does not give access to the mail accounts or activity \n"
+"patterns of the user. At the moment the developers work on a decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the I2P Site \n"
 "<a href=\"http://%(postman)s/\">%(postman)s</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1051
 msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the "
-"traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a "
-"server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
 "Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the "
-"e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically "
-"encrypted end-to-end. <br>\n"
-"Furthermore, I2P-Bote offers a remailer function on top of I2P, for "
-"increased high-latency anonymity."
+"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
+"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. <br>\n"
+"Furthermore, I2P-Bote offers a remailer function on top of I2P, for increased high-latency anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:1061
 msgid ""
-"I2P-Messenger is an end-to-end encrypted serverless communication "
-"application.\n"
-"For communication between two users, they need to give each other their "
-"destination keys, to allow the other to connect.\n"
-"It supports file transfer and has a search for other users, based on "
-"Seedless."
+"I2P-Messenger is an end-to-end encrypted serverless communication application.\n"
+"For communication between two users, they need to give each other their destination keys, to allow the other to connect.\n"
+"It supports file transfer and has a search for other users, based on Seedless."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:2
@@ -11218,18 +9644,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:71
 msgid ""
 "Your level of anonymity can be described as \"how hard it is for someone\n"
-"to find out information you don't want them to know?\" - who you are, "
-"where\n"
-"you are located, who you communicate with, or even when you communicate."
-"  \n"
-"\"Perfect\" anonymity is not a useful concept here - software will not "
-"make \n"
-"you indistinguishable from people that don't use computers or who are not"
-" on\n"
-"the Internet.  Instead, we are working to provide sufficient anonymity to"
-" meet the\n"
-"real needs of whomever we can - from those simply browsing websites, to "
-"those exchanging\n"
+"to find out information you don't want them to know?\" - who you are, where\n"
+"you are located, who you communicate with, or even when you communicate.  \n"
+"\"Perfect\" anonymity is not a useful concept here - software will not make \n"
+"you indistinguishable from people that don't use computers or who are not on\n"
+"the Internet.  Instead, we are working to provide sufficient anonymity to meet the\n"
+"real needs of whomever we can - from those simply browsing websites, to those exchanging\n"
 "data, to those fearful of discovery by powerful organizations or states."
 msgstr ""
 
@@ -11237,17 +9657,14 @@ msgstr ""
 msgid ""
 "The question of whether I2P provides sufficient anonymity for your \n"
 "particular needs is a hard one, but this page will hopefully assist in \n"
-"answering that question by exploring how I2P operates under various "
-"attacks\n"
+"answering that question by exploring how I2P operates under various attacks\n"
 "so that you may decide whether it meets your needs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:89
 msgid ""
-"We welcome further research and analysis on I2P's resistance to the "
-"threats described below.\n"
-"More review of existing literature (much of it focused on Tor) and "
-"original\n"
+"We welcome further research and analysis on I2P's resistance to the threats described below.\n"
+"More review of existing literature (much of it focused on Tor) and original\n"
 "work focused on I2P is needed."
 msgstr ""
 
@@ -11259,69 +9676,52 @@ msgstr ""
 #, python-format
 msgid ""
 "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n"
-"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in"
-" mind when \n"
+"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in mind when \n"
 "reviewing related literature:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:102
 msgid ""
-"<b>I2P is a free route mixnet</b> - the message creator explicitly "
-"defines the\n"
-"path that messages will be sent out (the outbound tunnel), and the "
-"message \n"
-"recipient explicitly defines the path that messages will be received on "
-"(the\n"
+"<b>I2P is a free route mixnet</b> - the message creator explicitly defines the\n"
+"path that messages will be sent out (the outbound tunnel), and the message \n"
+"recipient explicitly defines the path that messages will be received on (the\n"
 "inbound tunnel)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:108
 msgid ""
-"<b>I2P has no official entry and exit points</b> - all peers fully "
-"participate in the \n"
+"<b>I2P has no official entry and exit points</b> - all peers fully participate in the \n"
 "mix, and there are no network layer in- or out-proxies (however, at the \n"
 "application layer, a few proxies do exist)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:113
 msgid ""
-"<b>I2P is fully distributed</b> - there are no central controls or "
-"authorities.\n"
-"One could modify some routers to operate mix cascades (building tunnels "
-"and giving\n"
-"out the keys necessary to control the forwarding at the tunnel endpoint) "
-"or directory \n"
-"based profiling and selection, all without breaking compatibility with "
-"the rest of \n"
-"the network, but doing so is of course not necessary (and may even harm "
-"one's\n"
+"<b>I2P is fully distributed</b> - there are no central controls or authorities.\n"
+"One could modify some routers to operate mix cascades (building tunnels and giving\n"
+"out the keys necessary to control the forwarding at the tunnel endpoint) or directory \n"
+"based profiling and selection, all without breaking compatibility with the rest of \n"
+"the network, but doing so is of course not necessary (and may even harm one's\n"
 "anonymity)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:123
 #, python-format
 msgid ""
-"We have documented plans to implement <a "
-"href=\"%(todo)s#stop\">nontrivial delays</a>\n"
+"We have documented plans to implement <a href=\"%(todo)s#stop\">nontrivial delays</a>\n"
 "and <a href=\"%(todo)s#batching\">batching strategies</a> \n"
-"whose existence is only known to the particular hop or tunnel gateway "
-"that \n"
-"receives the message, allowing a mostly low latency mixnet to provide "
-"cover \n"
+"whose existence is only known to the particular hop or tunnel gateway that \n"
+"receives the message, allowing a mostly low latency mixnet to provide cover \n"
 "traffic for higher latency communication (e.g. email).\n"
-"However we are aware that significant delays are required to provide "
-"meaningful\n"
-"protection, and that implementation of such delays will be a significant "
-"challenge.\n"
-"It is not clear at this time whether we will actually implement these "
-"delay features."
+"However we are aware that significant delays are required to provide meaningful\n"
+"protection, and that implementation of such delays will be a significant challenge.\n"
+"It is not clear at this time whether we will actually implement these delay features."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:134
 msgid ""
 "In theory, routers along the message path may inject an \n"
-"arbitrary number of hops before forwarding the message to the next peer, "
-"though\n"
+"arbitrary number of hops before forwarding the message to the next peer, though\n"
 "the current implementation does not."
 msgstr ""
 
@@ -11335,8 +9735,7 @@ msgid ""
 "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n"
 "<a href=\"http://freenetproject.org/\">[Freenet]</a>, and\n"
 "<a href=\"https://www.torproject.org/\">[Tor]</a>.\n"
-"Our design benefits substantially from the research published around that"
-" time.\n"
+"Our design benefits substantially from the research published around that time.\n"
 "I2P uses several onion routing techniques, so we continue to benefit\n"
 "from the significant academic interest in Tor."
 msgstr ""
@@ -11344,12 +9743,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:152
 msgid ""
 "Taking from the attacks and analysis put forth in the \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity "
-"literature</a> (largely \n"
-"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: "
-"Protocols, Attacks, Design \n"
-"Issues and Open Problems</a>), the following briefly describes a wide "
-"variety \n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity literature</a> (largely \n"
+"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: Protocols, Attacks, Design \n"
+"Issues and Open Problems</a>), the following briefly describes a wide variety \n"
 "of attacks as well as many of I2Ps defenses.  We update\n"
 "this list to include new attacks as they are identified."
 msgstr ""
@@ -11377,66 +9773,46 @@ msgstr ""
 msgid ""
 "The\n"
 "<a href=\"%(comparisons)s\">network comparisons</a> and\n"
-"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also "
-"be helpful\n"
+"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also be helpful\n"
 "to review."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:210
 msgid ""
-"A brute force attack can be mounted by a global passive or active "
-"adversary, \n"
-"watching all the messages pass between all of the nodes and attempting to"
-" correlate\n"
-"which message follows which path.  Mounting this attack against I2P "
-"should be \n"
-"nontrivial, as all peers in the network are frequently sending messages "
-"(both\n"
-"end to end and network maintenance messages), plus an end to end message "
-"changes\n"
-"size and data along its path.  In addition, the external adversary does "
-"not have\n"
-"access to the messages either, as inter-router communication is both "
-"encrypted\n"
-"and streamed (making two 1024 byte messages indistinguishable from one "
-"2048 byte\n"
+"A brute force attack can be mounted by a global passive or active adversary, \n"
+"watching all the messages pass between all of the nodes and attempting to correlate\n"
+"which message follows which path.  Mounting this attack against I2P should be \n"
+"nontrivial, as all peers in the network are frequently sending messages (both\n"
+"end to end and network maintenance messages), plus an end to end message changes\n"
+"size and data along its path.  In addition, the external adversary does not have\n"
+"access to the messages either, as inter-router communication is both encrypted\n"
+"and streamed (making two 1024 byte messages indistinguishable from one 2048 byte\n"
 "message)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:222
 msgid ""
-"However, a powerful attacker can use brute force to detect trends - if "
-"they \n"
-"can send 5GB to an I2P destination and monitor everyone's network "
-"connection,\n"
-"they can eliminate all peers who did not receive 5GB of data.  Techniques"
-" to \n"
+"However, a powerful attacker can use brute force to detect trends - if they \n"
+"can send 5GB to an I2P destination and monitor everyone's network connection,\n"
+"they can eliminate all peers who did not receive 5GB of data.  Techniques to \n"
 "defeat this attack exist, but may be prohibitively expensive (see: \n"
-"<a "
-"href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s "
-"mimics\n"
-"or constant rate traffic).  Most users are not concerned with this "
-"attack, as \n"
-"the cost of mounting it are extreme (and often require illegal activity)."
-"  \n"
+"<a href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s mimics\n"
+"or constant rate traffic).  Most users are not concerned with this attack, as \n"
+"the cost of mounting it are extreme (and often require illegal activity).  \n"
 "However, the attack is still possible, for example by an observer at\n"
 "a large ISP or an Internet exchange point.\n"
 "Those who want to defend against it \n"
 "would want to take appropriate countermeasures, such as\n"
-"setting low bandwidth limits, and using unpublished or encrypted "
-"leasesets for I2P Sites.\n"
-"Other countermeasures, such as nontrivial delays and restricted routes, "
-"are\n"
+"setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites.\n"
+"Other countermeasures, such as nontrivial delays and restricted routes, are\n"
 "not currently implemented."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:239
 #, python-format
 msgid ""
-"As a partial defense against a single router or group of routers trying "
-"to route all the network's traffic,\n"
-"routers contain limits as to how many tunnels can be routed through a "
-"single peer.\n"
+"As a partial defense against a single router or group of routers trying to route all the network's traffic,\n"
+"routers contain limits as to how many tunnels can be routed through a single peer.\n"
 "As the network grows, these limits are subject to further adjustment.\n"
 "Other mechanisms for peer rating, selection and avoidance\n"
 "are discussed on the\n"
@@ -11445,51 +9821,34 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:254
 msgid ""
-"I2P's messages are unidirectional and do not necessarily imply that a "
-"reply\n"
+"I2P's messages are unidirectional and do not necessarily imply that a reply\n"
 "will be sent.  However, applications on top of I2P will most likely have\n"
-"recognizable patterns within the frequency of their messages - for "
-"instance, an \n"
-"HTTP request will be a small message with a large sequence of reply "
-"messages \n"
-"containing the HTTP response.  Using this data as well as a broad view of"
-" the \n"
-"network topology, an attacker may be able to disqualify some links as "
-"being too \n"
+"recognizable patterns within the frequency of their messages - for instance, an \n"
+"HTTP request will be a small message with a large sequence of reply messages \n"
+"containing the HTTP response.  Using this data as well as a broad view of the \n"
+"network topology, an attacker may be able to disqualify some links as being too \n"
 "slow to have passed the message along."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:264
 msgid ""
-"This sort of attack is powerful, but its applicability to I2P is non "
-"obvious,\n"
-"as the variation on message delays due to queuing, message processing, "
-"and \n"
-"throttling will often meet or exceed the time of passing a message along "
-"a \n"
-"single link - even when the attacker knows that a reply will be sent as "
-"soon as\n"
-"the message is received.  There are some scenarios which will expose "
-"fairly \n"
-"automatic replies though - the streaming library does (with the SYN+ACK) "
-"as does the \n"
-"message mode of guaranteed delivery (with the "
-"DataMessage+DeliveryStatusMessage)."
+"This sort of attack is powerful, but its applicability to I2P is non obvious,\n"
+"as the variation on message delays due to queuing, message processing, and \n"
+"throttling will often meet or exceed the time of passing a message along a \n"
+"single link - even when the attacker knows that a reply will be sent as soon as\n"
+"the message is received.  There are some scenarios which will expose fairly \n"
+"automatic replies though - the streaming library does (with the SYN+ACK) as does the \n"
+"message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:274
 #, python-format
 msgid ""
-"Without protocol scrubbing or higher latency, global active adversaries "
-"can \n"
-"gain substantial information.  As such, people concerned with these "
-"attacks could\n"
-"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial "
-"delays</a> or \n"
-"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol "
-"scrubbing, or\n"
-"other advanced tunnel routing <a "
-"href=\"%(todo)s#batching\">techniques</a>,\n"
+"Without protocol scrubbing or higher latency, global active adversaries can \n"
+"gain substantial information.  As such, people concerned with these attacks could\n"
+"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial delays</a> or \n"
+"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol scrubbing, or\n"
+"other advanced tunnel routing <a href=\"%(todo)s#batching\">techniques</a>,\n"
 "but these are unimplemented in I2P."
 msgstr ""
 
@@ -11502,25 +9861,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:291
 msgid ""
-"Intersection attacks against low latency systems are extremely powerful -"
-"\n"
-"periodically make contact with the target and keep track of what peers "
-"are on\n"
+"Intersection attacks against low latency systems are extremely powerful -\n"
+"periodically make contact with the target and keep track of what peers are on\n"
 "the network.  Over time, as node churn occurs the attacker will gain \n"
-"significant information about the target by simply intersecting the sets "
-"of\n"
-"peers that are online when a message successfully goes through.  The cost"
-" of \n"
-"this attack is significant as the network grows, but may be feasible in "
-"some\n"
+"significant information about the target by simply intersecting the sets of\n"
+"peers that are online when a message successfully goes through.  The cost of \n"
+"this attack is significant as the network grows, but may be feasible in some\n"
 "scenarios."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:301
 #, python-format
 msgid ""
-"In summary, if an attacker is at both ends of your tunnel at the same "
-"time,\n"
+"In summary, if an attacker is at both ends of your tunnel at the same time,\n"
 "he may be successful.\n"
 "I2P does not have a full defense to this for low latency communication.\n"
 "This is an inherent weakness of low-latency onion routing.\n"
@@ -11539,8 +9892,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:316
 #, python-format
 msgid ""
-"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a "
-"small group that changes slowly"
+"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a small "
+"group that changes slowly"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:319
@@ -11563,8 +9916,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:332
 msgid ""
 "Even in total, these defenses are not a complete solution.\n"
-"Also, we have made some design choices that may significantly increase "
-"our vulnerability:"
+"Also, we have made some design choices that may significantly increase our vulnerability:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:337
@@ -11573,8 +9925,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:340
 msgid ""
-"We use tunnel pools comprised of several tunnels, and traffic can shift "
-"from tunnel to tunnel."
+"We use tunnel pools comprised of several tunnels, and traffic can shift from"
+" tunnel to tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:343
@@ -11584,8 +9936,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:346
 msgid ""
 "Tunnel lengths are configurable.\n"
-"While 3-hop tunnels are recommended for full protection, several "
-"applications and\n"
+"While 3-hop tunnels are recommended for full protection, several applications and\n"
 "services use 2-hop tunnels by default."
 msgstr ""
 
@@ -11593,14 +9944,10 @@ msgstr ""
 #, python-format
 msgid ""
 "In the future, it could\n"
-"for peers who can afford significant delays (per <a "
-"href=\"%(todo)s#stop\">nontrivial\n"
-"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>).  "
-"In addition,\n"
-"this is only relevant for destinations that other people know about - a "
-"private\n"
-"group whose destination is only known to trusted peers does not have to "
-"worry,\n"
+"for peers who can afford significant delays (per <a href=\"%(todo)s#stop\">nontrivial\n"
+"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>).  In addition,\n"
+"this is only relevant for destinations that other people know about - a private\n"
+"group whose destination is only known to trusted peers does not have to worry,\n"
 "as an adversary can't \"ping\" them to mount the attack.</p>"
 msgstr ""
 
@@ -11611,8 +9958,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:369
 msgid ""
-"There are a whole slew of denial of service attacks available against "
-"I2P,\n"
+"There are a whole slew of denial of service attacks available against I2P,\n"
 "each with different costs and consequences:"
 msgstr ""
 
@@ -11635,10 +9981,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:387
 msgid ""
 "Provide easy configuration options so that users may increase their\n"
-"contribution (share percentage) to the network. Display easy-to-"
-"understand\n"
-"metrics such as \"share ratio\" so that users may see what they are "
-"contributing."
+"contribution (share percentage) to the network. Display easy-to-understand\n"
+"metrics such as \"share ratio\" so that users may see what they are contributing."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:392
@@ -11650,29 +9994,20 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:399
 #, python-format
 msgid ""
-"<b>Starvation attack:</b> A hostile user may attempt to harm the network "
-"by\n"
-"creating a significant number of peers in the network who are not "
-"identified as\n"
-"being under control of the same entity (as with Sybil). These nodes then"
-" \n"
-"decide not to provide any resources to the network, causing existing "
-"peers \n"
-"to search through a larger network database or request more tunnels than"
-" \n"
+"<b>Starvation attack:</b> A hostile user may attempt to harm the network by\n"
+"creating a significant number of peers in the network who are not identified as\n"
+"being under control of the same entity (as with Sybil). These nodes then \n"
+"decide not to provide any resources to the network, causing existing peers \n"
+"to search through a larger network database or request more tunnels than \n"
 "should be necessary. \n"
-"Alternatively, the nodes may provide intermittent service by periodically"
-"\n"
+"Alternatively, the nodes may provide intermittent service by periodically\n"
 "dropping selected traffic, or refusing connections to certain peers.\n"
-"This behavior may be indistinguishable from that of a heavily-loaded or "
-"failing node.\n"
-"I2P addresses these issues by maintaining <a "
-"href=\"%(peerselection)s\">profiles</a> on the \n"
+"This behavior may be indistinguishable from that of a heavily-loaded or failing node.\n"
+"I2P addresses these issues by maintaining <a href=\"%(peerselection)s\">profiles</a> on the \n"
 "peers, attempting to identify underperforming ones and simply ignoring \n"
 "them, or using them rarely.\n"
 "We have significantly enhanced the\n"
-"ability to recognize and avoid troublesome peers; however there are still"
-"\n"
+"ability to recognize and avoid troublesome peers; however there are still\n"
 "significant efforts required in this area."
 msgstr ""
 
@@ -11680,30 +10015,18 @@ msgstr ""
 #, python-format
 msgid ""
 "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n"
-"a peer, a destination, or a tunnel.  Network and peer flooding is "
-"possible,\n"
-"and I2P does nothing to prevent standard IP layer flooding.  The flooding"
-" of\n"
-"a destination with messages by sending a large number to the target's "
-"various\n"
-"inbound tunnel gateways is possible, but the destination will know this "
-"both\n"
-"by the contents of the message and because the tunnel's tests will fail."
-"  The\n"
-"same goes for flooding just a single tunnel.  I2P has no defenses for a "
-"network\n"
-"flooding attack.  For a destination and tunnel flooding attack, the "
-"target\n"
-"identifies which tunnels are unresponsive and builds new ones.  New code "
-"could\n"
-"also be written to add even more tunnels if the client wishes to handle "
-"the\n"
-"larger load.  If, on the other hand, the load is more than the client can"
-"\n"
-"deal with, they can instruct the tunnels to throttle the number of "
-"messages or\n"
-"bytes they should pass on (once the <a "
-"href=\"%(todo)s#batching\">advanced tunnel\n"
+"a peer, a destination, or a tunnel.  Network and peer flooding is possible,\n"
+"and I2P does nothing to prevent standard IP layer flooding.  The flooding of\n"
+"a destination with messages by sending a large number to the target's various\n"
+"inbound tunnel gateways is possible, but the destination will know this both\n"
+"by the contents of the message and because the tunnel's tests will fail.  The\n"
+"same goes for flooding just a single tunnel.  I2P has no defenses for a network\n"
+"flooding attack.  For a destination and tunnel flooding attack, the target\n"
+"identifies which tunnels are unresponsive and builds new ones.  New code could\n"
+"also be written to add even more tunnels if the client wishes to handle the\n"
+"larger load.  If, on the other hand, the load is more than the client can\n"
+"deal with, they can instruct the tunnels to throttle the number of messages or\n"
+"bytes they should pass on (once the <a href=\"%(todo)s#batching\">advanced tunnel\n"
 "operation</a> is implemented)."
 msgstr ""
 
@@ -11711,13 +10034,10 @@ msgstr ""
 msgid ""
 "<b>CPU load attack:</b> There are currently some methods for people to \n"
 "remotely request that a peer perform some cryptographically expensive \n"
-"operation, and a hostile attacker could use these to flood that peer with"
-"\n"
-"a large number of them in an attempt to overload the CPU.  Both using "
-"good \n"
+"operation, and a hostile attacker could use these to flood that peer with\n"
+"a large number of them in an attempt to overload the CPU.  Both using good \n"
 "engineering practices and potentially requiring nontrivial certificates \n"
-"(e.g. HashCash) to be attached to these expensive requests should "
-"mitigate\n"
+"(e.g. HashCash) to be attached to these expensive requests should mitigate\n"
 "the issue, though there may be room for an attacker to exploit various\n"
 "bugs in the implementation."
 msgstr ""
@@ -11725,8 +10045,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:451
 #, python-format
 msgid ""
-"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the "
-"network by\n"
+"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by\n"
 "becoming a floodfill router. The current defenses against unreliable,\n"
 "intermittent, or malicious floodfill routers are poor.\n"
 "A floodfill router may provide bad or no response to lookups, and\n"
@@ -11741,134 +10060,86 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:470
 #, python-format
 msgid ""
-"Tagging attacks - modifying a message so that it can later be identified"
-" \n"
-"further along the path - are by themselves impossible in I2P, as messages"
-" \n"
-"passed through tunnels are signed.  However, if an attacker is the "
-"inbound \n"
-"tunnel gateway as well as a participant further along in that tunnel, "
-"with\n"
-"collusion they can identify the fact that they are in the same tunnel "
-"(and \n"
-"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and "
-"other updates,\n"
-"colluding peers within the same tunnel can recognize that fact without "
-"any \n"
-"effort).  An attacker in an outbound tunnel and any part of an inbound "
-"tunnel cannot \n"
-"collude however, as the tunnel encryption pads and modifies the data "
-"separately\n"
-"for the inbound and outbound tunnels.  External attackers cannot do "
-"anything,\n"
+"Tagging attacks - modifying a message so that it can later be identified \n"
+"further along the path - are by themselves impossible in I2P, as messages \n"
+"passed through tunnels are signed.  However, if an attacker is the inbound \n"
+"tunnel gateway as well as a participant further along in that tunnel, with\n"
+"collusion they can identify the fact that they are in the same tunnel (and \n"
+"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and other updates,\n"
+"colluding peers within the same tunnel can recognize that fact without any \n"
+"effort).  An attacker in an outbound tunnel and any part of an inbound tunnel cannot \n"
+"collude however, as the tunnel encryption pads and modifies the data separately\n"
+"for the inbound and outbound tunnels.  External attackers cannot do anything,\n"
 "as the links are encrypted and messages signed."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:488
 msgid ""
-"Partitioning attacks - finding ways to segregate (technically or "
-"analytically)\n"
-"the peers in a network - are important to keep in mind when dealing with "
-"a \n"
-"powerful adversary, since the size of the network plays a key role in "
-"determining\n"
-"your anonymity.  Technical partitioning by cutting links between peers to"
-" create\n"
-"fragmented networks is addressed by I2P's built in network database, "
-"which \n"
-"maintains statistics about various peers so as to allow any existing "
-"connections\n"
-"to other fragmented sections to be exploited so as to heal the network.  "
-"However,\n"
-"if the attacker does disconnect all links to uncontrolled peers, "
-"essentially\n"
-"isolating the target, no amount of network database healing will fix it."
-"  At\n"
-"that point, the only thing the router can hope to do is notice that a "
-"significant\n"
-"number of previously reliable peers have become unavailable and alert the"
-" client\n"
-"that it is temporarily disconnected (this detection code is not "
-"implemented at\n"
+"Partitioning attacks - finding ways to segregate (technically or analytically)\n"
+"the peers in a network - are important to keep in mind when dealing with a \n"
+"powerful adversary, since the size of the network plays a key role in determining\n"
+"your anonymity.  Technical partitioning by cutting links between peers to create\n"
+"fragmented networks is addressed by I2P's built in network database, which \n"
+"maintains statistics about various peers so as to allow any existing connections\n"
+"to other fragmented sections to be exploited so as to heal the network.  However,\n"
+"if the attacker does disconnect all links to uncontrolled peers, essentially\n"
+"isolating the target, no amount of network database healing will fix it.  At\n"
+"that point, the only thing the router can hope to do is notice that a significant\n"
+"number of previously reliable peers have become unavailable and alert the client\n"
+"that it is temporarily disconnected (this detection code is not implemented at\n"
 "the moment)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:504
 #, python-format
 msgid ""
-"Partitioning the network analytically by looking for differences in how "
-"routers \n"
-"and destinations behave and grouping them accordingly is also a very "
-"powerful\n"
-"attack.  For instance, an attacker <a href=\"#harvesting\">harvesting</a>"
-" the network\n"
-"database will know when a particular destination has 5 inbound tunnels in"
-" their\n"
-"LeaseSet while others have only 2 or 3, allowing the adversary to "
-"potentially \n"
-"partition clients by the number of tunnels selected.  Another partition "
-"is \n"
-"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial "
-"delays</a> and \n"
-"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel "
-"gateways and the\n"
-"particular hops with non-zero delays will likely stand out.  However, "
-"this data\n"
-"is only exposed to those specific hops, so to partition effectively on "
-"that \n"
-"matter, the attacker would need to control a significant portion of the "
-"network\n"
-"(and still that would only be a probabilistic partition, as they wouldn't"
-" know\n"
+"Partitioning the network analytically by looking for differences in how routers \n"
+"and destinations behave and grouping them accordingly is also a very powerful\n"
+"attack.  For instance, an attacker <a href=\"#harvesting\">harvesting</a> the network\n"
+"database will know when a particular destination has 5 inbound tunnels in their\n"
+"LeaseSet while others have only 2 or 3, allowing the adversary to potentially \n"
+"partition clients by the number of tunnels selected.  Another partition is \n"
+"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial delays</a> and \n"
+"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel gateways and the\n"
+"particular hops with non-zero delays will likely stand out.  However, this data\n"
+"is only exposed to those specific hops, so to partition effectively on that \n"
+"matter, the attacker would need to control a significant portion of the network\n"
+"(and still that would only be a probabilistic partition, as they wouldn't know\n"
 "which other tunnels or messages have those delays)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:520
 #, python-format
 msgid ""
-"Also discussed on the <a href=\"%(netdb)s#threat\">network database "
-"page</a> (bootstrap attack)."
+"Also discussed on the <a href=\"%(netdb)s#threat\">network database page</a>"
+" (bootstrap attack)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:528
 msgid ""
-"The predecessor attack is passively gathering statistics in an attempt to"
-" see\n"
-"what peers are 'close' to the destination by participating in their "
-"tunnels and\n"
-"keeping track of the previous or next hop (for outbound or inbound "
-"tunnels, \n"
-"respectively).  Over time, using a perfectly random sample of peers and "
-"random\n"
-"ordering, an attacker would be able to see which peer shows up as "
-"'closer' \n"
-"statistically more than the rest, and that peer would in turn be where "
-"the\n"
+"The predecessor attack is passively gathering statistics in an attempt to see\n"
+"what peers are 'close' to the destination by participating in their tunnels and\n"
+"keeping track of the previous or next hop (for outbound or inbound tunnels, \n"
+"respectively).  Over time, using a perfectly random sample of peers and random\n"
+"ordering, an attacker would be able to see which peer shows up as 'closer' \n"
+"statistically more than the rest, and that peer would in turn be where the\n"
 "target is located."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:538
 #, python-format
 msgid ""
-"I2P avoids this in four ways: first, the peers selected to participate in"
-"\n"
-"tunnels are not randomly sampled throughout the network - they are "
-"derived from\n"
-"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which "
-"breaks them\n"
-"into tiers.  Second, with <a href=\"%(tunnelimpl)s#ordering\">strict "
-"ordering</a> of peers\n"
-"in a tunnel, the fact that a peer shows up more frequently does not mean "
-"they're\n"
-"the source.  Third, with <a href=\"%(tunnelimpl)s#length\">permuted "
-"tunnel length</a>\n"
+"I2P avoids this in four ways: first, the peers selected to participate in\n"
+"tunnels are not randomly sampled throughout the network - they are derived from\n"
+"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which breaks them\n"
+"into tiers.  Second, with <a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers\n"
+"in a tunnel, the fact that a peer shows up more frequently does not mean they're\n"
+"the source.  Third, with <a href=\"%(tunnelimpl)s#length\">permuted tunnel length</a>\n"
 "(not enabled by default)\n"
 "even 0 hop tunnels can provide plausible deniability as the occasional \n"
 "variation of the gateway will look like normal tunnels.  Fourth, with \n"
-"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> "
-"(unimplemented), only the peer with\n"
-"a restricted connection to the target will ever contact the target, while"
-" \n"
+"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> (unimplemented), only the peer with\n"
+"a restricted connection to the target will ever contact the target, while \n"
 "attackers will merely run into that gateway."
 msgstr ""
 
@@ -11906,8 +10177,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:587
 msgid ""
-"Network growth will make it more difficult to obtain a given proportion "
-"of the network"
+"Network growth will make it more difficult to obtain a given proportion of "
+"the network"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:590
@@ -11916,10 +10187,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:593
 msgid ""
-"\"Hidden mode\", which prevents a router from publishing its information "
-"to the netDb,\n"
-"(but also prevents it from relaying data) is not widely used now but "
-"could be."
+"\"Hidden mode\", which prevents a router from publishing its information to the netDb,\n"
+"(but also prevents it from relaying data) is not widely used now but could be."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:599
@@ -11927,19 +10196,15 @@ msgstr ""
 msgid ""
 "In future implementations,\n"
 "<a href=\"%(todo)s#nat\">basic</a> and \n"
-"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted "
-"routes,\n"
-"this attack loses much of its power, as the \"hidden\" peers do not "
-"publish their\n"
-"contact addresses in the network database - only the tunnels through "
-"which \n"
+"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted routes,\n"
+"this attack loses much of its power, as the \"hidden\" peers do not publish their\n"
+"contact addresses in the network database - only the tunnels through which \n"
 "they can be reached (as well as their public keys, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:608
 msgid ""
-"In the future, routers could use GeoIP to identify if they are in a "
-"particular\n"
+"In the future, routers could use GeoIP to identify if they are in a particular\n"
 "country where identification as an I2P node would be risky.\n"
 "In that case, the router could automatically enable hidden mode, or\n"
 "enact other restricted route methods."
@@ -11950,10 +10215,8 @@ msgstr ""
 msgid ""
 "By inspecting the traffic into and out of a router, a malicious ISP\n"
 "or state-level firewall could identify that a computer is running I2P.\n"
-"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically "
-"designed\n"
-"to hide that a computer is running I2P. However, several design decisions"
-" made\n"
+"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically designed\n"
+"to hide that a computer is running I2P. However, several design decisions made\n"
 "in the design of the\n"
 "<a href=\"%(transport)s\">transport layer and protocols</a>\n"
 "make it somewhat difficult to identify I2P traffic:"
@@ -11969,8 +10232,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:636
 msgid ""
-"DH key exchange with no protocol bytes or other unencrypted constant "
-"fields"
+"DH key exchange with no protocol bytes or other unencrypted constant fields"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:639
@@ -11979,14 +10241,13 @@ msgid ""
 "Simultaneous use of both\n"
 "<a href=\"%(ntcp)s\">TCP</a> and\n"
 "<a href=\"%(ssu)s\">UDP</a> transports.\n"
-"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to"
-" track."
+"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:647
 msgid ""
-"In the near future, we plan to directly address traffic analysis issues "
-"by further obfuscation of I2P transport protocols, possibly including:"
+"In the near future, we plan to directly address traffic analysis issues by "
+"further obfuscation of I2P transport protocols, possibly including:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:651
@@ -12003,20 +10264,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:657
 msgid ""
-"Development of additional transport methods that mimic SSL or other "
-"common protocols"
+"Development of additional transport methods that mimic SSL or other common "
+"protocols"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:660
 msgid ""
-"Review of padding strategies at higher layers to see how they affect "
-"packet sizes at the transport layer"
+"Review of padding strategies at higher layers to see how they affect packet "
+"sizes at the transport layer"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:663
 msgid ""
-"Review of methods implemented by various state-level firewalls to block "
-"Tor"
+"Review of methods implemented by various state-level firewalls to block Tor"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:666
@@ -12032,36 +10292,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:680
 msgid ""
-"Sybil describes a category of attacks where the adversary creates "
-"arbitrarily\n"
+"Sybil describes a category of attacks where the adversary creates arbitrarily\n"
 "large numbers of colluding nodes and uses the increased numbers to help \n"
-"mounting other attacks.  For instance, if an attacker is in a network "
-"where peers\n"
-"are selected randomly and they want an 80&#37; chance to be one of those "
-"peers, they\n"
-"simply create five times the number of nodes that are in the network and "
-"roll \n"
-"the dice.  When identity is free, Sybil can be a very potent technique "
-"for a \n"
-"powerful adversary.  The primary technique to address this is simply to "
-"make \n"
-"identity 'non free' - <a "
-"href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n"
+"mounting other attacks.  For instance, if an attacker is in a network where peers\n"
+"are selected randomly and they want an 80&#37; chance to be one of those peers, they\n"
+"simply create five times the number of nodes that are in the network and roll \n"
+"the dice.  When identity is free, Sybil can be a very potent technique for a \n"
+"powerful adversary.  The primary technique to address this is simply to make \n"
+"identity 'non free' - <a href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n"
 "(among others) uses the fact that IP addresses are limited, while \n"
 "IIP used \n"
-"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for "
-"creating a new\n"
-"identity.  We currently have not implemented any particular technique to "
-"address\n"
+"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for creating a new\n"
+"identity.  We currently have not implemented any particular technique to address\n"
 "Sybil, but do include placeholder certificates in the router's and \n"
-"destination's data structures which can contain a HashCash certificate of"
-" \n"
-"appropriate value when necessary (or some other certificate proving "
-"scarcity)."
+"destination's data structures which can contain a HashCash certificate of \n"
+"appropriate value when necessary (or some other certificate proving scarcity)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:698
-msgid "Requiring HashCash Certificates in various places has two major problems:"
+msgid ""
+"Requiring HashCash Certificates in various places has two major problems:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:702
@@ -12071,17 +10321,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:705
 msgid ""
 "The classic HashCash problem -\n"
-"selecting HashCash values that are meaningful proofs of work on high-end "
-"machines,\n"
+"selecting HashCash values that are meaningful proofs of work on high-end machines,\n"
 "while still being feasible on low-end machines such as mobile devices."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:712
 msgid ""
-"Various limitations on the number of routers in a given IP range restrict"
-"\n"
-"the vulnerability to attackers that don't have the ability to put "
-"machines\n"
+"Various limitations on the number of routers in a given IP range restrict\n"
+"the vulnerability to attackers that don't have the ability to put machines\n"
 "in several IP blocks.\n"
 "However, this is not a meaningful defense against a powerful adversary."
 msgstr ""
@@ -12103,22 +10350,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:733
 #, python-format
 msgid ""
-"By refusing to accept or forward tunnel build requests, except to a "
-"colluding peer, a router could ensure\n"
+"By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure\n"
 "that a tunnel is formed wholly from its set of colluding routers.\n"
-"The chances of success are enhanced if there is a large number of "
-"colluding routers,\n"
+"The chances of success are enhanced if there is a large number of colluding routers,\n"
 "i.e. a <a href=\"#sybil\">Sybil attack</a>.\n"
 "This is somewhat mitigated by our\n"
-"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor "
-"the performance\n"
+"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor the performance\n"
 "of peers.\n"
 "However, this is a powerful attack as the number of routers approaches\n"
 "<i>f</i> = 0.2, or 20&#37; malicious nodes, as specifed in the paper.\n"
-"The malicous routers could also maintain connections to the target router"
-" and provide\n"
-"excellent forwarding bandwidth for traffic over those connections, in an "
-"attempt\n"
+"The malicous routers could also maintain connections to the target router and provide\n"
+"excellent forwarding bandwidth for traffic over those connections, in an attempt\n"
 "to manipulate the profiles managed by the target and appear attractive.\n"
 "Further research and defenses may be necessary."
 msgstr ""
@@ -12127,38 +10369,29 @@ msgstr ""
 #, python-format
 msgid ""
 "We use strong cryptography with long keys, and\n"
-"we assume the security of the industry-standard cryptographic primitives "
-"used in I2P, as documented\n"
+"we assume the security of the industry-standard cryptographic primitives used in I2P, as documented\n"
 "<a href=\"%(cryptography)s\">on the low-level cryptography page</a>. \n"
 "Security features include the immediate detection of \n"
-"altered messages along the path, the inability to decrypt messages not "
-"addressed to you,\n"
+"altered messages along the path, the inability to decrypt messages not addressed to you,\n"
 "and defense against man-in-the-middle attacks.\n"
-"The key sizes chosen in 2003 were quite conservative at the time, and are"
-" still longer than\n"
-"those used in <a href=\"https://torproject.org/\">other anonymity "
-"networks</a>.\n"
+"The key sizes chosen in 2003 were quite conservative at the time, and are still longer than\n"
+"those used in <a href=\"https://torproject.org/\">other anonymity networks</a>.\n"
 "We don't think the current key lengths are our biggest weakness,\n"
 "especially for traditional, non-state-level adversaries;\n"
 "bugs and the small size of the network are much more worrisome.\n"
-"Of course, all cryptographic algorithms eventually become obsolete due to"
-"\n"
-"the advent of faster processors, cryptographic research, and advancements"
-" in\n"
+"Of course, all cryptographic algorithms eventually become obsolete due to\n"
+"the advent of faster processors, cryptographic research, and advancements in\n"
 "methods such as rainbow tables, clusters of video game hardware, etc.\n"
-"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys"
-" or change\n"
+"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change\n"
 "shared secret values while maintaining backward compatibility."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:773
 #, python-format
 msgid ""
-"Upgrading the various data structures and protocols to support longer "
-"keys\n"
+"Upgrading the various data structures and protocols to support longer keys\n"
 "will have to be tackled eventually, and this will be a\n"
-"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be "
-"for \n"
+"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be for \n"
 "<a href=\"https://torproject.org/\">others</a>.\n"
 "Hopefully, through careful planning, we can minimize the disruption, and\n"
 "implement mechanisms to make it easier for future transitions."
@@ -12167,12 +10400,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:782
 msgid ""
 "In the future, several I2P protocols and data structures\n"
-"support securely padding messages to arbitrary sizes, so messages could "
-"be made constant\n"
-"size or garlic messages could be modified randomly so that some cloves "
-"appear to contain\n"
-"more subcloves than they actually do.  At the moment, however, garlic, "
-"tunnel, and \n"
+"support securely padding messages to arbitrary sizes, so messages could be made constant\n"
+"size or garlic messages could be modified randomly so that some cloves appear to contain\n"
+"more subcloves than they actually do.  At the moment, however, garlic, tunnel, and \n"
 "end to end messages include simple random padding."
 msgstr ""
 
@@ -12186,18 +10416,14 @@ msgid ""
 "In addition to the floodfill DOS attacks described\n"
 "<a href=\"#ffdos\">above</a>, floodfill routers are uniquely positioned\n"
 "to learn about network participants, due to their role\n"
-"in the netDb, and the high frequency of communication with those "
-"participants.\n"
-"This is somewhat mitigated because floodfill routers only manage a "
-"portion\n"
+"in the netDb, and the high frequency of communication with those participants.\n"
+"This is somewhat mitigated because floodfill routers only manage a portion\n"
 "of the total keyspace, and the keyspace rotates daily, as explained \n"
 "on the <a href=\"%(netdb)s#threat\">network database page</a>.\n"
-"The specific mechanisms by which routers communicate with floodfills have"
-" been\n"
+"The specific mechanisms by which routers communicate with floodfills have been\n"
 "<a href=\"%(netdb)s#delivery\">carefully designed</a>.\n"
 "However, these threats should be studied further.\n"
-"The specific potential threats and corresponding defenses are a topic for"
-" future research."
+"The specific potential threats and corresponding defenses are a topic for future research."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:812
@@ -12216,33 +10442,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:826
 msgid ""
-"There are a few centralized or limited resources (some inside I2P, some "
-"not)\n"
+"There are a few centralized or limited resources (some inside I2P, some not)\n"
 "that could be attacked or used as a vector for attacks.\n"
-"The absence of jrandom starting November 2007, followed by the loss of "
-"the i2p.net hosting service in January 2008,\n"
-"highlighted numerous centralized resources in the development and "
-"operation of the I2P network,\n"
+"The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,\n"
+"highlighted numerous centralized resources in the development and operation of the I2P network,\n"
 "most of which are now distributed.\n"
-"Attacks on externally-reachable resources mainly affect the ability of "
-"new users to find us,\n"
+"Attacks on externally-reachable resources mainly affect the ability of new users to find us,\n"
 "not the operation of the network itself."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:836
 #, python-format
 msgid ""
-"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin"
-" for external public access."
+"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin "
+"for external public access."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:839
 #, python-format
 msgid ""
-"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed "
-"locations</a>,\n"
-"however more reseed hosts may be needed, and the handling of unreliable "
-"or malicious\n"
+"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed locations</a>,\n"
+"however more reseed hosts may be needed, and the handling of unreliable or malicious\n"
 "reseed hosts may need improvement."
 msgstr ""
 
@@ -12258,10 +10478,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:851
 msgid ""
-"Routers now better handle <a href=\"#ffdos\">multiple unreliable "
-"floodfill peers</a>.\n"
-"Malicious floodfills <a href=\"#ffdos\">needs</a> <a "
-"href=\"#floodfill\">more</a> study."
+"Routers now better handle <a href=\"#ffdos\">multiple unreliable floodfill peers</a>.\n"
+"Malicious floodfills <a href=\"#ffdos\">needs</a> <a href=\"#floodfill\">more</a> study."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:855
@@ -12273,47 +10491,35 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:858
 msgid ""
-"Routers rely on a single news host, but there is a hardcoded backup URL "
-"pointing to a different host.\n"
+"Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.\n"
 "A malicious news host could feed a huge file, need to limit the size."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:862
 #, python-format
 msgid ""
-"<a href=\"%(naming)s\">Naming system services</a>, including address book"
-" subscription providers, add-host services,\n"
-"and jump services, could be malicious. Substantial protections for "
-"subscriptions were implemented\n"
-"in release 0.6.1.31, with additional enhancements in subsequent releases."
-"\n"
+"<a href=\"%(naming)s\">Naming system services</a>, including address book subscription providers, add-host services,\n"
+"and jump services, could be malicious. Substantial protections for subscriptions were implemented\n"
+"in release 0.6.1.31, with additional enhancements in subsequent releases.\n"
 "However, all naming services require some measure of trust, see\n"
 "<a href=\"%(naming)s\">the naming page</a> for details."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:869
 msgid ""
-"We remain reliant on the DNS service for i2p2.de, losing this would cause"
-" substantial\n"
+"We remain reliant on the DNS service for i2p2.de, losing this would cause substantial\n"
 "disruption in our ability to attract new users,\n"
-"and would shrink the network (in the short-to-medium term), just as the "
-"loss of i2p.net did."
+"and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:881
 msgid ""
-"These attacks aren't directly on the network, but instead go after its "
-"development team \n"
-"by either introducing legal hurdles on anyone contributing to the "
-"development\n"
-"of the software, or by using whatever means are available to get the "
-"developers to \n"
-"subvert the software.  Traditional technical measures cannot defeat these"
-" attacks, and\n"
-"if someone threatened the life or livelihood of a developer (or even just"
-" issuing a \n"
-"court order along with a gag order, under threat of prison), we would "
-"have a big problem."
+"These attacks aren't directly on the network, but instead go after its development team \n"
+"by either introducing legal hurdles on anyone contributing to the development\n"
+"of the software, or by using whatever means are available to get the developers to \n"
+"subvert the software.  Traditional technical measures cannot defeat these attacks, and\n"
+"if someone threatened the life or livelihood of a developer (or even just issuing a \n"
+"court order along with a gag order, under threat of prison), we would have a big problem."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:890
@@ -12323,26 +10529,19 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/threat-model.html:894
 #, python-format
 msgid ""
-"All components of the network must be open source to enable inspection, "
-"verification, \n"
-"modification, and improvement.  If a developer is compromised, once it is"
-" noticed \n"
-"the community should demand explanation and cease to accept that "
-"developer's work.\n"
-"All checkins to our <a href=\"%(monotone)s\">distributed source control "
-"system</a>\n"
-"are cryptographically signed, and the release packagers use a trust-list "
-"system\n"
+"All components of the network must be open source to enable inspection, verification, \n"
+"modification, and improvement.  If a developer is compromised, once it is noticed \n"
+"the community should demand explanation and cease to accept that developer's work.\n"
+"All checkins to our <a href=\"%(monotone)s\">distributed source control system</a>\n"
+"are cryptographically signed, and the release packagers use a trust-list system\n"
 "to restrict modifications to those previously approved."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:902
 #, python-format
 msgid ""
-"Development over the network itself, allowing developers to stay "
-"anonymous but still \n"
-"secure the development process.  All I2P development can occur through "
-"I2P - using\n"
+"Development over the network itself, allowing developers to stay anonymous but still \n"
+"secure the development process.  All I2P development can occur through I2P - using\n"
 "a <a href=\"%(monotone)s\">distributed source control system</a>,\n"
 "a distributed source control system, IRC chat,\n"
 "public web servers,\n"
@@ -12352,8 +10551,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:913
 msgid ""
-"We also maintain relationships with various organizations that offer "
-"legal advice,\n"
+"We also maintain relationships with various organizations that offer legal advice,\n"
 "should any defense be necessary."
 msgstr ""
 
@@ -12363,52 +10561,38 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:922
 msgid ""
-"Try as we might, most nontrivial applications include errors in the "
-"design or \n"
-"implementation, and I2P is no exception.  There may be bugs that could be"
-" exploited to \n"
-"attack the anonymity or security of the communication running over I2P in"
-" unexpected \n"
-"ways.  To help withstand attacks against the design or protocols in use, "
-"we publish \n"
+"Try as we might, most nontrivial applications include errors in the design or \n"
+"implementation, and I2P is no exception.  There may be bugs that could be exploited to \n"
+"attack the anonymity or security of the communication running over I2P in unexpected \n"
+"ways.  To help withstand attacks against the design or protocols in use, we publish \n"
 "all designs and documentation and solicit review and criticism with \n"
 "the hope that many eyes will improve the system.\n"
 "We do not believe in\n"
-"<a href=\"http://www.haystacknetwork.com/\">security through "
-"obscurity</a>."
+"<a href=\"http://www.haystacknetwork.com/\">security through obscurity</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:933
 msgid ""
 "In addition, the code is being \n"
-"treated the same way, with little aversion towards reworking or throwing "
-"out \n"
-"something that isn't meeting the needs of the software system (including "
-"ease of \n"
-"modification).  Documentation for the design and implementation of the "
-"network and \n"
-"the software components are an essential part of security, as without "
-"them it is \n"
-"unlikely that developers would be willing to spend the time to learn the "
-"software \n"
+"treated the same way, with little aversion towards reworking or throwing out \n"
+"something that isn't meeting the needs of the software system (including ease of \n"
+"modification).  Documentation for the design and implementation of the network and \n"
+"the software components are an essential part of security, as without them it is \n"
+"unlikely that developers would be willing to spend the time to learn the software \n"
 "enough to identify shortcomings and bugs."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:943
 msgid ""
-"Our software is likely, in particular, to contain bugs related to denial "
-"of service\n"
-"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues  "
-"in the router console,\n"
-"and other vulnerabilities to non-standard inputs via the various "
-"protocols."
+"Our software is likely, in particular, to contain bugs related to denial of service\n"
+"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues  in the router console,\n"
+"and other vulnerabilities to non-standard inputs via the various protocols."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:949
 #, python-format
 msgid ""
-"I2P is still a small network with a small development community and "
-"almost no\n"
+"I2P is still a small network with a small development community and almost no\n"
 "interest from academic or research groups.\n"
 "Therefore we lack the analysis that\n"
 "<a href=\"https://torproject.org/\">other anonymity networks</a>\n"
@@ -12422,18 +10606,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:963
 msgid ""
-"To some extent, I2P could be enhanced to avoid peers operating at IP "
-"addresses\n"
-"listed in a blocklist. Several blocklists are commonly available in "
-"standard formats,\n"
-"listing anti-P2P organizations, potential state-level adversaries, and "
-"others."
+"To some extent, I2P could be enhanced to avoid peers operating at IP addresses\n"
+"listed in a blocklist. Several blocklists are commonly available in standard formats,\n"
+"listing anti-P2P organizations, potential state-level adversaries, and others."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:969
 msgid ""
-"To the extent that active peers actually do show up in the actual "
-"blocklist,\n"
+"To the extent that active peers actually do show up in the actual blocklist,\n"
 "blocking by only a subset of peers would tend to segment the network,\n"
 "exacerbate reachability problems, and decrease overall reliability.\n"
 "Therefore we would want to agree on a particular blocklist and\n"
@@ -12442,8 +10622,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:977
 msgid ""
-"Blocklists are only a part (perhaps a small part) of an array of defenses"
-"\n"
+"Blocklists are only a part (perhaps a small part) of an array of defenses\n"
 "against maliciousness.\n"
 "In large part the profiling system does a good job of measuring\n"
 "router behavior so that we don't need to trust anything in netDb.\n"
@@ -12456,8 +10635,7 @@ msgid ""
 "If a blocklist is hosted at a central location with automatic updates\n"
 "the network is vulnerable to a\n"
 "<a href=\"#central\">central resource attack</a>.\n"
-"Automatic subscription to a list gives the list provider the power to "
-"shut\n"
+"Automatic subscription to a list gives the list provider the power to shut\n"
 "the i2p network down. Completely."
 msgstr ""
 
@@ -12466,8 +10644,7 @@ msgid ""
 "Currently, a default blocklist is distributed with our software,\n"
 "listing only the IPs of past DOS sources.\n"
 "There is no automatic update mechanism.\n"
-"Should a particular IP range implement serious attacks on the I2P "
-"network,\n"
+"Should a particular IP range implement serious attacks on the I2P network,\n"
 "we would have to ask people to update their blocklist manually through\n"
 "out-of-band mechanisms such as forums, blogs, etc."
 msgstr ""
@@ -12482,30 +10659,27 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:7
 msgid ""
-"This page contains an overview of I2P tunnel terminology and operation, "
-"with\n"
+"This page contains an overview of I2P tunnel terminology and operation, with\n"
 "links to more technical pages, details, and specifications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:12
 #, python-format
 msgid ""
-"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P "
-"builds virtual \"tunnels\" -\n"
-"temporary and unidirectional paths through a sequence of routers.  These"
-" \n"
+"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P builds virtual \"tunnels\" -\n"
+"temporary and unidirectional paths through a sequence of routers.  These \n"
 "tunnels are classified as either inbound tunnels (where everything \n"
 "given to it goes towards the creator of the tunnel) or outbound tunnels\n"
 "(where the tunnel creator shoves messages away from them).  When Alice\n"
 "wants to send a message to Bob, she will (typically) send it out one of\n"
-"her existing outbound tunnels with instructions for that tunnel's "
-"endpoint\n"
+"her existing outbound tunnels with instructions for that tunnel's endpoint\n"
 "to forward it to the gateway router for one of Bob's current inbound \n"
 "tunnels, which in turn passes it to Bob."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:25
-msgid "Alice connecting through her outbound tunnel to Bob via his inbound tunnel"
+msgid ""
+"Alice connecting through her outbound tunnel to Bob via his inbound tunnel"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:27
@@ -12541,8 +10715,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:38
 #, python-format
 msgid ""
-"<b>Tunnel gateway</b> - the first router in a tunnel.  For inbound "
-"tunnels,\n"
+"<b>Tunnel gateway</b> - the first router in a tunnel.  For inbound tunnels,\n"
 "this is the one mentioned in the LeaseSet published in the\n"
 "<a href=\"%(netdb)s\">network database</a>.  For outbound tunnels, the\n"
 "gateway is the originating router.  (e.g. both A and D above)"
@@ -12550,21 +10723,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:44
 msgid ""
-"<b>Tunnel endpoint</b> - the last router in a tunnel.  (e.g. both C and F"
-" above)"
+"<b>Tunnel endpoint</b> - the last router in a tunnel.  (e.g. both C and F "
+"above)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:45
 msgid ""
-"<b>Tunnel participant</b> - all routers in a tunnel except for the "
-"gateway or\n"
+"<b>Tunnel participant</b> - all routers in a tunnel except for the gateway or\n"
 "endpoint (e.g. both B and E above)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:49
 msgid ""
-"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router "
-"jumps, e.g.:"
+"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router jumps,"
+" e.g.:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:51
@@ -12579,8 +10751,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:53
 msgid ""
-"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one "
-"intermediate\n"
+"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one intermediate\n"
 "tunnel participant. (the above diagram includes two 2-hop tunnels - one\n"
 "outbound from Alice, one inbound to Bob)"
 msgstr ""
@@ -12588,10 +10759,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:60
 #, python-format
 msgid ""
-"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 "
-"byte integer</a>\n"
-"different for each hop in a tunnel, and unique among all tunnels on a "
-"router.\n"
+"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 byte integer</a>\n"
+"different for each hop in a tunnel, and unique among all tunnels on a router.\n"
 "Chosen randomly by the tunnel creator."
 msgstr ""
 
@@ -12602,8 +10771,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:68
 #, python-format
 msgid ""
-"Routers performing the three roles (gateway, participant, endpoint) are "
-"given\n"
+"Routers performing the three roles (gateway, participant, endpoint) are given\n"
 "different pieces of data in the initial\n"
 "<a href=\"%(tunnelcreation)s\">Tunnel Build Message</a>\n"
 "to accomplish their tasks:"
@@ -12617,9 +10785,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:97
 #, python-format
 msgid ""
-"<b>tunnel encryption key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"encrypting\n"
+"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n"
 "messages and instructions to the next hop"
 msgstr ""
 
@@ -12627,9 +10793,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:101
 #, python-format
 msgid ""
-"<b>tunnel IV key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"double-encrypting\n"
+"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n"
 "the IV to the next hop"
 msgstr ""
 
@@ -12637,9 +10801,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:105
 #, python-format
 msgid ""
-"<b>reply key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for "
-"encrypting\n"
+"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n"
 "the reply to the tunnel build request"
 msgstr ""
 
@@ -12656,8 +10818,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:91
 msgid ""
-"<b>next hop</b> - what router is the next one in the path (unless this is"
-" a 0-hop tunnel, and the gateway is also the endpoint)"
+"<b>next hop</b> - what router is the next one in the path (unless this is a "
+"0-hop tunnel, and the gateway is also the endpoint)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:92
@@ -12684,27 +10846,21 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:117
 #, python-format
 msgid ""
-"<b>tunnel encryption key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"encrypting\n"
+"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n"
 "messages and instructions to the the endpoint (itself)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:121
 #, python-format
 msgid ""
-"<b>tunnel IV key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for "
-"double-encrypting\n"
+"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n"
 "the IV to the endpoint (itself)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:125
 #, python-format
 msgid ""
-"<b>reply key</b> - an <a "
-"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for "
-"encrypting\n"
+"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n"
 "the reply to the tunnel build request (outbound endpoints only)"
 msgstr ""
 
@@ -12720,8 +10876,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:131
 msgid ""
-"<b>reply router</b> - the inbound gateway of the tunnel to send the reply"
-" through (outbound endpoints only)"
+"<b>reply router</b> - the inbound gateway of the tunnel to send the reply "
+"through (outbound endpoints only)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:132
@@ -12744,8 +10900,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:143
 #, python-format
 msgid ""
-"Several tunnels for a particular purpose may be grouped into a \"tunnel "
-"pool\",\n"
+"Several tunnels for a particular purpose may be grouped into a \"tunnel pool\",\n"
 "as described in the\n"
 "<a href=\"%(tunnelimpl)s#tunnel.pooling\">tunnel specification</a>.\n"
 "This provides redundancy and additional bandwidth.\n"
@@ -12760,20 +10915,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:155
 #, python-format
 msgid ""
-"As mentioned above, each client requests that their router provide "
-"tunnels to\n"
+"As mentioned above, each client requests that their router provide tunnels to\n"
 "include at least a certain number of hops.\n"
 "The decision as to how many routers\n"
-"to have in one's outbound and inbound tunnels has an important effect "
-"upon the\n"
-"latency, throughput, reliability, and anonymity provided by I2P - the "
-"more peers\n"
-"that messages have to go through, the longer it takes to get there and "
-"the more\n"
-"likely that one of those routers will fail prematurely.  The less routers"
-" in a\n"
-"tunnel, the easier it is for an adversary to mount traffic analysis "
-"attacks and\n"
+"to have in one's outbound and inbound tunnels has an important effect upon the\n"
+"latency, throughput, reliability, and anonymity provided by I2P - the more peers\n"
+"that messages have to go through, the longer it takes to get there and the more\n"
+"likely that one of those routers will fail prematurely.  The less routers in a\n"
+"tunnel, the easier it is for an adversary to mount traffic analysis attacks and\n"
 "pierce someone's anonymity.\n"
 "Tunnel lengths are specified by clients via\n"
 "<a href=\"%(i2cp)s#options\">I2CP options</a>.\n"
@@ -12787,18 +10936,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:172
 msgid ""
 "With no remote routers in a tunnel, the user has very basic plausible\n"
-"deniability (since no one knows for sure that the peer that sent them the"
-"\n"
-"message wasn't simply just forwarding it on as part of the tunnel). "
-"However, it\n"
-"would be fairly easy to mount a statistical analysis attack and notice "
-"that\n"
-"messages targeting a specific destination are always sent through a "
-"single\n"
-"gateway.  Statistical analysis against outbound 0-hop tunnels are more "
-"complex,\n"
-"but could show similar information (though would be slightly harder to "
-"mount)."
+"deniability (since no one knows for sure that the peer that sent them the\n"
+"message wasn't simply just forwarding it on as part of the tunnel). However, it\n"
+"would be fairly easy to mount a statistical analysis attack and notice that\n"
+"messages targeting a specific destination are always sent through a single\n"
+"gateway.  Statistical analysis against outbound 0-hop tunnels are more complex,\n"
+"but could show similar information (though would be slightly harder to mount)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:182
@@ -12809,14 +10952,10 @@ msgstr ""
 #, python-format
 msgid ""
 "With only one remote router in a tunnel, the user has both plausible\n"
-"deniability and basic anonymity, as long as they are not up against an "
-"internal\n"
-"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>)."
-" However,\n"
-"if the adversary ran a sufficient number of routers such that the single "
-"remote\n"
-"router in the tunnel is often one of those compromised ones, they would "
-"be able\n"
+"deniability and basic anonymity, as long as they are not up against an internal\n"
+"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>). However,\n"
+"if the adversary ran a sufficient number of routers such that the single remote\n"
+"router in the tunnel is often one of those compromised ones, they would be able\n"
 "to mount the above statistical traffic analysis attack."
 msgstr ""
 
@@ -12826,10 +10965,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:193
 msgid ""
-"With two or more remote routers in a tunnel, the costs of mounting the "
-"traffic\n"
-"analysis attack increases, since many remote routers would have to be "
-"compromised\n"
+"With two or more remote routers in a tunnel, the costs of mounting the traffic\n"
+"analysis attack increases, since many remote routers would have to be compromised\n"
 "to mount it."
 msgstr ""
 
@@ -12843,8 +10980,7 @@ msgid ""
 "To reduce the susceptibility to <a href=\"%(url)s\">some attacks</a>,\n"
 "3 or more hops are recommended for the highest level of protection.\n"
 "<a href=\"%(url)s\">Recent studies</a>\n"
-"also conclude that more than 3 hops does not provide additional "
-"protection."
+"also conclude that more than 3 hops does not provide additional protection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:208
@@ -12868,15 +11004,12 @@ msgstr ""
 #, python-format
 msgid ""
 "All tunnels are periodically tested by their creator by sending a\n"
-"DeliveryStatusMessage out an outbound tunnel and bound for another "
-"inbound tunnel\n"
-"(testing both tunnels at once).  If either fails a number of consecutive "
-"tests, it is marked as no longer\n"
+"DeliveryStatusMessage out an outbound tunnel and bound for another inbound tunnel\n"
+"(testing both tunnels at once).  If either fails a number of consecutive tests, it is marked as no longer\n"
 "functional. If it was used for a client's inbound tunnel, a new leaseSet\n"
 "is created.\n"
 "Tunnel test failures are also reflected in the\n"
-"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer "
-"profile</a>."
+"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer profile</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:230
@@ -12886,14 +11019,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:231
 #, python-format
 msgid ""
-"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic "
-"routing</a>\n"
-"a Tunnel Build Message to a router, requesting that they participate in "
-"the\n"
-"tunnel (providing them with all of the appropriate information, as above,"
-" along\n"
-"with a certificate, which right now is a 'null' cert, but will support "
-"hashcash\n"
+"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic routing</a>\n"
+"a Tunnel Build Message to a router, requesting that they participate in the\n"
+"tunnel (providing them with all of the appropriate information, as above, along\n"
+"with a certificate, which right now is a 'null' cert, but will support hashcash\n"
 "or other non-free certificates when necessary).\n"
 "That router forwards the message to the next hop in the tunnel.\n"
 "Details are in the\n"
@@ -12903,8 +11032,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:245
 #, python-format
 msgid ""
-"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic"
-" encryption</a>\n"
+"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic encryption</a>\n"
 "of tunnel messages.\n"
 "Details are in the\n"
 "<a href=\"%(tunnelimpl)s\">tunnel specification</a>.\n"
@@ -12925,8 +11053,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:267
 msgid ""
 "In a distant future release,\n"
-"options specifying the pooling, mixing, and chaff generation settings may"
-" be implemented."
+"options specifying the pooling, mixing, and chaff generation settings may be implemented."
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/tunnel-routing.html:272
@@ -12969,20 +11096,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:6
 msgid ""
-"The I2P Client Protocol (I2CP) exposes a strong separation of concerns "
-"between\n"
-"the router and any client that wishes to communicate over the network.  "
-"It enables\n"
-"secure and asynchronous messaging by sending and receiving messages over "
-"a \n"
+"The I2P Client Protocol (I2CP) exposes a strong separation of concerns between\n"
+"the router and any client that wishes to communicate over the network.  It enables\n"
+"secure and asynchronous messaging by sending and receiving messages over a \n"
 "single TCP socket.\n"
 "With I2CP, a client application tells the\n"
-"router who they are (their \"destination\"), what anonymity, reliability,"
-" and \n"
-"latency tradeoffs to make, and where to send messages.  In turn the "
-"router uses\n"
-"I2CP to tell the client when any messages have arrived, and to request "
-"authorization\n"
+"router who they are (their \"destination\"), what anonymity, reliability, and \n"
+"latency tradeoffs to make, and where to send messages.  In turn the router uses\n"
+"I2CP to tell the client when any messages have arrived, and to request authorization\n"
 "for some tunnels to be used."
 msgstr ""
 
@@ -12991,10 +11112,8 @@ msgstr ""
 msgid ""
 "The protocol itself is implemented in Java, to provide the\n"
 "<a href=\"%(url)s\">Client SDK</a>.\n"
-"This SDK is exposed in the i2p.jar package, which implements the client-"
-"side of I2CP.\n"
-"Clients should never need to access the router.jar package, which "
-"contains the\n"
+"This SDK is exposed in the i2p.jar package, which implements the client-side of I2CP.\n"
+"Clients should never need to access the router.jar package, which contains the\n"
 "router itself and the router-side of I2CP.\n"
 "There is also a <a href=\"%(libi2cp)s\">C library implementation</a>.\n"
 "A non-Java client would also have to implement the\n"
@@ -13005,45 +11124,35 @@ msgstr ""
 #, python-format
 msgid ""
 "Applications can take advantage of the base I2CP plus the \n"
-"<a href=\"%(streaming)s\">streaming</a> and <a "
-"href=\"%(datagrams)s\">datagram</a> libraries\n"
-"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a "
-"href=\"%(bob)s\">BOB</a> protocols,\n"
+"<a href=\"%(streaming)s\">streaming</a> and <a href=\"%(datagrams)s\">datagram</a> libraries\n"
+"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a href=\"%(bob)s\">BOB</a> protocols,\n"
 "which do not require clients to deal with any sort of cryptography.\n"
 "Also, clients may access the network by one of several proxies -\n"
 "HTTP, CONNECT, and SOCKS 4/4a/5.\n"
-"Alternatively, Java clients may access those libraries in "
-"ministreaming.jar and streaming.jar.\n"
+"Alternatively, Java clients may access those libraries in ministreaming.jar and streaming.jar.\n"
 "So there are several options for both Java and non-Java applications."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:43
 #, python-format
 msgid ""
-"Client-side end-to-end encryption (encrypting the data over the I2CP "
-"connection)\n"
+"Client-side end-to-end encryption (encrypting the data over the I2CP connection)\n"
 "was disabled in I2P release 0.6,\n"
-"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end "
-"encryption</a>\n"
+"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end encryption</a>\n"
 "which is implemented in the router.\n"
 "The only cryptography that client libraries must still implement is\n"
 "<a href=\"%(cryptography)s#DSA\">DSA public/private key signing</a>\n"
 "for <a href=\"%(i2cp)s#msg_CreateLeaseSet\">LeaseSets</a> and\n"
-"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and"
-" management of those keys."
+"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and management of those keys."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:56
 msgid ""
-"In a standard I2P installation, port 7654 is used by external java "
-"clients to communicate\n"
+"In a standard I2P installation, port 7654 is used by external java clients to communicate\n"
 "with the local router via I2CP.\n"
-"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, "
-"set the\n"
-"router advanced configuration option "
-"<tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n"
-"Clients in the same JVM as the router pass messages directly to the "
-"router\n"
+"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n"
+"router advanced configuration option <tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n"
+"Clients in the same JVM as the router pass messages directly to the router\n"
 "through an internal JVM interface."
 msgstr ""
 
@@ -13051,13 +11160,10 @@ msgstr ""
 #, python-format
 msgid ""
 "The router also supports external connections over SSL.\n"
-"While SSL is not the default, it is strongly recommended for any traffic "
-"that may\n"
-"be exposed to the open Internet. The authorization user/password (if "
-"any), the\n"
+"While SSL is not the default, it is strongly recommended for any traffic that may\n"
+"be exposed to the open Internet. The authorization user/password (if any), the\n"
 "<a href=\"%(commonstructures)s#type_PrivateKey\">Private Key</a> and\n"
-"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private "
-"Key</a> for the\n"
+"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private Key</a> for the\n"
 "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n"
 "are all transmitted in-the-clear unless SSL is enabled."
 msgstr ""
@@ -13078,19 +11184,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:82
 #, python-format
 msgid ""
-"When a client connects to the router, it first sends a single protocol "
-"version byte (0x2A).\n"
-"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and "
-"waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> "
-"response.\n"
-"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession "
-"Message</a> containing the session configuration.\n"
-"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet"
-" Message</a> from the router, indicating that inbound tunnels\n"
-"have been built, and responds with a CreateLeaseSetMessage containing the"
-" signed LeaseSet.\n"
-"The client may now initiate or receive connections from other I2P "
-"destinations."
+"When a client connects to the router, it first sends a single protocol version byte (0x2A).\n"
+"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> response.\n"
+"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> containing the session configuration.\n"
+"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet Message</a> from the router, indicating that inbound tunnels\n"
+"have been built, and responds with a CreateLeaseSetMessage containing the signed LeaseSet.\n"
+"The client may now initiate or receive connections from other I2P destinations."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:91
@@ -13106,10 +11205,7 @@ msgstr ""
 #, python-format
 msgid ""
 "The following options are traditionally passed to the router via\n"
-"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained "
-"in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or "
-"a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession "
-"Message</a>."
+"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession Message</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:104
@@ -13142,14 +11238,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:167
 msgid ""
 "Number of ElGamal/AES Session Tags to send at a time.\n"
-"For clients with relatively low bandwidth per-client-pair (IRC, some UDP "
-"apps), this may be set lower."
+"For clients with relatively low bandwidth per-client-pair (IRC, some UDP apps), this may be set lower."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:179
 msgid ""
-"Comma-separated list of Base 64 Hashes of peers to build tunnels through;"
-" for debugging only"
+"Comma-separated list of Base 64 Hashes of peers to build tunnels through; "
+"for debugging only"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:188
@@ -13166,17 +11261,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:322
 msgid ""
 "Guaranteed is disabled;\n"
-"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1,"
-" the client side default is None as of 0.9.4"
+"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1, the client side default is None as of 0.9.4"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:334
 msgid ""
 "For authorization, if required by the router.\n"
-"If the client is running in the same JVM as a router, this option is not "
-"required.\n"
-"Warning - username and password are sent in the clear to the router, "
-"unless using SSL (i2cp.SSL=true).\n"
+"If the client is running in the same JVM as a router, this option is not required.\n"
+"Warning - username and password are sent in the clear to the router, unless using SSL (i2cp.SSL=true).\n"
 "Authorization is only recommended when using SSL."
 msgstr ""
 
@@ -13250,8 +11342,7 @@ msgid ""
 "Random amount to add or subtract to the length of tunnels in.\n"
 "A positive number x means add a random amount from 0 to x inclusive.\n"
 "A negative number -x means add a random amount from -x to x inclusive.\n"
-"The router will limit the total length of the tunnel to 0 to 7 inclusive."
-"\n"
+"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n"
 "The default variance was 1 prior to release 0.7.6."
 msgstr ""
 
@@ -13260,16 +11351,14 @@ msgid ""
 "Random amount to add or subtract to the length of tunnels out.\n"
 "A positive number x means add a random amount from 0 to x inclusive.\n"
 "A negative number -x means add a random amount from -x to x inclusive.\n"
-"The router will limit the total length of the tunnel to 0 to 7 inclusive."
-"\n"
+"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n"
 "The default variance was 1 prior to release 0.7.6."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:464
 msgid ""
 "Name of tunnel - generally used in routerconsole, which will\n"
-"use the first few characters of the Base64 hash of the destination by "
-"default."
+"use the first few characters of the Base64 hash of the destination by default."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:476
@@ -13285,8 +11374,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:497
 msgid ""
 "Number of tunnels in.\n"
-"Limit was increased from 6 to 16 in release 0.9; however, numbers higher "
-"than 6 are\n"
+"Limit was increased from 6 to 16 in release 0.9; however, numbers higher than 6 are\n"
 "incompatible with older releases."
 msgstr ""
 
@@ -13301,32 +11389,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:538
 msgid ""
 "Any other options prefixed with \"inbound.\" are stored\n"
-"in the \"unknown options\" properties of the inbound tunnel pool's "
-"settings."
+"in the \"unknown options\" properties of the inbound tunnel pool's settings."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:550
 msgid ""
 "Any other options prefixed with \"outbound.\" are stored\n"
-"in the \"unknown options\" properties of the outbound tunnel pool's "
-"settings."
+"in the \"unknown options\" properties of the outbound tunnel pool's settings."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:562
 msgid ""
 "Set to false to disable ever bundling a reply LeaseSet.\n"
 "For clients that do not publish their LeaseSet, this option must be true\n"
-"for any reply to be possible. \"true\" is also recommended for multihomed"
-" servers\n"
+"for any reply to be possible. \"true\" is also recommended for multihomed servers\n"
 "with long connection times."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:569
 msgid ""
-"Setting to \"false\" may save significant outbound bandwidth, especially "
-"if\n"
-"the client is configured with a large number of inbound tunnels (Leases)."
-"\n"
+"Setting to \"false\" may save significant outbound bandwidth, especially if\n"
+"the client is configured with a large number of inbound tunnels (Leases).\n"
 "If replies are still required, this may shift the bandwidth burden to\n"
 "the far-end client and the floodfill.\n"
 "There are several cases where \"false\" may be appropriate:"
@@ -13342,14 +11425,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:579
 msgid ""
-"LeaseSet is published, client is a \"server\", all connections are "
-"inbound\n"
-"so the connecting far-end destination obviously has the leaseset already."
-"\n"
-"Connections are either short, or it is acceptable for latency on a long-"
-"lived\n"
-"connection to temporarily increase while the other end re-fetches the "
-"LeaseSet\n"
+"LeaseSet is published, client is a \"server\", all connections are inbound\n"
+"so the connecting far-end destination obviously has the leaseset already.\n"
+"Connections are either short, or it is acceptable for latency on a long-lived\n"
+"connection to temporarily increase while the other end re-fetches the LeaseSet\n"
 "after expiration.\n"
 "HTTP servers may fit these requirements."
 msgstr ""
@@ -13363,15 +11442,11 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:596
 #, python-format
 msgid ""
-"Note: As of release 0.7.7, option names and values must use UTF-8 "
-"encoding.\n"
+"Note: As of release 0.7.7, option names and values must use UTF-8 encoding.\n"
 "This is primarily useful for nicknames.\n"
-"Prior to that release, options with multi-byte characters were corrupted."
-"\n"
-"Since options are encoded in a <a "
-"href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n"
-"all option names and values are limited to 255 bytes (not characters) "
-"maximum."
+"Prior to that release, options with multi-byte characters were corrupted.\n"
+"Since options are encoded in a <a href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n"
+"all option names and values are limited to 255 bytes (not characters) maximum."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:610
@@ -13382,8 +11457,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:611
 msgid ""
 "The following options are interpreted on the client side,\n"
-"and will be interpreted if passed to the I2PSession via the "
-"I2PClient.createSession() call.\n"
+"and will be interpreted if passed to the I2PSession via the I2PClient.createSession() call.\n"
 "The streaming lib should also pass these options through to I2CP.\n"
 "Other implementations may have different defaults."
 msgstr ""
@@ -13459,28 +11533,24 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:871
 msgid ""
 "Connect to the router using SSL.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:883
 msgid ""
 "Router hostname.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:895
 msgid ""
 "Router I2CP port.\n"
-"If the client is running in the same JVM as a router, this option is "
-"ignored, and the client connects to that router internally."
+"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:902
 msgid ""
-"Note: All arguments, including numbers, are strings. True/false values "
-"are case-insensitive strings.\n"
+"Note: All arguments, including numbers, are strings. True/false values are case-insensitive strings.\n"
 "Anything other than case-insensitive \"true\" is interpreted as false.\n"
 "All option names are case-sensitive."
 msgstr ""
@@ -13492,28 +11562,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:909
 #, python-format
 msgid ""
-"The end-to-end messages handled by I2CP (i.e. the data sent by the client"
-" in a\n"
+"The end-to-end messages handled by I2CP (i.e. the data sent by the client in a\n"
 "<a href=\"%(i2cp)s#msg_SendMessage\">SendMessageMessage</a>\n"
 "and received by the client in a\n"
 "<a href=\"%(i2cp)s#msg_MessagePayload\">MessagePayloadMessage</a>)\n"
 "are gzipped with a standard 10-byte gzip\n"
 "header beginning with 0x1F 0x8B 0x08 as\n"
-"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC "
-"1952</a>.\n"
-"As of release 0.7.1, I2P uses ignored portions of the gzip header to "
-"include\n"
-"protocol, from-port, and to-port information, thus supporting streaming "
-"and\n"
-"datagrams on the same destination, and allowing query/response using "
-"datagrams\n"
+"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC 1952</a>.\n"
+"As of release 0.7.1, I2P uses ignored portions of the gzip header to include\n"
+"protocol, from-port, and to-port information, thus supporting streaming and\n"
+"datagrams on the same destination, and allowing query/response using datagrams\n"
 "to work reliably in the presence of multiple channels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:923
 msgid ""
-"The gzip function cannot be completely turned off, however setting "
-"i2cp.gzip=false\n"
+"The gzip function cannot be completely turned off, however setting i2cp.gzip=false\n"
 "turns the gzip effort setting to 0, which may save a little CPU."
 msgstr ""
 
@@ -13547,7 +11611,8 @@ msgid "Gzip xflags"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:960
-msgid "I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)"
+msgid ""
+"I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2cp.html:969
@@ -13572,8 +11637,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2cp.html:987
 #, python-format
 msgid ""
-"Some improvements may be able to use messages previously defined but not "
-"implemented.\n"
+"Some improvements may be able to use messages previously defined but not implemented.\n"
 "For reference, here is the\n"
 "<a href=\"%(pdf1)s\">I2CP Protocol Specification Version 0.9</a>\n"
 "(PDF) dated August 28, 2003.\n"
@@ -13592,12 +11656,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2np.html:6
 msgid ""
 "The I2P Network Protocol (I2NP),\n"
-"which is sandwiched between I2CP and the various I2P transport protocols,"
-" manages the\n"
-"routing and mixing of messages between routers, as well as the selection "
-"of what\n"
-"transports to use when communicating with a peer for which there are "
-"multiple\n"
+"which is sandwiched between I2CP and the various I2P transport protocols, manages the\n"
+"routing and mixing of messages between routers, as well as the selection of what\n"
+"transports to use when communicating with a peer for which there are multiple\n"
 "common transports supported."
 msgstr ""
 
@@ -13607,20 +11668,16 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:15
 msgid ""
-"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-"
-"router, point-to-point messages.\n"
-"By encrypting and wrapping messages in other messages, they can be sent "
-"in a secure way\n"
+"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-router, point-to-point messages.\n"
+"By encrypting and wrapping messages in other messages, they can be sent in a secure way\n"
 "through multiple hops to the ultimate destination.\n"
-"Priority is only used locally at the origin, i.e. when queuing for "
-"outbound delivery."
+"Priority is only used locally at the origin, i.e. when queuing for outbound delivery."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:22
 #, python-format
 msgid ""
-"The priorities listed below may not be current and are subject to change."
-"\n"
+"The priorities listed below may not be current and are subject to change.\n"
 "See the <a href=\"%(outnetmessage)s\">OutNetMessage Javadocs</a>\n"
 "for the current priority settings.\n"
 "Priority queueing implementation may vary."
@@ -13632,8 +11689,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:31
 msgid ""
-"The following table specifies the traditional 16-byte header used in "
-"NTCP.\n"
+"The following table specifies the traditional 16-byte header used in NTCP.\n"
 "The SSU and NTCP2 transports use modified headers."
 msgstr ""
 
@@ -13670,23 +11726,18 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/i2np.html:46
 #, python-format
 msgid ""
-"While the maximum payload size is nominally 64KB, the size is further "
-"constrained by the\n"
-"method of fragmenting I2NP messages into multiple 1KB tunnel messages as "
-"described on\n"
+"While the maximum payload size is nominally 64KB, the size is further constrained by the\n"
+"method of fragmenting I2NP messages into multiple 1KB tunnel messages as described on\n"
 "<a href=\"%(tunnelimpl)s\">the tunnel implementation page</a>.\n"
-"The maximum number of fragments is 64, and the message may not be "
-"perfectly aligned,\n"
+"The maximum number of fragments is 64, and the message may not be perfectly aligned,\n"
 "So the message must nominally fit in 63 fragments."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:54
 msgid ""
-"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL "
-"delivery mode);\n"
+"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL delivery mode);\n"
 "the maximum size of a follow-on fragment is 996 bytes.\n"
-"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 "
-"bytes, or 61.2 KB."
+"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 bytes, or 61.2 KB."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:60
@@ -13694,16 +11745,13 @@ msgid ""
 "In addition, the transports may have additional restrictions.\n"
 "The NTCP limit is 16KB - 6 = 16378 bytes.\n"
 "The SSU limit is approximately 32 KB.\n"
-"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher"
-" than what a tunnel can support."
+"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher than what a tunnel can support."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:67
 msgid ""
-"Note that these are not the limits for datagrams that the client sees, as"
-" the\n"
-"router may bundle a reply leaseset and/or session tags together with the "
-"client message\n"
+"Note that these are not the limits for datagrams that the client sees, as the\n"
+"router may bundle a reply leaseset and/or session tags together with the client message\n"
 "in a garlic message. The leaseset and tags together may add about 5.5KB.\n"
 "Therefore the current datagram limit is about 10KB. This limit will be\n"
 "increased in a future release."
@@ -13760,8 +11808,7 @@ msgid ""
 "Priority may vary.\n"
 "Size is 898 bytes for a typical 2-lease leaseSet.\n"
 "RouterInfo structures are compressed, and size varies; however\n"
-"there is a continuing effort to reduce the amount of data published in a "
-"RouterInfo\n"
+"there is a continuing effort to reduce the amount of data published in a RouterInfo\n"
 "as we approach release 1.0."
 msgstr ""
 
@@ -13771,8 +11818,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:150
 msgid ""
-"Used for message replies, and for testing tunnels - generally wrapped in "
-"a GarlicMessage"
+"Used for message replies, and for testing tunnels - generally wrapped in a "
+"GarlicMessage"
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:158
@@ -13783,8 +11830,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:185
 msgid ""
-"The most common message. Priority for tunnel participants, outbound "
-"endpoints, and inbound gateways was\n"
+"The most common message. Priority for tunnel participants, outbound endpoints, and inbound gateways was\n"
 "reduced to 200 as of release 0.6.1.33.\n"
 "Outbound gateway messages (i.e. those originated locally) remains at 400."
 msgstr ""
@@ -13815,16 +11861,13 @@ msgstr ""
 msgid ""
 "<a href=\"%(i2npspec)s\">On the I2NP Specification page</a>.\n"
 "See also the\n"
-"<a href=\"%(commonstructures)s\">Common Data Structure Specification "
-"page</a>."
+"<a href=\"%(commonstructures)s\">Common Data Structure Specification page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/i2np.html:234
 msgid ""
-"It isn't clear whether the current priority scheme is generally "
-"effective,\n"
-"and whether the priorities for various messages should be adjusted "
-"further.\n"
+"It isn't clear whether the current priority scheme is generally effective,\n"
+"and whether the priorities for various messages should be adjusted further.\n"
 "This is a topic for further research, analysis and testing."
 msgstr ""
 
@@ -13846,8 +11889,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:12
 msgid ""
 "Each of the layers in the stack provides extra capabilities.\n"
-"The capabilities are listed below, starting at the bottom of the protocol"
-" stack."
+"The capabilities are listed below, starting at the bottom of the protocol stack."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:18
@@ -13856,8 +11898,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:20
 msgid ""
-"IP: Internet Protocol, allow addressing hosts on the regular internet and"
-" routing packets across the internet using best-effort delivery."
+"IP: Internet Protocol, allow addressing hosts on the regular internet and "
+"routing packets across the internet using best-effort delivery."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:23
@@ -13878,11 +11920,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:30
 msgid ""
-"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P "
-"routers. These are not anonymous yet, this is strictly a hop-to-hop "
-"connection.\n"
-"Two protocols are implemented to provide these capabilities. NTCP builds "
-"on top of TCP, while SSU uses UDP."
+"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P routers. These are not anonymous yet, this is strictly a hop-to-hop connection.\n"
+"Two protocols are implemented to provide these capabilities. NTCP builds on top of TCP, while SSU uses UDP."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:35
@@ -13900,20 +11939,16 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:42
 #, python-format
 msgid ""
-"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are "
-"large messages containing encrypted I2NP (see below) messages and "
-"encrypted instructions for their delivery.\n"
-"The encryption is layered. The first hop will decrypt the tunnel message "
-"and read a part. Another part can still be encrypted (with another key),"
-"\n"
+"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are large messages containing encrypted I2NP (see below) messages and encrypted instructions for their delivery.\n"
+"The encryption is layered. The first hop will decrypt the tunnel message and read a part. Another part can still be encrypted (with another key),\n"
 "so it will be forwarded."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:48
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are"
-" used to pass messages through multiple routers. These I2NP messages are "
+"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are "
+"used to pass messages through multiple routers. These I2NP messages are "
 "combined in tunnel messages."
 msgstr ""
 
@@ -13926,54 +11961,51 @@ msgstr ""
 #: i2p2www/pages/site/docs/protocol/index.html:55
 #, python-format
 msgid ""
-"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are"
-" wrapped in each other and used to ensure encryption between two tunnels "
-"and are passed along from source to destination, keeping both anonymous."
+"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are "
+"wrapped in each other and used to ensure encryption between two tunnels and "
+"are passed along from source to destination, keeping both anonymous."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:61
 msgid ""
-"The following layers are strictly speaking no longer part of the I2P "
-"Protocol stack, they are not part of the core 'I2P router' functionality."
-"\n"
-"However, each of these layers adds additional functionality, to allow "
-"applications simple and convenient I2P usage."
+"The following layers are strictly speaking no longer part of the I2P Protocol stack, they are not part of the core 'I2P router' functionality.\n"
+"However, each of these layers adds additional functionality, to allow applications simple and convenient I2P usage."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:67
 msgid ""
-"<b>I2P Client Layer:</b> allow any client to use I2P functionality, "
-"without requiring the direct use of the router API."
+"<b>I2P Client Layer:</b> allow any client to use I2P functionality, without "
+"requiring the direct use of the router API."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:69
 #, python-format
 msgid ""
 "<a href=\"%(i2cp)s\">I2CP</a>: I2P Client Protocol, allows secure and "
-"asynchronous messaging over I2P by communicating messages over the I2CP "
-"TCP socket."
+"asynchronous messaging over I2P by communicating messages over the I2CP TCP "
+"socket."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:74
 msgid ""
-"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like "
-"functionality on top of I2P."
+"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like functionality "
+"on top of I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:76
 #, python-format
 msgid ""
-"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of "
-"TCP-like streams over I2P. This allows easier porting of existing "
-"applications to I2P."
+"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of TCP-"
+"like streams over I2P. This allows easier porting of existing applications "
+"to I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:80
 #, python-format
 msgid ""
 "<a href=\"%(datagrams)s\">Datagram Library</a>: an implementation of UDP-"
-"like messages over I2P. This allows easier porting of existing "
-"applications to I2P."
+"like messages over I2P. This allows easier porting of existing applications "
+"to I2P."
 msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:85
@@ -13993,8 +12025,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/protocol/index.html:99
 msgid ""
-"Finally, what could be considered the <b>'I2P application layer'</b>, is "
-"a large number of applications on top of I2P.\n"
+"Finally, what could be considered the <b>'I2P application layer'</b>, is a large number of applications on top of I2P.\n"
 "We can order this based on the I2P stack layer they use."
 msgstr ""
 
@@ -14046,12 +12077,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:8
 msgid ""
-"A \"transport\" in I2P is a method for direct, point-to-point "
-"communication\n"
+"A \"transport\" in I2P is a method for direct, point-to-point communication\n"
 "between two routers.\n"
 "Transports must provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router "
-"contacted \n"
+"against external adversaries while authenticating that the router contacted \n"
 "is the one who should receive a given message."
 msgstr ""
 
@@ -14105,8 +12134,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:44
 msgid ""
 "Maintain a set of router addresses, one or more for each transport,\n"
-"that the router publishes as its global contact information (the "
-"RouterInfo).\n"
+"that the router publishes as its global contact information (the RouterInfo).\n"
 "Each transport may connect using one of these addresses, which may be\n"
 "IPv4 or (as of version 0.9.8) IPv6."
 msgstr ""
@@ -14135,10 +12163,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:55
 msgid ""
-"Maintenance of connection limits for each transport, implementation of "
-"various thresholds for these limits,\n"
-"and communication of threshold status to the router so it may make "
-"operational changes based on the status"
+"Maintenance of connection limits for each transport, implementation of various thresholds for these limits,\n"
+"and communication of threshold status to the router so it may make operational changes based on the status"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:59
@@ -14157,27 +12183,26 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:62
 msgid ""
-"Coordination of firewall status and local IP, and changes to either, "
-"among the transports"
+"Coordination of firewall status and local IP, and changes to either, among "
+"the transports"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:63
 #: i2p2www/pages/site/docs/transport/ssu.html:35
 msgid ""
-"Communication of firewall status and local IP, and changes to either, to "
-"the router and the user interface"
+"Communication of firewall status and local IP, and changes to either, to the"
+" router and the user interface"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:64
 msgid ""
-"Determination of a consensus clock, which is used to periodically update "
-"the router's clock, as a backup for NTP"
+"Determination of a consensus clock, which is used to periodically update the"
+" router's clock, as a backup for NTP"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:65
 msgid ""
-"Maintenance of status for each peer, including whether it is connected, "
-"whether it was recently connected,\n"
+"Maintenance of status for each peer, including whether it is connected, whether it was recently connected,\n"
 "and whether it was reachable in the last attempt"
 msgstr ""
 
@@ -14187,8 +12212,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:70
 msgid ""
-"Honoring the automated and manual lists of banned peers maintained by the"
-" router,\n"
+"Honoring the automated and manual lists of banned peers maintained by the router,\n"
 "and refusing outbound and inbound connections to those peers"
 msgstr ""
 
@@ -14198,10 +12222,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:79
 msgid ""
-"The transport subsystem maintains a set of router addresses, each of "
-"which lists a transport method, IP, and port.\n"
-"These addresses constitute the advertised contact points, and are "
-"published by the router to the network database.\n"
+"The transport subsystem maintains a set of router addresses, each of which lists a transport method, IP, and port.\n"
+"These addresses constitute the advertised contact points, and are published by the router to the network database.\n"
 "Addresses may also contain an arbitrary set of additional options."
 msgstr ""
 
@@ -14222,16 +12244,13 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:92
 #, python-format
 msgid ""
-"A router is firewalled, and therefore publishes an SSU address which "
-"contains a list of cooperating\n"
-"peers or \"introducers\" who will assist in NAT traversal (see <a "
-"href=\"%(ssu)s\">the SSU spec</a> for details)"
+"A router is firewalled, and therefore publishes an SSU address which contains a list of cooperating\n"
+"peers or \"introducers\" who will assist in NAT traversal (see <a href=\"%(ssu)s\">the SSU spec</a> for details)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:96
 msgid ""
-"A router is not firewalled or its NAT ports  are open; it publishes both "
-"NTCP and SSU addresses containing\n"
+"A router is not firewalled or its NAT ports  are open; it publishes both NTCP and SSU addresses containing\n"
 "directly-accessible IP and ports."
 msgstr ""
 
@@ -14242,10 +12261,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/index.html:104
 #, python-format
 msgid ""
-"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> "
-"only. The transport selected for any message is\n"
-"independent of the upper-layer protocols and contents (router or client "
-"messages, whether an external application was using\n"
+"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> only. The transport selected for any message is\n"
+"independent of the upper-layer protocols and contents (router or client messages, whether an external application was using\n"
 "TCP or UDP to connect to I2P, whether the upper layer was using\n"
 "<a href=\"%(streaming)s\">the streaming library</a>\n"
 "streaming\n"
@@ -14257,15 +12274,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:118
 msgid ""
-"For each outgoing message, the transport system solicits \"bids\" from "
-"each transport.\n"
-"The transport bidding the lowest (best) value wins the bid and receives "
-"the message for delivery.\n"
+"For each outgoing message, the transport system solicits \"bids\" from each transport.\n"
+"The transport bidding the lowest (best) value wins the bid and receives the message for delivery.\n"
 "A transport may refuse to bid."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:124
-msgid "Whether a transport bids, and with what value, depend on numerous factors:"
+msgid ""
+"Whether a transport bids, and with what value, depend on numerous factors:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:128
@@ -14288,8 +12304,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:132
 msgid ""
-"The size of the message, as different transports have different size "
-"limits"
+"The size of the message, as different transports have different size limits"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:133
@@ -14299,7 +12314,8 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:134
-msgid "Whether the connection would be indirect (requiring introducers) or direct"
+msgid ""
+"Whether the connection would be indirect (requiring introducers) or direct"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:135
@@ -14308,8 +12324,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:138
 msgid ""
-"In general, the bid values are selected so that two routers are only "
-"connected by a single transport\n"
+"In general, the bid values are selected so that two routers are only connected by a single transport\n"
 "at any one time. However, this is not a requirement."
 msgstr ""
 
@@ -14327,8 +12342,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:153
 msgid ""
-"An \"indirect\" transport for routers that are not reachable by all other"
-" routers (one form of \"restricted routes\")"
+"An \"indirect\" transport for routers that are not reachable by all other "
+"routers (one form of \"restricted routes\")"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:154
@@ -14337,31 +12352,24 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:157
 msgid ""
-"Work continues on adjusting default connection limits for each transport."
-"\n"
-"I2P is designed as a \"mesh network\", where it is assumed that any "
-"router can connect to any other router.\n"
-"This assumption may be broken by routers that have exceeded their "
-"connection limits, and by\n"
+"Work continues on adjusting default connection limits for each transport.\n"
+"I2P is designed as a \"mesh network\", where it is assumed that any router can connect to any other router.\n"
+"This assumption may be broken by routers that have exceeded their connection limits, and by\n"
 "routers that are behind restrictive state firewalls (restricted routes)."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:164
 msgid ""
-"The current connection limits are higher for SSU than for NTCP, based on "
-"the assumption that\n"
-"the memory requirements for an NTCP connection are higher than that for "
-"SSU.\n"
-"However, as NTCP buffers are partially in the kernel and SSU buffers are "
-"on the Java heap,\n"
+"The current connection limits are higher for SSU than for NTCP, based on the assumption that\n"
+"the memory requirements for an NTCP connection are higher than that for SSU.\n"
+"However, as NTCP buffers are partially in the kernel and SSU buffers are on the Java heap,\n"
 "that assumption is difficult to verify."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/index.html:171
 #, python-format
 msgid ""
-"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol "
-"Obfuscation</a>\n"
+"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol Obfuscation</a>\n"
 "and see how transport-layer padding may improve things."
 msgstr ""
 
@@ -14372,11 +12380,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:6
 #, python-format
 msgid ""
-"The others are <a href=\"%(ssu)s\">SSU</a> and <a "
-"href=\"%(ntcp2)s\">NTCP2</a>.\n"
+"The others are <a href=\"%(ssu)s\">SSU</a> and <a href=\"%(ntcp2)s\">NTCP2</a>.\n"
 "NTCP is a Java NIO-based transport introduced in I2P release 0.6.1.22.\n"
-"Java NIO (new I/O) does not suffer from the 1 thread per connection "
-"issues of the old TCP transport.\n"
+"Java NIO (new I/O) does not suffer from the 1 thread per connection issues of the old TCP transport.\n"
 "NTCP-over-IPv6 is supported as of version 0.9.8."
 msgstr ""
 
@@ -14391,8 +12397,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:21
 msgid ""
-"The NTCP code within I2P is relatively lightweight (1/4 the size of the "
-"SSU code)\n"
+"The NTCP code within I2P is relatively lightweight (1/4 the size of the SSU code)\n"
 "because it uses the underlying Java TCP transport for reliable delivery."
 msgstr ""
 
@@ -14417,21 +12422,17 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:47
 msgid ""
 "After establishment,\n"
-"the NTCP transport sends individual I2NP messages, with a simple "
-"checksum.\n"
+"the NTCP transport sends individual I2NP messages, with a simple checksum.\n"
 "The unencrypted message is encoded as follows:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:65
 msgid ""
-"The data is then AES/256/CBC encrypted. The session key for the "
-"encryption\n"
+"The data is then AES/256/CBC encrypted. The session key for the encryption\n"
 "is negotiated during establishment (using Diffie-Hellman 2048 bit).\n"
-"The establishment between two routers is implemented in the "
-"EstablishState class\n"
+"The establishment between two routers is implemented in the EstablishState class\n"
 "and detailed below.\n"
-"The IV for AES/256/CBC encryption is the last 16 bytes of the previous "
-"encrypted message."
+"The IV for AES/256/CBC encryption is the last 16 bytes of the previous encrypted message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:73
@@ -14455,8 +12456,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:93
 msgid ""
-"Total length: 16 bytes. The time sync message is sent at approximately 15"
-" minute intervals.\n"
+"Total length: 16 bytes. The time sync message is sent at approximately 15 minute intervals.\n"
 "The message is encrypted just as standard messages are."
 msgstr ""
 
@@ -14479,14 +12479,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:107
 #: i2p2www/pages/site/docs/transport/ssu.html:188
 msgid ""
-"Idle timeout and connection close is at the discretion of each endpoint "
-"and may vary.\n"
-"The current implementation lowers the timeout as the number of "
-"connections approaches the\n"
-"configured maximum, and raises the timeout when the connection count is "
-"low.\n"
-"The recommended minimum timeout is two minutes or more, and the "
-"recommended\n"
+"Idle timeout and connection close is at the discretion of each endpoint and may vary.\n"
+"The current implementation lowers the timeout as the number of connections approaches the\n"
+"configured maximum, and raises the timeout when the connection count is low.\n"
+"The recommended minimum timeout is two minutes or more, and the recommended\n"
 "maximum timeout is ten minutes or more."
 msgstr ""
 
@@ -14497,12 +12493,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:117
 msgid ""
 "After establishment, and every 30-60 minutes thereafter,\n"
-"the two routers should generally exchange RouterInfos using a "
-"DatabaseStoreMessage.\n"
-"However, Alice should check if the first queued message is a "
-"DatabaseStoreMessage\n"
-"so as not to send a duplicate message; this is often the case when "
-"connecting to a floodfill router."
+"the two routers should generally exchange RouterInfos using a DatabaseStoreMessage.\n"
+"However, Alice should check if the first queued message is a DatabaseStoreMessage\n"
+"so as not to send a duplicate message; this is often the case when connecting to a floodfill router."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:125
@@ -14511,11 +12504,9 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:126
 msgid ""
-"In the establish state, there is a 4-phase message sequence to exchange "
-"DH keys and signatures.\n"
+"In the establish state, there is a 4-phase message sequence to exchange DH keys and signatures.\n"
 "In the first two messages there is a 2048-bit Diffie Hellman exchange.\n"
-"Then, signatures of the critical data are exchanged to confirm the "
-"connection."
+"Then, signatures of the critical data are exchanged to confirm the connection."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:142
@@ -14553,15 +12544,14 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:159
 msgid ""
 "The DH key exchange consists of a number of steps, displayed below.\n"
-"The mapping between these steps and the messages sent between I2P "
-"routers,\n"
+"The mapping between these steps and the messages sent between I2P routers,\n"
 "is marked in bold."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:165
 msgid ""
-"Alice generates a secret integer x. She then calculates <code>X = g^x mod"
-" p</code>."
+"Alice generates a secret integer x. She then calculates <code>X = g^x mod "
+"p</code>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:166
@@ -14595,8 +12585,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:173
 #, python-format
 msgid ""
-"The sessionKey is then used to exchange identities in <b>Message 3</b> "
-"and <b>Message 4</b>.\n"
+"The sessionKey is then used to exchange identities in <b>Message 3</b> and <b>Message 4</b>.\n"
 "The exponent (x and y) length for the DH exchange is documented on the\n"
 "<a href=\"%(crypto)s#exponent\">cryptography page</a>."
 msgstr ""
@@ -14609,8 +12598,7 @@ msgstr ""
 #, python-format
 msgid ""
 "This is the DH request. Alice already has Bob's\n"
-"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router "
-"Identity</a>,\n"
+"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router Identity</a>,\n"
 "IP address, and port, as contained in his\n"
 "<a href=\"%(commonstructures)s#struct_RouterInfo\">Router Info</a>,\n"
 "which was published to the\n"
@@ -14690,8 +12678,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:312
 #, python-format
 msgid ""
-"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH "
-"session key and\n"
+"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
 "                  the last 16 bytes of Y as the IV"
 msgstr ""
 
@@ -14707,8 +12694,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:326
 msgid ""
-"This contains Alice's router identity, and a signature of the critical "
-"data. Alice sends Bob:"
+"This contains Alice's router identity, and a signature of the critical data."
+" Alice sends Bob:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:360
@@ -14728,17 +12715,14 @@ msgstr ""
 msgid ""
 "the `Signature` of the following concatenated data:\n"
 "             X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-"             Alice signs it with the `SigningPrivateKey` associated with "
-"the `SigningPublicKey` in her `RouterIdentity`"
+"             Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:389
 #, python-format
 msgid ""
-"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH"
-" session key and\n"
-"                  the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
-"of message #1) as the IV"
+"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
+"                  the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:400
@@ -14753,8 +12737,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:406
 msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this "
-"message as the IV for the next message."
+"Alice will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:430
@@ -14769,19 +12753,15 @@ msgstr ""
 msgid ""
 "the `Signature` of the following concatenated data:\n"
 "             X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-"             Bob signs it with the `SigningPrivateKey` associated with "
-"the `SigningPublicKey` in his `RouterIdentity`"
+"             Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:479
 #, python-format
 msgid ""
-"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH "
-"session key and\n"
-"                  the last 16 bytes of the encrypted contents of message "
-"#2 as the IV\n"
-"                  48 bytes for a DSA signature, may vary for other "
-"signature types"
+"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n"
+"                  the last 16 bytes of the encrypted contents of message #2 as the IV\n"
+"                  48 bytes for a DSA signature, may vary for other signature types"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:488
@@ -14790,8 +12770,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:491
 msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
+"Bob will use the last 16 bytes of the encrypted contents of this message as "
+"the IV for the next message."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:506
@@ -14800,14 +12780,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:507
 msgid ""
-"The connection is established, and standard or time sync messages may be "
-"exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session"
-" key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 "
-"as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
-" the next IV."
+"The connection is established, and standard or time sync messages may be exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:516
@@ -14834,8 +12810,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:528
 msgid ""
-"that many bytes making up the local router's IP address (as reached by "
-"the remote side)"
+"that many bytes making up the local router's IP address (as reached by the "
+"remote side)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:529
@@ -14854,8 +12830,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:532
 msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 "
-"through bytes 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 through "
+"bytes 223"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ntcp.html:535
@@ -14878,11 +12854,9 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ntcp.html:550
 msgid ""
 "A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to"
-" \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
 "end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next "
-"16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
 "to create a limited number of message sizes."
 msgstr ""
 
@@ -14905,28 +12879,22 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:7
 #, python-format
 msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user "
-"interfaces)\n"
-"is one of three <a href=\"%(transports)s\">transports</a> currently "
-"implemented in I2P.\n"
-"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a "
-"href=\"%(ntcp2)s\">NTCP2</a>."
+"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
+"is one of three <a href=\"%(transports)s\">transports</a> currently implemented in I2P.\n"
+"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a href=\"%(ntcp2)s\">NTCP2</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:13
 msgid ""
 "SSU was introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for "
-"outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
 "SSU-over-IPv6 is supported as of version 0.9.8."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:19
 msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit "
-"unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is "
-"dropped."
+"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is dropped."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:24
@@ -14935,10 +12903,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:26
 msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
-"oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, "
-"including:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:32
@@ -14955,8 +12921,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:34
 msgid ""
-"Communication of firewall status and local IP, and changes to either to "
-"NTCP"
+"Communication of firewall status and local IP, and changes to either to NTCP"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:46
@@ -14991,26 +12956,20 @@ msgid ""
 "Packets are scheduled according to the router's policy, taking care\n"
 "not to exceed the router's outbound capacity or to exceed the measured \n"
 "capacity of the remote peer.  The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive "
-"increases\n"
-"to the sending capacity and multiplicative decreases in face of "
-"congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive increases\n"
+"to the sending capacity and multiplicative decreases in face of congestion.\n"
 "Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit"
-" \n"
+"a given period or number of retransmissions while continuing to transmit \n"
 "other messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:106
 msgid ""
 "The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message"
-"\n"
-"has a limited size - at most, 32KB.  To efficiently transmit this "
-"feedback\n"
+"message has its own unique and nonsequential identifier, and each message\n"
+"has a limited size - at most, 32KB.  To efficiently transmit this feedback\n"
 "to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received"
-"\n"
+"message identifiers and may also include bitfields for partially received\n"
 "messages, where each bit represents the reception of a fragment.  If \n"
 "duplicate fragments arrive, the message should be ACKed again, or if the\n"
 "message has still not been fully received, the bitfield should be \n"
@@ -15020,8 +12979,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:118
 msgid ""
 "The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment "
-"into\n"
+"any particular size, but instead just places a single message fragment into\n"
 "a packet and sends it off (careful not to exceed the MTU)."
 msgstr ""
 
@@ -15029,8 +12987,7 @@ msgstr ""
 msgid ""
 "As of router version 0.8.12,\n"
 "two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are "
-"retransmitted."
+"The MTU value is adjusted based on the percentage of packets that are retransmitted."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:131
@@ -15049,10 +13006,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:143
 msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP "
-"messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
-"to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
 "into a live network MTU anyway)."
 msgstr ""
 
@@ -15072,8 +13027,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:161
 msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than "
-"1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
 "it will publish that in the network database, and other routers should\n"
 "honor that when a connection is established."
 msgstr ""
@@ -15093,13 +13047,10 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:175
 msgid ""
 "While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or "
-"128.\n"
-"The current implementation, however, limits each message to a maximum of "
-"64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
+"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
 "which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical "
-"limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
 "at the application level is about 6KB lower, or about 26KB.\n"
 "Further work is necessary to raise the UDP transport limit above 32KB.\n"
 "For connections using the larger MTU, larger messages are possible."
@@ -15113,8 +13064,7 @@ msgstr "Kyçe"
 msgid ""
 "All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
 "When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and "
-"are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
 "for the HMAC and encryption, respectively.  During the DH exchange, \n"
 "Bob's publicly knowable introKey is used for the MAC and encryption."
 msgstr ""
@@ -15131,8 +13081,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:216
 msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and"
-" port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
 "with all established sessions - if there are matches,\n"
 "that session's MAC keys are tested in the HMAC.  If none\n"
 "of those verify or if there are no matching IP addresses, the \n"
@@ -15222,8 +13171,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:296
 msgid ""
-"Direct session establishment is used when no third party is required for "
-"NAT traversal.\n"
+"Direct session establishment is used when no third party is required for NAT traversal.\n"
 "The message sequence is as follows:"
 msgstr ""
 
@@ -15243,10 +13191,8 @@ msgid ""
 "After the SessionConfirmed message is received, Bob sends a small\n"
 "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">DeliveryStatus message</a>\n"
 "as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the"
-"\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
-"\n"
+"In this message, the 4-byte message ID is set to a random number, and the\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
 "(i.e. 0x0000000000000002)."
 msgstr ""
 
@@ -15262,8 +13208,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:335
 msgid ""
-"It does not appear that the type of the status message or its contents "
-"matters.\n"
+"It does not appear that the type of the status message or its contents matters.\n"
 "It was originally added becasue the DatabaseStore message was delayed\n"
 "several seconds; since the store is now sent immediately, perhaps\n"
 "the status message can be eliminated."
@@ -15273,8 +13218,7 @@ msgstr ""
 msgid ""
 "Introduction keys are delivered through an external channel \n"
 "(the network database),\n"
-"where they have traditionally been identical to the router Hash through "
-"release 0.9.47,\n"
+"where they have traditionally been identical to the router Hash through release 0.9.47,\n"
 "but may be random as of release 0.9.48.\n"
 "They must be used when establishing a session key.  For the indirect\n"
 "address, the peer must first contact the relayhost and ask them for\n"
@@ -15293,24 +13237,16 @@ msgid ""
 "is necessary for efficient NAT traversal.  Charlie, a router behind a\n"
 "NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
 "first contacts a few peers, choosing some to serve as introducers.  Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
-"introduction\n"
-"tag - a 4 byte random number - which he then makes available to the "
-"public\n"
-"as methods of contacting him.  Alice, a router who has Charlie's "
-"published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the"
-" \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
+"tag - a 4 byte random number - which he then makes available to the public\n"
+"as methods of contacting him.  Alice, a router who has Charlie's published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the \n"
 "introducers, asking each to introduce her to Charlie (offering the \n"
 "introduction tag to identify Charlie).  Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends"
-"\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port"
-"\n"
-"number.  When Charlie receives the RelayIntro packet, he sends off a "
-"small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
-"\n"
+"packet to Charlie including Alice's public IP and port number, then sends\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
+"number.  When Charlie receives the RelayIntro packet, he sends off a small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
 "and when Alice receives Bob's RelayResponse packet, she begins a new \n"
 "full direction session establishment with the specified IP and port."
 msgstr ""
@@ -15320,13 +13256,14 @@ msgid "Connection establishment (indirect using an introducer)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:389
-msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
+msgid ""
+"Alice first connects to introducer Bob, who relays the request to Charlie."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:407
 msgid ""
-"After the hole punch, the session is established between Alice and "
-"Charlie as in a direct establishment."
+"After the hole punch, the session is established between Alice and Charlie "
+"as in a direct establishment."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:427
@@ -15430,14 +13367,12 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:543
 #, python-format
 msgid ""
-"The details of windowing, ACK, and retransmission strategies are not "
-"specified\n"
+"The details of windowing, ACK, and retransmission strategies are not specified\n"
 "here. See the Java code for the current implementation.\n"
 "During the establishment phase, and for peer testing, routers\n"
 "should implement exponential backoff for retransmission.\n"
 "For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to "
-"TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
 "or <a href=\"%(streaming)s\">streaming</a>.\n"
 "See the code for initial, min and max parameters."
 msgstr ""
@@ -15474,27 +13409,22 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:617
 msgid ""
-"Analysis of current SSU performance, including assessment of window size "
-"adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to "
-"improve\n"
+"Analysis of current SSU performance, including assessment of window size adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to improve\n"
 "performance, is a topic for future work."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:623
 msgid ""
-"The current implementation repeatedly sends acknowledgments for the same "
-"packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same packets,\n"
 "which unnecessarily increases overhead."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:628
 msgid ""
-"The default small MTU value of 620 should be analyzed and possibly "
-"increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly increased.\n"
 "The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
-"Probably not."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:634
@@ -15507,32 +13437,28 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:642
 msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and "
-"RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is "
-"undocumented."
+"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:647
 msgid ""
 "Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same "
-"packet,\n"
+"strategy may be to bundle multiple message fragments into the same packet,\n"
 "so long as it doesn't exceed the MTU."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:653
 msgid ""
 "A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to"
-" \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
 "end padding should be sufficient for most needs until then."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:659
 msgid ""
-"Why are introduction keys the same as the router hash, should it be "
-"changed, would there be any benefit?"
+"Why are introduction keys the same as the router hash, should it be changed,"
+" would there be any benefit?"
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:663
@@ -15541,8 +13467,8 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:667
 msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be "
-"unused or unverified."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
+"or unverified."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:672
@@ -15552,8 +13478,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/transport/ssu.html:673
 msgid ""
 "This diagram\n"
-"should accurately reflect the current implementation, however there may "
-"be small differences."
+"should accurately reflect the current implementation, however there may be small differences."
 msgstr ""
 
 #: i2p2www/pages/site/docs/transport/ssu.html:681
@@ -15577,12 +13502,9 @@ msgid ""
 "Within I2P, messages are passed in one direction through a virtual\n"
 "tunnel of peers, using whatever means are available to pass the \n"
 "message on to the next hop.  Messages arrive at the tunnel's \n"
-"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel "
-"messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and "
-"verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, "
-"until\n"
+"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, until\n"
 "it reaches the tunnel endpoint.  That <i>endpoint</i> takes the messages\n"
 "bundled up by the gateway and forwards them as instructed - either\n"
 "to another router, to another tunnel on another router, or locally."
@@ -15604,12 +13526,9 @@ msgid ""
 "in the tunnel, and provides each with the necessary configuration\n"
 "data.  They may have any number of hops.\n"
 "It is the intent to make\n"
-"it hard for either participants or third parties to determine the length "
-"of \n"
-"a tunnel, or even for colluding participants to determine whether they "
-"are a\n"
-"part of the same tunnel at all (barring the situation where colluding "
-"peers are\n"
+"it hard for either participants or third parties to determine the length of \n"
+"a tunnel, or even for colluding participants to determine whether they are a\n"
+"part of the same tunnel at all (barring the situation where colluding peers are\n"
 "next to each other in the tunnel)."
 msgstr ""
 
@@ -15647,8 +13566,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:69
 #, python-format
 msgid ""
-"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are "
-"processed and passed through it.\n"
+"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are processed and passed through it.\n"
 "Tunnel operation has four distinct processes, taken on by various \n"
 "peers in the tunnel."
 msgstr ""
@@ -15675,8 +13593,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:89
 msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
-"messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
 "originally bundled by the gateway are reassembled and forwarded on as \n"
 "requested."
 msgstr ""
@@ -15736,11 +13653,13 @@ msgid "Decrypt (using an encryption operation)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgid ""
+"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgid ""
+"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:142
@@ -15801,10 +13720,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:181
 msgid ""
 "Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be "
-"forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they "
-"receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
 "on.  Tunnels themselves are short-lived (10 minutes).\n"
 "Even if subsequent tunnels are built using the same sequence of \n"
 "peers, each hop's tunnel ID will change."
@@ -15812,16 +13729,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:190
 msgid ""
-"To prevent adversaries from tagging the messages along the path by "
-"adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size.  To"
-" accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently,"
-" the\n"
-"gateway splits up the larger I2NP messages into fragments contained "
-"within each\n"
-"tunnel message.  The endpoint will attempt to rebuild the I2NP message "
-"from the\n"
+"To prevent adversaries from tagging the messages along the path by adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size.  To accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
+"gateway splits up the larger I2NP messages into fragments contained within each\n"
+"tunnel message.  The endpoint will attempt to rebuild the I2NP message from the\n"
 "fragments for a short period of time, but will discard them as necessary."
 msgstr ""
 
@@ -15838,30 +13750,20 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:207
 msgid ""
-"After the preprocessing of messages into a padded payload, the gateway "
-"builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel "
-"message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
-"message} to the next hop."
+"After the preprocessing of messages into a padded payload, the gateway builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:213
 msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an"
-"\n"
-"inbound or an outbound tunnel.  For inbound tunnels, they simply select a"
-" random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and"
-" using \n"
-"that IV along side their own layer key to encrypt the preprocessed data."
-"  For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and "
-"preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel.  The result "
-"of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will "
-"recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an\n"
+"inbound or an outbound tunnel.  For inbound tunnels, they simply select a random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
+"that IV along side their own layer key to encrypt the preprocessed data.  For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel.  The result of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
 "the initial preprocessed data."
 msgstr ""
 
@@ -15871,46 +13773,29 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:227
 msgid ""
-"When a peer receives a tunnel message, it checks that the message came "
-"from\n"
-"the same previous hop as before (initialized when the first message comes"
-" through\n"
-"the tunnel).  If the previous peer is a different router, or if the "
-"message has\n"
-"already been seen, the message is dropped.  The participant then encrypts"
-" the \n"
-"received IV with AES256/ECB using their IV key to determine the current "
-"IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts "
-"the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the "
-"tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop.  This double "
-"encryption\n"
+"When a peer receives a tunnel message, it checks that the message came from\n"
+"the same previous hop as before (initialized when the first message comes through\n"
+"the tunnel).  If the previous peer is a different router, or if the message has\n"
+"already been seen, the message is dropped.  The participant then encrypts the \n"
+"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop.  This double encryption\n"
 "of the IV (both before and after use) help address a certain class of\n"
 "confirmation attacks."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:243
 msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on "
-"message\n"
-"IVs.  Each router maintains a single Bloom filter to contain the XOR of "
-"the IV and\n"
-"the first block of the message received for all of the tunnels it is "
-"participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
-"will have\n"
-"expired).  The size of the bloom filter and the parameters used are "
-"sufficient to\n"
-"more than saturate the router's network connection with a negligible "
-"chance of \n"
-"false positive.  The unique value fed into the Bloom filter is the XOR of"
-" the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the"
-" tunnel \n"
-"from tagging a message by resending it with the IV and first block "
-"switched."
+"Duplicate message detection is handled by a decaying Bloom filter on message\n"
+"IVs.  Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
+"the first block of the message received for all of the tunnels it is participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
+"expired).  The size of the bloom filter and the parameters used are sufficient to\n"
+"more than saturate the router's network connection with a negligible chance of \n"
+"false positive.  The unique value fed into the Bloom filter is the XOR of the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
+"from tagging a message by resending it with the IV and first block switched."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:256
@@ -15919,27 +13804,19 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:258
 msgid ""
-"After receiving and validating a tunnel message at the last hop in the "
-"tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon "
-"whether \n"
-"the tunnel is an inbound or an outbound tunnel.  For outbound tunnels, "
-"the \n"
-"endpoint encrypts the message with its layer key just like any other "
-"participant, \n"
-"exposing the preprocessed data.  For inbound tunnels, the endpoint is "
-"also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message,"
-" using the \n"
+"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
+"the tunnel is an inbound or an outbound tunnel.  For outbound tunnels, the \n"
+"endpoint encrypts the message with its layer key just like any other participant, \n"
+"exposing the preprocessed data.  For inbound tunnels, the endpoint is also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
 "layer and IV keys of each step in reverse order."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:268
 msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the "
-"gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards "
-"them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards them as\n"
 "requested in their delivery instructions."
 msgstr ""
 
@@ -15949,30 +13826,21 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:277
 msgid ""
-"When building a tunnel, the creator must send a request with the "
-"necessary\n"
-"configuration data to each of the hops and wait for all of them to agree "
-"before\n"
-"enabling the tunnel.  The requests are encrypted so that only the peers "
-"who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has "
-"that\n"
-"data.  In addition, only the tunnel creator will have access to the "
-"peer's\n"
-"reply.  There are three important dimensions to keep in mind when "
-"producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent "
-"(and \n"
+"When building a tunnel, the creator must send a request with the necessary\n"
+"configuration data to each of the hops and wait for all of them to agree before\n"
+"enabling the tunnel.  The requests are encrypted so that only the peers who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has that\n"
+"data.  In addition, only the tunnel creator will have access to the peer's\n"
+"reply.  There are three important dimensions to keep in mind when producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent (and \n"
 "replies received), and how they are maintained."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:291
 msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two "
-"styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
 "of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and "
-"tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and tunnel\n"
 "maintenance, while client tunnels are used for end to end client messages."
 msgstr ""
 
@@ -15982,18 +13850,12 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:301
 msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a "
-"subset\n"
-"of the network.  The particular subset varies on the local router and on "
-"what their\n"
-"tunnel routing needs are.  In general, the exploratory tunnels are built "
-"out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" "
-"profile\n"
-"category.  The secondary purpose of the tunnels, beyond merely tunnel "
-"routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted"
-" for\n"
+"Exploratory tunnels are built out of a random selection of peers from a subset\n"
+"of the network.  The particular subset varies on the local router and on what their\n"
+"tunnel routing needs are.  In general, the exploratory tunnels are built out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
+"category.  The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted for\n"
 "use in client tunnels."
 msgstr ""
 
@@ -16010,14 +13872,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:319
 msgid ""
-"Client tunnels are built with a more stringent set of requirements - the "
-"local\n"
-"router will select peers out of its \"fast and high capacity\" profile "
-"category so\n"
-"that performance and reliability will meet the needs of the client "
-"application.\n"
-"However, there are several important details beyond that basic selection "
-"that \n"
+"Client tunnels are built with a more stringent set of requirements - the local\n"
+"router will select peers out of its \"fast and high capacity\" profile category so\n"
+"that performance and reliability will meet the needs of the client application.\n"
+"However, there are several important details beyond that basic selection that \n"
 "should be adhered to, depending upon the client's anonymity needs."
 msgstr ""
 
@@ -16043,10 +13901,8 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:341
 msgid ""
 "To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -"
-"\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
-"after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
 "B is always C."
 msgstr ""
 
@@ -16055,18 +13911,15 @@ msgid ""
 "Ordering is implemented by generating a random 32-byte key for each\n"
 "tunnel pool at startup.\n"
 "Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both"
-"\n"
+"craft two router hashes far apart to maximize the chance of being at both\n"
 "ends of a tunnel.\n"
 "Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from "
-"the random key"
+"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:363
 msgid ""
-"Because each tunnel pool uses a different random key, ordering is "
-"consistent\n"
+"Because each tunnel pool uses a different random key, ordering is consistent\n"
 "within a single pool but not between different pools.\n"
 "New keys are generated at each router restart."
 msgstr ""
@@ -16078,8 +13931,7 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:372
 #, python-format
 msgid ""
-"A multi-hop tunnel is built using a single build message which is "
-"repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is repeatedly\n"
 "decrypted and forwarded. In the terminology of\n"
 "<a href=\"%(pdf)s\">Hashing it out in Public</a>,\n"
 "this is \"non-interactive\" telescopic tunnel building."
@@ -16090,38 +13942,28 @@ msgstr ""
 msgid ""
 "This tunnel request preparation, delivery, and response method is\n"
 "<a href=\"%(tunnelcreation)s\">designed</a> to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies "
-"proper\n"
-"connectivity, and avoids the message counting attack of traditional "
-"telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
+"connectivity, and avoids the message counting attack of traditional telescopic\n"
 "tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the "
-"already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
-"in\n"
+"(This method, which sends messages to extend a tunnel through the already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
 "the \"Hashing it out\" paper.)"
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:390
 #, python-format
 msgid ""
-"The details of tunnel request and response messages, and their "
-"encryption,\n"
+"The details of tunnel request and response messages, and their encryption,\n"
 "<a href=\"%(tunnelcreation)s\">are specified here</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:395
 msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, "
-"though\n"
-"a series of four increasingly severe rejections are known: probabilistic "
-"rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of "
-"requests), \n"
-"transient overload, bandwidth overload, and critical failure.  When "
-"received, \n"
-"those four are interpreted by the tunnel creator to help adjust their "
-"profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, though\n"
+"a series of four increasingly severe rejections are known: probabilistic rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of requests), \n"
+"transient overload, bandwidth overload, and critical failure.  When received, \n"
+"those four are interpreted by the tunnel creator to help adjust their profile of\n"
 "the router in question."
 msgstr ""
 
@@ -16139,37 +13981,26 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/implementation.html:412
 #, python-format
 msgid ""
-"To allow efficient operation, the router maintains a series of tunnel "
-"pools,\n"
-"each managing a group of tunnels used for a specific purpose with their "
-"own\n"
-"configuration.  When a tunnel is needed for that purpose, the router "
-"selects one\n"
-"out of the appropriate pool at random.  Overall, there are two "
-"exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default "
-"configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel pools,\n"
+"each managing a group of tunnels used for a specific purpose with their own\n"
+"configuration.  When a tunnel is needed for that purpose, the router selects one\n"
+"out of the appropriate pool at random.  Overall, there are two exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default configuration.\n"
 "In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool.  Those pools use the "
-"configuration specified\n"
-"when the local destination connects to the router via <a "
-"href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool.  Those pools use the configuration specified\n"
+"when the local destination connects to the router via <a href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n"
 "not specified."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:424
 #, python-format
 msgid ""
-"Each pool has within its configuration a few key settings, defining how "
-"many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of "
-"failure,\n"
+"Each pool has within its configuration a few key settings, defining how many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
 "how long the tunnels should be, whether those\n"
 "lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual "
-"tunnels.\n"
-"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP "
-"page</a>."
+"well as any of the other settings allowed when configuring individual tunnels.\n"
+"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:434
@@ -16186,20 +14017,14 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:440
 msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they "
-"are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is "
-"essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local "
-"and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local and global\n"
 "network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build "
-"strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,"
-"\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,\n"
 "without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted"
-" build messages."
+"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:451
@@ -16207,8 +14032,7 @@ msgid ""
 "For each tuple {exploratory/client, in/out, length, length variance}\n"
 "the router maintains statistics on the time required for a successful\n"
 "tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's "
-"expiration\n"
+"Using these statistics, it calculates how long before a tunnel's expiration\n"
 "it should start attempting to build a replacement.\n"
 "As the expiration time approaches without a successful replacement,\n"
 "it starts multiple build attempts in parallel, and then\n"
@@ -16230,30 +14054,18 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:473
 msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit "
-"switched\n"
-"network, everything within I2P is strictly message based - tunnels are "
-"merely\n"
-"accounting tricks to help organize the delivery of messages.  No "
-"assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions "
-"are left\n"
-"to higher levels (e.g. I2P's client layer streaming library).  This "
-"allows I2P\n"
-"to take advantage of throttling techniques available to both packet "
-"switched and\n"
-"circuit switched networks.  For instance, each router may keep track of "
-"the \n"
-"moving average of how much data each tunnel is using, combine that with "
-"all of \n"
-"the averages used by other tunnels the router is participating in, and be"
-" able\n"
-"to accept or reject additional tunnel participation requests based on its"
-" \n"
-"capacity and utilization.  On the other hand, each router can simply drop"
-" \n"
-"messages that are beyond its capacity, exploiting the research used on "
-"the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
+"network, everything within I2P is strictly message based - tunnels are merely\n"
+"accounting tricks to help organize the delivery of messages.  No assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions are left\n"
+"to higher levels (e.g. I2P's client layer streaming library).  This allows I2P\n"
+"to take advantage of throttling techniques available to both packet switched and\n"
+"circuit switched networks.  For instance, each router may keep track of the \n"
+"moving average of how much data each tunnel is using, combine that with all of \n"
+"the averages used by other tunnels the router is participating in, and be able\n"
+"to accept or reject additional tunnel participation requests based on its \n"
+"capacity and utilization.  On the other hand, each router can simply drop \n"
+"messages that are beyond its capacity, exploiting the research used on the \n"
 "normal Internet."
 msgstr ""
 
@@ -16261,23 +14073,16 @@ msgstr ""
 msgid ""
 "In the current implementation, routers implement a\n"
 "weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and"
-" outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
 "the router will start randomly dropping a portion of messages as the\n"
 "bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are "
-"dropped.\n"
-"For an internal participant, all messages are fragmented and padded and "
-"therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping "
-"decision is made\n"
-"on the full (coalesced) message, and the message size is taken into "
-"account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
+"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
+"on the full (coalesced) message, and the message size is taken into account.\n"
 "Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint "
-"than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the "
-"network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
 "dropping those messages is lower."
 msgstr ""
 
@@ -16287,16 +14092,11 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:509
 msgid ""
-"What strategies could be used at the gateway and at each hop for "
-"delaying,\n"
-"reordering, rerouting, or padding messages?  To what extent should this "
-"be done\n"
-"automatically, how much should be configured as a per tunnel or per hop "
-"setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this "
-"operation?\n"
-"All of this is left as unknown, to be worked out for a distant future "
-"release."
+"What strategies could be used at the gateway and at each hop for delaying,\n"
+"reordering, rerouting, or padding messages?  To what extent should this be done\n"
+"automatically, how much should be configured as a per tunnel or per hop setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this operation?\n"
+"All of this is left as unknown, to be worked out for a distant future release."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:518
@@ -16305,13 +14105,10 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/implementation.html:519
 msgid ""
-"The padding strategies can be used on a variety of levels, addressing the"
-"\n"
+"The padding strategies can be used on a variety of levels, addressing the\n"
 "exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes.  Within this "
-"however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end "
-"to end \n"
+"The current fixed tunnel message size is 1024 bytes.  Within this however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end to end \n"
 "messages, they may be padded as part of the garlic wrapping."
 msgstr ""
 
@@ -16339,8 +14136,7 @@ msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
 msgid ""
-"This page describes the origins and design of I2P's unidirectional "
-"tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional tunnels.\n"
 "For further information see:"
 msgstr ""
 
@@ -16374,8 +14170,7 @@ msgid ""
 "Several apps and protocols, notably HTTP,\n"
 "do transfer data in such manner. Having the traffic follow the same \n"
 "route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a"
-" \n"
+"attacker who has only timing and traffic volume data to infer the path a \n"
 "tunnel is taking.\n"
 "Having the response come back along a different path arguably \n"
 "makes it harder."
@@ -16384,42 +14179,27 @@ msgstr ""
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
 msgid ""
 "When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional "
-"tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional"
-" circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response "
-"would \n"
-"follow the same path in Tor, while in I2P the packets making up the "
-"request \n"
-"would go out through one or more outbound tunnels and the packets making "
-"up \n"
-"the response would come back through one or more different inbound "
-"tunnels."
+"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response would \n"
+"follow the same path in Tor, while in I2P the packets making up the request \n"
+"would go out through one or more outbound tunnels and the packets making up \n"
+"the response would come back through one or more different inbound tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
 msgid ""
 "The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have "
-"anonymity\n"
-"implications.  On the positive side, by using separate tunnels it lessens"
-" the\n"
-"traffic data exposed for analysis to participants in a tunnel - for "
-"instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic"
-" of\n"
+"communication is not the only technique available, and it does have anonymity\n"
+"implications.  On the positive side, by using separate tunnels it lessens the\n"
+"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic of\n"
 "an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel.  With bidirectional tunnels, all participants"
-" would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then "
-"100KB\n"
-"in the other.  On the negative side, using unidirectional tunnels means "
-"that\n"
-"there are two sets of peers which need to be profiled and accounted for, "
-"and\n"
-"additional care must be taken to address the increased speed of "
-"predecessor\n"
+"delivered along the tunnel.  With bidirectional tunnels, all participants would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
+"in the other.  On the negative side, using unidirectional tunnels means that\n"
+"there are two sets of peers which need to be profiled and accounted for, and\n"
+"additional care must be taken to address the increased speed of predecessor\n"
 "attacks.  The tunnel pooling and building process\n"
 "(peer selection and ordering strategies)\n"
 "should minimize the worries of the predecessor attack."
@@ -16433,28 +14213,22 @@ msgstr ""
 #, python-format
 msgid ""
 "A recent <a href=\"%(pdf)s\">paper by Hermann and Grothoff</a>\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design "
-"decision\"."
+"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
 msgid ""
 "The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is "
-"an \n"
-"advantage, but that an attacker can be more certain in the unidirectional"
-" case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a "
-"disadvantage, at least\n"
+"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
+"advantage, but that an attacker can be more certain in the unidirectional case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
 "with long-living I2P Sites."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
 msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional "
-"tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of "
-"the \n"
+"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of the \n"
 "attack in the paper\n"
 "with attacks on a bidirectional tunnel architecture."
 msgstr ""
@@ -16463,63 +14237,45 @@ msgstr ""
 msgid ""
 "This conclusion is based on an arbitrary certainty vs. time weighting \n"
 "(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas "
-"to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas to \n"
 "each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the I2P Site goes down or is slowed down. So "
-"close \n"
+"intersection attack see if the I2P Site goes down or is slowed down. So close \n"
 "may be good enough, or time may be more important."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
 msgid ""
-"The conclusion is based on a specific weighting of the importance of "
-"certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable,"
-" \n"
-"especially in a real world with subpoenas, search warrants, and other "
-"methods \n"
+"The conclusion is based on a specific weighting of the importance of certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
+"especially in a real world with subpoenas, search warrants, and other methods \n"
 "available for final confirmation."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
 msgid ""
 "A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done"
-" \n"
-"elsewhere. For example, how does this attack compare to the numerous "
-"possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors"
-" have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done \n"
+"elsewhere. For example, how does this attack compare to the numerous possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors have not\n"
 "done that analysis, if it's even possible to do it\n"
 "effectively."
 msgstr ""
 
 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
 msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
-" \n"
-"uses unidirectional tunnels and has had very little review. Does the lack"
-" of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor "
-"design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
+"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor design \n"
 "choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. "
-"The \n"
-"design intent (see references above) was that unidirectional tunnels are "
-"more \n"
-"resistant to timing attacks. However, the paper presents a somewhat "
-"different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
+"design intent (see references above) was that unidirectional tunnels are more \n"
+"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
 "attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
 "tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative "
-"that \n"
-"clearly needs further investigation and analysis? There are several other"
-" reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small "
-"network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels "
-"really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative that \n"
+"clearly needs further investigation and analysis? There are several other reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
 "reason?"
 msgstr ""
 
@@ -16530,4 +14286,3 @@ msgid ""
 "tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
 "conclusion is not supported by the paper."
 msgstr ""
-
diff --git a/i2p2www/translations/sq/LC_MESSAGES/get-involved.po b/i2p2www/translations/sq/LC_MESSAGES/get-involved.po
index 074f931aad4e22249ef787e06424ded020061d65..60bd0d42ab6ec7c9cf06220a1fac3d8018a861c8 100644
--- a/i2p2www/translations/sq/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/sq/LC_MESSAGES/get-involved.po
@@ -1,22 +1,24 @@
-# Albanian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Besnik Bleta <besnik@programeshqip.org>, 2018
+# Besnik Bleta <besnik@programeshqip.org>, 2018
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-04-26 14:56+0000\n"
-"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Besnik Bleta <besnik@programeshqip.org>, 2018\n"
 "Language-Team: Albanian (http://www.transifex.com/otf/I2P/language/sq/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: sq\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/get-involved/donate.html:2
 #: i2p2www/pages/site/get-involved/index.html:107
@@ -31,12 +33,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:5
 msgid ""
 "For almost two decades the Invisible Internet Project (I2P) has\n"
-"researched and developed a transport layer and software with a focus on "
-"providing\n"
-"privacy and security for online communication. The Invisible Internet "
-"Project\n"
-"(I2P) supports the right to access. The project works to constantly "
-"improve\n"
+"researched and developed a transport layer and software with a focus on providing\n"
+"privacy and security for online communication. The Invisible Internet Project\n"
+"(I2P) supports the right to access. The project works to constantly improve\n"
 "its circumvention abilities and resistance."
 msgstr ""
 
@@ -51,44 +50,33 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/donate.html:16
 msgid ""
 "\n"
-"People who are concerned about their privacy and interested in "
-"alternatives to the internet make use of the network and its applications"
-" to chat, email, torrent and run their own sites and forums. In some "
-"circumstances individuals rely on the network to communicate due to "
-"safety issues or censorship. Researchers, developers and digital rights "
-"defenders make use of the network as well.\n"
+"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:20
-msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?"
+msgid ""
+"How Is The Invisible Internet Project Funded and How Is That Funding Used?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:22
 #, python-format
 msgid ""
-"The Invisible Internet Project (I2P) is 100% community funded. In the "
-"past the Project has received a grant from DuckDuckGo, and has received "
-"support from the OTF Usability Lab providers. This helped to guide "
-"improvements to the Java software and website UX and information "
-"architecture.\n"
-"Donations support I2P maintainers server costs, and other costs "
-"associated with keeping the network services up and running. Donations "
-"support improving the I2P protocol, application layer, outreach and "
-"design."
+"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n"
+"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:25
 msgid ""
-"I2P accepts donations in cryptocurrencies and via Paypal. Android users "
-"may also support the project through the Google Play Store by choosing "
-"the \"Donate\" edition. I2P funding is handled by meeh."
+"I2P accepts donations in cryptocurrencies and via Paypal. Android users may "
+"also support the project through the Google Play Store by choosing the "
+"\"Donate\" edition. I2P funding is handled by meeh."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:28
 msgid ""
-"The following addresses are valid as of June 10th, 2019. Please note that"
-" any other addresses not listed here are no longer valid. Please note "
-"that addresses may update and more coins may be added. "
+"The following addresses are valid as of June 10th, 2019. Please note that "
+"any other addresses not listed here are no longer valid. Please note that "
+"addresses may update and more coins may be added. "
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/donate.html:31
@@ -127,10 +115,8 @@ msgstr "Na tregoni rreth dhurimit tuaj"
 
 #: i2p2www/pages/site/get-involved/donate.html:55
 msgid ""
-"If you wish, you can inform us of your donation using the form just "
-"below.\n"
-"This is not a required step for your donation to succeed, but if you want"
-" to\n"
+"If you wish, you can inform us of your donation using the form just below.\n"
+"This is not a required step for your donation to succeed, but if you want to\n"
 "make sure we know you're out there, get ahold of us here."
 msgstr ""
 
@@ -160,10 +146,8 @@ msgstr "Ngjitës"
 
 #: i2p2www/pages/site/get-involved/donate.html:84
 msgid ""
-"I2P makes stickers available at conferences - please refer to the "
-"official I2P\n"
-"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also"
-" be\n"
+"I2P makes stickers available at conferences - please refer to the official I2P\n"
+"Twitter and Masdodon  accounts to contact the I2P team. Stickers can also be\n"
 "sent by post with your donation while supplies last."
 msgstr ""
 
@@ -178,25 +162,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:5
 #, python-format
 msgid ""
-"To get involved, please feel free to join us on the forum, which is "
-"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
-"on the non-private internet and at <a "
-"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
-"inside the I2P network, or to create an account on our project Gitlab <a "
-"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a "
-"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you"
-" don't want to create an account on our forum, some \n"
-"of our developers are active Redditors who will talk to you on <a "
-"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
-"us also operate <a href=\"https://github.com/\">Github</a> accounts where"
-" we work on I2P-Related projects, but we do not\n"
+"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n"
+"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n"
+"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n"
+"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n"
+"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n"
 "offer official support for I2P contributions via Github.\n"
-"For real-time chat, there is an IRC network within I2P. Please join the "
-"#i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
-"irc.dg.i2p or irc.postman.i2p).\n"
-"Other contact information is maintained on <a href=\"%(team)s\">this "
-"page</a>."
+"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n"
+"Other contact information is maintained on <a href=\"%(team)s\">this page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:16
@@ -222,8 +196,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:27
 msgid ""
-"We need help in many areas, and you don't need to know Java to "
-"contribute.\n"
+"We need help in many areas, and you don't need to know Java to contribute.\n"
 "Here's a list to help get you started."
 msgstr ""
 
@@ -237,12 +210,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:34
 msgid ""
-"Tell people about I2P on forums, blogs, and comments to articles. Fix up "
-"the\n"
-"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in"
-" your language</a>. Tell your friends, and more\n"
-"importantly, use I2P to communicate with your friends. We have many tools"
-" that\n"
+"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n"
+"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n"
+"importantly, use I2P to communicate with your friends. We have many tools that\n"
 "can help you keep your private conversations private."
 msgstr ""
 
@@ -253,10 +223,8 @@ msgstr "Përkthim"
 #: i2p2www/pages/site/get-involved/index.html:41
 #, python-format
 msgid ""
-"Help translate the website and the software into your language. "
-"Translators are\n"
-"a very important part of this decentralized project and your work is "
-"always\n"
+"Help translate the website and the software into your language. Translators are\n"
+"a very important part of this decentralized project and your work is always\n"
 "appreciated.\n"
 "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details."
 msgstr ""
@@ -267,17 +235,12 @@ msgstr "Dokumentim"
 
 #: i2p2www/pages/site/get-involved/index.html:48
 msgid ""
-"Suggest changes to the website, or help fix the parts of the website that"
-" you\n"
-"notice are outdated or incomplete. Web Site development has been fully "
-"migrated to\n"
+"Suggest changes to the website, or help fix the parts of the website that you\n"
+"notice are outdated or incomplete. Web Site development has been fully migrated to\n"
 "git, you can participate by creating an account on our project Gitlab\n"
-"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network"
-" here</a> or \n"
-"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private "
-"internet here</a>. We also always \n"
-"appreciate our wonderful translators, join one of our Transifex teams and"
-" help\n"
+"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n"
+"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n"
+"appreciate our wonderful translators, join one of our Transifex teams and help\n"
 "translate pages into other languages."
 msgstr ""
 
@@ -288,16 +251,11 @@ msgstr "Testim"
 #: i2p2www/pages/site/get-involved/index.html:58
 #, python-format
 msgid ""
-"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a "
-"recent\n"
-"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial "
-"github mirror</a>\n"
-"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-"
-"hackers/i2p.www\">inside the I2P network here</a>\n"
-"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-"
-"private internet here</a>.\n"
-"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still"
-" acceptable."
+"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n"
+"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n"
+"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n"
+"or  <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n"
+"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:67
@@ -310,14 +268,10 @@ msgstr "Shërbime"
 
 #: i2p2www/pages/site/get-involved/index.html:70
 msgid ""
-"Self-hosting almost anything, from an SSH server for yourself to an "
-"ActivityPub\n"
-"forum for everyone and anything in between, is helpful to the I2P "
-"network,\n"
-"especially if you write down instructions for others. Almost anything you"
-" can\n"
-"think of can be made to work with I2P, and your service is valuable to "
-"the network."
+"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n"
+"forum for everyone and anything in between, is helpful to the I2P network,\n"
+"especially if you write down instructions for others. Almost anything you can\n"
+"think of can be made to work with I2P, and your service is valuable to the network."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/index.html:76
@@ -327,9 +281,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/index.html:77
 #, python-format
 msgid ""
-"Getting new users onto the network is a very important task, and that "
-"task is handled by our reseed servers. The more reseed servers we have, "
-"the more de-centralized and redundant our infrastructure is. It's a big "
+"Getting new users onto the network is a very important task, and that task "
+"is handled by our reseed servers. The more reseed servers we have, the more "
+"de-centralized and redundant our infrastructure is. It's a big "
 "responsibility, but it's pretty easy to set up a reseed server for new "
 "routers to bootstrap from. Detailed instructions are on our <a "
 "href=\"%(reseed)s\">reseed server page</a>."
@@ -373,8 +327,7 @@ msgstr "Analizë"
 msgid ""
 "Study or test the code to look for vulnerabilities.\n"
 "Both anonymity vulnerabilities from the various\n"
-"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other "
-"weaknesses due\n"
+"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n"
 "to security holes, benefit from ongoing research."
 msgstr ""
 
@@ -382,7 +335,7 @@ msgstr ""
 msgid "Roadmap"
 msgstr "Plan"
 
-#: i2p2www/pages/site/get-involved/roadmap.html:309
+#: i2p2www/pages/site/get-involved/roadmap.html:210
 #, python-format
 msgid ""
 "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info "
@@ -443,84 +396,61 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:36
 #, python-format
 msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major "
-"areas\n"
-"of future development on the core I2P network, spanning the plausibly "
-"planned\n"
-"releases. This does not include stego transports, porting to wireless "
-"devices,\n"
-"or tools to secure the local machine, nor does it include client "
-"applications\n"
-"that will be essential in I2P's success. There are probably other things "
-"that\n"
-"will come up, especially as I2P gets more peer review, but these are the "
-"main\n"
-"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to "
-"help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
+"of future development on the core I2P network, spanning the plausibly planned\n"
+"releases. This does not include stego transports, porting to wireless devices,\n"
+"or tools to secure the local machine, nor does it include client applications\n"
+"that will be essential in I2P's success. There are probably other things that\n"
+"will come up, especially as I2P gets more peer review, but these are the main\n"
+"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n"
 "<a href=\"%(volunteer)s\">Get involved</a>!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:53
 msgid ""
-"Within the current network database and profile management "
-"implementation, \n"
+"Within the current network database and profile management implementation, \n"
 "we have taken the liberty of some practical shortcuts. For instance, we \n"
 "don't have the code to drop peer references from the K-buckets, as we \n"
 "don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example"
-" \n"
-"deals with the peer profiles - the memory required to maintain each "
-"peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles"
-" \n"
+"we just keep the peers in whatever bucket is appropriate. Another example \n"
+"deals with the peer profiles - the memory required to maintain each peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles \n"
 "in memory without problems. While we have the capacity to use trimmed \n"
 "down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal "
-"profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
-" simply \n"
+"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
 "eject a profile altogether. It just wouldn't be practical to write that \n"
 "code yet, since we aren't going to need it for a while."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:68
 msgid ""
-"That said, as the network grows we are going to want to keep these "
-"considerations \n"
+"That said, as the network grows we are going to want to keep these considerations \n"
 "in mind. We will have some work to do, but we can put it off for later."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:80
 msgid ""
-"The restricted route functionality described before was simply a "
-"functional \n"
+"The restricted route functionality described before was simply a functional \n"
 "issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes "
-"additional \n"
-"capabilities. For instance, if a router absolutely cannot risk "
-"communicating \n"
-"directly with any untrusted peers, they can set up trusted links through"
-" \n"
+"do so. However, the concept of allowing restricted routes includes additional \n"
+"capabilities. For instance, if a router absolutely cannot risk communicating \n"
+"directly with any untrusted peers, they can set up trusted links through \n"
 "those peers, using them to both send and receive all of its messages. \n"
 "Those hidden peers who want to be completely isolated would also refuse \n"
 "to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the "
-"garlic \n"
+"garlic routing technique outlined before) - they can simply take the garlic \n"
 "clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with "
-"instructions \n"
+"route that message out one of the hidden peer's trusted links with instructions \n"
 "to forward it as requested."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:99
 #, python-format
 msgid ""
-"Within the network, we will want some way to deter people from consuming"
-" \n"
-"too many resources or from creating so many peers to mount a <a "
-"href=\"%(link)s\">Sybil</a> \n"
-"attack. Traditional techniques such as having a peer see who is "
-"requesting \n"
+"Within the network, we will want some way to deter people from consuming \n"
+"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n"
+"attack. Traditional techniques such as having a peer see who is requesting \n"
 "a resource or running a peer aren't appropriate for use within I2P, as \n"
 "doing so would compromise the anonymity of the system. Instead, we want \n"
 "to make certain requests \"expensive\"."
@@ -529,17 +459,12 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:107
 msgid ""
 "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain "
-"activities, \n"
-"such as creating a new router identity (done only once on installation),"
-" \n"
+"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
+"such as creating a new router identity (done only once on installation), \n"
 "creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
-" \n"
-"times per hour). We don't know the \"correct\" cost of each type of "
-"certificate \n"
-"yet, but with some research and experimentation, we could set a base "
-"level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
+"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
+"yet, but with some research and experimentation, we could set a base level \n"
 "that is sufficiently expensive while not an excessive burden for people \n"
 "with few resources."
 msgstr ""
@@ -547,29 +472,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/todo.html:118
 msgid ""
 "There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is"
-" \n"
+"requests for resources \"nonfree\", and further research on that front is \n"
 "appropriate."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:128
 #, python-format
 msgid ""
-"To powerful passive external observers as well as large colluding "
-"internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis "
-"attacks \n"
-"- simply watching the size and frequency of messages being passed between"
-" \n"
+"To powerful passive external observers as well as large colluding internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
+"- simply watching the size and frequency of messages being passed between \n"
 "routers. To defend against these, we will want to essentially turn some \n"
 "of the tunnels into its own mix cascade - delaying messages received at \n"
 "the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" "
-"tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
 "messages by peers in the path). There has been a significant amount of \n"
 "<a href=\"%(pdf)s\">research</a> \n"
-"on these algorithms that we can lean on prior to implementing the various"
-" \n"
+"on these algorithms that we can lean on prior to implementing the various \n"
 "tunnel mixing strategies."
 msgstr ""
 
@@ -577,42 +496,33 @@ msgstr ""
 msgid ""
 "In addition to the anonymity aspects of more varied tunnel operation, \n"
 "there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular"
-" \n"
+"amount of data they can route for the network, and to keep any particular \n"
 "tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel"
-" \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel \n"
 "may be configured to throttle itself after passing 600 messages (1 per \n"
 "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
 "last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their"
-" \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their \n"
 "tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
 "available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:154
 msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels"
-" \n"
+"In addition, we may want to implement code to dynamically reroute tunnels \n"
 "to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a "
-"tunnel \n"
+"can be done by garlic routing a message to any particular peer in a tunnel \n"
 "with instructions to redefine the next-hop in the tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/todo.html:165
 msgid ""
 "Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing"
-" \n"
+"capabilities for protecting against powerful attackers, such as allowing \n"
 "each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long"
-" \n"
-"term intersection attack, as a peer could send a message that looks "
-"perfectly \n"
-"standard to most peers that pass it along, except at any peers where the"
-" \n"
+"it should be forwarded on. This would enable protections against the long \n"
+"term intersection attack, as a peer could send a message that looks perfectly \n"
+"standard to most peers that pass it along, except at any peers where the \n"
 "clove exposed includes delay instructions."
 msgstr ""
 
@@ -656,72 +566,52 @@ msgstr "Filloni të zhvilloni - një udhërrëfyes i thjeshtë"
 msgid ""
 "There are multiple ways to use applications in I2P.\n"
 "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n"
-"you can use regular applications without needing to program explicit I2P "
-"support.\n"
+"you can use regular applications without needing to program explicit I2P support.\n"
 "This is very effective for client-server scenario's,\n"
 "where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that "
-"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
+"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:25
 msgid ""
-"If your application is distributed, it will require connections to a "
-"large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you "
-"want to contact,\n"
+"If your application is distributed, it will require connections to a large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
 "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n"
-"This process can of course be automated, but running a lot of I2PTunnel "
-"instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
 "In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably "
-"run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
-"Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
-"information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
 "(host and port)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:36
 msgid ""
-"General network applications often send a lot of additional data that "
-"could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent "
-"without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in "
-"mind\n"
+"General network applications often send a lot of additional data that could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in mind\n"
 "can avoid compromising user identities."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:42
 msgid ""
-"There are also efficiency considerations to review when determining how "
-"to \n"
-"interact on top of I2P.  The streaming library and things built on top of"
-" it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols "
-"(I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP).  The "
-"important\n"
-"distinction is that with I2P, communication is operating over a long fat "
-"network - \n"
-"each end to end message will have nontrivial latencies, but may contain "
-"payloads \n"
-"of up to several KB.  An application that needs a simple request and "
-"response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown "
-"handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU "
-"detection or \n"
+"There are also efficiency considerations to review when determining how to \n"
+"interact on top of I2P.  The streaming library and things built on top of it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP).  The important\n"
+"distinction is that with I2P, communication is operating over a long fat network - \n"
+"each end to end message will have nontrivial latencies, but may contain payloads \n"
+"of up to several KB.  An application that needs a simple request and response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU detection or \n"
 "fragmentation of messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:56
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
 msgid ""
-"Creating a server-client connection using I2PTunnel only requires "
-"creating a single tunnel."
+"Creating a server-client connection using I2PTunnel only requires creating a"
+" single tunnel."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:58
@@ -731,8 +621,8 @@ msgstr "Figura 1:"
 #: i2p2www/pages/site/get-involved/develop/applications.html:63
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
 msgid ""
-"Setting up connections for a peer-to-peer applications requires a very "
-"large amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very large"
+" amount of tunnels."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:65
@@ -745,33 +635,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:73
 msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial "
-"amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is "
-"required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is required for each peer)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:77
 msgid ""
-"General network protocols often send a lot of additional data that can be"
-" used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network "
-"protocol\n"
+"General network protocols often send a lot of additional data that can be used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network protocol\n"
 "that does not leak such information, keeping users anonymous and secure."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:82
 msgid ""
-"Network protocols designed for use on the regular internet can be "
-"inefficient\n"
+"Network protocols designed for use on the regular internet can be inefficient\n"
 "on I2P, which is a network with a much higher latency."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:89
 #, python-format
 msgid ""
-"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for"
-" developers\n"
+"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n"
 "so that applications may be easily integrated and distributed."
 msgstr ""
 
@@ -792,76 +676,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:109
 msgid ""
-"An application running on I2P sends messages from and receives messages "
-"to a\n"
-"unique cryptographically secure end point - a \"destination\".  In TCP or"
-" UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a "
-"hostname\n"
+"An application running on I2P sends messages from and receives messages to a\n"
+"unique cryptographically secure end point - a \"destination\".  In TCP or UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a hostname\n"
 "plus port number pair, though there are a few differences."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:117
 msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to"
-" one is \n"
-"encrypted as if there were universal deployment of IPsec with the "
-"(anonymized)\n"
-"location of the end point signed as if there were universal deployment of"
-" DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
+"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
+"location of the end point signed as if there were universal deployment of DNSSEC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:122
 msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P "
-"router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at"
-"\n"
-"once).  This is quite different from the TCP or UDP world where a single "
-"end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at\n"
+"once).  This is quite different from the TCP or UDP world where a single end point (port)\n"
 "must stay on a single host."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:129
 msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a "
-"2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a "
-"variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
 "certificate, which may contain proof of work or blinded data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:134
 #, python-format
 msgid ""
-"There are existing ways to refer to these large and ugly destinations by "
-"short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
-"guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each "
-"person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates "
-"to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
 "managed using \"subscriptions\" to naming services).\n"
 "There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it"
-" being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
 "since there are those who don't think such a beast is possible.\n"
-"<a href=\"%(naming)s\">Further information on the naming system</a> is "
-"available."
+"<a href=\"%(naming)s\">Further information on the naming system</a> is available."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:148
 #, python-format
 msgid ""
 "While most applications do not need to distinguish protocols and ports,\n"
-"I2P <em>does</em> support them. Complex applications may specify a "
-"protocol,\n"
+"I2P <em>does</em> support them. Complex applications may specify a protocol,\n"
 "from port, and to port, on a per-message basis, to multiplex traffic on\n"
 "a single destination.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all "
-"ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:157
@@ -871,25 +736,18 @@ msgstr "Anonimitet dhe fshehtësi"
 #: i2p2www/pages/site/get-involved/develop/applications.html:159
 msgid ""
 "I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to"
-" Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the "
-"datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who "
-"sent the data."
+"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who sent the data."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:166
 msgid ""
 "Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the "
-"content of what they\n"
-"send.  For instance, if Alice sends Bob a form with her full name, "
-"government IDs, and \n"
-"credit card numbers, there is nothing I2P can do.  As such, protocols and"
-" applications should \n"
-"keep in mind what information they are trying to protect and what "
-"information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
+"send.  For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
+"credit card numbers, there is nothing I2P can do.  As such, protocols and applications should \n"
+"keep in mind what information they are trying to protect and what information they are willing\n"
 "to expose."
 msgstr ""
 
@@ -900,29 +758,21 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:177
 #, python-format
 msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can "
-"essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and "
-"connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply "
-"fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for "
-"transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not "
-"currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
 "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n"
 "For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P"
-" as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
 "application without having to write fragmentation, resends, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:191
 msgid ""
-"There are several means of sending data over I2P, each with their own "
-"pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of "
-"I2P applications."
+"There are several means of sending data over I2P, each with their own pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of I2P applications."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:196
@@ -932,10 +782,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:197
 #, python-format
 msgid ""
-"The <a href=\"%(streaming)s\">full streaming library</a> is now the "
-"standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in "
-"the <a href=\"#start.streaming\">Streaming development guide</a>."
+"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:203
@@ -943,13 +791,10 @@ msgstr ""
 msgid ""
 "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n"
 "allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP "
-"support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
 "is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to"
-" \n"
-"I2P specifications. Up to date info and applications that use BOB can be"
-" \n"
+"destination key generation, and verification that an address conforms to \n"
+"I2P specifications. Up to date info and applications that use BOB can be \n"
 "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>."
 msgstr ""
 
@@ -960,43 +805,36 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:217
 #, python-format
 msgid ""
-"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, "
-"allowing an\n"
-"application written in any language to talk to a SAM bridge through a "
-"plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating "
-"the encryption/decryption\n"
+"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n"
+"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
 "and event based handling.  SAM supports three styles of operation:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:224
 msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably "
-"and in order"
+"streams, for when Alice and Bob want to send data to each other reliably and"
+" in order"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:227
 msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob "
-"can reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
+" reply to"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:230
 msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
-"performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not "
-"(e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
 "is self authenticating)"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:236
 msgid ""
 "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
-" between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the "
-"application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
 "communications with the SAM bridge."
 msgstr ""
 
@@ -1011,28 +849,20 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:251
 msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like "
-"tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a "
-"specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) "
-"or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it "
-"gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port).  These streams are"
-" 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM "
-"uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel "
-"instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port).  These streams are 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
 "their own unique I2P destination and their own set of tunnels, keys, etc."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:263
 msgid ""
 "I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality "
-"may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
 "and untested."
 msgstr ""
 
@@ -1043,8 +873,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:271
 msgid ""
 "There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full "
-"streaming library."
+"but now ministreaming.jar contains only the interfaces for the full streaming library."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:276
@@ -1058,8 +887,7 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:278
 #, python-format
 msgid ""
-"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-"
-"like packets.\n"
+"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n"
 "It's possible to use:"
 msgstr ""
 
@@ -1078,14 +906,10 @@ msgstr "Jo të këshilluara"
 #: i2p2www/pages/site/get-involved/develop/applications.html:289
 #, python-format
 msgid ""
-"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, "
-"but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be "
-"written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc).  While someone "
-"could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM"
-" library instead."
+"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc).  While someone could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM library instead."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:296
@@ -1094,17 +918,14 @@ msgstr "Aplikacione Web"
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:297
 msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache "
-"server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
 "Any standard web app technology should work."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:303
 msgid ""
-"Developing using I2P requires a working I2P installation and a "
-"development environment of your own choice.\n"
-"If you are using Java, you can start development with the <a "
-"href=\"#start.streaming\">streaming library</a> or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
+"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n"
 "Using another programming language, SAM or BOB can be used."
 msgstr ""
 
@@ -1114,8 +935,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:311
 msgid ""
-"The following example shows how to create TCP-like client and server "
-"applications\n"
+"The following example shows how to create TCP-like client and server applications\n"
 "using the streaming library."
 msgstr ""
 
@@ -1137,32 +957,25 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:325
 msgid ""
-"You can fetch these from an I2P installation, or add the following "
-"dependencies\n"
+"You can fetch these from an I2P installation, or add the following dependencies\n"
 "from Maven Central:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:334
 msgid ""
 "Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can "
-"send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other "
-"words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other words, the server will function as an echo."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:339
 msgid ""
-"We will start by initializing the server application. This requires "
-"getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
 "and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for "
-"an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
 "so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
-" the Destination that\n"
-"was created, as we will need to copy and paste that information later so "
-"the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
+"was created, as we will need to copy and paste that information later so the client can connect to us."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:370
@@ -1171,47 +984,39 @@ msgstr "Shembull kodi 1: gatitja e aplikacionit shërbyes."
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:372
 msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to "
-"accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can "
-"only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
 "A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each "
-"in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and "
-"send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
 "The bold code is the new code we add."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:456
-msgid "Code example 2: accepting connections from clients and handling messages."
+msgid ""
+"Code example 2: accepting connections from clients and handling messages."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:460
 msgid ""
-"When you run the above server code, it should print something like this "
-"(but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
 "one huge block of characters):"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:474
 msgid ""
-"This is the base64-representation of the server Destination. The client "
-"will need this string to reach the server."
+"This is the base64-representation of the server Destination. The client will"
+" need this string to reach the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:478
 msgid ""
-"Now, we will create the client application. Again, a number of steps are "
-"required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
 "Again, we will need to start by getting an I2PSocketManager.\n"
 "We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our "
-"connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket "
-"using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and"
-" from the server."
+"Instead, we will use the server Destination string to start our connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1223,12 +1028,9 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/applications.html:564
 msgid ""
 "Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string "
-"(like shown <a href=\"#start.streaming.destination\">above</a>).\n"
-"Next, start the client application. When it requests a Destination "
-"string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the "
-"server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n"
+"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:570
@@ -1253,8 +1055,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:601
 msgid ""
-"Jabber server - there have been some in the past, and there is one at the"
-" moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the "
+"moment, with access to the public internet"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:604
@@ -1273,8 +1075,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/applications.html:614
 msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-"
-"based\n"
+"Web-based applications - The sky is the limit for hosting web-server-based\n"
 "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
 "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
 msgstr ""
@@ -1303,20 +1104,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
 msgid ""
-"<a href=\"#transport\">Transport Keys</a> to push changes to remote "
-"servers."
+"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
 #, python-format
 msgid ""
 "Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"<a href=\"%(monotone)s#obtaining-and-deploying-developers-"
-"keys\">import</a> the\n"
-"developer commit keys, but only Monotone <a "
-"href=\"%(monotone)s#operating-a-monotone-server\">\n"
-"server operators</a> will need to import the <a "
-"href=\"#transport\">transport keys</a>."
+"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n"
+"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n"
+"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1341,9 +1138,7 @@ msgstr "Marrëveshje Licencimi"
 #: i2p2www/pages/site/get-involved/develop/license-agreements.html:5
 #, python-format
 msgid "For more information see <a href=\"%(licenses)s\">the licenses page</a>."
-msgstr ""
-"Për më tepër të dhëna, shihni <a href=\"%(licenses)s\">faqen e "
-"licencave</a>."
+msgstr "Për më tepër të dhëna, shihni <a href=\"%(licenses)s\">faqen e licencave</a>."
 
 #: i2p2www/pages/site/get-involved/develop/license-agreements.html:8
 msgid ""
@@ -1390,8 +1185,7 @@ msgstr "përdorim pa tarifë"
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:24
 msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running "
-"it"
+"use with no restrictions on how, when, where, why, or by whom is running it"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:25
@@ -1404,24 +1198,15 @@ msgstr "modifikime te burimi"
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:29
 msgid ""
-"Most of the software guarantees much more - the ability of <b>anyone</b> "
-"to \n"
-"distribute the modified source however they choose.  However, not all of "
-"the \n"
-"software bundled provides this freedom - the GPL restricts the ability of"
-" \n"
-"developers who wish to integrate I2P with their own applications that are"
-" not \n"
-"themselves open source applications.  While we applaud the noble goals of"
-" \n"
-"increasing the resources in the commons, I2P is best served by removing "
-"any\n"
-"barriers that stand in the way of its adoption - if a developer "
-"considering whether\n"
-"they can integrate I2P with their application has to stop and check with "
-"their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as "
-"GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of <b>anyone</b> to \n"
+"distribute the modified source however they choose.  However, not all of the \n"
+"software bundled provides this freedom - the GPL restricts the ability of \n"
+"developers who wish to integrate I2P with their own applications that are not \n"
+"themselves open source applications.  While we applaud the noble goals of \n"
+"increasing the resources in the commons, I2P is best served by removing any\n"
+"barriers that stand in the way of its adoption - if a developer considering whether\n"
+"they can integrate I2P with their application has to stop and check with their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
 "we lose out."
 msgstr ""
 
@@ -1431,22 +1216,14 @@ msgstr "Licenca përbërësish"
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:43
 msgid ""
-"The I2P distribution contains several resources, reflecting the "
-"partitioning of \n"
-"the source code into components.  Each component has its own license, "
-"which all \n"
-"developers who contribute to it agree to - either by explicitly declaring"
-" the release\n"
-"of code committed under a license compatible with that component, or by "
-"implicitly\n"
-"releasing the code committed under the component's primary license.  Each"
-" of these \n"
-"components has a lead developer who has the final say as to what license "
-"is compatible\n"
-"with the component's primary license, and the I2P project manager has the"
-" final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P "
-"distribution."
+"The I2P distribution contains several resources, reflecting the partitioning of \n"
+"the source code into components.  Each component has its own license, which all \n"
+"developers who contribute to it agree to - either by explicitly declaring the release\n"
+"of code committed under a license compatible with that component, or by implicitly\n"
+"releasing the code committed under the component's primary license.  Each of these \n"
+"components has a lead developer who has the final say as to what license is compatible\n"
+"with the component's primary license, and the I2P project manager has the final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1482,21 +1259,16 @@ msgstr "Përjashtim GPL + Java"
 msgid ""
 "While it may be redundant, just for clarity the\n"
 "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an "
-"additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
 "explicitly authorizing the use of Java's standard libraries:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:292
 msgid ""
-"All source code under each component will by default be licensed under "
-"the\n"
-"primary license, unless marked otherwise in the code.  All of the above "
-"is\n"
-"summary of the license terms - please see the specific license for the "
-"component\n"
-"or source code in question for authoritative terms.  Component source "
-"locations and\n"
+"All source code under each component will by default be licensed under the\n"
+"primary license, unless marked otherwise in the code.  All of the above is\n"
+"summary of the license terms - please see the specific license for the component\n"
+"or source code in question for authoritative terms.  Component source locations and\n"
 "resource packaging may be changed if the repository is reorganized."
 msgstr ""
 
@@ -1520,10 +1292,8 @@ msgstr ""
 msgid ""
 "However, to have changes included in a release, developers\n"
 "must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be "
-"trusted.\n"
-"That means that they must send one of the release managers a signed "
-"message affirming that:"
+"In addition, they must explicitly agree with the above terms to be trusted.\n"
+"That means that they must send one of the release managers a signed message affirming that:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:322
@@ -1534,8 +1304,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/licenses.html:326
 msgid ""
-"If specified in the source, the code may be explicitly licensed under one"
-"\n"
+"If specified in the source, the code may be explicitly licensed under one\n"
 "of the component's alternate licenses"
 msgstr ""
 
@@ -1548,10 +1317,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/licenses.html:336
 #, python-format
 msgid ""
-"If anyone is aware of any instances where the above conditions are not "
-"met,\n"
-"please contact the component lead and/or an I2P release manager with "
-"further\n"
+"If anyone is aware of any instances where the above conditions are not met,\n"
+"please contact the component lead and/or an I2P release manager with further\n"
 "information.\n"
 "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>."
 msgstr ""
@@ -1561,7 +1328,8 @@ msgid "Release Signing Key"
 msgstr "Kyç Nënshkrimi Hedhjesh Në Qarkullim"
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
-msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb."
+msgid ""
+"Windows installers for releases 0.9.38 and later are signed by zlatinb."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7
@@ -1582,7 +1350,8 @@ msgid "Download PGP public key"
 msgstr "Shkarkoni kyç PGP publik"
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209
-msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:"
+msgid ""
+"Releases from 0.9.9 could be signed by str4d. His current public key is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582
@@ -1590,13 +1359,14 @@ msgid "str4d has signed the following releases:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590
-msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid ""
+"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626
 msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
-"key is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
+"is:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -1604,7 +1374,8 @@ msgid "Security GPG Key"
 msgstr "Kyç Sigurie GPG"
 
 #: i2p2www/pages/site/get-involved/develop/security-key.html:4
-msgid "Following is the GPG key for the security _at_ geti2p.net email address:"
+msgid ""
+"Following is the GPG key for the security _at_ geti2p.net email address:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
@@ -1613,8 +1384,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
 msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key"
-" for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
 "verified differently, since he's away, and only left a binary detached\n"
 "signature for his key."
 msgstr ""
@@ -1646,35 +1416,28 @@ msgstr "Të tjera"
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
 msgid ""
-"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key "
-"`0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
-"B310 4155\n"
+"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
 "76BA A76E 0BED`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
 msgid ""
-"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the "
-"key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
-" FD81\n"
+"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
 "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
 msgid ""
-"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the "
-"key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
-"`73CF\n"
+"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
 "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
 msgid ""
-"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public "
-"keyservers locate\n"
+"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
 "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
 "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
 msgstr ""
@@ -1682,29 +1445,23 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
 msgid ""
 "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-"
-"committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
-"binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured"
-" form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
 "below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
 msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
-"as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
-"--dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
 "mtn-committers.asc`:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
 msgid ""
 "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
-"committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
 "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
 "`mtn-committers` file:"
 msgstr ""
@@ -1731,12 +1488,10 @@ msgstr "Udhëzime Elementare dhe Stil Kodimi"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11
 msgid ""
-"Most of the following should be common sense for anybody who has worked "
-"on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
 "programming envrionment.\n"
 "The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be "
-"substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
 "check with the appropriate developer for guidance."
 msgstr ""
 
@@ -1746,10 +1501,8 @@ msgstr "Bashkësi"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21
 msgid ""
-"Please don't just \"write code\". If you can, participate in other "
-"development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; "
-"testing;\n"
+"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n"
 "bug reporting and responses; documentation; code reviews; etc."
 msgstr ""
 
@@ -1771,8 +1524,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46
 msgid ""
-"2-3 weeks after previous release: Deadline to propagate major changes "
-"from other branches to trunk."
+"2-3 weeks after previous release: Deadline to propagate major changes from "
+"other branches to trunk."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49
@@ -1780,13 +1533,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52
-msgid "3-4 weeks before release: Feature freeze. Deadline for major new features."
+msgid ""
+"3-4 weeks before release: Feature freeze. Deadline for major new features."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55
 msgid ""
-"2-3 weeks before release: Hold project meeting to review new home page "
-"link requests, if any."
+"2-3 weeks before release: Hold project meeting to review new home page link "
+"requests, if any."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71
@@ -1795,8 +1549,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80
 msgid ""
-"Have a basic understanding of distributed source control systems, even if"
-" you haven't\n"
+"Have a basic understanding of distributed source control systems, even if you haven't\n"
 "used git before. Ask for help if you need it.\n"
 "Once pushed, checkins are forever, there is no undo. Please be careful.\n"
 "If you have not used git before, start with baby steps.\n"
@@ -1810,34 +1563,28 @@ msgid ""
 "use your own development branch\n"
 "and propagate back to i2p.i2p once it is working well.\n"
 "Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after"
-"\n"
+"In case you do (it happens), please do not vanish for a long period after\n"
 "you push your change."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96
 msgid ""
-"If your change is non-trivial, or you want people to test it and need "
-"good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to "
-"history.txt\n"
+"If your change is non-trivial, or you want people to test it and need good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to history.txt\n"
 "and increment the build revision in RouterVersion.java."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
 msgid ""
-"Ensure that you 'git pull' to the latest revision before you check in and"
-" push.\n"
+"Ensure that you 'git pull' to the latest revision before you check in and push.\n"
 "If you inadvertently diverge, merge and push as soon as possible.\n"
 "Don't routinely make others merge for you."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106
 msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the "
-"release cycle.\n"
-"If a project will take you more than a couple days, create your own "
-"branch in git\n"
+"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
+"If a project will take you more than a couple days, create your own branch in git\n"
 "and do the development there so you do not block releases."
 msgstr ""
 
@@ -1847,61 +1594,49 @@ msgstr "Stil Kodimi"
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
 msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do "
-"not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything,"
-" get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
-"editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
 "In some places, the coding style is different.\n"
 "Use common sense. Emulate the style in the file you are modifying."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122
 msgid ""
-"All new public and package-private classes and methods require Javadocs. "
-"Add @since release-number.\n"
+"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n"
 "Javadocs for new private methods are desirable."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126
 msgid ""
-"For any Javadocs added, there must not be any doclint errors or warnings."
-"\n"
+"For any Javadocs added, there must not be any doclint errors or warnings.\n"
 "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n"
-"All params must have @param lines, all non-void methods must have @return"
-" lines,\n"
-"all exceptions declared thrown must have @throws lines, and no HTML "
-"errors."
+"All params must have @param lines, all non-void methods must have @return lines,\n"
+"all exceptions declared thrown must have @throws lines, and no HTML errors."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132
 msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
-"official API.\n"
-"There are several out-of-tree plugins and other applications that rely on"
-" this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
+"There are several out-of-tree plugins and other applications that rely on this API.\n"
 "Be careful not to make any changes that break compatibility.\n"
 "Don't add methods to the API unless they are of general utility.\n"
 "Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the "
-"website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the website (i2p.www branch)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140
 msgid ""
 "Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will "
-"break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the "
-"release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
 "translators have a chance to update before the release."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146
 msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly "
-"multi-threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly multi-"
+"threaded application."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149
@@ -1928,20 +1663,19 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187
 msgid ""
-"Don't use String.getBytes() without a UTF-8 charset argument. You may "
-"also use DataHelper.getUTF8() or DataHelper.getASCII()."
+"Don't use String.getBytes() without a UTF-8 charset argument. You may also "
+"use DataHelper.getUTF8() or DataHelper.getASCII()."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190
 msgid ""
-"Always specify a UTF-8 charset when reading or writing files. The "
-"DataHelper utilities may be helpful."
+"Always specify a UTF-8 charset when reading or writing files. The DataHelper"
+" utilities may be helpful."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193
 msgid ""
-"Always specify a locale (for example Locale.US) when using "
-"String.toLowerCase() or String.toUpperCase().\n"
+"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n"
 "Do not use String.equalsIgnoreCase(), as a locale cannot be specified."
 msgstr ""
 
@@ -1950,14 +1684,14 @@ msgid "Don't use String.split(). Use DataHelper.split()."
 msgstr "Mos përdorni String.split(). Përdorni DataHelper.split()."
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203
-msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks."
+msgid ""
+"Ensure that InputStreams and OutputStreams are closed in finally blocks."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206
 msgid ""
 "Use {} for all for and while blocks, even if only one line.\n"
-"If you use {} for either the if, else, or if-else block, use it for all "
-"blocks.\n"
+"If you use {} for either the if, else, or if-else block, use it for all blocks.\n"
 "Put \"} else {\" on a single line."
 msgstr ""
 
@@ -1967,12 +1701,13 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214
 msgid ""
-"Don't store I2PAppContext, RouterContext, Log, or any other references to"
-" router or context items in static fields."
+"Don't store I2PAppContext, RouterContext, Log, or any other references to "
+"router or context items in static fields."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217
-msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread."
+msgid ""
+"Don't start threads in constructors. Use I2PAppThread instead of Thread."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222
@@ -1992,8 +1727,7 @@ msgstr ""
 msgid ""
 "If you do obtain approval to add external code or jars,\n"
 "and binaries are available in any Debian or Ubuntu package,\n"
-"you must implement build and packaging options to use the external "
-"package instead.\n"
+"you must implement build and packaging options to use the external package instead.\n"
 "Checklist of files to modify:"
 msgstr ""
 
@@ -2020,12 +1754,9 @@ msgstr ""
 msgid ""
 "New developers should start by fixing a bug.\n"
 "Search for bugs with the 'easy' keyword on trac.\n"
-"When you have a fix, attach your patch to the ticket and add the keyword "
-"'review-needed'.\n"
-"Do not close the ticket until it's been successfully reviewed and you've "
-"checked your changes in.\n"
-"Once you've done this smoothly for a couple of tickets, you may follow "
-"the normal procedure below."
+"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n"
+"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n"
+"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260
@@ -2044,22 +1775,22 @@ msgstr "Përdorimi i një IDE-je me I2P-në"
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:4
 msgid ""
-"The main I2P development branch (<code>i2p.i2p</code>) has been set up to"
-" enable developers to easily set up two of the commonly-used IDEs for "
-"Java development: Eclipse and NetBeans."
+"The main I2P development branch (<code>i2p.i2p</code>) has been set up to "
+"enable developers to easily set up two of the commonly-used IDEs for Java "
+"development: Eclipse and NetBeans."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:10
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain build.gradle to enable the branch to be easily set up in "
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain build.gradle to enable the branch to be easily set up in "
 "Eclipse."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:16
 msgid ""
-"Make sure you have a recent version of Eclipse.  Anything newer than 2017"
-" should do."
+"Make sure you have a recent version of Eclipse.  Anything newer than 2017 "
+"should do."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:20
@@ -2076,8 +1807,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:28
 msgid ""
-"For \"Project root directory:\" choose the directory that the I2P branch "
-"was checked out to."
+"For \"Project root directory:\" choose the directory that the I2P branch was"
+" checked out to."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2094,14 +1825,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:40
 msgid ""
-"Done! Your workspace should now contain all projects within the I2P "
-"branch, and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P branch, "
+"and their build dependencies should be correctly set up."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/ides.html:48
 msgid ""
-"The main I2P development branches (<code>i2p.i2p</code> and branches from"
-" it) contain NetBeans project files."
+"The main I2P development branches (<code>i2p.i2p</code> and branches from "
+"it) contain NetBeans project files."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2180,34 +1911,26 @@ msgstr "Dallime nën Debian GNU/Linux"
 #: i2p2www/pages/site/get-involved/guides/monotone.html:35
 #, python-format
 msgid ""
-"This is a revised version of <a "
-"href=\"%(transitionguide)s\">Complication's original\n"
+"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n"
 "  guide</a> detailing the use of Monotone in I2P development.\n"
-"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start "
-"guide</a>."
+"  For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:43
 #, python-format
 msgid ""
-"I2P has a distributed development model. The source code is replicated "
-"across\n"
-"  independently administered <a "
-"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
-"  Developers with commit rights are able to push their changes to the "
-"repository\n"
-"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be "
-"signed\n"
+"I2P has a distributed development model. The source code is replicated across\n"
+"  independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n"
+"  Developers with commit rights are able to push their changes to the repository\n"
+"  (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n"
 "  before commit rights are granted)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:53
 msgid ""
 "Some of Monotone's noteworthy qualities are: distributed\n"
-"  version control, cryptographic authentication, access control, its "
-"small size, having few\n"
-"  dependencies, storage of projects in a compressed SQLite database file,"
-" and\n"
+"  version control, cryptographic authentication, access control, its small size, having few\n"
+"  dependencies, storage of projects in a compressed SQLite database file, and\n"
 "  having the ability to resume interrupted synchronization attempts."
 msgstr ""
 
@@ -2217,20 +1940,16 @@ msgstr "Përdorimi i një Klienti Monotone"
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:67
 msgid ""
-"A transport key grants you the ability to push your changes to a Monotone"
-" repository server.\n"
-"  In order to commit code into Monotone (in essence signing your code), a"
-" commit key is also needed.\n"
-"  None of the public Monotone servers on I2P currently require a key in "
-"order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
+"  In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
+"  None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:75
 msgid ""
 "Without a transport key, one cannot:\n"
 "  <ul>\n"
-"    <li>pull code from a server which doesn't allow global read "
-"access</li>\n"
+"    <li>pull code from a server which doesn't allow global read access</li>\n"
 "    <li>push code to any server</li>\n"
 "    <li>run a Monotone server</li>\n"
 "  </ul>"
@@ -2247,22 +1966,19 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:95
 msgid ""
 "If you only intend to retrieve code from MTN, feel free to skip to the\n"
-"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. "
-"If you want\n"
+"  <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n"
 "  to generate keys, read the following."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:103
 msgid ""
-"By convention keys are named like an e-mail addresses, but a "
-"corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
 "  address does not need to exist. For example, your keys might be named:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:114
 msgid ""
-"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in "
-"text files which\n"
+"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n"
 "  are named identically to the keys. For example:"
 msgstr ""
 
@@ -2274,10 +1990,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:134
 msgid ""
-"Monotone will prompt you for a password to protect your keys. You are "
-"very strongly encouraged to set a password\n"
-"  for the commit key. Many users will leave an empty password for the "
-"transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
+"  for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
 "  Monotone server."
 msgstr ""
 
@@ -2287,38 +2001,30 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:146
 msgid ""
-"Monotone's security model helps to ensure that nobody can easily "
-"impersonate a developer without\n"
-"  it being noticed. Since developers can make mistakes and become "
-"compromised,only manual review can\n"
-"  ensure quality of code. Monotone's trust model will ensure that you "
-"read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
+"  it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
+"  ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
 "  not replace reading diffs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:156
 msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) "
-"which contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) which "
+"contains all of the project's source code and history."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:162
 msgid ""
-"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the "
-"developers' keys into Monotone</a> and\n"
-"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust "
-"evaluation hooks</a>,\n"
-"  Monotone will prevent untrusted code from being checked out into your "
-"workspace.\n"
-"  There are commands available to clean untrusted code from your "
-"workspace but in practice they've not been\n"
+"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n"
+"  <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n"
+"  Monotone will prevent untrusted code from being checked out into your workspace.\n"
+"  There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
 "  needed due to the push access policies in place."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:172
 msgid ""
-"A repository can hold many branches. For example, our repository holds "
-"the\n"
+"A repository can hold many branches. For example, our repository holds the\n"
 "  following main branches:"
 msgstr ""
 
@@ -2336,23 +2042,17 @@ msgstr "Syndie, një mjet forumesh të shpërndarë"
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:184
 msgid ""
-"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>."
-" Before pulling\n"
-"  source code from servers, a database for your repository will need to "
-"be initialized.\n"
-"  To initialize your local repository, change into the directory that you"
-" want the\n"
-"  <code>i2p.mtn</code> file and branch directories to be stored and issue"
-" the following\n"
+"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n"
+"  source code from servers, a database for your repository will need to be initialized.\n"
+"  To initialize your local repository, change into the directory that you want the\n"
+"  <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n"
 "  command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:200
 msgid ""
-"Keys which developers use to commit code are essential for trust "
-"evaluation in\n"
-"  Monotone. The other developers' transport keys are only required for "
-"Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust evaluation in\n"
+"  Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
 "  "
 msgstr ""
 
@@ -2366,11 +2066,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/monotone.html:213
 #, python-format
 msgid ""
-"To import developers' keys after verifying their authenticity, copy <a "
-"href=\"%(devkeys)s\">all of the keys</a> into a new\n"
-"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same "
-"directory where <code>i2p.mtn</code> is located. Import the keys with the"
-" command:"
+"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n"
+"  file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:223
@@ -2381,34 +2078,27 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:231
 msgid ""
-"The default Monotone trust policy is way too lax for our requirements: "
-"every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
 "  That is not acceptable for I2P development."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:238
 msgid ""
-"Change into the directory <code><b>$HOME/.monotone</b></code> and open "
-"the file\n"
-"  <code>monotonerc</code> with a text editor. Copy and paste the "
-"following two functions into this file:"
+"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n"
+"  <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:247
 msgid ""
-"The first function determines an intersection between two sets, in our "
-"case a\n"
+"The first function determines an intersection between two sets, in our case a\n"
 "  revision's signers and trusted signers."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:254
 msgid ""
-"The second function determines trust in a given revision, by calling the "
-"first\n"
-"  function with \"signers\" and \"trusted\" as arguments. If the "
-"intersection is\n"
-"  null, the revision is not trusted. If the intersection is not empty, "
-"the\n"
+"The second function determines trust in a given revision, by calling the first\n"
+"  function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
+"  null, the revision is not trusted. If the intersection is not empty, the\n"
 "  revision is trusted. Otherwise, the revision is not trusted."
 msgstr ""
 
@@ -2421,18 +2111,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:271
 msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project "
-"Monotone server. Ensure that the tunnel has been started\n"
-"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before"
-" attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
+"  within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:278
 msgid ""
-"Enter the directory where you initialized <code>i2p.mtn</code>. Depending"
-" on whether you\n"
-"  want only I2P sources, or also sources for the I2P website and Syndie, "
-"you can\n"
+"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n"
+"  want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
 "  perform the <code>pull</code> operation in different ways."
 msgstr ""
 
@@ -2446,16 +2132,14 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:301
 msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating "
-"the pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating the "
+"pull command will resume the transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:307
 msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty "
-"transport key.\n"
-"  If everyone pulls anonymously it will be harder for an attacker who "
-"gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
+"  If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
 "  to selectively provide some people with tampered data."
 msgstr ""
 
@@ -2475,67 +2159,57 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:329
 msgid ""
-"With <code><b>monotonerc</b></code> configured as above, Monotone will no"
-" longer trust any committers. Confirm this by changing into the\n"
-"directory where <code>i2p.mtn</code> was created and attempt a checkout "
-"of the I2P branch:"
+"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
+"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:339
 msgid ""
-"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You "
-"should encounter many\n"
+"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n"
 "  error messages like:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:356
 msgid ""
 "If you are satisfied with results, restore the backup of\n"
-"  <code>monotonerc</code> that was created above. If you didn't create a "
-"backup\n"
-"  as advised, re-read <a href=\"#setting-up-trust-evaluation-"
-"hooks\">Setting up trust evaluation hooks</a>."
+"  <code>monotonerc</code> that was created above. If you didn't create a backup\n"
+"  as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:367
 msgid ""
-"If you already have a branch checked out, skip to the <a href"
-"=\"#updating-your-working-copy-to-the-latest-version\">next\n"
+"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n"
 "  section</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:374
 msgid ""
-"Change into the directory where <code>i2p.mtn</code> is located. Over "
-"there issue:"
+"Change into the directory where <code>i2p.mtn</code> is located. Over there "
+"issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:383
 msgid ""
-"The checkout should complete without error messages and a directory named"
-"\n"
-"  <code>i2p.i2p</code> should appear in the current directory. "
-"Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named\n"
+"  <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n"
 "  successfully checked out the latest I2P sources, ready to be compiled."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:394
 msgid ""
-"If you haven't done this already, pull fresh code from the server to your"
-" local\n"
-"  Monotone repository. To accomplish this, change into the directory "
-"where\n"
+"If you haven't done this already, pull fresh code from the server to your local\n"
+"  Monotone repository. To accomplish this, change into the directory where\n"
 "  <code>i2p.mtn</code> is located and issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:405
-msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:"
+msgid ""
+"Now change into your <code>i2p.i2p</code> directory, and over there issue:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:414
 msgid ""
-"As long as there were no errors&hellip;Congratulations! You have "
-"successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors&hellip;Congratulations! You have successfully updated to the latest I2P sources. They\n"
 "  should be ready to compile."
 msgstr ""
 
@@ -2559,8 +2233,8 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:452
 msgid ""
-"No one will not be able to push code to your server without permission "
-"being explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission being"
+" explicitly granted. To grant push access:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:458
@@ -2576,44 +2250,34 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:469
 msgid ""
-"Import the transport key(s) into your database. The procedure for "
-"importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section <a href"
-"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying "
-"developers' keys</a>."
+"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:479
 msgid ""
-"A separate database should be used for your Monotone server because "
-"monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
 "  Make a copy of your development database, then start the server with:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:486
 msgid ""
-"If your key is protected with a passphrase, Monotone may request the "
-"passphrase\n"
-"  when the first client connects. You can work around this by connecting "
-"making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the passphrase\n"
+"  when the first client connects. You can work around this by connecting making the first client connection to your server\n"
 "  (or by clearing the password for your transport key)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:494
 msgid ""
-"For your server to be accessible for others over I2P, you will need to "
-"create a\n"
-"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
-"profile."
+"For your server to be accessible for others over I2P, you will need to create a\n"
+"  server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:504
 msgid ""
 "Debian (amongst other distributions) has integrated Monotone into their\n"
-"  framework of daemons/services. Although Monotone servers can still be "
-"run\n"
-"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
-" be more straightforward."
+"  framework of daemons/services. Although Monotone servers can still be run\n"
+"  \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/monotone.html:512
@@ -2621,8 +2285,7 @@ msgid ""
 "Permissions are granted by editing the files\n"
 "  <code>/etc/monotone/read-permissions</code> and\n"
 "  <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n"
-"  <code>/etc/default/monotone</code> to enable monotone to start at boot "
-"or to\n"
+"  <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n"
 "  customize the host, port, or database location."
 msgstr ""
 
@@ -2631,64 +2294,59 @@ msgid "New Developer's Guide"
 msgstr "Udhërrëfyes për Zhvillues të Rinj"
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:6
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:32
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:31
 msgid "Basic study"
 msgstr "Studim elementar"
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:7
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:46
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:45
 msgid "Getting the I2P code"
 msgstr "Marrja e kodit për I2P"
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:9
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:52
 msgid "The new way: Git"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:10
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:11
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81
-msgid "The old way: Monotone"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:145
 msgid "Building I2P"
 msgstr "Ndërtimi i I2P-së"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:166
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:12
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:102
 msgid "Development ideas"
 msgstr "Ide zhvillimi"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:174
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:13
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:110
 msgid "Making the results available"
 msgstr "Bërja e përfundimeve të passhme"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:196
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:14
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
 msgid "Get to know us!"
 msgstr "Njihuni me ne!"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:202
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:15
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
 msgid "Translations"
 msgstr "Përkthime"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:17
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:208
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
 msgid "Tools"
 msgstr "Mjete"
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:22
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:21
 msgid ""
 "\n"
 "So you want to start work on I2P? Great!\n"
 "Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or "
-"creating translations."
+"on contributing to the website or the software, doing development or creating translations."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:26
 #, python-format
 msgid ""
 "\n"
@@ -2696,42 +2354,34 @@ msgid ""
 "Try <a href=\"%(volunteer)s\">getting involved</a> first."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:34
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
 msgid ""
-"Basic development on the I2P router or the embedded applications uses "
-"Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at <a "
-"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
+"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:38
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:37
 #, python-format
 msgid ""
 "Study the <a href=\"%(intro)s\">how intro</a>,\n"
 "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n"
 "the <a href=\"%(techintro)s\">tech intro</a>,\n"
 "and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what "
-"different things it does."
+"These will give you a good overview of how I2P is structured and what different things it does."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:47
 msgid ""
 "For development on the I2P router or the embedded applications,\n"
 "there are two ways to get the source code:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
-msgid "The easy way: Git"
-msgstr "Rruga e lehtë: Git"
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:55
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:54
 #, python-format
 msgid ""
-"I2P now has official Git services and accepts contributions via Git at "
-"our own gitlab.\n"
-"For the time being, issues are still being manged on <a "
-"href=\"%(trac)s\">trac</a>."
+"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n"
+"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n"
+"issues between Gitlab and Github is a work-in-progress."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-developers.html:58
@@ -2744,143 +2394,31 @@ msgstr ""
 msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:84
-msgid ""
-"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n"
-"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to "
-"the source code (and for a lot of complicated things, but 'keeping track "
-"of changes' is the basic idea)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:89
-msgid ""
-"Skim over the <a "
-"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>,"
-" to make sure you understand the concepts."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:93
-msgid ""
-"If you want to remain anonymous, you need to do an additional step, to "
-"set up a connection to a monotone server over I2P:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
 #, python-format
 msgid ""
-"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port "
-"8998 pointing to mtn.i2p-projekt.i2p."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
-msgid ""
-"Pick a directory where you want to put all your I2P files, and create a "
-"monotone database:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
-msgid ""
-"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or"
-" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the "
-"following contents:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
-#, python-format
-msgid ""
-"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> "
-"into a new file (e.g. <code>keys.txt</code>) in the same directory\n"
-"  that <code>i2p.mtn</code> is in. Import the keys into your database "
-"with <br><code><pre>      mtn -d i2p.mtn read < keys.txt</pre></code>"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
-msgid ""
-"Pull the I2P sources to your machine. This may take a long time, "
-"especially if you are doing this over I2P!"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
-msgid "Anonymously:"
-msgstr "Në mënyrë anonime:"
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:117
-msgid "Non-anonymously:"
-msgstr "Jo në mënyrë anonime:"
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:123
-msgid ""
-"All the sources are now present on your machine, in the database file. To"
-" make them available in a directory, you need to check them out:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:125
-msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the "
-"I2P sources."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:129
-msgid "Remarks"
-msgstr "Nënvizime"
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
-msgid ""
-"\n"
-"To download the website files instead of the I2P source files, use "
-"'i2p.www' instead of 'i2p.i2p'."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:133
-msgid ""
-"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it"
-" left off.\n"
-"If you are in a hurry, use the non-anonymous access."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
-#, python-format
-msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on <a"
-" href=\"%(viewmtn)s\">viewmtn</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:141
-#, python-format
-msgid ""
-"A long explanation about using monotone is available on the <a "
-"href=\"%(monotone)s\">monotone page</a>."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:147
-#, python-format
-msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, "
-"or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
 "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n"
 "<a href=\"http://ant.apache.org/\">Apache ant</a>\n"
 "version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p "
-"directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:155
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:91
 msgid ""
 "To build or work on console translations, you need\n"
 "the xgettext, msgfmt, and msgmerge tools from the\n"
 "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:161
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
 #, python-format
 msgid ""
 "For development on new applications,\n"
 "see the <a href=\"%(apps)s\">application development guide</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:167
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:103
 #, python-format
 msgid ""
 "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n"
@@ -2889,93 +2427,42 @@ msgid ""
 "for ideas."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:176
-#, python-format
-msgid ""
-"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> "
-"for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p "
-"(not required for the website!)."
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:181
-msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:184
-msgid "use an empty passphrase"
-msgstr "përdorni një frazëkalim të zbrazët"
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:185
-msgid "enter a passphrase"
-msgstr "jepni frazëkalim"
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:186
-#, python-format
-msgid ""
-"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get "
-"push privileges"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:187
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:112
 #, python-format
 msgid ""
-"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get "
-"commit privileges - not required for website"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:188
-msgid "check in with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:189
-msgid "push with this key"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:191
-#, python-format
-msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>."
+"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:197
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:118
 #, python-format
 msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode "
-"network, OFTC, and on the I2P internal networks. The usual place to look "
-"is #i2p-dev. Join the channel and say hi!\n"
-"We also have <a href=\"%(guidelines)s\">additional guidelines for regular"
-" developers</a>."
+"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
+"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:203
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:124
 #, python-format
 msgid ""
-"Website and router console translators: See the <a "
-"href=\"%(newtrans)s\">New Translator's Guide</a>\n"
+"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n"
 "for next steps."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:209
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:130
 msgid ""
 "I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit "
-"Java\n"
-"Profiler. Open source projects are eligible to receive a free license "
-"provided\n"
-"that YourKit is referenced on the project web site. Please get in touch "
-"if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
+"Profiler. Open source projects are eligible to receive a free license provided\n"
+"that YourKit is referenced on the project web site. Please get in touch if you\n"
 "are interested in profiling the I2P codebase."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/guides/new-developers.html:217
+#: i2p2www/pages/site/get-involved/guides/new-developers.html:138
 #, python-format
 msgid ""
-"YourKit is kindly supporting open source projects with its full-featured "
-"Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for "
-"profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software "
-"products:\n"
+"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software products:\n"
 "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n"
 "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>."
 msgstr ""
@@ -2995,11 +2482,9 @@ msgstr "Si të Përkthehet Sajti"
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:8
 #, python-format
 msgid ""
-"Translation of the website is done with .po files. The easiest way by far"
-" to\n"
+"Translation of the website is done with .po files. The easiest way by far to\n"
 "translate the website is to sign up for an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3014,10 +2499,8 @@ msgstr "Përgatitje"
 msgid ""
 "Come to #i2p-dev on irc and talk to people.\n"
 "Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working "
-"on,\n"
-"please update the translation status on <a href=\"%(url)s\">this wiki "
-"page</a>."
+"To make sure other coworkers don't bump onto the files you are working on,\n"
+"please update the translation status on <a href=\"%(url)s\">this wiki page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3037,12 +2520,9 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:38
 msgid ""
-"Run \"<code>./extract-messages.sh</code>\" to generate a "
-"<code>messages.pot</code> in the base directory.\n"
-"Edit the header of this file, then run \"<code>./init-new-po.sh "
-"locale</code>\" to generate the file\n"
-"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. "
-"\"<code>mtn add</code>\" this file."
+"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n"
+"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n"
+"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3053,27 +2533,23 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:46
 msgid ""
-"Add a flag image file to <code>i2p2www/static/images/flags/</code> for "
-"the menu (copy from the router)."
+"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the "
+"menu (copy from the router)."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:52
 msgid ""
 "<b>Edit files:</b>\n"
 "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:58
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151
 msgid ""
 "<b>Check in:</b>\n"
-"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by "
-"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
-"This collects the diff info of your changed file into your local repo. "
-"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
-"i2p.i2p</code>\".\n"
+"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n"
+"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n"
 "This synchronizes your local repo with the repo on the target machine."
 msgstr ""
 
@@ -3089,10 +2565,8 @@ msgstr "Si të Përkthehet Konsola e Rrugëzuesit"
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:74
 #, python-format
 msgid ""
-"The easiest way by far to translate the router console is to sign up for "
-"an account at \n"
-"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation"
-" team. \n"
+"The easiest way by far to translate the router console is to sign up for an account at \n"
+"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n"
 "Alternatively it can be done \"the old way\" as outlined below."
 msgstr ""
 
@@ -3110,8 +2584,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101
 msgid ""
-"Before starting a console translation, better help translate some i2p "
-"webpages first.\n"
+"Before starting a console translation, better help translate some i2p webpages first.\n"
 "At least an i2p homepage in your language would be great."
 msgstr ""
 
@@ -3124,19 +2597,15 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:132
 msgid ""
 "Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can "
-"create your own. by copying and renaming other language files you know "
-"with your own lang code."
+"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:137
 msgid ""
 "<b>Create files:</b>\n"
-"If the file for your language does not exist yet, copy another language "
-"file to a new file <code>foo_xx.bar</code> for your language.\n"
+"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n"
 "Then \"<code>mtn add</code>\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"<code>ant "
-"distclean poupdate</code>\"."
+"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3144,15 +2613,13 @@ msgid ""
 "<b>Start to work:</b>\n"
 "Edit the HTML files with any text editor.\n"
 "Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use <a "
-"href=\"http://www.poedit.net/download.php\">POEdit</a>"
+"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:163
 msgid ""
 "As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask "
-"in <code>#i2p-dev</code> on IRC."
+"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3161,8 +2628,8 @@ msgstr "PBR"
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:171
 msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
-"and html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
+"html, etc.? Why can't I just do a translation and email it to you?"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3178,67 +2645,65 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:182
 msgid ""
-"We don't have anybody who has time to accept manual contributions and "
-"submit them to our source control system on your behalf. Even if we did, "
-"it doesn't scale."
+"We don't have anybody who has time to accept manual contributions and submit"
+" them to our source control system on your behalf. Even if we did, it "
+"doesn't scale."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:186
 msgid ""
 "Maybe you are thinking translation is a one-step process. It isn't. You "
 "can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right <i>before</i> you submit it. Developers "
-"will update or add to the English text, thus requiring a translation "
-"update."
+"tweak it to make it look right <i>before</i> you submit it. Developers will "
+"update or add to the English text, thus requiring a translation update."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:190
 msgid ""
 "Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we "
-"can track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we can "
+"track changes, and revert them if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:194
 msgid ""
-".po files are not difficult. If you don't want to work directly with "
-"them, we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with them, "
+"we recommend 'poedit'."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:198
 msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate "
-"the text."
+"HTML files are not difficult. Just ignore the html stuff and translate the "
+"text."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:202
 msgid ""
 "Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they "
-"use monotone regularly. Monotone is simply a source control system, it is"
-" not about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they use "
+"monotone regularly. Monotone is simply a source control system, it is not "
+"about \"coding\"."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:206
 msgid ""
 "Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be"
-" maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be "
+"maintained, and not corrupted by email programs or other methods of "
 "transfer."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:210
 msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work "
-"well, needed an administrator, and a pootle-based process would suffer "
-"from a number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work well, "
+"needed an administrator, and a pootle-based process would suffer from a "
+"number of the above flaws."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:215
 msgid ""
 "<b>In summary:</b>\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the "
-"only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3263,10 +2728,8 @@ msgstr "Përmbledhje"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:8
 msgid ""
 "Thank you for volunteering to run an I2P reseed server.\n"
-"\"Reseeding\" is our term for bootstrapping new routers into the network."
-"\n"
-"New routers fetch a bundle of peer references, or \"router infos\", from "
-"one or more of a hardcoded list of HTTPS URLs."
+"\"Reseeding\" is our term for bootstrapping new routers into the network.\n"
+"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:14
@@ -3275,21 +2738,17 @@ msgstr "Domosdoshmëri"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:16
 msgid ""
-"At its simplest, a reseed server consists of a Java I2P router, an HTTPS "
-"web server,\n"
+"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n"
 "and some scripts that periodically gather router infos from the router,\n"
-"bundle and sign them into a custom file format, and deliver these files "
-"over HTTPS.\n"
-"In practice, it's a bit more complex, and a reseed operator must be "
-"fairly competent and attentive.\n"
-"A reseed server is not appropriate for a residential internet connection."
-" The complexities include:"
+"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n"
+"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n"
+"A reseed server is not appropriate for a residential internet connection. The complexities include:"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:25
 msgid ""
-"You must have a secure SSL setup with either a self-signed certificate or"
-" a cert that chains up to a standard CA"
+"You must have a secure SSL setup with either a self-signed certificate or a "
+"cert that chains up to a standard CA"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:28
@@ -3312,8 +2771,7 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:37
 msgid ""
-"The reseed servers are under periodic attacks and DDoS attempts, and from"
-" other buggy I2P implementations and botnets.\n"
+"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n"
 "This necessitates that you run fail2ban or an equivalent solution."
 msgstr ""
 
@@ -3323,18 +2781,13 @@ msgstr "Informacion i Domosdoshëm"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:45
 msgid ""
-"When your setup is complete and ready for testing, we will need the HTTPS"
-" URL,\n"
+"When your setup is complete and ready for testing, we will need the HTTPS URL,\n"
 "the SSL public key certificate, and the \"su3\" bundle public key.\n"
-"After testing is complete, these will be added to the hardcoded entries "
-"in the Java and C++ routers in the next release,\n"
+"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n"
 "and you will start seeing traffic.\n"
-"We also will need your email address so we may continue to contact you "
-"about reseed administration issues.\n"
-"The email will not be made public but will be known to the other reseed "
-"operators.\n"
-"You should expect that your nick or name and its association with that "
-"URL or IP will become public."
+"We also will need your email address so we may continue to contact you about reseed administration issues.\n"
+"The email will not be made public but will be known to the other reseed operators.\n"
+"You should expect that your nick or name and its association with that URL or IP will become public."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:55
@@ -3344,10 +2797,8 @@ msgstr "Rregulla Privatësie"
 #: i2p2www/pages/site/get-involved/guides/reseed.html:57
 msgid ""
 "A reseed operator is a trusted role in the network.\n"
-"While we do not yet have a formal privacy policy, you must ensure the "
-"privacy of our users\n"
-"by not publicizing logs or IPs found in those logs, except as necessary "
-"to discuss administration issues with the I2P reseed team."
+"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n"
+"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:63
@@ -3356,17 +2807,15 @@ msgstr "Përkrahje Financiare"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:65
 msgid ""
-"Modest financial support may be available to those running reseed "
-"servers.\n"
+"Modest financial support may be available to those running reseed servers.\n"
 "This support would be in partial reimbursement for your server costs.\n"
-"Support will not be paid in advance and will probably not cover all your "
-"expenses.\n"
-"Support is only available to those who have been running reseed servers "
-"in good standing for several months, and is based on actual need."
+"Support will not be paid in advance and will probably not cover all your expenses.\n"
+"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:72
-msgid "If you would like to discuss support, please contact echelon and CC: zzz"
+msgid ""
+"If you would like to discuss support, please contact echelon and CC: zzz"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:77
@@ -3375,10 +2824,8 @@ msgstr "Si T’ia Fillohet"
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:79
 msgid ""
-"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at "
-"mail.i2p or zzz at i2pmail.org.\n"
-"Unfortunately, he is not generally on IRC. The reseed setup is somewhat "
-"specialized, and you should direct most questions to him."
+"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n"
+"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:84
@@ -3389,18 +2836,16 @@ msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:89
 msgid ""
-"A Go implementation that includes the web server and all the scripts. "
-"This is the recommended solution."
+"A Go implementation that includes the web server and all the scripts. This "
+"is the recommended solution."
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:95
 msgid ""
-"For further information, read the information at the following links, and"
-" then contact zzz.\n"
+"For further information, read the information at the following links, and then contact zzz.\n"
 "Thank you!"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/guides/reseed.html:110
 msgid "Detailed Instructions"
 msgstr "Udhëzime të Hollësishme"
-
diff --git a/i2p2www/translations/sq/LC_MESSAGES/priority.po b/i2p2www/translations/sq/LC_MESSAGES/priority.po
index 2e7d5108d86902872286410932858f10d8ab17ac..1b5190c38e07ac893b4a8e7835d2952b95ee5856 100644
--- a/i2p2www/translations/sq/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/sq/LC_MESSAGES/priority.po
@@ -1,22 +1,25 @@
-# Albanian translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Besnik Bleta <besnik@programeshqip.org>, 2018
+# Besnik Bleta <besnik@programeshqip.org>, 2018
+# Besnik Bleta <besnik@programeshqip.org>, 2018
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-10-11 16:27+0000\n"
-"PO-Revision-Date: 2021-10-12 09:24+0000\n"
-"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
+"PO-Revision-Date: 2013-02-03 00:02+0000\n"
+"Last-Translator: Besnik Bleta <besnik@programeshqip.org>, 2018\n"
 "Language-Team: Albanian (http://www.transifex.com/otf/I2P/language/sq/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: sq\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/blog/category.html:2
 msgid "Blog Category"
@@ -55,10 +58,8 @@ msgstr "Autor:"
 
 #: i2p2www/pages/downloads/browser-content.html:1
 msgid ""
-"Your web browser will need to be configured in order to browse web sites "
-"on I2P\n"
-"and to utilize the outproxies available within I2P. Below are "
-"walkthroughs for\n"
+"Your web browser will need to be configured in order to browse web sites on I2P\n"
+"and to utilize the outproxies available within I2P. Below are walkthroughs for\n"
 "some of the most popular browsers."
 msgstr ""
 
@@ -69,15 +70,13 @@ msgstr "Profil Firefox për Windows"
 #: i2p2www/pages/downloads/browser-content.html:8
 #, python-format
 msgid ""
-"If you are using Windows, the recommended way of accessing I2P is using "
-"the\n"
+"If you are using Windows, the recommended way of accessing I2P is using the\n"
 "<a href='%(profile)s'>Firefox profile</a>."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:12
 msgid ""
-"If you do not wish to use that profile or are not on Windows, you need to"
-"\n"
+"If you do not wish to use that profile or are not on Windows, you need to\n"
 "configure your browser yourself.  Read below on how to that."
 msgstr ""
 
@@ -98,26 +97,21 @@ msgstr "Formësim eksperimental, bazuar në zgjerime"
 #: i2p2www/pages/downloads/browser-content.html:30
 msgid ""
 "A new way of automatically configuring the I2P Browser is\n"
-"currently being tested. It uses the Firefox's \"Container Tabs\" to build"
-" private\n"
+"currently being tested. It uses the Firefox's \"Container Tabs\" to build private\n"
 "browsing tools for use with I2P and I2P applications."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:33
 msgid ""
 "It does pre-configuration of your browser by enabling some of\n"
-"the privacy Browser Settings like ResistFingerprinting, and enforces "
-"WebRTC proxy\n"
-"obedience. It also contains menus, shortcuts, and monitoring tools "
-"improving\n"
-"Firefox's integration with I2P. It is a by-product of the I2P Browser "
-"project.\n"
+"the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy\n"
+"obedience. It also contains menus, shortcuts, and monitoring tools improving\n"
+"Firefox's integration with I2P. It is a by-product of the I2P Browser project.\n"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:38
 msgid ""
-"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon"
-"/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n"
+"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n"
 "can be obtained from the Mozilla addon store.\n"
 msgstr ""
 
@@ -128,8 +122,7 @@ msgstr "Udhëzime për Firefox 57 dhe më të madh:"
 #: i2p2www/pages/downloads/browser-content.html:42
 msgid ""
 "From the Menu button in the top right, select <em>Preferences</em>.\n"
-"Scroll down until you see the <em>Network Proxy</em> section, as shown in"
-" the\n"
+"Scroll down until you see the <em>Network Proxy</em> section, as shown in the\n"
 "screenshot below. Click on <em>Settings</em>"
 msgstr ""
 
@@ -141,8 +134,7 @@ msgstr "Mundësi Rrjeti për Firefox57"
 msgid ""
 "In the <em>Connection Settings</em> pop-up, select <em>Manual proxy\n"
 "    configuration</em>. Set both the HTTP and SSL Proxy to address\n"
-"<code>127.0.0.1</code> with port <code>4444</code> as shown in the "
-"following\n"
+"<code>127.0.0.1</code> with port <code>4444</code> as shown in the following\n"
 "screenshot."
 msgstr ""
 
@@ -150,9 +142,7 @@ msgstr ""
 msgid ""
 "Firefox57\n"
 "Connection Settings"
-msgstr ""
-"Rregullime Lidhjeje\n"
-"për Firefox57"
+msgstr "Rregullime Lidhjeje\npër Firefox57"
 
 #: i2p2www/pages/downloads/browser-content.html:57
 msgid "Firefox57 Connection Settings"
@@ -181,17 +171,11 @@ msgstr " Chrome "
 #: i2p2www/pages/downloads/browser-content.html:69
 msgid ""
 "An experimental, partially-automated configuration process for\n"
-"Chrome is available. In order to configure it, create a new "
-"<em>Profile</em>\n"
-"especially for your I2P browsing, separate from the default profile. Then"
-" install\n"
-"this <a "
-"href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a>"
-" in your newly-created profile. This profile\n"
-"is now configured to use I2P. Highly detailed instructions are available "
-"at the\n"
-"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-"
-"Chromium\">homepage.</a>\n"
+"Chrome is available. In order to configure it, create a new <em>Profile</em>\n"
+"especially for your I2P browsing, separate from the default profile. Then install\n"
+"this <a href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a> in your newly-created profile. This profile\n"
+"is now configured to use I2P. Highly detailed instructions are available at the\n"
+"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-Chromium\">homepage.</a>\n"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:76
@@ -200,14 +184,10 @@ msgstr "Krejt versionet Chrome"
 
 #: i2p2www/pages/downloads/browser-content.html:77
 msgid ""
-"Chromium-Based Browsers like Chrome have slightly different places for "
-"their\n"
-"proxy settings depending on variant and platform. These instructions may "
-"be\n"
-"slightly different in Brave or Iridium, for instance. From the "
-"<em>Main</em>\n"
-"menu, navigate to the <em>Settings</em>, and search for the <em></em> "
-"menu item.\n"
+"Chromium-Based Browsers like Chrome have slightly different places for their\n"
+"proxy settings depending on variant and platform. These instructions may be\n"
+"slightly different in Brave or Iridium, for instance. From the <em>Main</em>\n"
+"menu, navigate to the <em>Settings</em>, and search for the <em></em> menu item.\n"
 "Clicking it will open the right settings for your platform."
 msgstr ""
 
@@ -217,10 +197,8 @@ msgstr "Mundësi Ndërmjetësi për Chrome-in"
 
 #: i2p2www/pages/downloads/browser-content.html:85
 msgid ""
-"On Windows, this button will launch you into the shared proxy settings "
-"used\n"
-"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure"
-" it by\n"
+"On Windows, this button will launch you into the shared proxy settings used\n"
+"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure it by\n"
 "following the Internet Explorer 8 guide."
 msgstr ""
 
@@ -235,42 +213,29 @@ msgstr "Formësim me bazë zgjerime"
 #: i2p2www/pages/downloads/browser-content.html:94
 msgid ""
 "Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have\n"
-"an about:config page for you to configure proxy settings manually. It is "
-"further\n"
-"not possible to use most extensions in Fenix-based Firefoxes. It is "
-"possible to\n"
-"enable support about:config and enable more extensions in Firefox Nightly"
-" at the time \n"
-"of this writing, but it's a manual and difficult process. "
-"<em>IceRaven</em> is a fork\n"
-"of Firefox which enables a collection of extensions while Mozilla and the"
-" Mozilla\n"
-"Community work on adding support for extensions to Firefox for Android. "
-"It provides\n"
-"the easiest way of configuring a modern Firefox-based Browser for "
-"Android. It does\n"
-"not come from Mozilla and carries no guarantees from them. <em>Installing"
-" the extension\n"
+"an about:config page for you to configure proxy settings manually. It is further\n"
+"not possible to use most extensions in Fenix-based Firefoxes. It is possible to\n"
+"enable support about:config and enable more extensions in Firefox Nightly at the time \n"
+"of this writing, but it's a manual and difficult process. <em>IceRaven</em> is a fork\n"
+"of Firefox which enables a collection of extensions while Mozilla and the Mozilla\n"
+"Community work on adding support for extensions to Firefox for Android. It provides\n"
+"the easiest way of configuring a modern Firefox-based Browser for Android. It does\n"
+"not come from Mozilla and carries no guarantees from them. <em>Installing the extension\n"
 "in IceRaven will proxy all your IceRaven browsing over I2P.</em>"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:104
 msgid ""
-"If you have not installed IceRaven yet, go to the next step. If you have "
-"been\n"
-"using IceRaven for a while, go to the main menu, select the History tab, "
-"and make\n"
-"sure that you have cleared information about your past browsing by "
-"tapping the\n"
+"If you have not installed IceRaven yet, go to the next step. If you have been\n"
+"using IceRaven for a while, go to the main menu, select the History tab, and make\n"
+"sure that you have cleared information about your past browsing by tapping the\n"
 "\"Delete History\" button."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:108
 msgid ""
-"Open the IceRaven main menu, and scroll to the top until you see the "
-"\"Add-Ons\"\n"
-"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. "
-"Install\n"
+"Open the IceRaven main menu, and scroll to the top until you see the \"Add-Ons\"\n"
+"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. Install\n"
 "the extension named <em>I2P Proxy for Android and other Systems</em>.\n"
 msgstr ""
 
@@ -282,23 +247,19 @@ msgstr ""
 msgid ""
 "This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based\n"
 "web browsers, if installed from the following addons.mozilla.org URL.\n"
-"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-"
-"proxy/\">I2P Proxy for Android and Other Systems</a><em>\n"
+"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-proxy/\">I2P Proxy for Android and Other Systems</a><em>\n"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:118
 msgid ""
-"This extension is identical to the Chromium extension and is built from "
-"the same source."
+"This extension is identical to the Chromium extension and is built from the "
+"same source."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:119
 msgid ""
-"In order to enable extension support in Firefox Nightly, you should "
-"follow\n"
-"the steps provided by Mozilla on their <a "
-"href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-"
-"support-in-firefox-for-android-nightly/\">Blog</a>"
+"In order to enable extension support in Firefox Nightly, you should follow\n"
+"the steps provided by Mozilla on their <a href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-support-in-firefox-for-android-nightly/\">Blog</a>"
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:124
@@ -307,8 +268,7 @@ msgstr "Internet Explorer"
 
 #: i2p2www/pages/downloads/browser-content.html:125
 msgid ""
-"In the start menu search for the the \"Network and Internet Settings\" to"
-" open the\n"
+"In the start menu search for the the \"Network and Internet Settings\" to open the\n"
 "settings. The last entry in the menu is the Proxy Settings, click it to\n"
 "your proxy to connect to I2P."
 msgstr ""
@@ -319,14 +279,10 @@ msgstr "Mundësi Internet për IE-n"
 
 #: i2p2www/pages/downloads/browser-content.html:131
 msgid ""
-"Now set the checkmark at \"use a proxy server for your LAN\" and at the "
-"\"Bypass\n"
-"proxy server for local addresses\". With a click on Advanced-button you "
-"open the\n"
-"window to open the ports. Enter the values like on the picture, IP "
-"127.0.0.1\n"
-"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save "
-"the\n"
+"Now set the checkmark at \"use a proxy server for your LAN\" and at the \"Bypass\n"
+"proxy server for local addresses\". With a click on Advanced-button you open the\n"
+"window to open the ports. Enter the values like on the picture, IP 127.0.0.1\n"
+"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the\n"
 "settings and your browser is set to use the I2P proxy."
 msgstr ""
 
@@ -336,18 +292,15 @@ msgstr "Rregullime Ndërmjetësi për IE-n"
 
 #: i2p2www/pages/downloads/browser-content.html:143
 msgid ""
-"Remember: I2P was not designed for creating proxies to the outer "
-"Internet.\n"
+"Remember: I2P was not designed for creating proxies to the outer Internet.\n"
 "Instead, it is meant to be used as an internal network."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:147
 msgid ""
-"<p><b>The I2P project itself does not run any proxies to the "
-"Internet.</b>\n"
+"<p><b>The I2P project itself does not run any proxies to the Internet.</b>\n"
 "The only outproxy is a service from the privacy solutions project.\n"
-"Consider donating to them for a continued stable service. Increased "
-"funding will\n"
+"Consider donating to them for a continued stable service. Increased funding will\n"
 "allow them to improve this service. </p>\n"
 "<a href=\"http://privacysolutions.no\"\n"
 "    target=\"_blank\">http://privacysolutions.no</a>"
@@ -356,10 +309,8 @@ msgstr ""
 #: i2p2www/pages/downloads/browser-content.html:155
 #, python-format
 msgid ""
-"By default, I2P comes with two outproxies configured: "
-"<code>%(http)s</code>\n"
-"and <code>%(https)s</code>. Even the domain names are different, it's the"
-" same outproxy you hit.\n"
+"By default, I2P comes with two outproxies configured: <code>%(http)s</code>\n"
+"and <code>%(https)s</code>. Even the domain names are different, it's the same outproxy you hit.\n"
 "(multi-homed/keyed for better performance)"
 msgstr ""
 
@@ -367,15 +318,13 @@ msgstr ""
 msgid ""
 "Filtering is active on these outproxies (for example, mibbit and torrent\n"
 "tracker access is blocked). I2P Sites\n"
-"that are accessible via .i2p addresses are also not allowed via the "
-"outproxies.\n"
+"that are accessible via .i2p addresses are also not allowed via the outproxies.\n"
 "As a convenience, the outproxy blocks ad servers."
 msgstr ""
 
 #: i2p2www/pages/downloads/browser-content.html:166
 msgid ""
-"<a href=\"https://www.torproject.org\">Tor</a> is a good application to "
-"use as an\n"
+"<a href=\"https://www.torproject.org\">Tor</a> is a good application to use as an\n"
 "outproxy to the Internet."
 msgstr ""
 
@@ -393,13 +342,10 @@ msgstr "Debian Buster, Ubuntu Bionic, dhe të mëvonshëm"
 
 #: i2p2www/pages/downloads/debian.html:7
 msgid ""
-"I2P is available in the official repositories for Ubuntu Bionic and "
-"later, and Debian Buster and Sid.\n"
-"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have "
-"older I2P versions.\n"
+"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n"
+"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n"
 "If you are not running Debian Sid or the latest Ubuntu release,\n"
-"use our Debian repo or Launchpad PPA to ensure you're running the latest "
-"I2P version."
+"use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:14
@@ -421,8 +367,7 @@ msgstr "<a href=\"#debian\">Debian Linux</a> (Wheezy dhe më të ri)"
 #: i2p2www/pages/downloads/debian.html:23
 #, python-format
 msgid ""
-"The I2P packages <em>may</em> work on systems not listed above. Please "
-"report any issues\n"
+"The I2P packages <em>may</em> work on systems not listed above. Please report any issues\n"
 "with these packages on <a href=\"%(trac)s\">Trac</a> at\n"
 "<a href=\"%(trac)s\">https://trac.i2p2.de</a>."
 msgstr ""
@@ -431,9 +376,7 @@ msgstr ""
 msgid ""
 "Option 1: <a href=\"#ubuntu\">Recent versions</a> of Ubuntu and its "
 "derivatives (<em>Try this if you're not using Debian)</em>"
-msgstr ""
-"Mundësia 1: <a href=\"#ubuntu\">Versione së fundi</a> të Ubuntu-së dhe "
-"derivatesh të tij (<em>Provojeni nëse nuk gjendeni nën Debian)</em>"
+msgstr "Mundësia 1: <a href=\"#ubuntu\">Versione së fundi</a> të Ubuntu-së dhe derivatesh të tij (<em>Provojeni nëse nuk gjendeni nën Debian)</em>"
 
 #: i2p2www/pages/downloads/debian.html:30
 msgid "Option 2: <a href=\"#debian\">Debian</a> (including Debian-derivatives)"
@@ -479,38 +422,35 @@ msgstr "Shtim PPA-sh Duke Përdorur Synaptic-un"
 
 #: i2p2www/pages/downloads/debian.html:61
 msgid ""
-"Open Synaptic (System -&gt; Administration -&gt; Synaptic Package "
-"Manager)."
+"Open Synaptic (System -&gt; Administration -&gt; Synaptic Package Manager)."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:66
 msgid ""
-"Once Synaptic opens, select <em>Repositories</em> from the "
-"<em>Settings</em> menu."
+"Once Synaptic opens, select <em>Repositories</em> from the <em>Settings</em>"
+" menu."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:71
 msgid ""
 "Click the <em>Other Sources</em> tab and click <em>Add</em>. Paste "
 "<code>ppa:i2p-maintainers/i2p</code> into the APT-line field and click "
-"<em>Add Source</em>. Click the <em>Close</em> button then "
-"<em>Reload</em>."
+"<em>Add Source</em>. Click the <em>Close</em> button then <em>Reload</em>."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:76
 msgid ""
 "In the Quick Filter box, type in <code>i2p</code> and press enter. When "
 "<code>i2p</code> is returned in the results list, right click "
-"<code>i2p</code> and select <em>Mark for Installation</em>. After doing "
-"so you may see a <em>Mark additional required changes?</em> popup. If so,"
-" click <em>Mark</em> then <em>Apply</em>."
+"<code>i2p</code> and select <em>Mark for Installation</em>. After doing so "
+"you may see a <em>Mark additional required changes?</em> popup. If so, click"
+" <em>Mark</em> then <em>Apply</em>."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:82
 msgid ""
 "After the installation process completes you can move on to the next\n"
-"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring "
-"it for your system."
+"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your system."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:87
@@ -523,10 +463,8 @@ msgstr "Arkitektura të mbuluara aktualisht"
 
 #: i2p2www/pages/downloads/debian.html:91
 msgid ""
-"Note: The steps below should be performed with root access (i.e., "
-"switching\n"
-"user to root with <code>su</code> or by prefixing each command with "
-"<code>sudo</code>)."
+"Note: The steps below should be performed with root access (i.e., switching\n"
+"user to root with <code>su</code> or by prefixing each command with <code>sudo</code>)."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:96
@@ -539,8 +477,7 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"    Check which version of Debian you are using on this page at the <a "
-"href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n"
+"    Check which version of Debian you are using on this page at the <a href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n"
 "    and verify with <code>%(file2)s</code> on your system.\n"
 "    Then, add lines like the following to <code>%(file)s</code>."
 msgstr ""
@@ -571,23 +508,21 @@ msgstr ""
 #: i2p2www/pages/downloads/debian.html:175
 msgid ""
 "This command will retrieve the latest list of software from every\n"
-"repository enabled on your system, including the I2P repository added in "
-"step\n"
+"repository enabled on your system, including the I2P repository added in step\n"
 "1."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:181
 msgid ""
-"You are now ready to install I2P! Installing the <code>i2p-keyring</code>"
-"\n"
+"You are now ready to install I2P! Installing the <code>i2p-keyring</code>\n"
 "package will ensure that you receive updates to the repository's GPG key."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:191
 msgid ""
-"After the installation process completes you can move on to the next part"
-" of <a href=\"#Post-install_work\">starting I2P</a> and configuring it "
-"for your system."
+"After the installation process completes you can move on to the next part of"
+" <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your"
+" system."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:196
@@ -603,19 +538,15 @@ msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:204
 msgid ""
-"&quot;on demand&quot; using the i2prouter script. Simply run "
-"&quot;<code>i2prouter\n"
-"start</code>&quot; from a command prompt. (Note: Do "
-"<strong><u>not</u></strong> use\n"
+"&quot;on demand&quot; using the i2prouter script. Simply run &quot;<code>i2prouter\n"
+"start</code>&quot; from a command prompt. (Note: Do <strong><u>not</u></strong> use\n"
 "sudo or run it as root!)"
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:211
 msgid ""
-"&quot;on demand&quot; without the <a "
-"href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n"
-"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-"
-"nowrapper</code>\".\n"
+"&quot;on demand&quot; without the <a href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n"
+"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-nowrapper</code>\".\n"
 "(Note: Do <strong><u>not</u></strong>\n"
 "use sudo or run it as root!)"
 msgstr ""
@@ -623,30 +554,23 @@ msgstr ""
 #: i2p2www/pages/downloads/debian.html:219
 msgid ""
 "as a service that automatically runs when your system boots, even\n"
-"before logging in. The service can be enabled with \"<code>dpkg-"
-"reconfigure\n"
-"i2p</code>\" as root or using sudo. This is the recommended means of "
-"operation."
+"before logging in. The service can be enabled with \"<code>dpkg-reconfigure\n"
+"i2p</code>\" as root or using sudo. This is the recommended means of operation."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:227
 msgid ""
-"When installing for the first time, please remember to <b>adjust your "
-"NAT/firewall</b>\n"
-"if you can. The ports to forward can be found on the <a "
-"href=\"http://127.0.0.1:7657/confignet\">\n"
-"network configuration page</a> in the router console. If guidance with "
-"respect to forwarding ports is needed,\n"
-"you may find <a href=\"http://portforward.com\">portforward.com</a> to be"
-" helpful."
+"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n"
+"if you can. The ports to forward can be found on the <a href=\"http://127.0.0.1:7657/confignet\">\n"
+"network configuration page</a> in the router console. If guidance with respect to forwarding ports is needed,\n"
+"you may find <a href=\"http://portforward.com\">portforward.com</a> to be helpful."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:234
 msgid ""
 "Please review and <b>adjust the bandwidth settings</b> on the\n"
 "<a href=\"http://127.0.0.1:7657/config.jsp\">configuration page</a>,\n"
-"as the default settings of 96 KB/s down / 40 KB/s up are fairly "
-"conservative."
+"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative."
 msgstr ""
 
 #: i2p2www/pages/downloads/debian.html:240
@@ -654,8 +578,7 @@ msgstr ""
 #, python-format
 msgid ""
 "If you want to reach I2P Sites via your browser, have a look on the <a "
-"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy "
-"howto."
+"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy howto."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:5
@@ -690,9 +613,9 @@ msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:24
 msgid ""
-"<p>Note that this quick-start approach is not suitable for production "
-"use.  If you want to use I2P in production please read all the "
-"instructions on this page."
+"<p>Note that this quick-start approach is not suitable for production use.  "
+"If you want to use I2P in production please read all the instructions on "
+"this page."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:25
@@ -716,8 +639,8 @@ msgstr "Vëllime"
 
 #: i2p2www/pages/downloads/docker.html:30
 msgid ""
-"The container requires a volume for the configuration data to be mounted."
-" Optionally, you can mount a separate volume for torrent (“i2psnark”) "
+"The container requires a volume for the configuration data to be mounted. "
+"Optionally, you can mount a separate volume for torrent (“i2psnark”) "
 "downloads. See the example below."
 msgstr ""
 
@@ -738,8 +661,8 @@ msgstr "Porta"
 
 #: i2p2www/pages/downloads/docker.html:34
 msgid ""
-"There are several ports which are exposed by the image. You can choose "
-"which ones to publish depending on your specific needs."
+"There are several ports which are exposed by the image. You can choose which"
+" ones to publish depending on your specific needs."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:38
@@ -813,11 +736,10 @@ msgstr "TCP dhe UDP"
 #: i2p2www/pages/downloads/docker.html:96
 msgid ""
 "You probably want at least the Router Console (7657) and the HTTP Proxy "
-"(4444). If you want I2P to be able to receive incoming connections from "
-"the internet, and hence not think it’s firewalled, publish the I2NP "
-"Protocol port (12345) - but make sure you publish to a different random "
-"port, otherwise others may be able to guess you’re running I2P in a "
-"Docker image."
+"(4444). If you want I2P to be able to receive incoming connections from the "
+"internet, and hence not think it’s firewalled, publish the I2NP Protocol "
+"port (12345) - but make sure you publish to a different random port, "
+"otherwise others may be able to guess you’re running I2P in a Docker image."
 msgstr ""
 
 #: i2p2www/pages/downloads/docker.html:97
@@ -827,9 +749,9 @@ msgstr "Shembull"
 #: i2p2www/pages/downloads/docker.html:98
 msgid ""
 "Here is an example container that mounts <code>i2phome</code> as home "
-"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, "
-"IRC, Router Console and I2NP Protocols. It also limits the memory "
-"available to the JVM to 256MB."
+"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, IRC,"
+" Router Console and I2NP Protocols. It also limits the memory available to "
+"the JVM to 256MB."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:6
@@ -840,17 +762,12 @@ msgstr ""
 #: i2p2www/pages/downloads/easyinstall.html:7
 #, python-format
 msgid ""
-"This is an \"All-in-One\" installer for Windows 10 which includes the "
-"complete I2P\n"
-"desktop software and all of its dependencies in a single, easy-to-install"
-"\n"
-"package. It is built on the premise that I2P should be easy, and that we "
-"should\n"
-"help our users get their initial configuration in place instead of "
-"requiring an\n"
+"This is an \"All-in-One\" installer for Windows 10 which includes the complete I2P\n"
+"desktop software and all of its dependencies in a single, easy-to-install\n"
+"package. It is built on the premise that I2P should be easy, and that we should\n"
+"help our users get their initial configuration in place instead of requiring an\n"
 "elaborate install process. To learn more about the Firefox profile that\n"
-"comes bundled with this installer, visit <a href=\"%(firefox)s\">The "
-"Firefox\n"
+"comes bundled with this installer, visit <a href=\"%(firefox)s\">The Firefox\n"
 "Profile Page</a>."
 msgstr ""
 
@@ -865,12 +782,9 @@ msgstr "Thjesht Firefox (Ose Shfletuesin Tor)."
 #: i2p2www/pages/downloads/easyinstall.html:19
 #, python-format
 msgid ""
-"This installer still requires Firefox to be installed on the system, it "
-"does not\n"
-"bundle a Firefox installer of its own. Please obtain Firefox from "
-"Mozilla, or\n"
-"Tor Browser from the Tor Project or one of their mirrors. If you would "
-"like to\n"
+"This installer still requires Firefox to be installed on the system, it does not\n"
+"bundle a Firefox installer of its own. Please obtain Firefox from Mozilla, or\n"
+"Tor Browser from the Tor Project or one of their mirrors. If you would like to\n"
 "discuss supporting other browsers, please join the discussionon the\n"
 "<a href=\"%(issueurl)s\">Gitlab Issue</a>. This is a Windows-only\n"
 "product."
@@ -883,17 +797,12 @@ msgstr "Pse do të duhej ta përdor?"
 
 #: i2p2www/pages/downloads/easyinstall.html:28
 msgid ""
-"This installer package reduces the number of steps required to install an"
-" I2P\n"
-"router on Windows from about 30 to a matter of completing a single, "
-"familiar\n"
-"installer process, combining the I2P installation and Browser "
-"configuration into\n"
+"This installer package reduces the number of steps required to install an I2P\n"
+"router on Windows from about 30 to a matter of completing a single, familiar\n"
+"installer process, combining the I2P installation and Browser configuration into\n"
 "the same steps. Besides that, it launches the user directly into the\n"
-"automatically configured I2P browser with their applications ready-to-"
-"use, with\n"
-"no need to refer to potentially unhelpful system-wide Windows settings. "
-"The I2P\n"
+"automatically configured I2P browser with their applications ready-to-use, with\n"
+"no need to refer to potentially unhelpful system-wide Windows settings. The I2P\n"
 "it uses is otherwise identical to the \"regular\" I2P."
 msgstr ""
 
@@ -907,32 +816,24 @@ msgstr "Si ta përdor?"
 #, python-format
 msgid ""
 "First, download and install <a href=\"%(firefox)s\">Firefox</a>, then,\n"
-"just download and install <a href=\"%(postfilename)s\">this "
-"installer</a>. To\n"
+"just download and install <a href=\"%(postfilename)s\">this installer</a>. To\n"
 "start an installer, \"double-click\" the downloaded .exe file."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:43
 msgid ""
-"Running the installer will create a shortcut to start browsing I2P in "
-"your start\n"
-"menu and on your desktop. Clicking this shortcut will start I2P if "
-"necessary,\n"
-"then start an I2P Browser. On the first run, you will also be promted "
-"with the\n"
-"bandwidth wizard in your browser window. You will also see a \"Toopie\" "
-"icon in\n"
-"your taskbar to indicate that I2P is working when the browser window is "
-"closed."
+"Running the installer will create a shortcut to start browsing I2P in your start\n"
+"menu and on your desktop. Clicking this shortcut will start I2P if necessary,\n"
+"then start an I2P Browser. On the first run, you will also be promted with the\n"
+"bandwidth wizard in your browser window. You will also see a \"Toopie\" icon in\n"
+"your taskbar to indicate that I2P is working when the browser window is closed."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:50
 msgid ""
 "I2P Browsing uses a separate, I2P-Only Firefox\n"
-"profile, so it won't interfere with your regular Firefox use or require "
-"any\n"
-"special configuration. You don't even need to close existing Firefox "
-"windows."
+"profile, so it won't interfere with your regular Firefox use or require any\n"
+"special configuration. You don't even need to close existing Firefox windows."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:65
@@ -972,10 +873,8 @@ msgstr ""
 #: i2p2www/pages/downloads/firefox.html:73
 msgid ""
 "The I2P router is \"jpackaged\" which means that it includes all\n"
-"the required Java components it needs to run successfully. It does not "
-"require\n"
-"a separate Java installation, because it bundles a Java 16 Runtime which "
-"is only\n"
+"the required Java components it needs to run successfully. It does not require\n"
+"a separate Java installation, because it bundles a Java 16 Runtime which is only\n"
 "used for I2P."
 msgstr ""
 
@@ -987,16 +886,11 @@ msgstr "Zgjerime Shfletuesi:"
 #: i2p2www/pages/downloads/easyinstall.html:95
 #: i2p2www/pages/downloads/firefox.html:80
 msgid ""
-"The browser profile also includes both the NoScript and HTTPSEverywhere "
-"plugin for\n"
-"better protection Javascript based attacks and HTTPS support where "
-"available. It\n"
-"also keeps your I2P search activity separate from your visible internet "
-"search\n"
-"activity. The profile configures the I2P Proxy for all sites and browser "
-"features.\n"
-"I2P In Private Browsing is used to provide I2P-Specific browser "
-"integrations."
+"The browser profile also includes both the NoScript and HTTPSEverywhere plugin for\n"
+"better protection Javascript based attacks and HTTPS support where available. It\n"
+"also keeps your I2P search activity separate from your visible internet search\n"
+"activity. The profile configures the I2P Proxy for all sites and browser features.\n"
+"I2P In Private Browsing is used to provide I2P-Specific browser integrations."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:101
@@ -1007,19 +901,16 @@ msgstr "Kod Burim dhe Ndjekje Problemesh"
 #: i2p2www/pages/downloads/easyinstall.html:102
 #: i2p2www/pages/downloads/firefox.html:87
 msgid ""
-"If you would like to examine the source code for individual components, "
-"you may\n"
-"find it on i2pgit.org or github.com. The license for each respective "
-"component\n"
-"can be found in the license directory of the <code>i2p.firefox</code> "
-"project."
+"If you would like to examine the source code for individual components, you may\n"
+"find it on i2pgit.org or github.com. The license for each respective component\n"
+"can be found in the license directory of the <code>i2p.firefox</code> project."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:107
 #: i2p2www/pages/downloads/easyinstall.html:115
 #: i2p2www/pages/downloads/firefox.html:92
-#: i2p2www/pages/downloads/firefox.html:100 i2p2www/pages/downloads/mac.html:79
-#: i2p2www/pages/downloads/mac.html:86
+#: i2p2www/pages/downloads/firefox.html:100
+#: i2p2www/pages/downloads/mac.html:79 i2p2www/pages/downloads/mac.html:86
 msgid "Gitlab Repository"
 msgstr "Depo GitLab"
 
@@ -1031,11 +922,9 @@ msgstr "Depo GitHub"
 #: i2p2www/pages/downloads/easyinstall.html:109
 #: i2p2www/pages/downloads/firefox.html:94
 msgid ""
-"If you wish to file an issue about the Firefox profile, please use Gitlab"
-" to\n"
+"If you wish to file an issue about the Firefox profile, please use Gitlab to\n"
 "contact us. For security-sensitive issues, please remember to check the\n"
-"\"This issue is confidential and should only be visible to team members "
-"with at least Reporter access\"\n"
+"\"This issue is confidential and should only be visible to team members with at least Reporter access\"\n"
 "option when filing the issue."
 msgstr ""
 
@@ -1047,50 +936,34 @@ msgstr "Ku ndryshon nga Shfletuesi Tor?"
 #: i2p2www/pages/downloads/easyinstall.html:117
 #: i2p2www/pages/downloads/firefox.html:102
 msgid ""
-"This is not a fork of Firefox. Instead, it is a browser profile with pre-"
-"configured\n"
-"settings, combined with an I2P router and some launcher scripts. That "
-"means that\n"
-"it requires Firefox(Or Tor Browser) to be installed before you can use "
-"it. This\n"
-"is for security reasons, it is important that you are able to recieve "
-"reliable\n"
+"This is not a fork of Firefox. Instead, it is a browser profile with pre-configured\n"
+"settings, combined with an I2P router and some launcher scripts. That means that\n"
+"it requires Firefox(Or Tor Browser) to be installed before you can use it. This\n"
+"is for security reasons, it is important that you are able to recieve reliable\n"
 "updates from a trustworthy vendor."
 msgstr ""
 
 #: i2p2www/pages/downloads/easyinstall.html:124
 #: i2p2www/pages/downloads/firefox.html:109
 msgid ""
-"I2P routers are designed to have long uptimes, and so unlike Tor Browser,"
-" the\n"
-"lifetime of your I2P Router is not tied to the lifetime of your I2P "
-"browsing\n"
-"session. The browser profile will manage your history, your browser's "
-"local\n"
-"storage and cache, and your browsing context but it will never stop your "
-"I2P\n"
-"router on its own. You may stop the router using the web interface on the"
-"\n"
+"I2P routers are designed to have long uptimes, and so unlike Tor Browser, the\n"
+"lifetime of your I2P Router is not tied to the lifetime of your I2P browsing\n"
+"session. The browser profile will manage your history, your browser's local\n"
+"storage and cache, and your browsing context but it will never stop your I2P\n"
+"router on its own. You may stop the router using the web interface on the\n"
 "router console homepage."
 msgstr ""
 
 #: i2p2www/pages/downloads/firefox.html:7
 #, python-format
 msgid ""
-"The I2P Firefox Browser Profile has been expanded into the new I2P Easy "
-"Install\n"
-"Bundle, which is in Beta. If you already have an I2P Router installed, it"
-" is\n"
-"still safe to use this installer to configure your I2P Browser. Your "
-"existing\n"
-"I2P Settings will be left untouched. If you do not have an I2P router "
-"installed,\n"
-"then you do not need to install I2P. This package will install I2P at the"
-" same\n"
-"time it installs the browser profile. This page has been kept to document"
-" the\n"
-"motivations and design of the included Firefox profile. To learn more "
-"about the\n"
+"The I2P Firefox Browser Profile has been expanded into the new I2P Easy Install\n"
+"Bundle, which is in Beta. If you already have an I2P Router installed, it is\n"
+"still safe to use this installer to configure your I2P Browser. Your existing\n"
+"I2P Settings will be left untouched. If you do not have an I2P router installed,\n"
+"then you do not need to install I2P. This package will install I2P at the same\n"
+"time it installs the browser profile. This page has been kept to document the\n"
+"motivations and design of the included Firefox profile. To learn more about the\n"
 "new bundle, visit <a href=\"%(nsis)s\">The Easy Install Bundle Page</a>."
 msgstr ""
 
@@ -1100,30 +973,20 @@ msgstr "Profil I2P Shfletuesi Firefox"
 
 #: i2p2www/pages/downloads/firefox.html:18
 msgid ""
-"Now that you have joined the I2P network, you will want to see I2P Sites "
-"and and \n"
-"other content that is hosted on the network. The Firefox browser profile "
-"is \n"
-"pre-configured to allow you to access the content available on the "
-"network."
+"Now that you have joined the I2P network, you will want to see I2P Sites and and \n"
+"other content that is hosted on the network. The Firefox browser profile is \n"
+"pre-configured to allow you to access the content available on the network."
 msgstr ""
 
 #: i2p2www/pages/downloads/firefox.html:24
 msgid ""
-"Browsers are highly complex and powerful engines for executing code and "
-"displaying\n"
-"information obtained mainly from strangers on the internet. By default, "
-"they\n"
-"tend to leak a great deal of information about the person using them to "
-"the servers\n"
-"they retrieve information from. Using this browser profile allows you to "
-"become\n"
-"part of a \"common\" set of very similar browser users, instead of "
-"appearing unique\n"
-"or revealing details of your hardware or software. Because this involves "
-"disabling \n"
-"some browser features, this also reduces the attack surface available to "
-"outsiders. \n"
+"Browsers are highly complex and powerful engines for executing code and displaying\n"
+"information obtained mainly from strangers on the internet. By default, they\n"
+"tend to leak a great deal of information about the person using them to the servers\n"
+"they retrieve information from. Using this browser profile allows you to become\n"
+"part of a \"common\" set of very similar browser users, instead of appearing unique\n"
+"or revealing details of your hardware or software. Because this involves disabling \n"
+"some browser features, this also reduces the attack surface available to outsiders. \n"
 "This keeps you safer while browsing the Invisible Web."
 msgstr ""
 
@@ -1156,8 +1019,7 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"If you would like to try the latest experimental I2P projects, visit the "
-"<a href = \"%(lab)s\">I2P Lab</a>\n"
+"If you would like to try the latest experimental I2P projects, visit the <a href = \"%(lab)s\">I2P Lab</a>\n"
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:26
@@ -1182,8 +1044,7 @@ msgstr "Instaloni Java: "
 #, python-format
 msgid ""
 " I2P is written in Java and requires\n"
-"a Java system to be installed to run. In addition to the I2P download, "
-"you need to install Java if you do not have it \n"
+"a Java system to be installed to run. In addition to the I2P download, you need to install Java if you do not have it \n"
 "already installed. I2P requires Java Runtime Version 7 or higher.\n"
 "(<a href=\"%(java)s\">Oracle</a>,\n"
 "<a href=\"%(openjdk)s\">OpenJDK</a>, or\n"
@@ -1194,8 +1055,7 @@ msgid ""
 "<br />\n"
 "<a href=\"%(detectjre)s\">Determine your installed Java version here</a>\n"
 "or type <tt>java -version</tt> at your command prompt.\n"
-"Only two platforms do not require Java to be installed before I2P is "
-"installed, those platforms are:"
+"Only two platforms do not require Java to be installed before I2P is installed, those platforms are:"
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:50
@@ -1205,8 +1065,7 @@ msgstr "Android: "
 #: i2p2www/pages/downloads/list.html:50
 msgid ""
 "Android comes with a Java virtual machine\n"
-"as part of the platform, which I2P for Android uses. Therefore it is not "
-"necessary to install Java to use\n"
+"as part of the platform, which I2P for Android uses. Therefore it is not necessary to install Java to use\n"
 "I2P for Android."
 msgstr ""
 
@@ -1217,8 +1076,7 @@ msgstr "Debian dhe Ubuntu: "
 #: i2p2www/pages/downloads/list.html:53
 msgid ""
 "On Debian and Ubuntu when using\n"
-"a .deb package to install, the system will automatically install and "
-"configure a Java environment for you."
+"a .deb package to install, the system will automatically install and configure a Java environment for you."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:56
@@ -1238,8 +1096,7 @@ msgstr "Instaloni/Formësoni një Shfletues(Në daçi): "
 #: i2p2www/pages/downloads/list.html:58
 msgid ""
 "Finally, you'll need to\n"
-"configure applications to use I2P. Many applications can use I2P, but the"
-" first application most people configure is a Web\n"
+"configure applications to use I2P. Many applications can use I2P, but the first application most people configure is a Web\n"
 "Browser for browsing I2P sites. Detailed instructions are available on the"
 msgstr ""
 
@@ -1286,10 +1143,8 @@ msgstr "Paketë “Instalim i Kollajshëm” (Beta)"
 #: i2p2www/pages/downloads/list.html:106
 msgid ""
 "It's now possible to install all I2P components using\n"
-"      a single package(<strong>No Java Required</strong>). To try out the"
-" new installer, click here.\n"
-"      This bundle can also be used to configure a Firefox Profile. It "
-"will not\n"
+"      a single package(<strong>No Java Required</strong>). To try out the new installer, click here.\n"
+"      This bundle can also be used to configure a Firefox Profile. It will not\n"
 "      interfere with an existing I2P installation if one exists.\n"
 "      "
 msgstr ""
@@ -1304,8 +1159,8 @@ msgstr "Udhërrëfyes i Hollësishëm Instalimi"
 
 #: i2p2www/pages/downloads/list.html:116
 msgid ""
-"Here is a helpful guide to installing I2P for Windows using a separate "
-"Java installation and the classic installer."
+"Here is a helpful guide to installing I2P for Windows using a separate Java "
+"installation and the classic installer."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:120
@@ -1315,14 +1170,10 @@ msgstr "I2P për Mac OSX"
 #: i2p2www/pages/downloads/list.html:122 i2p2www/pages/downloads/list.html:150
 #, python-format
 msgid ""
-"The most reliable way to launch the installer is from a terminal like "
-"this:\n"
-"    <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will "
-"launch the GUI installer.\n"
-"    Depending on how your computer is set up, you may be able to start "
-"the\n"
-"    installer by double-clicking the "
-"&quot;i2pinstall_%(i2pversion)s.jar&quot; file or\n"
+"The most reliable way to launch the installer is from a terminal like this:\n"
+"    <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will launch the GUI installer.\n"
+"    Depending on how your computer is set up, you may be able to start the\n"
+"    installer by double-clicking the &quot;i2pinstall_%(i2pversion)s.jar&quot; file or\n"
 "    right-clicking the file and selecting &quot;Open with Java&quot;.\n"
 "    Unfortunately, this behaviour is difficult to predict."
 msgstr ""
@@ -1334,13 +1185,10 @@ msgstr "Instalim nga rresht urdhri (headless):"
 #: i2p2www/pages/downloads/list.html:132 i2p2www/pages/downloads/list.html:160
 #, python-format
 msgid ""
-"I2P can also be installed in a terminal environment, which may be "
-"especially\n"
-"    useful for servers, containers, or certain virtual machines. If you "
-"wish to\n"
+"I2P can also be installed in a terminal environment, which may be especially\n"
+"    useful for servers, containers, or certain virtual machines. If you wish to\n"
 "    use the installer without a GUI, you can use the command \n"
-"    <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to "
-"follow\n"
+"    <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to follow\n"
 "    the install procedure in your terminal."
 msgstr ""
 
@@ -1366,13 +1214,10 @@ msgstr "Ka paketa të gatshme për Debian &amp; Ubuntu."
 
 #: i2p2www/pages/downloads/list.html:174
 msgid ""
-"I2P is available in the official repositories for Ubuntu Bionic and "
-"later, and Debian Buster and Sid.\n"
-"    However, Debian Buster and Ubuntu Bionic (LTS) distributions will "
-"have older I2P versions.\n"
+"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n"
+"    However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n"
 "    If you are not running Debian Sid or the latest Ubuntu release,\n"
-"    use our Debian repo or Launchpad PPA to ensure you're running the "
-"latest I2P version."
+"    use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:182
@@ -1381,10 +1226,8 @@ msgstr "I2P për Android"
 
 #: i2p2www/pages/downloads/list.html:185
 msgid ""
-"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier "
-"installed\n"
-"      I2P, unfortunately this release fixes some IPC issues which will "
-"force you to uninstall your current installation before installing this."
+"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier installed\n"
+"      I2P, unfortunately this release fixes some IPC issues which will force you to uninstall your current installation before installing this."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:189
@@ -1393,10 +1236,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/list.html:192
 msgid ""
-"The releases are not compatible with eachother, as they have different "
-"signatures. Uninstall them\n"
-"      completely before installing any other version. The apk's from "
-"download.i2p2.de are signed by idk."
+"The releases are not compatible with eachother, as they have different signatures. Uninstall them\n"
+"      completely before installing any other version. The apk's from download.i2p2.de are signed by idk."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:199
@@ -1414,31 +1255,27 @@ msgid "docker pull geti2p/i2p"
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:219
-msgid "Additional instructions for configuring your container can be found here."
+msgid ""
+"Additional instructions for configuring your container can be found here."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:224
 #, python-format
 msgid ""
-"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s"
-"#getting-the-i2p-code\">monotone</a>\n"
-"    or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a "
-"href=\"%(github)s\">Github</a>.\n"
+"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a>\n"
+"    or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a href=\"%(github)s\">Github</a>.\n"
 "    <br />\n"
-"    Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd "
-"i2p-%(i2pversion)s ; ant pkg)</code> then either\n"
+"    Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> then either\n"
 "    run the GUI installer or headless install as above."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:234
 #, python-format
 msgid ""
-"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-"
-"code\">git</a>\n"
+"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-code\">git</a>\n"
 "    and on <a href=\"%(github)s\">Github</a>.\n"
 "    Android builds require the I2P source.\n"
-"    See the documentation in the Android source for additional build "
-"requirements and instructions."
+"    See the documentation in the Android source for additional build requirements and instructions."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:251
@@ -1451,8 +1288,7 @@ msgstr ""
 #: i2p2www/pages/downloads/list.html:257
 #, python-format
 msgid ""
-"The Mac OS X native installer is signed by %(signer)s with his Apple "
-"Developer ID certificate,\n"
+"The Mac OS X native installer is signed by %(signer)s with his Apple Developer ID certificate,\n"
 "<a href=\"%(signingkey)s\">whose key is here</a>."
 msgstr ""
 
@@ -1467,17 +1303,14 @@ msgstr ""
 #: i2p2www/pages/downloads/list.html:270
 msgid ""
 "If you are running 0.7.5 or later, your router should detect the\n"
-"new release. To upgrade simply click the 'Download Update' button on your"
-" router console\n"
+"new release. To upgrade simply click the 'Download Update' button on your router console\n"
 "when it appears."
 msgstr ""
 
 #: i2p2www/pages/downloads/list.html:276
 msgid ""
-"Since 0.9.23, some releases are signed by str4d, whose signing key has "
-"been in the router\n"
-"since 0.9.9. Routers older than 0.9.9 will fail to verify update files "
-"signed by str4d,\n"
+"Since 0.9.23, some releases are signed by str4d, whose signing key has been in the router\n"
+"since 0.9.9. Routers older than 0.9.9 will fail to verify update files signed by str4d,\n"
 "and will need to be manually updated using the process below."
 msgstr ""
 
@@ -1485,8 +1318,7 @@ msgstr ""
 msgid ""
 "Download the file to your I2P\n"
 "    installation directory and <b>rename as i2pupdate.zip</b>.\n"
-"    (alternately, you can get the source as above and run \"ant "
-"updater\", then copy the\n"
+"    (alternately, you can get the source as above and run \"ant updater\", then copy the\n"
 "    resulting i2pupdate.zip to your I2P installation directory).  You do\n"
 "    NOT need to unzip the file."
 msgstr ""
@@ -1513,20 +1345,15 @@ msgstr "Hedhje të Mëparshme Në Qarkullim"
 #: i2p2www/pages/downloads/list.html:316
 #, python-format
 msgid ""
-"Previous releases are available on <a "
-"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google "
-"Code</a>\n"
+"Previous releases are available on <a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code</a>\n"
 "and <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\n"
-"and within the I2P network on <a "
-"href=\"http://%(echelon)s/\">%(echelon)s</a>."
+"and within the I2P network on <a href=\"http://%(echelon)s/\">%(echelon)s</a>."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:7
 msgid ""
-"We are excited to offer you a DMG bundle for Mac OS.  It installs and "
-"behaves\n"
-"the same way many other Mac OS applications do and does not require a "
-"Java\n"
+"We are excited to offer you a DMG bundle for Mac OS.  It installs and behaves\n"
+"the same way many other Mac OS applications do and does not require a Java\n"
 "Runtime Environment to be available."
 msgstr ""
 
@@ -1534,61 +1361,44 @@ msgstr ""
 #, python-format
 msgid ""
 "This bundle is built for <code>x86_64(Intel)</code> Macs. It will run on\n"
-"<code>ARM(M1)</code> Macs in emulated mode, but the performance is "
-"unknown. M1 Mac\n"
-"users should report results to us at the <a href=\"%(perf)s\">Gitlab "
-"Repository</a>."
+"<code>ARM(M1)</code> Macs in emulated mode, but the performance is unknown. M1 Mac\n"
+"users should report results to us at the <a href=\"%(perf)s\">Gitlab Repository</a>."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:18
 msgid ""
-"Double-Click on the .dmg file, which you may download from this page. "
-"When a\n"
-"window appears with the I2P application inside it, \"drag\" the "
-"application to the\n"
-"\"Applications\" side of the window to install it. Once you're finished, "
-"I2P is\n"
-"installed and can be launched from Finder. This procedure is the same as "
-"any\n"
-"other Mac application. When you launch I2P, the I2P icon will appear on "
-"the Dock\n"
-"and a few seconds later a browser will open with the I2P console page, "
-"inviting\n"
+"Double-Click on the .dmg file, which you may download from this page. When a\n"
+"window appears with the I2P application inside it, \"drag\" the application to the\n"
+"\"Applications\" side of the window to install it. Once you're finished, I2P is\n"
+"installed and can be launched from Finder. This procedure is the same as any\n"
+"other Mac application. When you launch I2P, the I2P icon will appear on the Dock\n"
+"and a few seconds later a browser will open with the I2P console page, inviting\n"
 "you to complete the bandwidth setup wizard."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:27
 #, python-format
 msgid ""
-"If you want to browse hidden websites ('eepsites') on the I2P network, "
-"you need\n"
-"to configure your browser. Instructions for configuring a range of "
-"browsers are\n"
+"If you want to browse hidden websites ('eepsites') on the I2P network, you need\n"
+"to configure your browser. Instructions for configuring a range of browsers are\n"
 "available on <a href=\"%(browser)s\">the browser configuration\n"
 "page</a>."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:34
 msgid ""
-"Two important reasons, 1) because this package is a .dmg, it can be "
-"signed with\n"
-"a certificate which will be recognized by your computer. This means that "
-"your\n"
-"computer can automatically make sure that you've obtained I2P from the "
-"I2P\n"
-"Project, rather than a potentially altered or \"fake\" installer, and 2) "
-"because\n"
-"it makes I2P easier to install and work with on Apple computers by using "
-"tools\n"
+"Two important reasons, 1) because this package is a .dmg, it can be signed with\n"
+"a certificate which will be recognized by your computer. This means that your\n"
+"computer can automatically make sure that you've obtained I2P from the I2P\n"
+"Project, rather than a potentially altered or \"fake\" installer, and 2) because\n"
+"it makes I2P easier to install and work with on Apple computers by using tools\n"
 "that are familiar and built-into the operating system."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:61
 msgid ""
-"Download that file and double-click on it.  Accept the License Agreement,"
-" then\n"
-"drag the <code>I2P</code> icon on top of the <code>Applications</code> "
-"icon.\n"
+"Download that file and double-click on it.  Accept the License Agreement, then\n"
+"drag the <code>I2P</code> icon on top of the <code>Applications</code> icon.\n"
 "Launch I2P from Finder."
 msgstr ""
 
@@ -1598,18 +1408,14 @@ msgstr "Kufizime"
 
 #: i2p2www/pages/downloads/mac.html:69
 msgid ""
-"I2P will not install any launch agents on your Mac.  If you want I2P to "
-"start on\n"
-"system startup, you need to configure a launch agent yourself. You can "
-"configure\n"
-"I2P to launch when your user logs in by right-clicking on the I2P Dock "
-"icon."
+"I2P will not install any launch agents on your Mac.  If you want I2P to start on\n"
+"system startup, you need to configure a launch agent yourself. You can configure\n"
+"I2P to launch when your user logs in by right-clicking on the I2P Dock icon."
 msgstr ""
 
 #: i2p2www/pages/downloads/mac.html:75
 msgid ""
-"If you would like to examine the source code for individual components, "
-"you may\n"
+"If you would like to examine the source code for individual components, you may\n"
 "find it on i2pgit.org."
 msgstr ""
 
@@ -1617,46 +1423,36 @@ msgstr ""
 msgid ""
 "If you wish to file an issue about the DMG Bundle, please use Gitlab to\n"
 "contact us. For security-sensitive issues, please remember to check the\n"
-"\"This issue is confidential and should only be visible to team members "
-"with at\n"
+"\"This issue is confidential and should only be visible to team members with at\n"
 "least Reporter access\" option when filing the issue."
 msgstr ""
 
 #: i2p2www/pages/downloads/post-install.html:3
 msgid ""
-"After running the installer on windows, simply click on the \"Start I2P\""
-" button\n"
-"which will bring up the <a "
-"href=\"http://localhost:7657/index.jsp\">router console</a>,\n"
+"After running the installer on windows, simply click on the \"Start I2P\" button\n"
+"which will bring up the <a href=\"http://localhost:7657/index.jsp\">router console</a>,\n"
 "which has further instructions."
 msgstr ""
 
 #: i2p2www/pages/downloads/post-install.html:9
 msgid ""
 "On Unix-like systems, I2P can be started as a service\n"
-"using the \"i2prouter\" script, located in the directory you selected for"
-" I2P.\n"
-"Changing to that directory in a console and issuing \"sh i2prouter "
-"status\"\n"
-"should tell you the router's status. The arguments \"start\", \"stop\" "
-"and \"restart\"\n"
-"control the service. The <a "
-"href=\"http://localhost:7657/index.jsp\">router console</a>\n"
+"using the \"i2prouter\" script, located in the directory you selected for I2P.\n"
+"Changing to that directory in a console and issuing \"sh i2prouter status\"\n"
+"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n"
+"control the service. The <a href=\"http://localhost:7657/index.jsp\">router console</a>\n"
 "can be accessed at its usual location.\n"
-"For users on OpenSolaris and other systems for which the wrapper (i2psvc)"
-" is not supported,\n"
+"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n"
 "start the router with \"sh runplain.sh\" instead."
 msgstr ""
 
 #: i2p2www/pages/downloads/post-install.html:20
 #, python-format
 msgid ""
-"When installing for the first time, please remember to <b>adjust your "
-"NAT/firewall</b>\n"
+"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n"
 "if you can, bearing in mind the Internet-facing ports I2P uses,\n"
 "<a href=\"%(faq)s#ports\">described here</a> among other ports.\n"
-"If you have successfully opened your port to inbound TCP, also enable "
-"inbound TCP on the\n"
+"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n"
 "<a href=\"http://localhost:7657/confignet.jsp\">configuration page</a>."
 msgstr ""
 
@@ -1698,12 +1494,9 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:7
 msgid ""
-"This is the long way of installing I2P for Windows, using the IzPack "
-"based\n"
-"installer and a separate Java Virtual Machine installed on the host. If "
-"you're new to I2P, you may\n"
-"want to try the Beta installer, which requires fewer total steps and "
-"automatically configures a JVM,\n"
+"This is the long way of installing I2P for Windows, using the IzPack based\n"
+"installer and a separate Java Virtual Machine installed on the host. If you're new to I2P, you may\n"
+"want to try the Beta installer, which requires fewer total steps and automatically configures a JVM,\n"
 "I2P, and sets up a Firefox Profile in a single step."
 msgstr ""
 
@@ -1713,12 +1506,9 @@ msgstr "Ndiqni këtë lidhje për te instaluesi i beta-s"
 
 #: i2p2www/pages/downloads/windows.html:14
 msgid ""
-"This is a detailed, step-by-step guide to installing and configuring I2P,"
-" including\n"
-"all dependencies and setting up a browser, on a new Windows 10 system. "
-"Many users\n"
-"will be able to skip steps if they already have Java 8 or Firefox "
-"installed."
+"This is a detailed, step-by-step guide to installing and configuring I2P, including\n"
+"all dependencies and setting up a browser, on a new Windows 10 system. Many users\n"
+"will be able to skip steps if they already have Java 8 or Firefox installed."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:18
@@ -1751,10 +1541,8 @@ msgstr "Pjesa e Parë: Instalim i Java-s"
 
 #: i2p2www/pages/downloads/windows.html:31
 msgid ""
-"In order to use I2P, you will need a suitable Java environment. On "
-"Windows, users should\n"
-"probably choose Oracle's Java 8 implementation. Please install it by "
-"following the\n"
+"In order to use I2P, you will need a suitable Java environment. On Windows, users should\n"
+"probably choose Oracle's Java 8 implementation. Please install it by following the\n"
 "instructions below:"
 msgstr ""
 
@@ -1764,15 +1552,13 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:38
 msgid ""
-"I2P requires Java to run, if you don't have Java installed, you will get "
-"an error\n"
+"I2P requires Java to run, if you don't have Java installed, you will get an error\n"
 "that looks like this:"
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:43
 msgid ""
-"We appreciate that you have a wide range of choices in Java software, but"
-" the Oracle\n"
+"We appreciate that you have a wide range of choices in Java software, but the Oracle\n"
 "Java software is the easiest to install and use with I2P on Windows."
 msgstr ""
 
@@ -1782,15 +1568,13 @@ msgstr "Shkarkojeni prej"
 
 #: i2p2www/pages/downloads/windows.html:52
 msgid ""
-"Double-click the Java Installer you just downloaded. Don't set a custom "
-"path, just\n"
+"Double-click the Java Installer you just downloaded. Don't set a custom path, just\n"
 "use the default one."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:57
 msgid ""
-"Java will show you some information about what it is and where it runs "
-"while you\n"
+"Java will show you some information about what it is and where it runs while you\n"
 "wait for it to finish installing."
 msgstr ""
 
@@ -1815,7 +1599,8 @@ msgid "https://geti2p.net"
 msgstr "https://geti2p.net"
 
 #: i2p2www/pages/downloads/windows.html:79
-msgid "'I2P is available in many languages. Pick one that is familiar to you.'"
+msgid ""
+"'I2P is available in many languages. Pick one that is familiar to you.'"
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:83
@@ -1824,22 +1609,19 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:87
 msgid ""
-"I2P is mostly public domain software, with permissive licenses and a "
-"small amount of GPL2'ed\n"
+"I2P is mostly public domain software, with permissive licenses and a small amount of GPL2'ed\n"
 "Free Software."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:92
 msgid ""
-"You should probably leave I2P installed at the default path, as it is "
-"easiest to work with this\n"
+"You should probably leave I2P installed at the default path, as it is easiest to work with this\n"
 "way."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:97
 msgid ""
-"Don't bother running it as a Windows service for now, an easy-to-use "
-"shortcut will be added to\n"
+"Don't bother running it as a Windows service for now, an easy-to-use shortcut will be added to\n"
 "the start menu for you to control I2P with."
 msgstr ""
 
@@ -1849,8 +1631,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:106
 msgid ""
-"I2P is now installed! You can start it using the \"Start I2P\" entries in"
-" your Start Menu and on your Desktop."
+"I2P is now installed! You can start it using the \"Start I2P\" entries in "
+"your Start Menu and on your Desktop."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:109
@@ -1859,18 +1641,15 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:111
 msgid ""
-"If you already have either Firefox or Tor Browser installed, skip the "
-"first 2 steps."
+"If you already have either Firefox or Tor Browser installed, skip the first "
+"2 steps."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:113
 msgid ""
-"Unfortunately for Windows users, Microsoft Edge does not have proxy "
-"settings that are safe to use with I2P. The browser\n"
-"that is easiest to configure with I2P in a reasonably good way is "
-"Firefox(Although Chrome is possible, this procedure\n"
-"is only recommended for experts). I2P participants who want to browse I2P"
-" Sites can follow these steps to install\n"
+"Unfortunately for Windows users, Microsoft Edge does not have proxy settings that are safe to use with I2P. The browser\n"
+"that is easiest to configure with I2P in a reasonably good way is Firefox(Although Chrome is possible, this procedure\n"
+"is only recommended for experts). I2P participants who want to browse I2P Sites can follow these steps to install\n"
 "and configure Firefox for I2P."
 msgstr ""
 
@@ -1900,10 +1679,8 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:142
 msgid ""
-"The Profile Bundle incorporates lots of external software, so it has a "
-"detailed license \n"
-"document. All of the external software is Free and Open Source, with the "
-"license included."
+"The Profile Bundle incorporates lots of external software, so it has a detailed license \n"
+"document. All of the external software is Free and Open Source, with the license included."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:147
@@ -1916,8 +1693,7 @@ msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:153
 msgid ""
-"When you visit the I2P router console for the first time, it will "
-"automatically direct you to the bandwidth\n"
+"When you visit the I2P router console for the first time, it will automatically direct you to the bandwidth\n"
 "configuration wizard."
 msgstr ""
 
@@ -1936,22 +1712,20 @@ msgid "Here we have an overview of the applications."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:170
-msgid "Now you have your bandwidth configured to efficiently contribute to I2P."
+msgid ""
+"Now you have your bandwidth configured to efficiently contribute to I2P."
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:176
 msgid ""
-"If you want to re-run the welcome wizard after completing it, you can "
-"visit the page\n"
+"If you want to re-run the welcome wizard after completing it, you can visit the page\n"
 "on"
 msgstr ""
 
 #: i2p2www/pages/downloads/windows.html:179
 msgid ""
-"That's it! You're now ready to use I2P. You can browse I2P Sites, "
-"download files, host services,\n"
-"e-mail and chat anonymously. Visit the <a "
-"href=\"https://localhost:7657/home\">router console homepage</a> to\n"
+"That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services,\n"
+"e-mail and chat anonymously. Visit the <a href=\"https://localhost:7657/home\">router console homepage</a> to\n"
 "get started."
 msgstr ""
 
@@ -1961,8 +1735,8 @@ msgstr "S’u gjet"
 
 #: i2p2www/pages/global/error_404.html:9
 msgid ""
-"Yep... the resource, you were searching for, is named differently, "
-"doesn't exist or was removed."
+"Yep... the resource, you were searching for, is named differently, doesn't "
+"exist or was removed."
 msgstr ""
 
 #: i2p2www/pages/global/error_500.html:5
@@ -2374,8 +2148,7 @@ msgstr "Prurje ATOM për Takime mbi I2P-në"
 #: i2p2www/pages/meetings/index.html:7
 #, python-format
 msgid ""
-"Regularly scheduled project meetings are held on the first Tuesday of "
-"every month at 8 PM UTC.\n"
+"Regularly scheduled project meetings are held on the first Tuesday of every month at 8 PM UTC.\n"
 "Anyone can schedule and\n"
 "run a meeting, by posting the agenda in\n"
 "<a href=\"%(mtgforum)s\">the meetings forum</a>."
@@ -2384,10 +2157,8 @@ msgstr ""
 #: i2p2www/pages/meetings/index.html:14
 #, python-format
 msgid ""
-"If you have something to discuss, please find the developers on IRC in "
-"#i2p-dev.\n"
-"<a href=\"%(blogindex)s\">Status updates</a> from developers are also "
-"available."
+"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n"
+"<a href=\"%(blogindex)s\">Status updates</a> from developers are also available."
 msgstr ""
 
 #: i2p2www/pages/meetings/show.html:2
@@ -2453,9 +2224,9 @@ msgstr ""
 #, python-format
 msgid ""
 "Most of the discussion about I2P's development happens on the <a "
-"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from "
-"within I2P network). This is usually the best place to start with "
-"inquiries, if the dev IRC channel is inactive."
+"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from within "
+"I2P network). This is usually the best place to start with inquiries, if the"
+" dev IRC channel is inactive."
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:30
@@ -2465,25 +2236,18 @@ msgstr "Media Shoqërore"
 #: i2p2www/pages/site/contact.html:32
 msgid ""
 "<ul>\n"
-"  <li><a href=\"https://mastodon.social/@i2p\">Mastodon - "
-"https://mastodon.social/@i2p</a></li>\n"
-"  <li><a href=\"https://twitter.com/GetI2P\">Twitter - "
-"https://twitter.com/GetI2P</a></li>\n"
-"  <li><a href=\"https://old.reddit.com/i2p\">Reddit - "
-"https://old.reddit.com/i2p</a></li>\n"
+"  <li><a href=\"https://mastodon.social/@i2p\">Mastodon - https://mastodon.social/@i2p</a></li>\n"
+"  <li><a href=\"https://twitter.com/GetI2P\">Twitter - https://twitter.com/GetI2P</a></li>\n"
+"  <li><a href=\"https://old.reddit.com/i2p\">Reddit - https://old.reddit.com/i2p</a></li>\n"
 "</ul>"
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:41
 msgid ""
-"Our primary IRC network is the Irc2P network within I2P; a default tunnel"
-" to this network is set up with new router installs.\n"
-"  We are also present on multiple standard networks like <a "
-"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n"
-"  <a href=\"http://www.einirc.de/\">EIN</a> and <a "
-"href=\"http://freenode.net/\">Freenode</a>.\n"
-"  All I2P-related channels on all these network are linked to the main "
-"channels on Irc2P via relay bots."
+"Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs.\n"
+"  We are also present on multiple standard networks like <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n"
+"  <a href=\"http://www.einirc.de/\">EIN</a> and <a href=\"http://freenode.net/\">Freenode</a>.\n"
+"  All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots."
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:49
@@ -2525,8 +2289,8 @@ msgstr ""
 
 #: i2p2www/pages/site/contact.html:71 i2p2www/pages/site/contact.html:75
 msgid ""
-"General I2P discussion - anything that doesn't fit in a different list "
-"goes here"
+"General I2P discussion - anything that doesn't fit in a different list goes "
+"here"
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:80
@@ -2698,7 +2462,8 @@ msgid "Product Development"
 msgstr "Zhvillim Produkti"
 
 #: i2p2www/pages/site/contact.html:186
-msgid "supervises  projects from the early planning stages to project completion"
+msgid ""
+"supervises  projects from the early planning stages to project completion"
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:189
@@ -2945,7 +2710,8 @@ msgid "jbigi development, wiki migration, doc cleanup"
 msgstr "zhvillim i jbigi-it, migrim wiki, pastrim dokumentimi"
 
 #: i2p2www/pages/site/contact.html:393
-msgid "java debugging and client development on I2PTunnel and the router console"
+msgid ""
+"java debugging and client development on I2PTunnel and the router console"
 msgstr ""
 
 #: i2p2www/pages/site/contact.html:397
@@ -2998,16 +2764,11 @@ msgstr "Përfshirje"
 
 #: i2p2www/pages/site/contact.html:475
 msgid ""
-"I2P welcomes all kinds of people, as long as they are friendly and "
-"helpful to each other.<br>\n"
+"I2P welcomes all kinds of people, as long as they are friendly and helpful to each other.<br>\n"
 "We disgrace hate, anger, racism, and bad speaking towards anyone.<br>\n"
-"We do support LBGT, suppressed minorites and other people, wether they "
-"need help in kind of our I2P software or not.<br>\n"
-"We work together to build a free world without hate, racism and "
-"violence.<br>\n"
-"The I2P router software was created in this spirit and should be used to "
-"help repressed people to regain their freedom of speech, while not "
-"suppressing others."
+"We do support LBGT, suppressed minorites and other people, wether they need help in kind of our I2P software or not.<br>\n"
+"We work together to build a free world without hate, racism and violence.<br>\n"
+"The I2P router software was created in this spirit and should be used to help repressed people to regain their freedom of speech, while not suppressing others."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:2
@@ -3028,8 +2789,7 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:10
 msgid ""
-"What is an \"I2P Site\" and how do I configure my browser so I can use "
-"them?"
+"What is an \"I2P Site\" and how do I configure my browser so I can use them?"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:11 i2p2www/pages/site/faq.html:109
@@ -3043,8 +2803,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:13 i2p2www/pages/site/faq.html:117
 msgid ""
-"I am opposed to certain types of content. How do I keep from "
-"distributing, storing, or accessing them?"
+"I am opposed to certain types of content. How do I keep from distributing, "
+"storing, or accessing them?"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:14
@@ -3103,8 +2863,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:29 i2p2www/pages/site/faq.html:558
 msgid ""
-"How can I access the web console from my other machines or password "
-"protect it?"
+"How can I access the web console from my other machines or password protect "
+"it?"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:30 i2p2www/pages/site/faq.html:622
@@ -3117,8 +2877,7 @@ msgstr "A është e mundur të përdoret I2P-ja si një ndërmjetës SOCKS?"
 
 #: i2p2www/pages/site/faq.html:32 i2p2www/pages/site/faq.html:648
 msgid ""
-"How do I access IRC, BitTorrent, or other services on the regular "
-"Internet?"
+"How do I access IRC, BitTorrent, or other services on the regular Internet?"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:34
@@ -3155,8 +2914,8 @@ msgstr "A është i parrezik përdorimi i I2P-së?"
 
 #: i2p2www/pages/site/faq.html:44 i2p2www/pages/site/faq.html:685
 msgid ""
-"I see IP addresses of all other I2P nodes in the router console. Does "
-"that mean my IP address is visible by others?"
+"I see IP addresses of all other I2P nodes in the router console. Does that "
+"mean my IP address is visible by others?"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:45 i2p2www/pages/site/faq.html:704
@@ -3187,8 +2946,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:55 i2p2www/pages/site/faq.html:963
 msgid ""
-"What makes downloads, torrents, web browsing, and everything else slower "
-"on I2P as compared to the regular internet?"
+"What makes downloads, torrents, web browsing, and everything else slower on "
+"I2P as compared to the regular internet?"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:59 i2p2www/pages/site/faq.html:1036
@@ -3202,41 +2961,31 @@ msgstr "Kam një pyetje!"
 #: i2p2www/pages/site/faq.html:69
 #, python-format
 msgid ""
-"I2P is written in the <a href=\"%(java)s\">Java programming language</a>."
-" \n"
+"I2P is written in the <a href=\"%(java)s\">Java programming language</a>. \n"
 "It has been tested on Windows, Linux, FreeBSD and OSX. \n"
 "An <a href=\"%(android)s\">Android port</a> is also available."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:76
 msgid ""
-"In terms of memory usage, I2P is configured to use 128 MB of RAM by "
-"default. \n"
-"This is sufficient for browsing and IRC usage. However, other activities "
-"may require greater memory allocation. \n"
-"For example, if one wishes to run a high-bandwidth router, participate in"
-" I2P torrents or serve high-traffic hidden services, \n"
+"In terms of memory usage, I2P is configured to use 128 MB of RAM by default. \n"
+"This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. \n"
+"For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, \n"
 "a higher amount of memory is required."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:81
 #, python-format
 msgid ""
-"In terms of CPU usage, I2P has been tested to run on modest systems such "
-"as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board "
-"computers.\n"
-"As I2P makes heavy use of cryptographic techniques, a stronger CPU will "
-"be better suited to handle the workload generated by I2P as well as tasks"
-" \n"
-"related to the rest of the system (i.e. Operating System, GUI, Other "
-"processes e.g. Web Browsing)."
+"In terms of CPU usage, I2P has been tested to run on modest systems such as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board computers.\n"
+"As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks \n"
+"related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing)."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:86
 #, python-format
 msgid ""
-"A comparison of some of the available Java Runtime Environments (JRE) is "
-"available here: \n"
+"A comparison of some of the available Java Runtime Environments (JRE) is available here: \n"
 "<a href=\"%(chart)s\">%(chart)s</a>.\n"
 "\n"
 "Using Sun/Oracle Java or OpenJDK is recommended."
@@ -3245,8 +2994,7 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:95
 #, python-format
 msgid ""
-"While the main I2P client implementation requires Java, there are several"
-"\n"
+"While the main I2P client implementation requires Java, there are several\n"
 "<a href=\"%(alt)s\">alternative clients</a> which don't require Java."
 msgstr ""
 
@@ -3257,36 +3005,22 @@ msgstr "Ç’është një “Sajt I2P”?"
 #: i2p2www/pages/site/faq.html:103
 #, python-format
 msgid ""
-"Formerly called an eepSite, an I2P Site is a website that is hosted "
-"anonymously, a hidden service which is accessible through your web "
-"browser. \n"
-"It can be accessed by setting your web browser's HTTP proxy to use the "
-"I2P web proxy (typically it listens on localhost port 4444), and browsing"
-" to the site. Detailed instructions for configuring your browse can be "
-"found on the <a href=\"%(browsers)s\">browser configuration page</a>."
+"Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. \n"
+"It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. Detailed instructions for configuring your browse can be found on the <a href=\"%(browsers)s\">browser configuration page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:111
 msgid ""
-"x is the number of peers you've sent or received a message from "
-"successfully in the last minute, y is the number of peers seen in the "
-"last hour or so. \n"
-"Try hovering your cursor over the other lines of information for a brief "
-"description."
+"x is the number of peers you've sent or received a message from successfully in the last minute, y is the number of peers seen in the last hour or so. \n"
+"Try hovering your cursor over the other lines of information for a brief description."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:119
 msgid ""
-"I2P is an anonymous network - it is designed to withstand attempts at "
-"blocking or censoring of content, thus providing a means for "
-"communication that anyone can use. \n"
-"I2P traffic that transits through your router is encrypted with several "
-"layers of encryption. \n"
-"Except in the case of a serious security vulnerability (of which none are"
-" currently known), \n"
-"it is not possible to know what the contents of the traffic are and thus "
-"not possible to distinguish between traffic which one is opposed to or "
-"not opposed to.  \n"
+"I2P is an anonymous network - it is designed to withstand attempts at blocking or censoring of content, thus providing a means for communication that anyone can use. \n"
+"I2P traffic that transits through your router is encrypted with several layers of encryption. \n"
+"Except in the case of a serious security vulnerability (of which none are currently known), \n"
+"it is not possible to know what the contents of the traffic are and thus not possible to distinguish between traffic which one is opposed to or not opposed to.  \n"
 "\n"
 " We consider the 3 parts of the question:"
 msgstr ""
@@ -3294,50 +3028,34 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:129
 msgid ""
 "<b>Distribution</b><br> \n"
-"All traffic on I2P is encrypted in multiple layers. You don't know a "
-"message's contents, source, or destination.\n"
-"All traffic you route is internal to the I2P network, you are not an <a "
-"href=\"#exit\">exit node</a> (referred to as an outproxy in our "
-"documentation).\n"
-"Your only alternative is to refuse to route <i>any</i> traffic, by "
-"setting your share bandwidth or maximum participating tunnels to 0 (see "
-"above).\n"
-"It would be nice if you didn't do this, you should help the network by "
-"routing traffic for others.\n"
+"All traffic on I2P is encrypted in multiple layers. You don't know a message's contents, source, or destination.\n"
+"All traffic you route is internal to the I2P network, you are not an <a href=\"#exit\">exit node</a> (referred to as an outproxy in our documentation).\n"
+"Your only alternative is to refuse to route <i>any</i> traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n"
+"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n"
 "Over 95&#37; of users route traffic for others."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:139
 msgid ""
 "<b>Storage</b><br> \n"
-"I2P does not do distributed storage of content, this has to be "
-"specifically installed and configured by the user (with Tahoe-LAFS, for "
-"example). \n"
-"That is a feature of a different anonymous network, <a "
-"href=\"http://freenetproject.org/\">Freenet</a>.\n"
+"I2P does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). \n"
+"That is a feature of a different anonymous network, <a href=\"http://freenetproject.org/\">Freenet</a>.\n"
 "By running I2P, you are not storing content for anyone."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:147
 msgid ""
 "<b>Access</b><br>\n"
-"If there are hidden services which you dislike, you may refrain from "
-"visiting them.\n"
-"Your router will not request any content without your specific "
-"instruction to do so."
+"If there are hidden services which you dislike, you may refrain from visiting them.\n"
+"Your router will not request any content without your specific instruction to do so."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:155
 msgid ""
-"Yes, by far the easiest and most common way is by blocking bootstrap, or "
-"\"Reseed\" servers. Completely blocking all obfuscated traffic\n"
-"would work as well (although it would break many, many other things that "
-"are not I2P and most are not willing to go this far).\n"
-"In the case of reseed blocking, there is a reseed bundle on Github, "
-"blocking it will also block Github.\n"
-"You can reseed over a proxy (many can be found on Internet if you do not "
-"want to use Tor) or share reseed bundles on a friend-to-friend basis "
-"offline."
+"Yes, by far the easiest and most common way is by blocking bootstrap, or \"Reseed\" servers. Completely blocking all obfuscated traffic\n"
+"would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).\n"
+"In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.\n"
+"You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:161
@@ -3348,9 +3066,9 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:163
 msgid ""
-"Often this error will occur with any network enabled java software on "
-"some systems that are configured to use IPv6 by default. There are a few "
-"ways to solve this:"
+"Often this error will occur with any network enabled java software on some "
+"systems that are configured to use IPv6 by default. There are a few ways to "
+"solve this:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:168
@@ -3365,8 +3083,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:174
 msgid ""
-"If the lines are there, uncomment them by removing the \"#\"s. If the "
-"lines are not there, add them without the \"#\"s."
+"If the lines are there, uncomment them by removing the \"#\"s. If the lines "
+"are not there, add them without the \"#\"s."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:177
@@ -3377,8 +3095,7 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:181
 msgid ""
-"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> "
-"to take effect, you must completely\n"
+"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> to take effect, you must completely\n"
 "stop the router and the wrapper. Clicking <em>Restart</em> on your\n"
 "router console will NOT reread this file! You must\n"
 "click <em>Shutdown</em>, wait 11 minutes, then start I2P."
@@ -3387,11 +3104,9 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:191
 #, python-format
 msgid ""
-"If you consider every I2P Site that has ever been created, yes, most of "
-"them are down.\n"
+"If you consider every I2P Site that has ever been created, yes, most of them are down.\n"
 "People and I2P Sites come and go.\n"
-"A good way to get started in I2P is check out a list of I2P Sites that "
-"are currently up.\n"
+"A good way to get started in I2P is check out a list of I2P Sites that are currently up.\n"
 "<a href=\"%(eepstatus)s\">%(eepstatus)s</a> tracks active I2P Sites."
 msgstr ""
 
@@ -3401,13 +3116,9 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:201
 msgid ""
-"The Tanuki java service wrapper that we use opens this port &mdash;bound "
-"to localhost&mdash; in order to communicate with software running inside "
-"the JVM. \n"
-"When the JVM is launched it is given a key so it can connect to the "
-"wrapper. \n"
-"After the JVM establishes its connection to the wrapper, the wrapper "
-"refuses any additional connections."
+"The Tanuki java service wrapper that we use opens this port &mdash;bound to localhost&mdash; in order to communicate with software running inside the JVM. \n"
+"When the JVM is launched it is given a key so it can connect to the wrapper. \n"
+"After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:206
@@ -3420,47 +3131,32 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:215
 #, python-format
 msgid ""
-"The proxy config for different browsers is on a <a "
-"href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n"
-"More advanced configs with external tools, such as the browser plug-in "
-"FoxyProxy or the proxy server Privoxy, are possible but could introduce "
-"leaks in your setup."
+"The proxy config for different browsers is on a <a href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n"
+"More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:223
 msgid ""
 "\n"
-"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is"
-" installed (see the <a "
-"href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel "
-"configuration page</a>), and is automatically started when the I2P router"
-" starts. \n"
-"To connect to it, tell your IRC client to connect to <code>localhost "
-"6668</code>. \n"
-"HexChat-like client users can create a new network with the server "
-"<code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if "
-"you have a proxy server configured).\n"
+"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the <a href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel configuration page</a>), and is automatically started when the I2P router starts. \n"
+"To connect to it, tell your IRC client to connect to <code>localhost 6668</code>. \n"
+"HexChat-like client users can create a new network with the server <code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if you have a proxy server configured).\n"
 "Weechat users can use the following command to add a new network:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:238
 msgid ""
-"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the "
-"top of your router console for instructions."
+"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the top "
+"of your router console for instructions."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:243
 msgid ""
-"If you're hosting a personal blog or doing something otherwise non-"
-"sensitive, then you are obviously in little danger.\n"
-"If you have privacy needs that are basically non-specific, you are in "
-"little danger. If you are hosting something sensitive, then\n"
-"your services will go down at the same time that your router goes down. "
-"Someone who observes your downtime and correlates it to\n"
-"real-world events could probably de-anonymize you with enough effort. I2P"
-" has defenses available against this like multihoming or\n"
-"Tahoe-LAFS, but they require additional set up and are only appropriate "
-"for some threat models. There is no magic solution, protecting\n"
+"If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.\n"
+"If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then\n"
+"your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to\n"
+"real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or\n"
+"Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting\n"
 "yourself from a real threat will take real consideration in any case."
 msgstr ""
 
@@ -3474,23 +3170,23 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:254
 msgid ""
-"You cannot add an address without knowing at least the base32 or base64 "
-"of the site you want to visit. The \"hostname\" which is human-readable "
-"is only an alias for the cryptographic address, which corresponds to the "
-"base32 or base64. Without the cryptographic address, there is no way to "
-"access an I2P Site, this is by design. Distributing the address to people"
-" who do not know it yet is usually the responsibility of the Jump service"
-" provider. Visiting an I2P Site which is unknown will trigger the use of "
-"a Jump service. stats.i2p is the most reliable Jump service."
+"You cannot add an address without knowing at least the base32 or base64 of "
+"the site you want to visit. The \"hostname\" which is human-readable is only"
+" an alias for the cryptographic address, which corresponds to the base32 or "
+"base64. Without the cryptographic address, there is no way to access an I2P "
+"Site, this is by design. Distributing the address to people who do not know "
+"it yet is usually the responsibility of the Jump service provider. Visiting "
+"an I2P Site which is unknown will trigger the use of a Jump service. "
+"stats.i2p is the most reliable Jump service."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:256
 msgid ""
-"If you're hosting a site via i2ptunnel, then it won't have a registration"
-" with a jump service yet. To give it a URL locally, then visit the "
+"If you're hosting a site via i2ptunnel, then it won't have a registration "
+"with a jump service yet. To give it a URL locally, then visit the "
 "configuration page and click the button that says \"Add to Local Address "
-"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper"
-" URL and share it."
+"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper "
+"URL and share it."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:261
@@ -3513,12 +3209,9 @@ msgstr "Këto përshkruhen hollësisht më poshtë."
 
 #: i2p2www/pages/site/faq.html:275
 msgid ""
-"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not "
-"use port 8887; \n"
-"    a random port between 9000 and 31000 is selected when the program is "
-"run for the first time. \n"
-"    The selected port is shown on the router <a "
-"href=\"http://127.0.0.1:7657/confignet\">configuration page</a>."
+"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not use port 8887; \n"
+"    a random port between 9000 and 31000 is selected when the program is run for the first time. \n"
+"    The selected port is shown on the router <a href=\"http://127.0.0.1:7657/confignet\">configuration page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:278
@@ -3528,8 +3221,8 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:280
 msgid ""
 "UDP from the random port listed on the <a "
-"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to "
-"arbitrary remote UDP ports, allowing for replies"
+"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to arbitrary"
+" remote UDP ports, allowing for replies"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:281
@@ -3539,9 +3232,7 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:282
 msgid ""
 "Outbound UDP on port 123, allowing for replies. \n"
-"        This is necessary for I2P's internal time sync (via SNTP - "
-"querying a random SNTP host in pool.ntp.org or another server you "
-"specify)"
+"        This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:285
@@ -3594,133 +3285,100 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:324
 msgid ""
-"A higher level socket API for clients. Disabled by default. May be "
-"enabled/disabled on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
+"A higher level socket API for clients. Disabled by default. May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
 "          May be changed in the bob.config file."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:336 i2p2www/pages/site/faq.html:347
 #: i2p2www/pages/site/faq.html:358
 msgid ""
-"May be disabled or changed on the i2ptunnel page in the router console. "
-"May also be configured to be bound to a specific interface or all "
-"interfaces."
+"May be disabled or changed on the i2ptunnel page in the router console. May "
+"also be configured to be bound to a specific interface or all interfaces."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:369
 msgid ""
 "Binds to the LAN address. \n"
-"          May be changed with advanced config "
-"<code>i2np.upnp.HTTPPort=nnnn</code>. \n"
-"          May be disabled on <a "
-"href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
+"          May be changed with advanced config <code>i2np.upnp.HTTPPort=nnnn</code>. \n"
+"          May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:382
 msgid ""
 "Binds to the LAN address. \n"
-"          May be changed with advanced config "
-"<code>i2np.upnp.SSDPPort=nnnn</code>. \n"
-"          May be disabled on <a "
-"href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
+"          May be changed with advanced config <code>i2np.upnp.SSDPPort=nnnn</code>. \n"
+"          May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:395
 msgid ""
 "Used by client apps. \n"
-"          May be changed to a different port on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this "
-"is not recommended. \n"
-"          May be to bind to a different interface or all interfaces, or "
-"disabled, on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>."
+"          May be changed to a different port on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this is not recommended. \n"
+"          May be to bind to a different interface or all interfaces, or disabled, on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:408
 msgid ""
-"A higher level socket API for clients Only opened when a SAM V3 client "
-"requests a UDP session. \n"
-"          May be enabled/disabled on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
-"          May be changed in the <code>clients.config</code> file with the"
-" SAM command line option <code>sam.udp.port=nnnn</code>."
+"A higher level socket API for clients Only opened when a SAM V3 client requests a UDP session. \n"
+"          May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
+"          May be changed in the <code>clients.config</code> file with the SAM command line option <code>sam.udp.port=nnnn</code>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:421
 msgid ""
-"A higher level socket API for clients Disabled by default for new "
-"installs as of release 0.6.5. \n"
-"          May be enabled/disabled on <a "
-"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
+"A higher level socket API for clients Disabled by default for new installs as of release 0.6.5. \n"
+"          May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n"
 "          May be changed in the <code>clients.config</code> file."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:434
 msgid ""
 "May be disabled in the <code>clients.config</code>file. \n"
-"          May also be configured to be bound to a specific interface or "
-"all interfaces in that file."
+"          May also be configured to be bound to a specific interface or all interfaces in that file."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:446
 msgid ""
 "May be disabled in the <code>clients.config</code> file. \n"
-"          May also be configured to be bound to a specific interface or "
-"all interfaces in the <code>jetty.xml</code> file."
+"          May also be configured to be bound to a specific interface or all interfaces in the <code>jetty.xml</code> file."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:458 i2p2www/pages/site/faq.html:470
 #: i2p2www/pages/site/faq.html:482
 msgid ""
 "May be disabled or changed on the i2ptunnel page in the router console. \n"
-"          May also be configured to be bound to a specific interface or "
-"all interfaces."
+"          May also be configured to be bound to a specific interface or all interfaces."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:494
 msgid ""
 "Outbound to 32000 only, does not listen on this port. \n"
-"          Starts at 31000 and will increment until 31999 looking for a "
-"free port. \n"
-"          To change, see the <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
-"port.html\">wrapper documentation</a>. \n"
+"          Starts at 31000 and will increment until 31999 looking for a free port. \n"
+"          To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n"
 "          For more information see <a href=\"#port32000\">below</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:508
 msgid ""
-"To change, see the <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-"
-"port.html\">wrapper documentation</a>. \n"
+"To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n"
 "          For more information see <a href=\"#port32000\">below</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:516
 msgid ""
-"The local I2P ports and the I2PTunnel ports do not need to be reachable "
-"from \n"
-"remote machines, but *should* be reachable locally.  You can also create"
-" \n"
-"additional ports for I2PTunnel instances via "
-"http://localhost:7657/i2ptunnel/ \n"
-"(and in turn, would need to get your firewall to allow you local access, "
-"but \n"
+"The local I2P ports and the I2PTunnel ports do not need to be reachable from \n"
+"remote machines, but *should* be reachable locally.  You can also create \n"
+"additional ports for I2PTunnel instances via http://localhost:7657/i2ptunnel/ \n"
+"(and in turn, would need to get your firewall to allow you local access, but \n"
 "not remote access, unless desired)."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:524
 msgid ""
-"So, to summarize, nothing needs to be reachable by unsolicited remote "
-"peers, but\n"
-"if you can configure your NAT/firewall to allow inbound UDP and TCP the "
-"<a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll"
-"\n"
-"get better performance.  You will also need to be able to send outbound "
-"UDP packets\n"
-"to arbitrary remote peers (blocking IPs randomly with something like "
-"PeerGuardian\n"
+"So, to summarize, nothing needs to be reachable by unsolicited remote peers, but\n"
+"if you can configure your NAT/firewall to allow inbound UDP and TCP the <a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll\n"
+"get better performance.  You will also need to be able to send outbound UDP packets\n"
+"to arbitrary remote peers (blocking IPs randomly with something like PeerGuardian\n"
 "only hurts you - don't do it)."
 msgstr ""
 
@@ -3736,22 +3394,16 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:540
 msgid ""
-"Human-readable addresses such as <i>http://website.i2p</i> are references"
-" to a long, random string known as a <b>destination</b>. \n"
-"    These references are registered and stored at address book services "
-"such as stats.i2p, which is run by zzz. \n"
-"    You will often encounter a \"b32\" address. A \"b32\" is a hash "
-"(specifically, a <a "
-"href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n"
-"    destination. This hash is appended with \".b32.i2p\" and serves as a "
-"convenient way to link to your hidden service, without requiring any "
-"registration on an address book service."
+"Human-readable addresses such as <i>http://website.i2p</i> are references to a long, random string known as a <b>destination</b>. \n"
+"    These references are registered and stored at address book services such as stats.i2p, which is run by zzz. \n"
+"    You will often encounter a \"b32\" address. A \"b32\" is a hash (specifically, a <a href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n"
+"    destination. This hash is appended with \".b32.i2p\" and serves as a convenient way to link to your hidden service, without requiring any registration on an address book service."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:544
 msgid ""
-"It is possible to add subscriptions to your router's configuration which "
-"may reduce the frequency of these messages."
+"It is possible to add subscriptions to your router's configuration which may"
+" reduce the frequency of these messages."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:545
@@ -3760,8 +3412,8 @@ msgstr "Ç’është pajtimi te një libër adresash?"
 
 #: i2p2www/pages/site/faq.html:546
 msgid ""
-"This is a list of files hosted on various I2P websites each of which "
-"contain a list of I2P hosts and their associated destinations."
+"This is a list of files hosted on various I2P websites each of which contain"
+" a list of I2P hosts and their associated destinations."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:547
@@ -3781,8 +3433,7 @@ msgstr "Mund të provoni sa vijon:"
 
 #: i2p2www/pages/site/faq.html:560
 msgid ""
-"For security purposes, the router's admin console by default only listens"
-" for connections on the local interface.  \n"
+"For security purposes, the router's admin console by default only listens for connections on the local interface.  \n"
 "\n"
 "There are two methods for accessing the console remotely:"
 msgstr ""
@@ -3803,17 +3454,14 @@ msgstr "Këto jepen hollësisht më poshtë:"
 
 #: i2p2www/pages/site/faq.html:573
 msgid ""
-"If you are running a Unix-like Operating System, this is the easiest "
-"method for remotely accessing your I2P console. \n"
-"      (Note: SSH server software is available for systems running "
-"Windows, for example <a "
-"href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)"
+"If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. \n"
+"      (Note: SSH server software is available for systems running Windows, for example <a href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:575
 msgid ""
-"Once you have configured SSH access to your system, the '-L' flag is "
-"passed to SSH with appropriate arguments - for example:"
+"Once you have configured SSH access to your system, the '-L' flag is passed "
+"to SSH with appropriate arguments - for example:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:593
@@ -3822,114 +3470,84 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:607
 msgid ""
-"Go to <a "
-"href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a>"
-" and add a console username and password if desired - \n"
-"        Adding a username &amp; password is highly recommended to secure "
-"your I2P console from tampering, which could lead to de-anonymization."
+"Go to <a href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a> and add a console username and password if desired - \n"
+"        Adding a username &amp; password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:609
 msgid ""
-"Go to <a "
-"href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and "
-"hit \"Graceful restart\", \n"
+"Go to <a href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and hit \"Graceful restart\", \n"
 "        which restarts the JVM and reloads the client applications"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:612
 msgid ""
-"After that fires up, you should now be able to reach your console "
-"remotely. \n"
-"      Load the router console at <code>http://(System_IP):7657</code> and"
-" you will be prompted for the username and password you specified in step"
-" 2 above if your browser supports the authentication popup."
+"After that fires up, you should now be able to reach your console remotely. \n"
+"      Load the router console at <code>http://(System_IP):7657</code> and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:615
 msgid ""
 "NOTE: You can specify 0.0.0.0 in the above configuration. \n"
 "      This specifies an interface, not a network or netmask. \n"
-"      0.0.0.0 means \"bind to all interfaces\", so it can be reachable on"
-" 127.0.0.1:7657 as well as any LAN/WAN IP. \n"
-"      Be careful when using this option as the console will be available "
-"on ALL addresses configured on your system."
+"      0.0.0.0 means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. \n"
+"      Be careful when using this option as the console will be available on ALL addresses configured on your system."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:624
 msgid ""
-"Please see the previous answer for instructions on using SSH Port "
-"Forwarding, and also see this page in your console: \n"
-"<a "
-"href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>"
+"Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: \n"
+"<a href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:632
 msgid ""
-"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are"
-" supported. \n"
-"I2P does not have a SOCKS outproxy so it is limited to use within I2P "
-"only."
+"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. \n"
+"I2P does not have a SOCKS outproxy so it is limited to use within I2P only."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:636
 msgid ""
-"Many applications leak sensitive information that could identify you on "
-"the Internet and this is a risk that one should be aware of when using "
-"the I2P SOCKS proxy. \n"
-"I2P only filters connection data, but if the program you intend to run "
-"sends this information as content, I2P has no way to protect your "
-"anonymity. \n"
-"For example, some mail applications will send the IP address of the "
-"machine they are running on to a mail server. \n"
-"There is no way for I2P to filter this, thus using I2P to 'socksify' "
-"existing applications is possible, but extremely dangerous."
+"Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. \n"
+"I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. \n"
+"For example, some mail applications will send the IP address of the machine they are running on to a mail server. \n"
+"There is no way for I2P to filter this, thus using I2P to 'socksify' existing applications is possible, but extremely dangerous."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:642
 #, python-format
 msgid ""
-"If you would like more information on the socks proxy application anyway,"
-"\n"
+"If you would like more information on the socks proxy application anyway,\n"
 "there are some helpful hints on the <a href=\"%(socks)s\">socks page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:650
 msgid ""
-"Unless an outproxy has been specifically set up for the service you want "
-"to connect to, this cannot be done. \n"
-"There are only three types of outproxies running right now: HTTP, HTTPS, "
-"and email. Note that there is no SOCKS outproxy. \n"
+"Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. \n"
+"There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. \n"
 "If this type of service is required, we recommend that you use Tor. \n"
 "\n"
-"Please be aware that the Tor project <a "
-"href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-"
-"idea\">recommends against using BitTorrent over Tor</a>, \n"
+"Please be aware that the Tor project <a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">recommends against using BitTorrent over Tor</a>, \n"
 "as there are serious anonymity-related issues associated with doing so."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:662
 msgid ""
-"Is my router an \"exit node\" to the regular Internet? I don't want it to"
-" be."
+"Is my router an \"exit node\" to the regular Internet? I don't want it to "
+"be."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:664
 #, python-format
 msgid ""
-"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit "
-"nodes\" - or \"outproxies\" as they are referred to on the I2P network -"
-" \n"
+"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit nodes\" - or \"outproxies\" as they are referred to on the I2P network - \n"
 "are not an inherent part of the network. \n"
-"Only volunteers who specifically set up and run separate applications "
-"will relay traffic to the regular Internet. \n"
+"Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. \n"
 "There are very, very few of these.\n"
 "\n"
-"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a "
-"single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n"
+"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n"
 "\n"
-"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our "
-"forums, if you would like to learn more about running an outproxy."
+"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our forums, if you would like to learn more about running an outproxy."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:679
@@ -3939,157 +3557,118 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:681
 msgid ""
 " It may be dangerous to use I2P in what the project calls \"Strict "
-"Countries\" where the law may not be clear on anonymizing software and "
-"where risks are judged to be fairly high. Most I2P peers are not in those"
-" strict countries and the ones that are, are placed in \"Hidden Mode\" "
-"where they interact with the rest of the network in more limited ways, so"
-" that they are less visible to network observers.\n"
+"Countries\" where the law may not be clear on anonymizing software and where"
+" risks are judged to be fairly high. Most I2P peers are not in those strict "
+"countries and the ones that are, are placed in \"Hidden Mode\" where they "
+"interact with the rest of the network in more limited ways, so that they are"
+" less visible to network observers.\n"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:687
 msgid ""
-"Yes, and this is how a fully distributed peer-to-peer network works. "
-"Every node participates in routing packets for others, so your IP address"
-" must be known to establish connections."
+"Yes, and this is how a fully distributed peer-to-peer network works. Every "
+"node participates in routing packets for others, so your IP address must be "
+"known to establish connections."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:691
 msgid ""
-"While the fact that your computer runs I2P is public, nobody can see your"
-" activities in it. You can't say if a user behind this IP address is "
-"sharing files, hosting a website, doing research or just running a node "
-"to contribute bandwidth to the project."
+"While the fact that your computer runs I2P is public, nobody can see your "
+"activities in it. You can't say if a user behind this IP address is sharing "
+"files, hosting a website, doing research or just running a node to "
+"contribute bandwidth to the project."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:696
 msgid ""
-"It can be deduced that somebody is using the I2P network with some "
-"reliability, but it is a little difficult to know for sure.\n"
-"The most reliable way to know for sure would be to have a computer with a"
-" fairly stable IP address that you suspect is an I2P user, and a\n"
-"bunch of computers you control on different networks all running I2P. "
-"When one of them connects to your suspected computer, you will be able\n"
-"to see their I2P router in the netDB. This might take time, and it might "
-"never happen. You could also try blocking all obfuscated traffic\n"
-"on a particular network until you're sure every I2P router on that "
-"network has lost all of it's peers. At that point, they'll reach out\n"
-"to reseed servers to get more peers, which a network administrator can "
-"probably observe."
+"It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.\n"
+"The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a\n"
+"bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able\n"
+"to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic\n"
+"on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out\n"
+"to reseed servers to get more peers, which a network administrator can probably observe."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:706
 msgid ""
-"I2P does not encrypt the Internet, neither does Tor - for example, "
-"through <a "
-"href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport"
-" Layer Security (TLS)</a>. \n"
-"I2P and Tor both aim to transport your traffic as-is securely and "
-"anonymously over the corresponding network, to its destination. \n"
-"Any unencrypted traffic generated at your system will arrive at the "
-"outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n"
-"This means that you are vulnerable to snooping by the outproxy operators."
-" \n"
-"One way to protect your outproxy traffic against this is to ensure that "
-"any traffic that will be handled by the outproxy is encrypted with TLS."
+"I2P does not encrypt the Internet, neither does Tor - for example, through <a href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport Layer Security (TLS)</a>. \n"
+"I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. \n"
+"Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n"
+"This means that you are vulnerable to snooping by the outproxy operators. \n"
+"One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:714
 msgid ""
-"For more information, you may read the Tor FAQ's answer to this question:"
-"\n"
-"<a "
-"href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>"
+"For more information, you may read the Tor FAQ's answer to this question:\n"
+"<a href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:719
 #, python-format
 msgid ""
-"In addition, you may be vulnerable to collusion between the outproxy "
-"operator\n"
-"and operators of other I2P services, if you use the same tunnels "
-"(\"shared clients\").\n"
-"There is additional discussion about this on <a "
-"href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n"
-"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our "
-"forums</a> as well."
+"In addition, you may be vulnerable to collusion between the outproxy operator\n"
+"and operators of other I2P services, if you use the same tunnels (\"shared clients\").\n"
+"There is additional discussion about this on <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n"
+"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our forums</a> as well."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:726
 #, python-format
 msgid ""
 "\n"
-"Ultimately, this is a question that only you can answer because the "
-"correct answer depends on your browsing behaviour, \n"
-"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you "
-"choose to trust the outproxy operator."
+"Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, \n"
+"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you choose to trust the outproxy operator."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:734
 msgid ""
-"Reducing anonymity is typically done by A) identifying characteristics "
-"that are consistent across anonymous identities or\n"
-"B) identifying ephemeral characteristics of repeated connections. We say "
-"\"reducing\" anonymity because many of these characteristics\n"
-"are shared by many of our users, making these anonymity \"sets,\" the "
-"smaller the anonymity set and the more small sets you belong to,\n"
+"Reducing anonymity is typically done by A) identifying characteristics that are consistent across anonymous identities or\n"
+"B) identifying ephemeral characteristics of repeated connections. We say \"reducing\" anonymity because many of these characteristics\n"
+"are shared by many of our users, making these anonymity \"sets,\" the smaller the anonymity set and the more small sets you belong to,\n"
 "the more brittle your anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:741
 msgid ""
-"Attacks on I2P in the past have relied on correlating NetDB storage and "
-"verification, by randomizing \n"
-"the delay between storage and verification, we reduce the consistency "
-"with which that verification can be linked to I2P activity,\n"
+"Attacks on I2P in the past have relied on correlating NetDB storage and verification, by randomizing \n"
+"the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity,\n"
 "thereby limiting the utility of that data point."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:746
 msgid ""
-"Attacks on software configured to work with I2P are out of scope for I2P "
-"to solve. When browsing I2P or hosting\n"
-"I2P services, it's is the responsibility of the user to consider their "
-"threat model. Browsers are particularly problematic\n"
-"due to fingerprinting attacks, and the wide variety of information that "
-"can be gleaned from them. Using a standardized browsing\n"
+"Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P or hosting\n"
+"I2P services, it's is the responsibility of the user to consider their threat model. Browsers are particularly problematic\n"
+"due to fingerprinting attacks, and the wide variety of information that can be gleaned from them. Using a standardized browsing\n"
 "profile is thought to help mitigate the impact of fingerprinting."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:757
 msgid ""
-"New installations of I2P carry out the reseeding process automatically, "
-"as well as when the number of known peers falls to a drastically low "
-"value. \n"
-"If you need to carry out a reseed of your router, please see the <a "
-"href=\"#manual_reseed\">reseed instructions</a>."
+"New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. \n"
+"If you need to carry out a reseed of your router, please see the <a href=\"#manual_reseed\">reseed instructions</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:765
 msgid ""
-"An I2P router only needs to be seeded once, to join the network for the "
-"first\n"
-"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled "
-"into a\n"
+"An I2P router only needs to be seeded once, to join the network for the first\n"
+"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled into a\n"
 "signed zip-file) from at least two predefined server URLs picked from a\n"
 "volunteer-run group of non-private internet HTTPS servers."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:772
 msgid ""
-"A typical symptom of a failed reseed is the \"Known\" indicator (on the "
-"left\n"
-"sidebar of the router console) displaying a very small value (often less "
-"than\n"
-"5) which does not increase. This can occur, among other things, if your "
-"local\n"
-"firewall limits outbound traffic or if the reseed request is blocked "
-"entirely."
+"A typical symptom of a failed reseed is the \"Known\" indicator (on the left\n"
+"sidebar of the router console) displaying a very small value (often less than\n"
+"5) which does not increase. This can occur, among other things, if your local\n"
+"firewall limits outbound traffic or if the reseed request is blocked entirely."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:779
 msgid ""
-"If you are stuck behind an ISP firewall or filter, you can use the "
-"following\n"
+"If you are stuck behind an ISP firewall or filter, you can use the following\n"
 "manual method (non-automated technical solution) to join the I2P network."
 msgstr ""
 
@@ -4097,10 +3676,8 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"As of release 0.9.33, you may also configure your router to reseed "
-"through a proxy.\n"
-"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, "
-"hostname, and port."
+"As of release 0.9.33, you may also configure your router to reseed through a proxy.\n"
+"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, hostname, and port."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:789
@@ -4109,18 +3686,12 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:790
 msgid ""
-"Please contact a known trustworthy friend who has a running I2P router, "
-"and ask\n"
-"them for help with reseeding your I2P router. Request that they send you "
-"a\n"
-"reseed file exported from their running I2P router. It is vital that the "
-"file is\n"
-"exchanged over a secure channel, e.g. encrypted to avoid external "
-"tampering (PGP\n"
-"Sign, Encrypt and Verified with a trusted public key). The file itself is"
-"\n"
-"unsigned, so please accept files only from known trusted friends. Never "
-"import\n"
+"Please contact a known trustworthy friend who has a running I2P router, and ask\n"
+"them for help with reseeding your I2P router. Request that they send you a\n"
+"reseed file exported from their running I2P router. It is vital that the file is\n"
+"exchanged over a secure channel, e.g. encrypted to avoid external tampering (PGP\n"
+"Sign, Encrypt and Verified with a trusted public key). The file itself is\n"
+"unsigned, so please accept files only from known trusted friends. Never import\n"
 "a reseed file if you can not verify its source."
 msgstr ""
 
@@ -4158,8 +3729,8 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:812
 msgid ""
-"For trusted friends you can use your local I2P router to give them a jump"
-" start:"
+"For trusted friends you can use your local I2P router to give them a jump "
+"start:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:815
@@ -4174,12 +3745,9 @@ msgstr ""
 #: i2p2www/pages/site/faq.html:818
 msgid ""
 "Do not reveal this file in any case to unknown users, since it contains\n"
-"sensitive private data (100 RouterInfo) from your own I2P router! In "
-"order to\n"
-"protect your anonymity: you may wait a few random hours/days before you "
-"share\n"
-"the file with your trusted friend. It is also advisable to use this "
-"procedure\n"
+"sensitive private data (100 RouterInfo) from your own I2P router! In order to\n"
+"protect your anonymity: you may wait a few random hours/days before you share\n"
+"the file with your trusted friend. It is also advisable to use this procedure\n"
 "sparingly (< 2 per week)."
 msgstr ""
 
@@ -4189,12 +3757,13 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:828
 msgid ""
-"Do not publicly publish the reseed file or share these files with a "
-"friend of a friend!"
+"Do not publicly publish the reseed file or share these files with a friend "
+"of a friend!"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:829
-msgid "This file should be used only for a very limited number of friends (< 3)!"
+msgid ""
+"This file should be used only for a very limited number of friends (< 3)!"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:830
@@ -4203,52 +3772,33 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:839
 msgid ""
-"I2P is primarily not intended, nor designed, to be used as a proxy to the"
-" regular internet. \n"
-"With that said, there are services which are provided by volunteers that "
-"act as proxies to non-private internet based content - these are referred"
-" to as \"outproxies\" on the I2P network. \n"
-"There is an outproxy configured by default in I2P's HTTP client tunnel - "
-"false.i2p. \n"
-"While this service does currently exist, there is no guarantee that it "
-"will always be there as it is not an official service provided by the I2P"
-" project. \n"
-"If your main requirement from an anonymous network is the ability to "
-"access non-private internet resources, we would recommend using <a "
-"href=\"https://www.torproject.org/\">Tor</a>."
+"I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. \n"
+"With that said, there are services which are provided by volunteers that act as proxies to non-private internet based content - these are referred to as \"outproxies\" on the I2P network. \n"
+"There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. \n"
+"While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. \n"
+"If your main requirement from an anonymous network is the ability to access non-private internet resources, we would recommend using <a href=\"https://www.torproject.org/\">Tor</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:852
 msgid ""
 "Within I2P, there is no requirement to use HTTPS. \n"
-"    All traffic is encrypted end-to-end, any further encryption, e.g. "
-"with the use of HTTPS, doesn't create any further anonymity-related "
-"benefits.\n"
+"    All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n"
 "\n"
-"    However, if one would like to use HTTPS or has a requirement to do "
-"so, the existing default I2P HTTP Proxy has support for HTTPS traffic."
-"  \n"
-"    Any hidden service operator would have to specifically set up and "
-"enable HTTPS access."
+"    However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic.  \n"
+"    Any hidden service operator would have to specifically set up and enable HTTPS access."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:861
 msgid ""
 "FTP is not supported for technical reasons.\n"
 "\n"
-"    There are no FTP \"outproxies\" to the Internet—it may not even be "
-"possible to set up one. \n"
-"    Any other kind of outproxy may work if it's set up with a standard "
-"tunnel. \n"
-"    If you would like to set up some type of outproxy, carefully research"
-" the potential risks. \n"
-"    The I2P community may or may not be able to help with the technical "
-"aspects, feel free to ask.\n"
+"    There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one. \n"
+"    Any other kind of outproxy may work if it's set up with a standard tunnel. \n"
+"    If you would like to set up some type of outproxy, carefully research the potential risks. \n"
+"    The I2P community may or may not be able to help with the technical aspects, feel free to ask.\n"
 "\n"
-"    As explained several times above, any existing outproxy isn't a core "
-"part of the network. \n"
-"    They are services run by individuals and they may or may not be "
-"operational at any given time."
+"    As explained several times above, any existing outproxy isn't a core part of the network. \n"
+"    They are services run by individuals and they may or may not be operational at any given time."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:876
@@ -4265,10 +3815,8 @@ msgstr "Java Runtime Environment"
 
 #: i2p2www/pages/site/faq.html:883
 msgid ""
-"Try to use either OpenJDK or Sun/Oracle Java if it's available for your "
-"system. \n"
-"You can check which version of java you have installed by typing "
-"<code>java -version</code> at a command/shell prompt. \n"
+"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. \n"
+"You can check which version of java you have installed by typing <code>java -version</code> at a command/shell prompt. \n"
 "Performance tends to suffer with other implementations of java."
 msgstr ""
 
@@ -4278,8 +3826,7 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:889
 msgid ""
-"Are you running a BitTorrent client over I2P? Try reducing the number of "
-"torrents, the bandwidth limits,\n"
+"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n"
 "or try turning it off completely to see if that helps."
 msgstr ""
 
@@ -4289,10 +3836,8 @@ msgstr "Rregullime Gjerësie të madhe Bande"
 
 #: i2p2www/pages/site/faq.html:896
 msgid ""
-"Are your bandwidth limits set too high? It is possible that too much "
-"traffic is going through your I2P router and it is overloaded. \n"
-"Try reducing the setting for <em>share bandwidth percentage</em> on the "
-"<a href=\"http://localhost:7657/config\">configuration</a> page."
+"Are your bandwidth limits set too high? It is possible that too much traffic is going through your I2P router and it is overloaded. \n"
+"Try reducing the setting for <em>share bandwidth percentage</em> on the <a href=\"http://localhost:7657/config\">configuration</a> page."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:901
@@ -4301,8 +3846,8 @@ msgstr "Version I2P-e"
 
 #: i2p2www/pages/site/faq.html:902
 msgid ""
-"Make sure that you're running the latest version of I2P to get the "
-"benefits of increased performance and bug fixes."
+"Make sure that you're running the latest version of I2P to get the benefits "
+"of increased performance and bug fixes."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:907
@@ -4311,12 +3856,9 @@ msgstr "Shpërndarje kujtese"
 
 #: i2p2www/pages/site/faq.html:908
 msgid ""
-"Has enough memory been set aside for use by I2P? Look at the memory graph"
-" on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n"
-"to see if the memory usage is \"pegged\"&mdash;the JVM is spending most "
-"of its time in garbage collection. \n"
-"Increase the setting <code>wrapper.java.maxmemory</code> in the file "
-"<code>wrapper.config</code>."
+"Has enough memory been set aside for use by I2P? Look at the memory graph on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n"
+"to see if the memory usage is \"pegged\"&mdash;the JVM is spending most of its time in garbage collection. \n"
+"Increase the setting <code>wrapper.java.maxmemory</code> in the file <code>wrapper.config</code>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:915
@@ -4326,8 +3868,7 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:916
 msgid ""
-"Is the CPU usage simply higher than you would like, or is it pegged at "
-"100&#37; for a long time?\n"
+"Is the CPU usage simply higher than you would like, or is it pegged at 100&#37; for a long time?\n"
 "If it is pegged, this could be a bug. Look in the logs for clues."
 msgstr ""
 
@@ -4338,11 +3879,8 @@ msgstr "Të lidhura me Java-n"
 #: i2p2www/pages/site/faq.html:923
 #, python-format
 msgid ""
-"You may be using the Java-based BigInteger library instead of the native "
-"version, especially if you are running on a new or unusual OS or hardware"
-" (OpenSolaris, mipsel, etc.).\n"
-"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on "
-"diagnosing, building, and testing methods."
+"You may be using the Java-based BigInteger library instead of the native version, especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n"
+"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on diagnosing, building, and testing methods."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:929
@@ -4351,154 +3889,107 @@ msgstr "Tunele pjesëmarrjeje"
 
 #: i2p2www/pages/site/faq.html:930
 msgid ""
-"If your native jbigi library is working fine, the biggest user of CPU may"
-" be routing traffic for participating tunnels. \n"
-"This uses CPU because at each hop a layer of encryption must be decoded. "
-"You can limit participating traffic in two ways -\n"
-"by reducing the share bandwidth on the <a "
-"href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n"
-"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a "
-"href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> "
-"page."
+"If your native jbigi library is working fine, the biggest user of CPU may be routing traffic for participating tunnels. \n"
+"This uses CPU because at each hop a layer of encryption must be decoded. You can limit participating traffic in two ways -\n"
+"by reducing the share bandwidth on the <a href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n"
+"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> page."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:942
 msgid ""
 "If your router has 10 or more active peers, everything is fine. \n"
 "The router should maintain connections to a few peers at all times. \n"
-"The best way to stay \"better-connected\" to the network is to share more"
-" bandwidth. \n"
-"The amount of bandwidth that is shared by the router can be changed on "
-"the configuration page: \n"
-"  <a "
-"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>"
+"The best way to stay \"better-connected\" to the network is to share more bandwidth. \n"
+"The amount of bandwidth that is shared by the router can be changed on the configuration page: \n"
+"  <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:953
 msgid ""
 "No, there isn't anything wrong. \n"
 "This is normal behavior. \n"
-"All routers adjust dynamically to changing network conditions and "
-"demands. \n"
-"Routers come online and go offline depending on whether the system it is "
-"installed on is operational or not, as well as whether there is an "
-"available network connection. \n"
+"All routers adjust dynamically to changing network conditions and demands. \n"
+"Routers come online and go offline depending on whether the system it is installed on is operational or not, as well as whether there is an available network connection. \n"
 "Your router is constantly updating its local Network Database. \n"
-"Tunnels which your router is participating in expire every 10 minutes and"
-" may or may not be rebuilt through your router."
+"Tunnels which your router is participating in expire every 10 minutes and may or may not be rebuilt through your router."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:965
 msgid ""
-"The encryption and routing within the I2P network adds a substantial "
-"amount of overhead and limits bandwidth. \n"
+"The encryption and routing within the I2P network adds a substantial amount of overhead and limits bandwidth. \n"
 "\n"
 "We can try to clarify this with the aid of a diagram:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:973
 msgid ""
-"In this diagram, the path that some I2P traffic takes as it travels "
-"through the network is traced. \n"
-"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden "
-"Service (for example, the http://stats.i2p website) is labelled as 'B'."
-" \n"
-"Both the client and the server are using 3-hop tunnels, these hops are "
-"represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', "
-"'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'."
+"In this diagram, the path that some I2P traffic takes as it travels through the network is traced. \n"
+"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden Service (for example, the http://stats.i2p website) is labelled as 'B'. \n"
+"Both the client and the server are using 3-hop tunnels, these hops are represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', 'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:979
 msgid ""
-"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A "
-"while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel"
-" for 'B'. \n"
-"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound "
-"tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent "
-"an inbound tunnel for 'A'. \n"
+"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel for 'B'. \n"
+"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. \n"
 "The arrows in between the boxes show the direction of traffic. \n"
-"The text above and below the arrows detail some example bandwidth between"
-" a pair of hops as well as example latencies."
+"The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:986
 msgid ""
-"When both client and server are using 3-hop tunnels throughout, a total "
-"of 12 other I2P routers are involved in relaying traffic. \n"
-"6 peers relay traffic from the client to the server which is split into a"
-" 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound "
-"tunnel to 'B' ('X', 'Y', 'Z').  \n"
+"When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. \n"
+"6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z').  \n"
 "Similarly, 6 peers relay traffic from the server to back to the client."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:992
 msgid ""
-"First, we can consider latency - the time that it takes for a request "
-"from a client to traverse the I2P network, reach the the server and "
-"traverse back to the client. \n"
+"First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. \n"
 "Adding up all latencies we see that:"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1006
 msgid ""
-"The total round-trip time in our example adds up to 740 ms - certainly "
-"much higher than what one would normally see while browsing regular "
-"internet websites."
+"The total round-trip time in our example adds up to 740 ms - certainly much "
+"higher than what one would normally see while browsing regular internet "
+"websites."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1010
 msgid ""
 "Second, we can consider available bandwidth. \n"
-"This is determined through the slowest link between hops from the client "
-"and server as well as when traffic is being transmitted by the server to "
-"the client. \n"
-"For traffic going from the client to the server, we see that the "
-"available bandwidth in our example between hops 'R' &amp; 'X' as well as "
-"hops 'X' &amp; 'Y' is 32 KB/s. \n"
-"Despite higher available bandwidth between the other hops, these hops "
-"will act as a bottleneck and will limit the maximum available bandwidth "
-"for traffic from 'A' to 'B' at 32 KB/s. \n"
-"Similarly, tracing the path from server to client shows that there is "
-"maximum bandwidth of 64 KB/s - between hops 'Z_1' &amp; 'Y_1, 'Y_1' &amp;"
-" 'X_1' and 'Q_1' &amp; 'P_1'."
+"This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. \n"
+"For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' &amp; 'X' as well as hops 'X' &amp; 'Y' is 32 KB/s. \n"
+"Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. \n"
+"Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' &amp; 'Y_1, 'Y_1' &amp; 'X_1' and 'Q_1' &amp; 'P_1'."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1018
 msgid ""
 "We recommend increasing your bandwidth limits. \n"
-"This helps the network by increasing the amount of available bandwidth "
-"which will in turn improve your I2P experience. \n"
-"Bandwidth settings are located on the <a "
-"href=\"http://localhost:7657/config\">http://localhost:7657/config</a> "
-"page. \n"
-"Please be aware of your internet connection's limits as determined by "
-"your ISP, and adjust your settings accordingly."
+"This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. \n"
+"Bandwidth settings are located on the <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a> page. \n"
+"Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1025
 msgid ""
-"We also recommend setting a sufficient amount of shared bandwidth - this "
-"allows for participating tunnels to be routed through your I2P router. \n"
-"Allowing participating traffic keeps your router well-integrated in the "
-"network and improves your transfer speeds."
+"We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. \n"
+"Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1030
 #, python-format
 msgid ""
-"I2P is a work in progress. Lots of improvements and fixes are being "
-"implemented, and, generally speaking, running the latest release will "
-"help your performance.\n"
-"If you haven't, <a href=\"%(downloadslist)s\">install the latest "
-"release</a>."
+"I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance.\n"
+"If you haven't, <a href=\"%(downloadslist)s\">install the latest release</a>."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1038
 msgid ""
-"You may report any bugs/issues that you encounter on our bugtracker, "
-"which is available over both non-private internet and I2P. \n"
-"We have a discussion forum, also available on I2P and non-private "
-"internet. You can join our IRC channel as well: \n"
+"You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. \n"
+"We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: \n"
 "either through our IRC network, IRC2P, or on Freenode."
 msgstr ""
 
@@ -4520,14 +4011,10 @@ msgstr "Forumet tona:"
 
 #: i2p2www/pages/site/faq.html:1050
 msgid ""
-"You may paste any interesting logs to a paste service such as the non-"
-"private internet services listed on the \n"
-"  <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-"
-"Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n"
-"  <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this"
-" \n"
-"  <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and"
-" follow up on IRC in #i2p<"
+"You may paste any interesting logs to a paste service such as the non-private internet services listed on the \n"
+"  <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n"
+"  <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this \n"
+"  <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and follow up on IRC in #i2p<"
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1054
@@ -4536,13 +4023,10 @@ msgstr ""
 
 #: i2p2www/pages/site/faq.html:1058
 msgid ""
-"Please include relevant information from the router logs page which is "
-"available at: \n"
+"Please include relevant information from the router logs page which is available at: \n"
 "<a href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>.\n"
-"We request that you share all of the text under the 'I2P Version and "
-"Running Environment' \n"
-"section as well as any errors or warnings displayed in the various logs "
-"displayed on the page."
+"We request that you share all of the text under the 'I2P Version and Running Environment' \n"
+"section as well as any errors or warnings displayed in the various logs displayed on the page."
 msgstr ""
 
 #: i2p2www/pages/site/faq.html:1070
@@ -4553,8 +4037,7 @@ msgid ""
 "  <li>on <code>irc.freenode.net</code> channel <code>#i2p</code></li>\n"
 "  <li>on <code>IRC2P</code> channel <code>#i2p</code></li>\n"
 "</ul>\n"
-"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it "
-"here (with the answer, hopefully)."
+"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it here (with the answer, hopefully)."
 msgstr ""
 
 #: i2p2www/pages/site/impressum.html:4
@@ -4568,8 +4051,8 @@ msgstr "Rrjeti Anonim I2P"
 #: i2p2www/pages/site/index.html:4
 msgid ""
 "Anonymous peer-to-peer distributed communication layer built with open "
-"source tools and designed to run any traditional Internet service such as"
-" email, IRC or web hosting."
+"source tools and designed to run any traditional Internet service such as "
+"email, IRC or web hosting."
 msgstr ""
 
 #: i2p2www/pages/site/index.html:8
@@ -4578,8 +4061,7 @@ msgstr "Mirë se vini te Interneti i Padukshëm"
 
 #: i2p2www/pages/site/index.html:9
 msgid ""
-"The Invisible Internet is a privacy by design, people-powered network. It"
-" is a truly free and anonymizing Internet alternative. Get I2P.\n"
+"The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P.\n"
 "  "
 msgstr ""
 
@@ -4595,14 +4077,10 @@ msgstr "Ç’është I2P-ja?"
 #: i2p2www/pages/site/index.html:17
 msgid ""
 "\n"
-"        The Invisible Internet Project (I2P) is a fully encrypted private"
-" network layer.\n"
-"        It protects your activity and location. Every day people use the "
-"network to connect\n"
-"        with people without worry of being tracked or their data being "
-"collected. In some\n"
-"        cases people rely on the network when they need to be discrete or"
-" are doing sensitive work."
+"        The Invisible Internet Project (I2P) is a fully encrypted private network layer.\n"
+"        It protects your activity and location. Every day people use the network to connect\n"
+"        with people without worry of being tracked or their data being collected. In some\n"
+"        cases people rely on the network when they need to be discrete or are doing sensitive work."
 msgstr ""
 
 #: i2p2www/pages/site/index.html:23
@@ -4612,13 +4090,13 @@ msgstr "I2P-ja Kujdeset Për Privatësinë"
 #: i2p2www/pages/site/index.html:25
 msgid ""
 "I2P hides the server from the user and the user from the server. All I2P "
-"traffic is internal to the I2P network. Traffic inside I2P does not "
-"interact with the Internet directly. It is a layer on top of the "
-"Internet. It uses encrypted unidirectional tunnels between you and your "
-"peers. No one can see where traffic is coming from, where it is going, or"
-" what the contents are. Additionally I2P offers resistance to pattern "
-"recognition and blocking by censors. Because the network relies on peers "
-"to route traffic, location blocking is also reduced."
+"traffic is internal to the I2P network. Traffic inside I2P does not interact"
+" with the Internet directly. It is a layer on top of the Internet. It uses "
+"encrypted unidirectional tunnels between you and your peers. No one can see "
+"where traffic is coming from, where it is going, or what the contents are. "
+"Additionally I2P offers resistance to pattern recognition and blocking by "
+"censors. Because the network relies on peers to route traffic, location "
+"blocking is also reduced."
 msgstr ""
 
 #: i2p2www/pages/site/index.html:27
@@ -4632,8 +4110,8 @@ msgstr ""
 #: i2p2www/pages/site/index.html:33
 msgid ""
 "The network is people powered . Peers make a portion of their resources, "
-"particularly bandwidth, available to other network participants. This "
-"allows the network to function without relying on centralized servers."
+"particularly bandwidth, available to other network participants. This allows"
+" the network to function without relying on centralized servers."
 msgstr ""
 
 #: i2p2www/pages/site/index.html:33
@@ -4682,12 +4160,8 @@ msgstr "Lidhje & Burime të Këshilluara"
 #, python-format
 msgid ""
 "See also the page with\n"
-"<a href=\"%(media)s\">links to presentations, videos, and tutorials about"
-" I2P</a>."
-msgstr ""
-"Shihni edhe faqen me\n"
-"<a href=\"%(media)s\">lidhje për te paraqitje, video, dhe përkujdesore "
-"mbi I2P-në</a>."
+"<a href=\"%(media)s\">links to presentations, videos, and tutorials about I2P</a>."
+msgstr "Shihni edhe faqen me\n<a href=\"%(media)s\">lidhje për te paraqitje, video, dhe përkujdesore mbi I2P-në</a>."
 
 #: i2p2www/pages/site/links.html:12
 msgid "I2P on the web"
@@ -4712,4 +4186,3 @@ msgstr "Borde, sajt lajmesh, të tjera"
 #: i2p2www/pages/site/links.html:51
 msgid "Very Old Stuff"
 msgstr "Gjëra Shumë të Vjetra"
-
diff --git a/i2p2www/translations/sv/LC_MESSAGES/research.po b/i2p2www/translations/sv/LC_MESSAGES/research.po
index 8b695ce60148852fc0538e5a93841c3e1580c27f..b84ef114aa1c6f3536928b032568ec9e023d5bcc 100644
--- a/i2p2www/translations/sv/LC_MESSAGES/research.po
+++ b/i2p2www/translations/sv/LC_MESSAGES/research.po
@@ -1,7 +1,7 @@
-# Swedish translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Anders Nilsson <anders@devode.se>, 2015
 # cacapo <handelsehorisont@gmail.com>, 2015
@@ -12,18 +12,18 @@
 # Martin Svensson <digitalmannen@gmail.com>, 2014
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-11-29 20:19+0000\n"
-"Last-Translator: Jonatan Nyberg <jonatan@autistici.org>\n"
-"Language-Team: Swedish (Sweden) "
-"(http://www.transifex.com/otf/I2P/language/sv_SE/)\n"
-"Plural-Forms: nplurals=2; plural=(n != 1)\n"
+"PO-Revision-Date: 2013-07-15 12:01+0000\n"
+"Last-Translator: Jonatan Nyberg <jonatan@autistici.org>, 2016-2017,2021\n"
+"Language-Team: Swedish (Sweden) (http://www.transifex.com/otf/I2P/language/sv_SE/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: sv_SE\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #: i2p2www/pages/site/research/index.html:2
 msgid "Academic Research"
@@ -44,16 +44,11 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:10
 msgid ""
-"I2P is a very unique project that unfortunately has not received the "
-"wider\n"
-"academic attention it deserves. To date, most research focus on anonymous"
-" and\n"
-"onion-routing technology has been around Tor, and while those papers "
-"benefit us\n"
-"as well, there is a great need for I2P-focused research. This plays a key"
-" role\n"
-"in both maintaining the security and integrity of the network, as well as"
-"\n"
+"I2P is a very unique project that unfortunately has not received the wider\n"
+"academic attention it deserves. To date, most research focus on anonymous and\n"
+"onion-routing technology has been around Tor, and while those papers benefit us\n"
+"as well, there is a great need for I2P-focused research. This plays a key role\n"
+"in both maintaining the security and integrity of the network, as well as\n"
 "opening doors for more impactful future development."
 msgstr ""
 
@@ -61,44 +56,27 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"There is a large research community investigating a wide range of aspects"
-" of\n"
-"anonymity. For a current and comprehensive list of relevant papers, see "
-"the\n"
+"There is a large research community investigating a wide range of aspects of\n"
+"anonymity. For a current and comprehensive list of relevant papers, see the\n"
 "<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
-"I2P benefits from much of the research into Tor and onion routing, but "
-"there is\n"
-"little dedicated research interest into the theory behind I2P, and the "
-"choices\n"
-"and tradeoffs that the network makes. This presents a unique opportunity "
-"for\n"
+"I2P benefits from much of the research into Tor and onion routing, but there is\n"
+"little dedicated research interest into the theory behind I2P, and the choices\n"
+"and tradeoffs that the network makes. This presents a unique opportunity for\n"
 "original research.\n"
-msgstr ""
-"\n"
-"Det finns en stor forskargrupp som undersöker en mängd aspekter av\n"
-"anonymitet. För en aktuell och omfattande lista av relevanta "
-"publikationer, se \n"
-"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
-"I2P drar nytta av mycket av forskingen kring Tor och onion routing, men "
-"det finns\n"
-"ringa riktat intresse mot teorin bakom I2P, och dom val och nackdelar "
-"nätverket ger. Detta ger en unik möjlighet till ny forskning. \n"
+msgstr "\nDet finns en stor forskargrupp som undersöker en mängd aspekter av\nanonymitet. För en aktuell och omfattande lista av relevanta publikationer, se \n<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\nI2P drar nytta av mycket av forskingen kring Tor och onion routing, men det finns\nringa riktat intresse mot teorin bakom I2P, och dom val och nackdelar nätverket ger. Detta ger en unik möjlighet till ny forskning. \n"
 
 #: i2p2www/pages/site/research/index.html:29
 #, python-format
 msgid ""
 "A list of known published papers about I2P is available <a "
 "href=\"%(papers)s\">here</a>."
-msgstr ""
-"En lista av tidigare kända artiklar om I2P finns tillgänglig <a "
-"href=\"%(papers)s\">här</a>."
+msgstr "En lista av tidigare kända artiklar om I2P finns tillgänglig <a href=\"%(papers)s\">här</a>."
 
 #: i2p2www/pages/site/research/index.html:34
 msgid ""
 "\n"
 "This page aims to outline the most needed fields of research, notes to\n"
-"potential researchers, our general safety guidelines as well as an "
-"expanding\n"
+"potential researchers, our general safety guidelines as well as an expanding\n"
 "list of open questions that you can begin on at any time.\n"
 msgstr ""
 
@@ -112,16 +90,12 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:44
 msgid ""
-"While all research on the I2P network is beneficial and appreciated, "
-"there are\n"
+"While all research on the I2P network is beneficial and appreciated, there are\n"
 "certain areas which are more in need than others - most so in defensive\n"
 "research. Most people enjoy coming up with fun ways to launch offensives\n"
-"against anonymous software, and this is further reinforced by the "
-"incentives in\n"
-"academic institutions. While we know it is often not the first choice for"
-"\n"
-"researchers, We would certainly appreciate any and all work towards ways "
-"to\n"
+"against anonymous software, and this is further reinforced by the incentives in\n"
+"academic institutions. While we know it is often not the first choice for\n"
+"researchers, We would certainly appreciate any and all work towards ways to\n"
 "fortify the network!"
 msgstr ""
 
@@ -132,27 +106,17 @@ msgstr ""
 #: i2p2www/pages/site/research/index.html:56
 #, python-format
 msgid ""
-"If you've decided on a research topic that aims to hands-on investigate "
-"the I2P\n"
-"network or solve a problem of large proportions we ask you to "
-"<b>please</b> \n"
-"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
-"team, the\n"
-"sooner the better. I2P is under constant development and a significant "
-"amount\n"
-"of roadmapping occurs, therefore your problem may have already been "
-"identified\n"
-"and flagged for update or patch. In the unlikely event you are conducting"
-"\n"
-"testing that overlaps with / would be of interest to another research "
-"project\n"
-"already in motion, we are also able to make you aware of this (with their"
-"\n"
-"permission, of course), and possibly open the door for collaboration. "
-"There is\n"
+"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
+"network or solve a problem of large proportions we ask you to <b>please</b> \n"
+"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
+"sooner the better. I2P is under constant development and a significant amount\n"
+"of roadmapping occurs, therefore your problem may have already been identified\n"
+"and flagged for update or patch. In the unlikely event you are conducting\n"
+"testing that overlaps with / would be of interest to another research project\n"
+"already in motion, we are also able to make you aware of this (with their\n"
+"permission, of course), and possibly open the door for collaboration. There is\n"
 "also a chance that the test itself may significantly harm the network or\n"
-"regular users, and the team may have ideas or suggestions to mitigate "
-"that risk\n"
+"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
 "and increase the safety of your testing."
 msgstr ""
 
@@ -168,13 +132,11 @@ msgstr ""
 msgid ""
 "<ol>\n"
 "  <li>\n"
-"    Consider the benefits and risks - is there any doubt that the "
-"research\n"
+"    Consider the benefits and risks - is there any doubt that the research\n"
 "    provides more value than danger?\n"
 "  </li>\n"
 "  <li>\n"
-"    If the research can be done on a test network then that is the "
-"preferred\n"
+"    If the research can be done on a test network then that is the preferred\n"
 "    method\n"
 "  </li>\n"
 "  <li>\n"
@@ -182,10 +144,8 @@ msgid ""
 "    collecting data about yourself\n"
 "  </li>\n"
 "  <li>\n"
-"    If you need 'bigger data', It is recommended to first see if you can "
-"use\n"
-"    data sets from previous experiments or other third party resources is"
-"\n"
+"    If you need 'bigger data', It is recommended to first see if you can use\n"
+"    data sets from previous experiments or other third party resources is\n"
 "    recommended\n"
 "  </li>\n"
 "  <li>\n"
@@ -193,10 +153,8 @@ msgid ""
 "    publication and collect as little as possible\n"
 "  </li>\n"
 "  <li>\n"
-"    After testing and before publish, review that all data which is to be"
-"\n"
-"    published publicly is <b><i>not</i></b> intended to be private by the"
-"\n"
+"    After testing and before publish, review that all data which is to be\n"
+"    published publicly is <b><i>not</i></b> intended to be private by the\n"
 "    originator\n"
 "  </li>\n"
 "</ol>"
@@ -208,32 +166,24 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:108
 msgid ""
-"I2P can be run as a separate test network by controlling the locations "
-"that a\n"
+"I2P can be run as a separate test network by controlling the locations that a\n"
 "new router reseeds from so that it only finds other test routers.\n"
 "\n"
-"The standard mode of operation is to have one JVM per router instance; "
-"hence\n"
-"running multiple copies of I2P on a single machine is inadvisable, both "
-"due to\n"
+"The standard mode of operation is to have one JVM per router instance; hence\n"
+"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
 "the potential resource drain and the certain port conflicts. To better\n"
-"facilitate setting up small test networks, I2P has a multirouter mode "
-"which\n"
+"facilitate setting up small test networks, I2P has a multirouter mode which\n"
 "enables multiple distinct routers to be run in the same JVM.\n"
 "\n"
-"MultiRouter can be started from the i2p base directory by running the "
-"below\n"
+"MultiRouter can be started from the i2p base directory by running the below\n"
 "command."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:124
 msgid ""
-"Additionally, I2P can be started in a virtual network mode. This mode "
-"disables\n"
-"all transports, allowing the router to be tested in isolation without "
-"network\n"
-"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
-"the\n"
+"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
+"all transports, allowing the router to be tested in isolation without network\n"
+"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
 "router.config before starting."
 msgstr ""
 
@@ -244,13 +194,10 @@ msgstr ""
 #: i2p2www/pages/site/research/index.html:133
 #, python-format
 msgid ""
-"As stated above in the researcher notes, please <a "
-"href=\"%(contact)s\">contact\n"
+"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
 "  us</a> before you commence your testing. While we do not discourage\n"
-"researchers from responsibly testing their ideas on the live network, if "
-"an\n"
-"attack becomes apparent and we don't have any line of communication then "
-"we\n"
+"researchers from responsibly testing their ideas on the live network, if an\n"
+"attack becomes apparent and we don't have any line of communication then we\n"
 "will end up taking countermeasures which could interfere with the test."
 msgstr ""
 
@@ -260,35 +207,23 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:143
 msgid ""
-"As of release 0.9.25, I2P supports a router family configuration. This "
-"provides\n"
-"researchers who run multiple routers with the means to publicly identify "
-"those\n"
-"routers. In turn, this helps the I2P project understand that these "
-"routers are\n"
-"not running an attack on the network. It also will prevent other routers "
-"from\n"
-"including multiple routers of the family in a single tunnel, which could "
-"lead\n"
-"to deanonymization. Routers that appear to be colluding but do not have a"
-"\n"
-"declared family may be assumed to be an attack on the network, and may be"
-"\n"
-"blocked. The best way to ensure the success of your research project is "
-"to work\n"
+"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
+"researchers who run multiple routers with the means to publicly identify those\n"
+"routers. In turn, this helps the I2P project understand that these routers are\n"
+"not running an attack on the network. It also will prevent other routers from\n"
+"including multiple routers of the family in a single tunnel, which could lead\n"
+"to deanonymization. Routers that appear to be colluding but do not have a\n"
+"declared family may be assumed to be an attack on the network, and may be\n"
+"blocked. The best way to ensure the success of your research project is to work\n"
 "with us directly."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:155
 msgid ""
-"A router family shares a private key so that participation in the family "
-"cannot\n"
-"be spoofed. To configure a router family, click on the 'I2P Internals' "
-"link in\n"
-"the router console, and then on the 'Family' tab. Follow the instructions"
-" there\n"
-"to generate the private key for the first router in the family. Then, "
-"export\n"
+"A router family shares a private key so that participation in the family cannot\n"
+"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
+"the router console, and then on the 'Family' tab. Follow the instructions there\n"
+"to generate the private key for the first router in the family. Then, export\n"
 "the key from that router, and import it to other members of the family."
 msgstr ""
 
@@ -343,8 +278,7 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:6
 msgid ""
 "\n"
-"This process is subject to change. Please refer to this page for the "
-"current VRP."
+"This process is subject to change. Please refer to this page for the current VRP."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:10
@@ -353,22 +287,15 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:12
 msgid ""
-"Researchers: while you research/hack, we ask that you refrain from the "
-"following: - Performing active exploits or Denial of Service attacks on "
-"the\n"
-"i2p network - Performing social engineering on i2p development team "
-"members - Performing any physical or electronic attempts against i2p "
-"property and/or data\n"
+"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
+"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
 "centers"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:15
 msgid ""
-"As i2p is an open-source community, many volunteers and development team "
-"members run their own I2P Sites as well as public (“non-private "
-"internet”) domains. These\n"
-"sites/servers are NOT in the scope of the vulnerability assessment / "
-"response process, only the underlying code of i2p is."
+"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
+"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:18
@@ -395,8 +322,7 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:37
 msgid ""
-"Response Team designates a Response Manager who is in charge of the "
-"particular\n"
+"Response Team designates a Response Manager who is in charge of the particular\n"
 "report based on availability and/or knowledge-set."
 msgstr ""
 
@@ -409,8 +335,7 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:47
 msgid ""
-"Response Manager makes inquiries to satisfy any needed information and to"
-"\n"
+"Response Manager makes inquiries to satisfy any needed information and to\n"
 "confirm if submission is indeed a vulnerability."
 msgstr ""
 
@@ -430,8 +355,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:62
 msgid ""
-"Response Manager moves discussion to a new or existing ticket on public "
-"Trac if necessary."
+"Response Manager moves discussion to a new or existing ticket on public Trac"
+" if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:70
@@ -443,8 +368,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:75
 msgid ""
-"Affects network as a whole, has potential to break entire network or is "
-"on a scale of great catastrophe."
+"Affects network as a whole, has potential to break entire network or is on a"
+" scale of great catastrophe."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:79
@@ -462,19 +387,18 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:93
 #, python-format
 msgid ""
-"HIGH severities must be notified on website and news feed within "
-"%(limit)s\n"
+"HIGH severities must be notified on website and news feed within %(limit)s\n"
 "working days of classification."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:98
-msgid "The notification should list appropriate steps for users to take, if any."
+msgid ""
+"The notification should list appropriate steps for users to take, if any."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:101
 msgid ""
-"The notification must not include any details that could suggest an "
-"exploitation\n"
+"The notification must not include any details that could suggest an exploitation\n"
 "path."
 msgstr ""
 
@@ -497,8 +421,8 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:122
 msgid ""
 "Response Manager works on a patch LOCALLY, patches are shared by the "
-"response team via PGP-encrypted e-mail until such a time as it is safe to"
-" expose to the public."
+"response team via PGP-encrypted e-mail until such a time as it is safe to "
+"expose to the public."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:125
@@ -507,10 +431,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:128
 msgid ""
-"Any messages associated with PUBLIC commits during the time of review "
-"should not\n"
-"make reference to the security nature of the PRIVATE branch or its "
-"commits."
+"Any messages associated with PUBLIC commits during the time of review should not\n"
+"make reference to the security nature of the PRIVATE branch or its commits."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:132
@@ -545,19 +467,14 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:159
 msgid ""
-"Response Manager includes vulnerability announcement draft in release "
-"notes."
+"Response Manager includes vulnerability announcement draft in release notes."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:162
 msgid ""
-"Proceed with the Point or Regular Release. At this time, it is not "
-"possible to release an in-network update for only one operating system or"
-"\n"
-"\t\tarchitecture. In order that all affected products can be released as "
-"quickly as possible, the person responsible\n"
-"\t\tfor that software should be able to perform necessary release "
-"processes in a timely manner. Importantly this should include\n"
+"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
+"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
+"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
 "\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
 msgstr ""
 
@@ -567,11 +484,13 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:175
 #, python-format
-msgid "Response Team has %(limit)s days to fulfill all points within section III."
+msgid ""
+"Response Team has %(limit)s days to fulfill all points within section III."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:179
-msgid "If the Incident Response process in section III is successfully completed:"
+msgid ""
+"If the Incident Response process in section III is successfully completed:"
 msgstr "Om processen för incidentrespons i avsnitt III har slutförts:"
 
 #: i2p2www/pages/site/research/vrp.html:183
@@ -623,8 +542,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:214
 msgid ""
-"Workarounds (configuration changes users can make to reduce their "
-"exposure to the vulnerability)."
+"Workarounds (configuration changes users can make to reduce their exposure "
+"to the vulnerability)."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:217
@@ -632,13 +551,14 @@ msgid "If applicable, credits to the original reporter."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:222
-msgid "Release finalized vulnerability announcement on website and in news feed."
+msgid ""
+"Release finalized vulnerability announcement on website and in news feed."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:230
 msgid ""
-"For HIGH severities, release finalized vulnerability announcement on "
-"well-known mailing lists:"
+"For HIGH severities, release finalized vulnerability announcement on well-"
+"known mailing lists:"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:238
@@ -647,8 +567,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:242
 msgid ""
-"The commit that applied the fix is made reference too in a future commit "
-"and includes a CVE-ID."
+"The commit that applied the fix is made reference too in a future commit and"
+" includes a CVE-ID."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:250
@@ -659,33 +579,28 @@ msgstr "Om processen för incidentrespons i avsnitt III *inte* har slutförts:"
 
 #: i2p2www/pages/site/research/vrp.html:254
 msgid ""
-"Response Team and developers organize an IRC meeting to discuss why/what "
-"points\n"
-"in section III were not resolved and how the team can resolve them in the"
-"\n"
+"Response Team and developers organize an IRC meeting to discuss why/what points\n"
+"in section III were not resolved and how the team can resolve them in the\n"
 "future."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:259
 msgid ""
-"Any developer meetings immediately following the incident should include "
-"points\n"
+"Any developer meetings immediately following the incident should include points\n"
 "made in section V."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:263
 msgid ""
 "If disputes arise about whether or when to disclose information about a\n"
-"vulnerability, the Response Team will publicly discuss the issue via IRC "
-"and\n"
+"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
 "attempt to reach consensus."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:268
 #, python-format
 msgid ""
-"If consensus on a timely disclosure is not met (no later than %(limit)s "
-"days),\n"
+"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
 "the researcher (after %(limit)s days) has every right to expose the\n"
 "vulnerability to the public."
 msgstr ""
@@ -700,7 +615,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:282
 #: i2p2www/pages/site/research/vrp.html:302
-msgid "Response Team and developers should coordinate to work on the following:"
+msgid ""
+"Response Team and developers should coordinate to work on the following:"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:286
@@ -729,15 +645,13 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:312
 msgid ""
-"If results are not sensitive, share with the public via IRC or public "
-"Trac."
+"If results are not sensitive, share with the public via IRC or public Trac."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:320
 #, python-format
 msgid ""
-"Response Team has %(limit)s days following completion of section III to "
-"ensure\n"
+"Response Team has %(limit)s days following completion of section III to ensure\n"
 "completion of section V."
 msgstr ""
 
@@ -747,10 +661,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:328
 msgid ""
-"Any further questions or resolutions regarding the incident(s) between "
-"the\n"
-"researcher and response + development team after public disclosure can be"
-"\n"
+"Any further questions or resolutions regarding the incident(s) between the\n"
+"researcher and response + development team after public disclosure can be\n"
 "addressed via the following:"
 msgstr ""
 
@@ -760,8 +672,7 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:344
 msgid ""
-"Response Team and developers should hold annual meetings to review the "
-"previous\n"
+"Response Team and developers should hold annual meetings to review the previous\n"
 "year's incidents."
 msgstr ""
 
@@ -798,4 +709,3 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:375
 msgid "Potential changes to this process to improve future responses."
 msgstr ""
-
diff --git a/i2p2www/translations/tr/LC_MESSAGES/docs.po b/i2p2www/translations/tr/LC_MESSAGES/docs.po
index 35b65bf902703d9d70e77343fac85d6b15ba983e..4f33438f6fff816efdefd3361a131bec96564d6b 100644
--- a/i2p2www/translations/tr/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/tr/LC_MESSAGES/docs.po
@@ -8497,13 +8497,13 @@ msgstr "İletileri şifreleyebilmek için (tünelden göndermek ve hedefe ulaşm
 msgid ""
 "Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
 "(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
-msgstr ""
+msgstr "Yönelticiler, Yöneltici Bilgilerini doğrudan Ağ Veritabanına gönderirken, Kiralama Kümeleri giden tüneller üzerinden \ngönderilir (bir yönelticinin kendi Kiralama Kümesi ile ilişkilendirilmesini önlemek için Kiralama Kümelerinin anonim olarak gönderilmesi gerekir)."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:160
 msgid ""
 "We can combine the above concepts to build successful connections in the "
 "network."
-msgstr ""
+msgstr "Ağda başarılı bağlantılar kurmak için yukarıdaki kavramları birleştirebiliriz."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:164
 msgid ""
@@ -8511,19 +8511,19 @@ msgid ""
 "This way, she gathers lists of peers she can use as hops in her tunnels.\n"
 "She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
 "that router to send the construction message onward, until the tunnel has been constructed."
-msgstr ""
+msgstr "Alice, kendi gelen ve giden tünellerini oluşturmak için Yöneltici Bilgilerini toplamak amacıyla Ağ Veritabanı üzerinde bir arama yapar.\nBöylece, tünellerinde sıçrama olarak kullanabileceği eşlerin listelerini toplar.\nDaha sonra ilk sıçramaya bir oluşturma iletisi gönderebilir, bir tünel oluşturulmasını isteyebilir ve \nyönelticiden tünel oluşturulana kadar oluşturma iletisini göndermesini isteyebilir."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:171
 msgid "Request information on other routers"
-msgstr ""
+msgstr "Diğer yönelticiler hakkında bilgi istenir"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:173
 msgid "Build tunnel using router information"
-msgstr ""
+msgstr "Yöneltici bilgileri kullanılarak tünel oluşturulur"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:175
 msgid "Figure 2: Router information is used to build tunnels."
-msgstr ""
+msgstr "Şekil 2: Tünelleri oluşturmak için kullanılan yöneltici bilgileri."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:178
 msgid ""
@@ -8541,7 +8541,7 @@ msgid ""
 "Alice may also cut down on the response time by bundling her most \n"
 "recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
 "for it when he wants to reply, but this is optional."
-msgstr ""
+msgstr "Alice, Bob'a bir ileti göndermek istediğinde, önce Bob'un Kiralama Kümesini \nbulmak için Ağ Veritabanında bir arama yapar ve ona var olan gelen tünel \nağ geçitlerini öğrenir. Ardından, giden tünellerinden birini seçer ve iletiyi Bob'un \ngelen tünel ağ geçitlerinden birine iletmek için giden tünelin uç noktası için \nyönergelerle birlikte aşağıya gönderir. Giden tünel uç noktası bu yönergeleri \naldığında, iletiyi istendiği gibi iletir ve Bob'un gelen tünel ağ geçidi bunu aldığında, \ntünelden Bob'un yönelticisine iletilir. Alice, Bob'un iletiyi yanıtlayabilmesini istiyorsa, \nkendi hedefini iletinin bir parçası olarak açıkça iletmelidir. Bu, <a href=\"#app.streaming\">streaming</a> \nkitaplığında yapılan daha yüksek düzeyle bir katman sunularak yapılabilir.\nAlice ayrıca, Bob'un yanıt vermek istemesi durumunda Ağ Veritabanı araması \nyapmasına gerek kalmaması için en son Kiralama Kümesini iletiye katarak \nyanıt süresini kısaltabilir. Ancak bu seçenek isteğe bağlıdır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:195
 msgid "Connect tunnels using LeaseSets"
@@ -8569,7 +8569,7 @@ msgid ""
 "end to end communication between Alice and Bob, the garlic will be encrypted \n"
 "to the public key published in Bob's leaseSet, allowing the message to be \n"
 "encrypted without giving out the public key to Bob's own router."
-msgstr ""
+msgstr "Tünellerin kendileri, ağ içindeki eşlere karşı izinsiz açığa çıkmalarını önlemek için \nkatmanlı şifreleme kullansa da (ağ dışındaki eşlere izin açığa çıkmayı önlemek için \ntaşıma katmanının yaptığı gibi), giden tünel uç noktasından ve gelen tünel ağ geçidinden \ngelen iletiyi gizlemek için ek bir uçtan uca şifreleme katmanı eklemek gerekir.  Bu \n\"<a href=\"#op.garlic\">garlicf şifrelemesi</a>\", Alice'in yönelticisinin birden çok iletiyi tek bir \n\"garlic iletisine\" sarmalaması ve belirli bir ortak anahtarla şifrelemesini sağlar. \nBöylece aracı eşler garlic içinde kaç ileti olduğunu, bu iletilerin ne söylediğini \nveya bu iletilerin nerede olduğunu ya da bu dişin hangi hedefe gönderildiğini belirleyemez. \nAlice ve Bob arasında tipik uçtan uca iletişim için, garlic Bob'un Kiralama Kümesinde \nyayınlanan ortak anahtarla şifrelenir. Böylece herkese açık anahtar Bob'un kendi \nyönelticisine verilmeden iletinin şifrelenmesi sağlanır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:215
 msgid ""
@@ -8579,7 +8579,7 @@ msgid ""
 "control and reliability needs, but most would be best served by reusing the \n"
 "provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n"
 "based network."
-msgstr ""
+msgstr "Akılda tutulması gereken bir diğer önemli durum, I2P uygulamasının tamamen \nileti temelli olduğu ve yol boyunca bazı iletilerin kaybolabileceğidir. I2P kullanan \nuygulamalar, ileti odaklı arayüzleri kullanabilir ve kendi tıkanıklık denetimi ile \ngüvenilirlik gereksinimlerini karşılayabilir. Ancak çoğunun en iyi şekilde hizmet\nsağlaması için, I2P uygulamasını akış temelli bir ağ olarak görüntülemek için \nsağlanan <a href=\"#app.streaming\">akış</a> kitaplığını yeniden kullanması gerekir."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:225
 msgid ""
@@ -8595,7 +8595,7 @@ msgid ""
 "while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
 "all of the layers so that after all of the layers of per-hop encryption are \n"
 "added, the message arrives in the clear at the tunnel endpoint."
-msgstr ""
+msgstr "Hem gelen hem de giden tüneller benzer ilkelerle çalışır.\nTünel ağ geçidi, bir dizi tünel iletisi biriktirir ve sonunda bunları tünel aktarımı \niçin bir şeye önceden işler. Ardından, ağ geçidi önceden işlenmiş verileri şifreler \nve ilk sıçramaya iletir. Bu eş ve sonraki tünel katılımcıları, bir sonraki eşe iletmeden \nönce kopya olmadığını doğruladıktan sonra bir şifreleme katmanı ekler. Sonunda ileti, \niletilerin yeniden bölündüğü ve istendiği gibi iletildiği uç noktaya ulaşır. Fark, tüneli \noluşturanın yaptığı işte ortaya çıkar. Gelen tünellerde, oluşturucu uç noktadır ve \neklenen tüm katmanların şifresini çözer. Giden tünellerde oluşturucu ağ geçididir ve \ntüm katmanların şifresini önceden çözer. Her sıçrama için şifrelemenin tüm katmanları \neklendikten sonra, ileti tünel uç noktasına net bir şekilde ulaşır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:240
 msgid ""
@@ -8609,7 +8609,7 @@ msgid ""
 "threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
 "anonymously, and depending upon untrusted peers to provide this information \n"
 "has its own serious anonymity implications."
-msgstr ""
+msgstr "İletileri iletmek için belirli eşlerin seçilmesi ve bunların özel sıralaması, hem I2P \nanonimliğini hem de başarım özelliklerini anlamak için önemlidir. Ağ veritabanının \n(aşağıda) hangi eşlerin sorgulanıp kayıtları depolayacağını seçmek için kendi ölçütleri \nolsa da, tünel oluşturucular ağdaki herhangi bir eşi herhangi bir sırayla (ve hatta \nherhangi bir sayıda) tek bir tünelde kullanabilir. Mükemmel gecikme ve kapasite \nverileri küresel olarak biliniyor olsaydı, seçim ve sıralama, istemci tehdit modelleri \nve belirli gereksinimleri tarafından yönlendirilirdi. Ne yazık ki, gecikme ve kapasite \nverilerinin anonim olarak toplanması önemsiz değildir ve bu bilgileri sağlamak için \ngüvenilmeyen eşlere bağlı olmanın anonimlik üzerinde ciddi etkileri vardır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:253
 msgid ""
@@ -8623,7 +8623,7 @@ msgid ""
 "and offers insufficient anonymity. I2P is instead working on offering a range \n"
 "of peer selection strategies, coupled with anonymity aware measurement code \n"
 "to organize the peers by their profiles."
-msgstr ""
+msgstr "Anonimlik açısından en basit yöntem, tüm ağdan rastgele eşler seçmek, \nbunları rastgele sıralamak ve bu eşleri sonsuza kadar bu sırayla kullanmak olur. \nBaşarım açısından bakıldığında, en basit yöntem, gerekli yedek kapasiteye sahip \nen hızlı eşleri seçmek, yükü şeffaf olarak devretmek için yükü farklı eşler arasında \ndağıtmak ve kapasite bilgileri değiştiğinde tüneli yeniden oluşturmak olur. İlki hem \nkırılgan hem de verimsiz iken, ikincisi için erişilemez bilgiler gerekir ve yetersiz \nanonimlik sunar. Bunun yerine I2P, eşleri profillerine göre düzenlemek için anonimlik \nfarkında ölçüm koduyla birleştirilmiş bir dizi eş seçim stratejisi sunmaya çalışır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:266
 msgid ""
@@ -8642,7 +8642,7 @@ msgid ""
 "routers into four tiers - fast and high capacity, high capacity, not failing, \n"
 "and failing. The thresholds for those tiers are determined dynamically, and \n"
 "while they currently use fairly simple algorithms, alternatives exist."
-msgstr ""
+msgstr "Temel olarak, I2P etkileşimde bulunduğu eşlerin dolaylı davranışlarını sürekli olarak \nölçerek profillerini oluşturur. Örneğin, bir eş 1,3 saniyede bir ağ veritabanı aramasına \nyanıt verdiğinde, bu gidiş dönüş gecikmesi tüm yönelticilerin profillerine kaydedilerek, \nİstek ve yanıtın geçtiği iki tünelde (gelen ve giden) ve sorgulanan eşin profilinde yer alır. \nTaşıma katmanı gecikmesi veya tıkanıklık gibi doğrudan ölçümler, manipüle edilebildiği ve \nölçüm yönelticisi ile ilişkilendirilebileceğinden ve onları önemsiz saldırılara açık \nbırakabileceğinden profilin bir parçası olarak kullanılmaz. Bu profiller toplanırken, başarımını, \ngecikmesini, çok sayıda etkinliği işleme kapasitesini, şu anda aşırı yüklü olup olmadığını ve \nağ ile ne kadar bütünleşmiş olduğunu özetlemek için her biri üzerinde bir dizi hesaplama yapılır. \nDaha sonra bu hesaplamalar, yönelticileri hızlı ve yüksek kapasiteli, yüksek kapasiteli, sorunsuz \nve sorunlu olmak üzere dört düzeyde gruplamak için etkin eşleri karşılaştırmakta kullanılır. \nBu düzeylerin eşikleri devingen olarak belirlenir ve şu anda oldukça basit algoritmalar kullanır. \nAncak alternatifleri de vardır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:284
 msgid ""
@@ -8657,7 +8657,7 @@ msgid ""
 "router's top tier through predecessor and netDb harvesting attacks. In turn,\n"
 "several alternatives exist which, while not balancing the load as evenly, will\n"
 "address the attacks mounted by particular classes of adversaries."
-msgstr ""
+msgstr "Bu profil verileri kullanılarak, en basit uygun eş seçimi stratejisi, eşleri üst düzeyden \n(hızlı ve yüksek kapasiteli) rastgele seçmektir. Şu anda istemci tünelleri bu şekilde \ndağıtılmaktadır. Keşif tünelleri (ağ veritabanı ve tünel yönetimi için kullanılır) \"sorunsuz\" \ndüzeyinden ('daha iyi\" katmanlardaki yönelticileri de içerir) rastgele eşler seçer. \nEşler arası yönelticileri daha geniş bir şekilde örnekleme olanağı sağlar ve aslında \nrastgele <a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">tepe tırmanışı</a> ile eş seçimini iyileştirir. Ancak bu stratejiler, öncül \nve ağ veritabanı hasat saldırıları ile yönelticinin en üst düzeyindeki eşler hakkında bilgi \nsızdırır. Buna karşılık, yükü eşit olarak dengelememekle birlikte, belirli düşman sınıfları \ntarafından düzenlenen saldırılara karşı koyacak çeşitli alternatifler vardır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:298
 msgid ""
@@ -8678,7 +8678,7 @@ msgid ""
 "each time. This varies from the XOR based ordering in that the predecessor \n"
 "and successor of each peer is always the same, while the XOR only makes sure \n"
 "their order doesn't change."
-msgstr ""
+msgstr "Rastgele bir anahtar seçerek ve eşleri ondan XOR uzaklıklarına göre sıralayarak, \neşlerin başarısızlık oranına ve düzeyin karıştırılmasına göre öncül ve hasat saldırılarında \nsızdırılan bilgiler azaltılır. Ağ veritabanı hasat saldırılarıyla başa çıkmak için başka bir basit \nstrateji, gelen tünel ağ geçitlerini düzeltmek ve aynı zamanda tünellerdeki eşleri daha da \nrastgele hale getirmektir. İstemcinin bağlantı kurduğu düşmanlara yönelik önceki \nsaldırılarla başa çıkmak için giden tünel uç noktaları da sabit kalır. En çok maruz kalan \nnoktada hangi eşin düzeltileceğinin seçiminin elbette bir süre sınırı olmalıdır. Çünkü \nsonunda tüm eşler başarısız olur. Böylece diğer yönelticilerin sorunları arasında ölçülen \nortalama süreyi taklit etmek için tepkisel olarak ayarlanabilir ya da etkisel olarak önlenebilir. \nBu iki strateji, sırayla, sabit bir açık eş ve tüneller arasında bir XOR tabanlı sıralama kullanılarak \nbirleştirilebilir. Daha katı bir strateji, tam eşleri ve olası bir tünelin sıralamasını düzeltir. Yalnızca \nher biri aynı şekilde katılmayı kabul ederse tek tek eşler kullanılır. Bu yöntem, XOR tabanlı \nsıralamadan farklıdır, çünkü her bir eşin öncülü ve ardılı her zaman aynıdır. XOR ise yalnızca \nsıralarının değişmediğinden emin olur."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:318
 #, python-format
@@ -8687,7 +8687,7 @@ msgid ""
 "random strategy above, with XOR-based ordering. A \n"
 "more detailed discussion of the mechanics involved in tunnel operation, management, \n"
 "and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>."
-msgstr ""
+msgstr "Daha önce belirtildiği gibi, I2P şu anda (sürüm 0.8), XOR tabanlı sıralama \nile yukarıdaki düzeyli rastgele stratejiyi kullanıyor. Tünel işletimi, yönetimi \nve eş seçimi ile ilgili mekanizmalar hakkında ayrıntılı bir tartışma \n<a href=\"%(tunnelimpl)s\">tunnel teknik özelliklerinde</a> bulunabilir."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:326
 #, python-format
@@ -8695,7 +8695,7 @@ msgid ""
 "As mentioned earlier, I2P's netDb works to share the network's metadata.\n"
 "This is detailed in <a href=\"%(netdb)s\">the network database</a> page,\n"
 "but a basic explanation is available below."
-msgstr ""
+msgstr "Daha önce belirtildiği gibi, I2P ağ veritabanı ağın üst verilerini paylaşmak için çalışır.\nBu konu, <a href=\"%(netdb)s\">ağ veritabanı</a> sayfasında ayrıntılı olarak açıklanmıştır. \nBununla birlikte basit bir açıklamayı aşağıda bulabilirsiniz."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:332
 msgid ""
@@ -8703,7 +8703,7 @@ msgid ""
 "Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
 "will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
 "drops too low."
-msgstr ""
+msgstr "I2P kullanıcılarının belirli bir yüzdesi 'otomatik doldurma eşleri' olarak atanır.\nŞu anda, çok fazla bant genişliği olan ve yeterince hızlı I2P kurulumları, \nvar olan otomatik doldurma yönelticilerinin sayısı çok azaldığında kendilerini \notomatik doldurma yönelticisi olarak atar."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:339
 #, python-format
@@ -8715,23 +8715,23 @@ msgid ""
 "<a href=\"%(netdb)s#lookup\">security issue</a>.\n"
 "When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
 "but will always answer by itself (if it has the requested data)."
-msgstr ""
+msgstr "Diğer I2P yönelticileri, otomatik doldurma yönelticilerine basit 'depolama' ve 'arama' \nsorguları göndererek verilerini ve arama bilgilerini depolar.\nBir otomatik doldurma yönelticisi bir 'depolama' sorgusu alırsa, bilgileri \n<a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algoritmasını</a> kullanarak diğer otomatik doldurma \nyönelticilerine yayar.\n'Arama' sorguları, şu anda önemli bir <a href=\"%(netdb)s#lookup\">güvenlik sorununu</a> \nönlemek için farklı şekilde çalışıyor.\nBir arama yapıldığında, otomatik doldurma yönelticisi aramayı diğer eşlere iletmez. \nAncak her zaman kendi kendine yanıt verir (istenilen verilere sahipse)."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:349
 msgid "Two types of information are stored in the network database."
-msgstr ""
+msgstr "Ağ veritabanında iki türde bilgi depolanır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:353
 msgid ""
 "A <b>RouterInfo</b> stores information on a specific I2P router and how to "
 "contact it"
-msgstr ""
+msgstr "<b>Yöneltici bilgileri</b> belirli bir I2P yönelticisi ve nasıl bağlantı kurulacağı hakkında bilgileri tutar."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:354
 msgid ""
 "A <b>LeaseSet</b> stores information on a specific destination (e.g. I2P "
 "website, e-mail server...)"
-msgstr ""
+msgstr "<b>Kiralama kümesi</b> belirli bir hedefin bilgilerini tutar (I2P web sitesi, e-posta sunucusu gibi)"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:356
 msgid ""
@@ -8740,7 +8740,7 @@ msgid ""
 "This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
 "(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n"
 "and detecting skew between routers at the transport layer."
-msgstr ""
+msgstr "Tüm bu bilgiler, yayınlayan tarafça imzalanır ve bilgileri kullanan veya depolayan herhangi bir I2P yönelticisi tarafından doğrulanır.\nEk olarak, eski kayıtların tutulmasını ve olası saldırıları önlemek için verilerde süre bilgisi bulunur.\nBu aynı zamanda I2P tarafından doğru zamanı korumak, ara sıra bazı SNTP sunucularını sorgulamak \n(varsayılan olarak <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin) ve aktarım katmanındaki yönelticiler arasındaki \nsapmayı algılamak için gerekli kodu bir araya getirmekte kullanılır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:364
 msgid "Some additional remarks are also important."
@@ -8755,7 +8755,7 @@ msgid ""
 "One could only want specific people to be able to reach a destination.\n"
 "This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
 "An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
-msgstr ""
+msgstr "Bir kişi yalnızca belirli kişilerin bir hedefe ulaşabilmesini isteyebilir.\nBu, hedef Ağ Veritabanında yayınlanabilir. Ancak hedefi başka yollarla iletmeniz gerekir.\nBir alternatif, 'Şifreli Kiralama Kümeleri'dir. Bu Kiralama Kümeleri yalnızca şifre çözme anahtarına erişimi olan kişiler tarafından çözülebilir."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:377
 msgid "Bootstrapping:"
@@ -8780,7 +8780,7 @@ msgid ""
 "However, as the network grows, not all routerInfo and leaseSet files will be present\n"
 "on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
 "Because of this, refinements to the netDb will be done in the next releases."
-msgstr ""
+msgstr "I2P ağındaki aramalar diğer ağ veritabanı yönelticilerine iletilmez.\nŞu anda, ağ çok büyük olmadığı için bu büyük bir sorun oluşturmaz.\nAncak ağ büyüdükçe, her ağ veritabanı yönelticisinde yöneltici bilgileri \nve kiralama kümesi dosyalarının tümü bulunmaz ve başarılı arama oranı düşer.\nBu nedenle, sonraki sürümlerde ağ veritabanında iyileştirmeler yapılacaktır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:398
 msgid ""
@@ -8789,7 +8789,7 @@ msgid ""
 "is the one who should receive a given message. The particulars of how routers \n"
 "communicate with other routers aren't critical - three separate protocols \n"
 "have been used at different points to provide those bare necessities."
-msgstr ""
+msgstr "Yönelticiler arasındaki iletişimde, iletişim kurulan yönelticinin belirli bir iletiyi \nalması gereken yöneltici olduğunu doğrulanırken, dış düşmanlara karşı gizlilik \nve bütünlük sağlanması gerekir. Yönelticilerin diğer yönelticilerle nasıl iletişim \nkurduğunun ayrıntıları kritik değildir. Temel gereksinimleri karşılamak için farklı \nnoktalarda üç ayrı iletişim kuralı kullanılmıştır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:406
 #, python-format
@@ -8799,12 +8799,12 @@ msgid ""
 "(as a number of routers will end up speaking with many others), I2P moved \n"
 "from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n"
 "Semireliable UDP\", or \"SSU\"."
-msgstr ""
+msgstr "I2P, o zamandan beri devre dışı bırakılan TCP tabanlı bir iletişim kuralı ile başladı. \nDaha sonra, yüksek düzeyli iletişim gereksinimini karşılamak için (birkaç yöneltici \ndiğerleriyle konuşacağından), I2P, TCP tabanlı bir taşıyıcıdan \n<a href=\"%(ssu)s\">UDP tabanlı bir taşıyıcıya</a> - \"Güvenli yarı güvenilir UDP\" ya da \"SSU\" \nkullanmaya geçti."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:414
 #, python-format
 msgid "As described in the <a href=\"%(ssu)s\">SSU spec</a>:"
-msgstr ""
+msgstr "<a href=\"%(ssu)s\">SSU teknik özelliklerinde</a> belirtildiği şekilde:"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:418
 msgid ""
@@ -8815,7 +8815,7 @@ msgid ""
 "PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
 "sufficient for home users. In addition, it should support techniques for addressing \n"
 "network obstacles, like most NATs or firewalls."
-msgstr ""
+msgstr "Bu iletişim kuralının amacı, güvenli, kimliği doğrulanmış, yarı güvenilir ve sıralanmamış \nileti aktarımını sağlamak ve üçüncü tarafların kolayca fark edemeyeceği kadar az miktarda \nveri ortaya çıkarmaktır. TCP dostu tıkanıklık denetiminin yanında yüksek düzeyli iletişimi \ndesteklerken PMTU algılamasını da içerebilir. Ev kullanıcıları için toplu verileri yeterli hızlarda \nverimli bir şekilde aktarabilmelidir. Ayrıca, NAT veya güvenlik duvarı gibi yaygın kullanılan \nağ engellerini ele alan teknikleri desteklemelidir."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:428
 #, python-format
@@ -8827,7 +8827,7 @@ msgid ""
 "the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
 "connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
 "per connection issues of the old TCP transport."
-msgstr ""
+msgstr "SSU duyurulduktan sonra ve tıkanıklık çökmesi sorunlarının ortaya çıkmasıyla, \n<a href=\"%(ntcp)s\">NTCP</a> adlı yeni bir NIO tabanlı TCP aktarımı uygulandı. Yalnızca giden \nbağlantılar için varsayılan olarak etkindir. NAT/güvenlik duvarlarını gelen bağlantılara \nizin verecek şekilde yapılandıranlar ve /config.jsp üzerinde dış sunucu ve kapı \nnumarası (dyndns/etc tamam olan) belirtenler gelen bağlantıları alabilir. NTCP NIO \ntabanlı olduğundan, eski TCP aktarımındaki her bağlantı için 1 işlem sorunu yaşanmaz."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:438
 msgid ""
@@ -8836,7 +8836,7 @@ msgid ""
 "the connection and the relative value of these bids assigns the priority. \n"
 "Transports may reply with different bids, depending on whether there is already \n"
 "an established connection to the peer."
-msgstr ""
+msgstr "I2P, aynı anda birden fazla taşıyıcı kullanılmasını destekler. Giden bağlantı için \nbelirli bir taşıyıcı \"teklifler\" yoluyla seçilir. Bağlantı için her taşıyıcı teklifi ve bu \ntekliflerin göreli değeri önceliği belirler.\nTaşıyıcılar, eş ile daha önce kurulmuş bir bağlantı olup olmadığına bağlı olarak \nfarklı tekliflerle yanıt verebilir."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:446
 #, python-format
@@ -8846,7 +8846,7 @@ msgid ""
 "and inbound connections. Your firewall and your I2P router must be configured \n"
 "to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n"
 "page</a>."
-msgstr ""
+msgstr "Geçerli uygulama, çoğu durumda giden bağlantılar için en yüksek öncelikli \ntaşıyıcı olarak NTCP değerlendirmesi yapar. SSU, hem giden hem de gelen \nbağlantılar için etkinleştirilir. Güvenlik duvarınız ve I2P yönelticiniz, gelen \nNTCP bağlantılarına izin verecek şekilde yapılandırılmalıdır. Ayrıntılı bilgi \nalmak için <a href=\"%(ntcp)s\">NTCP sayfasına</a> bakabilirsiniz."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:455
 msgid ""
@@ -8862,7 +8862,7 @@ msgid ""
 "at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
 "are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
 "(explained below)."
-msgstr ""
+msgstr "I2P üzerinde çeşitli düşmanlara karşı katmanlı savunma sağlamak için en düşük \ndüzeyde şifreleme öncülleri bir araya getirilir. En düşük düzeyde, yönelticiler arası \niletişim, aktarım katmanı güvenliği tarafından korunur - SSU, 2048 bitlik bir Diffie \naracılığıyla kısa ömürlü bir oturum anahtarı üzerinde anlaştıktan sonra her paketi \nhem açık IV hem de MAC (HMAC-MD5-128) ile AES256/CBC ile şifreler. Hellman \ndeğişimi, diğer yönelticinin DSA anahtarıyla istasyondan istasyona kimliği doğrular \nve ayrıca her ağ iletisinin yerel bütünlük denetimi için kendi karması vardır. \nAktarımlar üzerinden geçirilen <a href=\"#op.tunnels\">Tünel</a> iletileri, açık bir IV ile kendi katmanlı \nAES256/CBC şifrelemesini kullanır ve tünel uç noktasında ek bir SHA256 karması \nile doğrulanır. ElGamal/AES+SessionTags (aşağıda açıklanmıştır) ile şifrelenmiş \n\"garlic iletileri\" içinde çeşitli diğer iletiler aktarılır."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:470
 msgid "Garlic messages"
@@ -8882,7 +8882,7 @@ msgid ""
 "will wrap up that data message (alongside some other messages) into a garlic, \n"
 "encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
 "leaseSet, and forward it through the appropriate tunnels."
-msgstr ""
+msgstr "Garlic iletileri, \"onion\" katmanlı şifrelemenin bir uzantısıdır ve tek bir iletinin içeriğinin \nbirden fazla \"diş\" içermesini sağlar - kendi aktarım yönergelerinin yanında tam olarak \nbiçimlendirilmiş iletiler. İleriler aksi durumda bilgiye erişimi olmaması gereken bir eşten \naçık metin olarak geçtiğinde, iletiler bir garlic iletisine samalanır. Örneğin, bir yöneltici \nbaşka bir yönelticiden bir tünele katılmasını istediğinde, istek bir garlic içine samalanır.\nBu garlic alıcı yönelticinin 2048bit ElGamal ortak anahtarına şifrelenir ve bir tünelden iletilir. \nBaşka bir örnek, bir istemci bir hedefe ileti göndermek istediğinde - göndericinin yönelticisi \nbu veri iletisini (diğer bazı iletilerin yanında bir garlic içine sarmalar. Bu garlic alıcının \nkiralama kümesinde yayınlanan 2048 bit ElGamal ortak anahtarı ile şifrelenir ve uygun \ntünellerden geçirilir."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:486
 msgid ""
@@ -8896,7 +8896,7 @@ msgid ""
 "by wrapping them in garlic messages and forwarding them a number of hops prior \n"
 "to delivering them to the next hop in the tunnel, but those techniques are \n"
 "not currently used in the existing implementation."
-msgstr ""
+msgstr "Şifreleme katmanının içindeki her bir dişe eklenmiş \"yönergeler\", dişin yerel olarak, \nuzak bir yönelticiye ya da uzak bir yönelticideki uzak bir tünele aktarılmasını isteme \nyeteneğini bulundurur. Bu yönergelerde, bir eşin aktarımın belirli bir zaman veya koşul \nkarşılanana kadar ertelenmesini istemesini sağlayan alanlar vardır. Ancak bunlar \n<a href=\"#future.variablelatency\">önemsiz gecikmeler</a> dağıtılana kadar kabul edilmez. Garlic iletilerini tünel \noluşturmadan herhangi bir sayıda sıçrama ile açıkta yöneltmek ya da tünel iletilerini \ngarlic iletilerine sararak ve tüneldeki bir sonraki sekmeye iletmeden önce birkaç \nsıçramadan geçirerek yönlendirilebilir. Ancak bu teknikler şu andaki uygulama  \nkullanılmıyor"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:499
 msgid "Session tags"
@@ -8909,7 +8909,7 @@ msgid ""
 "and integrity to garlic messages. As a whole, the combination is referred \n"
 "to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
 "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
-msgstr ""
+msgstr "Güvenilmez, sıralı olmayan ileti tabanlı bir sistem olan I2P, garlic iletilerinin veri gizliliği \nve bütünlüğü sağlamak için asimetrik ve simetrik şifreleme algoritmalarının basit bir \nkombinasyonunu kullanır. Bir bütün olarak, kombinasyon ElGamal/AES+Oturum etiketi \nolarak anılır. Ancak bu, basit 2048 bit ElGamal, AES256, SHA256 ve 32 bayt nonce \nkullanımını açıklamak için aşırı derecede ayrıntılı bir yoldur."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:539
 msgid ""
@@ -8920,7 +8920,7 @@ msgid ""
 "tags are getting through, and if there isn't sufficient communication it may \n"
 "drop the ones previously assumed to be properly delivered, reverting back \n"
 "to the full expensive ElGamal encryption."
-msgstr ""
+msgstr "Oturum etiketlerinin ömürleri kısadır. bu sürenin sonunda kullanılmazlarsa atılır. \nEk olarak, her bir anahtar için depolanan miktar ve anahtarların sayısı sınırlıdır.\nÇok fazla gelirse, yeni veya eski iletiler kaybolabilir Gönderici, oturum etiketlerini \nkullanan iletilerin geçip geçmediğini izler ve yeterli iletişim yoksa, daha önce \ndüzgün bir şekilde iletildiği varsayılanları bırakarak en pahalı ElGamal şifrelemesine \ngeri dönebilir."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:549
 msgid ""
@@ -8934,7 +8934,7 @@ msgid ""
 "cover against internal adversaries, though perhaps by limiting the amount \n"
 "of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
 "there are no immediate plans to move towards these synchronized PRNGs."
-msgstr ""
+msgstr "Bir alternatif, yalnızca tek bir oturum etiketi iletmek ve bundan, hangi etiketlerin \nkullanılacağını veya bekleneceğini belirlemek için belirleyici bir PRNG tohumlanmasıdır. \nBu PRNG verisini gönderici ve alıcı arasında kabaca eşitlenmiş olarak tutularak (alıcı\nörneğin sonraki 50 etiketin bir penceresini önceden hesaplar), çok sayıda etiketi düzenli \nolarak gruplamanın yükü ortadan kaldırır ve ek seçenekler ile alan/zaman değiş tokuşu \nve belki de gerekli ElGamal şifrelemelerinin sayısını daha fazla azaltılması sağlanır.\nBununla birlikte, iç düşmanlara karşı gerekli korumayı sağlamak PRNG gücüne bağlı olacaktır. \nAncak belki de her bir PRNG kullanım sürelerini sınırlayarak, herhangi bir zayıflık en aza \nindirilebilir. Şu anda, eşitlenen PRNG yöntemine doğru ilerlemek için acil bir plan yok."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:562
 msgid "Future"
@@ -8945,7 +8945,7 @@ msgid ""
 "While I2P is currently functional and sufficient for many scenarios, there \n"
 "are several areas which require further improvement to meet the needs of those \n"
 "facing more powerful adversaries as well as substantial user experience optimization."
-msgstr ""
+msgstr "I2P şu anda birçok senaryo için işlevsel ve yeterli olsa da, daha güçlü rakiplerle \nkarşılaşanların gereksinimleri için daha fazla iyileştirme ve önemli kullanıcı deneyimi \niyileştirmesi gereken birkaç alan var."
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:569
 msgid "Restricted route operation"
@@ -9055,19 +9055,19 @@ msgstr "Zamanlama kısıtlamasından nasıl kurtulunur?"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:658
 msgid "Can we deal with the sessionTags more efficiently?"
-msgstr ""
+msgstr "Daha etkin bir sessionTags iÅŸlemesi saÄŸlayabilir miyiz?"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:659
 msgid ""
 "What, if any, batching/mixing strategies should be made available on the "
 "tunnels?"
-msgstr ""
+msgstr "Tüneller için herhangi bir toplu işlem ya da karma stratejisi oluşturmalı mıyız?"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:660
 msgid ""
 "What other tunnel peer selection and ordering strategies should be "
 "available?"
-msgstr ""
+msgstr "Başka tünel eş seçimi ve sıralama stratejileri neler olabilir?"
 
 #: i2p2www/pages/site/docs/how/tech-intro.html:663
 msgid "Similar systems"
diff --git a/i2p2www/translations/uk/LC_MESSAGES/misc.po b/i2p2www/translations/uk/LC_MESSAGES/misc.po
index 9fed3be7d94f0c1ae6fa3721af41906727e579bc..a2d465fccb11f7e6ff74bf8da05fd546b0d11088 100644
--- a/i2p2www/translations/uk/LC_MESSAGES/misc.po
+++ b/i2p2www/translations/uk/LC_MESSAGES/misc.po
@@ -1,27 +1,24 @@
-# Ukrainian translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Greg Koval <gregjsmith@gmx.com>, 2020
 # Maxym Mykhalchuk, 2015
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-02-12 00:06+0000\n"
-"PO-Revision-Date: 2020-07-23 01:36+0000\n"
-"Last-Translator: Greg Koval <gregjsmith@gmx.com>\n"
-"Language-Team: Ukrainian (Ukraine) "
-"(http://www.transifex.com/otf/I2P/language/uk_UA/)\n"
-"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 !="
-" 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n "
-"% 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9)"
-" || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3)\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:00+0000\n"
+"Last-Translator: Greg Koval <gregjsmith@gmx.com>, 2020\n"
+"Language-Team: Ukrainian (Ukraine) (http://www.transifex.com/otf/I2P/language/uk_UA/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: uk_UA\n"
+"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 != 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n % 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9) || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3);\n"
 
 #: i2p2www/pages/site/misc/clt.html:2
 msgid "I2P at CLT and PetCon 2009.1"
@@ -30,54 +27,37 @@ msgstr "I2P на CLT та PetCon 2009.1"
 #: i2p2www/pages/site/misc/clt.html:4
 msgid ""
 "Members of I2P will held a talk at CLT and PetCon 2009.1\n"
-"Two members of the I2P team will be at two forthcoming Linux day and "
-"security convention."
-msgstr ""
-"Члены I2P виступлять на CLT та PetCon 2009.1\n"
-"Два члена команди I2P будуть на двох майбутніх подіях - дні Linux та на "
-"конвенції з безпеки."
+"Two members of the I2P team will be at two forthcoming Linux day and security convention."
+msgstr "Члены I2P виступлять на CLT та PetCon 2009.1\nДва члена команди I2P будуть на двох майбутніх подіях - дні Linux та на конвенції з безпеки."
 
 #: i2p2www/pages/site/misc/clt.html:9
 #, python-format
 msgid ""
-"On 14th march of 2009 there will be a short talk about general "
-"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag "
-"2009</a> hold by echelon.\n"
-"Echelon and some other members of the I2P family will attend to the Linux"
-" meeting the whole two days (Saturday and Sunday) and will be "
-"recognizable as I2P family members. Meet them, ask them your questions, "
-"show them your props! Show your support!"
+"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n"
+"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!"
 msgstr ""
 
 #: i2p2www/pages/site/misc/clt.html:14
 #, python-format
 msgid ""
-"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security "
-"convention</a> in Dresden will take place.\n"
-"Again, echelon will attend this event and hold a short talk about general"
-" introduction to I2P. Another talk about the profiling by the I2P clients"
-" will be held."
+"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n"
+"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held."
 msgstr ""
 
 #: i2p2www/pages/site/misc/cvs.html:4
 #, python-format
 msgid ""
-"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a"
-" <a href=\"%(monotone)s\">Monotone</a> repository.\n"
+"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n"
 "For those who aren't very familiar with CVS, there is a\n"
-"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> "
-"on the\n"
-"subject (developers only need to deal with the first chapter - \"An "
-"Overview of\n"
-"CVS\", as subsequent chapters go into some nasty details very few ever "
-"need to\n"
+"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n"
+"subject (developers only need to deal with the first chapter - \"An Overview of\n"
+"CVS\", as subsequent chapters go into some nasty details very few ever need to\n"
 "touch)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/cvs.html:31
 msgid ""
-"Humorous quote from WinCVS: \"Did you know...  Never experiment with new "
-"CVS\n"
+"Humorous quote from WinCVS: \"Did you know...  Never experiment with new CVS\n"
 "commands on your working repository.  Create a sample module instead.\""
 msgstr ""
 
@@ -90,7 +70,7 @@ msgstr "Міграція I2PTunnel"
 msgid ""
 "After upgrading to the new architecture, you'll have to do a \n"
 "little work to get your old I2PTunnel-driven servers running.  \n"
-"Lets walk through a simple example.  For an eepsite with the \n"
+"Lets walk through a simple example.  For an I2P Site with the \n"
 "old clientApp configuration, you had:"
 msgstr ""
 
@@ -108,12 +88,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\""
 msgstr "Натисніть на Add new: [Server tunnel] \"GO\""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21
-msgid "For the name: <code>\"eepsite\"</code>"
-msgstr "Для імя:: <code>\"eepsite\"</code>"
+msgid "For the name: <code>\"I2P Site\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22
-msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>"
-msgstr "Для опис: <code>\"Мій eepite, чи не красиво?\"</code>"
+msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>"
+msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23
 msgid ">For the target host:"
@@ -143,14 +123,10 @@ msgstr "Повернеться з:"
 
 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39
 msgid ""
-"That's it!  Creating a new I2PTunnel server works the same way too, "
-"except you\n"
-"don't need to \"copy the old file\", obviously.  Behind the scenes, it is"
-" all driven\n"
-"by the <code>i2ptunnel.config</code> file, which you may modify "
-"externally (if you do,\n"
-"hit \"Reload config\" on the I2PTunnel web page, which will tear down all"
-" of your \n"
+"That's it!  Creating a new I2PTunnel server works the same way too, except you\n"
+"don't need to \"copy the old file\", obviously.  Behind the scenes, it is all driven\n"
+"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n"
+"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n"
 "existing tunnels and rebuild new ones)"
 msgstr ""
 
@@ -168,7 +144,7 @@ msgid "I2PTunnel services"
 msgstr "Сервіси тунелювання I2P"
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:4
-msgid "Below is quick copy of aum's eepsite deployment guide."
+msgid "Below is quick copy of aum's I2P Site deployment guide."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:8
@@ -184,23 +160,23 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:13
 msgid ""
-"I recommend the Tiny Httpd web server, thttpd, (windows version available"
-" on site) although you can use anything that you feel comfortable with."
+"I recommend the Tiny Httpd web server, thttpd, (windows version available on"
+" site) although you can use anything that you feel comfortable with."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:16
 msgid ""
 "Another more robust option would be to use EasyPHP, which is also open "
 "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For "
-"newbies who have no experience setting up and hosting content over "
-"servers, see the hosting page for help."
+"newbies who have no experience setting up and hosting content over servers, "
+"see the hosting page for help."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:19
 msgid ""
-"With the web server you've chosen, configure it to listen on a port of "
-"your choice, and serve its documents from a directory of your choice. For"
-" this example, we'll assume port 10880."
+"With the web server you've chosen, configure it to listen on a port of your "
+"choice, and serve its documents from a directory of your choice. For this "
+"example, we'll assume port 10880."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:22
@@ -213,8 +189,8 @@ msgstr ""
 msgid ""
 "Test the webserver, by pointing your normal browser (the one with the "
 "\"direct connection\") at <a href=\"http://localhost:10880\" "
-"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the "
-"port number you have chosen)."
+"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port"
+" number you have chosen)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:28
@@ -229,28 +205,28 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:35
 msgid ""
-"I2P does not deal in IP addresses. To protect your anonymity, it deals in"
-" unique addresses called destination keys."
+"I2P does not deal in IP addresses. To protect your anonymity, it deals in "
+"unique addresses called destination keys."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:38
 msgid ""
 "A destination key works a lot like a regular IP address, except that it "
-"can't be traced to your IP address or physical location. When users place"
-" a request to speak with you, your gateways are the ones that answer for "
-"you. So the requesting user can only know the IP address of your "
-"gateways. However, gateways don't know your IP address, because gateways "
-"are the last nodes on your tunnels, and you anonymously create tunnels by"
-" way of garlic routing. (So gateways are like puppets that can't see "
-"their masters, and everyone communicates through these puppets)"
+"can't be traced to your IP address or physical location. When users place a "
+"request to speak with you, your gateways are the ones that answer for you. "
+"So the requesting user can only know the IP address of your gateways. "
+"However, gateways don't know your IP address, because gateways are the last "
+"nodes on your tunnels, and you anonymously create tunnels by way of garlic "
+"routing. (So gateways are like puppets that can't see their masters, and "
+"everyone communicates through these puppets)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:41
 msgid ""
 "To deploy a server on I2P, you create a destination keypair. You use the "
-"private key to authenticate your server when connecting it to I2P, and "
-"you make the public key (aka destination key) known publicly, so others "
-"can connect to your server. (indirectly, through your gateways)"
+"private key to authenticate your server when connecting it to I2P, and you "
+"make the public key (aka destination key) known publicly, so others can "
+"connect to your server. (indirectly, through your gateways)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:44
@@ -273,9 +249,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:53
 msgid ""
-"The filenames <code>myWebPrivKey.dat</code> and "
-"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want "
-"here, as long as you understand your own choices."
+"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>"
+" are arbitrary - choose whatever you want here, as long as you understand "
+"your own choices."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:56
@@ -286,27 +262,27 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:59
 msgid ""
-"To convert your myWebPubKey.dat file into shareable base64, type the "
-"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode "
-"myWebPubKey.dat &gt; myWebPubKey.txt</code> (all on one line)."
+"To convert your myWebPubKey.dat file into shareable base64, type the command"
+" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat &gt; "
+"myWebPubKey.txt</code> (all on one line)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:62
 msgid ""
-"This file you have just generated, <code>myWebPubKey.txt</code>, contains"
-" a long base64 string (516 chars at last count), which we call a "
-"destination key. All you need to know about this string for now is that "
-"it allows remote clients to uniquely pinpoint and connect to your server,"
-" just the same way as an IP address allows remote machines to pinpoint "
-"and connect to your machine."
+"This file you have just generated, <code>myWebPubKey.txt</code>, contains a "
+"long base64 string (516 chars at last count), which we call a destination "
+"key. All you need to know about this string for now is that it allows remote"
+" clients to uniquely pinpoint and connect to your server, just the same way "
+"as an IP address allows remote machines to pinpoint and connect to your "
+"machine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:65
 msgid ""
 "However, in contrast to an IP address, there is no way to trace your "
-"machine's physical location - even though your server can be addressed "
-"via I2P, your IP address cannot be traced or associated with this "
-"destination key."
+"machine's physical location - even though your server can be addressed via "
+"I2P, your IP address cannot be traced or associated with this destination "
+"key."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:70
@@ -315,9 +291,9 @@ msgstr "3 - Відкрийте \"Тунель\" від I2P до ваш серв
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:72
 msgid ""
-"For clients elsewhere in I2P to be able to access your server, you must "
-"run a 'bridge' or 'tunnel', which takes connections from these clients "
-"and forwards them to your local server."
+"For clients elsewhere in I2P to be able to access your server, you must run "
+"a 'bridge' or 'tunnel', which takes connections from these clients and "
+"forwards them to your local server."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:75
@@ -342,9 +318,9 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:84
 msgid ""
-"Within a few seconds, the 'tunnel' should now be active, and remote "
-"clients should be able to reach your server anonymously. Remember to let "
-"your router \"warm up\" before opening clients to it."
+"Within a few seconds, the 'tunnel' should now be active, and remote clients "
+"should be able to reach your server anonymously. Remember to let your router"
+" \"warm up\" before opening clients to it."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:89
@@ -362,9 +338,9 @@ msgstr ""
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:94
 msgid ""
 "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where "
-"myserver.i2p is an I2P 'domain' you want to associate with your site, and"
-" the blahblahblah is the text of the base64 public key you created "
-"earlier in the file myWebPubKey.txt"
+"myserver.i2p is an I2P 'domain' you want to associate with your site, and "
+"the blahblahblah is the text of the base64 public key you created earlier in"
+" the file myWebPubKey.txt"
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:97
@@ -398,42 +374,42 @@ msgstr "Ми тепер мусимо думати дальше ніж тільк
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:117
 msgid ""
-"As you grow into I2P and get more of a 'feel' for it, you will want to "
-"use all manner of servers and clients."
+"As you grow into I2P and get more of a 'feel' for it, you will want to use "
+"all manner of servers and clients."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:120
 msgid ""
-"The beauty of I2P is that it allows standard Internet clients and servers"
-" for most protocols to be transparently 'tunneled' through the anonymous "
+"The beauty of I2P is that it allows standard Internet clients and servers "
+"for most protocols to be transparently 'tunneled' through the anonymous "
 "network."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:123
 msgid ""
-"You can run mailservers/clients, nameservers/clients, newsservers/clients"
-" - almost anything at all - perhaps even FTP in passive mode."
+"You can run mailservers/clients, nameservers/clients, newsservers/clients - "
+"almost anything at all - perhaps even FTP in passive mode."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:126
 msgid ""
-"Now, we'll create a client tunnel. This is like the server tunnel we "
-"created earlier, but works in reverse. It listens to a port on your local"
-" machine; your local client connects to this port; the connection gets "
-"forwarded through I2P to the service on the other end."
+"Now, we'll create a client tunnel. This is like the server tunnel we created"
+" earlier, but works in reverse. It listens to a port on your local machine; "
+"your local client connects to this port; the connection gets forwarded "
+"through I2P to the service on the other end."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:129
 msgid ""
-"To open your client tunnel for your server, type the command <code>java "
-"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client "
-"10888 textofbase64key\"</code> (all one line)."
+"To open your client tunnel for your server, type the command <code>java -jar"
+" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 "
+"textofbase64key\"</code> (all one line)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:132
 msgid ""
-"The port 10888 is arbitrary - it just needs to be something other than "
-"the physical port your server is listening on."
+"The port 10888 is arbitrary - it just needs to be something other than the "
+"physical port your server is listening on."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:135
@@ -465,11 +441,10 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:147
 msgid ""
-"You use the same procedure for using any local client program to access a"
-" remote I2P server - just get the base64 public key (called destination "
-"key) of the remote server, choose a local port to connect to the remote "
-"server, open the tunnel, and just connect with your client to your "
-"heart's content."
+"You use the same procedure for using any local client program to access a "
+"remote I2P server - just get the base64 public key (called destination key) "
+"of the remote server, choose a local port to connect to the remote server, "
+"open the tunnel, and just connect with your client to your heart's content."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:152
@@ -480,25 +455,25 @@ msgstr ""
 msgid ""
 "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's "
 "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" "
-"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. "
-"Others will then be able to reach your server remotely, without either of"
-" you jeopardizing your anonymity."
+"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others"
+" will then be able to reach your server remotely, without either of you "
+"jeopardizing your anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:157
 msgid ""
-"Remember, you can go to What's on I2P and find the latest public keys "
-"linked to their URL. You should also post your own public key and URL "
-"their. However, you will want to do this anonymously, of course. "
-"Drupal.i2p.net is currently, as of this writing, only accessible from the"
-" net. So, to access the outside WWW anonymously from inside of I2P, you "
-"will need to start up your script called startSquid. Do it the same way "
-"you have been doing these other scripts. Reconfigure your browser to "
-"proxy on localhost:5555, as defined in the script, and when the script "
-"has generated it's keys, you can access the squid proxy. Put any WWW URL "
-"(such as Google or this i2p site) into your browser's address bar and you"
-" will be surfing the World Wide Web anonymously. Now you can safely post "
-"your public key, and no one can detect your IP address."
+"Remember, you can go to What's on I2P and find the latest public keys linked"
+" to their URL. You should also post your own public key and URL their. "
+"However, you will want to do this anonymously, of course. Drupal.i2p.net is "
+"currently, as of this writing, only accessible from the net. So, to access "
+"the outside WWW anonymously from inside of I2P, you will need to start up "
+"your script called startSquid. Do it the same way you have been doing these "
+"other scripts. Reconfigure your browser to proxy on localhost:5555, as "
+"defined in the script, and when the script has generated it's keys, you can "
+"access the squid proxy. Put any WWW URL (such as Google or this i2p site) "
+"into your browser's address bar and you will be surfing the World Wide Web "
+"anonymously. Now you can safely post your public key, and no one can detect "
+"your IP address."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:162
@@ -507,8 +482,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:164
 msgid ""
-"It would drive most people crazy, going through all these steps every "
-"time one sets up an I2P server, and/or deploys a client."
+"It would drive most people crazy, going through all these steps every time "
+"one sets up an I2P server, and/or deploys a client."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:167
@@ -517,8 +492,8 @@ msgid ""
 "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called "
 "setupServer.py which automates all this nonsense into one simple command "
 "line . But I respect that people's tastes in user interfaces differ, and "
-"trying to write something which satisfies everyone's needs usually "
-"results in something so complex that it turns into newbie-repellent."
+"trying to write something which satisfies everyone's needs usually results "
+"in something so complex that it turns into newbie-repellent."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:170
@@ -529,16 +504,16 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:173
 msgid ""
-"Also, you may want to write a script which handles the startup of the I2P"
-" Router, the eepProxy, plus any and all tunnels you are using. I've got "
-"such a script called startEverything.sh, which gets launched at system "
-"startup. (Be sure to search this site for template scripts to automate "
-"your I2P commands. If I create a page for one, I'll try to remember to "
-"link it here."
+"Also, you may want to write a script which handles the startup of the I2P "
+"Router, the eepProxy, plus any and all tunnels you are using. I've got such "
+"a script called startEverything.sh, which gets launched at system startup. "
+"(Be sure to search this site for template scripts to automate your I2P "
+"commands. If I create a page for one, I'll try to remember to link it here."
 msgstr ""
 
 #: i2p2www/pages/site/misc/i2ptunnel-services.html:176
-msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
+msgid ""
+"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file."
 msgstr ""
 
 #: i2p2www/pages/site/misc/invisiblenet.html:2
@@ -547,13 +522,11 @@ msgstr "Старі документи"
 
 #: i2p2www/pages/site/misc/invisiblenet.html:5
 msgid ""
-"Following is a list of documents originally on www.invisiblenet.net/i2p/ "
-"and\n"
+"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n"
 "rescued via the\n"
 "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n"
 "They are quite dated and may or may not be accurate.\n"
-"However, the I2CP and I2NP documents in particular have some good "
-"information."
+"However, the I2CP and I2NP documents in particular have some good information."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:3
@@ -566,8 +539,7 @@ msgstr "Огляд"
 
 #: i2p2www/pages/site/misc/jbigi.html:7
 msgid ""
-"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a "
-"little\n"
+"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n"
 "manual work and a piece of chewing gum we have made several\n"
 "cryptography operations quite a bit faster."
 msgstr ""
@@ -581,18 +553,15 @@ msgid ""
 "<a href=\"%(func)s\">mpz_powm()</a>\n"
 "as a replacement for the\n"
 "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n"
-"As modPow() is a significant computational portion of many crypto "
-"operations, this is of significant benefit."
+"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:25
 #, python-format
 msgid ""
-"The standard I2P installation includes about 20 versions of the library "
-"for different platforms,\n"
+"The standard I2P installation includes about 20 versions of the library for different platforms,\n"
 "each about 50KB, inside the jbigi.jar file.\n"
-"The initialization of the JBigI library, including CPU identification, "
-"selection, and extraction\n"
+"The initialization of the JBigI library, including CPU identification, selection, and extraction\n"
 "of the correct loadable module, is handled by the\n"
 "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n"
 "If no module is available for the current platform, the standard\n"
@@ -606,8 +575,7 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:39
 msgid ""
-"Following are the instructions to build a new jbigi library for your own "
-"platform\n"
+"Following are the instructions to build a new jbigi library for your own platform\n"
 "and testing its performance."
 msgstr ""
 
@@ -618,31 +586,25 @@ msgstr ""
 #: i2p2www/pages/site/misc/jbigi.html:43
 msgid ""
 "This works on Linux, and with a few changes in build.sh probably also on\n"
-"other platforms. FreeBSD has also been reported to work too. On Kaffee "
-"the\n"
-"speedup is very small, because it already uses native BitInteger "
-"internally.\n"
+"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n"
+"speedup is very small, because it already uses native BitInteger internally.\n"
 "Blackdown seems to cause strange errors. Because you are going to do\n"
 "compilation, you need JDK; JRE won't work."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:50
 msgid ""
-"The required code is available in monotone database and the latest source"
-" tarball. "
+"The required code is available in monotone database and the latest source "
+"tarball. "
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:51
 msgid ""
 "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n"
-"included in your OS / distribution or installed already, it can be "
-"received from\n"
-"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. "
-"Even if you\n"
-"have already installed it as binary, it might still be worth a try to "
-"compile\n"
-"GMP yourself, since then it will be able to use the specific instructions"
-" of\n"
+"included in your OS / distribution or installed already, it can be received from\n"
+"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n"
+"have already installed it as binary, it might still be worth a try to compile\n"
+"GMP yourself, since then it will be able to use the specific instructions of\n"
 "your processor. The latest GMP may also\n"
 "be used instead of GMP 5.0.2, but it hasn't been tested by us."
 msgstr ""
@@ -653,8 +615,7 @@ msgstr "Інструкції крок за крок"
 
 #: i2p2www/pages/site/misc/jbigi.html:63
 msgid ""
-"Look at <a href=\"http://localhost:7657/logs.jsp\">your running "
-"environment on the logs.jsp page</a>.\n"
+"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n"
 "There should be one of two status messages for JBigI - either"
 msgstr ""
 
@@ -682,27 +643,20 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:78
 msgid ""
-"Look on <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"to see what the lifetime average values for "
-"<code>crypto.elGamal.decrypt</code> and\n"
-"<code>crypto.elGamal.encrypt</code> are. The numbers are times in "
-"milliseconds. Copy these somewhere so you can compare\n"
+"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n"
+"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n"
 "them later on.\n"
 "The network average for encrypt time is about 20ms.\n"
-"If your encrypt time is less than 50ms for a relatively new processor, or"
-" less than 100ms\n"
-"for an older processor, and the native BigInteger library was loaded, you"
-" are probably fine."
+"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n"
+"for an older processor, and the native BigInteger library was loaded, you are probably fine."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:87
 #, python-format
 msgid ""
 "Get the latest released source code of I2P from\n"
-"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge "
-"source\n"
+"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n"
 "out of the monotone database mtn.i2p2.de"
 msgstr ""
 
@@ -716,18 +670,14 @@ msgid ""
 "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n"
 "Use the 'dynamic' argument to build.sh.\n"
 "Otherwise, you must download GMP version 5.0.2 from\n"
-"from <a "
-"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, "
-"saving it to gmp-5.0.2.tar.bz2.\n"
-"If you decide to use a newer version, change the VER= line in "
-"<code>core/c/jbigi/build.sh</code>."
+"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n"
+"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:101
 msgid ""
 "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n"
-"environment variable is set and you are using Linux then it might just "
-"work.\n"
+"environment variable is set and you are using Linux then it might just work.\n"
 "Otherwise change the settings. Remember, you need the Java SDK installed."
 msgstr ""
 
@@ -735,17 +685,13 @@ msgstr ""
 msgid ""
 "Run <code>build.sh</code> (if you downloaded GMP) or\n"
 "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n"
-"Maybe the build spewed out some errors of missing jni.h and jni_md.h "
-"files.\n"
-"Either copy these files from your java install into the "
-"core/c/jbigi/jbigi/include/ directory,\n"
+"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n"
+"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n"
 "or fix $JAVA_HOME.<br>\n"
-"You can run the <code>build.sh</code> from the <code>core/c/</code> "
-"directory which will\n"
+"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n"
 "build all available jbigi libs into a jbigi.jar.</br>\n"
 "A file named <code>libjbigi.so</code> should be created in the current\n"
-"directory. If this doesn't happen and/or you get errors then please "
-"report\n"
+"directory. If this doesn't happen and/or you get errors then please report\n"
 "them."
 msgstr ""
 
@@ -773,11 +719,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/jbigi.html:131
 msgid ""
-"On <a "
-"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>"
-"\n"
-"the <code>crypto.elGamal.decrypt</code> and "
-"<code>crypto.elGamal.encrypt</code>\n"
+"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n"
+"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n"
 "should be a lot faster."
 msgstr ""
 
@@ -787,8 +730,7 @@ msgstr "Оголошення Jrandom"
 
 #: i2p2www/pages/site/misc/jrandom-awol.html:4
 msgid ""
-"The following message was received in mid-November 2007. We have no "
-"further information\n"
+"The following message was received in mid-November 2007. We have no further information\n"
 "on jrandom's status."
 msgstr ""
 
@@ -797,8 +739,7 @@ msgstr ""
 msgid ""
 "Subsequently, in an unrelated incident, the hosting company for\n"
 "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n"
-"on January 13, 2008, and the i2p.net servers did not fully return to "
-"service.\n"
+"on January 13, 2008, and the i2p.net servers did not fully return to service.\n"
 "As only jrandom has the credentials required to restore service,\n"
 "and he could not be contacted,\n"
 "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n"
@@ -820,33 +761,24 @@ msgstr ""
 #: i2p2www/pages/site/misc/manual-wrapper.html:6
 #, python-format
 msgid ""
-"The installation package for the <a href=\"%(downloads)s\">I2P router</a>"
-" comes\n"
-"with a Java wrapper for the most common architectures. If your system is "
-"not\n"
-"supported by our installer&mdash;or if you want to update the wrapper to "
-"a\n"
-"newer version&mdash;the following steps describe installing the wrapper "
-"manually."
+"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n"
+"with a Java wrapper for the most common architectures. If your system is not\n"
+"supported by our installer&mdash;or if you want to update the wrapper to a\n"
+"newer version&mdash;the following steps describe installing the wrapper manually."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:14
 msgid ""
-"Check Tanuki Software's <a "
-"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download"
-" page</a>\n"
+"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n"
 "for your platform. Is your platform listed? If so, you're in\n"
-"luck! Download the most recent version of the Community Edition for your "
-"OS and\n"
+"luck! Download the most recent version of the Community Edition for your OS and\n"
 "CPU and move to <a href=\"#packaged\">the next step</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:20
 msgid ""
-"If your platform does not have an already compiled wrapper available, you"
-"\n"
-"may be able to compile it yourself. If you are willing to have a go at "
-"it, move\n"
+"If your platform does not have an already compiled wrapper available, you\n"
+"may be able to compile it yourself. If you are willing to have a go at it, move\n"
 "on to <a href=\"#compiling\">compiling</a> the wrapper for your system."
 msgstr ""
 
@@ -855,7 +787,8 @@ msgid "Using existing binaries"
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:28
-msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>."
+msgid ""
+"In the steps below, $I2P means <em>the location I2P was installed to</em>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:36
@@ -871,8 +804,8 @@ msgstr ""
 #: i2p2www/pages/site/misc/manual-wrapper.html:39
 #: i2p2www/pages/site/misc/manual-wrapper.html:67
 msgid ""
-"If this did not work you'll need to use <code>runplain.sh</code> to start"
-" I2P."
+"If this did not work you'll need to use <code>runplain.sh</code> to start "
+"I2P."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:43
@@ -881,16 +814,15 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:44
 msgid ""
-"These steps worked to compile the wrapper for use on a mipsel system "
-"running Debian. The steps <strong>will</strong> need to be altered for "
-"your system."
+"These steps worked to compile the wrapper for use on a mipsel system running"
+" Debian. The steps <strong>will</strong> need to be altered for your system."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:48
 msgid ""
-"Download the source archive for the community version of the wrapper from"
-" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download"
-" page</a>."
+"Download the source archive for the community version of the wrapper from <a"
+" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download "
+"page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:49
@@ -899,8 +831,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:51
 msgid ""
-"Set environment variables <code>ANT_HOME</code> and "
-"<code>JAVA_HOME</code>. For example, in Debian:"
+"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. "
+"For example, in Debian:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/manual-wrapper.html:54
@@ -939,164 +871,110 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:47
 msgid ""
-"An optimized form, designed to handle only 128KB [1] files and pages, can"
-"\n"
+"An optimized form, designed to handle only 128KB [1] files and pages, can\n"
 "operate significantly faster:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:71
 msgid ""
 "The difference in network load and latency is significant - this is\n"
-"essentially a UDP version of HTTP.  On the normal web, we can't really do"
-" that,\n"
-"since most HTTP requests and responses are orders of magnitude larger "
-"than UDP\n"
-"packets functionally support, but in I2P, messages can be large.  The "
-"savings\n"
-"for the network load comes from the fact that we don't need to send any "
-"ACK\n"
+"essentially a UDP version of HTTP.  On the normal web, we can't really do that,\n"
+"since most HTTP requests and responses are orders of magnitude larger than UDP\n"
+"packets functionally support, but in I2P, messages can be large.  The savings\n"
+"for the network load comes from the fact that we don't need to send any ACK\n"
 "messages - rather than the earlier wrap/unwrap request (that bundles a\n"
-"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery),"
-" the\n"
-"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there"
-" are no\n"
+"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n"
+"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n"
 "resends)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:83
 msgid ""
-"The data that the MinWWW proxy and server need to wrap is trivial - when "
-"the\n"
-"proxy wants to send \"GET /\", it prepends it with the I2P Destination "
-"sending\n"
-"the request, followed by a 4 byte request ID.  The MinWWW server receives"
-" those\n"
-"requests, contacts the appropriate HTTPD, sends the request, waits for "
-"the\n"
+"The data that the MinWWW proxy and server need to wrap is trivial - when the\n"
+"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n"
+"the request, followed by a 4 byte request ID.  The MinWWW server receives those\n"
+"requests, contacts the appropriate HTTPD, sends the request, waits for the\n"
 "response, and sends a reply to the MinWWW proxy containing the response,\n"
-"prefixed with the original request ID.  That response is taken and passed"
-" back\n"
+"prefixed with the original request ID.  That response is taken and passed back\n"
 "to the browser and the connection is closed."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:93
 msgid ""
 "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n"
-"list, going through some round robin or other algorithm, so that there "
-"are\n"
-"multiple outproxies merged transparently.  The bandwidth required for "
-"running\n"
-"one of these outproxies is also greatly reduced, since it will only "
-"handle 128KB\n"
+"list, going through some round robin or other algorithm, so that there are\n"
+"multiple outproxies merged transparently.  The bandwidth required for running\n"
+"one of these outproxies is also greatly reduced, since it will only handle 128KB\n"
 "files (aka no one is going to be downloading porn, warez, etc)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:101
 msgid ""
-"The functionality /is/ limited, but 128KB of data is a lot for a single "
-"HTTP\n"
-"request or response.  The above diagrams are also unrealistic in their "
-"hops -\n"
-"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send "
-"each\n"
-"of the messages through two additional outbound routers, then forwarded "
-"to\n"
-"two additional inbound routers to ROUTERB, so the lag there is "
-"significant -\n"
-"while the above only saves 11 steps, 8 of those steps need to traverse "
-"the\n"
-"entire tunnel path (4+ remote hops each time when tunnels are 2 remote "
-"hops\n"
-"in each stretch), leaving MinWWW with only two full traversals (one for "
-"the\n"
+"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n"
+"request or response.  The above diagrams are also unrealistic in their hops -\n"
+"ROUTERA will really never talk directly to ROUTERB.  ROUTERA will send each\n"
+"of the messages through two additional outbound routers, then forwarded to\n"
+"two additional inbound routers to ROUTERB, so the lag there is significant -\n"
+"while the above only saves 11 steps, 8 of those steps need to traverse the\n"
+"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n"
+"in each stretch), leaving MinWWW with only two full traversals (one for the\n"
 "request, one for the response), instead of 10."
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:113
 msgid ""
-"Implementing the MinWWW proxy and server should be fairly easy - read an "
-"HTTP\n"
-"request from the client fully (perhaps only start out with HTTP GET, "
-"leaving\n"
-"HTTP POST for later), wrap the message, and wait for the response.  The "
-"server\n"
-"in turn simply needs to parse the request to either open a socket or URL,"
-"\n"
-"send the request, wait for the response, and send it back through the "
-"network.\n"
+"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n"
+"request from the client fully (perhaps only start out with HTTP GET, leaving\n"
+"HTTP POST for later), wrap the message, and wait for the response.  The server\n"
+"in turn simply needs to parse the request to either open a socket or URL,\n"
+"send the request, wait for the response, and send it back through the network.\n"
 "If someone were to implement this, it would be Good :)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/minwww.html:122
 msgid ""
-"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary "
-"message\n"
-"size, but that's going to be going away since it involves either "
-"excessive memory\n"
-"overhead on intermediary routers, or additional implementation details to"
-"\n"
-"handle.  I2PTunnel is currently limited to 128KB and hasn't been a "
-"burden,\n"
+"[1] Why 128KB files?  Currently I2CP allows functionally arbitrary message\n"
+"size, but that's going to be going away since it involves either excessive memory\n"
+"overhead on intermediary routers, or additional implementation details to\n"
+"handle.  I2PTunnel is currently limited to 128KB and hasn't been a burden,\n"
 "so perhaps it could be increased to 256KB when the I2CP spec is updated)"
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:4
 msgid ""
-"There has been discussion about a distributed blogging application for a "
-"few\n"
-"months now called \"MyI2P\".  While the original discussions were lost, "
-"we were \n"
-"able to retrieve a Google <a "
-"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
-"of it.  It isn't pretty, but it includes the basic overview and some "
-"discussion\n"
+"There has been discussion about a distributed blogging application for a few\n"
+"months now called \"MyI2P\".  While the original discussions were lost, we were \n"
+"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n"
+"of it.  It isn't pretty, but it includes the basic overview and some discussion\n"
 "that ensued."
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:12
 #, python-format
 msgid ""
-"The application itself is not yet implemented, and the ideas behind it "
-"have \n"
-"been made less ambitious over time, but they are still valid and the "
-"current \n"
-"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality "
-"available \n"
-"along side the I2P 1.0 release.  That will include a distributed address "
-"book\n"
-"to enable secure, distributed, and human readable naming by sacrificing "
-"the \n"
-"need for global uniqueness - basically everyone has their own local "
-"address book \n"
-"and can 'subscribe' to other people's address books, letting MyI2P "
-"periodically\n"
-"retrieve new name to destination mappings (leaving conflicts up to the "
-"user to\n"
-"resolve).  In addition to the address book, there will be a distributed "
-"blogging\n"
+"The application itself is not yet implemented, and the ideas behind it have \n"
+"been made less ambitious over time, but they are still valid and the current \n"
+"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n"
+"along side the I2P 1.0 release.  That will include a distributed address book\n"
+"to enable secure, distributed, and human readable naming by sacrificing the \n"
+"need for global uniqueness - basically everyone has their own local address book \n"
+"and can 'subscribe' to other people's address books, letting MyI2P periodically\n"
+"retrieve new name to destination mappings (leaving conflicts up to the user to\n"
+"resolve).  In addition to the address book, there will be a distributed blogging\n"
 "system using a reduced and secured subset of \n"
-"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to "
-"essentially\n"
-"provide an anonymous <a "
-"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
-"a 'friends list' and transparent access control (authenticated by the I2P"
-"\n"
-"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the "
-"address book)."
+"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n"
+"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n"
+"a 'friends list' and transparent access control (authenticated by the I2P\n"
+"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)."
 msgstr ""
 
 #: i2p2www/pages/site/misc/myi2p.html:29
 msgid ""
-"Additional functionality, such as integration with a DHT backing store or"
-" \n"
-"swarming file transfers for 'attachments' can be added later.  Email may "
-"or may\n"
-"not get in the first pass either, though its implementation is "
-"essentially just\n"
-"a blog entry with private access, so perhaps some UI designer can come up"
-" with\n"
-"something.  Exporting the data to RSS or access through ATOM will be an "
-"option \n"
+"Additional functionality, such as integration with a DHT backing store or \n"
+"swarming file transfers for 'attachments' can be added later.  Email may or may\n"
+"not get in the first pass either, though its implementation is essentially just\n"
+"a blog entry with private access, so perhaps some UI designer can come up with\n"
+"something.  Exporting the data to RSS or access through ATOM will be an option \n"
 "down the road as well."
 msgstr ""
 
@@ -1111,8 +989,8 @@ msgstr ""
 
 #: i2p2www/pages/site/misc/ratestats.html:7
 msgid ""
-"The list was gathered using the following command in the top directory of"
-" the branch i2p.i2p:"
+"The list was gathered using the following command in the top directory of "
+"the branch i2p.i2p:"
 msgstr ""
 
 #: i2p2www/pages/site/misc/ratestats.html:10
@@ -1127,18 +1005,15 @@ msgid ""
 "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n"
 "on monotone.\n"
 "See\n"
-"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p "
-"monotone</a>\n"
-"for more information on how to get started and check out the source "
-"anonymously.\n"
+"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n"
+"for more information on how to get started and check out the source anonymously.\n"
 "There is also a quick-start guide on the\n"
 "<a href=\"%(newdevs)s\">new developer's page</a>."
 msgstr ""
 
 #: i2p2www/pages/site/misc/transition-guide.html:16
 msgid ""
-"If you want to get the source non-anonymously, pull from the public "
-"server mtn.welterde.de.\n"
+"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n"
 "The i2p source code branch is \"i2p.i2p\"."
 msgstr ""
 
@@ -1167,24 +1042,20 @@ msgid ""
 "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n"
 "we do not have his update signing key or access to\n"
 "www.i2p[.net] or dev.i2p[.net].\n"
-"Complication and zzz have generated new signing keys, and they and Amiga "
-"are providing\n"
-"update file hosting. These changes must be configured in your router to "
-"take effect."
+"Complication and zzz have generated new signing keys, and they and Amiga are providing\n"
+"update file hosting. These changes must be configured in your router to take effect."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17
 msgid ""
-"Make the following configuration changes and your router will "
-"automatically install\n"
+"Make the following configuration changes and your router will automatically install\n"
 "the latest release."
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22
 #, python-format
 msgid ""
-"We recommend the automated process as it will verify the key of the "
-"signed update file.\n"
+"We recommend the automated process as it will verify the key of the signed update file.\n"
 "If you do not make these changes,\n"
 "you may manually download the i2pupdate.zip file from\n"
 "<a href=\"%(downloads)s\">the download page</a>."
@@ -1197,8 +1068,8 @@ msgstr "Змініть URL новини до: %(url)s"
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38
 msgid ""
-"Select ONE of the following new Update URLs at random and enter it into "
-"the Update URL box: "
+"Select ONE of the following new Update URLs at random and enter it into the "
+"Update URL box: "
 msgstr ""
 
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43
@@ -1220,8 +1091,7 @@ msgstr ""
 #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58
 msgid ""
 "You are now ready to automatically receive the release update file,\n"
-"either by setting your update policy to \"download and install\" or by "
-"clicking on the\n"
+"either by setting your update policy to \"download and install\" or by clicking on the\n"
 "\"update available\" link when it appears."
 msgstr ""
 
@@ -1230,7 +1100,5 @@ msgstr ""
 msgid ""
 "If you would like to verify the trusted update keys, they are also\n"
 "<a href=\"%(url)s\">posted and signed here</a>.\n"
-"Thank you for your support during this transition. For help please "
-"contact us on #i2p."
+"Thank you for your support during this transition. For help please contact us on #i2p."
 msgstr ""
-
diff --git a/i2p2www/translations/uk/LC_MESSAGES/research.po b/i2p2www/translations/uk/LC_MESSAGES/research.po
index d9478a4700cdfc089ef0b63016073351d34e26d3..d21ab316833d0617334a2e046da202d59defaac2 100644
--- a/i2p2www/translations/uk/LC_MESSAGES/research.po
+++ b/i2p2www/translations/uk/LC_MESSAGES/research.po
@@ -1,26 +1,23 @@
-# Ukrainian translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # Greg Koval <gregjsmith@gmx.com>, 2020
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-06-24 13:48+0000\n"
-"PO-Revision-Date: 2020-07-22 04:47+0000\n"
-"Last-Translator: Greg Koval <gregjsmith@gmx.com>\n"
-"Language-Team: Ukrainian (Ukraine) "
-"(http://www.transifex.com/otf/I2P/language/uk_UA/)\n"
-"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 !="
-" 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n "
-"% 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9)"
-" || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3)\n"
+"POT-Creation-Date: 2021-04-26 14:51+0000\n"
+"PO-Revision-Date: 2013-07-15 12:01+0000\n"
+"Last-Translator: Greg Koval <gregjsmith@gmx.com>, 2020\n"
+"Language-Team: Ukrainian (Ukraine) (http://www.transifex.com/otf/I2P/language/uk_UA/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: uk_UA\n"
+"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 != 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n % 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9) || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3);\n"
 
 #: i2p2www/pages/site/research/index.html:2
 msgid "Academic Research"
@@ -41,16 +38,11 @@ msgstr "Дослідження на мережі I2P"
 
 #: i2p2www/pages/site/research/index.html:10
 msgid ""
-"I2P is a very unique project that unfortunately has not received the "
-"wider\n"
-"academic attention it deserves. To date, most research focus on anonymous"
-" and\n"
-"onion-routing technology has been around Tor, and while those papers "
-"benefit us\n"
-"as well, there is a great need for I2P-focused research. This plays a key"
-" role\n"
-"in both maintaining the security and integrity of the network, as well as"
-"\n"
+"I2P is a very unique project that unfortunately has not received the wider\n"
+"academic attention it deserves. To date, most research focus on anonymous and\n"
+"onion-routing technology has been around Tor, and while those papers benefit us\n"
+"as well, there is a great need for I2P-focused research. This plays a key role\n"
+"in both maintaining the security and integrity of the network, as well as\n"
 "opening doors for more impactful future development."
 msgstr ""
 
@@ -58,17 +50,12 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"There is a large research community investigating a wide range of aspects"
-" of\n"
-"anonymity. For a current and comprehensive list of relevant papers, see "
-"the\n"
+"There is a large research community investigating a wide range of aspects of\n"
+"anonymity. For a current and comprehensive list of relevant papers, see the\n"
 "<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
-"I2P benefits from much of the research into Tor and onion routing, but "
-"there is\n"
-"little dedicated research interest into the theory behind I2P, and the "
-"choices\n"
-"and tradeoffs that the network makes. This presents a unique opportunity "
-"for\n"
+"I2P benefits from much of the research into Tor and onion routing, but there is\n"
+"little dedicated research interest into the theory behind I2P, and the choices\n"
+"and tradeoffs that the network makes. This presents a unique opportunity for\n"
 "original research.\n"
 msgstr ""
 
@@ -83,8 +70,7 @@ msgstr ""
 msgid ""
 "\n"
 "This page aims to outline the most needed fields of research, notes to\n"
-"potential researchers, our general safety guidelines as well as an "
-"expanding\n"
+"potential researchers, our general safety guidelines as well as an expanding\n"
 "list of open questions that you can begin on at any time.\n"
 msgstr ""
 
@@ -98,16 +84,12 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:44
 msgid ""
-"While all research on the I2P network is beneficial and appreciated, "
-"there are\n"
+"While all research on the I2P network is beneficial and appreciated, there are\n"
 "certain areas which are more in need than others - most so in defensive\n"
 "research. Most people enjoy coming up with fun ways to launch offensives\n"
-"against anonymous software, and this is further reinforced by the "
-"incentives in\n"
-"academic institutions. While we know it is often not the first choice for"
-"\n"
-"researchers, We would certainly appreciate any and all work towards ways "
-"to\n"
+"against anonymous software, and this is further reinforced by the incentives in\n"
+"academic institutions. While we know it is often not the first choice for\n"
+"researchers, We would certainly appreciate any and all work towards ways to\n"
 "fortify the network!"
 msgstr ""
 
@@ -118,27 +100,17 @@ msgstr ""
 #: i2p2www/pages/site/research/index.html:56
 #, python-format
 msgid ""
-"If you've decided on a research topic that aims to hands-on investigate "
-"the I2P\n"
-"network or solve a problem of large proportions we ask you to "
-"<b>please</b> \n"
-"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
-"team, the\n"
-"sooner the better. I2P is under constant development and a significant "
-"amount\n"
-"of roadmapping occurs, therefore your problem may have already been "
-"identified\n"
-"and flagged for update or patch. In the unlikely event you are conducting"
-"\n"
-"testing that overlaps with / would be of interest to another research "
-"project\n"
-"already in motion, we are also able to make you aware of this (with their"
-"\n"
-"permission, of course), and possibly open the door for collaboration. "
-"There is\n"
+"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
+"network or solve a problem of large proportions we ask you to <b>please</b> \n"
+"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
+"sooner the better. I2P is under constant development and a significant amount\n"
+"of roadmapping occurs, therefore your problem may have already been identified\n"
+"and flagged for update or patch. In the unlikely event you are conducting\n"
+"testing that overlaps with / would be of interest to another research project\n"
+"already in motion, we are also able to make you aware of this (with their\n"
+"permission, of course), and possibly open the door for collaboration. There is\n"
 "also a chance that the test itself may significantly harm the network or\n"
-"regular users, and the team may have ideas or suggestions to mitigate "
-"that risk\n"
+"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
 "and increase the safety of your testing."
 msgstr ""
 
@@ -154,13 +126,11 @@ msgstr "Загальні Рекомендації"
 msgid ""
 "<ol>\n"
 "  <li>\n"
-"    Consider the benefits and risks - is there any doubt that the "
-"research\n"
+"    Consider the benefits and risks - is there any doubt that the research\n"
 "    provides more value than danger?\n"
 "  </li>\n"
 "  <li>\n"
-"    If the research can be done on a test network then that is the "
-"preferred\n"
+"    If the research can be done on a test network then that is the preferred\n"
 "    method\n"
 "  </li>\n"
 "  <li>\n"
@@ -168,10 +138,8 @@ msgid ""
 "    collecting data about yourself\n"
 "  </li>\n"
 "  <li>\n"
-"    If you need 'bigger data', It is recommended to first see if you can "
-"use\n"
-"    data sets from previous experiments or other third party resources is"
-"\n"
+"    If you need 'bigger data', It is recommended to first see if you can use\n"
+"    data sets from previous experiments or other third party resources is\n"
 "    recommended\n"
 "  </li>\n"
 "  <li>\n"
@@ -179,10 +147,8 @@ msgid ""
 "    publication and collect as little as possible\n"
 "  </li>\n"
 "  <li>\n"
-"    After testing and before publish, review that all data which is to be"
-"\n"
-"    published publicly is <b><i>not</i></b> intended to be private by the"
-"\n"
+"    After testing and before publish, review that all data which is to be\n"
+"    published publicly is <b><i>not</i></b> intended to be private by the\n"
 "    originator\n"
 "  </li>\n"
 "</ol>"
@@ -194,32 +160,24 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:108
 msgid ""
-"I2P can be run as a separate test network by controlling the locations "
-"that a\n"
+"I2P can be run as a separate test network by controlling the locations that a\n"
 "new router reseeds from so that it only finds other test routers.\n"
 "\n"
-"The standard mode of operation is to have one JVM per router instance; "
-"hence\n"
-"running multiple copies of I2P on a single machine is inadvisable, both "
-"due to\n"
+"The standard mode of operation is to have one JVM per router instance; hence\n"
+"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
 "the potential resource drain and the certain port conflicts. To better\n"
-"facilitate setting up small test networks, I2P has a multirouter mode "
-"which\n"
+"facilitate setting up small test networks, I2P has a multirouter mode which\n"
 "enables multiple distinct routers to be run in the same JVM.\n"
 "\n"
-"MultiRouter can be started from the i2p base directory by running the "
-"below\n"
+"MultiRouter can be started from the i2p base directory by running the below\n"
 "command."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:124
 msgid ""
-"Additionally, I2P can be started in a virtual network mode. This mode "
-"disables\n"
-"all transports, allowing the router to be tested in isolation without "
-"network\n"
-"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
-"the\n"
+"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
+"all transports, allowing the router to be tested in isolation without network\n"
+"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
 "router.config before starting."
 msgstr ""
 
@@ -230,13 +188,10 @@ msgstr ""
 #: i2p2www/pages/site/research/index.html:133
 #, python-format
 msgid ""
-"As stated above in the researcher notes, please <a "
-"href=\"%(contact)s\">contact\n"
+"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
 "  us</a> before you commence your testing. While we do not discourage\n"
-"researchers from responsibly testing their ideas on the live network, if "
-"an\n"
-"attack becomes apparent and we don't have any line of communication then "
-"we\n"
+"researchers from responsibly testing their ideas on the live network, if an\n"
+"attack becomes apparent and we don't have any line of communication then we\n"
 "will end up taking countermeasures which could interfere with the test."
 msgstr ""
 
@@ -246,35 +201,23 @@ msgstr ""
 
 #: i2p2www/pages/site/research/index.html:143
 msgid ""
-"As of release 0.9.25, I2P supports a router family configuration. This "
-"provides\n"
-"researchers who run multiple routers with the means to publicly identify "
-"those\n"
-"routers. In turn, this helps the I2P project understand that these "
-"routers are\n"
-"not running an attack on the network. It also will prevent other routers "
-"from\n"
-"including multiple routers of the family in a single tunnel, which could "
-"lead\n"
-"to deanonymization. Routers that appear to be colluding but do not have a"
-"\n"
-"declared family may be assumed to be an attack on the network, and may be"
-"\n"
-"blocked. The best way to ensure the success of your research project is "
-"to work\n"
+"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
+"researchers who run multiple routers with the means to publicly identify those\n"
+"routers. In turn, this helps the I2P project understand that these routers are\n"
+"not running an attack on the network. It also will prevent other routers from\n"
+"including multiple routers of the family in a single tunnel, which could lead\n"
+"to deanonymization. Routers that appear to be colluding but do not have a\n"
+"declared family may be assumed to be an attack on the network, and may be\n"
+"blocked. The best way to ensure the success of your research project is to work\n"
 "with us directly."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:155
 msgid ""
-"A router family shares a private key so that participation in the family "
-"cannot\n"
-"be spoofed. To configure a router family, click on the 'I2P Internals' "
-"link in\n"
-"the router console, and then on the 'Family' tab. Follow the instructions"
-" there\n"
-"to generate the private key for the first router in the family. Then, "
-"export\n"
+"A router family shares a private key so that participation in the family cannot\n"
+"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
+"the router console, and then on the 'Family' tab. Follow the instructions there\n"
+"to generate the private key for the first router in the family. Then, export\n"
 "the key from that router, and import it to other members of the family."
 msgstr ""
 
@@ -326,59 +269,67 @@ msgstr "Пов'язані з мережею"
 msgid "Vulnerability Response Process"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:3
-msgid "January 2017"
-msgstr "Січень 2017"
-
 #: i2p2www/pages/site/research/vrp.html:6
 msgid ""
 "\n"
-"This process is subject to change. Please refer to this page for the "
-"current VRP."
+"This process is subject to change. Please refer to this page for the current VRP."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:10
+msgid "This page was last updated in June 2020."
+msgstr ""
+
+#: i2p2www/pages/site/research/vrp.html:12
+msgid ""
+"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
+"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
+"centers"
+msgstr ""
+
+#: i2p2www/pages/site/research/vrp.html:15
+msgid ""
+"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
+"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
+msgstr ""
+
+#: i2p2www/pages/site/research/vrp.html:18
 msgid "Point of Contact for Security Issues"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:14
+#: i2p2www/pages/site/research/vrp.html:22
 msgid "Security Response Team"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:16
-msgid "Only the following members have access to the security point of contact:"
+#: i2p2www/pages/site/research/vrp.html:24
+msgid ""
+"Echelon is the trusted security point-of-contact. He forwards e-mails to "
+"team members as appropriate."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:25
+#: i2p2www/pages/site/research/vrp.html:28
 msgid "Incident Response"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:28
-msgid "Researcher submits report via one or both of two methods:"
+#: i2p2www/pages/site/research/vrp.html:31
+msgid "Researcher submits report via:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:32
-msgid "Email"
-msgstr "Пошта"
-
 #: i2p2www/pages/site/research/vrp.html:37
 msgid ""
-"Response Team designates a Response Manager who is in charge of the "
-"particular\n"
+"Response Team designates a Response Manager who is in charge of the particular\n"
 "report based on availability and/or knowledge-set."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:42
 #, python-format
 msgid ""
-"In no more than %(limit)s working days, Response Team should gratefully\n"
+"In no more than %(limit)s working days, Response Team should\n"
 "respond to researcher using only encrypted methods."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:47
 msgid ""
-"Response Manager makes inquiries to satisfy any needed information and to"
-"\n"
+"Response Manager makes inquiries to satisfy any needed information and to\n"
 "confirm if submission is indeed a vulnerability."
 msgstr ""
 
@@ -398,369 +349,357 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:62
 msgid ""
-"Response Manager moves discussion to a new or existing ticket on public "
-"Trac if necessary."
+"Response Manager moves discussion to a new or existing ticket on public Trac"
+" if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:70
 msgid ""
-"If over email, Response Manager opens a HackerOne issue for new "
-"submission."
-msgstr ""
-
-#: i2p2www/pages/site/research/vrp.html:74
-msgid ""
 "\n"
 "Establish severity of vulnerability:\n"
 "  "
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:79
+#: i2p2www/pages/site/research/vrp.html:75
 msgid ""
-"Effects network as a whole, has potential to break entire network or is "
-"on a scale of great catastrophe."
+"Affects network as a whole, has potential to break entire network or is on a"
+" scale of great catastrophe."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:83
-msgid "Effects individual routers, or must be carefully exploited."
+#: i2p2www/pages/site/research/vrp.html:79
+msgid "Affects individual routers, or must be carefully exploited."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:87
+#: i2p2www/pages/site/research/vrp.html:83
 msgid "Is not easily exploitable."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:93
+#: i2p2www/pages/site/research/vrp.html:89
 msgid "Respond according to the severity of the vulnerability:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:97
+#: i2p2www/pages/site/research/vrp.html:93
 #, python-format
 msgid ""
-"HIGH severities must be notified on website and news feed within "
-"%(limit)s\n"
+"HIGH severities must be notified on website and news feed within %(limit)s\n"
 "working days of classification."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:102
-msgid "The notification should list appropriate steps for users to take, if any."
+#: i2p2www/pages/site/research/vrp.html:98
+msgid ""
+"The notification should list appropriate steps for users to take, if any."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:105
+#: i2p2www/pages/site/research/vrp.html:101
 msgid ""
-"The notification must not include any details that could suggest an "
-"exploitation\n"
+"The notification must not include any details that could suggest an exploitation\n"
 "path."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:109
+#: i2p2www/pages/site/research/vrp.html:105
 msgid "The latter takes precedence over the former."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:113
+#: i2p2www/pages/site/research/vrp.html:109
 msgid "MEDIUM and HIGH severities will require a Point Release."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:116
+#: i2p2www/pages/site/research/vrp.html:112
 msgid "LOW severities will be addressed in the next Regular Release."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:122
+#: i2p2www/pages/site/research/vrp.html:118
 msgid "Response Team applies appropriate patch(es)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:126
+#: i2p2www/pages/site/research/vrp.html:122
 msgid ""
-"Response Manager designates a PRIVATE monotone \"hotfix branch\" to work "
-"in."
+"Response Manager works on a patch LOCALLY, patches are shared by the "
+"response team via PGP-encrypted e-mail until such a time as it is safe to "
+"expose to the public."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:129
+#: i2p2www/pages/site/research/vrp.html:125
 msgid "Patches are reviewed with the researcher."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:132
+#: i2p2www/pages/site/research/vrp.html:128
 msgid ""
-"Any messages associated with PUBLIC commits during the time of review "
-"should not\n"
-"make reference to the security nature of the PRIVATE branch or its "
-"commits."
+"Any messages associated with PUBLIC commits during the time of review should not\n"
+"make reference to the security nature of the PRIVATE branch or its commits."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:136
+#: i2p2www/pages/site/research/vrp.html:132
 msgid "Vulnerability announcement is drafted."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:140
+#: i2p2www/pages/site/research/vrp.html:136
 msgid "Include severity of vulnerability."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:143
+#: i2p2www/pages/site/research/vrp.html:139
 msgid "Include systems/apps effected."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:146
+#: i2p2www/pages/site/research/vrp.html:142
 msgid "Include solutions (if any) if patch cannot be applied."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:150
+#: i2p2www/pages/site/research/vrp.html:146
 msgid "Release date is discussed."
 msgstr "Обговорюється дата для реліз."
 
-#: i2p2www/pages/site/research/vrp.html:156
+#: i2p2www/pages/site/research/vrp.html:152
 msgid ""
 "At release date, Response Team coordinates with developers to finalize "
 "update:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:160
+#: i2p2www/pages/site/research/vrp.html:156
 msgid "Response Manager propagates the \"hotfix branch\" to trunk."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:163
+#: i2p2www/pages/site/research/vrp.html:159
 msgid ""
-"Response Manager includes vulnerability announcement draft in release "
-"notes."
+"Response Manager includes vulnerability announcement draft in release notes."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:166
-msgid "Proceed with the Point or Regular Release."
+#: i2p2www/pages/site/research/vrp.html:162
+msgid ""
+"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
+"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
+"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
+"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:173
+#: i2p2www/pages/site/research/vrp.html:172
 msgid "Post-release Disclosure Process"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:176
+#: i2p2www/pages/site/research/vrp.html:175
 #, python-format
-msgid "Response Team has %(limit)s days to fulfill all points within section III."
+msgid ""
+"Response Team has %(limit)s days to fulfill all points within section III."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:180
-msgid "If the Incident Response process in section III is successfully completed:"
+#: i2p2www/pages/site/research/vrp.html:179
+msgid ""
+"If the Incident Response process in section III is successfully completed:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:184
+#: i2p2www/pages/site/research/vrp.html:183
 msgid ""
 "Response Manager contacts researcher and asks if researcher wishes for "
 "credit."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:187
+#: i2p2www/pages/site/research/vrp.html:186
 msgid "Finalize vulnerability announcement draft and include the following:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:191
+#: i2p2www/pages/site/research/vrp.html:190
 msgid "Project name and URL."
 msgstr "Назва проекту та URL."
 
-#: i2p2www/pages/site/research/vrp.html:194
+#: i2p2www/pages/site/research/vrp.html:193
 msgid "Versions known to be affected."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:197
+#: i2p2www/pages/site/research/vrp.html:196
 msgid ""
 "Versions known to be not affected (for example, the vulnerable code was "
 "introduced in a recent version, and older versions are therefore "
 "unaffected)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:200
+#: i2p2www/pages/site/research/vrp.html:199
 msgid "Versions not checked."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:203
+#: i2p2www/pages/site/research/vrp.html:202
 msgid "Type of vulnerability and its impact."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:206
+#: i2p2www/pages/site/research/vrp.html:205
 msgid "If already obtained or applicable, a CVE-ID."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:209
+#: i2p2www/pages/site/research/vrp.html:208
 msgid "The planned, coordinated release date."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:212
+#: i2p2www/pages/site/research/vrp.html:211
 msgid ""
 "Mitigating factors (for example, the vulnerability is only exposed in "
 "uncommon, non-default configurations)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:215
+#: i2p2www/pages/site/research/vrp.html:214
 msgid ""
-"Workarounds (configuration changes users can make to reduce their "
-"exposure to the vulnerability)."
+"Workarounds (configuration changes users can make to reduce their exposure "
+"to the vulnerability)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:218
+#: i2p2www/pages/site/research/vrp.html:217
 msgid "If applicable, credits to the original reporter."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:223
-msgid "Release finalized vulnerability announcement on website and in news feed."
+#: i2p2www/pages/site/research/vrp.html:222
+msgid ""
+"Release finalized vulnerability announcement on website and in news feed."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:226
+#: i2p2www/pages/site/research/vrp.html:230
 msgid ""
-"For HIGH severities, release finalized vulnerability announcement on "
-"well-known mailing lists:"
+"For HIGH severities, release finalized vulnerability announcement on well-"
+"known mailing lists:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:234
+#: i2p2www/pages/site/research/vrp.html:238
 msgid "If applicable, developers request a CVE-ID."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:238
+#: i2p2www/pages/site/research/vrp.html:242
 msgid ""
-"The commit that applied the fix is made reference too in a future commit "
-"and includes a CVE-ID."
+"The commit that applied the fix is made reference too in a future commit and"
+" includes a CVE-ID."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:246
+#: i2p2www/pages/site/research/vrp.html:250
 msgid ""
 "If the Incident Response process in section III is *not* successfully "
 "completed:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:250
+#: i2p2www/pages/site/research/vrp.html:254
 msgid ""
-"Response Team and developers organize an IRC meeting to discuss why/what "
-"points\n"
-"in section III were not resolved and how the team can resolve them in the"
-"\n"
+"Response Team and developers organize an IRC meeting to discuss why/what points\n"
+"in section III were not resolved and how the team can resolve them in the\n"
 "future."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:255
+#: i2p2www/pages/site/research/vrp.html:259
 msgid ""
-"Any developer meetings immediately following the incident should include "
-"points\n"
+"Any developer meetings immediately following the incident should include points\n"
 "made in section V."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:259
+#: i2p2www/pages/site/research/vrp.html:263
 msgid ""
 "If disputes arise about whether or when to disclose information about a\n"
-"vulnerability, the Response Team will publicly discuss the issue via IRC "
-"and\n"
+"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
 "attempt to reach consensus."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:264
+#: i2p2www/pages/site/research/vrp.html:268
 #, python-format
 msgid ""
-"If consensus on a timely disclosure is not met (no later than %(limit)s "
-"days),\n"
+"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
 "the researcher (after %(limit)s days) has every right to expose the\n"
 "vulnerability to the public."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:273
+#: i2p2www/pages/site/research/vrp.html:277
 msgid "Incident Analysis"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:276
+#: i2p2www/pages/site/research/vrp.html:280
 msgid "Isolate codebase"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:278
-#: i2p2www/pages/site/research/vrp.html:298
-msgid "Response Team and developers should coordinate to work on the following:"
+#: i2p2www/pages/site/research/vrp.html:282
+#: i2p2www/pages/site/research/vrp.html:302
+msgid ""
+"Response Team and developers should coordinate to work on the following:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:282
+#: i2p2www/pages/site/research/vrp.html:286
 msgid "Problematic implementation of classes/libraries/functions, etc."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:285
+#: i2p2www/pages/site/research/vrp.html:289
 msgid "Focus on apps/distro packaging, etc."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:288
+#: i2p2www/pages/site/research/vrp.html:292
 msgid "Operator/config error, etc."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:296
+#: i2p2www/pages/site/research/vrp.html:300
 msgid "Auditing"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:302
+#: i2p2www/pages/site/research/vrp.html:306
 msgid "Auditing of problem area(s) as discussed in point 1."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:305
+#: i2p2www/pages/site/research/vrp.html:309
 msgid "Generate internal reports and store for future reference."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:308
+#: i2p2www/pages/site/research/vrp.html:312
 msgid ""
-"If results are not sensitive, share with the public via IRC or public "
-"Trac."
+"If results are not sensitive, share with the public via IRC or public Trac."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:316
+#: i2p2www/pages/site/research/vrp.html:320
 #, python-format
 msgid ""
-"Response Team has %(limit)s days following completion of section III to "
-"ensure\n"
+"Response Team has %(limit)s days following completion of section III to ensure\n"
 "completion of section V."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:322
+#: i2p2www/pages/site/research/vrp.html:326
 msgid "Resolutions"
 msgstr "Вирішення"
 
-#: i2p2www/pages/site/research/vrp.html:324
+#: i2p2www/pages/site/research/vrp.html:328
 msgid ""
-"Any further questions or resolutions regarding the incident(s) between "
-"the\n"
-"researcher and response + development team after public disclosure can be"
-"\n"
+"Any further questions or resolutions regarding the incident(s) between the\n"
+"researcher and response + development team after public disclosure can be\n"
 "addressed via the following:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:338
+#: i2p2www/pages/site/research/vrp.html:341
 msgid "Continuous Improvement"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:341
+#: i2p2www/pages/site/research/vrp.html:344
 msgid ""
-"Response Team and developers should hold annual meetings to review the "
-"previous\n"
+"Response Team and developers should hold annual meetings to review the previous\n"
 "year's incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:346
+#: i2p2www/pages/site/research/vrp.html:349
 msgid ""
 "Response Team or designated person(s) should give a brief presentation, "
 "including:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:350
+#: i2p2www/pages/site/research/vrp.html:353
 msgid "Areas of I2P affected by the incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:353
+#: i2p2www/pages/site/research/vrp.html:356
 msgid "Any network downtime or monetary cost (if any) of the incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:356
+#: i2p2www/pages/site/research/vrp.html:359
 msgid "Ways in which the incidents could have been avoided (if any)."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:359
+#: i2p2www/pages/site/research/vrp.html:362
 msgid "How effective this process was in dealing with the incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:365
+#: i2p2www/pages/site/research/vrp.html:368
 msgid "After the presentation, Response Team and developers should discuss:"
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:369
+#: i2p2www/pages/site/research/vrp.html:372
 msgid "Potential changes to development processes to reduce future incidents."
 msgstr ""
 
-#: i2p2www/pages/site/research/vrp.html:372
+#: i2p2www/pages/site/research/vrp.html:375
 msgid "Potential changes to this process to improve future responses."
 msgstr ""
-
diff --git a/i2p2www/translations/zh/LC_MESSAGES/comparison.po b/i2p2www/translations/zh/LC_MESSAGES/comparison.po
index 01129534932a946507aee9025181c9bd2a86c8e2..2caed43c85ebecf5b95f3e7ba77e21f577afb341 100644
--- a/i2p2www/translations/zh/LC_MESSAGES/comparison.po
+++ b/i2p2www/translations/zh/LC_MESSAGES/comparison.po
@@ -1,28 +1,28 @@
-# Chinese translations for I2P.
-# Copyright (C) 2018 ORGANIZATION
+# Translations template for I2P.
+# Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
-# nobody <oiiu19@yahoo.com>, 2015
-# nobody <oiiu19@yahoo.com>, 2016
+# a7c0396e818c2941c33529bda1f6bf1b_d554568 <93d1ed349b85f9981f2c90624c315cde_129513>, 2015
+# a7c0396e818c2941c33529bda1f6bf1b_d554568 <93d1ed349b85f9981f2c90624c315cde_129513>, 2016
 # Scott Rhodes <starring169@gmail.com>, 2020
 # YFdyh000 <yfdyh000@gmail.com>, 2016
 # YFdyh000 <yfdyh000@gmail.com>, 2015-2016
 # yue gao <gaoyue@iie.ac.cn>, 2017
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
-"POT-Creation-Date: 2018-08-24 11:47+0000\n"
-"PO-Revision-Date: 2020-03-28 05:48+0000\n"
-"Last-Translator: Scott Rhodes <starring169@gmail.com>\n"
-"Language-Team: Chinese (China) "
-"(http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
-"Plural-Forms: nplurals=1; plural=0\n"
+"POT-Creation-Date: 2021-10-11 16:27+0000\n"
+"PO-Revision-Date: 2013-07-15 11:59+0000\n"
+"Last-Translator: Scott Rhodes <starring169@gmail.com>, 2020\n"
+"Language-Team: Chinese (China) (http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: zh_CN\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/pages/site/comparison/freenet.html:2
 msgid "I2P Compared to Freenet"
@@ -30,57 +30,37 @@ msgstr "I2P 相比 Freenet"
 
 #: i2p2www/pages/site/comparison/freenet.html:8
 msgid ""
-"Freenet is a fully distributed, peer to peer anonymous publishing "
-"network, offering \n"
-"secure ways to store data, as well as some approaches attempting to "
-"address the loads\n"
-"of a flash flood.  While Freenet is designed as a distributed data store,"
-" people have\n"
-"built applications on top of it to do more generic anonymous "
-"communication, such as \n"
+"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
+"secure ways to store data, as well as some approaches attempting to address the loads\n"
+"of a flash flood.  While Freenet is designed as a distributed data store, people have\n"
+"built applications on top of it to do more generic anonymous communication, such as \n"
 "static websites and message boards."
 msgstr "Freenet是一个完全分布式的P2P匿名发布网络,提供安全的数据存储方式,以及一些试图解决洪泛负载的方法。虽然Freenet的设计目的是分布式的数据存储,但是人们也在Freenet之上建立了一些应用程序,使得更通用的匿名通信成为可能,如静态网站和留言板等。"
 
 #: i2p2www/pages/site/comparison/freenet.html:16
 #, python-format
 msgid ""
-"Compared to I2P, Freenet offers some substantial benefits - it is a "
-"distributed data\n"
-"store, while I2P is not, allowing people to retrieve the content "
-"published by others \n"
-"even when the publisher is no longer online.  In addition, it should be "
-"able to \n"
-"distribute popular data fairly efficiently.  I2P itself does not and will"
-" not provide \n"
-"this functionality.  On the other hand, there is overlap for users who "
-"simply want to \n"
-"communicate with each other anonymously through websites, message boards,"
-" file sharing\n"
-"programs, etc.  There have also been some attempts to develop a "
-"distributed data \n"
+"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
+"store, while I2P is not, allowing people to retrieve the content published by others \n"
+"even when the publisher is no longer online.  In addition, it should be able to \n"
+"distribute popular data fairly efficiently.  I2P itself does not and will not provide \n"
+"this functionality.  On the other hand, there is overlap for users who simply want to \n"
+"communicate with each other anonymously through websites, message boards, file sharing\n"
+"programs, etc.  There have also been some attempts to develop a distributed data \n"
 "store to run on top of I2P,\n"
 "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
 "but nothing is yet ready for general use."
-msgstr ""
-"相比于I2P,Freenet提供了一些实质性的好处——它是一个分布式的数据存储网络,而I2P并不是,Freenet允许用户检索已发布的内容,即便内容的发布者已经离线了。此外,Freenet应该能够高效地分发流行数据。I2P本身不提供此功能。另一方面,对于那些只想通过网站、留言板、文件共享程序等方式匿名交流的用户来说,这是有重叠的。I2P也进行了一些尝试以支持分布式数据存储,(最近的是<a"
-" href=\"%(tahoe)s\">Tahoe-LAFS</a>的移植) 但还没有准备好全面使用。"
+msgstr "相比于I2P,Freenet提供了一些实质性的好处——它是一个分布式的数据存储网络,而I2P并不是,Freenet允许用户检索已发布的内容,即便内容的发布者已经离线了。此外,Freenet应该能够高效地分发流行数据。I2P本身不提供此功能。另一方面,对于那些只想通过网站、留言板、文件共享程序等方式匿名交流的用户来说,这是有重叠的。I2P也进行了一些尝试以支持分布式数据存储,(最近的是<a href=\"%(tahoe)s\">Tahoe-LAFS</a>的移植) 但还没有准备好全面使用。"
 
 #: i2p2www/pages/site/comparison/freenet.html:29
 msgid ""
-"However, even ignoring any implementations issues, there are some "
-"concerns \n"
-"about Freenet's algorithms from both a scalability and anonymity "
-"perspective, owing \n"
-"largely to Freenet's heuristic driven routing.  The interactions of "
-"various techniques \n"
-"certainly may successfully deter various attacks, and perhaps some "
-"aspects of the \n"
-"routing algorithms will provide the hoped for scalability.  "
-"Unfortunately, not much\n"
-"analysis of the algorithms involved has resulted in positive results, but"
-" there is still\n"
-"hope.  At the very least, Freenet does provide substantial anonymity "
-"against an attacker\n"
+"However, even ignoring any implementations issues, there are some concerns \n"
+"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
+"largely to Freenet's heuristic driven routing.  The interactions of various techniques \n"
+"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
+"routing algorithms will provide the hoped for scalability.  Unfortunately, not much\n"
+"analysis of the algorithms involved has resulted in positive results, but there is still\n"
+"hope.  At the very least, Freenet does provide substantial anonymity against an attacker\n"
 "who does not have the resources necessary to analyze it further."
 msgstr ""
 
@@ -90,15 +70,11 @@ msgstr "I2P与其他项目的比较"
 
 #: i2p2www/pages/site/comparison/index.html:4
 msgid ""
-"There are a great many other applications and projects working on "
-"anonymous \n"
-"communication and I2P has been inspired by much of their efforts.  This "
-"is not \n"
+"There are a great many other applications and projects working on anonymous \n"
+"communication and I2P has been inspired by much of their efforts.  This is not \n"
 "a comprehensive list of anonymity resources - both freehaven's \n"
-"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
-"Bibliography</a>\n"
-"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
-"projects</a>\n"
+"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
+"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
 "serve that purpose well.  That said, a few systems stand out for further\n"
 "comparison. The following have individual comparison pages:"
 msgstr ""
@@ -113,10 +89,8 @@ msgstr ""
 #: i2p2www/pages/site/comparison/index.html:33
 #, python-format
 msgid ""
-"The content of this page is subject to update, discussion and dispute, "
-"and we welcome comments and additions.\n"
-"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
-"ticket on Trac</a>."
+"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
+"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:2
@@ -134,52 +108,38 @@ msgid ""
 "For an overview of available comparisons, see the\n"
 "<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:29
 #, python-format
 msgid ""
 "RetroShare is a set of peer-to-peer applications running in a\n"
-"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
-"such F2F \n"
-"network makes direct IP connections only to authenticated peers "
-"(\"friends\") after explicit \n"
-"certificates exchange. It can discover unauthenticated peers (e.g. "
-"friends of friends), \n"
-"but connections to them are relayed over \"friend\" peers for providing "
-"privacy and anonymity."
+"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
+"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
+"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
+"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:37
 msgid ""
-"RetroShare is designed to build a private network of trusted peers, while"
-" I2P is designed \n"
-"to be a large-scaled public anonymous network. Recent versions of "
-"RetroShare have options to run \n"
-"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
-"connections are \n"
+"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
+"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
+"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
 "anonymized and no trust is required for adding new \"friends\"."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:48
 #, python-format
 msgid ""
-"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
-" \n"
-"anonymizing proxies, allowing people to tunnel out through the low "
-"latency \n"
-"mix network.  Morphmix includes some very interesting collusion detection"
-" \n"
-"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
-"IP\n"
+"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
+"anonymizing proxies, allowing people to tunnel out through the low latency \n"
+"mix network.  Morphmix includes some very interesting collusion detection \n"
+"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
 "addresses to accomplish the same.  The two primary differences between \n"
-"these systems and I2P are related to I2P's <a "
-"href=\"%(threatmodel)s\">threat model</a> \n"
-"and their out-proxy design (as opposed to providing both sender and "
-"receiver \n"
-"anonymity).  There is source code available to both systems, but we are "
-"not aware \n"
+"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
+"and their out-proxy design (as opposed to providing both sender and receiver \n"
+"anonymity).  There is source code available to both systems, but we are not aware \n"
 "of their use outside of academic environments."
 msgstr ""
 
@@ -187,19 +147,15 @@ msgstr ""
 #, python-format
 msgid ""
 "\n"
-"Mixminion and Mixmaster are networks to support anonymous email against a"
-" very\n"
+"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
 "powerful adversary.\n"
 "High-latency messaging applications running on top of I2P\n"
 "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
 "may perhaps prove adequate to meet the threat\n"
-"model of those adversaries, while running in parallel along side the "
-"needs of low latency users, to provide\n"
+"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
 "a significantly larger anonymity set.\n"
-"High-latency support within the I2P router itself may or may not be added"
-" in a distant future release.\n"
-"It is too early to say if I2P will meet the needs of users requiring "
-"extreme protection for email."
+"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
+"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:184
@@ -211,32 +167,20 @@ msgstr ""
 #: i2p2www/pages/site/comparison/other-networks.html:194
 #, python-format
 msgid ""
-"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
-"web requests,\n"
-"and as such it has a few centralized nodes (participants in the cascade) "
-"that blend\n"
-"and mix requests from clients through the sequence of nodes (the cascade)"
-" before \n"
-"proxying out onto the web.  The scope, threat model, and security is "
-"substantially \n"
-"different from I2P, but for those who don't require significant anonymity"
-" but still\n"
-"are not satisfied with an Anonymizer-like service, JAP is worth "
-"reviewing.  One\n"
-"caution to note is that anyone under the jurisdiction of the German "
-"courts may want\n"
-"to take care, as the German Federal Bureau of Criminal Investigation "
-"(FBCI) has \n"
+"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
+"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
+"and mix requests from clients through the sequence of nodes (the cascade) before \n"
+"proxying out onto the web.  The scope, threat model, and security is substantially \n"
+"different from I2P, but for those who don't require significant anonymity but still\n"
+"are not satisfied with an Anonymizer-like service, JAP is worth reviewing.  One\n"
+"caution to note is that anyone under the jurisdiction of the German courts may want\n"
+"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
 "successfully mounted an \n"
 "<a href=\"%(url)s\">attack</a> \n"
-"on the network.  Even though the method of this attack was later found to"
-" be illegal \n"
-"in the German courts, the fact that the data was successfully collected "
-"is the \n"
-"concern.  Courts change their minds based upon circumstance, and this is "
-"evidence that \n"
-"if a government body or intelligence agency wanted to, they could gather "
-"the data, even \n"
+"on the network.  Even though the method of this attack was later found to be illegal \n"
+"in the German courts, the fact that the data was successfully collected is the \n"
+"concern.  Courts change their minds based upon circumstance, and this is evidence that \n"
+"if a government body or intelligence agency wanted to, they could gather the data, even \n"
 "if it may be found inadmissible in some courts later)"
 msgstr ""
 
@@ -245,36 +189,23 @@ msgstr ""
 msgid ""
 "Both of these systems work through the same basic \n"
 "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
-"anonymity based on the threat model of providing plausible deniability "
-"against a simple \n"
-"non-colluding adversary.  With the antnet routing, they first either do a"
-" random walk or a \n"
-"broadcast search to find some peer with the data or identity desired, and"
-" then use a feedback\n"
-"algorithm to optimize that found path.  This works well for applications "
-"that merely want to know \n"
-"what other people around them have to offer - \"How are y'all doing\" vs."
-" \"Hey Alice, how are you\" - \n"
-"you basically get a local cluster of nodes that can share files with and "
-"maintain some degree of \n"
-"anonymity (though you don't have much control over who is in that group "
-"of peers)."
+"anonymity based on the threat model of providing plausible deniability against a simple \n"
+"non-colluding adversary.  With the antnet routing, they first either do a random walk or a \n"
+"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
+"algorithm to optimize that found path.  This works well for applications that merely want to know \n"
+"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
+"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
+"anonymity (though you don't have much control over who is in that group of peers)."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:228
 msgid ""
-"However, the algorithm does not scale well at all - if the application "
-"wants to speak with a \n"
-"particular peer it ends up doing a broadcast search or random walk "
-"(though if they are lucky enough\n"
-"for that to succeed, the antnet routing should optimize that found "
-"connection).  This means that \n"
-"while these networks can work great at small scales, they are not "
-"suitable for large networks where\n"
-"someone wants to get in touch with another specific peer.  That does not "
-"mean that there is no \n"
-"value in these systems, just that their applicability is limited to "
-"situations where their \n"
+"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
+"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
+"for that to succeed, the antnet routing should optimize that found connection).  This means that \n"
+"while these networks can work great at small scales, they are not suitable for large networks where\n"
+"someone wants to get in touch with another specific peer.  That does not mean that there is no \n"
+"value in these systems, just that their applicability is limited to situations where their \n"
 "particular issues can be addressed."
 msgstr ""
 
@@ -282,10 +213,8 @@ msgstr ""
 #, python-format
 msgid ""
 "This was a closed-source network targeted at Iranian users.\n"
-"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
-"circumvention tool</a>.\n"
-"Suffice it to say that being closed source and publicly targeting a "
-"specific country are not good ideas.\n"
+"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
+"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
 "I2P is, of course, open source. However, that source, and our\n"
 "<a href=\"%(docs)s\">technical documentation</a>, need much more review."
 msgstr ""
@@ -299,7 +228,7 @@ msgstr "付费VPN服务"
 #, python-format
 msgid ""
 "You may contribute an analysis by entering a\n"
-"<a href=\"%(trac)s\">new ticket on Trac</a>."
+"<a href=\"%(trac)s\">new issue on Github</a>."
 msgstr ""
 
 #: i2p2www/pages/site/comparison/other-networks.html:254
@@ -434,7 +363,7 @@ msgstr "隐身服务"
 
 #: i2p2www/pages/site/comparison/tor.html:63
 #: i2p2www/pages/site/comparison/tor.html:68
-msgid "Eepsite or Destination"
+msgid "I2P Site or Destination"
 msgstr ""
 
 #: i2p2www/pages/site/comparison/tor.html:64
@@ -505,13 +434,10 @@ msgstr "Tor 相对 I2P 的优势"
 
 #: i2p2www/pages/site/comparison/tor.html:78
 msgid ""
-"Much bigger user base; much more visibility in the academic and hacker "
-"communities; benefits from\n"
+"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
 "formal studies of anonymity, resistance, and performance;\n"
 "has a non-anonymous, visible, university-based leader"
-msgstr ""
-"大许多的用户群;在学术和黑客群体中得到较多关注;\n"
-"基于正式研究的匿名性、抵抗性和性能优势;有一个非匿名的,来自大学的领导者"
+msgstr "大许多的用户群;在学术和黑客群体中得到较多关注;\n基于正式研究的匿名性、抵抗性和性能优势;有一个非匿名的,来自大学的领导者"
 
 #: i2p2www/pages/site/comparison/tor.html:84
 msgid "Has already solved some scaling issues I2P has yet to address"
@@ -527,29 +453,24 @@ msgstr "有更多的开发者,其中有些是全职的"
 
 #: i2p2www/pages/site/comparison/tor.html:88
 msgid ""
-"More resistant to state-level blocking due to TLS transport layer and "
-"bridges\n"
-"(I2P has proposals for \"full restricted routes\" but these are not yet "
-"implemented)"
-msgstr ""
-"由于具有基于 TLS 的传输和网桥,对国家级封锁有更强的抵抗\n"
-"(I2P 有“完全限制路由”的提案,但还没有实现)"
+"More resistant to state-level blocking due to TLS transport layer and bridges\n"
+"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
+msgstr "由于具有基于 TLS 的传输和网桥,对国家级封锁有更强的抵抗\n(I2P 有“完全限制路由”的提案,但还没有实现)"
 
 #: i2p2www/pages/site/comparison/tor.html:93
 msgid "Big enough that it has had to adapt to blocking and DOS attempts"
 msgstr "足够大所以它已经适应了封锁和拒绝服务攻击"
 
 #: i2p2www/pages/site/comparison/tor.html:94
-msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
+msgid ""
+"Designed and optimized for exit traffic, with a large number of exit nodes"
 msgstr "为出口流量设计和优化,有大量的出口节点"
 
 #: i2p2www/pages/site/comparison/tor.html:96
 msgid ""
 "Better documentation, has formal papers and specifications,\n"
 "better website, many more translations"
-msgstr ""
-"更好的文档,拥有正式文件和规范,\n"
-"更美观的网页,多许多的翻译"
+msgstr "更好的文档,拥有正式文件和规范,\n更美观的网页,多许多的翻译"
 
 #: i2p2www/pages/site/comparison/tor.html:101
 msgid "More efficient with memory usage"
@@ -581,8 +502,8 @@ msgstr "I2P 相对 Tor 的优势"
 
 #: i2p2www/pages/site/comparison/tor.html:120
 msgid ""
-"Designed and optimized for hidden services, which are much faster than in"
-" Tor"
+"Designed and optimized for hidden services, which are much faster than in "
+"Tor"
 msgstr "专为隐藏服务设计和优化,在这方面比 Tor 快许多"
 
 #: i2p2www/pages/site/comparison/tor.html:121
@@ -599,9 +520,7 @@ msgstr "通过不断分析和比较性能,而不是根据目录声称的流量
 msgid ""
 "Floodfill peers (\"directory servers\") are varying and untrusted,\n"
 "rather than hardcoded"
-msgstr ""
-"种子节点(“目录服务器”)是持续变化并且不被信任的,\n"
-"而不是硬编码写入"
+msgstr "种子节点(“目录服务器”)是持续变化并且不被信任的,\n而不是硬编码写入"
 
 #: i2p2www/pages/site/comparison/tor.html:134
 msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
@@ -721,4 +640,3 @@ msgid ""
 "where the endpoint will inject dummy messages if there\n"
 "are insufficient messages, etc)"
 msgstr ""
-
diff --git a/i2p2www/translations/zh/LC_MESSAGES/research.po b/i2p2www/translations/zh/LC_MESSAGES/research.po
index 875c3ed4cd1de4622d30959f2a891709075612ee..9c58ff4c2c5f20aed89a9f8eb6e81a91f263e147 100644
--- a/i2p2www/translations/zh/LC_MESSAGES/research.po
+++ b/i2p2www/translations/zh/LC_MESSAGES/research.po
@@ -1,7 +1,7 @@
-# Chinese translations for I2P.
+# Translations template for I2P.
 # Copyright (C) 2021 ORGANIZATION
 # This file is distributed under the same license as the I2P project.
-#
+# 
 # Translators:
 # bright hong <heathcliff2333@outlook.com>, 2020
 # xkimo_daeee <michael_ies@yahoo.com>, 2014
@@ -11,18 +11,18 @@
 # YFdyh000 <yfdyh000@gmail.com>, 2014,2016
 msgid ""
 msgstr ""
-"Project-Id-Version:  I2P\n"
+"Project-Id-Version: I2P\n"
 "Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
 "POT-Creation-Date: 2021-04-26 14:51+0000\n"
-"PO-Revision-Date: 2021-05-05 16:50+0000\n"
-"Last-Translator: Scott Rhodes <starring169@gmail.com>\n"
-"Language-Team: Chinese (China) "
-"(http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
-"Plural-Forms: nplurals=1; plural=0\n"
+"PO-Revision-Date: 2013-07-15 12:01+0000\n"
+"Last-Translator: Scott Rhodes <starring169@gmail.com>, 2020-2021\n"
+"Language-Team: Chinese (China) (http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "Generated-By: Babel 1.3\n"
+"Language: zh_CN\n"
+"Plural-Forms: nplurals=1; plural=0;\n"
 
 #: i2p2www/pages/site/research/index.html:2
 msgid "Academic Research"
@@ -43,16 +43,11 @@ msgstr "关于I2P网络的学术研究"
 
 #: i2p2www/pages/site/research/index.html:10
 msgid ""
-"I2P is a very unique project that unfortunately has not received the "
-"wider\n"
-"academic attention it deserves. To date, most research focus on anonymous"
-" and\n"
-"onion-routing technology has been around Tor, and while those papers "
-"benefit us\n"
-"as well, there is a great need for I2P-focused research. This plays a key"
-" role\n"
-"in both maintaining the security and integrity of the network, as well as"
-"\n"
+"I2P is a very unique project that unfortunately has not received the wider\n"
+"academic attention it deserves. To date, most research focus on anonymous and\n"
+"onion-routing technology has been around Tor, and while those papers benefit us\n"
+"as well, there is a great need for I2P-focused research. This plays a key role\n"
+"in both maintaining the security and integrity of the network, as well as\n"
 "opening doors for more impactful future development."
 msgstr "I2P是一个特别的项目,但它在学术圈没有得到应有的关注。目前,大多数关于匿名性和“洋葱”路由的研究都是围绕Tor进行的,尽管这些文章对我们也有帮助,我们仍认为需要有围绕I2P的研究。这在保持网络的安全性和正确性以及对于启示未来更有影响力的开发中扮演了重要角色。"
 
@@ -60,24 +55,14 @@ msgstr "I2P是一个特别的项目,但它在学术圈没有得到应有的关
 #, python-format
 msgid ""
 "\n"
-"There is a large research community investigating a wide range of aspects"
-" of\n"
-"anonymity. For a current and comprehensive list of relevant papers, see "
-"the\n"
+"There is a large research community investigating a wide range of aspects of\n"
+"anonymity. For a current and comprehensive list of relevant papers, see the\n"
 "<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
-"I2P benefits from much of the research into Tor and onion routing, but "
-"there is\n"
-"little dedicated research interest into the theory behind I2P, and the "
-"choices\n"
-"and tradeoffs that the network makes. This presents a unique opportunity "
-"for\n"
+"I2P benefits from much of the research into Tor and onion routing, but there is\n"
+"little dedicated research interest into the theory behind I2P, and the choices\n"
+"and tradeoffs that the network makes. This presents a unique opportunity for\n"
 "original research.\n"
-msgstr ""
-"\n"
-"有一个大型研究社区研究匿名性的方方面面。想寻找当前全面的论文列表,请参阅<a "
-"href=\"%(anonbib)s\">自由避风港匿名参考文献Free Haven Anonymity Bibliography</a>。\n"
-"I2P 得益于大量对 Tor 和洋葱路由的研究。但是,对I2P背后的理论以及网络做出的选择和权衡的研究几乎没有。这为原创研究提供了一个独特的机会。"
-"\n"
+msgstr "\n有一个大型研究社区研究匿名性的方方面面。想寻找当前全面的论文列表,请参阅<a href=\"%(anonbib)s\">自由避风港匿名参考文献Free Haven Anonymity Bibliography</a>。\nI2P 得益于大量对 Tor 和洋葱路由的研究。但是,对I2P背后的理论以及网络做出的选择和权衡的研究几乎没有。这为原创研究提供了一个独特的机会。\n"
 
 #: i2p2www/pages/site/research/index.html:29
 #, python-format
@@ -90,12 +75,9 @@ msgstr "已知的已发表的有关 I2P 的论文在<a href=\"%(papers)s\">这
 msgid ""
 "\n"
 "This page aims to outline the most needed fields of research, notes to\n"
-"potential researchers, our general safety guidelines as well as an "
-"expanding\n"
+"potential researchers, our general safety guidelines as well as an expanding\n"
 "list of open questions that you can begin on at any time.\n"
-msgstr ""
-"\n"
-"本页面希望概括出最急需的研究方面,对潜在研究人员的寄语,我们总的安全指导原则以及一堆你可以着手的开放性问题。\n"
+msgstr "\n本页面希望概括出最急需的研究方面,对潜在研究人员的寄语,我们总的安全指导原则以及一堆你可以着手的开放性问题。\n"
 
 #: i2p2www/pages/site/research/index.html:40
 msgid "Notes to Researchers:"
@@ -107,16 +89,12 @@ msgstr "防御性研究"
 
 #: i2p2www/pages/site/research/index.html:44
 msgid ""
-"While all research on the I2P network is beneficial and appreciated, "
-"there are\n"
+"While all research on the I2P network is beneficial and appreciated, there are\n"
 "certain areas which are more in need than others - most so in defensive\n"
 "research. Most people enjoy coming up with fun ways to launch offensives\n"
-"against anonymous software, and this is further reinforced by the "
-"incentives in\n"
-"academic institutions. While we know it is often not the first choice for"
-"\n"
-"researchers, We would certainly appreciate any and all work towards ways "
-"to\n"
+"against anonymous software, and this is further reinforced by the incentives in\n"
+"academic institutions. While we know it is often not the first choice for\n"
+"researchers, We would certainly appreciate any and all work towards ways to\n"
 "fortify the network!"
 msgstr "我们认为所有关于I2P网络的研究都是有用的,且欢迎这样的研究,尽管如此,其中一些领域的研究比起别的更急需--主要在于防御性研究。许多人享受着想出对匿名软件的花式攻击方法,这种状况又被学校的奖励机制助长。尽管我们知道这不是研究人员的第一选择,我们仍期盼任何能够帮助强化网络的工作。"
 
@@ -127,31 +105,19 @@ msgstr "攻性和分析测试"
 #: i2p2www/pages/site/research/index.html:56
 #, python-format
 msgid ""
-"If you've decided on a research topic that aims to hands-on investigate "
-"the I2P\n"
-"network or solve a problem of large proportions we ask you to "
-"<b>please</b> \n"
-"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
-"team, the\n"
-"sooner the better. I2P is under constant development and a significant "
-"amount\n"
-"of roadmapping occurs, therefore your problem may have already been "
-"identified\n"
-"and flagged for update or patch. In the unlikely event you are conducting"
-"\n"
-"testing that overlaps with / would be of interest to another research "
-"project\n"
-"already in motion, we are also able to make you aware of this (with their"
-"\n"
-"permission, of course), and possibly open the door for collaboration. "
-"There is\n"
+"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
+"network or solve a problem of large proportions we ask you to <b>please</b> \n"
+"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
+"sooner the better. I2P is under constant development and a significant amount\n"
+"of roadmapping occurs, therefore your problem may have already been identified\n"
+"and flagged for update or patch. In the unlikely event you are conducting\n"
+"testing that overlaps with / would be of interest to another research project\n"
+"already in motion, we are also able to make you aware of this (with their\n"
+"permission, of course), and possibly open the door for collaboration. There is\n"
 "also a chance that the test itself may significantly harm the network or\n"
-"regular users, and the team may have ideas or suggestions to mitigate "
-"that risk\n"
+"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
 "and increase the safety of your testing."
-msgstr ""
-"如果您决定做一个关于I2P的课题,一步步分析I2P网络,或解决大问题时,我们<b>恳切希望</b>您能与我们的开发团队<a "
-"href=\"%(contact)s\">交流您的想法</a>,越快越好。I2P在持续开发中,会有大量开发路线,所以您的问题可能已经被标记准备更新解决。极少数情况下您的测试可能与别的研究组重合,我们也会提前告诉您(当然了,在他们的允许下),或许能促成您与另一团队的合作。也有可能测试本身会严重损害网络或普通用户,开发团队会给您建议来减少风险,增加测试安全性。"
+msgstr "如果您决定做一个关于I2P的课题,一步步分析I2P网络,或解决大问题时,我们<b>恳切希望</b>您能与我们的开发团队<a href=\"%(contact)s\">交流您的想法</a>,越快越好。I2P在持续开发中,会有大量开发路线,所以您的问题可能已经被标记准备更新解决。极少数情况下您的测试可能与别的研究组重合,我们也会提前告诉您(当然了,在他们的允许下),或许能促成您与另一团队的合作。也有可能测试本身会严重损害网络或普通用户,开发团队会给您建议来减少风险,增加测试安全性。"
 
 #: i2p2www/pages/site/research/index.html:71
 msgid "Research Ethics &amp; Testing the Network"
@@ -165,13 +131,11 @@ msgstr ""
 msgid ""
 "<ol>\n"
 "  <li>\n"
-"    Consider the benefits and risks - is there any doubt that the "
-"research\n"
+"    Consider the benefits and risks - is there any doubt that the research\n"
 "    provides more value than danger?\n"
 "  </li>\n"
 "  <li>\n"
-"    If the research can be done on a test network then that is the "
-"preferred\n"
+"    If the research can be done on a test network then that is the preferred\n"
 "    method\n"
 "  </li>\n"
 "  <li>\n"
@@ -179,10 +143,8 @@ msgid ""
 "    collecting data about yourself\n"
 "  </li>\n"
 "  <li>\n"
-"    If you need 'bigger data', It is recommended to first see if you can "
-"use\n"
-"    data sets from previous experiments or other third party resources is"
-"\n"
+"    If you need 'bigger data', It is recommended to first see if you can use\n"
+"    data sets from previous experiments or other third party resources is\n"
 "    recommended\n"
 "  </li>\n"
 "  <li>\n"
@@ -190,10 +152,8 @@ msgid ""
 "    publication and collect as little as possible\n"
 "  </li>\n"
 "  <li>\n"
-"    After testing and before publish, review that all data which is to be"
-"\n"
-"    published publicly is <b><i>not</i></b> intended to be private by the"
-"\n"
+"    After testing and before publish, review that all data which is to be\n"
+"    published publicly is <b><i>not</i></b> intended to be private by the\n"
 "    originator\n"
 "  </li>\n"
 "</ol>"
@@ -205,32 +165,24 @@ msgstr "使用测试网络攻击 I2P"
 
 #: i2p2www/pages/site/research/index.html:108
 msgid ""
-"I2P can be run as a separate test network by controlling the locations "
-"that a\n"
+"I2P can be run as a separate test network by controlling the locations that a\n"
 "new router reseeds from so that it only finds other test routers.\n"
 "\n"
-"The standard mode of operation is to have one JVM per router instance; "
-"hence\n"
-"running multiple copies of I2P on a single machine is inadvisable, both "
-"due to\n"
+"The standard mode of operation is to have one JVM per router instance; hence\n"
+"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
 "the potential resource drain and the certain port conflicts. To better\n"
-"facilitate setting up small test networks, I2P has a multirouter mode "
-"which\n"
+"facilitate setting up small test networks, I2P has a multirouter mode which\n"
 "enables multiple distinct routers to be run in the same JVM.\n"
 "\n"
-"MultiRouter can be started from the i2p base directory by running the "
-"below\n"
+"MultiRouter can be started from the i2p base directory by running the below\n"
 "command."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:124
 msgid ""
-"Additionally, I2P can be started in a virtual network mode. This mode "
-"disables\n"
-"all transports, allowing the router to be tested in isolation without "
-"network\n"
-"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
-"the\n"
+"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
+"all transports, allowing the router to be tested in isolation without network\n"
+"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
 "router.config before starting."
 msgstr ""
 
@@ -241,13 +193,10 @@ msgstr ""
 #: i2p2www/pages/site/research/index.html:133
 #, python-format
 msgid ""
-"As stated above in the researcher notes, please <a "
-"href=\"%(contact)s\">contact\n"
+"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
 "  us</a> before you commence your testing. While we do not discourage\n"
-"researchers from responsibly testing their ideas on the live network, if "
-"an\n"
-"attack becomes apparent and we don't have any line of communication then "
-"we\n"
+"researchers from responsibly testing their ideas on the live network, if an\n"
+"attack becomes apparent and we don't have any line of communication then we\n"
 "will end up taking countermeasures which could interfere with the test."
 msgstr ""
 
@@ -257,35 +206,23 @@ msgstr "路由器家族配置"
 
 #: i2p2www/pages/site/research/index.html:143
 msgid ""
-"As of release 0.9.25, I2P supports a router family configuration. This "
-"provides\n"
-"researchers who run multiple routers with the means to publicly identify "
-"those\n"
-"routers. In turn, this helps the I2P project understand that these "
-"routers are\n"
-"not running an attack on the network. It also will prevent other routers "
-"from\n"
-"including multiple routers of the family in a single tunnel, which could "
-"lead\n"
-"to deanonymization. Routers that appear to be colluding but do not have a"
-"\n"
-"declared family may be assumed to be an attack on the network, and may be"
-"\n"
-"blocked. The best way to ensure the success of your research project is "
-"to work\n"
+"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
+"researchers who run multiple routers with the means to publicly identify those\n"
+"routers. In turn, this helps the I2P project understand that these routers are\n"
+"not running an attack on the network. It also will prevent other routers from\n"
+"including multiple routers of the family in a single tunnel, which could lead\n"
+"to deanonymization. Routers that appear to be colluding but do not have a\n"
+"declared family may be assumed to be an attack on the network, and may be\n"
+"blocked. The best way to ensure the success of your research project is to work\n"
 "with us directly."
 msgstr ""
 
 #: i2p2www/pages/site/research/index.html:155
 msgid ""
-"A router family shares a private key so that participation in the family "
-"cannot\n"
-"be spoofed. To configure a router family, click on the 'I2P Internals' "
-"link in\n"
-"the router console, and then on the 'Family' tab. Follow the instructions"
-" there\n"
-"to generate the private key for the first router in the family. Then, "
-"export\n"
+"A router family shares a private key so that participation in the family cannot\n"
+"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
+"the router console, and then on the 'Family' tab. Follow the instructions there\n"
+"to generate the private key for the first router in the family. Then, export\n"
 "the key from that router, and import it to other members of the family."
 msgstr ""
 
@@ -340,8 +277,7 @@ msgstr "漏洞报告流程"
 #: i2p2www/pages/site/research/vrp.html:6
 msgid ""
 "\n"
-"This process is subject to change. Please refer to this page for the "
-"current VRP."
+"This process is subject to change. Please refer to this page for the current VRP."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:10
@@ -350,22 +286,15 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:12
 msgid ""
-"Researchers: while you research/hack, we ask that you refrain from the "
-"following: - Performing active exploits or Denial of Service attacks on "
-"the\n"
-"i2p network - Performing social engineering on i2p development team "
-"members - Performing any physical or electronic attempts against i2p "
-"property and/or data\n"
+"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
+"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
 "centers"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:15
 msgid ""
-"As i2p is an open-source community, many volunteers and development team "
-"members run their own I2P Sites as well as public (“non-private "
-"internet”) domains. These\n"
-"sites/servers are NOT in the scope of the vulnerability assessment / "
-"response process, only the underlying code of i2p is."
+"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
+"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:18
@@ -392,8 +321,7 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:37
 msgid ""
-"Response Team designates a Response Manager who is in charge of the "
-"particular\n"
+"Response Team designates a Response Manager who is in charge of the particular\n"
 "report based on availability and/or knowledge-set."
 msgstr ""
 
@@ -406,8 +334,7 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:47
 msgid ""
-"Response Manager makes inquiries to satisfy any needed information and to"
-"\n"
+"Response Manager makes inquiries to satisfy any needed information and to\n"
 "confirm if submission is indeed a vulnerability."
 msgstr ""
 
@@ -427,8 +354,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:62
 msgid ""
-"Response Manager moves discussion to a new or existing ticket on public "
-"Trac if necessary."
+"Response Manager moves discussion to a new or existing ticket on public Trac"
+" if necessary."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:70
@@ -440,8 +367,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:75
 msgid ""
-"Affects network as a whole, has potential to break entire network or is "
-"on a scale of great catastrophe."
+"Affects network as a whole, has potential to break entire network or is on a"
+" scale of great catastrophe."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:79
@@ -459,19 +386,18 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:93
 #, python-format
 msgid ""
-"HIGH severities must be notified on website and news feed within "
-"%(limit)s\n"
+"HIGH severities must be notified on website and news feed within %(limit)s\n"
 "working days of classification."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:98
-msgid "The notification should list appropriate steps for users to take, if any."
+msgid ""
+"The notification should list appropriate steps for users to take, if any."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:101
 msgid ""
-"The notification must not include any details that could suggest an "
-"exploitation\n"
+"The notification must not include any details that could suggest an exploitation\n"
 "path."
 msgstr ""
 
@@ -494,8 +420,8 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:122
 msgid ""
 "Response Manager works on a patch LOCALLY, patches are shared by the "
-"response team via PGP-encrypted e-mail until such a time as it is safe to"
-" expose to the public."
+"response team via PGP-encrypted e-mail until such a time as it is safe to "
+"expose to the public."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:125
@@ -504,10 +430,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:128
 msgid ""
-"Any messages associated with PUBLIC commits during the time of review "
-"should not\n"
-"make reference to the security nature of the PRIVATE branch or its "
-"commits."
+"Any messages associated with PUBLIC commits during the time of review should not\n"
+"make reference to the security nature of the PRIVATE branch or its commits."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:132
@@ -542,19 +466,14 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:159
 msgid ""
-"Response Manager includes vulnerability announcement draft in release "
-"notes."
+"Response Manager includes vulnerability announcement draft in release notes."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:162
 msgid ""
-"Proceed with the Point or Regular Release. At this time, it is not "
-"possible to release an in-network update for only one operating system or"
-"\n"
-"\t\tarchitecture. In order that all affected products can be released as "
-"quickly as possible, the person responsible\n"
-"\t\tfor that software should be able to perform necessary release "
-"processes in a timely manner. Importantly this should include\n"
+"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
+"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
+"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
 "\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
 msgstr ""
 
@@ -564,11 +483,13 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:175
 #, python-format
-msgid "Response Team has %(limit)s days to fulfill all points within section III."
+msgid ""
+"Response Team has %(limit)s days to fulfill all points within section III."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:179
-msgid "If the Incident Response process in section III is successfully completed:"
+msgid ""
+"If the Incident Response process in section III is successfully completed:"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:183
@@ -620,8 +541,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:214
 msgid ""
-"Workarounds (configuration changes users can make to reduce their "
-"exposure to the vulnerability)."
+"Workarounds (configuration changes users can make to reduce their exposure "
+"to the vulnerability)."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:217
@@ -629,13 +550,14 @@ msgid "If applicable, credits to the original reporter."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:222
-msgid "Release finalized vulnerability announcement on website and in news feed."
+msgid ""
+"Release finalized vulnerability announcement on website and in news feed."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:230
 msgid ""
-"For HIGH severities, release finalized vulnerability announcement on "
-"well-known mailing lists:"
+"For HIGH severities, release finalized vulnerability announcement on well-"
+"known mailing lists:"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:238
@@ -644,8 +566,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:242
 msgid ""
-"The commit that applied the fix is made reference too in a future commit "
-"and includes a CVE-ID."
+"The commit that applied the fix is made reference too in a future commit and"
+" includes a CVE-ID."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:250
@@ -656,33 +578,28 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:254
 msgid ""
-"Response Team and developers organize an IRC meeting to discuss why/what "
-"points\n"
-"in section III were not resolved and how the team can resolve them in the"
-"\n"
+"Response Team and developers organize an IRC meeting to discuss why/what points\n"
+"in section III were not resolved and how the team can resolve them in the\n"
 "future."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:259
 msgid ""
-"Any developer meetings immediately following the incident should include "
-"points\n"
+"Any developer meetings immediately following the incident should include points\n"
 "made in section V."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:263
 msgid ""
 "If disputes arise about whether or when to disclose information about a\n"
-"vulnerability, the Response Team will publicly discuss the issue via IRC "
-"and\n"
+"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
 "attempt to reach consensus."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:268
 #, python-format
 msgid ""
-"If consensus on a timely disclosure is not met (no later than %(limit)s "
-"days),\n"
+"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
 "the researcher (after %(limit)s days) has every right to expose the\n"
 "vulnerability to the public."
 msgstr ""
@@ -697,7 +614,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:282
 #: i2p2www/pages/site/research/vrp.html:302
-msgid "Response Team and developers should coordinate to work on the following:"
+msgid ""
+"Response Team and developers should coordinate to work on the following:"
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:286
@@ -726,15 +644,13 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:312
 msgid ""
-"If results are not sensitive, share with the public via IRC or public "
-"Trac."
+"If results are not sensitive, share with the public via IRC or public Trac."
 msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:320
 #, python-format
 msgid ""
-"Response Team has %(limit)s days following completion of section III to "
-"ensure\n"
+"Response Team has %(limit)s days following completion of section III to ensure\n"
 "completion of section V."
 msgstr ""
 
@@ -744,10 +660,8 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:328
 msgid ""
-"Any further questions or resolutions regarding the incident(s) between "
-"the\n"
-"researcher and response + development team after public disclosure can be"
-"\n"
+"Any further questions or resolutions regarding the incident(s) between the\n"
+"researcher and response + development team after public disclosure can be\n"
 "addressed via the following:"
 msgstr ""
 
@@ -757,8 +671,7 @@ msgstr ""
 
 #: i2p2www/pages/site/research/vrp.html:344
 msgid ""
-"Response Team and developers should hold annual meetings to review the "
-"previous\n"
+"Response Team and developers should hold annual meetings to review the previous\n"
 "year's incidents."
 msgstr ""
 
@@ -795,4 +708,3 @@ msgstr ""
 #: i2p2www/pages/site/research/vrp.html:375
 msgid "Potential changes to this process to improve future responses."
 msgstr ""
-
diff --git a/site-updater-docker.sh b/site-updater-docker.sh
index 1429f49af59832a846e9c1eac26b1d410c95ef24..128e44cc9997d8c62f6ab1f50f6a7f9e7ba39a40 100755
--- a/site-updater-docker.sh
+++ b/site-updater-docker.sh
@@ -50,6 +50,6 @@ DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )" || exit
 cd "$DIR" || exit
 
 git pull origin $i2p_www_branch
-docker build $i2p_www_docker_build_args -t i2p-mirror/mirror.i2p.www$suffix .
+docker build $i2p_www_docker_build_args -t mirror.i2p.www$suffix .
 docker rm -f mirror.i2p.www$suffix
-docker run $i2p_www_docker_run_args --name mirror.i2p.www$suffix -p 0.0.0.0:$port:80 i2p-mirror/i2p.www$suffix $@
+docker run $i2p_www_docker_run_args --name mirror.i2p.www$suffix -p 0.0.0.0:$port:80 mirror.i2p.www$suffix $@